بدائل البحث:
decrease » increase (توسيع البحث)
يعرض 1 - 20 نتائج من 281 نتيجة بحث عن '(( ((significant threat) OR (significant decrease)) based ) OR ( significant overall decrease ))', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 1

    Hybrid deep learning based threat intelligence framework for Industrial IoT systems حسب Jahanzaib Malik (23718816)

    منشور في 2025
    "…However, the increased pervasiveness, reduced human involvement, resource-constrained nature of underlying IoT devices, dynamic and shared spectrum of 4G/5G communication, and reliance on the cloud for outsourced massive storage and computation bring novel security challenges and concerns. A significant challenge currently confronting the Industrial Internet of Things (IIoT) is the increasing prevalence of sophisticated IoT malware threats and attacks. …"
  2. 2

    Improving the Performance Measurement Using Overall Equipment Effectiveness (OEE) in Borouge حسب ALMUTAWA, MUBARAK

    منشور في 2023
    "…The main issue found relating to the two extruder production lines productivity was where availability and quality show a significant decrease. Thus, data were collected for 12 months from the two extruders and analysed using Microsoft Excel Software to determine the value of the output table and presented graphically. …"
    احصل على النص الكامل
  3. 3
  4. 4

    Significance of Avicennia Marina in the Arabian Gulf Environment: A Review حسب Kaiprath Puthiyapurayil Haseeba (21392966)

    منشور في 2025
    "…However, in the past two decades Gulf mangroves have been facing significant threats, including extensive coastal development, shoreline modification by establishing marinas and ports, and climate change-associated impacts such as sea-level rise and altered precipitation patterns, which pose significant risks to this fragile ecosystem. …"
  5. 5

    Generative AI: a double-edged sword in the cyber threat landscape حسب Werisha Ibrar (21635153)

    منشور في 2025
    "…Its usage by malevolent entities to automate intricate malware creation poses a significant threat, circumventing conventional defensive measures. …"
  6. 6

    O-Cloud Security: A Comprehensive Survey of Threats, Mitigation Strategies, and Future Directions حسب Muhammad J. Shehab (16905174)

    منشور في 2025
    "…Through this analysis, we aim to provide an in-depth survey aimed at strengthening O-Cloud-based telecom networks against cybersecurity threats and ensuring data and services’ integrity. …"
  7. 7
  8. 8

    Kefir exhibits anti‑proliferative and pro‑apoptotic effects on colon adenocarcinoma cells with no significant effects on cell migration and invasion حسب Khoury, Nathalie

    منشور في 2014
    "…Results from RT‑PCR showed that kefir decreases the expression of transforming growth factor α (TGF‑α); and transforming growth factor‑β1 (TGF‑β1) in HT‑29 cells. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  9. 9

    Optimisation of PV Cleaning Practices: Comparison Between Performance Based and Periodic Based Approaches حسب ALHAJERI, RASHED ABDULLA

    منشور في 2018
    "…Periodic based automatic cleaning showed decreases in improvement of between 164.64% to 245.34%. …"
    احصل على النص الكامل
  10. 10

    Toward Adaptive Intrusion Detection Systems for UAVs Using Cyber-Physical Image Analysis حسب Hanane Amirat (23126110)

    منشور في 2025
    "…<p dir="ltr">The rapid proliferation of uncrewed aerial vehicles (UAVs) across modern applications has significantly heightened their susceptibility to cyber and physical security threats. …"
  11. 11

    Multilayer Reversible Data Hiding Based on the Difference Expansion Method Using Multilevel Thresholding of Host Images Based on the Slime Mould Algorithm حسب Abu Zitar, Raed

    منشور في 2022
    "…One of the well-known designs of RDH is the difference expansion (DE) method. In the DE-based RDH method, finding spaces that create less distortion in the marked image is a significant challenge, and has a high insertion capacity. …"
    احصل على النص الكامل
  12. 12
  13. 13
  14. 14

    Cellulose-based materials for antimicrobial water treatment: functionalization strategies and applications حسب Radha, Remya

    منشور في 2025
    "…Water contamination by pathogenic microorganisms poses a significant threat to public health and ecosystems, necessitating the development of sustainable and efficient water decontamination technologies. …"
    احصل على النص الكامل
    article
  15. 15

    An Improved Genghis Khan Optimizer based on Enhanced Solution Quality Strategy for Global Optimization and Feature Selection Problems حسب Abdel-Salam, Mahmoud

    منشور في 2024
    "…It utilizes Quasi-opposite-based learning (QOBL) to enhance the best solution obtained and, consequently, the entire population. …"
    احصل على النص الكامل
  16. 16

    Second-law-based performance evaluation of cooling towers and evaporative heat exchangers حسب QURESHI, BILAL AHMED

    منشور في 2020
    "…Furthermore, it is understood that the variation in the dead state does not significantly affect the overall efficiency of the system. © 2006 Elsevier Masson SAS. …"
    احصل على النص الكامل
    article
  17. 17

    Novel interpretable and robust web-based AI platform for phishing email detection حسب Abdulla Al-Subaiey (19757007)

    منشور في 2024
    "…<p dir="ltr">Phishing emails continue to pose a significant threat, causing financial losses and security breaches. …"
  18. 18

    Competition vs cooperation: An agent based model for sustainable tomatoes’ import system حسب Sarah Namany (17268922)

    منشور في 2024
    "…Interactions between trade partners are modeled using two game theoretic approaches counting<u> Cournot</u><u> competition</u> and <u>Cartel</u> collusion. Based on the research findings, a competitive global market can bring economic benefits to Qatar as an importing nation, but this approach also entails substantial <u>water consumption</u> and results in significant environmental emissions. …"
  19. 19

    Security Analysis of Integrated HAP-Based FSO and UAV-Enabled RF Downlink Communications حسب Mohammad Javad Saber (4334227)

    منشور في 2024
    "…We investigate the secrecy performance of an integrated HAP-based FSO and unmanned aerial vehicle (UAV)-enabled radio frequency (RF) downlink system using the decode-and-forward relaying protocol. …"
  20. 20

    A Novel Versatile Framework for Enabling Early Detection of Evolving Network-based Cyberattacks حسب THOMAS, RAJESH

    منشور في 2025
    "…Network-based cyber-attacks have been increasing in scale, frequency and sophistication, posing significant threats to nation states and organizations worldwide. …"
    احصل على النص الكامل