IJCI JOURNAL
11
Followers
Personal Information
Beruf
AIRCC
Branche
Education
Webseite
airccse.org/journal/ijci/index.html
Info
International Journal on Cybernetics & Informatics ( IJCI) is an open access peer- reviewed journal that focuses on the areas related to cybernetics which is information, control and system theory, understands the design and function of any system and the relationship among these applications. This journal aims to provide a platform for exchanging ideas in new emerging trends that needs more focus and exposure and will attempt to publish proposals that strengthen our goals.
Tags
artificial intelligence
soft computing
machine learning
power systems
mechatronics
robotics
engineering cybernetics
medical cybernetics
sociocybernetics
advanced control systems
image signal processing
fuzzy logic
data mining
biocybernetics
hybrid systems
fuzzy system
genetic algorithm
neural network
multimedia
deep learning
computer vision
privacy
neural networks
generative ai
security
synthetic biology
robust control
télécommunications
manufacturing systems
classification
cloud computing
information retrieval
bitcoin
disk failure prediction
access control
blockchain
adaptive control
embedded systems
digital control
risk management
database
bioinformatics
instrumentation
electrical
electronics
information technology
cybernetics & informatics
telecommunication
diagnosis
disease prediction
ethereum
nlp
imbalanced dataset
ethics
technology
cybersecurity
cluster analysis
sentiment analysis
deep neural network
twitter
bert
covid-19
education
healthcare
text generation
math information retrieval
complex networks
stock market
china and asean
internet of things
decision support system
bio cybernetics
ratio club
british cybernetics
philosophy of mind
bio informatics
information systems
optical networks
semiconductor devices
information security
energy
user experience
multi-layer perceptron
random forest
design structure
mechatronic components
science
mathematics
ericson model.
hata model
free-space model
path loss
mobile cellular communication
naive bayes
neural networks & fuzzy system
advanced control systems & strategies
network dynamics systems
wireless network
bandwidth
pseudocode to source code
c++
c
compiler
pseudocode compiler
network security
clustering
pancreatic cancer
cancer
mimo
buckling analysis
bay length
critical load
helical members
longitudinal members
isotruss
local buckling
carbon fibre
wavelet transform
manet
regression
minutiae
fingerprint
e-learning
higher education
svm
rfid
fuzzy set
load balancing
intrusion detection systems
k nearest neighbor
key generation
matching
segmentation
biometric identification
web usage mining
classification tree
naïve bayes
wireless sensor network
predictive maintenance
smart database
sensor data analytics
data science
production
artifact-free eeg headset
wearable environment monitor
dynamic neurocombinatorics
mixed data
distance measures
attack vectors
pacemaker
technology of the future
vehicle safety
automotive cybersecurity
evolution of vehicle interface
vehicular networks
vehicle interfaces
anomaly
forecasting
time series
data
libraries
blockchains
iot data indexing
metric space
k-nn search method
retrieve time
défi
wrapped bitcoin
famafrench
fama/french
predictive validity
trading risks
tether
ripple
cardano
solana
dogecoin
trading prices
covid-19 impa
candidatedistributions
independence modeling
generalized hyperbolic distrib
generalized t distribution
correlationanalysis
groundworkexpansion
statisticalexamination
cryptocurrency dynamics
ontology-based approach
automatic question generation
algorithms
assessment
free-tokenization
large language model
arabic language
automatic speech recognition
sepedi-english
code-switching
connectionist temporal classif
large language models
semantic search
fine-tuning
marketing
direct speech-to-speech transl
natural language processing (n
transformer.
object- based
rule-based
emotion detection
action rules
actionable patterns
test automation
rpa
selenium
integration
software testing
professional training
programming
inventor’s native language
language oriented approach of
learning management systems
self-regulated learning
feedback
advisor’s dashboard
learning analytics
barriers
automotive industry
circular economy
multicriteria decision making
deep learning model
cyber-threat intelligence mach
artificial intelligence algori
user-centric privacy
identity management
cloud-based system
process optimisation
cnc-milling
parameter prediction
image processing.
disease recognition.
