Showing 161 - 180 results of 304 for search 'algorithm a technologies', query time: 0.07s Refine Results
  1. 161

    CubeSat Communication Subsystems: A Review of On-Board Transceiver Architectures, Protocols, and Performance by Amr Zeedan (17983750)

    Published 2023
    “…<p dir="ltr">Small satellite communications recently entered a period of massive interest driven by the uprising commercial and civil space applications and motivated by various technological advances. …”
  2. 162
  3. 163

    Artificial Intelligence Driven Smart Farming for Accurate Detection of Potato Diseases: A Systematic Review by Avneet Kaur (712349)

    Published 2024
    “…<p dir="ltr">Agriculture can ensure food security and enhance monetary benefits if practiced with modern technologies and supported with artificial intelligence (AI). …”
  4. 164

    A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method by Shahid Rahman (16904613)

    Published 2022
    “…<p>Communication has become a lot easier in this era of technology, development of high-speed computer networks, and the inexpensive uses of Internet. …”
  5. 165

    Information warfare by Haraty, Ramzi A.

    Published 2017
    “…While preventive measures could be overcome and detection measures could detect an attack late after damage has occurred, there is a need for a recovery algorithm that will recover the database to its correct previous state before the attack. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  6. 166

    Scrambled Prime Key Encryption by Haraty, Ramzi A.

    Published 2018
    “…Information security has become an important issue in the modern world as the popularity of internet commerce and communication technologies have emerged, making them a prospective medium to security threats. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  7. 167

    Deep Learning in the Fast Lane: A Survey on Advanced Intrusion Detection Systems for Intelligent Vehicle Networks by Mohammed Almehdhar (22046597)

    Published 2024
    “…Our systematic review covers a range of AI algorithms, including traditional ML, and advanced neural network models, such as Transformers, illustrating their effectiveness in IDS applications within IVNs. …”
  8. 168

    Combined cycle gas turbine system optimization for extended range electric vehicles by Barakat, Aya A.

    Published 2020
    “…The two-steps methodology consists of conducting first an exergo-technological analysis using a Non-dominated Sorting Genetic Algorithm to identify the best suitable combined cycle configuration for integration in a series hybrid powertrain. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  9. 169
  10. 170

    The political economy of AI: a content analysis of ChatGPT outputs and anti-Palestinian media bias by King, Gretchen

    Published 2026
    “…Palestine represents a site of digital occupation and a laboratory for the Israeli military–industrial–communications complex that entails collaboration between Israeli military, technology and academia. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  11. 171

    Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review by Yasir Ali (799969)

    Published 2023
    “…</p><p> </p></div><h2>Other Information</h2> <p> Published in: Journal of Big Data<br> License: <a href="https://creativecommons.org/licenses/by/4.0" target="_blank">https://creativecommons.org/licenses/by/4.0</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1186/s40537-023-00805-5" target="_blank">https://dx.doi.org/10.1186/s40537-023-00805-5</a></p>…”
  12. 172

    Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare by Haraty, Ramzi A.

    Published 2007
    “…With the advancement of Internet technology, securing information systems from electronic attacks have become a significant concern. …”
    Get full text
    Get full text
    Get full text
    article
  13. 173
  14. 174

    Artificial intelligence based anomaly detection of energy consumption in buildings: A review, current trends and new perspectives by Yassine Himeur (14158821)

    Published 2021
    “…Specifically, an extensive survey is presented, in which a comprehensive taxonomy is introduced to classify existing algorithms based on different modules and parameters adopted, such as machine learning algorithms, feature extraction approaches, anomaly detection levels, computing platforms and application scenarios. …”
  15. 175
  16. 176

    A geographic information system method to generate long term regional solar radiation resource maps: enhancing decision-making by Sachin Jain (19161721)

    Published 2024
    “…<p dir="ltr">A long-term regional solar energy assessment improves decision-making processes for the selection of the best solar energy technology and helps understand how to define focused policies and investments. …”
  17. 177

    Towards a self-powering greenhouse using semi-transparent PV: Utilizing hybrid BESS-hydrogen energy storage system by Gholami, Mohammadreza

    Published 2025
    “…Second, by employing a comprehensive approach with the GBO algorithm, the research examines various scenarios as a multi-objective optimization problem, balancing economic considerations such as net present value (NPV) and energy dependency (ED). …”
    Get full text
    Get full text
    Get full text
    article
  18. 178

    Towards a self-powering greenhouse using semi-transparent PV: Utilizing hybrid BESS-hydrogen energy storage system by Mohammadreza Gholami (17032317)

    Published 2024
    “…Second, by employing a comprehensive approach with the GBO algorithm, the research examines various scenarios as a multi-objective optimization problem, balancing economic considerations such as net present value (NPV) and energy dependency (ED). …”
  19. 179
  20. 180

    Smart non-intrusive appliance identification using a novel local power histogramming descriptor with an improved k-nearest neighbors classifier by Yassine Himeur (14158821)

    Published 2021
    “…<p dir="ltr">Non-intrusive load monitoring (NILM) is a key cost-effective technology for monitoring power consumption and contributing to several challenges encountered when transiting to an efficient, sustainable, and competitive energy efficiency environment. …”