Browsing Faculty Contributions by Title
Now showing items 4355-4374 of 17020
-
Designing Flexible and Porous Fibrous Membranes for Oil Water Separation-A Review of Recent Developments
( Bellwether Publishing, Ltd. , 2020 , Article Review)Oil sorbent membranes are highly effective materials in combating oil spills. Recent technological advancements in membrane preparations permit higher oil-sorption efficiency and easier oil recoverability. This review ... -
Designing for food security in a dryland metropolis: Investigating productive landscapes in Doha
( International Society for Horticultural Science , 2016 , Article)This paper address the questions of Food Security in Qatar, and looks at how the disciplines of design can participate in creating "productive landscapes" that contribute to Qatar s food needs. Qatar is an arid country ... -
Designing high-resolution time–frequency and time–scale distributions for the analysis and classification of non-stationary signals: a tutorial review with a comparison of features performance
( Elsevier Inc. , 2018 , Article)This paper deals with the problem of extracting information from non-stationary signals in the form of features that can be used for effective decision-making in both data analysis and machine learning for automatic ... -
Designing ionic liquid solvents for carbon capture using property-based visual approach
( Springer Verlag , 2016 , Article)Recently, ionic liquids (ILs) have been introduced as potential carbon dioxide (CO2)-capturing solvents, as a substitute to conventional amine-based solvents. Conventional amine-based solvents that are used for CO2 capture ... -
Desorption of chloramphenicol from ordered mesoporous carbon-alginate beads: Effects of operating parameters, and isotherm, kinetics, and regeneration studies
( Elsevier Ltd , 2021 , Article)This study has investigated the desorption of an emerging contaminant, known as chloramphenicol (CPC), from ordered mesoporous carbon (OMC)-alginate beads. The effects of initial concentration, operating temperature, and ... -
Destabilization of stable bentonite colloidal suspension using choline chloride based deep eutectic solvent: Optimization study
( Elsevier Ltd , 2021 , Article)Choline chloride (ChCl) based natural deep eutectic solvents (NADES) were synthesized and tested as coagulant for stable bentonite colloidal suspensions. In this work, three ChCl based natural deep eutectic solvent NADES ... -
Destination Competitiveness: The Perceptions of Foreign Tourists Visiting Qatar
( ssrn , 2021 , Article)This paper aims to develop an evidence-based integrated model for destination competitiveness and apply it to the case of Qatar, such that it could be used to identify relevant determinants and rank their contributions to ... -
Detailed velocity profiles in close-coupled elbows-Measurements and computational fluid dynamics predictions (RP-1682)
( Taylor and Francis Inc. , 2017 , Article)This article presents a systematic study to measure detailed velocity profiles in close-coupled five-gore elbows having nominal diameters of 305�mm (12 in) and turning radii r/D = 1.5, and to, likewise, predict the velocity ... -
Detecting anomalies within smart buildings using do-it-yourself internet of things
( Springer , 2022 , Article)Detecting anomalies at the time of happening is vital in environments like buildings and homes to identify potential cyber-attacks. This paper discussed the various mechanisms to detect anomalies as soon as they occur. We ... -
Detecting Attackers during Quantum Key Distribution in IoT Networks using Neural Networks
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)Internet of Things (IoT) deployments face significant security challenges due to the limited energy and computational power of IoT devices. These challenges are more serious in the quantum communications era, where certain ... -
Detecting deception attacks in cyber-physical linear parameter varying systems with packet loss
( John Wiley and Sons Ltd , 2023 , Article)The increased connectivity of cyber-physical systems (CPS) to enterprise networks raises challenging security concerns. Detecting attacks on CPS is a vital step to improving their security. Most of the existing attack ... -
Detecting emotions in English and Arabic tweets
( MDPI AG , 2019 , Article)Assigning sentiment labels to documents is, at first sight, a standardmulti-label classification task. Many approaches have been used for this task, but the current state-of-the-art solutions use deep neural networks (DNNs). ... -
Detecting False Data Injection Attacks in Linear Parameter Varying Cyber-Physical Systems
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)In this paper, we investigate the process of detection of False Data Injection (FDI) in a Linear Parameter Varying (LPV) cyber-physical system (CPS). We design a model based FDI detector capable of detecting false data ... -
Detecting Fetal Movements Using Non-Invasive Accelerometers: A Preliminary Analysis
( IEEE , 2010 , Article)Monitoring fetal movement is important to assess fetal health. Standard clinical fetal monitoring technologies include ultrasound imaging and cardiotocography. Both have limited prognostic value and require significant ... -
Detecting Malware by Analyzing App Permissions on Android Platform: A Systematic Literature Review
( MDPI , 2022 , Article Review)Smartphone adaptation in society has been progressing at a very high speed. Having the ability to run on a vast variety of devices, much of the user base possesses an Android phone. Its popularity and flexibility have ... -
Detecting Organic Nitrogen with 1H-15N HMBC Spectra
( Qatar University Press , 2021 , Poster)NMR spectroscopy has been the most important tool for organic chemistry research, providing detailed structure information. While 1H and 13C NMR spectra were frequently measured, 15N NMR spectra were relatively rare, even ... -
Detecting Promotion Attacks in the App Market Using Neural Networks
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)App markets play an important role in distributing various apps to mobile users. The app market vendors provide reputation systems to assist users in finding useful and reputable apps by ranking them. Unfortunately, there ... -
Detecting the greedy spectrum occupancy threat in cognitive radio networks
( IEEE Computer Society , 2014 , Conference Paper)Recently, security of cognitive radio (CR) is becoming a severe issue. There is one kind of threat, which we call greedy spectrum occupancy threat (GSOT) in this paper, has long been ignored in previous work. In GSOT, a ... -
Detecting Users Prone to Spread Fake News on Arabic Twitter
( European Language Resources Association , 2022 , Conference Paper)The spread of misinformation has become a major concern to our society, and social media is one of its main culprits. Evidently, health misinformation related to vaccinations has slowed down global efforts to fight the ... -
Detection and Genotyping of Torque Teno Virus (TTV) in Healthy Blood Donors and Patients Infected With HBV or HCV in Qatar
( Wiley Periodicals, Inc , 2015 , Article)Torque Teno virus (TTV) has been associated with non A–G hepatitis. The goal of this study was to estimate the infection rates and genotypic characteristics of TTV in the State of Qatar. A total of 644 blood samples ...