Results 251 to 260 of about 90,690 (297)

Intelligent Control Strategy of a Battery Energy Storage for a Climate‐Controlled Greenhouse with a High Proportion of Local Renewable Energy

open access: yesIEEJ Transactions on Electrical and Electronic Engineering, EarlyView.
Greenhouse cultivation offers the advantage of controlled growth conditions, leading to enhanced crop productivity and quality. However, maintaining these optimal conditions requires substantial energy, resulting in increased greenhouse gas emissions and operational costs. Integrating local renewable energy sources, particularly photovoltaic (PV) solar
Akihiro Funaki, Jorge Solis
wiley   +1 more source

Graph neural network‐based attack prediction for communication‐based train control systems

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract The Advanced Persistent Threats (APTs) have emerged as one of the key security challenges to industrial control systems. APTs are complex multi‐step attacks, and they are naturally diverse and complex. Therefore, it is important to comprehend the behaviour of APT attackers and anticipate the upcoming attack actions.
Junyi Zhao   +3 more
wiley   +1 more source

LSTM guided homomorphic encryption for threat-resistant IoT networks. [PDF]

open access: yesDiscov Comput
Kumar S   +5 more
europepmc   +1 more source

ECG‐TransCovNet: A hybrid transformer model for accurate arrhythmia detection using Electrocardiogram signals

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Abnormalities in the heart's rhythm, known as arrhythmias, pose a significant threat to global health, often leading to severe cardiac conditions and sudden cardiac deaths. Therefore, early and accurate detection of arrhythmias is crucial for timely intervention and potentially life‐saving treatment.
Hasnain Ali Shah   +4 more
wiley   +1 more source

AC-LSTM: Adaptive clockwork LSTM for network traffic prediction

open access: yesJournal of Information and Intelligence
Yunfeng Ge   +4 more
openaire   +1 more source

Robust steganographic framework for securing sensitive healthcare data of telemedicine using convolutional neural network

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Data is the key element that runs the modern society. Large amounts of data are being released day by day as a result of many activities. The digital data is transferred through the Internet which may be vulnerable to attacks while transmitting. Especially, the medical data is observed to be of at most importance.
Rupa Ch   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy