Browsing by Title
Now showing items 6814-6833 of 48073
-
Detailed exergy analysis of full scale LNG plant
( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference Paper)Sustainability is one of the major challenges faced by the industrial sector as it is driven by both environmental and economic factors. Energy demands are increasing and, to date, most of the supply is generated via ... -
Detailed velocity profiles in close-coupled elbows-Measurements and computational fluid dynamics predictions (RP-1682)
( Taylor and Francis Inc. , 2017 , Article)This article presents a systematic study to measure detailed velocity profiles in close-coupled five-gore elbows having nominal diameters of 305�mm (12 in) and turning radii r/D = 1.5, and to, likewise, predict the velocity ... -
Detecting anomalies within smart buildings using do-it-yourself internet of things
( Springer , 2022 , Article)Detecting anomalies at the time of happening is vital in environments like buildings and homes to identify potential cyber-attacks. This paper discussed the various mechanisms to detect anomalies as soon as they occur. We ... -
Detecting Attackers during Quantum Key Distribution in IoT Networks using Neural Networks
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)Internet of Things (IoT) deployments face significant security challenges due to the limited energy and computational power of IoT devices. These challenges are more serious in the quantum communications era, where certain ... -
Detecting deception attacks in cyber-physical linear parameter varying systems with packet loss
( John Wiley and Sons Ltd , 2023 , Article)The increased connectivity of cyber-physical systems (CPS) to enterprise networks raises challenging security concerns. Detecting attacks on CPS is a vital step to improving their security. Most of the existing attack ... -
Detecting emotions in English and Arabic tweets
( MDPI AG , 2019 , Article)Assigning sentiment labels to documents is, at first sight, a standardmulti-label classification task. Many approaches have been used for this task, but the current state-of-the-art solutions use deep neural networks (DNNs). ... -
Detecting False Data Injection Attacks in Linear Parameter Varying Cyber-Physical Systems
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)In this paper, we investigate the process of detection of False Data Injection (FDI) in a Linear Parameter Varying (LPV) cyber-physical system (CPS). We design a model based FDI detector capable of detecting false data ... -
Detecting Fetal Movements Using Non-Invasive Accelerometers: A Preliminary Analysis
( IEEE , 2010 , Article)Monitoring fetal movement is important to assess fetal health. Standard clinical fetal monitoring technologies include ultrasound imaging and cardiotocography. Both have limited prognostic value and require significant ... -
Detecting Malware by Analyzing App Permissions on Android Platform: A Systematic Literature Review
( MDPI , 2022 , Article Review)Smartphone adaptation in society has been progressing at a very high speed. Having the ability to run on a vast variety of devices, much of the user base possesses an Android phone. Its popularity and flexibility have ... -
Detecting market manipulation in stock market data
(2017 , Master Thesis)Anomaly Detection is an extensively researched problem that has diverse applications in many domains. Anomaly detection is the process of finding data points or patterns that do not conform to expected behavior within a ... -
Detecting Non-Technical Losses in Smart Grids Using Statistical Distances of Forecasting Residuals
(2024 , Master Thesis)Energy theft poses a significant challenge to the sustainability of smart grids, affecting the financial stability of electrical utilities and the overall management of resources. In this thesis, we present a novel load ... -
Detecting Organic Nitrogen with 1H-15N HMBC Spectra
( Qatar University Press , 2021 , Poster)NMR spectroscopy has been the most important tool for organic chemistry research, providing detailed structure information. While 1H and 13C NMR spectra were frequently measured, 15N NMR spectra were relatively rare, even ... -
Detecting Promotion Attacks in the App Market Using Neural Networks
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)App markets play an important role in distributing various apps to mobile users. The app market vendors provide reputation systems to assist users in finding useful and reputable apps by ranking them. Unfortunately, there ... -
Detecting the greedy spectrum occupancy threat in cognitive radio networks
( IEEE Computer Society , 2014 , Conference Paper)Recently, security of cognitive radio (CR) is becoming a severe issue. There is one kind of threat, which we call greedy spectrum occupancy threat (GSOT) in this paper, has long been ignored in previous work. In GSOT, a ... -
Detecting Users Prone to Spread Fake News on Arabic Twitter
( European Language Resources Association , 2022 , Conference Paper)The spread of misinformation has become a major concern to our society, and social media is one of its main culprits. Evidently, health misinformation related to vaccinations has slowed down global efforts to fight the ...