Results 81 to 90 of about 32,551 (228)

Design of Central Unit for Voltage Estimation-based Load Shedding Methods to Deal with FIDVR [PDF]

open access: yesAUT Journal of Electrical Engineering
Fault-induced delayed voltage recovery (FIDVR) occurs after a fault in the network with high penetration of induction motor (IM) loads. Load shedding (LS) is one of the appropriate methods to reduce the destructive effects of FIDVR on the network, and ...
Mahdi Ghotbi-Maleki   +3 more
doaj   +1 more source

MicroTCA implementation of synchronous Ethernet-Based DAQ systems for large scale experiments

open access: yes, 2009
Large LAr TPCs are among the most powerful detectors to address open problems in particle and astro-particle physics, such as CP violation in leptonic sector, neutrino properties and their astrophysical implications, proton decay search etc. The scale of
Autiero, D.   +5 more
core   +3 more sources

Structure of technology evolution: The way on which ICT industry emerged in Korea [PDF]

open access: yes, 2013
The role of ICT in the economic growth in Korea is a great attraction to the telecommunication society interested in the relationship among ICT, innovation policy and economic growth.
Hwang, Junseok   +3 more
core  

Application of artificial neural network in market segmentation: A review on recent trends

open access: yes, 2012
Despite the significance of Artificial Neural Network (ANN) algorithm to market segmentation, there is a need of a comprehensive literature review and a classification system for it towards identification of future trend of market segmentation research ...
Chakraborty, Partha Sarathi   +3 more
core   +1 more source

Organizational Readiness, AI Literacy, and the New Frontier of R&D: How Generative AI Shapes Innovation Capacity

open access: yesR&D Management, EarlyView.
ABSTRACT Generative artificial intelligence (AI) can transform research and development (R&D) by enhancing efficiency, accelerating product development, and fostering innovation. As companies seek to integrate this technology, understanding the role of organizational readiness and AI literacy as well as generative AI's impact on innovation capacity ...
Stefanie Steinhauser, Paulina Heid
wiley   +1 more source

Classification of Existing Virtualization Methods Used in Telecommunication Networks

open access: yes, 2019
This article studies the existing methods of virtualization of different resources. The positive and negative aspects of each of the methods are analyzed, the perspectivity of the approach is noted.
Ageyev, Dmytro   +3 more
core   +1 more source

The Many Shades of Clouds: How Law Fails (Us) in Seeing Power in the Digital Economy

open access: yesRegulation &Governance, EarlyView.
ABSTRACT Cloud infrastructures form the backbone of our contemporary (digital) production environment. Despite their centrality, legal and scholarly practice have not been treating cloud infrastructures as single objects of/for study. In other words, we have laws for regulating services and products that flow from (within) cloud infrastructures, but we
Petros Terzis   +2 more
wiley   +1 more source

A Survey for Deep Reinforcement Learning Based Network Intrusion Detection

open access: yesApplied AI Letters, Volume 7, Issue 2, June 2026.
This paper surveys deep reinforcement learning (DRL) for network intrusion detection, evaluating model efficiency, minority attack detection, and dataset imbalance. Findings show DRL achieves state‐of‐the‐art results on public datasets, sometimes surpassing traditional deep learning.
Wanrong Yang   +3 more
wiley   +1 more source

Can social media provide early warning of retraction? Evidence from critical tweets identified by human annotation and large language models

open access: yesJournal of the Association for Information Science and Technology, Volume 77, Issue 4, Page 624-639, April 2026.
Abstract Timely detection of problematic research is essential for safeguarding scientific integrity. To explore whether social media commentary can serve as an early indicator of potentially problematic articles, this study analyzed 3815 tweets referencing 604 retracted articles and 3373 tweets referencing 668 comparable non‐retracted articles. Tweets
Er‐Te Zheng   +3 more
wiley   +1 more source

Opening the Black Box of EU Digital Sovereignty: A Macro‐Level Analysis of the Concept's Development

open access: yesGovernance, Volume 39, Issue 2, April 2026.
ABSTRACT Digital sovereignty has emerged as a central organizing principle in European Union governance, yet systematic understanding of its conceptual evolution remains limited. This article provides the first macro‐level analysis of how digital sovereignty evolves across institutional and academic domains.
Aleksei Turobov   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy