Zeszyty czasopisma

Tom 22 (2022): Zeszyt 3 (September 2022)

Tom 22 (2022): Zeszyt 2 (June 2022)

Tom 22 (2022): Zeszyt 1 (March 2022)

Tom 21 (2021): Zeszyt 4 (December 2021)

Tom 21 (2021): Zeszyt 3 (September 2021)

Tom 21 (2021): Zeszyt 2 (June 2021)

Tom 21 (2021): Zeszyt 1 (March 2021)

Tom 20 (2020): Zeszyt 6 (December 2020)
Special Zeszyt on New Developments in Scalable Computing

Tom 20 (2020): Zeszyt 5 (December 2020)
Special issue on Innovations in Intelligent Systems and Applications

Tom 20 (2020): Zeszyt 4 (November 2020)

Tom 20 (2020): Zeszyt 3 (September 2020)

Tom 20 (2020): Zeszyt 2 (June 2020)

Tom 20 (2020): Zeszyt 1 (March 2020)

Tom 19 (2019): Zeszyt 4 (November 2019)

Tom 19 (2019): Zeszyt 3 (September 2019)

Tom 19 (2019): Zeszyt 2 (June 2019)

Tom 19 (2019): Zeszyt 1 (March 2019)

Tom 18 (2018): Zeszyt 5 (May 2018)
Special Thematic Zeszyt on Optimal Codes and Related Topics

Tom 18 (2018): Zeszyt 4 (November 2018)

Tom 18 (2018): Zeszyt 3 (September 2018)

Tom 18 (2018): Zeszyt 2 (June 2018)

Tom 18 (2018): Zeszyt 1 (March 2018)

Tom 17 (2017): Zeszyt 5 (December 2017)
Special Zeszyt With Selected Papers From The Workshop “Two Years Avitohol: Advanced High Performance Computing Applications 2017

Tom 17 (2017): Zeszyt 4 (November 2017)

Tom 17 (2017): Zeszyt 3 (September 2017)

Tom 17 (2017): Zeszyt 2 (June 2017)

Tom 17 (2017): Zeszyt 1 (March 2017)

Tom 16 (2016): Zeszyt 6 (December 2016)
Special issue with selection of extended papers from 6th International Conference on Logistic, Informatics and Service Science LISS’2016

Tom 16 (2016): Zeszyt 5 (October 2016)
Zeszyt Title: Special Zeszyt on Application of Advanced Computing and Simulation in Information Systems

Tom 16 (2016): Zeszyt 4 (December 2016)

Tom 16 (2016): Zeszyt 3 (September 2016)

Tom 16 (2016): Zeszyt 2 (June 2016)

Tom 16 (2016): Zeszyt 1 (March 2016)

Tom 15 (2015): Zeszyt 7 (December 2015)
Special Zeszyt on Information Fusion

Tom 15 (2015): Zeszyt 6 (December 2015)
Special Zeszyt on Logistics, Informatics and Service Science

Tom 15 (2015): Zeszyt 5 (April 2015)
Special Zeszyt on Control in Transportation Systems

Tom 15 (2015): Zeszyt 4 (November 2015)

Tom 15 (2015): Zeszyt 3 (September 2015)

Tom 15 (2015): Zeszyt 2 (June 2015)

Tom 15 (2015): Zeszyt 1 (March 2015)

Tom 14 (2014): Zeszyt 5 (December 2014)
Special Zeszyt

Tom 14 (2014): Zeszyt 4 (December 2014)

Tom 14 (2014): Zeszyt 3 (September 2014)

Tom 14 (2014): Zeszyt 2 (June 2014)

Tom 14 (2014): Zeszyt 1 (March 2014)

Tom 13 (2013): Zeszyt Special-Zeszyt (December 2013)

Tom 13 (2013): Zeszyt 4 (December 2013)
The publishing of the present issue (Tom 13, No 4, 2013) of the journal “Cybernetics and Information Technologies” is financially supported by FP7 project “Advanced Computing for Innovation” (ACOMIN), grant agreement 316087 of Call FP7 REGPOT-2012-2013-1.

