Cybernetics and Systems最新文献

筛选
英文 中文
On the Discrete-Time Minimum Principle in Multiple-Mode Systems 关于多模式系统的离散时间最小原理
IF 1.7 4区 计算机科学
Cybernetics and Systems Pub Date : 2023-02-22 DOI: 10.1080/01969722.2023.2175492
José Daniel López‐Barrientos, M. Jiménez-Lizárraga, B. Escobedo-Trujillo
{"title":"On the Discrete-Time Minimum Principle in Multiple-Mode Systems","authors":"José Daniel López‐Barrientos, M. Jiménez-Lizárraga, B. Escobedo-Trujillo","doi":"10.1080/01969722.2023.2175492","DOIUrl":"https://doi.org/10.1080/01969722.2023.2175492","url":null,"abstract":"","PeriodicalId":55188,"journal":{"name":"Cybernetics and Systems","volume":" ","pages":""},"PeriodicalIF":1.7,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48501268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Combination of Deep Learning Models for Student’s Performance Prediction with a Development of Entropy Weighted Rough Set Feature Mining 学生成绩预测的深度学习模型与熵加权粗糙集特征挖掘的结合
IF 1.7 4区 计算机科学
Cybernetics and Systems Pub Date : 2023-02-22 DOI: 10.1080/01969722.2023.2166259
Sateesh Nayani, Srinivasa Rao P, R. D.
{"title":"Combination of Deep Learning Models for Student’s Performance Prediction with a Development of Entropy Weighted Rough Set Feature Mining","authors":"Sateesh Nayani, Srinivasa Rao P, R. D.","doi":"10.1080/01969722.2023.2166259","DOIUrl":"https://doi.org/10.1080/01969722.2023.2166259","url":null,"abstract":"","PeriodicalId":55188,"journal":{"name":"Cybernetics and Systems","volume":"1 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"59270851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
OptiMD-3D DCNN: A Framework for Restoring the Haze-Free Images by Image Dehazing Techniques Using Heuristic Approach of Adaptive Lifting Wavelet Transform OptiMD-3D DCNN:一种利用自适应提升小波变换的启发式图像去雾技术恢复无雾图像的框架
IF 1.7 4区 计算机科学
Cybernetics and Systems Pub Date : 2023-02-21 DOI: 10.1080/01969722.2023.2176624
R. P. Kumar, M. Naganaik
{"title":"OptiMD-3D DCNN: A Framework for Restoring the Haze-Free Images by Image Dehazing Techniques Using Heuristic Approach of Adaptive Lifting Wavelet Transform","authors":"R. P. Kumar, M. Naganaik","doi":"10.1080/01969722.2023.2176624","DOIUrl":"https://doi.org/10.1080/01969722.2023.2176624","url":null,"abstract":"","PeriodicalId":55188,"journal":{"name":"Cybernetics and Systems","volume":" ","pages":""},"PeriodicalIF":1.7,"publicationDate":"2023-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41768564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BRDO: Blockchain Assisted Intrusion Detection Using Optimized Deep Stacked Network 基于优化深度堆叠网络的b区块链辅助入侵检测
IF 1.7 4区 计算机科学
Cybernetics and Systems Pub Date : 2023-02-21 DOI: 10.1080/01969722.2023.2175153
Kumaran N, Shyam Mohan J S
{"title":"BRDO: Blockchain Assisted Intrusion Detection Using Optimized Deep Stacked Network","authors":"Kumaran N, Shyam Mohan J S","doi":"10.1080/01969722.2023.2175153","DOIUrl":"https://doi.org/10.1080/01969722.2023.2175153","url":null,"abstract":"","PeriodicalId":55188,"journal":{"name":"Cybernetics and Systems","volume":" ","pages":""},"PeriodicalIF":1.7,"publicationDate":"2023-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42453049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Resource Allocation in Macrocell–Femtocells via Combined Rain and Whale Optimization Algorithm 基于Rain和Whale组合优化算法的宏蜂窝-毫微微蜂窝资源分配
IF 1.7 4区 计算机科学
Cybernetics and Systems Pub Date : 2023-02-21 DOI: 10.1080/01969722.2023.2175149
S. Mohite, U. Kolekar
{"title":"Resource Allocation in Macrocell–Femtocells via Combined Rain and Whale Optimization Algorithm","authors":"S. Mohite, U. Kolekar","doi":"10.1080/01969722.2023.2175149","DOIUrl":"https://doi.org/10.1080/01969722.2023.2175149","url":null,"abstract":"","PeriodicalId":55188,"journal":{"name":"Cybernetics and Systems","volume":" ","pages":""},"PeriodicalIF":1.7,"publicationDate":"2023-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43203367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MDHO: Mayfly Deer Hunting Optimization Algorithm for Optimal Obstacle Avoidance Based Path Planning Using Mobile Robots MDHO:基于移动机器人路径规划的Mayfly猎鹿优化算法
