Cybernetics and Information Technologies最新文献

筛选
英文 中文
A Proposal for Honeyword Generation via Meerkat Clan Algorithm 一种基于Meerkat Clan算法的蜜语生成方案
IF 1.2
Cybernetics and Information Technologies Pub Date : 2022-03-01 DOI: 10.2478/cait-2022-0003
Yasser A. Yasser, A. Sadiq, Wasim Alhamdani
{"title":"A Proposal for Honeyword Generation via Meerkat Clan Algorithm","authors":"Yasser A. Yasser, A. Sadiq, Wasim Alhamdani","doi":"10.2478/cait-2022-0003","DOIUrl":"https://doi.org/10.2478/cait-2022-0003","url":null,"abstract":"Abstract An effective password cracking detection system is the honeyword system. The Honeyword method attempts to increase the security of hashed passwords by making password cracking easier to detect. Each user in the system has many honeywords in the password database. If the attacker logs in using a honeyword, a quiet alert trigger indicates that the password database has been hacked. Many honeyword generation methods have been proposed, they have a weakness in generating process, do not support all honeyword properties, and have many honeyword issues. This article proposes a novel method to generate honeyword using the meerkat clan intelligence algorithm, a metaheuristic swarm intelligence algorithm. The proposed generation methods will improve the honeyword generating process, enhance the honeyword properties, and solve the issues of previous methods. This work will show some previous generation methods, explain the proposed method, discuss the experimental results and compare the new one with the prior ones.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":"22 1","pages":"40 - 59"},"PeriodicalIF":1.2,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48001864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Fusion and the Impact of Group Mobility on Load Distribution on MRHOF and OF0 数据融合及群迁移对MRHOF和OF0载荷分布的影响
IF 1.2
Cybernetics and Information Technologies Pub Date : 2022-03-01 DOI: 10.2478/cait-2022-0005
Raad S. Al-Qassas, Malik Qasaimeh
{"title":"Data Fusion and the Impact of Group Mobility on Load Distribution on MRHOF and OF0","authors":"Raad S. Al-Qassas, Malik Qasaimeh","doi":"10.2478/cait-2022-0005","DOIUrl":"https://doi.org/10.2478/cait-2022-0005","url":null,"abstract":"Abstract Many routing algorithms proposed for IoT are based on modifications on RPL objective functions and trickle algorithms. However, there is a lack of an in-depth study to examine the impact of mobility on routing protocols based on MRHOF and OF0 algorithms. This paper examines the impact of group mobility on these algorithms, also examines their ability in distributing the load and the impact of varying traffic with the aid of simulations using the well-known Cooja simulator. The two algorithms exhibit similar performance for various metrics for low traffic rates and low mobility speed. However, when the traffic rate becomes relatively high, OF0 performance merits appear, in terms of throughput, packet load deviation, power deviation, and CPU power deviation. The mobility with higher speeds helps MRHOF to enhance its throughput and load deviation. The mobility allowed MRHOF to demonstrate better packets load deviation.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":"22 1","pages":"77 - 94"},"PeriodicalIF":1.2,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47567044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Early Student-at-Risk Detection by Current Learning Performance and Learning Behavior Indicators 通过当前学习表现和学习行为指标检测早期学生的风险
IF 1.2
Cybernetics and Information Technologies Pub Date : 2022-03-01 DOI: 10.2478/cait-2022-0008
T. A. Kustitskaya, A. A. Kytmanov, M. Noskov
{"title":"Early Student-at-Risk Detection by Current Learning Performance and Learning Behavior Indicators","authors":"T. A. Kustitskaya, A. A. Kytmanov, M. Noskov","doi":"10.2478/cait-2022-0008","DOIUrl":"https://doi.org/10.2478/cait-2022-0008","url":null,"abstract":"Abstract The article is focused on the problem of early prediction of students’ learning failures with the purpose of their possible prevention by timely introducing supportive measures. We propose an approach to designing a predictive model for an academic course or module taught in a blended learning format. We introduce certain requirements to predictive models concerning their applicability to the educational process such as interpretability, actionability, and adaptability to a course design. We test three types of classifiers meeting these requirements and choose the one that provides best performance starting from the early stages of the semester, and therefore provides various opportunities to timely support at-risk students. Our empirical studies confirm that the proposed approach is promising for the development of an early warning system in a higher education institution. Such systems can positively influence student retention rates and enhance learning and teaching experience for a long term.