WSEAS TRANSACTIONS ON COMPUTERS最新文献

筛选
英文 中文
An Intuitionistic Fuzzy Decision Aid for Neuromarketing Technology Selection Problem 神经营销技术选择问题的直觉模糊决策辅助
WSEAS TRANSACTIONS ON COMPUTERS Pub Date : 2023-07-05 DOI: 10.37394/23205.2023.22.8
Nazli Goker, M. Dursun
{"title":"An Intuitionistic Fuzzy Decision Aid for Neuromarketing Technology Selection Problem","authors":"Nazli Goker, M. Dursun","doi":"10.37394/23205.2023.22.8","DOIUrl":"https://doi.org/10.37394/23205.2023.22.8","url":null,"abstract":"Neuromarketing, which uses neuroimaging technologies for marketing initiatives, is represented as the application of neuroscientific methods for analysing and understanding consumer behaviour with regard to marketing objectives. Medical diagnostic devices for brain imaging are used by marketers as neuromarketing technologies. In this study, the intuitionistic fuzzy COPRAS method, which aims to obtain a solution relative to the ideal solution, is used to rank neuromarketing technology alternatives and identify the best-performing one among them. Intuitionistic fuzzy sets are used to deal with the loss of information and hesitation in data that may occur in operations with fuzzy numbers. The application of the proposed intuitionistic fuzzy decision-making approach is illustrated by conducting a case study","PeriodicalId":332148,"journal":{"name":"WSEAS TRANSACTIONS ON COMPUTERS","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134562100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scalable Flow based Management Scheme in Software Define Network (SDN) using sFlow 基于sFlow的SDN (Software Define Network)可扩展流管理方案
WSEAS TRANSACTIONS ON COMPUTERS Pub Date : 2023-06-22 DOI: 10.37394/23205.2023.22.7
Adeniji Oluwashola David, O. Omotosho
{"title":"Scalable Flow based Management Scheme in Software Define Network (SDN) using sFlow","authors":"Adeniji Oluwashola David, O. Omotosho","doi":"10.37394/23205.2023.22.7","DOIUrl":"https://doi.org/10.37394/23205.2023.22.7","url":null,"abstract":"The threats to information privacy while connected to cyber space are capacious and complex which require resilient network and antifragile security mechanisms. Software Define Network (SDN) infrastructure itself is predisposed to severe threats that may damage the provision of its usability as a security provider. The essential qualities of (SDN) are to provide support for high bandwidth and timely content delivery. SDN granular approach to security by centralizing the security control into one entity using the controller to ensure service control and information protection. SDN provides a new paradigm for applications to interact with the network. This interaction with declarative abstraction will instruct the Application Programming Interface (APIs) to direct the configuration and operation of the network. The API is queried to ask the network for information in order to plan and optimize the network operations. In this study, the vulnerability exploited by attackers to perform distributed denial of service (DDoS) attacks is examined. The trust between the control planes and forwarding planes is crucial in SDN. The separation of the control and data planes contributes to open security challenges such as denial of service (DoS) attacks, man-in-the-middle attacks, and network saturation attacks. The platform runs on Mininet 2.2.2, Ubuntu 18.04, Ryu Controller 4.34, and Sflow-RT. The Classification learning is based on Support Vector Machine (SVM). The contribution is to provide monitoring application of Flow RT Status and SFlow RT Packet Monitoring during Normal Traffic Generation. The implication for the monitoring application of SFlow RT Status is to supervise the failure in the status of sFlowAgent, sFlow Byte, and sFlow packet against cyber-attack.","PeriodicalId":332148,"journal":{"name":"WSEAS TRANSACTIONS ON COMPUTERS","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133457822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Aspects Regarding Knowledge-based Engineering 关于知识工程的几个方面
WSEAS TRANSACTIONS ON COMPUTERS Pub Date : 2023-03-22 DOI: 10.37394/23205.2023.22.6
D. Ghelase, L. Daschievici
