InformaticaPub Date : 2024-09-18DOI: 10.15388/24-infor568
Marta Kasprzak
{"title":"Beyond Quasi-Adjoint Graphs: On Polynomial-Time Solvable Cases of the Hamiltonian Cycle and Path Problems","authors":"Marta Kasprzak","doi":"10.15388/24-infor568","DOIUrl":"https://doi.org/10.15388/24-infor568","url":null,"abstract":"The Hamiltonian cycle and path problems are fundamental in graph theory and useful in modelling real-life problems. Research in this area is directed toward designing better and better algorithms for general problems, but also toward defining new special cases for which exact polynomial-time algorithms exist. In the paper, such new classes of digraphs are proposed. The classes include, among others, quasi-adjoint graphs, which are a superclass of adjoints, directed line graphs, and graphs modelling a DNA sequencing problem.\u0000PDF XML","PeriodicalId":56292,"journal":{"name":"Informatica","volume":"4 1","pages":""},"PeriodicalIF":2.9,"publicationDate":"2024-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142248890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InformaticaPub Date : 2024-08-19DOI: 10.15388/24-infor564
Aušrys Kilčiauskas, Antanas Bendoraitis, Eligijus Sakalauskas
{"title":"Confidential Transaction Balance Verification by the Net Using Non-Interactive Zero-Knowledge Proofs","authors":"Aušrys Kilčiauskas, Antanas Bendoraitis, Eligijus Sakalauskas","doi":"10.15388/24-infor564","DOIUrl":"https://doi.org/10.15388/24-infor564","url":null,"abstract":"One of the main trends for the monitoring and control of business processes is to implement these processes via private blockchain systems. These systems must ensure data privacy and verifiability for the entire network here denoted by ‘Net’. In addition, every business activity should be declared to a trusted third party (TTP), such as an Audit Authority (AA), for tax declaration and collection purposes.We present a solution for a confidential and verifiable realization of transactions based on the Unspent Transaction Output (UTxO) paradigm. This means that the total sum of transaction inputs (incomes) <span><span>$In$</span></span> must be equal to the total sum of transaction outputs (expenses) <span><span>$Ex$</span></span>, satisfying the balance equation <span><span>$In=Ex$</span></span>. Privacy in a private blockchain must be achieved through the encryption of actual transaction values. However, it is crucial that all participants in the network be able to verify the validity of the transaction balance equation. This poses a challenge with probabilistically encrypted data. Moreover, the inputs and outputs are encrypted with different public keys. With the introduction of the AA, the number of different public keys for encryption can be reduced to two. Incomes are encrypted with the Receiver’s public key and expenses with the AA’s public key.The novelty of our realization lies in taking additively-multiplicative, homomorphic ElGamal encryption and integrating it with a proposed paradigm of modified Schnorr identification providing a non-interactive zero-knowledge proof (NIZKP) using a cryptographically secure h-function. Introducing the AA as a structural element in a blockchain system based on the UTxO enables effective verification of encrypted transaction data for the Net. This is possible because the proposed NIZKP is able to prove the equivalency of two ciphertexts encrypted with two different public keys and different actors.This integration allows all users on the Net to check the UTxO-based transaction balance equation on encrypted data. The security considerations of the proposed solution are presented.\u0000PDF XML","PeriodicalId":56292,"journal":{"name":"Informatica","volume":"61 1","pages":""},"PeriodicalIF":2.9,"publicationDate":"2024-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142205375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InformaticaPub Date : 2024-07-24DOI: 10.15388/24-infor567
Victor Prokhorenko, Muhammad Ali Babar
