-
81
-
82
Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology
منشور في 2010"…They are sniffing the data traffic or causing service denial. In our research, we evaluated the most famous security solutions and classifying them according to their efficiency against detecting or preventing the types of Address Resolution Protocol [ARP] Spoofing attacks. …"
احصل على النص الكامل
-
83
Diagnostic performance of artificial intelligence in detecting and subtyping pediatric medulloblastoma from histopathological images: A systematic review
منشور في 2025"…</p><h3>Conclusion</h3><p dir="ltr">AI algorithms show promise in detecting and subtyping medulloblastomas, but the findings are limited by overreliance on one dataset, small sample sizes, limited study numbers, and lack of meta-analysis Future research should develop larger, more diverse datasets and explore advanced approaches like deep learning and foundation models. …"
-
84
Detecting and Predicting Archaeological Sites Using Remote Sensing and Machine Learning—Application to the Saruq Al-Hadid Site, Dubai, UAE
منشور في 2023"…In this paper, the feasibility of satellite remote sensing in detecting and predicting locations of buried objects in the archaeological site of Saruq Al-Hadid, United Arab Emirates (UAE) was investigated. …"
احصل على النص الكامل
-
85
Detecting and Predicting Archaeological Sites Using Remote Sensing and Machine Learning—Application to the Saruq Al-Hadid Site, Dubai, UAE
منشور في 2023"…In this paper, the feasibility of satellite remote sensing in detecting and predicting locations of buried objects in the archaeological site of Saruq Al-Hadid, United Arab Emirates (UAE) was investigated. …"
احصل على النص الكامل
article -
86
Chlorophyll-a concentrations in the Arabian Gulf waters of arid region: A case study from the northern coast of Qatar
منشور في 2022"…The performance of the algorithms was studied using WorldView-3 data, which provided the R2 values of 60% and the best suitability of the NDCI algorithm and MSI data to map the concentration of Chl-a. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
87
Digital-Twin-Based Diagnosis and Tolerant Control of T-Type Three-Level Rectifiers
منشور في 2023"…Then, the DT is used for the diagnosis and tolerance of open-switch faults (OSFs) and faults related to voltage and current sensors or for sensorless control. The OSF detection and localization algorithm is implemented based on the dynamic response difference between the physical system and its DT. …"
-
88
Large-scale annotation dataset for fetal head biometry in ultrasound images
منشور في 2023"…Its detailed annotations, broad compatibility, and ethical compliance make it a highly reusable and adaptable tool for the development of algorithms aimed at improving maternal and Fetal health.…"
-
89
Land Use/Land Cover Changes Impact on Groundwater Level and Quality in the Northern Part of the United Arab Emirates
منشور في 2020"…Each pair of enhanced LULC maps (1990–2000, 2000–2010, 2010–2018, and 1990–2018) were used as input data for an image difference algorithm to monitor LULC changes. …"
احصل على النص الكامل
article -
90
-
91
A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study
منشور في 2022"…Further, As the quality of received signals differs at different sensing points as a result of the surface conditions of the specimen, the Self Adaptive Smart Algorithm (SASA) method was adopted to filter out the noise and accurately pinpoint the defect reflected wave packet which ultimately aids in better detection and localization. …"
احصل على النص الكامل
-
92
The use of multi-task learning in cybersecurity applications: a systematic literature review
منشور في 2024"…Five critical applications, such as network intrusion detection and malware detection, were identified, and several tasks used in these applications were observed. …"
-
93
Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices
منشور في 2024"…We conducted a comparative analysis of various models and algorithms used in the related works. The results indicated that our proposed approach outperforms others, showcasing its effectiveness in both detecting and mitigating DDoS attacks within SDNs. …"
-
94
Building power consumption datasets: Survey, taxonomy and future directions
منشور في 2020"…Based on the analytical study, a novel dataset has been presented, namely Qatar university dataset, which is an annotated power consumption anomaly detection dataset. The latter will be very useful for testing and training anomaly detection algorithms, and hence reducing wasted energy. …"
-
95
Enhancing building sustainability: A Digital Twin approach to energy efficiency and occupancy monitoring
منشور في 2024"…The DT technology enabled the creation of accurate virtual representations of users' physical environment, facilitating the optimization of energy-intensive devices and systems. Our data-driven occupancy detection approach utilized Machine Learning (ML) algorithms to intelligently determine room occupancy, allowing for precise energy management based on real-time usage patterns. …"
-
96
-
97
Improving the Resilience of Smart Distribution Networks against Cyber Attacks
منشور في 2022احصل على النص الكامل
doctoralThesis -
98
Information reconciliation through agent controlled graph model. (c2018)
منشور في 2018"…Even though prevention techniques exist, they’re not enough to fully secure the data from malicious activities. Thus, the need for a detection and recovery algorithm to assess the damage and bring the database back to its consistent state in case of an attack. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
99
Generative AI revolution in cybersecurity: a comprehensive review of threat intelligence and operations
منشور في 2025"…<p dir="ltr">Cyber threats are increasingly frequent in today’s world, posing challenges for organizations and individuals to protect their data from cybercriminals. On the other hand, Generative Artificial Intelligence (GAI) technology offers an efficient way to automatically address these issues with the help of AI models and algorithms. …"
-
100
Empowering IoT Resilience: Hybrid Deep Learning Techniques for Enhanced Security
منشور في 2024"…The time efficiency of both proposed algorithms renders them well-suited for deployment in IoT ecosystems. …"