Cybernetics and Information Technologies最新文献

筛选
英文 中文
Exploring the Performance and Characteristics of Single Linkage and Complete Linkage Hierarchical Clustering Methods for IoT Sensor Networks 探索物联网传感器网络单链路和全链路分层聚类方法的性能和特点
IF 1.2
Cybernetics and Information Technologies Pub Date : 2023-11-01 DOI: 10.2478/cait-2023-0041
Fuad Bajaber
{"title":"Exploring the Performance and Characteristics of Single Linkage and Complete Linkage Hierarchical Clustering Methods for IoT Sensor Networks","authors":"Fuad Bajaber","doi":"10.2478/cait-2023-0041","DOIUrl":"https://doi.org/10.2478/cait-2023-0041","url":null,"abstract":"Abstract The research explores applying hierarchical clustering methods, namely single linkage and complete linkage, in IoT Sensor Networks (ISNs). ISNs are distributed systems comprising numerous sensor nodes that collect data from the environment and communicate with each other to transmit the data to a base station. Hierarchical clustering is a technique that groups nodes into clusters based on proximity and similarity. This paper implements and compares the performance of single linkage and complete linkage methods in terms of cluster size, network lifetime, and cluster quality. The study’s findings provide guidance for ISN researchers and designers in selecting the appropriate clustering method that meets their specific requirements.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":"28 1","pages":"147 - 164"},"PeriodicalIF":1.2,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139298587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparing Different Oversampling Methods in Predicting Multi-Class Educational Datasets Using Machine Learning Techniques 比较使用机器学习技术预测多类教育数据集的不同过度取样方法
IF 1.2
Cybernetics and Information Technologies Pub Date : 2023-11-01 DOI: 10.2478/cait-2023-0044
Muhammad Arham Tariq, Allah Bux Sargano, Muhammad Aksam Iftikhar, Z. Habib
{"title":"Comparing Different Oversampling Methods in Predicting Multi-Class Educational Datasets Using Machine Learning Techniques","authors":"Muhammad Arham Tariq, Allah Bux Sargano, Muhammad Aksam Iftikhar, Z. Habib","doi":"10.2478/cait-2023-0044","DOIUrl":"https://doi.org/10.2478/cait-2023-0044","url":null,"abstract":"Abstract Predicting students’ academic performance is a critical research area, yet imbalanced educational datasets, characterized by unequal academic-level representation, present challenges for classifiers. While prior research has addressed the imbalance in binary-class datasets, this study focuses on multi-class datasets. A comparison of ten resampling methods (SMOTE, Adasyn, Distance SMOTE, BorderLineSMOTE, KmeansSMOTE, SVMSMOTE, LN SMOTE, MWSMOTE, Safe Level SMOTE, and SMOTETomek) is conducted alongside nine classification models: K-Nearest Neighbors (KNN), Linear Discriminant Analysis (LDA), Quadratic Discriminant Analysis (QDA), Support Vector Machine (SVM), Logistic Regression (LR), Extra Tree (ET), Random Forest (RT), Extreme Gradient Boosting (XGB), and Ada Boost (AdaB). Following a rigorous evaluation, including hyperparameter tuning and 10 fold cross-validations, KNN with SmoteTomek attains the highest accuracy of 83.7%, as demonstrated through an ablation study. These results emphasize SMOTETomek’s effectiveness in mitigating class imbalance in educational datasets and highlight KNN’s potential as an educational data mining classifier.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":"6 1","pages":"199 - 212"},"PeriodicalIF":1.2,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139294540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust Email Spam Filtering Using a Hybrid of Grey Wolf Optimiser and Naive Bayes Classifier 使用灰狼优化器和奈非贝叶斯分类器的混合方法进行稳健的垃圾邮件过滤
IF 1.2
Cybernetics and Information Technologies Pub Date : 2023-11-01 DOI: 10.2478/cait-2023-0037
J. Zraqou, Adnan H. Al-Helali, Waleed Maqableh, H. Fakhouri, Wesam Alkhadour
