Search alternatives:
decrease » increase (Expand Search)
challenge » challenges (Expand Search)
Showing 1 - 20 results of 252 for search '(( ((significant threat) OR (significant decrease)) based ) OR ( significant challenge decrease ))', query time: 0.13s Refine Results
  1. 1

    Hybrid deep learning based threat intelligence framework for Industrial IoT systems by Jahanzaib Malik (23718816)

    Published 2025
    “…However, the increased pervasiveness, reduced human involvement, resource-constrained nature of underlying IoT devices, dynamic and shared spectrum of 4G/5G communication, and reliance on the cloud for outsourced massive storage and computation bring novel security challenges and concerns. A significant challenge currently confronting the Industrial Internet of Things (IIoT) is the increasing prevalence of sophisticated IoT malware threats and attacks. …”
  2. 2
  3. 3

    Significance of Avicennia Marina in the Arabian Gulf Environment: A Review by Kaiprath Puthiyapurayil Haseeba (21392966)

    Published 2025
    “…However, in the past two decades Gulf mangroves have been facing significant threats, including extensive coastal development, shoreline modification by establishing marinas and ports, and climate change-associated impacts such as sea-level rise and altered precipitation patterns, which pose significant risks to this fragile ecosystem. …”
  4. 4

    Generative AI: a double-edged sword in the cyber threat landscape by Werisha Ibrar (21635153)

    Published 2025
    “…Its usage by malevolent entities to automate intricate malware creation poses a significant threat, circumventing conventional defensive measures. …”
  5. 5

    O-Cloud Security: A Comprehensive Survey of Threats, Mitigation Strategies, and Future Directions by Muhammad J. Shehab (16905174)

    Published 2025
    “…Through this analysis, we aim to provide an in-depth survey aimed at strengthening O-Cloud-based telecom networks against cybersecurity threats and ensuring data and services’ integrity. …”
  6. 6
  7. 7

    Kefir exhibits anti‑proliferative and pro‑apoptotic effects on colon adenocarcinoma cells with no significant effects on cell migration and invasion by Khoury, Nathalie

    Published 2014
    “…Results from RT‑PCR showed that kefir decreases the expression of transforming growth factor α (TGF‑α); and transforming growth factor‑β1 (TGF‑β1) in HT‑29 cells. …”
    Get full text
    Get full text
    Get full text
    article
  8. 8

    Mirizzi Syndrome: Mastering the Challenge, Characterization and Management Outcomes in a Retrospective Study of 60 Cases by Yousef Yahia (19756989)

    Published 2024
    “…Liver enzyme and bilirubin levels were significantly higher in the advanced types. Preoperative diagnosis was achieved in 70% of patients, with MRCP and ERCP being the most effective diagnostic tools. …”
  9. 9

    Thermal challenges in lithium-ion battery technology: Investigating performance and thermal stability by Kenza Maher (22803425)

    Published 2025
    “…However, ensuring the safety and reliability of these batteries in desert environments presents significant challenges due to high temperatures, pervasive dust, and limited cooling mechanisms. …”
  10. 10

    Addressing Challenges of Distance Learning in the Pandemic with Edge Intelligence Enabled Multicast and Caching Solution by Kashif Bilal (16896357)

    Published 2022
    “…While exploring the opportunities of EI-enabled distance learning, we demonstrate a significant reduction in network operator resource utilization and an increase in user QoE for VNF based multicast transmission.…”
  11. 11

    Optimisation of PV Cleaning Practices: Comparison Between Performance Based and Periodic Based Approaches by ALHAJERI, RASHED ABDULLA

    Published 2018
    “…Periodic based automatic cleaning showed decreases in improvement of between 164.64% to 245.34%. …”
    Get full text
  12. 12

    Multilayer Reversible Data Hiding Based on the Difference Expansion Method Using Multilevel Thresholding of Host Images Based on the Slime Mould Algorithm by Abu Zitar, Raed

    Published 2022
    “…One of the well-known designs of RDH is the difference expansion (DE) method. In the DE-based RDH method, finding spaces that create less distortion in the marked image is a significant challenge, and has a high insertion capacity. …”
    Get full text
  13. 13

    Toward Adaptive Intrusion Detection Systems for UAVs Using Cyber-Physical Image Analysis by Hanane Amirat (23126110)

    Published 2025
    “…<p dir="ltr">The rapid proliferation of uncrewed aerial vehicles (UAVs) across modern applications has significantly heightened their susceptibility to cyber and physical security threats. …”
  14. 14
  15. 15
  16. 16

    Cellulose-based materials for antimicrobial water treatment: functionalization strategies and applications by Radha, Remya

    Published 2025
    “…Water contamination by pathogenic microorganisms poses a significant threat to public health and ecosystems, necessitating the development of sustainable and efficient water decontamination technologies. …”
    Get full text
    article
  17. 17

    An Improved Genghis Khan Optimizer based on Enhanced Solution Quality Strategy for Global Optimization and Feature Selection Problems by Abdel-Salam, Mahmoud

    Published 2024
    “…It utilizes Quasi-opposite-based learning (QOBL) to enhance the best solution obtained and, consequently, the entire population. …”
    Get full text
  18. 18

    Competition vs cooperation: An agent based model for sustainable tomatoes’ import system by Sarah Namany (17268922)

    Published 2024
    “…Interactions between trade partners are modeled using two game theoretic approaches counting<u> Cournot</u><u> competition</u> and <u>Cartel</u> collusion. Based on the research findings, a competitive global market can bring economic benefits to Qatar as an importing nation, but this approach also entails substantial <u>water consumption</u> and results in significant environmental emissions. …”
  19. 19

    Novel interpretable and robust web-based AI platform for phishing email detection by Abdulla Al-Subaiey (19757007)

    Published 2024
    “…<p dir="ltr">Phishing emails continue to pose a significant threat, causing financial losses and security breaches. …”
  20. 20