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":"22 1","pages":"117 - 133"},"PeriodicalIF":1.2,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49335322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Combination of Resnet and Spatial Pyramid Pooling for Musical Instrument Identification 结合Resnet和空间金字塔池进行乐器识别
IF 1.2
Cybernetics and Information Technologies Pub Date : 2022-03-01 DOI: 10.2478/cait-2022-0007
Christine Dewi, Rung-Ching Chen
{"title":"Combination of Resnet and Spatial Pyramid Pooling for Musical Instrument Identification","authors":"Christine Dewi, Rung-Ching Chen","doi":"10.2478/cait-2022-0007","DOIUrl":"https://doi.org/10.2478/cait-2022-0007","url":null,"abstract":"Abstract Identifying similar objects is one of the most challenging tasks in computer vision image recognition. The following musical instruments will be recognized in this study: French horn, harp, recorder, bassoon, cello, clarinet, erhu, guitar saxophone, trumpet, and violin. Numerous musical instruments are identical in size, form, and sound. Further, our works combine Resnet 50 with Spatial Pyramid Pooling (SPP) to identify musical instruments that are similar to one another. Next, the Resnet 50 and Resnet 50 SPP model evaluation performance includes the Floating-Point Operations (FLOPS), detection time, mAP, and IoU. Our work can increase the detection performance of musical instruments similar to one another. The method we propose, Resnet 50 SPP, shows the highest average accuracy of 84.64% compared to the results of previous studies.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":"22 1","pages":"104 - 116"},"PeriodicalIF":1.2,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42432861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Enhancеd Analysis Approach to Detect Phishing Attacks During COVID-19 Crisis 新型冠状病毒危机中网络钓鱼攻击检测的增强分析方法
IF 1.2
Cybernetics and Information Technologies Pub Date : 2022-03-01 DOI: 10.2478/cait-2022-0004
Mousa Tayseer Jafar, Mohammad Al-Fawa'reh, Malek Barhoush, Mohammad H. Alshira'H
{"title":"Enhancеd Analysis Approach to Detect Phishing Attacks During COVID-19 Crisis","authors":"Mousa Tayseer Jafar, Mohammad Al-Fawa'reh, Malek Barhoush, Mohammad H. Alshira'H","doi":"10.2478/cait-2022-0004","DOIUrl":"https://doi.org/10.2478/cait-2022-0004","url":null,"abstract":"Abstract Public health responses to the COVID-19 pandemic since March 2020 have led to lockdowns and social distancing in most countries around the world, with a shift from the traditional work environment to virtual one. Employees have been encouraged to work from home where possible to slow down the viral infection. The massive increase in the volume of professional activities executed online has posed a new context for cybercrime, with the increase in the number of emails and phishing websites. Phishing attacks have been broadened and extended through years of pandemics COVID-19. This paper presents a novel approach for detecting phishing Uniform Resource Locators (URLs) applying the Gated Recurrent Unit (GRU), a fast and highly accurate phishing classifier system. Comparative analysis of the GRU classification system indicates better accuracy (98.30%) than other classifier systems.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":"22 1","pages":"60 - 76"},"PeriodicalIF":1.2,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44403421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Blockchain-Enabled Supply-Chain in Crop Production Framework 作物生产框架中的区块链支持供应链
IF 1.2
Cybernetics and Information Technologies Pub Date : 2022-03-01 DOI: 10.2478/cait-2022-0010
I. Radeva, I. Popchev