{"title":"Robust Email Spam Filtering Using a Hybrid of Grey Wolf Optimiser and Naive Bayes Classifier","authors":"J. Zraqou, Adnan H. Al-Helali, Waleed Maqableh, H. Fakhouri, Wesam Alkhadour","doi":"10.2478/cait-2023-0037","DOIUrl":"https://doi.org/10.2478/cait-2023-0037","url":null,"abstract":"Abstract Effective spam filtering plays a crucial role in enhancing user experience by sparing them from unwanted messages. This imperative underscores the importance of safeguarding email systems, prompting scholars across diverse fields to delve deeper into this subject. The primary objective of this research is to mitigate the disruptive effects of spam on email usage by introducing improved security measures compared to existing methods. This goal can be accomplished through the development of a novel spam filtering technique designed to prevent spam from infiltrating users’ inboxes. Consequently, a hybrid filtering approach that combines an information gain philter and a Wrapper Grey Wolf Optimizer feature selection algorithm with a Naive Bayes Classifier, is proposed, denoted as GWO-NBC. This research is rigorously tested using the WEKA software and the SPAMBASE dataset. Thorough performance evaluations demonstrated that the proposed approach surpasses existing solutions in terms of both security and accuracy.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":"62 1","pages":"79 - 90"},"PeriodicalIF":1.2,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139305594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimization Models and Strategy Approaches Dealing with Economic Crises, Natural Disasters, and Pandemics – An Overview 应对经济危机、自然灾害和大流行病的优化模型和战略方法 - 概述
IF 1.2
Cybernetics and Information Technologies Pub Date : 2023-11-01 DOI: 10.2478/cait-2023-0033
V. Guliashki, L. Kirilov, Alsa B. Nuzi
{"title":"Optimization Models and Strategy Approaches Dealing with Economic Crises, Natural Disasters, and Pandemics – An Overview","authors":"V. Guliashki, L. Kirilov, Alsa B. Nuzi","doi":"10.2478/cait-2023-0033","DOIUrl":"https://doi.org/10.2478/cait-2023-0033","url":null,"abstract":"Abstract The occurrence of large-scale crises is a great challenge for people. In such cases, many levels of public life are affected and recovery takes time and considerable resources. Therefore, approaches and tools for predicting and preventing crises, as well as models and methods for crisis management and crisis overcoming, are necessary. In this review, we present approaches, models, and methods that support decision-making in relation to the prevention and resolution of large-scale crises. We divide crises into three types: natural disasters, pandemics, and economic crises. For each type of crisis situation, the types of applied tasks that are solved and the corresponding models and methods that are used to support decision-makers in overcoming the crises are discussed. Conclusions are drawn on the state of the art in this area and some directions for future work are outlined.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":"147 1","pages":"3 - 25"},"PeriodicalIF":1.2,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139291759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Convex Least Angle Regression Based LASSO Feature Selection and Swish Activation Function Model for Startup Survival Rate 基于 LASSO 特征选择和 Swish 激活函数模型的凸最小角回归法计算启动存活率
IF 1.2
Cybernetics and Information Technologies Pub Date : 2023-11-01 DOI: 10.2478/cait-2023-0039
Ramakrishna Allu, V. N. R. Padmanabhuni
{"title":"Convex Least Angle Regression Based LASSO Feature Selection and Swish Activation Function Model for Startup Survival Rate","authors":"Ramakrishna Allu, V. N. R. Padmanabhuni","doi":"10.2478/cait-2023-0039","DOIUrl":"https://doi.org/10.2478/cait-2023-0039","url":null,"abstract":"Abstract A startup is a recently established business venture led by entrepreneurs, to create and offer new products or services. The discovery of promising startups is a challenging task for creditors, policymakers, and investors. Therefore, the startup survival rate prediction is required to be developed for the success/failure of startup companies. In this paper, the feature selection using the Convex Least Angle Regression Least Absolute Shrinkage and Selection Operator (CLAR-LASSO) is proposed to improve the classification of startup survival rate prediction. The Swish Activation Function based Long Short-Term Memory (SAFLSTM) is developed for classifying the survival rate of startups. Further, the Local Interpretable Model-agnostic Explanations (LIME) model interprets the predicted classification to the user. Existing research such as Hyper Parameter Tuning (HPT)-Logistic regression, HPT-Support Vector Machine (SVM), HPT-XGBoost, and SAFLSTM are used to compare the CLAR-LASSO. The accuracy of the CLAR-LASSO is 95.67% which is high when compared to the HPT-Logistic regression, HPT-SVM, HPT-XGBoost, and SAFLSTM.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":"1 1","pages":"110 - 127"},"PeriodicalIF":1.2,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139295096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Self-Exploration Scheme for Learning Optimal Policies against Dynamic Jamming Attacks in Cognitive Radio Networks 认知无线电网络中针对动态干扰攻击学习最优策略的新型自我探索方案
