Cybernetics and Information Technologies最新文献

筛选
英文 中文
Dual-Step Hybrid Mechanism for Energy Efficiency Maximization in Wireless Network 无线网络能效最大化的双步混合机制
Cybernetics and Information Technologies Pub Date : 2023-09-01 DOI: 10.2478/cait-2023-0025
Pundalik Chavan, Neelam Malyadri, Husna Tabassum, S. Supreeth, P. V. Bhaskar Reddy, Gururaj Murtugudde, S. Rohith, S. R. Manjunath, H. C. Ramaprasad
{"title":"Dual-Step Hybrid Mechanism for Energy Efficiency Maximization in Wireless Network","authors":"Pundalik Chavan, Neelam Malyadri, Husna Tabassum, S. Supreeth, P. V. Bhaskar Reddy, Gururaj Murtugudde, S. Rohith, S. R. Manjunath, H. C. Ramaprasad","doi":"10.2478/cait-2023-0025","DOIUrl":"https://doi.org/10.2478/cait-2023-0025","url":null,"abstract":"Abstract Wireless networks have become essential in daily life, with a growing number of base stations and connected devices. However, increasing traffic and energy consumption pose challenges. This research proposes a Dual Step Hybrid Mechanism (DSHM) for energy optimization, incorporating MIMO technologies. The first step introduces an optimal algorithm that iteratively updates the probability distribution to achieve the best solution. The second step focuses on reducing energy consumption while maximizing energy efficiency, using specific techniques and strategies to minimize usage without compromising energy maximization. The proposed approach is evaluated using parameter settings, including block length, path loss, hardware impairments, and bandwidth. The research investigates the impact of hardware impairments on energy efficiency and analyzes performance under different SINR constraints. The study also examines energy efficiency in active user density and base station density, highlighting the superior energy efficiency achieved by MIMO configurations.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135587768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Hypergraph Clustered Gray Relational Analysis HGPSO Algorithm for Data Aggregation in WSN 一种用于WSN数据聚合的超图聚类灰色关联分析HGPSO算法
Cybernetics and Information Technologies Pub Date : 2023-09-01 DOI: 10.2478/cait-2023-0031
Shailendra Pushkin, None Ranvijay
{"title":"A Novel Hypergraph Clustered Gray Relational Analysis HGPSO Algorithm for Data Aggregation in WSN","authors":"Shailendra Pushkin, None Ranvijay","doi":"10.2478/cait-2023-0031","DOIUrl":"https://doi.org/10.2478/cait-2023-0031","url":null,"abstract":"Abstract Wireless Sensor Networks (WSN) aggregate data from multiple sensors and transfer it to a central node. Sensor nodes should use as little energy as possible to aggregate data. This work has focused on optimal clustering and cluster head node selection to save energy. HyperGraphs (HGC) and cluster head selection based on distance and energy consumption are unique approaches to spectral clustering. GRA computes a relational matrix to select the cluster head. The network’s Moving Agent (MA) may use Hypergraphed Particle Swarm Optimization (HGPSO) to collect data from cluster heads. Compared to the clustering algorithm without agent movement, the HGC-GRA-HGPSO approach has increased residual energy by 5.59% and packets by 2.44%. It also has improved residual energy by 2.45% compared to Grey Wolf Optimizer-based Clustering (GWO-C).","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135587776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Fuzzy Programming Based Approach to a Multi-Objective Multi-Echelon Green Closed-Loop Supply Chain Problem 基于模糊规划的多目标多级绿色闭环供应链问题
Cybernetics and Information Technologies Pub Date : 2023-09-01 DOI: 10.2478/cait-2023-0023
Koray Kocken, Beyza Ozkok, Hale Gonce Kocken
{"title":"A Fuzzy Programming Based Approach to a Multi-Objective Multi-Echelon Green Closed-Loop Supply Chain Problem","authors":"Koray Kocken, Beyza Ozkok, Hale Gonce Kocken","doi":"10.2478/cait-2023-0023","DOIUrl":"https://doi.org/10.2478/cait-2023-0023","url":null,"abstract":"Abstract It has become a social and legal obligation to take into account environmental factors as well as economic factors when designing the supply chain network. Reducing the emission of harmful gases in supply chain operations, recycling and efficient use of resources must be taken into consideration for future generations. The supply chain created in this study, in addition to the abovementioned features, includes supplier selection, warehouse and distribution center setup, transportation amounts between facilities, and transportation modes of products to be transported. This model, which is a multi-objective multi-echelon green closed-loop supply chain, is a mixed integer linear mathematical model and tries to maximize the joint satisfaction of the objectives with the help of a fuzzy approach using Zimmermann’s minimum operator.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135588106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
User Behavior Analysis for Detecting Compromised User Accounts: A Review Paper 用于检测受损用户帐户的用户行为分析:一篇综述论文
Cybernetics and Information Technologies Pub Date : 2023-09-01 DOI: 10.2478/cait-2023-0027
M. Jurišić, I. Tomičić, P. Grd