{"title":"Offloaded Data Processing Energy Efficiency Evaluation","authors":"Victor Prokhorenko, Muhammad Ali Babar","doi":"10.15388/24-infor567","DOIUrl":"https://doi.org/10.15388/24-infor567","url":null,"abstract":"The growing popularity of mobile and cloud computing raises new challenges related to energy efficiency. This work evaluates four various SQL and NoSQL database solutions in terms of energy efficiency. Namely, Cassandra, MongoDB, Redis, and MySQL are taken into consideration. This study measures energy efficiency of the chosen data storage solutions on a selected set of physical and virtual computing nodes by leveraging Intel RAPL (Running Average Power Limit) technology. Various database usage scenarios are considered in this evaluation including both local usage and remote offloading. Different workloads are benchmarked through the use of YCSB (Yahoo! Cloud Serving Benchmark) tool. Extensive experimental results show that (i) Redis and MongoDB are more efficient in energy consumption under most usage scenarios, (ii) remote offloading saves energy if the network latency is low and destination CPU is significantly more powerful, and (iii) computationally weaker CPUs may sometimes demonstrate higher energy efficiency in terms of J/ops. An energy efficiency measurement framework is proposed in order to evaluate and compare different database solutions based on the obtained experimental results.\u0000PDF XML","PeriodicalId":56292,"journal":{"name":"Informatica","volume":"67 1","pages":""},"PeriodicalIF":2.9,"publicationDate":"2024-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141770626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Improved Algorithm for Extracting Frequent Gradual Patterns","authors":"Edith Belise Kenmogne, Idriss Tetakouchom, Clémentin Tayou Djamegni, Roger Nkambou, Laurent Cabrel Tabueu Fotso","doi":"10.15388/24-infor566","DOIUrl":"https://doi.org/10.15388/24-infor566","url":null,"abstract":"Frequent gradual pattern extraction is an important problem in computer science widely studied by the data mining community. Such a pattern reflects a co-variation between attributes of a database. The applications of the extraction of the gradual patterns concern several fields, in particular, biology, finances, health and metrology. The algorithms for extracting these patterns are greedy in terms of memory and computational resources. This clearly poses the problem of improving their performance. This paper proposes a new approach for the extraction of gradual and frequent patterns based on the reduction of candidate generation and processing costs by exploiting frequent itemsets whose size is a power of two to generate all candidates. The analysis of the complexity, in terms of CPU time and memory usage, and the experiments show that the obtained algorithm outperforms the previous ones and confirms the interest of the proposed approach. It is sometimes at least 5 times faster than previous algorithms and requires at most half the memory.\u0000PDF XML","PeriodicalId":56292,"journal":{"name":"Informatica","volume":"30 1","pages":""},"PeriodicalIF":2.9,"publicationDate":"2024-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141770625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Demystifying the Stability and the Performance Aspects of CoCoSo Ranking Method under Uncertain Preferences","authors":"Sundararajan Dhruva, Raghunathan Krishankumar, Dragan Pamucar, Edmundas Kazimieras Zavadskas, Kattur Soundarapandian Ravichandran","doi":"10.15388/24-infor565","DOIUrl":"https://doi.org/10.15388/24-infor565","url":null,"abstract":"This paper attempts to demystify the stability of CoCoSo ranking method via a comprehensive simulation experiment. In the experiment, matrices of different dimensions are generated via Python with fuzzy data. Stability is investigated via adequacy and partial adequacy tests. The test passes if the ranking order does not change even after changes are made to entities, and the partial pass signifies that the top ranked alternative remains intact. Results infer that CoCoSo method has better stability with respect to change of alternatives compared to criteria; and CoCoSo method shows better stability with respect to partial adequacy test for criteria.\u0000PDF XML","PeriodicalId":56292,"journal":{"name":"Informatica","volume":"15 1","pages":""},"PeriodicalIF":2.9,"publicationDate":"2024-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141770719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InformaticaPub Date : 2024-07-16DOI: 10.15388/24-infor563
Rafał Brociek, Mateusz Goik, Jakub Miarka, Mariusz Pleszczyński, Christian Napoli