{"title":"Blockchain-Enabled Supply-Chain in Crop Production Framework","authors":"I. Radeva, I. Popchev","doi":"10.2478/cait-2022-0010","DOIUrl":"https://doi.org/10.2478/cait-2022-0010","url":null,"abstract":"Abstract The purpose of this paper is to propose an approach to blockchain-enabled supply-chain model for a smart crop production framework. The defined tasks are: (1) analysis of blockchain ecosystem as a network of stakeholders and as an infrastructure of technical and logical elements; (2) definition of a supply-chain model; (3) design of blockchain reference infrastructure; (4) description of blockchain information channels with smart contracts basic functionalities. The results presented include: а supply-chain model facilitating seeds certification process, monitoring and supervision of the grain process, provenance and as optional interactions with regulatory bodies, logistics and financial services; the three level blockchain reference infrastructure and a blockchain-enabled supply-chain supporting five information channels with nine participants and smart contracts. An account management user application tool, the general descriptions of smart contract basic functionalities and a selected parts of one smart contract code are provided as examples.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":"22 1","pages":"151 - 170"},"PeriodicalIF":1.2,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47462515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
ESAR, An Expert Shoplifting Activity Recognition System ESAR,一个专业的商店行窃活动识别系统
IF 1.2
Cybernetics and Information Technologies Pub Date : 2022-03-01 DOI: 10.2478/cait-2022-0012
Mohd. Aquib Ansari, D. Singh
{"title":"ESAR, An Expert Shoplifting Activity Recognition System","authors":"Mohd. Aquib Ansari, D. Singh","doi":"10.2478/cait-2022-0012","DOIUrl":"https://doi.org/10.2478/cait-2022-0012","url":null,"abstract":"Abstract Shoplifting is a troubling and pervasive aspect of consumers, causing great losses to retailers. It is the theft of goods from the stores/shops, usually by hiding the store item either in the pocket or in carrier bag and leaving without any payment. Revenue loss is the most direct financial effect of shoplifting. Therefore, this article introduces an Expert Shoplifting Activity Recognition (ESAR) system to reduce shoplifting incidents in stores/shops. The system being proposed seamlessly examines each frame in video footage and alerts security personnel when shoplifting occurs. It uses dual-stream convolutional neural network to extract appearance and salient motion features in the video sequences. Here, optical flow and gradient components are used to extract salient motion features related to shoplifting movement in the video sequence. Long Short Term Memory (LSTM) based deep learner is modeled to learn the extracted features in the time domain for distinguishing person actions (i.e., normal and shoplifting). Analyzing the model behavior for diverse modeling environments is an added contribution of this paper. A synthesized shoplifting dataset is used here for experimentations. The experimental outcomes show that the proposed approach attains better consequences up to 90.26% detection accuracy compared to the other prevalent approaches.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":"22 1","pages":"190 - 200"},"PeriodicalIF":1.2,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47463371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Hy-MOM: Hybrid Recommender System Framework Using Memory-Based and Model-Based Collaborative Filtering Framework Hy-MOM:基于记忆和模型协同过滤的混合推荐系统框架
IF 1.2
Cybernetics and Information Technologies Pub Date : 2022-03-01 DOI: 10.2478/cait-2022-0009
G. George, Anisha M. Lal
{"title":"Hy-MOM: Hybrid Recommender System Framework Using Memory-Based and Model-Based Collaborative Filtering Framework","authors":"G. George, Anisha M. Lal","doi":"10.2478/cait-2022-0009","DOIUrl":"https://doi.org/10.2478/cait-2022-0009","url":null,"abstract":"Abstract Lack of personalization, rating sparsity, and cold start are commonly seen in e-Learning based recommender systems. The proposed work here suggests a personalized fused recommendation framework for e-Learning. The framework consists of a two-fold approach to generate recommendations. Firstly, it attempts to find the neighbourhood of similar learners based on certain learner characteristics by applying a user-based collaborative filtering approach. Secondly, it generates a matrix of ratings given by the learners. The outcome of the first stage is merged with the second stage to generate recommendations for the learner. Learner characteristics, namely knowledge level, learning style, and learner preference, have been considered to bring in the personalization factor on the recommendations. As the stochastic gradient approach predicts the learner-course rating matrix, it helps overcome the rating sparsity and cold-start issues. The fused model is compared with traditional stand-alone methods and shows performance improvement.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":"22 1","pages":"134 - 150"},"PeriodicalIF":1.2,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46459125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Deterministic Centroid Localization for Improving Energy Efficiency in Wireless Sensor Networks 提高无线传感器网络能量效率的确定质心定位