tensorflow keras
tomato leaf diseases
deep learning classification
disease fusion
technology in education
ethical learning
learning models
economy 5.0
big data.
maturity model
analytics
osint
forensic analysis
cryptocurrency
dbms
sql
smart query
idi
database system
guardia civil
guarda nacional republicana
unmanned aerial vehicle
unmanned aircraft systems
drones
ethical principles
mean decrease gini
accident severity prediction
random forest model
machinelearning
sla
round trip time
data processing
disk failure data
synthesis data
ctgan
smart data
data imbalance
gan
financial industry
distance metric
domain adaptation
transfer learning
smart farming.
hough transform
homography
image capturing and pre-proc
dataset creation
yolov8
underwater shipwrecks
remotely operated vehicle (
n
object detection
underwater archaeological exca
ancient pottery shreds detecti
political decision-making.
indicbert
data augmentation
indic languages
bharatiya janata partytransfor
bharatiya janata party
karnataka elections
otp.
image detection
qr code
undergraduate teaching.
software development
user-centered design
agile development
glomeruli
kidney
histopathology
color normalization
discrimination
safety
regulation
chatgpt
vector
parallel
convolution
kripke structure
temporal logic ctl
formal methods
model-checking
business process
vlan
lan
qos
information assurance and secu
crime prevention
identity theft
threat simulation
control 5.7 threat intelligenc
data exfiltration
iso 27001:2022 update
mitigation.
awareness
expert system
social engineering attacks
internal scan
scan compression
dft
sub-threshold
time-to-digital converter
ultra-low voltage
temperature sensor
software-defined network (sdn)
distributed denial of service
ambient intelligence
gui
sms
pstn
smart shirts
wireless sensor
zigbee
s
smart homes
adl
root of unity
linear difference equation
shift operator
forward difference operator
integer partition
race/ethnicity
engagement
sense of belonging
math (stem)
engineering
text entry
head-mounted display
virtual reality
shaping behavior
mirror neuron system
behavioral interventions
student behavior
post-pandemic learning
computer science education.
pedagogy
curriculum development
small liberal arts institution
ensemble approach
activation function
homomorphic encryption
neuroscience
working memory
special education
neurodiversity
developmental dyslexia
informatization
blended teaching
spoc
ultrasonic audio
digital signal processing
voice activation
computer security
deep learning ·
ids · iot
intrusion detection
african
hairstyle
k-means
face detection
italian emails
multiclass text classification
bert model
mean-variance
inverse-variance portfoli
hierarchical risk parity
portfolio selection
issues and challenges
teaching and learning technolo
ict tools
controlled text generation
autoencoders
gan networks
named entity recognition
feedback control
control theory
computer modelling
electronics and signal process
iot applications and services
security and privacy
share index volatility networ
sentiment engine
sentiment lexicon
annotated corpus
social web
emotional detection
text mining
automatic language processing
unigram
tfidf
multinomial naïve bayes
gaussian naive bayes
logistic regression
decision tree
support vector machine
multi-lingual bert
pashto
distilbert
data characteristics
collaborative filtering
recommendation system
rating matrix
convolutional neural network
multilayer perceptron
recurrent neural network
speech recognition
dari
abbreviation
dictionary
hate speech
normalization
similarity
semanticsimilarity
features
cosinesimilarity
multi-turn dialogue &context a
self-attention
dialogue generation
english for specific purposes
the role of english
jingshi project
people-to-people exchange
sino-thai cooperation
interactive teaching strategie
mixed-methods research
secondary schools
academic communication
this study explored the relati
graphic design
quad
query search
person contamination detection
online efl teaching
post-covid-19
nlp apps
collaborative and interactive
ai-powered
compassion
online teaching
coronavirus
parental migration
drop out
left-behind children
state synchronization
distributed control plane
sdn controller
consensus slice
application of smart homes
security attacks on smart home
smart home architecture
internet-of-things
e-health
iot
gpt
generative pre-trained transfo
malware generation
transformers
shared-memory multiprocessors
fork/join framework
parallel for-loop
task parallelism
divide-and-conquer
evaluation.
