Results 231 to 240 of about 167,829 (332)

AUTOMATIC TELLER MACHINE USING HASH TABLE [PDF]

open access: green, 2013
KUSUMANINGTYAS, SESILIA NOVITA
openalex  

Query-Adaptive Reciprocal Hash Tables for Nearest Neighbor Search

open access: green, 2015
Xianglong Liu   +4 more
openalex   +2 more sources

Warming Trend in the Western Indian Ocean Driven by Oceanic Transport

open access: yesJournal of Geophysical Research: Oceans, Volume 131, Issue 1, January 2026.
Abstract The ocean has absorbed over 90% of the excess heat trapped in the Earth system due to rising greenhouse gas emissions, with upper layers playing a crucial role. This study finds that 35% of the total ocean heat content (OHC) in the western Indian Ocean is stored within the upper 300 m.
Ligin Joseph   +6 more
wiley   +1 more source

Digital‐Twin‐Enabled, Time‐Aware Anomaly Detection for Industrial Cyber‐Physical Systems

open access: yesDigital Twins and Applications, Volume 3, Issue 1, January/December 2026.
The graphical abstract (Graphical Abstract figure) summarises the proposed pipeline: multivariate ICS data streams are windowed and normalised, fed into a temporal LSTM–DNN encoder and per‐sensor operating‐envelope learner, combined via calibrated fusion and finally surfaced through an operator‐facing digital twin that provides event timelines, top ...
Wulfran Fendzi Mbasso   +5 more
wiley   +1 more source

Improving the Throughput of Distributed Hash Tables Using Congestion-Aware Routing [PDF]

open access: gold, 2007
Fabius Klemm   +3 more
openalex  

Design and Implementation of XGBoost‐Based Cyberattack Detection and Blockchain‐Enabled Charging Station

open access: yesDigital Twins and Applications, Volume 3, Issue 1, January/December 2026.
The charging station (CS) plays a crucial role in charging electric vehicles. Therefore, it is necessary to protect the CS from cyberattacks. This paper proposes an architecture for the security of the EV fleet during charging using the XGBoost model and Hyperledger Fabric to protect battery management systems (BMS) from cyberattacks.
Gaurav Kumar, Suresh Mikkili
wiley   +1 more source

Home - About - Disclaimer - Privacy