Search alternatives:
threats » threat (Expand Search)
increased » increase (Expand Search)
facies » faces (Expand Search)
decrease » increase (Expand Search)
threats » threat (Expand Search)
increased » increase (Expand Search)
facies » faces (Expand Search)
decrease » increase (Expand Search)
-
1
Significance of Avicennia Marina in the Arabian Gulf Environment: A Review
Published 2025“…However, in the past two decades Gulf mangroves have been facing significant threats, including extensive coastal development, shoreline modification by establishing marinas and ports, and climate change-associated impacts such as sea-level rise and altered precipitation patterns, which pose significant risks to this fragile ecosystem. …”
-
2
Generative AI: a double-edged sword in the cyber threat landscape
Published 2025“…Its usage by malevolent entities to automate intricate malware creation poses a significant threat, circumventing conventional defensive measures. …”
-
3
Hybrid deep learning based threat intelligence framework for Industrial IoT systems
Published 2025“…A significant challenge currently confronting the Industrial Internet of Things (IIoT) is the increasing prevalence of sophisticated IoT malware threats and attacks. …”
-
4
Bridging Innovation and Security: Advancing Cyber-Threat Detection in Sustainable Smart Infrastructure
Published 2025“…However, this evolution has also exposed smart devices to increasingly sophisticated cyber-threats, endangering the integrity of entire smart networks. …”
-
5
The use of multi-task learning in cybersecurity applications: a systematic literature review
Published 2024“…Despite government and corporate efforts, cybersecurity remains a significant concern. The application of multi-task learning (MTL) in cybersecurity is a promising solution, allowing security systems to simultaneously address various tasks and adapt in real-time to emerging threats. …”
-
6
5G Networks Security Mitigation Model: An ANN-ISM Hybrid Approach
Published 2025“…<p dir="ltr">The advent of Fifth-Generation (5G) networks has introduced significant security challenges due to increased complexity and diverse use cases. …”
-
7
-
8
Effect of consanguinity on birth weight for gestational age in a developing country
Published 2007“…No significant difference was observed in the decrease in birth weight between the first- and second-cousin marriages. …”
Get full text
Get full text
Get full text
Get full text
article -
9
Stemming cardiovascular diseases in Qatar
Published 2015“…“Both Qatari nationals and expatriates should adopt healthier lifestyles to reduce the prevalence of these risk factors,” says Christos. Diabetes was the largest preventable risk factor to decrease heart attacks and strokes.…”
-
10
Shear Behavior of One-Way Reinforced Concrete Hollow Slabs Voided with PET Void Formers
Published 2023Get full text
doctoralThesis -
11
Arsenic contamination in rice: a DPSIR analysis with a focus on top rice producers
Published 2025“…<p>Arsenic contamination in rice poses significant risks to public health and food security. …”
-
12
A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method
Published 2022“…<p dir="ltr">Due to the rapid growth in IT technology, digital data have increased availability, creating novel security threats that need immediate attention. …”
-
13
Optimisation of PV Cleaning Practices: Comparison Between Performance Based and Periodic Based Approaches
Published 2018“…Solar energy has the largest untapped reserve in energy and is one of the fastest emerging energy markets. …”
Get full text
-
14
Effectiveness of Project Management Office (PMO) in UAE Context: Exploring the Link between Meeting the Critical Success Factors (CSFs) of Central Enterprise PMO and its Added Valu...
Published 2013“…One of the most significant current discussions in the project management field is having an effective PMO that can play significant roles to enable organizations to achieve their goals and objectives through enhancing the effectiveness of the project management, hence Meeting the CSFs of the central EPMOs is a crucial factor to ensure that central EPMOs add the expected values to their organizations. …”
Get full text
-
15
Investigation of Groundwater Depletion in the State of Qatar and Its Implication to Energy Water and Food Nexus
Published 2021“…Groundwater resources are under severe pressures due to population increase, urbanisation and socio-economic development, with potential for causing long-term threats to human life and natural ecosystems. …”
-
16
Alleviation of drought and salt stress in vegetables: crop responses and mitigation strategies
Published 2022“…<p dir="ltr">In recent decades, the demand for vegetables has increased significantly due to the blooming global population. …”
-
17
Cybersecurity Transparency and Firm Success: Insights From the Australian Landscape
Published 2024“…<p dir="ltr">Amid the increasing prevalence of cybersecurity challenges on a global scale, the significance of disseminating details pertaining to a company's ability to counteract cybersecurity threats becomes evident, reflecting the vigilance and preparedness of the organization in addressing such risks. …”
-
18
Cyber-Resilient Detection of Power Quality Events with NSCT and PCA-SVM
Published 2025“…The proposed NSCT-PCA- SVM approach represents a significant step forward in ensuring secure and reliable smart grid operations.…”
-
19
Protecting Smart Homes: A study on AI approaches to Detect Malwares and Developing a Two Factor Authentication System Based on SRAM PUF For Smart Home Users in UAE
Published 2025“…The UAE vision towards sustainability is increasingly promoting the adoption of smart home technology for its residents and is expected to grow over 10% on a yearly basis until 2029, while smart technology offers convenience and efficiency to smart home inhabitants. …”
Get full text
-
20
The effect of indoor air quality on health and performance of labors in joinery factories
Published 2020“…In addition, the foundation of development has a significant rise since 2013 when EXPO 2020 awarded to Dubai. …”
Get full text