


default search action
Cybernetics and Systems, Volume 55
Volume 55, Number 1, January 2024
- Fei Wang, Hongxia Wang, Omid Ranjbar Dehghan

:
Machine Learning Techniques and Big Data Analysis for Internet of Things Applications: A Review Study. 1-41 - Arvind Singh Choudhary, Manoj Kumar

:
Competitive Swarm Improved Invasive Weed Optimization-Based Secret Sharing Scheme for Visual Cryptography. 42-60 - Michael Donevski

, Tanveer A. Zia
:
Cyber Diversity Index for Sustainable Self-Control of Machines. 61-87 - Antonio Caselles, Joan Carles Micó, Salvador Amigó, Pantaleón D. Romero:

Co-Evolution of the General Factor of Personality and the Big Five Factors: A Mathematical Model and Its Application to Methylphenidate. 88-106 - G. S. R. Emil Selvan, T. Daniya

, J. P. Ananth, K. Suresh Kumar
:
Network Intrusion Detection and Mitigation Using Hybrid Optimization Integrated Deep Q Network. 107-123 - Tatiana A. Medvedeva

, Stuart A. Umpleby
:
Advancing Social System Development through Organizational Change. 124-136 - Raúl Espejo

:
Institutions, Nations, Enterprises and Distributed Organisation (the Westphalian Dilemma). 137-156 - Uppula Kiran

, Krishan Kumar:
Throughput and Outage Probability-Aware Intelligent Swarm-Based Multi-Hop Selection in Vehicular Network. 157-183 - Pengyue Jia

, Ling Chen, Dandan Lyu:
Fine-Grained Population Mobility Data-Based Community-Level COVID-19 Prediction Model. 184-202 - Bing Zhou, Bei Lu, Salman Saeidlou:

A Hybrid Clustering Method Based on the Several Diverse Basic Clustering and Meta-Clustering Aggregation Technique. 203-229 - Ernesto León-Castro

, Fabio Blanco-Mesa
, Walayat Hussain
, Martha Flores-Sosa, Luis Alessandri Pérez-Arellano:
Tax Revenue Measurement Using OWA Operators. 230-244 - Felix Joseph Xavier

, Fanax Femy F.
:
ODMNet: Automated Glaucoma Detection and Classification Model Using Heuristically-Aided Optimized DenseNet and MobileNet Transfer Learning. 245-277
Volume 55, Number 2, February 2024
- Archana Goyal, Vishal Gupta, Manish Kumar:

Deep Learning-Based Named Entity Recognition System Using Hybrid Embedding. 279-301 - Khalifa Al-Dosari

, Noora Fetais, Murat Kucukvar:
Artificial Intelligence and Cyber Defense System for Banking Industry: A Qualitative Study of AI Applications and Challenges. 302-330 - Vijayakumar Polepally

, Jagannadha Rao D. B., Parsi Kalpana, S. Nagendra Prabhu:
Exponential Squirrel Search Algorithm-Based Deep Classifier for Intrusion Detection in Cloud Computing with Big Data Assisted Spark Framework. 331-350 - Neelima Talla, Battula Tirumala Krishna

:
A Novel Intelligent Ground Moving Target Indication Using Meta-Heuristic-Based Simplified Fractional Fourier Transform. 351-379 - Atul B. Kathole

, Kapil Netaji Vhatkar, Sonali D. Patil
:
IoT-Enabled Pest Identification and Classification with New Meta-Heuristic-Based Deep Learning Framework. 380-408 - Alampally Sreedevi, Chiranjeevi Manike:

A Smart Solution for Tomato Leaf Disease Classification by Modified Recurrent Neural Network with Severity Computation. 409-449 - Srinivas Byatarayanapura Venkataswamy, Indrajit Mandal, Seetharam Keshavarao:

Virtual Machine Migration-Based Intrusion Detection System in Cloud Environment Using Deep Recurrent Neural Network. 450-470 - Prithvipal Singh, Gurvinder Singh, Amritpal Singh, Jaspreet Singh:

Intelligent Mental Depression Recognition Model with Ensemble Learning Through Social Media Tweet Resources. 471-510 - Tham Vo

:
An Integrated Dual Attention with Convolutional LSTM for Short-Term Temperature Forecasting. 511-533 - Mirwan Ushada

