Search Results - "Cybernetics and information technologies : CIT"

Refine Results
  1. 1

    Anomaly Detection Using XGBoost Ensemble of Deep Neural Network Models by Ikram, Sumaiya Thaseen, Cherukuri, Aswani Kumar, Poorva, Babu, Ushasree, Pamidi Sai, Zhang, Yishuo, Liu, Xiao, Li, Gang

    “…Intrusion Detection Systems (IDSs) utilise deep learning techniques to identify intrusions with maximum accuracy and reduce false alarm rates. The feature…”
    Get full text
    Journal Article
  2. 2

    A Review of Feature Selection and Its Methods by Venkatesh, B., Anuradha, J.

    “…Nowadays, being in digital era the data generated by various applications are increasing drastically both row-wise and column wise; this creates a bottleneck…”
    Get full text
    Journal Article
  3. 3

    QoS Enabled IoT Based Low Cost Air Quality Monitoring System with Power Consumption Optimization by Barot, Virendra, Kapadia, Viral, Pandya, Sharnil

    “…Air pollution has emerged as a major concern of the current century. In recent times, fellow researchers have conducted numerous researches in the area of air…”
    Get full text
    Journal Article
  4. 4

    Energy-Efficient and Accelerated Resource Allocation in O-RAN Slicing Using Deep Reinforcement Learning and Transfer Learning by Sherif, Heba, Ahmed, Eman, Kotb, Amira M.

    “…Next Generation Wireless Networks (NGWNs) have two main components: Network Slicing and Open Radio Access Networks (O-RAN). NS is needed to handle various…”
    Get full text
    Journal Article
  5. 5

    Deep Learning-Driven Workload Prediction and Optimization for Load Balancing in Cloud Computing Environment by Karimunnisa, Syed, Pachipala, Yellamma

    “…Cloud computing revolutionizes as a technology that succeeds in serving large-scale user demands. Workload prediction and scheduling tend to be factors…”
    Get full text
    Journal Article
  6. 6

    A Systematic Review of Rapidly Exploring Random Tree RRT Algorithm for Single and Multiple Robots by Muhsen, Dena Kadhim, Raheem, Firas Abdulrazzaq, Sadiq, Ahmed T.

    “…Recent advances in path-planning algorithms have transformed robotics. The Rapidly exploring Random Tree (RRT) algorithm underpins autonomous robot navigation…”
    Get full text
    Journal Article
  7. 7

    Multi-Level Machine Learning Model to Improve the Effectiveness of Predicting Customers Churn Banks by Ngo, Van-Binh, Vu, Van-Hieu

    “…This study presents a novel multi-level Stacking model designed to enhance the accuracy of customer churn prediction in the banking sector, a critical aspect…”
    Get full text
    Journal Article
  8. 8

    Sentiment Analysis of Product Reviews Using Transformer Enhanced 1D-CNN and BiLSTM by Rana, Muhammad Rizwan Rashid, Nawaz, Asif, Ali, Tariq, Alattas, Ahmed Saleh, AbdElminaam, Diaa Salama

    “…The rapid growth of Internet-enabled applications, such as social media platforms, e-commerce sites, and blogs, has led to a surge in user-generated content…”
    Get full text
    Journal Article
  9. 9

    Managing Cybersecurity: Digital Footprint Threats by Ketipov, Rumen, Schnalle, Roman, Doukovska, Lyubka, Dehez, Dustin

    “…Managing cybersecurity and protecting data assets remain top priorities for businesses. Despite this, numerous data breaches persist due to malicious human…”
    Get full text
    Journal Article
  10. 10

    Real-Time Hand Gesture Recognition: A Comprehensive Review of Techniques, Applications, and Challenges by Mohamed, Aws Saood, Hassan, Nidaa Flaih, Jamil, Abeer Salim

    “…Real-time Hand Gesture Recognition (HGR) has emerged as a vital technology in human-computer interaction, offering intuitive and natural ways for users to…”
    Get full text
    Journal Article
  11. 11

    Advanced PSO Algorithms Development with Combined lbest and gbest Neighborhood Topologies by Yuriy, Romasevych, Viatcheslav, Loveikin, Ziv, Brand

    “…This paper introduces an innovative approach integrating global best (gbest) and local best (lbest) PSO communication topologies. The algorithm initiates with…”
    Get full text
    Journal Article
  12. 12

    Exploring the Efficacy of GenAI in Grading SQL Query Tasks: A Case Study by Hamtini, Thair, Assaf, Abdelbaset J.

    “…Numerous techniques, including problem-solving, seeking clarification, and creating questions, have been employed to utilize generative Artificial Intelligence…”
    Get full text
    Journal Article
  13. 13

    AHT-QCN: Adaptive Hunt Tuner Algorithm Optimized Q-learning Based Deep Convolutional Neural Network for the Penetration Testing by Railkar, Dipali, Joshi, Shubhalaxmi

    “…Penetration Testing (PT), which mimics actual cyber attacks, has become an essential procedure for assessing the security posture of network infrastructures in…”
    Get full text
    Journal Article
  14. 14

    ANFIS-AMAL: Android Malware Threat Assessment Using Ensemble of ANFIS and GWO by Nwasra, Nedal, Daoud, Mohammad, Qaisar, Zahid Hussain

    “…The Android malware has various features and capabilities. Various malware has distinctive characteristics. Ransomware threatens financial loss and system…”
    Get full text
    Journal Article
  15. 15

    A Novel Deep Transfer Learning-Based Approach for Face Pose Estimation by Rusia, Mayank Kumar, Singh, Dushyant Kumar, Aquib Ansari, Mohd

    “…An efficient face recognition system is essential for security and authentication-based applications. However, real-time face recognition systems have a few…”
    Get full text
    Journal Article
  16. 16

    Decentralized Application (dApp) Development and Implementation by Popchev, Ivan, Radeva, Irina

    “…This paper focuses on the development and deployment of a dApp (decentralized Application) for Smart Crop Production Data exchange (SCPDx) that runs on…”
    Get full text
    Journal Article
  17. 17

    Feature Selection Using Hybrid Metaheuristic Algorithm for Email Spam Detection by Al-Rawashdeh, Ghada Hammad, Khashan, Osama A, Al-Rawashde, Jawad, Al-Gasawneh, Jassim Ahmad, Alsokkar, Abdullah, Alshinwa, Mohammad

    “…In the present study, Krill Herd (KH) is proposed as a Feature Selection tool to detect spam email problems. This works by assessing the accuracy and…”
    Get full text
    Journal Article
  18. 18

    African Vulture Optimization-Based Decision Tree (AVO-DT): An Innovative Method for Malware Identification and Evaluation through the Application of Meta-Heuristic Optimization Algorithm by Kaithal, Praveen Kumar, Sharma, Varsha

    “…Malware remains a big threat to cyber security, calling for machine learning-based malware detection. Malware variations exhibit common behavioral patterns…”
    Get full text
    Journal Article
  19. 19

    Securing Decentralized Storage in Blockchain: A Hybrid Cryptographic Framework by Swati, Jadhav, Nitin, Pise

    “…The evolution of decentralized storage, propelled by blockchain advancements, has revolutionized data management. This paper focuses on content security in the…”
    Get full text
    Journal Article
  20. 20

    Predicting Student Performance by Using Data Mining Methods for Classification by Kabakchieva, Dorina

    “…Abstract Data mining methods are often implemented at advanced universities today for analyzing available data and extracting information and knowledge to…”
    Get full text
    Journal Article