IF 1.2
Cybernetics and Information Technologies Pub Date : 2022-03-01 DOI: 10.2478/cait-2022-0002
Sneha Vijayan, Nagarajan Munusamy
{"title":"Deterministic Centroid Localization for Improving Energy Efficiency in Wireless Sensor Networks","authors":"Sneha Vijayan, Nagarajan Munusamy","doi":"10.2478/cait-2022-0002","DOIUrl":"https://doi.org/10.2478/cait-2022-0002","url":null,"abstract":"Abstract Wireless sensor networks are an enthralling field of study with numerous applications. A Wireless Sensor Network (WSN) is used to monitor real-time scenarios such as weather, temperature, humidity, and military surveillance. A WSN is composed of several sensor nodes that are responsible for sensing, aggregating, and transmitting data in the system, in which it has been deployed. These sensors are powered by small batteries because they are small. Managing power consumption and extending network life is a common challenge in WSNs. Data transmission is a critical process in a WSN that consumes the majority of the network’s resources. Since the cluster heads in the network are in charge of data transmission, they require more energy. We need to know where these CHs are deployed in order to calculate how much energy they use. The deployment of a WSN can be either static or random. Although most researchers focus on random deployment, this paper applies the proposed Deterministic Centroid algorithm for static deployment. Based on the coverage of the deployment area, this algorithm places the sensors in a predetermined location. The simulation results show how this algorithm generates balanced clusters, improves coverage, and saves energy.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":"22 1","pages":"24 - 39"},"PeriodicalIF":1.2,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46006469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Long Short Term Memory Neural Network-Based Model Construction and Fne-Tuning for Air Quality Parameters Prediction 基于长短期记忆神经网络的空气质量参数预测模型构建与Fne整定
IF 1.2
Cybernetics and Information Technologies Pub Date : 2022-03-01 DOI: 10.2478/cait-2022-0011
Virendra Barot, V. Kapadia
{"title":"Long Short Term Memory Neural Network-Based Model Construction and Fne-Tuning for Air Quality Parameters Prediction","authors":"Virendra Barot, V. Kapadia","doi":"10.2478/cait-2022-0011","DOIUrl":"https://doi.org/10.2478/cait-2022-0011","url":null,"abstract":"Abstract Air pollution has increased worries regarding health and ecosystems. Precise prediction of air quality parameters can assist in the effective action of air pollution control and prevention. In this work, a deep learning framework is proposed to predict parameters such as fine particulate matter and carbon monoxide. Long Short Term Memory (LSTM) neural network-based model that processes sequences in forward and backward direction to consider the influence of timesteps in both directions is employed. For further learning, unidirectional layers’ stacking is implemented. The performance of the model is optimized by fine-tuning hyperparameters, regularization techniques for overfitting resolution, and various merging options for the bidirectional input layer. The proposed model achieves good optimization and performs better than the simple LSTM and a Recurrent Neural Network (RNN) based model. Moreover, an attention-based mechanism is adopted to focus on more significant timesteps for prediction. The self-attention approach improves performance further and works well especially for longer sequences and extended time horizons. Experiments are conducted using real-world data collected, and results are evaluated using the mean square error loss function.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":"22 1","pages":"171 - 189"},"PeriodicalIF":1.2,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44543293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信