{"title":"User Behavior Analysis for Detecting Compromised User Accounts: A Review Paper","authors":"M. Jurišić, I. Tomičić, P. Grd","doi":"10.2478/cait-2023-0027","DOIUrl":"https://doi.org/10.2478/cait-2023-0027","url":null,"abstract":"Abstract The rise of online transactions has led to a corresponding increase in online criminal activities. Account takeover attacks, in particular, are challenging to detect, and novel approaches utilize machine learning to identify compromised accounts. This paper aims to conduct a literature review on account takeover detection and user behavior analysis within the cybersecurity domain. By exploring these areas, the goal is to combat account takeovers and other fraudulent attempts effectively.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135587780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modelling and Simulation of Traffic Light Control 交通信号灯控制的建模与仿真
Cybernetics and Information Technologies Pub Date : 2023-09-01 DOI: 10.2478/cait-2023-0032
Boriana Vatchova, Yordanka Boneva, Alexander Gegov
{"title":"Modelling and Simulation of Traffic Light Control","authors":"Boriana Vatchova, Yordanka Boneva, Alexander Gegov","doi":"10.2478/cait-2023-0032","DOIUrl":"https://doi.org/10.2478/cait-2023-0032","url":null,"abstract":"Abstract This study presents design of traffic light system with feedback control that considers a crossroad in an urban area. Two types of controllers are designed – fuzzy and analytical, which have been tested separately on Aimsun platform through a simulation. The aim of the study is to compare the performance of both controllers in terms of increasing traffic flow and decreasing queue length. The controllers manage the duration of the green light according to the traffic flow. Two different formal models are designed, tested, and compared. They have produced adequate solutions in terms of developing controllers for modeling and simulation of transportation tasks.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135588109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Secure Peer-to-Peer Image Sharing Using Rubik’s Cube Algorithm and Key Distribution Centre 基于魔方算法和密钥分发中心的安全点对点图像共享
Cybernetics and Information Technologies Pub Date : 2023-09-01 DOI: 10.2478/cait-2023-0029
Aswani Kumar Cherukuri, Shria Sannuthi, Neha Elagandula, Rishita Gadamsetty, Neha Singh, Arnav Jain, I. Sumaiya Thaseen, V. Priya, Annapurna Jonnalagadda, Firuz Kamalov
{"title":"A Secure Peer-to-Peer Image Sharing Using Rubik’s Cube Algorithm and Key Distribution Centre","authors":"Aswani Kumar Cherukuri, Shria Sannuthi, Neha Elagandula, Rishita Gadamsetty, Neha Singh, Arnav Jain, I. Sumaiya Thaseen, V. Priya, Annapurna Jonnalagadda, Firuz Kamalov","doi":"10.2478/cait-2023-0029","DOIUrl":"https://doi.org/10.2478/cait-2023-0029","url":null,"abstract":"Abstract In this work, we build upon an implementation of a peer-to-peer image encryption algorithm: “Rubik’s cube algorithm”. The algorithm utilizes pixel-level scrambling and XOR-based diffusion, facilitated through the symmetric key. Empirical analysis has proven this algorithm to have the advantage of large key space, high-level security, high obscurity level, and high speed, aiding in secure image transmission over insecure channels. However, the base approach has drawbacks of key generation being handled client-side (at nodes) and the process is time-consuming due to dynamically generating keys. Our work solves these issues by introducing a Key Distribution Center (KDC) to distribute symmetric keys for transmission, increasing confidentiality, and reducing key-generation overhead on nodes. Three approaches utilizing the KDC are presented, communicating the dimensions with KDC to generate keys, standardizing any image to fixed dimensions to standardize key-generation, and lastly, using a single session key which is cyclically iterated over, emulating different dimensions.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135588228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimization of Characteristics for a Stochastic Agent-Based Model of Goods Exchange with the Use of Parallel Hybrid Genetic Algorithm 用并行混合遗传算法优化基于随机Agent的货物交换模型的特性
IF 1.2
Cybernetics and Information Technologies Pub Date : 2023-06-01 DOI: 10.2478/cait-2023-0015
A. Akopov, A. Beklaryan, A. Zhukova
{"title":"Optimization of Characteristics for a Stochastic Agent-Based Model of Goods Exchange with the Use of Parallel Hybrid Genetic Algorithm","authors":"A. Akopov, A. Beklaryan, A. Zhukova","doi":"10.2478/cait-2023-0015","DOIUrl":"https://doi.org/10.2478/cait-2023-0015","url":null,"abstract":"Abstract A novel approach to modeling stochastic processes of goods exchange between multiple agents is presented, considering the possibility of optimizing the environment's characteristics and individual decision-making strategies. The proposed model makes it possible to form optimal states when choosing the moments of concluding barter and monetary transactions at the individual level of each agent maximizing the utility function. A new parallel hybrid Real-Coded Genetic Algorithm and Particle Swarm Optimization (RCGA-PSO) has been developed, combining methods of evolutionary selection based on well-known heuristic operators with methods of swarm optimization and machine learning. The algorithm is characterized by the best time efficiency and accuracy in comparison with other methods. The software implementation of the developed algorithm and model has been performed using the FLAME GPU framework. The possibility of using the RCGA-PSO Algorithm to optimize the characteristics of the environment and strategies for making individual decisions by agents involved in barter and monetary interactions is demonstrated.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":"3 7","pages":"87 - 104"},"PeriodicalIF":1.2,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41246334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Defending Against Identity Threats Using Risk-Based Authentication 使用基于风险的身份验证防御身份威胁