Tom 13 (2013): Zeszyt 3 (September 2013)

Tom 13 (2013): Zeszyt 2 (June 2013)

Tom 13 (2013): Zeszyt 1 (March 2013)

Tom 12 (2012): Zeszyt 4 (December 2012)

Tom 12 (2012): Zeszyt 3 (September 2012)

Tom 12 (2012): Zeszyt 2 (June 2012)

Tom 12 (2012): Zeszyt 1 (March 2012)

Informacje o czasopiśmie
Format
Czasopismo
eISSN
1314-4081
Pierwsze wydanie
13 Mar 2012
Częstotliwość wydawania
4 razy w roku
Języki
Angielski

Wyszukiwanie

Tom 21 (2021): Zeszyt 3 (September 2021)

Informacje o czasopiśmie
Format
Czasopismo
eISSN
1314-4081
Pierwsze wydanie
13 Mar 2012
Częstotliwość wydawania
4 razy w roku
Języki
Angielski

Wyszukiwanie

12 Artykułów
Otwarty dostęp

Text Analytics in Bulgarian: An Overview and Future Directions

Data publikacji: 07 Dec 2021
Zakres stron: 3 - 23

Abstrakt

Abstract

Text analytics is becoming an integral part of modern business and economic research and analysis. However, the extent to which its application is possible and accessible varies for different languages. The main goal of this paper is to outline fundamental research on text analytics applied on data in Bulgarian. A review of key research articles in two main directions is provided – development of language resources for Bulgarian and experimenting with Bulgarian text data in practical applications. By summarizing the results of a large literature review, we draw conclusions about the degree of development of the field, the availability of language resources for the Bulgarian language and the extent to which text analytics has been applied in practical problems. Future directions for research are outlined. To the best of the author’s knowledge, this is the first study providing a comprehensive overview of progress in the field of text analytics in Bulgarian.

Słowa kluczowe

  • text analytics
  • natural language processing
  • Bulgarian text data
  • practical applications of text analytics
  • language resources development
Otwarty dostęp

A Survey on Proxy Re-Signature Schemes for Translating One Type of Signature to Another

Data publikacji: 07 Dec 2021
Zakres stron: 24 - 49

Abstrakt

Abstract

Proxy Re-Signature (PRS) complements well-established digital signature service. Blaze-Bleumer-Strauss discussed PRS in 1998 for translating a signature on a message from Alice into a signature from Bob on the same message at semi-trusted proxy which does not learn any signing-key and cannot produce new valid signature on new message for Alice or Bob. PRS has been largely ignored since then but it has spurred considerable research interest recently for sharing web-certificates, forming weak-group signatures, and authenticating network path. This article provides a survey summarizing and organizing PRS-related research by developing eight-dimensional taxonomy reflecting the directional feature, re-transformation capability, re-signature key location, delegatee involvement, proxy re-signing rights, duration-based revocation rights, security model environment, and cryptographic approach. Even though multi-dimensional categorization is proposed here, we categorize the substantial published research work based on the eighth dimension. We give a clear perspective on this research from last two-decades since the first PRS-protocol was proposed.

Słowa kluczowe

  • Signature translation
  • Proxy Re-Signature
  • PKI-based re-signature
  • Identity-based re-signature
  • Certificateless re-signature
  • Semi-trusted Proxy
Otwarty dostęp

A Review on Privacy Requirements and Application Layer Security in Internet of Things (IoT)

Data publikacji: 07 Dec 2021
Zakres stron: 50 - 72

Abstrakt

Abstract

Internet of Things (IoT) is the predominant emerging technology that targets on facilitating interconnection of internet-enabled resources. IoT applications concentrate on automating different tasks that facilitate physical objects to act autonomously without any human interventions. The emerging and current IoT applications are determined to be highly significant for improving the degree of efficiency, comfort and automation for its users. Any kind of security breach on the system will directly influences the life of the humans In this paper, a comprehensive review on Privacy requirements and application layer Security in Internet of Things (IoT) is presented for exploring the possible security issues in IoT that could be launched over the individual layers of IoT architecture. This review explores different challenges of classical security solutions that are related to authentication, key management and cryptographic solutions.It also presents the details of existing access control and device authentication schemes with their pros and cons.