{"title":"Solution of Inverse Problem for Diffusion Equation with Fractional Derivatives Using Metaheuristic Optimization Algorithm","authors":"Rafał Brociek, Mateusz Goik, Jakub Miarka, Mariusz Pleszczyński, Christian Napoli","doi":"10.15388/24-infor563","DOIUrl":"https://doi.org/10.15388/24-infor563","url":null,"abstract":"The article focuses on the presentation and comparison of selected heuristic algorithms for solving the inverse problem for the anomalous diffusion model. Considered mathematical model consists of time-space fractional diffusion equation with initial boundary conditions. Those kind of models are used in modelling the phenomena of heat flow in porous materials. In the model, Caputo’s and Riemann-Liouville’s fractional derivatives were used. The inverse problem was based on identifying orders of the derivatives and recreating fractional boundary condition. Taking into consideration the fact that inverse problems of this kind are ill-conditioned, the problem should be considered as hard to solve. Therefore,to solve it, metaheuristic optimization algorithms popular in scientific literature were used and their performance were compared: Group Teaching Optimization Algorithm (GTOA), Equilibrium Optimizer (EO), Grey Wolf Optimizer (GWO), War Strategy Optimizer (WSO), Tuna Swarm Optimization (TSO), Ant Colony Optimization (ACO), Jellyfish Search (JS) and Artificial Bee Colony (ABC). This paper presents computational examples showing effectiveness of considered metaheuristic optimization algorithms in solving inverse problem for anomalous diffusion model.\u0000PDF XML","PeriodicalId":56292,"journal":{"name":"Informatica","volume":"8 1","pages":""},"PeriodicalIF":2.9,"publicationDate":"2024-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141717762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InformaticaPub Date : 2024-07-09DOI: 10.15388/24-infor561
Tea Šestanović, Tea Kalinić Milićević
{"title":"Identification of the Optimal Neural Network Architecture for Prediction of Bitcoin Return","authors":"Tea Šestanović, Tea Kalinić Milićević","doi":"10.15388/24-infor561","DOIUrl":"https://doi.org/10.15388/24-infor561","url":null,"abstract":"Neural networks (NNs) are well established and widely used in time series forecasting due to their frequent dominance over other linear and nonlinear models. Thus, this paper does not question their appropriateness in forecasting cryptocurrency prices; rather, it compares the most commonly used NNs, i.e. feedforward neural networks (FFNNs), long short-term memory (LSTM) and convolutional neural networks (CNNs). This paper contributes to the existing literature by defining the appropriate NN structure comparable across different NN architectures, which yields the optimal NN model for Bitcoin return forecasting. Moreover, by incorporating turbulent events such as COVID and war, this paper emerges as a stress test for NNs. Finally, inputs are carefully selected, mostly covering macroeconomic and market variables, as well as different attractiveness measures, the importance of which in cryptocurrency forecasting is tested. The main results indicate that all NNs perform the best in an environment of bullish market, where CNNs stand out as the optimal models for continuous dataset, and LSTMs emerge as optimal in direction forecasting. In the downturn periods, CNNs stand out as the best models. Additionally, Tweets, as an attractiveness measure, enabled the models to attain superior performance.\u0000PDF XML","PeriodicalId":56292,"journal":{"name":"Informatica","volume":"32 1","pages":""},"PeriodicalIF":2.9,"publicationDate":"2024-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141572879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InformaticaPub Date : 2024-06-17DOI: 10.15388/24-infor562
Francisco de Arriba-Pérez, Silvia García-Méndez, Fátima Leal, Benedita Malheiro, Juan C. Burguillo
