Search Results - "Cybernetics and information technologies : CIT"
-
1
Anomaly Detection Using XGBoost Ensemble of Deep Neural Network Models
Published in Cybernetics and information technologies : CIT (01-09-2021)“…Intrusion Detection Systems (IDSs) utilise deep learning techniques to identify intrusions with maximum accuracy and reduce false alarm rates. The feature…”
Get full text
Journal Article -
2
A Review of Feature Selection and Its Methods
Published in Cybernetics and information technologies : CIT (01-03-2019)“…Nowadays, being in digital era the data generated by various applications are increasing drastically both row-wise and column wise; this creates a bottleneck…”
Get full text
Journal Article -
3
QoS Enabled IoT Based Low Cost Air Quality Monitoring System with Power Consumption Optimization
Published in Cybernetics and information technologies : CIT (01-06-2020)“…Air pollution has emerged as a major concern of the current century. In recent times, fellow researchers have conducted numerous researches in the area of air…”
Get full text
Journal Article -
4
Energy-Efficient and Accelerated Resource Allocation in O-RAN Slicing Using Deep Reinforcement Learning and Transfer Learning
Published in Cybernetics and information technologies : CIT (01-09-2024)“…Next Generation Wireless Networks (NGWNs) have two main components: Network Slicing and Open Radio Access Networks (O-RAN). NS is needed to handle various…”
Get full text
Journal Article -
5
Deep Learning-Driven Workload Prediction and Optimization for Load Balancing in Cloud Computing Environment
Published in Cybernetics and information technologies : CIT (01-09-2024)“…Cloud computing revolutionizes as a technology that succeeds in serving large-scale user demands. Workload prediction and scheduling tend to be factors…”
Get full text
Journal Article -
6
A Systematic Review of Rapidly Exploring Random Tree RRT Algorithm for Single and Multiple Robots
Published in Cybernetics and information technologies : CIT (01-09-2024)“…Recent advances in path-planning algorithms have transformed robotics. The Rapidly exploring Random Tree (RRT) algorithm underpins autonomous robot navigation…”
Get full text
Journal Article -
7
Multi-Level Machine Learning Model to Improve the Effectiveness of Predicting Customers Churn Banks
Published in Cybernetics and information technologies : CIT (01-09-2024)“…This study presents a novel multi-level Stacking model designed to enhance the accuracy of customer churn prediction in the banking sector, a critical aspect…”
Get full text
Journal Article -
8
Sentiment Analysis of Product Reviews Using Transformer Enhanced 1D-CNN and BiLSTM
Published in Cybernetics and information technologies : CIT (01-09-2024)“…The rapid growth of Internet-enabled applications, such as social media platforms, e-commerce sites, and blogs, has led to a surge in user-generated content…”
Get full text
Journal Article -
9
Managing Cybersecurity: Digital Footprint Threats
Published in Cybernetics and information technologies : CIT (01-09-2024)“…Managing cybersecurity and protecting data assets remain top priorities for businesses. Despite this, numerous data breaches persist due to malicious human…”
Get full text
Journal Article -
10
Real-Time Hand Gesture Recognition: A Comprehensive Review of Techniques, Applications, and Challenges
Published in Cybernetics and information technologies : CIT (01-09-2024)“…Real-time Hand Gesture Recognition (HGR) has emerged as a vital technology in human-computer interaction, offering intuitive and natural ways for users to…”
Get full text
Journal Article -
11
Advanced PSO Algorithms Development with Combined lbest and gbest Neighborhood Topologies
Published in Cybernetics and information technologies : CIT (01-09-2024)“…This paper introduces an innovative approach integrating global best (gbest) and local best (lbest) PSO communication topologies. The algorithm initiates with…”
Get full text
Journal Article -
12
Exploring the Efficacy of GenAI in Grading SQL Query Tasks: A Case Study
Published in Cybernetics and information technologies : CIT (01-09-2024)“…Numerous techniques, including problem-solving, seeking clarification, and creating questions, have been employed to utilize generative Artificial Intelligence…”
Get full text
Journal Article -
13
AHT-QCN: Adaptive Hunt Tuner Algorithm Optimized Q-learning Based Deep Convolutional Neural Network for the Penetration Testing
Published in Cybernetics and information technologies : CIT (01-09-2024)“…Penetration Testing (PT), which mimics actual cyber attacks, has become an essential procedure for assessing the security posture of network infrastructures in…”
Get full text
Journal Article -
14
ANFIS-AMAL: Android Malware Threat Assessment Using Ensemble of ANFIS and GWO
Published in Cybernetics and information technologies : CIT (01-09-2024)“…The Android malware has various features and capabilities. Various malware has distinctive characteristics. Ransomware threatens financial loss and system…”
Get full text
Journal Article -
15
A Novel Deep Transfer Learning-Based Approach for Face Pose Estimation
Published in Cybernetics and information technologies : CIT (01-06-2024)“…An efficient face recognition system is essential for security and authentication-based applications. However, real-time face recognition systems have a few…”
Get full text
Journal Article -
16
Decentralized Application (dApp) Development and Implementation
Published in Cybernetics and information technologies : CIT (01-06-2024)“…This paper focuses on the development and deployment of a dApp (decentralized Application) for Smart Crop Production Data exchange (SCPDx) that runs on…”
Get full text
Journal Article -
17
Feature Selection Using Hybrid Metaheuristic Algorithm for Email Spam Detection
Published in Cybernetics and information technologies : CIT (01-06-2024)“…In the present study, Krill Herd (KH) is proposed as a Feature Selection tool to detect spam email problems. This works by assessing the accuracy and…”
Get full text
Journal Article -
18
African Vulture Optimization-Based Decision Tree (AVO-DT): An Innovative Method for Malware Identification and Evaluation through the Application of Meta-Heuristic Optimization Algorithm
Published in Cybernetics and information technologies : CIT (01-06-2024)“…Malware remains a big threat to cyber security, calling for machine learning-based malware detection. Malware variations exhibit common behavioral patterns…”
Get full text
Journal Article -
19
Securing Decentralized Storage in Blockchain: A Hybrid Cryptographic Framework
Published in Cybernetics and information technologies : CIT (01-06-2024)“…The evolution of decentralized storage, propelled by blockchain advancements, has revolutionized data management. This paper focuses on content security in the…”
Get full text
Journal Article -
20
Predicting Student Performance by Using Data Mining Methods for Classification
Published in Cybernetics and information technologies : CIT (01-01-2013)“…Abstract Data mining methods are often implemented at advanced universities today for analyzing available data and extracting information and knowledge to…”
Get full text
Journal Article