Słowa kluczowe

  • Internet of Things (IoT)
  • Security threats
  • Access control
  • Smart authentication
  • IoT applications
  • Cyber-attacks
Otwarty dostęp

Risk Averseness and Emotional Stability in e-Commerce

Data publikacji: 07 Dec 2021
Zakres stron: 73 - 84

Abstrakt

Abstract

The study aims to examine the issue of the relationship between Emotional stability, one of the fundamental personality determinants, and users’ Risk Averseness, on the one hand, and user behavior in the field of e-Commerce, on the other hand. In the beginning, a brief overview of today’s primary benchmark for the measurement of human personality – the Big Five Model is proposed. A study with 226 participants has been conducted for the aim of the research, based on the TIPI test. The TIPI test is a validated and abridged version of the Five-Factor model. The result of the conducted survey confirms the existence of significant relationships between personality determinant Emotional stability and consumer’s Risk awareness, on one side, and some of the observed main functionalities of the online stores, on the other side. Two regression models of the field of Machine Learning (Linear Regression and Random Forest) have been implemented to make a reliable forecast about the user’s preferences in the process of online shopping. The conclusions made rely on the obtained results and analysis.

Słowa kluczowe

  • Personality
  • emotional stability
  • risk averseness
  • TIPI
  • machine learning
  • e-Commerce
  • consumer behavior
Otwarty dostęp

Hybrid Role and Attribute Based Access Control Applied in Information Systems

Data publikacji: 07 Dec 2021
Zakres stron: 85 - 96

Abstrakt

Abstract

It this paper it is proposed a new access control model – Hybrid Role and Attribute Based Access Control (HRABAC). It is an extension of Role-Based Access Control (RBAC). HRABAC is designed for information systems and enterprise software and combines the advantages of RBAC and Attribute-Based Access Control (ABAC). HRABAC is easy configurable, fine-grained and supports role hierarchies. The proposed model HRABAC describes the access control scheme in Laravel package laravelroles/rolespermissions, which is developed by the author of the paper, as an answer to the requirements of practice of fine-grained and easy configurable access control solution. Laravel is chosen, because it is the most popular and the most widely used PHP framework. The package laravelroles/rolespermissions is developed on Laravel so that maximum number of programmers could use it. This package contains working and tested functionalities for managing users, roles and permissions, and it is applied in accounting information system.

Słowa kluczowe

  • Access control
  • authorization
  • access decision
  • HRABAC
  • hybrid role and attribute access control
Otwarty dostęp

A Hybrid Method for Payload Enhancement in Image Steganography Based on Edge Area Detection

Data publikacji: 07 Dec 2021
Zakres stron: 97 - 107

Abstrakt

Abstract

In this research a new method for increasing the embedding capacity in images based on the edge area is proposed. The new approach combines Canny and Prewitt edge detection techniques using OR binary operation. The secret message is concealed using the Least Significant Bit (LSB) method. Embedding capacity, PSNR, SSIM, and MSE values are used as evaluation metrics. Based on the resulted values, the proposed method showed higher embedding capacity while keeping the PSNR, SSIM, MSE values without major changes of other methods which means keeping the imperceptibility quality of the stego image.