{"title":"Online Detection and Infographic Explanation of Spam Reviews with Data Drift Adaptation","authors":"Francisco de Arriba-Pérez, Silvia García-Méndez, Fátima Leal, Benedita Malheiro, Juan C. Burguillo","doi":"10.15388/24-infor562","DOIUrl":"https://doi.org/10.15388/24-infor562","url":null,"abstract":"Spam reviews are a pervasive problem on online platforms due to its significant impact on reputation. However, research into spam detection in data streams is scarce. Another concern lies in their need for transparency. Consequently, this paper addresses those problems by proposing an online solution for identifying and explaining spam reviews, incorporating data drift adaptation. It integrates (<i>i</i>) incremental profiling, (<i>ii</i>) data drift detection & adaptation, and (<i>iii</i>) identification of spam reviews employing Machine Learning. The explainable mechanism displays a visual and textual prediction explanation in a dashboard. The best results obtained reached up to 87% spam <i>F</i>-measure.\u0000PDF XML","PeriodicalId":56292,"journal":{"name":"Informatica","volume":"23 1","pages":""},"PeriodicalIF":2.9,"publicationDate":"2024-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141511309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InformaticaPub Date : 2024-05-22DOI: 10.15388/24-infor559
Anett Erdmann, Morteza Yazdani, Jose Manuel Mas Iglesias, Cristina Marin Palacios
{"title":"Pricing Powered by Artificial Intelligence: An Assessment Model for the Sustainable Implementation of AI Supported Price Functions","authors":"Anett Erdmann, Morteza Yazdani, Jose Manuel Mas Iglesias, Cristina Marin Palacios","doi":"10.15388/24-infor559","DOIUrl":"https://doi.org/10.15388/24-infor559","url":null,"abstract":"Artificial Intelligence (AI) in the price management process is being applied in business practice and research to a variety of pricing use cases that can be augmented or automated, providing opportunities as a forecasting tool or for price optimization. However, the complexity of evaluating the technology to prioritize implementation is challenging, especially for small and medium enterprises (SMEs), and guidance is sparse. Which are the relevant stakeholder criteria for a sustainable implementation of AI for pricing purpose? Which type of AI supported price functions meet these criteria best? Theoretically motivated by the hedonic price theory and advances in AI research, we identify nine criteria and eight AI supported price functions (AISPF). A multiple attribute decision model (MADM) using the fuzzy Best Worst Method (BWM) and fuzzy combined compromise solution (CoCoSo) is set up and evaluated by pricing experts from Germany and Spain. To validate our results and model stability, we carried out several random sensitivity analyses based on the weight of criteria exchange. The results suggest accuracy and reliability as the most prominent attribute to evaluate AISPF, while ethical and sustainable criteria are sorted as least important. The AISPF which best meet the criteria are financial prices followed by procurement prices.\u0000PDF XML","PeriodicalId":56292,"journal":{"name":"Informatica","volume":"52 1","pages":""},"PeriodicalIF":2.9,"publicationDate":"2024-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141151491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ontology and Fuzzy Theory Application in Information Systems: A Bibliometric Analysis","authors":"Diana Kalibatienė, Jolanta Miliauskaitė, Asta Slotkienė","doi":"10.15388/24-infor557","DOIUrl":"https://doi.org/10.15388/24-infor557","url":null,"abstract":"Ontologies are used to semantically enrich different types of information systems (IS), ensure a reasoning on their content and integrate heterogeneous IS at the semantical level. On the other hand, fuzzy theory is employed in IS for handling the uncertainty and fuzziness of their attributes, resulting in a fully fuzzy IS. As such, ontology- and fuzzy-based IS (<i>i.e.</i> ontology and fuzzy IS) are being developed. So, in this paper, we present a bibliometric analysis of the ontology and fuzzy IS concept to grasp its main ideas, and to increase its body of knowledge by providing a concept map for ontology and fuzzy IS. The main results obtained show that by adding ontologies and fuzzy theory to traditional ISs, they evolve into intelligent ISs capable of managing fuzzy and semantically rich (ontological) information and ensuring knowledge recognition in various fields of application. This bibliometric analysis would enable practitioners and researchers gain a comprehensive understanding of the ontology and fuzzy IS concept that they can eventually adopt for development of intelligent IS in their work.\u0000PDF XML","PeriodicalId":56292,"journal":{"name":"Informatica","volume":"59 1","pages":""},"PeriodicalIF":2.9,"publicationDate":"2024-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141061952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}