Results 251 to 260 of about 90,690 (297)
Greenhouse cultivation offers the advantage of controlled growth conditions, leading to enhanced crop productivity and quality. However, maintaining these optimal conditions requires substantial energy, resulting in increased greenhouse gas emissions and operational costs. Integrating local renewable energy sources, particularly photovoltaic (PV) solar
Akihiro Funaki, Jorge Solis
wiley +1 more source
Lightweight EEG Phase Prediction Based on Channel Attention and Spatio-Temporal Parallel Processing. [PDF]
Duan S, Yan Y, Guo Q, Li F, Liang H.
europepmc +1 more source
Graph neural network‐based attack prediction for communication‐based train control systems
Abstract The Advanced Persistent Threats (APTs) have emerged as one of the key security challenges to industrial control systems. APTs are complex multi‐step attacks, and they are naturally diverse and complex. Therefore, it is important to comprehend the behaviour of APT attackers and anticipate the upcoming attack actions.
Junyi Zhao +3 more
wiley +1 more source
LSTM guided homomorphic encryption for threat-resistant IoT networks. [PDF]
Kumar S +5 more
europepmc +1 more source
Abstract Abnormalities in the heart's rhythm, known as arrhythmias, pose a significant threat to global health, often leading to severe cardiac conditions and sudden cardiac deaths. Therefore, early and accurate detection of arrhythmias is crucial for timely intervention and potentially life‐saving treatment.
Hasnain Ali Shah +4 more
wiley +1 more source
Estimating weaning duration from incremental dentine δ15N and δ13C using a sequence-based LSTM neural network: A deep learning framework for bioarchaeological applications. [PDF]
Ganiatsou E +2 more
europepmc +1 more source
AC-LSTM: Adaptive clockwork LSTM for network traffic prediction
Yunfeng Ge +4 more
openaire +1 more source
Abstract Data is the key element that runs the modern society. Large amounts of data are being released day by day as a result of many activities. The digital data is transferred through the Internet which may be vulnerable to attacks while transmitting. Especially, the medical data is observed to be of at most importance.
Rupa Ch +4 more
wiley +1 more source