scoring
entity filtering;
information extraction
methods;
contribution;
event-based surveillance
pre-trained language models.
math language processing
a mathematical function recogn
data level and model level
sampling
class imbalance
depression detection
depression prediction
share index volatility network
cnn
intelligent stock trading
data normalization
malware classification
malware
education for development
family education
interactive learning
sui model
ericson model
• information retrieval
natural language processing
ai algorithms
autoencoder
audio frames
anomalous sound detection
power system
network dynamics system
advanced control system
vlsi technology
satellite communication
rf and microwave
digital circuit design
system identification
discrete mathematics
control theory
rf and microwave engineering
analog and digital circuit des
organization cybernetics
informatics
cybernetics
power
integrated design
hardware and software
ux
ux evaluation
ux assessment
white box attack.
adversarial examples
face recognition
k-means clustering.
kepler dataset
exoplanets identification
emotional design
sentiment algorithm
intelligent service robot
voice user interface
multi-head attention mechanism
common-sense
quality
diversity
perspective generation
multidisciplinary integrated d
hardware and software interfac
big data & business intelligence
neural languages and nlp
machine learning applications
computer
statistics
research
wireless communications
stanford university interim (sui) model
image thinning
matlab/simulink
dsp
vfd
ac drive
conventional
braking
3-phase induction motor
glomerular filtration rate
tensile test
global
convolutional encoder design
noise immune design
database & information retrieval
transportation systems
complex adaptive system & theory
robotics & artificial intelligence
operation research
renting
myki
furniture
trams
mobile phones
justice
beneficence
value drive behaviour
ethical behaviour
workplace
optional fuels - biodiesel –eucalyptus oil - per
mobile network
worms &trojan
network protocols
virus
defense”
government
military
headquarters
air service regiment
optimization
artificial bee colony
economic emission dispatch
export.
globalization
free trade agreement
economies
economics
reduction in power loss
location of capacitor
distribution feeder.
mprma.
cmprma
ofdma
mac protocol
b3g system
departmental stores
india and australia
marketplace
retail
la
vanet
obu
au
rsu
gps
ca
transport
ic engine
six stroke engine
strategies.
education sector
talent acquisition and talent development
talent retention
interaction of fluid structure (ifs)
computational fluid dynamics (cfd)
outlier detection. artificial intelligent informat
latency
fiber optics
broadband
modular function
group key management
key management
eeg signal
control of diffusion depth
time varying diffusion coefficient
diffusion depth of dopant
multispectral image fusion
grayscale image.
pixel-level image fusion
principal component analysis
ls
spatial diversity
mmse
siso
elliptical slot & rhcp
cp
hexagonal patch
social network
e-commerce
mysql
nosql
cypher query language
graph database
neo4j
rdbms
feature clustering
filter technique
feature subset selection
feature reduction
anonymity
linkability
opening
group signature
double precision floating point format
modelsim
ieee 754
verilog
hash-based carving
sector hashing
forensics investigation
hash-sets
hash-runs algorithms
auditor
packet dropping
indirect reciprocity
homomorphic linear authenticator
data model.
cassandra
recommender systems
secure multi-party computation
secret sharing
block truncation coding (btc)
error diffusion
halftoning
dot diffusion
image compression
theory exam
membership function and performance evaluation
fuzzy expert systems
project
lab exam.
data leak
collection intersection
detection
k-harmonic means clustering
artificial bee colony algorithm
k-means clustering
hash-tag.
databases
machine learning device(mld)
data mining device(dmd)
suricata
snort
idmef
ossec& weka
mcc
ber
mobile
pattern recognition
eye strain
digital imaging
cornea stress
tensile test.
global buckling
piezoelectric material
bi-morph cantilever beam.
energy harvesting
biomechanics
frequency response analysis
dynamics
human limbs
structural modification
eigen sensitivity
modal parameters
bayesian statistics
mcmc
seed
pareto
multi-layered satellites.
convex optimization
congestion control
partial differential equation (pde).
