Search alternatives:
algorithm a » algorithm fa (Expand Search), algorithms a (Expand Search), algorithm _ (Expand Search)
technologies » technology (Expand Search)
algorithm a » algorithm fa (Expand Search), algorithms a (Expand Search), algorithm _ (Expand Search)
technologies » technology (Expand Search)
-
161
CubeSat Communication Subsystems: A Review of On-Board Transceiver Architectures, Protocols, and Performance
Published 2023“…<p dir="ltr">Small satellite communications recently entered a period of massive interest driven by the uprising commercial and civil space applications and motivated by various technological advances. …”
-
162
-
163
Artificial Intelligence Driven Smart Farming for Accurate Detection of Potato Diseases: A Systematic Review
Published 2024“…<p dir="ltr">Agriculture can ensure food security and enhance monetary benefits if practiced with modern technologies and supported with artificial intelligence (AI). …”
-
164
A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method
Published 2022“…<p>Communication has become a lot easier in this era of technology, development of high-speed computer networks, and the inexpensive uses of Internet. …”
-
165
Information warfare
Published 2017“…While preventive measures could be overcome and detection measures could detect an attack late after damage has occurred, there is a need for a recovery algorithm that will recover the database to its correct previous state before the attack. …”
Get full text
Get full text
Get full text
Get full text
article -
166
Scrambled Prime Key Encryption
Published 2018“…Information security has become an important issue in the modern world as the popularity of internet commerce and communication technologies have emerged, making them a prospective medium to security threats. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
167
Deep Learning in the Fast Lane: A Survey on Advanced Intrusion Detection Systems for Intelligent Vehicle Networks
Published 2024“…Our systematic review covers a range of AI algorithms, including traditional ML, and advanced neural network models, such as Transformers, illustrating their effectiveness in IDS applications within IVNs. …”
-
168
Combined cycle gas turbine system optimization for extended range electric vehicles
Published 2020“…The two-steps methodology consists of conducting first an exergo-technological analysis using a Non-dominated Sorting Genetic Algorithm to identify the best suitable combined cycle configuration for integration in a series hybrid powertrain. …”
Get full text
Get full text
Get full text
Get full text
article -
169
-
170
The political economy of AI: a content analysis of ChatGPT outputs and anti-Palestinian media bias
Published 2026“…Palestine represents a site of digital occupation and a laboratory for the Israeli military–industrial–communications complex that entails collaboration between Israeli military, technology and academia. …”
Get full text
Get full text
Get full text
Get full text
article -
171
Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review
Published 2023“…</p><p> </p></div><h2>Other Information</h2> <p> Published in: Journal of Big Data<br> License: <a href="https://creativecommons.org/licenses/by/4.0" target="_blank">https://creativecommons.org/licenses/by/4.0</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1186/s40537-023-00805-5" target="_blank">https://dx.doi.org/10.1186/s40537-023-00805-5</a></p>…”
-
172
Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare
Published 2007“…With the advancement of Internet technology, securing information systems from electronic attacks have become a significant concern. …”
Get full text
Get full text
Get full text
article -
173
-
174
Artificial intelligence based anomaly detection of energy consumption in buildings: A review, current trends and new perspectives
Published 2021“…Specifically, an extensive survey is presented, in which a comprehensive taxonomy is introduced to classify existing algorithms based on different modules and parameters adopted, such as machine learning algorithms, feature extraction approaches, anomaly detection levels, computing platforms and application scenarios. …”
-
175
-
176
A geographic information system method to generate long term regional solar radiation resource maps: enhancing decision-making
Published 2024“…<p dir="ltr">A long-term regional solar energy assessment improves decision-making processes for the selection of the best solar energy technology and helps understand how to define focused policies and investments. …”
-
177
Towards a self-powering greenhouse using semi-transparent PV: Utilizing hybrid BESS-hydrogen energy storage system
Published 2025“…Second, by employing a comprehensive approach with the GBO algorithm, the research examines various scenarios as a multi-objective optimization problem, balancing economic considerations such as net present value (NPV) and energy dependency (ED). …”
Get full text
Get full text
Get full text
article -
178
Towards a self-powering greenhouse using semi-transparent PV: Utilizing hybrid BESS-hydrogen energy storage system
Published 2024“…Second, by employing a comprehensive approach with the GBO algorithm, the research examines various scenarios as a multi-objective optimization problem, balancing economic considerations such as net present value (NPV) and energy dependency (ED). …”
-
179
-
180
Smart non-intrusive appliance identification using a novel local power histogramming descriptor with an improved k-nearest neighbors classifier
Published 2021“…<p dir="ltr">Non-intrusive load monitoring (NILM) is a key cost-effective technology for monitoring power consumption and contributing to several challenges encountered when transiting to an efficient, sustainable, and competitive energy efficiency environment. …”