IF 1.2
Cybernetics and Information Technologies Pub Date : 2023-11-01 DOI: 10.2478/cait-2023-0040
Y. Sudha, V. Sarasvathi
{"title":"A Novel Self-Exploration Scheme for Learning Optimal Policies against Dynamic Jamming Attacks in Cognitive Radio Networks","authors":"Y. Sudha, V. Sarasvathi","doi":"10.2478/cait-2023-0040","DOIUrl":"https://doi.org/10.2478/cait-2023-0040","url":null,"abstract":"Abstract Cognitive Radio Networks (CRNs) present a compelling possibility to enable secondary users to take advantage of unused frequency bands in constrained spectrum resources. However, the network is vulnerable to a wide range of jamming attacks, which adversely affect its performance. Several countermeasures proposed in the literature require prior knowledge of the communication network and jamming strategy that are computationally intensive. These solutions may not be suitable for many real-world critical applications of the Internet of Things (IoT). Therefore, a novel self-exploration approach based on deep reinforcement learning is proposed to learn an optimal policy against dynamic attacks in CRN-based IoT applications. This method reduces computational complexity, without prior knowledge of the communication network or jamming strategy. A simulation of the proposed scheme eliminates interference effectively, consumes less power, and has a better Signal-to-Noise Ratio (SNR) than other algorithms. A platform-agnostic and efficient anti-jamming solution is provided to improve CRN’s performance when jamming occurs.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":"242 1","pages":"128 - 146"},"PeriodicalIF":1.2,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139295169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Improved Product Recommender System Using Collaborative Filtering and a Comparative Study of ML Algorithms 使用协作过滤的改进型产品推荐系统及 ML 算法比较研究
IF 1.2
Cybernetics and Information Technologies Pub Date : 2023-11-01 DOI: 10.2478/cait-2023-0035
S. Amutha, R. Vikram Surya
{"title":"An Improved Product Recommender System Using Collaborative Filtering and a Comparative Study of ML Algorithms","authors":"S. Amutha, R. Vikram Surya","doi":"10.2478/cait-2023-0035","DOIUrl":"https://doi.org/10.2478/cait-2023-0035","url":null,"abstract":"Abstract One of the methods most frequently used to recommend films is collaborative filtering. We examine the potential of collaborative filtering in our paper’s discussion of product suggestions. In addition to utilizing collaborative filtering in a new application, the proposed system will present a better technique that focuses especially on resolving the cold start issue. The suggested system will compute similarity using the Pearson Correlation Coefficient (PCC). Collaborative filtering that uses PCC suffers from the cold start problem or a lack of information on new users to generate useful recommendations. The proposed system solves the issue of cold start by gauging each new user by certain arbitrary parameters and recommending based on the choices of other users in that demographic. The proposed system also solves the issue of users’ reluctance to provide ratings by implementing a keyword-based perception system that will aid users in finding the right product for them.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":"40 1","pages":"51 - 62"},"PeriodicalIF":1.2,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139305308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Competitive Parkinson-Based Binary Volleyball Premier League Metaheuristic Algorithm for Feature Selection 基于帕金森二元排球超级联赛元搜索算法的特征选择竞争算法
IF 1.2
Cybernetics and Information Technologies Pub Date : 2023-11-01 DOI: 10.2478/cait-2023-0038
Edjola K. Naka