IF 1.7 4区 计算机科学
Cybernetics and Systems Pub Date : 2023-02-20 DOI: 10.1080/01969722.2023.2177804
Sakthitharan Subramanian, Sudha Rajesh, Preethika Immaculate Britto, Sakthivel Sankaran
{"title":"MDHO: Mayfly Deer Hunting Optimization Algorithm for Optimal Obstacle Avoidance Based Path Planning Using Mobile Robots","authors":"Sakthitharan Subramanian, Sudha Rajesh, Preethika Immaculate Britto, Sakthivel Sankaran","doi":"10.1080/01969722.2023.2177804","DOIUrl":"https://doi.org/10.1080/01969722.2023.2177804","url":null,"abstract":"","PeriodicalId":55188,"journal":{"name":"Cybernetics and Systems","volume":" ","pages":""},"PeriodicalIF":1.7,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41537393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comprehensive Literature of Genetics Cryptographic Algorithms for Data Security in Cloud Computing 云计算中用于数据安全的遗传密码算法综合文献
IF 1.7 4区 计算机科学
Cybernetics and Systems Pub Date : 2023-02-15 DOI: 10.1080/01969722.2023.2175117
Ozgu Can, Fursan Thabit, A. Aljahdali, Sharaf Al-Homdy, Hoda AlKhzaimi
{"title":"A Comprehensive Literature of Genetics Cryptographic Algorithms for Data Security in Cloud Computing","authors":"Ozgu Can, Fursan Thabit, A. Aljahdali, Sharaf Al-Homdy, Hoda AlKhzaimi","doi":"10.1080/01969722.2023.2175117","DOIUrl":"https://doi.org/10.1080/01969722.2023.2175117","url":null,"abstract":"","PeriodicalId":55188,"journal":{"name":"Cybernetics and Systems","volume":" ","pages":""},"PeriodicalIF":1.7,"publicationDate":"2023-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44499925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Detection of Intrusions Based on Deep Learning 一种基于深度学习的入侵检测方法
IF 1.7 4区 计算机科学
Cybernetics and Systems Pub Date : 2023-02-15 DOI: 10.1080/01969722.2023.2175134
D. Kamalakkannan, D. Menaga, S. Shobana, K. V. Daya Sagar, R. Rajagopal, M. Tiwari
{"title":"A Detection of Intrusions Based on Deep Learning","authors":"D. Kamalakkannan, D. Menaga, S. Shobana, K. V. Daya Sagar, R. Rajagopal, M. Tiwari","doi":"10.1080/01969722.2023.2175134","DOIUrl":"https://doi.org/10.1080/01969722.2023.2175134","url":null,"abstract":"","PeriodicalId":55188,"journal":{"name":"Cybernetics and Systems","volume":" ","pages":""},"PeriodicalIF":1.7,"publicationDate":"2023-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45011262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cloud Based Electric Vehicle’s Temperature Monitoring System Using IOT 基于物联网的云电动汽车温度监测系统
IF 1.7 4区 计算机科学
Cybernetics and Systems Pub Date : 2023-02-15 DOI: 10.1080/01969722.2023.2176649
S. Sreenivasu, T. Sathesh Kumar, O. Bin Hussain, Ajay Reddy Yeruva, Subash Ranjan Kabat, A. Chaturvedi
{"title":"Cloud Based Electric Vehicle’s Temperature Monitoring System Using IOT","authors":"S. Sreenivasu, T. Sathesh Kumar, O. Bin Hussain, Ajay Reddy Yeruva, Subash Ranjan Kabat, A. Chaturvedi","doi":"10.1080/01969722.2023.2176649","DOIUrl":"https://doi.org/10.1080/01969722.2023.2176649","url":null,"abstract":"","PeriodicalId":55188,"journal":{"name":"Cybernetics and Systems","volume":" ","pages":""},"PeriodicalIF":1.7,"publicationDate":"2023-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42423781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Enhance Security and Privacy in VANET Based Sensor Monitoring and Emergency Services 增强基于VANET的传感器监测和应急服务的安全性和隐私性
IF 1.7 4区 计算机科学
Cybernetics and Systems Pub Date : 2023-02-15 DOI: 10.1080/01969722.2023.2177801
R. M. Rajeswari, S. Rajesh
{"title":"Enhance Security and Privacy in VANET Based Sensor Monitoring and Emergency Services","authors":"R. M. Rajeswari, S. Rajesh","doi":"10.1080/01969722.2023.2177801","DOIUrl":"https://doi.org/10.1080/01969722.2023.2177801","url":null,"abstract":"","PeriodicalId":55188,"journal":{"name":"Cybernetics and Systems","volume":" ","pages":""},"PeriodicalIF":1.7,"publicationDate":"2023-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43482153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信