, Fitri Trapsilawati, Rosa Amalia
, Nur Achmad Sulistyo Putro
:
Modeling Trust Decision-Making of Indonesian Food and Beverage SME Groups in the Adoption of Industry 4.0. 534-550 - Gorla Babu, Pinjari Abdul Khayum:

A New Design of Iris Recognition Using Hough Transform with K-Means Clustering and Enhanced Faster R-CNN. 551-584 - Mehrdad Jozmaleki

, Mustafa Jahangoshai Rezaee
, Morteza Saberi
:
A Hybrid Semi-Supervised Approach for Estimating the Efficient and Optimal Level of Hospitals Outputs. 585-613
Volume 55, Number 3, April 2024
- Edward Szczerbicki, Ngoc-Thanh Nguyen:

Society 4.0: Issues, Challenges, Approaches, and Enabling Technologies. 615-617 - Van Du Nguyen

, Hai Bang Truong
:
Intelligent Collectives: Impact of Independence on Collective Performance. 618-633 - Lassaad Ben Ammar

, Karim Gasmi
, Ibtihel Ben Ltaifa:
ViT-TB: Ensemble Learning Based ViT Model for Tuberculosis Recognition. 634-653 - Rafal Palak

, Krystian Wojtkiewicz
:
A Centralization Measure for Social Networks Assessment. 654-667 - Yufeng Xu, Zhe Ding, Lei Shi, Juan Wang, Linfeng Yu, Haoxi Zhang, Edward Szczerbicki:

Smart Karyotyping Image Selection Based on Commonsense Knowledge Reasoning. 668-677 - Zygmunt Mazur, Janusz Pec:

A Method for Information Security Analysis Using Information Graphs. 678-692 - Bao Huynh

, Lam B. Q. Nguyen
, Duc H. M. Nguyen, Ngoc Thanh Nguyen, Hung Son Nguyen, Tuyn Pham, Tri Pham
, Loan T. T. Nguyen
, Trinh D. D. Nguyen, Bay Vo:
Mining Association Rules from a Single Large Graph. 693-707 - Renhao Zhou, Linfeng Yu, Ding Chen, Haoxi Zhang, Edward Szczerbicki:

KEMR-Net: A Knowledge-Enhanced Mask Refinement Network for Chromosome Instance Segmentation. 708-718 - Syed Imran Shafiq

, Cesar Sanín
, Edward Szczerbicki:
Decisional-DNA-Based Digital Twin Implementation Architecture for Virtual Engineering Objects. 719-729 - Maiqi Wang, Yi Lai, Minghui Li, Haoxi Zhang, Edward Szczerbicki:

Toward Human Chromosome Knowledge Engine. 730-737
Volume 55, Number 4, May 2024
- P. M. Kavitha, B. Muruganantham:

Mal_CNN: An Enhancement for Malicious Image Classification Based on Neural Network. 739-752 - Chandni Magoo, Manjeet Singh:

Design and Development of New Interactive Chatbot System for Mobile Service Providers through Heuristic-Based Ensemble Learning. 753-785 - Abinaya Pandiyarajan

, Senthil Kumar Jagatheesaperumal
:
Assured and Provable Data Expuncturing in cloud using Ciphertext Policy-Attribute Based Encryption (CP-ABE). 786-803 - A. Arthi, V. Vennila, U. Arun Kumar:

Leukemia Detection Using Invariant Structural Cascade Segmentation Based on Deep Vectorized Scaling Neural Network. 804-822 - Supriya Palekar, Y. Radhika:

APRO: Secret Key Based Data Encryption and Mutual Authentication with Privacy Preservation Model in IoT Using Autoregressive Poor and Rich Optimization. 823-847 - Sudhir Sharma, Sandesh Tripathi, Kaushal Kishor Bhatt, Nitin Chhimwal:

An Efficient and Secure Authentication Protocol with Deep Learning Based Key Generation toward Securing Healthcare Data in IoT. 848-871 - R. M. Rajeswari, S. Rajesh:

Enhance Security and Privacy in VANET Based Sensor Monitoring and Emergency Services. 872-893 - N. Kanagavalli

, S. Baghavathi Priya:
An Approach for Fake News Detection in Social Media Using Hybrid Classifier. 894-917 - Karthikeyan S.