{"title":"Aspects Regarding Knowledge-based Engineering","authors":"D. Ghelase, L. Daschievici","doi":"10.37394/23205.2023.22.6","DOIUrl":"https://doi.org/10.37394/23205.2023.22.6","url":null,"abstract":"Knowledge management (KM) has become an effective way of managing organization’s intellectual capital or, in other words, organization’s full experience, skills and knowledge that is relevant for more effective performance in future. The paper proposes a knowledge management to achieve a competitive control of the machining systems. Then an application of Knowledge Management in engineering has been attempted to explain. The model can be used by the manager for the choosing of competitive orders.","PeriodicalId":332148,"journal":{"name":"WSEAS TRANSACTIONS ON COMPUTERS","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124081180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Conceptual Bases of Gray Transformations and Discrete Vilenkin-Crestenson Functions Systems 灰色变换与离散Vilenkin-Crestenson函数系统的概念基础
WSEAS TRANSACTIONS ON COMPUTERS Pub Date : 2023-03-07 DOI: 10.37394/23205.2023.22.5
A. Beletsky
{"title":"Conceptual Bases of Gray Transformations and Discrete Vilenkin-Crestenson Functions Systems","authors":"A. Beletsky","doi":"10.37394/23205.2023.22.5","DOIUrl":"https://doi.org/10.37394/23205.2023.22.5","url":null,"abstract":"The article is devoted to the theoretical foundations of the construction of generalized Gray codes. These include the classical \"left-side\" and the proposed \"right-side\" Gray's codes. Left-side codes develop from left to right and right-side codes from right to left. Left- and right-handed Gray's codes augmented with reverse permutation operators form a subset of composite Gray's codes. Such codes have found constructive application in solving synthesis and analysis problems of discrete systems of Vilenkin-Crestenson functions (VCF). Particular cases of VCF systems are systems of discrete exponential functions and Walsh functions. The so-called indicator matrices (IM), bijective connected to the VCF systems, form the basis for VCF systems synthesis. The order of IMs is determined by the logarithmic dependence on the order of the VCF system. Unique Walsh-Cooley function systems, the only ones in the set of Walsh function systems that provide linear connectivity of the frequency scales of DFT processors, are developed. Examples of trees of VCF systems give. The orders of IMs are related by logarithmic dependence with the orders of VCF systems. Using IM: (1) estimates of the number of symmetric VCF systems in an unbounded range of changes of their parameters are obtained, (2) structures are determined and (3) rules of the interconnection of the systems established. The fundamental axioms and lemmas corresponding to the VCF systems formulating and directions for further research are outlined.","PeriodicalId":332148,"journal":{"name":"WSEAS TRANSACTIONS ON COMPUTERS","volume":"330 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133632318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Framework for Posture and Face Recognition Using Kinect an Ambient-intelligence Method 基于环境智能方法的Kinect姿态和人脸识别框架
WSEAS TRANSACTIONS ON COMPUTERS Pub Date : 2023-02-22 DOI: 10.37394/23205.2023.22.4
L. Vladutu, Cosmin Marian
{"title":"Framework for Posture and Face Recognition Using Kinect an Ambient-intelligence Method","authors":"L. Vladutu, Cosmin Marian","doi":"10.37394/23205.2023.22.4","DOIUrl":"https://doi.org/10.37394/23205.2023.22.4","url":null,"abstract":"This electronic document describes one of the first full open-source frameworks for posture and face detection and classification using Kinect sensors, based entirely on an open-sourced software platform. It has been designed with the possibility of automatic monitoring of either an elderly person who is situated in a closed space (a room with furniture, appliances, and other rigid objects), or a patient who suffers from a physiological disorder. It is also based on an original hardware platform (the AmI-Platform), which includes more Kinect sensors, data acquisition stations, and crunches (data servers). The articles tackle two of the most important issues for ambient intelligence: accurate determination of the person and his or her facial landmarks (to understand emotions) and fast and reliable posture determination (to take appropriate measures in case of an accident).","PeriodicalId":332148,"journal":{"name":"WSEAS TRANSACTIONS ON COMPUTERS","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130798824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Proposed Artificial Intelligence Algorithm for Development of Higher Education 面向高等教育发展的人工智能算法
WSEAS TRANSACTIONS ON COMPUTERS Pub Date : 2023-01-19 DOI: 10.37394/23205.2023.22.2
Amin H. Al Ka’bi
