{"title":"An Intuitionistic Fuzzy Decision Aid for Neuromarketing Technology Selection Problem","authors":"Nazli Goker, M. Dursun","doi":"10.37394/23205.2023.22.8","DOIUrl":"https://doi.org/10.37394/23205.2023.22.8","url":null,"abstract":"Neuromarketing, which uses neuroimaging technologies for marketing initiatives, is represented as the application of neuroscientific methods for analysing and understanding consumer behaviour with regard to marketing objectives. Medical diagnostic devices for brain imaging are used by marketers as neuromarketing technologies. In this study, the intuitionistic fuzzy COPRAS method, which aims to obtain a solution relative to the ideal solution, is used to rank neuromarketing technology alternatives and identify the best-performing one among them. Intuitionistic fuzzy sets are used to deal with the loss of information and hesitation in data that may occur in operations with fuzzy numbers. The application of the proposed intuitionistic fuzzy decision-making approach is illustrated by conducting a case study","PeriodicalId":332148,"journal":{"name":"WSEAS TRANSACTIONS ON COMPUTERS","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134562100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Scalable Flow based Management Scheme in Software Define Network (SDN) using sFlow","authors":"Adeniji Oluwashola David, O. Omotosho","doi":"10.37394/23205.2023.22.7","DOIUrl":"https://doi.org/10.37394/23205.2023.22.7","url":null,"abstract":"The threats to information privacy while connected to cyber space are capacious and complex which require resilient network and antifragile security mechanisms. Software Define Network (SDN) infrastructure itself is predisposed to severe threats that may damage the provision of its usability as a security provider. The essential qualities of (SDN) are to provide support for high bandwidth and timely content delivery. SDN granular approach to security by centralizing the security control into one entity using the controller to ensure service control and information protection. SDN provides a new paradigm for applications to interact with the network. This interaction with declarative abstraction will instruct the Application Programming Interface (APIs) to direct the configuration and operation of the network. The API is queried to ask the network for information in order to plan and optimize the network operations. In this study, the vulnerability exploited by attackers to perform distributed denial of service (DDoS) attacks is examined. The trust between the control planes and forwarding planes is crucial in SDN. The separation of the control and data planes contributes to open security challenges such as denial of service (DoS) attacks, man-in-the-middle attacks, and network saturation attacks. The platform runs on Mininet 2.2.2, Ubuntu 18.04, Ryu Controller 4.34, and Sflow-RT. The Classification learning is based on Support Vector Machine (SVM). The contribution is to provide monitoring application of Flow RT Status and SFlow RT Packet Monitoring during Normal Traffic Generation. The implication for the monitoring application of SFlow RT Status is to supervise the failure in the status of sFlowAgent, sFlow Byte, and sFlow packet against cyber-attack.","PeriodicalId":332148,"journal":{"name":"WSEAS TRANSACTIONS ON COMPUTERS","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133457822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Aspects Regarding Knowledge-based Engineering","authors":"D. Ghelase, L. Daschievici","doi":"10.37394/23205.2023.22.6","DOIUrl":"https://doi.org/10.37394/23205.2023.22.6","url":null,"abstract":"Knowledge management (KM) has become an effective way of managing organization’s intellectual capital or, in other words, organization’s full experience, skills and knowledge that is relevant for more effective performance in future. The paper proposes a knowledge management to achieve a competitive control of the machining systems. Then an application of Knowledge Management in engineering has been attempted to explain. The model can be used by the manager for the choosing of competitive orders.","PeriodicalId":332148,"journal":{"name":"WSEAS TRANSACTIONS ON COMPUTERS","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124081180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Conceptual Bases of Gray Transformations and Discrete Vilenkin-Crestenson Functions Systems","authors":"A. Beletsky","doi":"10.37394/23205.2023.22.5","DOIUrl":"https://doi.org/10.37394/23205.2023.22.5","url":null,"abstract":"The article is devoted to the theoretical foundations of the construction of generalized Gray codes. These include the classical \"left-side\" and the proposed \"right-side\" Gray's codes. Left-side codes develop from left to right and right-side codes from right to left. Left- and right-handed Gray's codes augmented with reverse permutation operators form a subset of composite Gray's codes. Such codes have found constructive application in solving synthesis and analysis problems of discrete systems of Vilenkin-Crestenson functions (VCF). Particular cases of VCF systems are systems of discrete exponential functions and Walsh functions. The so-called indicator matrices (IM), bijective connected to the VCF systems, form the basis for VCF