{"title":"A Competitive Parkinson-Based Binary Volleyball Premier League Metaheuristic Algorithm for Feature Selection","authors":"Edjola K. Naka","doi":"10.2478/cait-2023-0038","DOIUrl":"https://doi.org/10.2478/cait-2023-0038","url":null,"abstract":"Abstract A novel proposed Binary Volleyball Premier League algorithm (BVPL) has shown some promising results in a Parkinson’s Disease (PD) dataset related to fitness and accuracy [1]. This paper evaluates and provides an overview of the efficiency of BVPL in feature selection compared to various metaheuristic optimization algorithms and PD datasets. Moreover, an improved variant of BVPL is proposed that integrates the opposite-based solution to enlarge search domains and increase the possibility of getting rid of the local optima. The performance of BVPL is validated using the accuracy of the k-Nearest Neighbor Algorithm. The superiority of BVPL over the competing algorithms for each dataset is measured using statistical tests. The conclusive results indicate that the BVPL exhibits significant competitiveness compared to most metaheuristic algorithms, thereby establishing its potential for accurate prediction of PD. Overall, BVPL shows high potential to be employed in feature selection.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":"18 1","pages":"91 - 109"},"PeriodicalIF":1.2,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139298959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DoSRT: A Denial-of-Service Resistant Trust Model for VANET DoSRT:适用于 VANET 的抗拒绝服务信任模型
IF 1.2
Cybernetics and Information Technologies Pub Date : 2023-11-01 DOI: 10.2478/cait-2023-0042
Niharika Keshari, Dinesh Singh, Ashish Kumar Maurya
{"title":"DoSRT: A Denial-of-Service Resistant Trust Model for VANET","authors":"Niharika Keshari, Dinesh Singh, Ashish Kumar Maurya","doi":"10.2478/cait-2023-0042","DOIUrl":"https://doi.org/10.2478/cait-2023-0042","url":null,"abstract":"Abstract The Denial of Service (DoS) attack threatens the availability of key components of Vehicular Ad-hoc Network (VANET). Various centralized and decentralized trust-based approaches have been proposed to secure the VANET from DoS attack. The centralized approach is less efficient because the attack on the central trust manager leads to the overall failure of services. In comparison, the cluster-based decentralized approach faces overhead because of frequent changes in cluster members due to the high speed of the vehicles. Therefore, we have proposed a cluster-based Denial-of-Service Resistant Trust model (DoSRT). It improves decentralized trust management using speed deviation-based clustering and detects DoS attack based on the frequency of messages sent. Through performance evaluation, we have found that DoSRT improves precision, recall, accuracy, and F-Score by around 19%, 16%, 20%, and 17% in the presence of 30% DoS attackers.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":"18 1","pages":"165 - 180"},"PeriodicalIF":1.2,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139304633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spatial and Temporal Variations on Air Quality Prediction Using Deep Learning Techniques 利用深度学习技术预测空气质量的时空变化
IF 1.2
Cybernetics and Information Technologies Pub Date : 2023-11-01 DOI: 10.2478/cait-2023-0045
S. Vandhana, J. Anuradha
{"title":"Spatial and Temporal Variations on Air Quality Prediction Using Deep Learning Techniques","authors":"S. Vandhana, J. Anuradha","doi":"10.2478/cait-2023-0045","DOIUrl":"https://doi.org/10.2478/cait-2023-0045","url":null,"abstract":"Abstract Air Pollution is constantly causing a severe effect on the environment and public health. Prediction of air quality is widespread and has become a challenging issue owing to the enormous environmental data with time-space nonlinearity and multi-dimensional feature interaction. There is a need to bring out the spatial and temporal factors that are influencing the prediction. The present study concentrates on the correlation prediction of spatial and temporal relations. A Deep learning technique has been proposed for forecasting the accurate prediction. The proposed Bi_ST model is evaluated for 17 cities in India and China. The predicted results are evaluated with the performance metrics of RMSE, MAE, and MAPE. Experimental results demonstrate that our method Bi_ST accredits more accurate forecasts than all baseline RNN and LSTM models by reducing the error rate. The accuracy of the model obtained is 94%.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":"52 1","pages":"213 - 232"},"PeriodicalIF":1.2,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139297024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信