IF 1.2
Cybernetics and Information Technologies Pub Date : 2023-06-01 DOI: 10.2478/cait-2023-0016
Lalitha Sravanti Dasu, Mannav Dhamija, Gurram Dishitha, Ajith Vivekanandan, V. Sarasvathi
{"title":"Defending Against Identity Threats Using Risk-Based Authentication","authors":"Lalitha Sravanti Dasu, Mannav Dhamija, Gurram Dishitha, Ajith Vivekanandan, V. Sarasvathi","doi":"10.2478/cait-2023-0016","DOIUrl":"https://doi.org/10.2478/cait-2023-0016","url":null,"abstract":"Abstract Defending against identity-based threats, which have predominantly increased in the era of remote access and working, requires non-conventional, dynamic, intelligent, and strategic means of authenticating and authorizing. This paper aims at devising detailed risk-scoring algorithms for five real-time use cases to make identity security adaptive and risk-based. Zero-trust principles are incorporated by collecting sign-in logs and analyzing them continually to check for any anomalies, making it a dynamic approach. Users are categorized as risky and non-risky based on the calculated risk scores. While many adaptive security mechanisms have been proposed, they confine identities only to users. This paper also considers devices as having an identity and categorizes them as safe or unsafe devices. Further, results are displayed on a dashboard, making it easy for security administrators to analyze and make wise decisions like multifactor authentication, mitigation, or any other access control decisions as such.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":"23 1","pages":"105 - 123"},"PeriodicalIF":1.2,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41496584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cryptocurrency Price Prediction Using Enhanced PSO with Extreme Gradient Boosting Algorithm 基于极限梯度提升算法的增强PSO加密货币价格预测
IF 1.2
Cybernetics and Information Technologies Pub Date : 2023-06-01 DOI: 10.2478/cait-2023-0020
Vibha Srivastava, V. Dwivedi, Ashutosh Singh
{"title":"Cryptocurrency Price Prediction Using Enhanced PSO with Extreme Gradient Boosting Algorithm","authors":"Vibha Srivastava, V. Dwivedi, Ashutosh Singh","doi":"10.2478/cait-2023-0020","DOIUrl":"https://doi.org/10.2478/cait-2023-0020","url":null,"abstract":"Abstract Due to the highly volatile tendency of Bitcoin, there is a necessity for a better price prediction model. Only a few researchers have focused on the feasibility to apply various modelling approaches. These approaches may prone to have low convergence issues in outcomes and acquire high computation time. Hence a model is put forward based on machine learning techniques using regression algorithm and Particle Swarm Optimization with XGBoost algorithm, for more precise prediction outcomes of three cryptocurrencies; Bitcoin, Dogecoin, and Ethereum. The approach uses time series that consists of daily price information of cryptocurrencies. In this paper, the XGBoost algorithm is incorporated with an enhanced PSO method to tune the optimal hyper-parameters to yield out better prediction output rate. The comparative assessment delineated that the proposed method shows less root mean squared error, mean absolute error and mean squared error values. In this aspect, the proposed model stands predominant in showing high efficiency of prediction rate.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":"23 1","pages":"170 - 187"},"PeriodicalIF":1.2,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41349785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis on Hacking the Secured Air-Gapped Computer and Possible Solution 安全气隙计算机遭黑客攻击分析及可能解决方案
IF 1.2
Cybernetics and Information Technologies Pub Date : 2023-06-01 DOI: 10.2478/cait-2023-0017
Vrinda Sati, R. Muthalagu
{"title":"Analysis on Hacking the Secured Air-Gapped Computer and Possible Solution","authors":"Vrinda Sati, R. Muthalagu","doi":"10.2478/cait-2023-0017","DOIUrl":"https://doi.org/10.2478/cait-2023-0017","url":null,"abstract":"Abstract The world today runs on data, every minuscule task to the large one requires data. All the data is stored in the various technologies that we use. And to keep data safe, air gaps are introduced. Air gaps are a network security measure where secure computer networks are physically isolated from unsecured networks. Yet, different methods to hack the air gap have come forth. The paper analyzes the problem of hacking an air gap via screen brightness modulations. The proposed solution is a software program used to alert the user of a change in the brightness level of the screen. The concept of Windows Management Instrumentation (WMI) has been used to put forth the software. Applied to an air-gapped computer, the program displays an alert box immediately, as the screen brightness changes. The solution is an easy and efficient way to counter the attack. The program can be further implemented in different testing environments and the WMI concept can be applied to various other cyber hacks.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":"23 1","pages":"124 - 136"},"PeriodicalIF":1.2,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43755359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信