Results 81 to 90 of about 32,551 (228)
Design of Central Unit for Voltage Estimation-based Load Shedding Methods to Deal with FIDVR [PDF]
Fault-induced delayed voltage recovery (FIDVR) occurs after a fault in the network with high penetration of induction motor (IM) loads. Load shedding (LS) is one of the appropriate methods to reduce the destructive effects of FIDVR on the network, and ...
Mahdi Ghotbi-Maleki +3 more
doaj +1 more source
MicroTCA implementation of synchronous Ethernet-Based DAQ systems for large scale experiments
Large LAr TPCs are among the most powerful detectors to address open problems in particle and astro-particle physics, such as CP violation in leptonic sector, neutrino properties and their astrophysical implications, proton decay search etc. The scale of
Autiero, D. +5 more
core +3 more sources
Structure of technology evolution: The way on which ICT industry emerged in Korea [PDF]
The role of ICT in the economic growth in Korea is a great attraction to the telecommunication society interested in the relationship among ICT, innovation policy and economic growth.
Hwang, Junseok +3 more
core
Application of artificial neural network in market segmentation: A review on recent trends
Despite the significance of Artificial Neural Network (ANN) algorithm to market segmentation, there is a need of a comprehensive literature review and a classification system for it towards identification of future trend of market segmentation research ...
Chakraborty, Partha Sarathi +3 more
core +1 more source
ABSTRACT Generative artificial intelligence (AI) can transform research and development (R&D) by enhancing efficiency, accelerating product development, and fostering innovation. As companies seek to integrate this technology, understanding the role of organizational readiness and AI literacy as well as generative AI's impact on innovation capacity ...
Stefanie Steinhauser, Paulina Heid
wiley +1 more source
Classification of Existing Virtualization Methods Used in Telecommunication Networks
This article studies the existing methods of virtualization of different resources. The positive and negative aspects of each of the methods are analyzed, the perspectivity of the approach is noted.
Ageyev, Dmytro +3 more
core +1 more source
The Many Shades of Clouds: How Law Fails (Us) in Seeing Power in the Digital Economy
ABSTRACT Cloud infrastructures form the backbone of our contemporary (digital) production environment. Despite their centrality, legal and scholarly practice have not been treating cloud infrastructures as single objects of/for study. In other words, we have laws for regulating services and products that flow from (within) cloud infrastructures, but we
Petros Terzis +2 more
wiley +1 more source
A Survey for Deep Reinforcement Learning Based Network Intrusion Detection
This paper surveys deep reinforcement learning (DRL) for network intrusion detection, evaluating model efficiency, minority attack detection, and dataset imbalance. Findings show DRL achieves state‐of‐the‐art results on public datasets, sometimes surpassing traditional deep learning.
Wanrong Yang +3 more
wiley +1 more source
Abstract Timely detection of problematic research is essential for safeguarding scientific integrity. To explore whether social media commentary can serve as an early indicator of potentially problematic articles, this study analyzed 3815 tweets referencing 604 retracted articles and 3373 tweets referencing 668 comparable non‐retracted articles. Tweets
Er‐Te Zheng +3 more
wiley +1 more source
Opening the Black Box of EU Digital Sovereignty: A Macro‐Level Analysis of the Concept's Development
ABSTRACT Digital sovereignty has emerged as a central organizing principle in European Union governance, yet systematic understanding of its conceptual evolution remains limited. This article provides the first macro‐level analysis of how digital sovereignty evolves across institutional and academic domains.
Aleksei Turobov +2 more
wiley +1 more source