Słowa kluczowe

  • Data hiding
  • image steganography
  • edge detection
  • edge dilation
  • embedding capacity
Otwarty dostęp

Bi-Level Optimization Model for Urban Traffic Control

Data publikacji: 07 Dec 2021
Zakres stron: 108 - 126

Abstrakt

Abstract

The urban traffic control optimization is a complex problem because of the interconnections among the junctions and the dynamical behavior of the traffic flows. Optimization with one control variable in the literature is presented. In this research optimization model consisting of two control variables is developed. Hierarchical bi-level methodology is proposed for realization of integrated optimal control. The urban traffic management is implemented by simultaneously control of traffic light cycles and green light durations of the traffic lights of urban network of crossroads.

Słowa kluczowe

  • Hierarchical modeling
  • optimization
  • bi-level modeling and optimization
  • urban traffic control
Otwarty dostęp

Simulation-Based Optimisation for Autonomous Transportation Systems Using a Parallel Real-Coded Genetic Algorithm with Scalable Nonuniform Mutation

Data publikacji: 07 Dec 2021
Zakres stron: 127 - 144

Abstrakt

Abstract

This work presents a novel approach to the simulation-based optimisation for Autonomous Transportation Systems (ATS) with the use of the proposed parallel genetic algorithm. The system being developed uses GPUs for the implementation of a massive agent-based model of Autonomous Vehicle (AV) behaviour in an Artificial Multi-Connected Road Network (AMСRN) consisting of the “Manhattan Grid” and the “Circular Motion Area” that are crossed. A new parallel Real-Coded Genetic Algorithm with a Scalable Nonuniform Mutation (RCGA-SNUM) is developed. The proposed algorithm (RCGA-SNUM) has been examined with the use of known test instances and compared with parallel RCGAs used with other mutation operators (e.g., standard mutation, Power Mutation (PM), mutation with Dynamic Rates (DMR), Scalable Uniform Mutation (SUM), etc.). As a result, RCGA-SNUM demonstrates superiority in solving large-scale optimisation problems when decision variables have wide feasible ranges and multiple local extrema are observed. Following this, RCGA-SNUM is applied to minimising the number of potential traffic accidents in the AMСRN.

Słowa kluczowe

  • Simulation-based optimisation
  • autonomous transportation systems
  • real-coded genetic algorithms
  • multi-agent systems
  • scalable nonuniform mutation
Otwarty dostęp

VM Consolidation Plan for Improving the Energy Efficiency of Cloud

Data publikacji: 07 Dec 2021
Zakres stron: 145 - 159

Abstrakt

Abstract

Achieving energy-efficiency with minimal Service Level Agreement (SLA) violation constraint is a major challenge in cloud datacenters owing to financial and environmental concerns. The static consolidation of Virtual Machines (VMs) is not much significant in recent time and has become outdated because of the unpredicted workload of cloud users. In this paper, a dynamic consolidation plan is proposed to optimize the energy consumption of the cloud datacenter. The proposed plan encompasses algorithms for VM selection and VM placement. The VM selection algorithm estimates power consumption of each VM to select the required VMs for migration from the overloaded Physical Machine (PM). The proposed VM allocation algorithm estimates the net increase in Imbalance Utilization Value (IUV) and power consumption of a PM, in advance before allocating the VM. The analysis of simulation results suggests that the proposed dynamic consolidation plan outperforms other state of arts.

Słowa kluczowe

  • VM consolidation
  • VM selection
  • VM allocation
  • resource allocation
  • power consumption
  • energy efficiency
Otwarty dostęp

Identification of the Thermoelectric Cooler Using Hybrid Multi-Verse Optimizer and Sine Cosine Algorithm Based Continuous-Time Hammerstein Model

Data publikacji: 07 Dec 2021
Zakres stron: 160 - 174

Abstrakt

Abstract

This paper presents the identification of the ThermoElectric Cooler (TEC) plant using a hybrid method of Multi-Verse Optimizer with Sine Cosine Algorithm (hMVOSCA) based on continuous-time Hammerstein model. These modifications are mainly for escaping from local minima and for making the balance between exploration and exploitation. In the Hammerstein model identification a continuous-time linear system is used and the hMVOSCA based method is used to tune the coefficients of both the Hammerstein model subsystems (linear and nonlinear) such that the error between the estimated output and the actual output is reduced. The efficiency of the proposed method is evaluated based on the convergence curve, parameter estimation error, bode plot, function plot, and Wilcoxon’s rank test. The experimental findings show that the hMVOSCA can produce a Hammerstein system that generates an estimated output like the actual TEC output. Moreover, the identified outputs also show that the hMVOSCA outperforms other popular metaheuristic algorithms.