{"title":"A Proposed Artificial Intelligence Algorithm for Development of Higher Education","authors":"Amin H. Al Ka’bi","doi":"10.37394/23205.2023.22.2","DOIUrl":"https://doi.org/10.37394/23205.2023.22.2","url":null,"abstract":"Higher education has delved into a new stage of rapid development focusing on quality improvement, while encountering new challenges and obstacles. In this research work, an artificial intelligence algorithm for education improvement is proposed. Firstly, deep feature abstraction in temporal and special dimensions is performed using Long Short-Term Memory (LSTM) artificial neural network and convolutional networks. Consequently, multiscale attention fusion techniques are used to improve the articulateness of the characteristics and come up with better recommendations with the assistance of multilayer perceptron. Moreover, the proposed model helps in improving the cognitive capability of students and enhances their overall quality of perception. Moreover, it has been proven that the performance of the proposed model provides better recommendation outcomes and better robustness compared to existing models through conducting extensive experiments based on real data.","PeriodicalId":332148,"journal":{"name":"WSEAS TRANSACTIONS ON COMPUTERS","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124848724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How to Understand Phishing 如何了解网络钓鱼
WSEAS TRANSACTIONS ON COMPUTERS Pub Date : 2023-01-09 DOI: 10.37394/23205.2023.22.1
Ladislav Burita
{"title":"How to Understand Phishing","authors":"Ladislav Burita","doi":"10.37394/23205.2023.22.1","DOIUrl":"https://doi.org/10.37394/23205.2023.22.1","url":null,"abstract":"The article is based on the results of previous research, is focused on the analysis and classification of phishing emails, and documents the results of communication with the phisher attacker. In the first part of the article, an experiment carried out with a randomly selected set of emails confirms the considerable uncertainty of the correct result of automatic classification based on keywords using text analysis software. The second part of the article contains the experiment of communication with phishing attackers. A typical scenario of message exchange is presented. Thanks to the correct setting of security and protection rules, no security incident occurred. The literature search confirms the great interest in publishing in the field of phishing. Compared to the content of the published article, it turned out that its focus is completely original.","PeriodicalId":332148,"journal":{"name":"WSEAS TRANSACTIONS ON COMPUTERS","volume":"235 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130799858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Threats Targeting Children on Online Social Networks 在线社交网络上针对儿童的威胁
WSEAS TRANSACTIONS ON COMPUTERS Pub Date : 2022-12-31 DOI: 10.37394/23205.2023.22.3
Aleksandar Karadimce, Marija Bukalevska
{"title":"Threats Targeting Children on Online Social Networks","authors":"Aleksandar Karadimce, Marija Bukalevska","doi":"10.37394/23205.2023.22.3","DOIUrl":"https://doi.org/10.37394/23205.2023.22.3","url":null,"abstract":"Today, practically everyone has access to the internet and owns some type of digital gadgets, such as a smartphone, laptop, tablet, etc. We live in a digital world where internet use is widespread. Nowadays, a growing number of children have access to the internet via portable electronic devices such as tablets, laptops, and gaming consoles. Online social networks (OSN) have become increasingly popular and are now widely used along with the rise of the internet. A large percentage of children worldwide have profiles on at least one online social networking site. Children register on these platforms so they can communicate with their peers, make new friends, share their interests and hobbies in the hopes of meeting someone who has similar ones, play games, and more. But in addition to the benefits and enjoyment that kids derive from social networks, there are also risks and dangers that specifically target children on OSN platforms. Online harassment, online predators, sexual solicitation, cyberbullying, and cyber grooming are all threats that target children on OSNs. This paper aims to bring awareness to parents and children about the potential dangers present on online social networking platforms and offers guidelines on how to better protect children in the social networking environment.","PeriodicalId":332148,"journal":{"name":"WSEAS TRANSACTIONS ON COMPUTERS","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115032007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enterprise Transformation Projects-Cloud Transformation Concept Holistic Security Integration (CTC-HSI) 企业转型项目-云转型概念整体安全集成(CTC-HSI)
