Results 1 to 10 of about 5,495 (60)

Fault Tolerance of Cloud Infrastructure with Machine Learning

open access: yesCybernetics and Information Technologies, 2023
Enhancing the fault tolerance of cloud systems and accurately forecasting cloud performance are pivotal concerns in cloud computing research. This research addresses critical concerns in cloud computing by enhancing fault tolerance and forecasting cloud ...
Kalaskar Chetankumar, Thangam S.
doaj   +1 more source

An Improved Product Recommender System Using Collaborative Filtering and a Comparative Study of ML Algorithms

open access: yesCybernetics and Information Technologies, 2023
One of the methods most frequently used to recommend films is collaborative filtering. We examine the potential of collaborative filtering in our paper’s discussion of product suggestions.
Amutha S., Vikram Surya R.
doaj   +1 more source

Hybridized Cryptographic Encryption and Decryption Using Advanced Encryption Standard and Data Encryption Standard

open access: yesCybernetics and Information Technologies, 2023
This research proposes an efficient hybridized approach for symmetrical encryption of image files in bitmap formats. Due to the heavy use of lightweight encryption in fields such as military and corporate workplaces, intruders try to intercept ...
Kanshi Avaneesh   +3 more
doaj   +1 more source

Convex Least Angle Regression Based LASSO Feature Selection and Swish Activation Function Model for Startup Survival Rate

open access: yesCybernetics and Information Technologies, 2023
A startup is a recently established business venture led by entrepreneurs, to create and offer new products or services. The discovery of promising startups is a challenging task for creditors, policymakers, and investors. Therefore, the startup survival
Allu Ramakrishna   +1 more
doaj   +1 more source

DoSRT: A Denial-of-Service Resistant Trust Model for VANET

open access: yesCybernetics and Information Technologies, 2023
The Denial of Service (DoS) attack threatens the availability of key components of Vehicular Ad-hoc Network (VANET). Various centralized and decentralized trust-based approaches have been proposed to secure the VANET from DoS attack.
Keshari Niharika   +2 more
doaj   +1 more source

Comparing Different Oversampling Methods in Predicting Multi-Class Educational Datasets Using Machine Learning Techniques

open access: yesCybernetics and Information Technologies, 2023
Predicting students’ academic performance is a critical research area, yet imbalanced educational datasets, characterized by unequal academic-level representation, present challenges for classifiers.
Tariq Muhammad Arham   +3 more
doaj   +1 more source

Coevolution of Myoelectric Hand Control under the Tactile Interaction among Fingers and Objects

open access: yesCyborg and Bionic Systems, 2022
The usability of a prosthetic hand differs significantly from that of a real hand. Moreover, the complexity of manipulation increases as the number of degrees of freedom to be controlled increases, making manipulation with biological signals extremely ...
Yuki Kuroda   +4 more
doaj   +1 more source

Models of Computer Calculations

open access: yesКібернетика та комп'ютерні технології, 2022
Introduction. The complexity of computational algorithms for solving typical problems of computational, applied, and discrete mathematics is analyzed from the perspective of the theory of computation, depending on the computer architecture and the used ...
Valerii Zadiraka   +2 more
doaj   +1 more source

An Approach for Securing JSON Objects through Chaotic Synchronization

open access: yesCybernetics and Information Technologies, 2022
Nowadays the interoperability of web applications is carried out by the use of data exchange formats such as XML and JavaScript Object Notation (JSON).
Gómez Omar S.   +3 more
doaj   +1 more source

Parallel Implementation of Sparse Distributed Memory for Semantic Storage

open access: yesКібернетика та комп'ютерні технології, 2022
Introduction. Sparse Distributed Memory (SDM) and Binary Sparse Distributed Representations (Binary Sparse Distributed Representations, BSDR), as two phenomenological approaches to biological memory modelling, have many similarities.
Ruslan Vdovychenko, Vadim Tulchinsky
doaj   +1 more source

Home - About - Disclaimer - Privacy