, Lakshmi K.:
FPGA Based Integrated Control of Brushless DC Motor for Renewable Energy Storage System. 918-939 - Suat Sahin

, Çigdem Erol
:
Prediction of Secondary School Students' Academic Achievements with Machine Learning Methods and a Sample System. 940-960 - Zong-Chang Yang

:
A Complex Networks-Based Position-Distance-Related Epidemic Simulation Model for the H1N1: A Case Study. 961-980 - Hong-Sen Yan

, Guo-Biao Wang, Bo Zhou, Xiao-Qin Wan, Jiao-Jun Zhang:
Data-Driven Forecasting of Nonlinear System with Herding via Multi-Dimensional Taylor Network. 981-1004
Volume 55, Number 5, July 2024
- Hima Vijayan

, M. Subramaniam, Sathiyasekar Kumarasamy:
A Hybrid Intelligent Clustering Model for Tackling Incomplete Mixed Data Using Heuristic Algorithm with Artificial Intelligence. 1005-1040 - Jiabao Sun, Yijiang Zhang, Mohammad Trik:

PBPHS: A Profile-Based Predictive Handover Strategy for 5G Networks. 1041-1062 - Nishtha Ahuja, Shailender Kumar:

Fusion of Semantic, Visual and Network Information for Detection of Misinformation on Social Media. 1063-1085 - Germán Bula Escobar:

Some Notes and Reflections about the Institutional Context to Study the Westphalian Dilemma. 1086-1103 - Kartik Patra

:
A New Approach of Ranking of Generalized Trapezoidal Fuzzy Numbers and Application in Fuzzy Risk Analysis. 1104-1128 - K. Mekala, S. Sumathi, S. Shobana:

A Multi-Aggregator Based Charge Scheduling in Internet of Electric Vehicles Using Fractional African Vulture Sail Fish Optimization. 1129-1155 - P. Purusothaman, B. Gopalakrishnan:

Enhanced Localization Model in Wireless Sensor Network Using Self Adaptive-Barnacles Mating Optimization. 1156-1183 - Ladislav Zjavka

:
Power Quality Estimations for Unknown Binary Combinations of Electrical Appliances Based on the Step-by-Step Increasing Model Complexity. 1184-1204 - Wen-Di Wan, Yu-Long Bai, Ya-Ni Lu, Lin Ding:

A Hybrid Model Combining a Gated Recurrent Unit Network Based on Variational Mode Decomposition with Error Correction for Stock Price Prediction. 1205-1229 - P. Justin Raj, V. Vasan Prabhu, V. Krishnakumar:

Optimal Battery Management System Utilized in Electric Vehicle Using Fuzzy Logic Controller (FLC) and Artificial Eco-System Algorithm (AEO). 1230-1254 - Tham Vo

, Hien Thanh Vu:
An Integrated Graph-of-Words with Tensor Graph Neural Network Learning Paradigm for Text Classification. 1255-1284 - Ali Saghafinia, Alireza Fallahpour, Milad Asadpour

, Mansour Abedian
:
Green Supplier Selection in a Fuzzy Environment: FIS and FPP Approaches. 1285-1310
Volume 55, Number 6, August 2024
- Álvaro Herrero, Daniel Urda

, Esteban Jove
, Mariusz Topolski, Emilio Corchado:
Soft-Computing Techniques to Address Industrial and Environmental Challenges. 1311-1313 - Miroslav Dvorak, Petr Dolezel, Dominik Stursa, Mohamed Chouai:

Genetic Algorithm-Based Task Assignment for Fleet of Unmanned Surface Vehicles in Dynamically Changing Environment. 1314-1331 - Byron Guerrero Rodríguez

, Jaime Salvador-Meneses
, José García Rodríguez, Christian Mejía Escobar
:
Improving Landslides Prediction: Meteorological Data Preprocessing Based on Supervised and Unsupervised Learning. 1332-1356 - Nuño Basurto

, Carlos Cambra Baseca
, Álvaro Herrero
, Daniel Urda
:
A Clustering Extension of HUEPs for the Analysis of Performance Anomalies in Robots. 1357-1377 - Cristián Lira, Aldo Araya, Bastián Véjar, Fernando Ordóñez

, Sebastián A. Ríos:
Using Congestion to Improve Short-Term Velocity Forecasting with Machine Learning Models. 1378-1398 - Javier Franco

, Ander García
, Amaia Gil, Juan Luis Ferrando
, Xabier Badiola, Mikel Sáez de Sáez de Buruaga:
Multivariate Adaptive Downsampling Algorithm for Industry 4.0 Visual Analytics. 1399-1416 - Gye-Bong Jang, Sung-Bae Cho:

