Topic Review
The Hussaini Encyclopedia
The Hussaini Encyclopedia (Arabic - دائرة المعارف الحسينية - Dāʾirat al-maʿārif al-Ḥusaynīyah) is a one-of-a-kind encyclopedia in Arabic, completely themed on the third Holy Imam, Husayn ibn Ali, his biography, thought and way of conduct, as well as on the social circle of personalities around him and also of places, chronicles and various other related subjects. This encyclopedia consisted of 700 volumes and well over 95 million words. Sheikh Mohammed Sadiq Al-Karbassi, author of the voluminous Arabic encyclopedia dedicated to Imam al-Hussain started his work by establishing the Hussaini Center for Research in London in 1993. The Hussaini Encyclopedia is a historic study of al-Hussain which provides a heritage owing to its impact on all events, particularly the aftermath of battle of Karbala with its impact being observed in recent times.
  • 674
  • 01 Dec 2022
Topic Review
AI Enabling Technologies in Physical Layer Security
With the proliferation of 5G mobile networks within next-generation wireless communication, the design and optimization of 5G networks are progressing in the direction of improving the physical layer security (PLS) paradigm. This phenomenon is due to the fact that traditional methods for the network optimization of PLS fail to adapt new features, technologies, and resource management to diversified demand applications. To improve these methods, future 5G and beyond 5G (B5G) networks will need to rely on new enabling technologies. Therefore, approaches for PLS design and optimization that are based on artificial intelligence (AI) and machine learning (ML) have been corroborated to outperform traditional security technologies. This will allow future 5G networks to be more intelligent and robust in order to significantly improve the performance of system design over traditional security methods.
  • 674
  • 23 May 2022
Topic Review
Packard Bell Statesman
The Packard Bell Statesman was an economy line of notebook computers introduced in 1993 by Packard Bell. They were slower in performance and lacked features compared to most competitor products, but they were lower in price. It was created in a collaboration between Packard Bell and Zenith Data Systems. The Statesman series was essentially a rebrand of Zenith Data Systems Z-Star 433 series, with the only notable difference of the logo in the middle and text on the front bezel.
  • 674
  • 27 Oct 2022
Topic Review
Advanced Security Framework for Internet of Things
Due to the massive accessibility and interconnection of IoT devices, systems are at risk of being exploited by hackers. Therefore, there is a need to find an advanced security framework that covers data security, data confidentiality, and data integrity issues. 
  • 673
  • 04 Jul 2022
Topic Review
Trends in Malware Detection
Monitoring Indicators of Compromise (IOC) leads to malware detection for identifying malicious activity. Malicious activities potentially lead to a system breach or data compromise. Various tools and anti-malware products exist for the detection of malware and cyberattacks utilizing IOCs, but all have several shortcomings. In the quest to fight zero-day attacks, the research paradigm shifted from primitive methods to classical machine learning-based methods, then to deep learning-based methods.
  • 673
  • 20 Oct 2022
Topic Review
Leech (Computing)
In computing and specifically Internet, a leech is one who benefits, usually deliberately, from others' information or effort but does not offer anything in return, or makes only token offerings in an attempt to avoid being called a leech. In economics, this type of behavior is called "free riding" and is associated with the free rider problem. Depending on context, leeching does not necessarily refer to illegal use of computer resources, but often instead to greedy use according to etiquette: to wit, using too much of what is freely given without contributing a reasonable amount back to the community that provides it. The name derives from the leech, an animal that sucks blood and then tries to leave unnoticed. Other terms are used, such as "freeloader" and "sponge", but leech is the most common.
  • 673
  • 16 Nov 2022
Topic Review
Transformers for Computer Vision
Vision transformers (ViTs) are designed for tasks related to vision, including image recognition. Originally, transformers were used to process natural language (NLP). As a special type of transformer, vision transformers (ViTs) can be used for various computer vision (CV) applications.
  • 672
  • 09 May 2023
Topic Review
The Incoherence of the Philosophers
The Incoherence of the Philosophers (تهافت الفلاسفة Tahāfut al-Falāsifaʰ in Arabic) is the title of a landmark 11th-century work by the Persian theologian Abū Ḥāmid Muḥammad ibn Muḥammad al-Ghazali and a student of the Asharite school of Islamic theology criticizing the Avicennian school of early Islamic philosophy. Muslim philosophers such as Ibn Sina (Avicenna) and Al-Farabi (Alpharabius) are denounced in this book, as they follow Greek philosophy even when it contradicts Islam. The text was dramatically successful, and marked a milestone in the ascendance of the Asharite school within Islamic philosophy and theological discourse. The book favors faith over philosophy in matters specifically concerning metaphysics or knowledge of the divine.
  • 672
  • 08 Nov 2022
Topic Review
Machine-Learning Based Methods for PV
This entry presents the state of the art ML models applied in solar energy’s forecasting field i.e., for solar irradiance and power production forecasting (both point and interval or probabilistic forecasting), electricity price forecasting and energy demand forecasting. Other applications of ML into the photovoltaic (PV) field taken into account are the modelling of PV modules, PV design parameter extraction, tracking the maximum power point (MPP), PV systems efficiency optimization, PV/Thermal (PV/T) and Concentrating PV (CPV) system design parameters’ optimization and efficiency improvement, anomaly detection and energy management of PV’s storage systems. While many review papers already exist in this regard, they are usually focused only on one specific topic, while in this paper are gathered all the most relevant applications of ML for solar systems in many different fields. It gives an overview of the most recent and promising applications of machine learning used in the field of photovoltaic systems.
  • 672
  • 28 Sep 2021
Topic Review
WBAN Authentication Protocols for Intra-BAN Tier
Telecare medical information system (TMIS) is a technology used in a wireless body area network (WBAN), which has a crucial role in healthcare services. TMIS uses wearable devices with sensors to collect patients’ data and transmit the data to the controller node via a public channel.
  • 671
  • 26 Aug 2022
  • Page
  • of
  • 366
ScholarVision Creations