Słowa kluczowe

  • Thermoelectric cooler
  • Hammerstein system
  • Metaheuristics Algorithm
  • multi-verse optimizer
  • Sine Cosine Algorithm
  • optimization
Otwarty dostęp

Anomaly Detection Using XGBoost Ensemble of Deep Neural Network Models

Data publikacji: 07 Dec 2021
Zakres stron: 175 - 188

Abstrakt

Abstract

Intrusion Detection Systems (IDSs) utilise deep learning techniques to identify intrusions with maximum accuracy and reduce false alarm rates. The feature extraction is also automated in these techniques. In this paper, an ensemble of different Deep Neural Network (DNN) models like MultiLayer Perceptron (MLP), BackPropagation Network (BPN) and Long Short Term Memory (LSTM) are stacked to build a robust anomaly detection model. The performance of the ensemble model is analysed on different datasets, namely UNSW-NB15 and a campus generated dataset named VIT_SPARC20. Other types of traffic, namely unencrypted normal traffic, normal encrypted traffic, encrypted and unencrypted malicious traffic, are captured in the VIT_SPARC20 dataset. Encrypted normal and malicious traffic of VIT_SPARC20 is categorised by the deep learning models without decrypting its contents, thus preserving the confidentiality and integrity of the data transmitted. XGBoost integrates the results of each deep learning model to achieve higher accuracy. From experimental analysis, it is inferred that UNSW_ NB results in a maximal accuracy of 99.5%. The performance of VIT_SPARC20 in terms of accuracy, precision and recall are 99.4%. 98% and 97%, respectively.

Słowa kluczowe

  • Accuracy
  • Backpropagation network
  • Intrusion detection
  • Multilayer perceptron
  • Long short term memory
Otwarty dostęp

Erratum to the paper “An IRGA-MACS Based Cluster-Head Selection Protocol for Wireless Sensor Networks” (Published in Vol. 21, 2021, No 2, pp. 166-182, DOI: 10.2478/cait-2021-0025)

Data publikacji: 07 Dec 2021
Zakres stron: 189 - 189

Abstrakt

12 Artykułów
Otwarty dostęp

Text Analytics in Bulgarian: An Overview and Future Directions

Data publikacji: 07 Dec 2021
Zakres stron: 3 - 23

Abstrakt

Abstract

Text analytics is becoming an integral part of modern business and economic research and analysis. However, the extent to which its application is possible and accessible varies for different languages. The main goal of this paper is to outline fundamental research on text analytics applied on data in Bulgarian. A review of key research articles in two main directions is provided – development of language resources for Bulgarian and experimenting with Bulgarian text data in practical applications. By summarizing the results of a large literature review, we draw conclusions about the degree of development of the field, the availability of language resources for the Bulgarian language and the extent to which text analytics has been applied in practical problems. Future directions for research are outlined. To the best of the author’s knowledge, this is the first study providing a comprehensive overview of progress in the field of text analytics in Bulgarian.