Multi-Instance Attention Network for Anomaly Detection from Multivariate Time Series. 1417-1440
Volume 55, Number 7, October 2024
- S. Iwin Thanakumar Joseph

, N. Shanthini Pandiaraj, Velliangiri Sarveshwaran
, M. Mythily:
Ship Detection and Classification Using Hybrid Optimization Enabled Deep Learning Approach by Remote Sensing Images. 1441-1468 - Ahamed Ali Samsu Aliar

, Moorthy Agoramoorthy, Y. Justindhas
:
An Automated Detection of DDoS Attack in Cloud Using Optimized Weighted Fused Features and Hybrid DBN-GRU Architecture. 1469-1510 - Subha J, M. Kowsigan

:
Efficient Water Supply Scheduling in IoT Sector With Modified Exploration-Based Artificial Gorilla Troops Optimizer. 1511-1536 - Wei Yao, Lei Su, Yan Wang, Jing Wang, Hao Shen:

Extended Dissipative Control for Interval Type-2 T-S Fuzzy Markov Jump Systems Subject to Actuator Faults. 1537-1561 - Sara Taghipour, Javad Akbari Torkestani, Sara Nazari:

A Learning Automata-Based Approach to Improve the Scalability of Clustering-Based Recommender Systems. 1562-1593 - Reza Ebrahim Pourian, Mehdi Fartash

, Javad Akbari Torkestani:
A New Approach to the Resource Allocation Problem in Fog Computing Based on Learning Automata. 1594-1613 - Viet The Bui, Tho Chi Luong, Oanh Thi Tran

:
Transformer-Based Joint Learning Approach for Text Normalization in Vietnamese Automatic Speech Recognition Systems. 1614-1630 - Samik Datta

, Satyajit Chakrabarti:
Integrated Two Variant Deep Learners for Aspect-Based Sentiment Analysis: An Improved Meta-Heuristic-Based Model. 1631-1667 - Zixuan Yu

, Wei Sun, Min Huang:
Exact Methods for Multi-Objective Integer Nonlinear Programming. 1668-1701 - V. Brindha Devi

, Nihar Madhaw Ranjan
, Himanshu Sharma:
IoT Attack Detection and Mitigation with Optimized Deep Learning Techniques. 1702-1728 - Sameer Awasthi

, Syed Wajahat Abbas Rizvi
:
Proposed Data Sanitization for Privacy Preservation in Mobile Computing. 1729-1756 - Abdallah Saleh Ali Shatat, Md. Mobin Akhtar, Abu Sarwar Zamani, Sara Dilshad, Faizan Samdani:

Big Data Driven Map Reduce Framework for Automated Flood Disaster Detection Based on Heuristic-Based Ensemble Learning. 1757-1791
Volume 55, Number 8, November 2024
- Dalpat Songara, Amarjeet Poonia, Gaurav Gupta

, Arvind Sharma:
A Model for Fingerprint Liveness Detection Enabled by M-SSO Heuristic Algorithm Using Deep Learning Strategies. 1793-1828 - Niroshini Infantia Henry, C. Anbuananth, S. Kalarani:

Design and Development of Improved Squirrel Search-based Secured VM Migration in the Cloud Sector with Optimal Key Management. 1829-1866 - Prameeladevi Chillakuru, D. Divya

, K. Ananthajothi:
Enhanced Segmentation with Optimized Nine-Layered CNN-Based Classification of Leaf Diseases: An Automatic Approach for Plant Disease Diagnosis. 1867-1902 - Preethi S., C. Priyadharsini:

Deep Learning with Blockchain Technology for Secure Data Management in Healthcare Sector using Hybrid Elliptic Curve-Rivest-Shamir-Adleman Cryptography. 1903-1939 - S. Visnu Dharsini

, S. Babu:
Profit Suggestion Technique in Agronomics Using a New Heuristic-Based Barnacle Mating Honey Badger Algorithm I-BMHBA. 1940-1976 - Supreetha Patel Tiptur Parashivamurthy

, Sannangi Viswaradhya Rajashekararadhya:
Recognition of Kannada Character Scripts Using Hybrid Feature Extraction and Ensemble Learning Approaches. 1977-2012 - Sangeetha Francelin Vinnarasi Francis, Prabaharan Gopi

