Encyclopedia
Scholarly Community
Encyclopedia
Entry
Video
Image
Journal
Book
News
About
Log in/Sign up
Submit
Entry
Video
Image
Subject:
All Disciplines
Arts & Humanities
Biology & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Mathematics
Engineering
Environmental & Earth Sciences
Medicine & Pharmacology
Physical Sciences
Public Health & Healthcare
Social Sciences
Sort:
Hottest
Latest
Alphabetical (A-Z)
Alphabetical (Z-A)
Type:
All
Topic Review
Biography
Topic Review
The Hussaini Encyclopedia
The Hussaini Encyclopedia (Arabic - دائرة المعارف الحسينية - Dāʾirat al-maʿārif al-Ḥusaynīyah) is a one-of-a-kind encyclopedia in Arabic, completely themed on the third Holy Imam, Husayn ibn Ali, his biography, thought and way of conduct, as well as on the social circle of personalities around him and also of places, chronicles and various other related subjects. This encyclopedia consisted of 700 volumes and well over 95 million words. Sheikh Mohammed Sadiq Al-Karbassi, author of the voluminous Arabic encyclopedia dedicated to Imam al-Hussain started his work by establishing the Hussaini Center for Research in London in 1993. The Hussaini Encyclopedia is a historic study of al-Hussain which provides a heritage owing to its impact on all events, particularly the aftermath of battle of Karbala with its impact being observed in recent times.
674
01 Dec 2022
Topic Review
AI Enabling Technologies in Physical Layer Security
With the proliferation of 5G mobile networks within next-generation wireless communication, the design and optimization of 5G networks are progressing in the direction of improving the physical layer security (PLS) paradigm. This phenomenon is due to the fact that traditional methods for the network optimization of PLS fail to adapt new features, technologies, and resource management to diversified demand applications. To improve these methods, future 5G and beyond 5G (B5G) networks will need to rely on new enabling technologies. Therefore, approaches for PLS design and optimization that are based on artificial intelligence (AI) and machine learning (ML) have been corroborated to outperform traditional security technologies. This will allow future 5G networks to be more intelligent and robust in order to significantly improve the performance of system design over traditional security methods.
674
23 May 2022
Topic Review
Packard Bell Statesman
The Packard Bell Statesman was an economy line of notebook computers introduced in 1993 by Packard Bell. They were slower in performance and lacked features compared to most competitor products, but they were lower in price. It was created in a collaboration between Packard Bell and Zenith Data Systems. The Statesman series was essentially a rebrand of Zenith Data Systems Z-Star 433 series, with the only notable difference of the logo in the middle and text on the front bezel.
674
27 Oct 2022
Topic Review
Advanced Security Framework for Internet of Things
Due to the massive accessibility and interconnection of IoT devices, systems are at risk of being exploited by hackers. Therefore, there is a need to find an advanced security framework that covers data security, data confidentiality, and data integrity issues.
673
04 Jul 2022
Topic Review
Trends in Malware Detection
Monitoring Indicators of Compromise (IOC) leads to malware detection for identifying malicious activity. Malicious activities potentially lead to a system breach or data compromise. Various tools and anti-malware products exist for the detection of malware and cyberattacks utilizing IOCs, but all have several shortcomings. In the quest to fight zero-day attacks, the research paradigm shifted from primitive methods to classical machine learning-based methods, then to deep learning-based methods.
673
20 Oct 2022
Topic Review
Leech (Computing)
In computing and specifically Internet, a leech is one who benefits, usually deliberately, from others' information or effort but does not offer anything in return, or makes only token offerings in an attempt to avoid being called a leech. In economics, this type of behavior is called "free riding" and is associated with the free rider problem. Depending on context, leeching does not necessarily refer to illegal use of computer resources, but often instead to greedy use according to etiquette: to wit, using too much of what is freely given without contributing a reasonable amount back to the community that provides it. The name derives from the leech, an animal that sucks blood and then tries to leave unnoticed. Other terms are used, such as "freeloader" and "sponge", but leech is the most common.
673
16 Nov 2022
Topic Review
Transformers for Computer Vision
Vision transformers (ViTs) are designed for tasks related to vision, including image recognition. Originally, transformers were used to process natural language (NLP). As a special type of transformer, vision transformers (ViTs) can be used for various computer vision (CV) applications.
672
09 May 2023
Topic Review
The Incoherence of the Philosophers
The Incoherence of the Philosophers (تهافت الفلاسفة Tahāfut al-Falāsifaʰ in Arabic) is the title of a landmark 11th-century work by the Persian theologian Abū Ḥāmid Muḥammad ibn Muḥammad al-Ghazali and a student of the Asharite school of Islamic theology criticizing the Avicennian school of early Islamic philosophy. Muslim philosophers such as Ibn Sina (Avicenna) and Al-Farabi (Alpharabius) are denounced in this book, as they follow Greek philosophy even when it contradicts Islam. The text was dramatically successful, and marked a milestone in the ascendance of the Asharite school within Islamic philosophy and theological discourse. The book favors faith over philosophy in matters specifically concerning metaphysics or knowledge of the divine.
672
08 Nov 2022
Topic Review
Machine-Learning Based Methods for PV
This entry presents the state of the art ML models applied in solar energy’s forecasting field i.e., for solar irradiance and power production forecasting (both point and interval or probabilistic forecasting), electricity price forecasting and energy demand forecasting. Other applications of ML into the photovoltaic (PV) field taken into account are the modelling of PV modules, PV design parameter extraction, tracking the maximum power point (MPP), PV systems efficiency optimization, PV/Thermal (PV/T) and Concentrating PV (CPV) system design parameters’ optimization and efficiency improvement, anomaly detection and energy management of PV’s storage systems. While many review papers already exist in this regard, they are usually focused only on one specific topic, while in this paper are gathered all the most relevant applications of ML for solar systems in many different fields. It gives an overview of the most recent and promising applications of machine learning used in the field of photovoltaic systems.
672
28 Sep 2021
Topic Review
WBAN Authentication Protocols for Intra-BAN Tier
Telecare medical information system (TMIS) is a technology used in a wireless body area network (WBAN), which has a crucial role in healthcare services. TMIS uses wearable devices with sensors to collect patients’ data and transmit the data to the controller node via a public channel.
671
26 Aug 2022
Page
of
366
Featured Entry Collections
>>
Featured Books
>>
Encyclopedia of Social Sciences
Chief Editor:
Michael McAleer
Encyclopedia of COVID-19
Chief Editor:
Stephen Bustin
Encyclopedia of Fungi
Chief Editor:
Luis V. Lopez-Llorca
Encyclopedia of Digital Society, Industry 5.0 and Smart City
Chief Editor:
Sandro Serpa
Entry
Video
Image
Journal
Book
News
About
Log in/Sign up
New Entry
New Video
New Images
About
Terms and Conditions
Privacy Policy
Advisory Board
Contact
Partner
ScholarVision Creations
Feedback
Top
Feedback
×
Help Center
Browse our user manual, common Q&A, author guidelines, etc.
Rate your experience
Let us know your experience and what we could improve.
Report an error
Is something wrong? Please let us know!
Other feedback
Other feedback you would like to report.
×
Did you find what you were looking for?
Love
Like
Neutral
Dislike
Hate
0
/500
Email
Do you agree to share your valuable feedback publicly on
Encyclopedia
’s homepage?
Yes, I agree. Encyclopedia can post it.
No, I do not agree. I would not like to post my testimonial.
Webpage
Upload a screenshot
(Max file size 2MB)
Submit
Back
Close
×