Słowa kluczowe

  • text analytics
  • natural language processing
  • Bulgarian text data
  • practical applications of text analytics
  • language resources development
Otwarty dostęp

A Survey on Proxy Re-Signature Schemes for Translating One Type of Signature to Another

Data publikacji: 07 Dec 2021
Zakres stron: 24 - 49

Abstrakt

Abstract

Proxy Re-Signature (PRS) complements well-established digital signature service. Blaze-Bleumer-Strauss discussed PRS in 1998 for translating a signature on a message from Alice into a signature from Bob on the same message at semi-trusted proxy which does not learn any signing-key and cannot produce new valid signature on new message for Alice or Bob. PRS has been largely ignored since then but it has spurred considerable research interest recently for sharing web-certificates, forming weak-group signatures, and authenticating network path. This article provides a survey summarizing and organizing PRS-related research by developing eight-dimensional taxonomy reflecting the directional feature, re-transformation capability, re-signature key location, delegatee involvement, proxy re-signing rights, duration-based revocation rights, security model environment, and cryptographic approach. Even though multi-dimensional categorization is proposed here, we categorize the substantial published research work based on the eighth dimension. We give a clear perspective on this research from last two-decades since the first PRS-protocol was proposed.

Słowa kluczowe

  • Signature translation
  • Proxy Re-Signature
  • PKI-based re-signature
  • Identity-based re-signature
  • Certificateless re-signature
  • Semi-trusted Proxy
Otwarty dostęp

A Review on Privacy Requirements and Application Layer Security in Internet of Things (IoT)

Data publikacji: 07 Dec 2021
Zakres stron: 50 - 72

Abstrakt

Abstract

Internet of Things (IoT) is the predominant emerging technology that targets on facilitating interconnection of internet-enabled resources. IoT applications concentrate on automating different tasks that facilitate physical objects to act autonomously without any human interventions. The emerging and current IoT applications are determined to be highly significant for improving the degree of efficiency, comfort and automation for its users. Any kind of security breach on the system will directly influences the life of the humans In this paper, a comprehensive review on Privacy requirements and application layer Security in Internet of Things (IoT) is presented for exploring the possible security issues in IoT that could be launched over the individual layers of IoT architecture. This review explores different challenges of classical security solutions that are related to authentication, key management and cryptographic solutions.It also presents the details of existing access control and device authentication schemes with their pros and cons.

Słowa kluczowe

  • Internet of Things (IoT)
  • Security threats
  • Access control
  • Smart authentication
  • IoT applications
  • Cyber-attacks
Otwarty dostęp

Risk Averseness and Emotional Stability in e-Commerce

Data publikacji: 07 Dec 2021
Zakres stron: 73 - 84

Abstrakt

Abstract

The study aims to examine the issue of the relationship between Emotional stability, one of the fundamental personality determinants, and users’ Risk Averseness, on the one hand, and user behavior in the field of e-Commerce, on the other hand. In the beginning, a brief overview of today’s primary benchmark for the measurement of human personality – the Big Five Model is proposed. A study with 226 participants has been conducted for the aim of the research, based on the TIPI test. The TIPI test is a validated and abridged version of the Five-Factor model. The result of the conducted survey confirms the existence of significant relationships between personality determinant Emotional stability and consumer’s Risk awareness, on one side, and some of the observed main functionalities of the online stores, on the other side. Two regression models of the field of Machine Learning (Linear Regression and Random Forest) have been implemented to make a reliable forecast about the user’s preferences in the process of online shopping. The conclusions made rely on the obtained results and analysis.

Słowa kluczowe

  • Personality
  • emotional stability
  • risk averseness
  • TIPI
  • machine learning
  • e-Commerce
  • consumer behavior
Otwarty dostęp

Hybrid Role and Attribute Based Access Control Applied in Information Systems

Data publikacji: 07 Dec 2021
Zakres stron: 85 - 96

Abstrakt

Abstract

It this paper it is proposed a new access control model – Hybrid Role and Attribute Based Access Control (HRABAC). It is an extension of Role-Based Access Control (RBAC). HRABAC is designed for information systems and enterprise software and combines the advantages of RBAC and Attribute-Based Access Control (ABAC). HRABAC is easy configurable, fine-grained and supports role hierarchies. The proposed model HRABAC describes the access control scheme in Laravel package laravelroles/rolespermissions, which is developed by the author of the paper, as an answer to the requirements of practice of fine-grained and easy configurable access control solution. Laravel is chosen, because it is the most popular and the most widely used PHP framework. The package laravelroles/rolespermissions is developed on Laravel so that maximum number of programmers could use it. This package contains working and tested functionalities for managing users, roles and permissions, and it is applied in accounting information system.

