Results 11 to 20 of about 5,495 (60)

A Model-Free Cognitive Anti-Jamming Strategy Using Adversarial Learning Algorithm

open access: yesCybernetics and Information Technologies, 2022
Modern networking systems can benefit from Cognitive Radio (CR) because it mitigates spectrum scarcity. CR is prone to jamming attacks due to shared communication medium that results in a drop of spectrum usage.
Sudha Y., Sarasvathi V.
doaj   +1 more source

Optimization of a Moore Automaton Circuit in a Mixed Element Basis

open access: yesКібернетика та комп'ютерні технології, 2022
Introduction. The control unit is one of the most important building blocks of any digital system. The main function of the control unit is to coordinate the interaction between all system blocks.
Alexander Barkalov   +3 more
doaj   +1 more source

Hybrid Feature Selection Method for Intrusion Detection Systems Based on an Improved Intelligent Water Drop Algorithm

open access: yesCybernetics and Information Technologies, 2022
A critical task and a competitive research area is to secure networks against attacks. One of the most popular security solutions is Intrusion Detection Systems (IDS). Machine learning has been recently used by researchers to develop high performance IDS.
Alhenawi Esra’a   +4 more
doaj   +1 more source

About the Development of a High-Speed Simplified Image Codec

open access: yesКібернетика та комп'ютерні технології, 2021
In order to develop a high-speed simplified image codec, an analysis of the influence of known image compression algorithms and other parameters on performance was done.
Yа. Luts, V. Luts
doaj   +1 more source

A Decentralized Medical Network for Maintaining Patient Records Using Blockchain Technology

open access: yesCybernetics and Information Technologies, 2022
Personal Medical Records (PMR) manage an individual’s medical information in digital form and allow patients to view their medical information and doctors to diagnose diseases. Today’s institution-dependent centralized storage, fails to give trustworthy,
Sumathi M.   +3 more
doaj   +1 more source

About JPEG Images Parameters Impact to Steganalys Accuracy

open access: yesКібернетика та комп'ютерні технології, 2021
Introduction. Existing examples of illegal use of computer steganography prove the need for the development of stegananalytical methods and systems as one of the most important areas of cybersecurity.
N. Koshkina
doaj   +1 more source

Using the Ellipsoid Method to Study Relationships in Medical Data

open access: yesКібернетика та комп'ютерні технології, 2023
Deterioration of moral and psychological state on the background of a full–scale war is observed in many social groups. Timely detection of various types of pre–depressive states and appropriate therapy is a critically important task nowadays.
Petro Stetsyuk   +4 more
doaj   +1 more source

Emulation of Brain Metabolic Activities Based on a Dynamically Controllable Optical Phantom

open access: yesCyborg and Bionic Systems, 2023
This paper presents a dynamic optical phantom for the simulation of metabolic activities in the brain, and a linear equivalent model is built for control voltage versus substance concentration.
Yuxiang Lin   +8 more
doaj   +1 more source

Recent Progress of Magnetically Actuated DNA Micro/Nanorobots

open access: yesCyborg and Bionic Systems, 2022
In the past few decades, the field of DNA origami-based micro/nanotechnology has developed dramatically and spawned attention increasingly, as its high integrality, rigid structure, and excellent resistance ability to enzyme digestion.
Fengyu Liu   +3 more
doaj   +1 more source

About Structure of Graph Obstructions for Klein Surface with 9 Vertices

open access: yesКібернетика та комп'ютерні технології, 2020
The structure of the 9 vertex obstructive graphs for the nonorientable surface of the genus 2 is established by the method of (-transformations of the graphs.
V.I. Petrenjuk, D.A. Petrenjuk
doaj   +1 more source

Home - About - Disclaimer - Privacy