anisotropic diffusion
texture approximation
dictionary based translation
document translation
cross language information retrieval
machine translation
corpora based translation
query translation
fuzzy logic etc
particle swarm optimization
software cost estimation
throughput
aodv
pdr
real time appliction
delay
error matrix
roc
correlation
eer
feature extraction
shape descriptor
orientation descriptor
mongodb
big data
association rule mining
mapreduce
short term trading.
breakout trading
r programming
stock trading algorithmic model
renewable energy sources
pulse width modulation
cascaded h- bridge multilevel inverter
dstatcom
fuzzy controller and harmonics.
balanced-un-balanced voltage variations
d-statcom
pwm (pulse width modulation) rectifier
switched reluctance motor (srm)
power factor correction
on-board units
vanet’s
on-board diagnostics
road side units
radial basis functions
self organized mapping
manual metal arc welding process
multi layer perceptron
probabilistic approach
colocation mining
un-certain data sets
attacks
multitier web application
web server
intrusion detection and prevention system
fixed size templates and performance index method.
template matching
ocr
document image
anomaly based detection
web-based attacks
attribute character distribution method
attribute length method
false accept rate.
ict (information and communication technologies)
equipments and resources).
tser (technology-based strategies
caser (classroom assessment strategies
equipments and resources)
websites based technology
gateway
energy consumption.
wireless sensor networks
deec
heterogeneous protocol
soft compatible of type ( ii )
common fixed point.
( β ) - soft compatible maps
soft mapping
soft metric space
( α ) - soft compatible maps
soft compatible maps
soft compatible of type ( i )
glomerular filtration rate (gfr)
bluetooth
nfc
contactless communication
near field communication
lung
tresholding
sgmentation
solitary pulmonary nodule
soft multi set
soft set
fuzzy soft multi set
current statistical model
gray theory
kalman filter
maneuvering target
markov model
web log and web prediction
user navigation session
frequent item sets and supervised association rule
assoc outliers
tanagra
association rules
data stream
pre-determine
space research
interface
personal computer
vehicle
parallel port.
peer-to-peer
ethical usage
attack prevention
index poisoning
n-screen
cloud virtualization
post pc
smart tv platform
balanced ant family algorithm
continent
chaos
3-opt
ant colony system algorithm
travelling salesman problem
pcwh
nai (t1)
digital and portable
pic16f876
scintillation detector
gamma ray
optimal control problem
stochastic sequential machine
dynamical programming.
point light source pls
integral imaging 3d display
multiple illuminations
pca
support vector machines
intelligent system ami
fuzzy
causal loop
internet
society
linear classifier
svm classifier
classifier fusion.
persian handwritten recognition
fuzzy classification
web search
fuzzy rules and world wide web
personalization
pfcm
pcm
eigen face
fisher face
fcm
rikitake system
generalized synchronization
opcl coupling
rossler system
sprott system
shimizu-morioka system
data clustering
data prune
anomaly detection
markovian chain
apriori algorithm
k-mean algorithm
cancerrecognition; microarray gene expression; aod
wind energy potential
wind turbine
wind power density
mazandaran.
semantic web
ontology
world wide web
genetic algorithm (ga)
computational intelligence
orientation field
fingerprints
verification
cross-correlation
pde based image processing
level set theory.
ageing
gel density
concentration of reactants
gel ph
frequent pattern
significant web traversal pattern
high utility pattern
significant milestone
multihop wireless network
restricted flooding
routing protocol
csma/ca
ieee 802.16 standard; ofdm; pseudo-random binary s
aerial surveillance
vehicle detection
feature based detection
dynamic baysian network
boosting hog
linear svm classification
nonlinear financial time series
normalized mutual information function
orcs
lrm
distributed spanning tree
mobile peer to peer network
aco
global replica management
public-key infrastructure
public-key cryptography
elliptic curve cryptography
anticipating
knn
minutiae; fingerprint; segmentation; image thinnin
photovoltaic system
water pumping
irrigation
retscreen software
information retrieval (ir)
word sense disambiguation (wsd)
ambiguity
polysemous words
false report injection attacks
probabilistic voting-based filtering scheme
false vote injection attacks
Mehr anzeigen
- Präsentationen
- Dokumente
- Infografiken