Słowa kluczowe

  • Access control
  • authorization
  • access decision
  • HRABAC
  • hybrid role and attribute access control
Otwarty dostęp

A Hybrid Method for Payload Enhancement in Image Steganography Based on Edge Area Detection

Data publikacji: 07 Dec 2021
Zakres stron: 97 - 107

Abstrakt

Abstract

In this research a new method for increasing the embedding capacity in images based on the edge area is proposed. The new approach combines Canny and Prewitt edge detection techniques using OR binary operation. The secret message is concealed using the Least Significant Bit (LSB) method. Embedding capacity, PSNR, SSIM, and MSE values are used as evaluation metrics. Based on the resulted values, the proposed method showed higher embedding capacity while keeping the PSNR, SSIM, MSE values without major changes of other methods which means keeping the imperceptibility quality of the stego image.

Słowa kluczowe

  • Data hiding
  • image steganography
  • edge detection
  • edge dilation
  • embedding capacity
Otwarty dostęp

Bi-Level Optimization Model for Urban Traffic Control

Data publikacji: 07 Dec 2021
Zakres stron: 108 - 126

Abstrakt

Abstract

The urban traffic control optimization is a complex problem because of the interconnections among the junctions and the dynamical behavior of the traffic flows. Optimization with one control variable in the literature is presented. In this research optimization model consisting of two control variables is developed. Hierarchical bi-level methodology is proposed for realization of integrated optimal control. The urban traffic management is implemented by simultaneously control of traffic light cycles and green light durations of the traffic lights of urban network of crossroads.

Słowa kluczowe

  • Hierarchical modeling
  • optimization
  • bi-level modeling and optimization
  • urban traffic control
Otwarty dostęp

Simulation-Based Optimisation for Autonomous Transportation Systems Using a Parallel Real-Coded Genetic Algorithm with Scalable Nonuniform Mutation

Data publikacji: 07 Dec 2021
Zakres stron: 127 - 144

Abstrakt

Abstract

This work presents a novel approach to the simulation-based optimisation for Autonomous Transportation Systems (ATS) with the use of the proposed parallel genetic algorithm. The system being developed uses GPUs for the implementation of a massive agent-based model of Autonomous Vehicle (AV) behaviour in an Artificial Multi-Connected Road Network (AMСRN) consisting of the “Manhattan Grid” and the “Circular Motion Area” that are crossed. A new parallel Real-Coded Genetic Algorithm with a Scalable Nonuniform Mutation (RCGA-SNUM) is developed. The proposed algorithm (RCGA-SNUM) has been examined with the use of known test instances and compared with parallel RCGAs used with other mutation operators (e.g., standard mutation, Power Mutation (PM), mutation with Dynamic Rates (DMR), Scalable Uniform Mutation (SUM), etc.). As a result, RCGA-SNUM demonstrates superiority in solving large-scale optimisation problems when decision variables have wide feasible ranges and multiple local extrema are observed. Following this, RCGA-SNUM is applied to minimising the number of potential traffic accidents in the AMСRN.

Słowa kluczowe

  • Simulation-based optimisation
  • autonomous transportation systems
  • real-coded genetic algorithms
  • multi-agent systems
  • scalable nonuniform mutation
Otwarty dostęp

VM Consolidation Plan for Improving the Energy Efficiency of Cloud

Data publikacji: 07 Dec 2021
Zakres stron: 145 - 159

Abstrakt

Abstract

Achieving energy-efficiency with minimal Service Level Agreement (SLA) violation constraint is a major challenge in cloud datacenters owing to financial and environmental concerns. The static consolidation of Virtual Machines (VMs) is not much significant in recent time and has become outdated because of the unpredicted workload of cloud users. In this paper, a dynamic consolidation plan is proposed to optimize the energy consumption of the cloud datacenter. The proposed plan encompasses algorithms for VM selection and VM placement. The VM selection algorithm estimates power consumption of each VM to select the required VMs for migration from the overloaded Physical Machine (PM). The proposed VM allocation algorithm estimates the net increase in Imbalance Utilization Value (IUV) and power consumption of a PM, in advance before allocating the VM. The analysis of simulation results suggests that the proposed dynamic consolidation plan outperforms other state of arts.

