-
141
Building power consumption datasets: Survey, taxonomy and future directions
منشور في 2020"…Based on the analytical study, a novel dataset has been presented, namely Qatar university dataset, which is an annotated power consumption anomaly detection dataset. The latter will be very useful for testing and training anomaly detection algorithms, and hence reducing wasted energy. …"
-
142
Enhancing building sustainability: A Digital Twin approach to energy efficiency and occupancy monitoring
منشور في 2024"…The DT technology enabled the creation of accurate virtual representations of users' physical environment, facilitating the optimization of energy-intensive devices and systems. Our data-driven occupancy detection approach utilized Machine Learning (ML) algorithms to intelligently determine room occupancy, allowing for precise energy management based on real-time usage patterns. …"
-
143
Improving the Resilience of Smart Distribution Networks against Cyber Attacks
منشور في 2022احصل على النص الكامل
doctoralThesis -
144
Brain Source Localization in the Presence of Leadfield Perturbations
منشور في 2015احصل على النص الكامل
doctoralThesis -
145
Diagnostic structure of visual robotic inundated systems with fuzzy clustering membership correlation
منشور في 2023"…Additionally, a clustering algorithm with a fuzzy membership function is implemented, allowing the robots to advance in accordance with predefined clusters and arrive at their starting place within a predetermined amount of time. …"
-
146
-
147
Information reconciliation through agent controlled graph model. (c2018)
منشور في 2018"…Even though prevention techniques exist, they’re not enough to fully secure the data from malicious activities. Thus, the need for a detection and recovery algorithm to assess the damage and bring the database back to its consistent state in case of an attack. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
148
Boosting the visibility of services in microservice architecture
منشور في 2023"…In this research, we evaluate the performance of several classification algorithms for estimating the quality of microservices using the QWS dataset containing traffic data of 2505 microservices. …"
-
149
Deploying model obfuscation: towards the privacy of decision-making models on shared platforms
منشور في 2024"…Privacy and security of data and models are fundamental necessities that must be satisfied for this protocol's proper functioning. …"
احصل على النص الكامل
احصل على النص الكامل
-
150
-
151
Design of an innovative and self-adaptive-smart algorithm to investigate the structural integrity of a rail track using Rayleigh waves emitted and sensed by a fully non-contact las...
منشور في 2020"…A library of possible mother wavelets was designed based on the experimental data. As the inci dent wave for each sensing point varies because of the physical condition of the rail surface and the laser excitation, the algorithm automatically picks the mother wavelet from the library that generates the lar gest absolute cross-correlation with the incident wave. …"
احصل على النص الكامل
-
152
Generative AI revolution in cybersecurity: a comprehensive review of threat intelligence and operations
منشور في 2025"…<p dir="ltr">Cyber threats are increasingly frequent in today’s world, posing challenges for organizations and individuals to protect their data from cybercriminals. On the other hand, Generative Artificial Intelligence (GAI) technology offers an efficient way to automatically address these issues with the help of AI models and algorithms. …"
-
153
Empowering IoT Resilience: Hybrid Deep Learning Techniques for Enhanced Security
منشور في 2024"…The time efficiency of both proposed algorithms renders them well-suited for deployment in IoT ecosystems. …"
-
154
Blue collar laborers’ travel pattern recognition: Machine learning classifier approach
منشور في 2021"…A pattern recognition model is applied to a revealed preference (RP) survey obtained from the Ministry of Transportation and Communication (MoTC) in Qatar for the travel diary for blue-collar workers. Raw data preprocessing and outliers detection and filtering algorithms were applied at the first stage of the analysis, and consequently, an activity-based travel matrix was developed for each household. …"
-
155
Bridge Structural Health Monitoring Using Mobile Sensor Networks
منشور في 2022احصل على النص الكامل
doctoralThesis -
156
Label dependency modeling in Multi-Label Naïve Bayes through input space expansion
منشور في 2024"…To accommodate the heterogeneity of the expanded input space, we refine the likelihood parameters of iMLNB using a joint density function, which is adept at handling the amalgamation of data types. …"
-
157
Chlorophyll-a concentrations in the Arabian Gulf waters of arid region: A case study from the northern coast of Qatar
منشور في 2022"…The performance of the algorithms was studied using WorldView-3 data, which provided the R2 values of 60% and the best suitability of the NDCI algorithm and MSI data to map the concentration of Chl-a. …"
-
158
-
159
Information warfare. (c2015)
منشور في 2015"…In addition, we will implement the algorithm and compare its performance to other detection and recovery algorithms.…"
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
160
R-CONV++: uncovering privacy vulnerabilities through analytical gradient inversion attacks
منشور في 2025"…The first algorithm presents a novel data leakage method that efficiently exploits convolutional layer gradients, demonstrating that even with non-fully invertible activation functions, such as ReLU, training samples can be analytically reconstructed directly from gradients without the need to reconstruct intermediate layer outputs. …"