, Velliangiri Sarveshwaran
, Ajitha Ponnupillai:
An Intelligent System Using Deep Learning-Based Link Quality Prediction and Optimization Enabled Secure Communication in UAV Network. 2013-2040 - Puppala Ramya

, Ramya V, Babu Rao Markapudi
:
Optimized Deep Learning-Based E-Waste Management in IoT Application via Energy-Aware Routing. 2041-2070 - N. Kumaran, Shyam Mohan J. S

:
BRDO: Blockchain Assisted Intrusion Detection Using Optimized Deep Stacked Network. 2071-2092 - Majid Tajeri, Hamid H. S. Javadi

, Majid Bayat
, Mohammad Ebrahim Shiri:
Pre-Distribution Encryption Key Scheme for Communicating between IoT Device Layer and Fog Layer. 2093-2117 - Hingmire Vishal Sharad, Santosh R. Desai, Kanse Yuvraj Krishnrao:

SAOA: Multi-Objective Fault-Tolerance Based Optimized RPL Routing Protocol in Internet of Things. 2118-2139 - Surender Singh Samant

, Vijay Singh, Arun Chauhan, Jagadish Dasarahalli Narasimaiah:
An Optimized Crossover Framework for Social Media Sentiment Analysis. 2140-2168 - Jing Tang

, Xinwang Liu
, Weizhong Wang
:
Causations Analysis of a High-Speed Railway Accident Using Extended 24Model with Interval Type-2 Fuzzy DEMATEL Method. 2169-2196 - Suryabhan Pratap Singh

:
Comparison of Deep Learning Network for Breast Tumor Segmentation from X-Ray. 2197-2211 - Xing-Juan Fan, Bao-Qing Liu, Fei Yang, Hui Li, Hong Yan Huang:

IPORM: A Resource Management Scheme for Fog-Enabled Cloud Environments: An Improved Political Optimizer-Based Approach. 2212-2234 - Shruti Jain

, Sanket Saxena, Shivam Sinha:
Ensemble Architecture for Prediction of Grading of Diabetic Retinopathy. 2235-2253 - Xu Zhang, Ahad Abolfathi:

Development of FriendLink Similarity Metric for Link Prediction in Weighted Multiplex Networks. 2254-2279 - Anandh Nagarajan

, M. P. Gopinath:
Resnet Features and Optimization Enabled Deep Learning for Indoor Object Detection and Object Recognition. 2280-2307 - Laxmi Rajput

, Sanjay Kumar
:
Spherical Fuzzy Choquet Integral-Based VIKOR Method for Multi-Criteria Group Decision-Making Problems. 2308-2328 - Bilal Ashfaq Ahmed

, Norris Syed Abdullah, Mohd. Foad Rohani, Saima Waseem:
Fractional Political Optimizer-Based Switch Migration in Software-Defined WAN for Load Balancing with Deep Q Network. 2329-2355 - Amardeep Singh

, Monika Singh
:
Social Networks Privacy Preservation: A Novel Framework. 2356-2387 - Anurag Shrivastava

, Midhun Chakkaravarthy, Mohd Asif Shah
:
A Novel Approach Using Learning Algorithm for Parkinson's Disease Detection with Handwritten Sketches'. 2388-2404 - Mayur Jagdish Patil, Krishnakant P. Adhiya:

An Enhanced Elliptic Curve Cryptography Scheme for Secure Data Transmission to Evade Entailment of Fake Vehicles in VANET. 2405-2439 - Praveen Kumar Devulapalli, Sushanth Babu Maganti

, Satish Kumar G. A. E., Sumalatha Rachapogula:
Optimal Relay Selection Strategy for Energy-Efficient Cooperative Multi-Hop Image Transmission in Wireless Multimedia Sensor Network. 2440-2463 - Pariya Khalili, Ramin Vatankhah, Mohammad Mehdi Arefi:

State/Parameter Identification in Cancerous Models Using Unscented Kalman Filter. 2464-2488 - Garima Verma

:
Hybrid Optimization Model for Secure Task Scheduling in Cloud: Combining Seagull and Black Widow Optimization. 2489-2511 - Anju V. Kulkarni, Mithra Venkatesan, Radhika Menon

:
Attack Detection in Wireless Sensor Network: A Big Data Perspective. 2512-2539

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