systems synthesis. The order of IMs is determined by the logarithmic dependence on the order of the VCF system. Unique Walsh-Cooley function systems, the only ones in the set of Walsh function systems that provide linear connectivity of the frequency scales of DFT processors, are developed. Examples of trees of VCF systems give. The orders of IMs are related by logarithmic dependence with the orders of VCF systems. Using IM: (1) estimates of the number of symmetric VCF systems in an unbounded range of changes of their parameters are obtained, (2) structures are determined and (3) rules of the interconnection of the systems established. The fundamental axioms and lemmas corresponding to the VCF systems formulating and directions for further research are outlined.","PeriodicalId":332148,"journal":{"name":"WSEAS TRANSACTIONS ON COMPUTERS","volume":"330 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133632318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Framework for Posture and Face Recognition Using Kinect an Ambient-intelligence Method","authors":"L. Vladutu, Cosmin Marian","doi":"10.37394/23205.2023.22.4","DOIUrl":"https://doi.org/10.37394/23205.2023.22.4","url":null,"abstract":"This electronic document describes one of the first full open-source frameworks for posture and face detection and classification using Kinect sensors, based entirely on an open-sourced software platform. It has been designed with the possibility of automatic monitoring of either an elderly person who is situated in a closed space (a room with furniture, appliances, and other rigid objects), or a patient who suffers from a physiological disorder. It is also based on an original hardware platform (the AmI-Platform), which includes more Kinect sensors, data acquisition stations, and crunches (data servers). The articles tackle two of the most important issues for ambient intelligence: accurate determination of the person and his or her facial landmarks (to understand emotions) and fast and reliable posture determination (to take appropriate measures in case of an accident).","PeriodicalId":332148,"journal":{"name":"WSEAS TRANSACTIONS ON COMPUTERS","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130798824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Proposed Artificial Intelligence Algorithm for Development of Higher Education","authors":"Amin H. Al Ka’bi","doi":"10.37394/23205.2023.22.2","DOIUrl":"https://doi.org/10.37394/23205.2023.22.2","url":null,"abstract":"Higher education has delved into a new stage of rapid development focusing on quality improvement, while encountering new challenges and obstacles. In this research work, an artificial intelligence algorithm for education improvement is proposed. Firstly, deep feature abstraction in temporal and special dimensions is performed using Long Short-Term Memory (LSTM) artificial neural network and convolutional networks. Consequently, multiscale attention fusion techniques are used to improve the articulateness of the characteristics and come up with better recommendations with the assistance of multilayer perceptron. Moreover, the proposed model helps in improving the cognitive capability of students and enhances their overall quality of perception. Moreover, it has been proven that the performance of the proposed model provides better recommendation outcomes and better robustness compared to existing models through conducting extensive experiments based on real data.","PeriodicalId":332148,"journal":{"name":"WSEAS TRANSACTIONS ON COMPUTERS","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124848724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How to Understand Phishing","authors":"Ladislav Burita","doi":"10.37394/23205.2023.22.1","DOIUrl":"https://doi.org/10.37394/23205.2023.22.1","url":null,"abstract":"The article is based on the results of previous research, is focused on the analysis and classification of phishing emails, and documents the results of communication with the phisher attacker. In the first part of the article, an experiment carried out with a randomly selected set of emails confirms the considerable uncertainty of the correct result of automatic classification based on keywords using text analysis software. The second part of the article contains the experiment of communication with phishing attackers. A typical scenario of message exchange is presented. Thanks to the correct setting of security and protection rules, no security incident occurred. The literature search confirms the great interest in publishing in the field of phishing. Compared to the content of the published article, it turned out that its focus is completely original.","PeriodicalId":332148,"journal":{"name":"WSEAS TRANSACTIONS ON COMPUTERS","volume":"235 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130799858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Threats Targeting Children on Online Social Networks","authors":"Aleksandar Karadimce, Marija Bukalevska","doi":"10.37394/23205.2023.22.3","DOIUrl":"https://doi.org/10.37394/23205.2023.22.3","url":null,"abstract":"Today, practically everyone has access to the internet and owns some type of digital gadgets, such as a smartphone, laptop, tablet, etc. We live in a digital world where internet use is