Słowa kluczowe

  • VM consolidation
  • VM selection
  • VM allocation
  • resource allocation
  • power consumption
  • energy efficiency
Otwarty dostęp

Identification of the Thermoelectric Cooler Using Hybrid Multi-Verse Optimizer and Sine Cosine Algorithm Based Continuous-Time Hammerstein Model

Data publikacji: 07 Dec 2021
Zakres stron: 160 - 174

Abstrakt

Abstract

This paper presents the identification of the ThermoElectric Cooler (TEC) plant using a hybrid method of Multi-Verse Optimizer with Sine Cosine Algorithm (hMVOSCA) based on continuous-time Hammerstein model. These modifications are mainly for escaping from local minima and for making the balance between exploration and exploitation. In the Hammerstein model identification a continuous-time linear system is used and the hMVOSCA based method is used to tune the coefficients of both the Hammerstein model subsystems (linear and nonlinear) such that the error between the estimated output and the actual output is reduced. The efficiency of the proposed method is evaluated based on the convergence curve, parameter estimation error, bode plot, function plot, and Wilcoxon’s rank test. The experimental findings show that the hMVOSCA can produce a Hammerstein system that generates an estimated output like the actual TEC output. Moreover, the identified outputs also show that the hMVOSCA outperforms other popular metaheuristic algorithms.

Słowa kluczowe

  • Thermoelectric cooler
  • Hammerstein system
  • Metaheuristics Algorithm
  • multi-verse optimizer
  • Sine Cosine Algorithm
  • optimization
Otwarty dostęp

Anomaly Detection Using XGBoost Ensemble of Deep Neural Network Models

Data publikacji: 07 Dec 2021
Zakres stron: 175 - 188

Abstrakt

Abstract

Intrusion Detection Systems (IDSs) utilise deep learning techniques to identify intrusions with maximum accuracy and reduce false alarm rates. The feature extraction is also automated in these techniques. In this paper, an ensemble of different Deep Neural Network (DNN) models like MultiLayer Perceptron (MLP), BackPropagation Network (BPN) and Long Short Term Memory (LSTM) are stacked to build a robust anomaly detection model. The performance of the ensemble model is analysed on different datasets, namely UNSW-NB15 and a campus generated dataset named VIT_SPARC20. Other types of traffic, namely unencrypted normal traffic, normal encrypted traffic, encrypted and unencrypted malicious traffic, are captured in the VIT_SPARC20 dataset. Encrypted normal and malicious traffic of VIT_SPARC20 is categorised by the deep learning models without decrypting its contents, thus preserving the confidentiality and integrity of the data transmitted. XGBoost integrates the results of each deep learning model to achieve higher accuracy. From experimental analysis, it is inferred that UNSW_ NB results in a maximal accuracy of 99.5%. The performance of VIT_SPARC20 in terms of accuracy, precision and recall are 99.4%. 98% and 97%, respectively.

Słowa kluczowe

  • Accuracy
  • Backpropagation network
  • Intrusion detection
  • Multilayer perceptron
  • Long short term memory
Otwarty dostęp

Erratum to the paper “An IRGA-MACS Based Cluster-Head Selection Protocol for Wireless Sensor Networks” (Published in Vol. 21, 2021, No 2, pp. 166-182, DOI: 10.2478/cait-2021-0025)

Data publikacji: 07 Dec 2021
Zakres stron: 189 - 189

Abstrakt

Zaplanuj zdalną konferencję ze Sciendo