Search alternatives:
protection based » detection based (Expand Search), protection des (Expand Search)
aspect » aspects (Expand Search)
decrease » increase (Expand Search)
protection based » detection based (Expand Search), protection des (Expand Search)
aspect » aspects (Expand Search)
decrease » increase (Expand Search)
-
1
Protecting Private Attributes in App Based Mobile User Profiling
Published 2020“…We demonstrate, based on wide-range experimental evaluation of Android apps in a nine month test campaign, that the proposed obfuscation mechanism based on similarity with user's existing apps (ensuring that selected obfuscating apps belong to non-private categories) can achieve a good trade-off between efforts required by the obfuscating system and the resulting privacy protection. …”
-
2
Feeder protection challenges with high penetration of inverter based distributed generation
Published 2013“…The increasing proportion of inverter based distributed generation (DG) in the power system may limit the short circuit power available at distribution substations and consequently cause significant troubles for the protection of distribution feeders where DG are connected. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
3
-
4
Degree-Based Network Anonymization
Published 2020Get full text
Get full text
Get full text
masterThesis -
5
Significance of Avicennia Marina in the Arabian Gulf Environment: A Review
Published 2025“…However, recent years have witnessed successful mangrove restoration projects, leading to expansion and notable ecological advantages, including increased biodiversity and improved shoreline protection. This review addresses the current knowledge gap by providing an overview of Avicennia marina distribution in the Gulf, exploring the significance of its ecosystem services, analyzing the impacts of stressors, and examining conservation and restoration efforts, with attention to nature-based and biotechnological approaches for promoting mangrove growth and conservation in the Gulf.…”
-
6
-
7
-
8
-
9
Distribution network line protection in the presence of distributed generation
Published 2015“…When calculating the fault current levels in the network to choose the protection relay settings, it is important to correctly account for the fault contributions of inverter based DGs that represent a significant proportion of DGs connected to the distribution network. …”
Get full text
Get full text
Get full text
masterThesis -
10
-
11
Biofunctional plant fibers and their bioactive-based materials: A critical review
Published 2025“…<p>Plants have been a significant source of natural fiber since antiquity. …”
-
12
Enhanced DC Microgrid Protection: a Neural Network and Wavelet Transform Approach
Published 2024Get full text
doctoralThesis -
13
Protecting Smart Homes: A study on AI approaches to Detect Malwares and Developing a Two Factor Authentication System Based on SRAM PUF For Smart Home Users in UAE
Published 2025“…Due to the rapid adoption of smart technologies in smart homes, the Open Web Application Security Project has identified weak or easily guessable passwords as a significant vulnerability in IoT devices, based on real-world incidents. …”
Get full text
-
14
Klotho overexpression protects human cortical neurons from β-amyloid induced neuronal toxicity
Published 2025“…Our findings underscore the therapeutic potential of Klotho-based interventions in mitigating age-associated neurodegenerative processes.…”
-
15
Smart binary phase‐coding for pulse‐compression radar: An electronic protection technique against repeater jamming
Published 2024“…The proposed method can provide high protection against digital radio frequency memory‐based repetitive range deception techniques without compromising the radar's target detection capability. …”
-
16
Determinants of personal protective gear use and adherence to safety standards among motorcyclists: a case study in Qatar
Published 2025“…Moreover, variations in risky riding characteristics and non-mandated safety gear usage rates based on rider characteristics have been explored. …”
-
17
-
18
-
19
Investigating the Quality Combined Effect of Root Cause Analysis (RCA) in Quality Management in Manufacturing Firms
Published 2024“…By employing tools such as flowcharts, fishbone diagrams, and statistical analysis, the research pinpointed the inadequate 4KV surge protection as a primary defect contributor. Implementing a 6KV surge protector for higher-wattage lights significantly reduced defect rates by 0.5%. …”
Get full text
-
20
Social Media Use and Body Checking Among Lebanese Adults
Published 2022“…However, self-esteem, gender, and the number of online friends and their interaction with them lost significance. Additionally, the most significant variable in explaining the variation in body checking was emotional eating. …”
Get full text
Get full text
Get full text
masterThesis