-
1
-
2
-
3
-
4
-
5
Brain Source Localization in the Presence of Leadfield Perturbations
Published 2015Get full text
doctoralThesis -
6
A Survey of Indoor Localization Systems for Multi-Floor Environments
Published 2025“…We then categorize and analyze the key challenges unique to multi-floor localization, including both input-level and system-level challenges. …”
-
7
The Effects of Local Aggregates on the Mechanical Properties of Engineered Cementitious Composites (ECC)
Published 2013Get full text
doctoralThesis -
8
Diabetic Foot Ulcer Detection: Combining Deep Learning Models for Improved Localization
Published 2024“…We propose a comprehensive deep learning-based system for detecting DFUs from patients’ feet images by reliably localizing ulcer points. Our method utilizes innovative model ensemble techniques—non-maximum suppression (NMS), Soft-NMS, and weighted bounding box fusion (WBF)—to combine predictions from state-of-the-art object detection models. …”
-
9
Adopting Geophysical Testing Techniques in Geotechnical Investigation and Shallow Foundation Design
Published 2018Get full text
doctoralThesis -
10
Review of techniques, challenges, and gaps in the subsurface gas release knowledge base
Published 2024“…Additionally, this review touches upon practical and conceptual topics, such as detection and localization techniques, and flow regimes in other gaseous flows through soil and powder beds, putting into question the applicability of some presumed granulated concepts to the flowing behavior expected beyond migration. …”
-
11
Progress Evaluation and Diagnosis Indices for Construction Projects-Omar's Diagnostic Technique
Published 2006Get full text
doctoralThesis -
12
-
13
Open Space Indoor Navigation with RSS Sequence Transduction Neural Networks
Published 2020Get full text
Get full text
Get full text
masterThesis -
14
Platelet‐rich plasma intra‐articular knee injections from open preparation techniques do not pose a higher risk of joint infection: A systematic review of 91 randomized controlled...
Published 2024“…Forty‐one implemented a closed technique, while 50 were open. All studies implementing a closed technique disclosed their commercial kits. …”
-
15
Complications and side effects of Wide-Awake Local Anaesthesia No Tourniquet (WALANT) in upper limb surgery: a systematic review and meta-analysis
Published 2024“…<h3>Purpose</h3><p dir="ltr">Wide-Awake Local Anaesthesia No Tourniquet (WALANT), a groundbreaking anaesthetic technique resurging in practice, warrants a comprehensive safety analysis for informed adoption. …”
-
16
Mining Student Information System Records to Predict Students’ Academic Performance
Published 2018“…The main aim of this study is to identify the most commonly studied factors that affect the students’ performance, as well as, the most common data mining techniques applied to identify these factors. Accordingly, this dissertation generated a dataset from a student information system from a local university in the United Arab Emirates. …”
Get full text
-
17
-
18
Differing endometrial expression of calcium modulating transient receptor potential channels
Published 2021“…Epithelial cell calcium homeostasis is tightly regulated by mechanisms that include activation of the TRP channel superfamily of 9 families including TRPC (Canonical) [1]. …”
-
19
Unifying optimization forces: Harnessing the fine-structure constant in an electromagnetic-gravity optimization framework
Published 2024“…Future research opportunities include exploring adaptive mechanisms, hybrid approaches, handling high-dimensional problems, and integrating machine learning techniques to enhance its capabilities further. …”
-
20
LLMs Have Rhythm: Fingerprinting Large Language Models Using Inter-Token Times and Network Traffic Analysis
Published 2025“…We develop a Deep Learning (DL) pipeline to capture these timing patterns using network traffic analysis and evaluate it on 16 Small Language Models (SLMs) and 10 proprietary LLMs across different deployment scenarios, including local host machine (GPU/CPU), Local Area Network (LAN), Remote Network, and when using Virtual Private Network (VPN). …”