WSEAS TRANSACTIONS ON COMPUTERS Pub Date : 2022-12-30 DOI: 10.37394/23205.2022.21.41
A. Trad
{"title":"Enterprise Transformation Projects-Cloud Transformation Concept Holistic Security Integration (CTC-HSI)","authors":"A. Trad","doi":"10.37394/23205.2022.21.41","DOIUrl":"https://doi.org/10.37394/23205.2022.21.41","url":null,"abstract":"This chapter presents the fundaments of the Cloud Transformation Concept (CTC) and this concept is a basic component of the author’s transformation framework and in complex transformation projects, where a holistic security concept is a top priority. The implementation of CTC’s Holistic Security Integration (CTCHSI) is supported by the author’s Applied Holistic Mathematical Model (AHMM) for CTC (AHMM4CTC) and his various research works on Holistic Security Integration (HSI), Business Process Management (BPM), Artificial Intelligence (AI), AI Services (AIS), Compute Services (CS), Mathematical Models, cross-functional transformations projects. The AHMM4CTC is based on cross-functional research on an authentic and proprietary mixed research method supported by his own version of an AI learning model, a search tree, combined with an internal heuristic algorithm. In this chapter, the focus is on CTC-HSI’s integration concepts, requirements, services, data management, and corresponding transformation security strategies. The proposed AHMM4CTC-based CTC-HSI is a concept for secured environments, which use real-life cases of a transformation project, which needs scalable and secured Cloud Platform’s (CP) infrastructure and services layer, that are supported by the alignment of CP services, standards, enterprise architecture paradigm, and security development strategies. In a CP-based transformation project, the author recommends integrating a Private CP (PCP); which can use commercial CPs like the Google CP (GCP). The GCP was chosen as a sample CP, but there is a need to define a standardized security architecture and concept/procedures so that the organization builds its own CTC-HSI-based PCP and has to avoid locked-in commercial products.","PeriodicalId":332148,"journal":{"name":"WSEAS TRANSACTIONS ON COMPUTERS","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126068219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Analysis of Hybridization of [PIO-GSO] Algorithms in Wireless Sensor Networks 无线传感器网络中[PIO-GSO]混合算法的性能分析
WSEAS TRANSACTIONS ON COMPUTERS Pub Date : 2022-12-29 DOI: 10.37394/23205.2022.21.40
K. Thamizhmaran, K. Prabu
{"title":"Performance Analysis of Hybridization of [PIO-GSO] Algorithms in Wireless Sensor Networks","authors":"K. Thamizhmaran, K. Prabu","doi":"10.37394/23205.2022.21.40","DOIUrl":"https://doi.org/10.37394/23205.2022.21.40","url":null,"abstract":"In wireless sensor networks (WSN), clustering is treated as an energy efficient technique employed to achieve augmenting network lifetime. But, the process of cluster head (CH) selection for stabilized network operation and prolonged network lifetime remains a challenging issue in WSN. In this research, presents a novel Hybridization of Pigeon Inspired with Glowworm Swarm Optimization (HPIGSO) algorithm based clustering innovation in WSN. This innovative HPIGSO algorithm integrates the good characteristics of Pigeon Inspired Optimization (PIO) algorithm and Glowworm Swarm Optimization (GSO) algorithm. The proposed algorithm operates on three major stages namely initialization, cluster head selection and cluster construction. Once the nodes are deployed, the initialization process takes place. Followed by, Base Station (BS) executes the HPIGSO algorithm and selects the cluster heads effectively. Subsequently, nearby nodes joins the cluster head and becomes cluster members, thereby cluster construction takes place. Finally, the cluster members send the data to cluster heads which is then forwarded to the base station via inter-cluster communication. The performance of the proposed HPIGSO method has been evaluated and compared with QOGSO, PIOA-DS, ALO, GOA and FFOA. Finally the proposed HPIGSO algorithm provides prolonged the lifetime of WSN over the existing clustering techniques.","PeriodicalId":332148,"journal":{"name":"WSEAS TRANSACTIONS ON COMPUTERS","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122352309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信