José Daniel López‐Barrientos, M. Jiménez-Lizárraga, B. Escobedo-Trujillo
{"title":"On the Discrete-Time Minimum Principle in Multiple-Mode Systems","authors":"José Daniel López‐Barrientos, M. Jiménez-Lizárraga, B. Escobedo-Trujillo","doi":"10.1080/01969722.2023.2175492","DOIUrl":"https://doi.org/10.1080/01969722.2023.2175492","url":null,"abstract":"","PeriodicalId":55188,"journal":{"name":"Cybernetics and Systems","volume":" ","pages":""},"PeriodicalIF":1.7,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48501268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Combination of Deep Learning Models for Student’s Performance Prediction with a Development of Entropy Weighted Rough Set Feature Mining","authors":"Sateesh Nayani, Srinivasa Rao P, R. D.","doi":"10.1080/01969722.2023.2166259","DOIUrl":"https://doi.org/10.1080/01969722.2023.2166259","url":null,"abstract":"","PeriodicalId":55188,"journal":{"name":"Cybernetics and Systems","volume":"1 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"59270851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"OptiMD-3D DCNN: A Framework for Restoring the Haze-Free Images by Image Dehazing Techniques Using Heuristic Approach of Adaptive Lifting Wavelet Transform","authors":"R. P. Kumar, M. Naganaik","doi":"10.1080/01969722.2023.2176624","DOIUrl":"https://doi.org/10.1080/01969722.2023.2176624","url":null,"abstract":"","PeriodicalId":55188,"journal":{"name":"Cybernetics and Systems","volume":" ","pages":""},"PeriodicalIF":1.7,"publicationDate":"2023-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41768564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"BRDO: Blockchain Assisted Intrusion Detection Using Optimized Deep Stacked Network","authors":"Kumaran N, Shyam Mohan J S","doi":"10.1080/01969722.2023.2175153","DOIUrl":"https://doi.org/10.1080/01969722.2023.2175153","url":null,"abstract":"","PeriodicalId":55188,"journal":{"name":"Cybernetics and Systems","volume":" ","pages":""},"PeriodicalIF":1.7,"publicationDate":"2023-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42453049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Resource Allocation in Macrocell–Femtocells via Combined Rain and Whale Optimization Algorithm","authors":"S. Mohite, U. Kolekar","doi":"10.1080/01969722.2023.2175149","DOIUrl":"https://doi.org/10.1080/01969722.2023.2175149","url":null,"abstract":"","PeriodicalId":55188,"journal":{"name":"Cybernetics and Systems","volume":" ","pages":""},"PeriodicalIF":1.7,"publicationDate":"2023-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43203367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ozgu Can, Fursan Thabit, A. Aljahdali, Sharaf Al-Homdy, Hoda AlKhzaimi
{"title":"A Comprehensive Literature of Genetics Cryptographic Algorithms for Data Security in Cloud Computing","authors":"Ozgu Can, Fursan Thabit, A. Aljahdali, Sharaf Al-Homdy, Hoda AlKhzaimi","doi":"10.1080/01969722.2023.2175117","DOIUrl":"https://doi.org/10.1080/01969722.2023.2175117","url":null,"abstract":"","PeriodicalId":55188,"journal":{"name":"Cybernetics and Systems","volume":" ","pages":""},"PeriodicalIF":1.7,"publicationDate":"2023-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44499925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Kamalakkannan, D. Menaga, S. Shobana, K. V. Daya Sagar, R. Rajagopal, M. Tiwari
{"title":"A Detection of Intrusions Based on Deep Learning","authors":"D. Kamalakkannan, D. Menaga, S. Shobana, K. V. Daya Sagar, R. Rajagopal, M. Tiwari","doi":"10.1080/01969722.2023.2175134","DOIUrl":"https://doi.org/10.1080/01969722.2023.2175134","url":null,"abstract":"","PeriodicalId":55188,"journal":{"name":"Cybernetics and Systems","volume":" ","pages":""},"PeriodicalIF":1.7,"publicationDate":"2023-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45011262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Sreenivasu, T. Sathesh Kumar, O. Bin Hussain, Ajay Reddy Yeruva, Subash Ranjan Kabat, A. Chaturvedi
{"title":"Cloud Based Electric Vehicle’s Temperature Monitoring System Using IOT","authors":"S. Sreenivasu, T. Sathesh Kumar, O. Bin Hussain, Ajay Reddy Yeruva, Subash Ranjan Kabat, A. Chaturvedi","doi":"10.1080/01969722.2023.2176649","DOIUrl":"https://doi.org/10.1080/01969722.2023.2176649","url":null,"abstract":"","PeriodicalId":55188,"journal":{"name":"Cybernetics and Systems","volume":" ","pages":""},"PeriodicalIF":1.7,"publicationDate":"2023-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42423781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhance Security and Privacy in VANET Based Sensor Monitoring and Emergency Services","authors":"R. M. Rajeswari, S. Rajesh","doi":"10.1080/01969722.2023.2177801","DOIUrl":"https://doi.org/10.1080/01969722.2023.2177801","url":null,"abstract":"","PeriodicalId":55188,"journal":{"name":"Cybernetics and Systems","volume":" ","pages":""},"PeriodicalIF":1.7,"publicationDate":"2023-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43482153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}