widespread. Nowadays, a growing number of children have access to the internet via portable electronic devices such as tablets, laptops, and gaming consoles. Online social networks (OSN) have become increasingly popular and are now widely used along with the rise of the internet. A large percentage of children worldwide have profiles on at least one online social networking site. Children register on these platforms so they can communicate with their peers, make new friends, share their interests and hobbies in the hopes of meeting someone who has similar ones, play games, and more. But in addition to the benefits and enjoyment that kids derive from social networks, there are also risks and dangers that specifically target children on OSN platforms. Online harassment, online predators, sexual solicitation, cyberbullying, and cyber grooming are all threats that target children on OSNs. This paper aims to bring awareness to parents and children about the potential dangers present on online social networking platforms and offers guidelines on how to better protect children in the social networking environment.","PeriodicalId":332148,"journal":{"name":"WSEAS TRANSACTIONS ON COMPUTERS","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115032007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enterprise Transformation Projects-Cloud Transformation Concept Holistic Security Integration (CTC-HSI)","authors":"A. Trad","doi":"10.37394/23205.2022.21.41","DOIUrl":"https://doi.org/10.37394/23205.2022.21.41","url":null,"abstract":"This chapter presents the fundaments of the Cloud Transformation Concept (CTC) and this concept is a basic component of the author’s transformation framework and in complex transformation projects, where a holistic security concept is a top priority. The implementation of CTC’s Holistic Security Integration (CTCHSI) is supported by the author’s Applied Holistic Mathematical Model (AHMM) for CTC (AHMM4CTC) and his various research works on Holistic Security Integration (HSI), Business Process Management (BPM), Artificial Intelligence (AI), AI Services (AIS), Compute Services (CS), Mathematical Models, cross-functional transformations projects. The AHMM4CTC is based on cross-functional research on an authentic and proprietary mixed research method supported by his own version of an AI learning model, a search tree, combined with an internal heuristic algorithm. In this chapter, the focus is on CTC-HSI’s integration concepts, requirements, services, data management, and corresponding transformation security strategies. The proposed AHMM4CTC-based CTC-HSI is a concept for secured environments, which use real-life cases of a transformation project, which needs scalable and secured Cloud Platform’s (CP) infrastructure and services layer, that are supported by the alignment of CP services, standards, enterprise architecture paradigm, and security development strategies. In a CP-based transformation project, the author recommends integrating a Private CP (PCP); which can use commercial CPs like the Google CP (GCP). The GCP was chosen as a sample CP, but there is a need to define a standardized security architecture and concept/procedures so that the organization builds its own CTC-HSI-based PCP and has to avoid locked-in commercial products.","PeriodicalId":332148,"journal":{"name":"WSEAS TRANSACTIONS ON COMPUTERS","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126068219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Analysis of Hybridization of [PIO-GSO] Algorithms in Wireless Sensor Networks","authors":"K. Thamizhmaran, K. Prabu","doi":"10.37394/23205.2022.21.40","DOIUrl":"https://doi.org/10.37394/23205.2022.21.40","url":null,"abstract":"In wireless sensor networks (WSN), clustering is treated as an energy efficient technique employed to achieve augmenting network lifetime. But, the process of cluster head (CH) selection for stabilized network operation and prolonged network lifetime remains a challenging issue in WSN. In this research, presents a novel Hybridization of Pigeon Inspired with Glowworm Swarm Optimization (HPIGSO) algorithm based clustering innovation in WSN. This innovative HPIGSO algorithm integrates the good characteristics of Pigeon Inspired Optimization (PIO) algorithm and Glowworm Swarm Optimization (GSO) algorithm. The proposed algorithm operates on three major stages namely initialization, cluster head selection and cluster construction. Once the nodes are deployed, the initialization process takes place. Followed by, Base Station (BS) executes the HPIGSO algorithm and selects the cluster heads effectively. Subsequently, nearby nodes joins the cluster head and becomes cluster members, thereby cluster construction takes place. Finally, the cluster members send the data to cluster heads which is then forwarded to the base station via inter-cluster communication. The performance of the proposed HPIGSO method has been evaluated and compared with QOGSO, PIOA-DS, ALO, GOA and FFOA. Finally the proposed HPIGSO algorithm provides prolonged the lifetime of WSN over the existing clustering techniques.","PeriodicalId":332148,"journal":{"name":"WSEAS TRANSACTIONS ON COMPUTERS","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122352309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}