-
21
A matrix-based damage assessment and recovery algorithm
Published 2014“…With the advancement of Internet technology, securing information systems from electronic attacks has become a significant concern. With all the preventive methods, malicious users still find new ways to overcome the system security and access and modify sensitive information. …”
Get full text
Get full text
Get full text
conferenceObject -
22
Simulation Based Optimization of Logistics Decisions Under Horizontal Collaboration
Published 2023Get full text
doctoralThesis -
23
Research Based Pedagogy to Enhance Quality of Learning: A Study Among Selected Higher Education Institutions in the UAE
Published 2024“…The study has also revealed significant concerns of faculty on the authenticity of the research conducted by students. …”
Get full text
-
24
GIS-BIM Based Regional Seismic Risk Assessment for Dubai, UAE
Published 2023Get full text
doctoralThesis -
25
Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies
Published 2015“…However, the large size and complexity of these policies raise many concerns related to their correctness in terms of flaws, conflicts and redundancies presence. …”
Get full text
Get full text
Get full text
article -
26
Biofunctional plant fibers and their bioactive-based materials: A critical review
Published 2025“…In recent years, natural plants and their bioactive-based fibers have been gaining popularity in the biomedical field due to increasing environmental concerns about synthetic fibers. …”
-
27
An Ontology-based Semantic Web for Arabic Question Answering: The Case of E-Government Services
Published 2018“…These results confirm that the semantics-based approach significantly outperforms the keyword-based approach.…”
Get full text
-
28
Reliability of online pregnancy-related information and associated feelings of worry among expectant women in Qatar
Published 2022“…<h3>Background</h3><p dir="ltr">Although the internet can be a source of reassurance and clarification for expectant women, it could cause concerns or feelings of worry when reading about pregnancy-related information. …”
-
29
An Overview of Membrane Based NO<sub>x</sub> Removal Technologies and Dinitrification Fitlers
Published 2025“…<p dir="ltr">Air pollution has emerged as a significant global issue, largely due to the increasing demand for energy and industrial processes that release harmful gases into the atmosphere. …”
-
30
Hybrid deep learning based threat intelligence framework for Industrial IoT systems
Published 2025“…However, the increased pervasiveness, reduced human involvement, resource-constrained nature of underlying IoT devices, dynamic and shared spectrum of 4G/5G communication, and reliance on the cloud for outsourced massive storage and computation bring novel security challenges and concerns. A significant challenge currently confronting the Industrial Internet of Things (IIoT) is the increasing prevalence of sophisticated IoT malware threats and attacks. …”
-
31
Set-based approach for efficient evaluation and analysis of XACML policies. (c2014)
Published 2014Get full text
Get full text
masterThesis -
32
Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
Published 2021“…It is of critical significance given the advancement in modern strategic narratives. …”
-
33
Prioritizing the multi-criterial features based on comparative approaches for enhancing security of IoT devices
Published 2023“…The future challenge is to address the incompatibility of the authentication feature with IoT devices based on appropriate technologies. AI and machine learning are also implementable in order to detect the vulnerability of IoT devices and inform the concerned operator or administration for protection. …”
Get full text
Get full text
Get full text
article -
34
Prioritizing the multi-criterial features based on comparative approaches for enhancing security of IoT devices
Published 2023“…The future challenge is to address the incompatibility of the authentication feature with IoT devices based on appropriate technologies. AI and machine learning are also implementable in order to detect the vulnerability of IoT devices and inform the concerned operator or administration for protection. …”
-
35
-
36
Developments in Chemical Treatments, Manufacturing Techniques and Potential Applications of Natural-Fibers-Based Biodegradable Composites
Published 2021“…Chemical treatments and surface modifications can improve the quality of the natural fibers. Natural-fiber-based composites are a potential candidate for many lightweight engineering applications with significant mechanical properties. …”
-
37
Prioritizing factors for the adoption of IoT-based smart irrigation in Saudi Arabia: a GRA/AHP approach
Published 2024“…Internet of Things (IoT)-based irrigation systems present a promising remedy for these issues. …”
-
38
Factors Affecting Cybersecurity Behaviour in the Metaverse: A Hybrid SEM-ANN Approach Based on Deep Learning
Published 2023“…However, little is known concerning the factors that influence the cybersecurity behaviour of Metaverse users. …”
Get full text
-
39
Poly(lactic acid) (PLA) and polyhydroxyalkanoates (PHAs), green alternatives to petroleum-based plastics: a review
Published 2021“…In spite of the fact that petroleum-based plastics are convenient in terms of fulfilling the performance requirements of many applications, they contribute significantly to a number of ecological and environmental problems. …”
Get full text
article -
40
A Features-Based Privacy Preserving Assessment Model for Authentication of Internet of Medical Things (IoMT) Devices in Healthcare
Published 2023“…<p dir="ltr">Internet of Things (IoT) devices have drawn significant attention over the last few years due to their significant contribution to every domain of life, but the major application of these devices has been witnessed in the healthcare sector. …”