Browsing by Title
Now showing items 4941-4960 of 48376
-
Closed form solution of nonlinear oscillation of a cantilever beam using λ-symmetry linearization criteria
( Elsevier , 2022 , Article)A mechanical system, in general, undergoes vibrational motion when the system is subjected to a tension or an external force. One of the examples of such a system is a cantilever beam when it is exposed to a bending action. ... -
Closed-Loop Control and Boundary for CCM and DCM of Nonisolated Inverting N× Multilevel Boost Converter for High-Voltage Step-Up Applications
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)In this paper, closed-loop control and boundary condition for continuous conduction mode and discontinuous conduction mode of nonisolated inverting N× multilevel boost converter (MBC) are articulated. Inverting N× MBC ... -
Closed-loop control of anesthesia and mean arterial pressure using reinforcement learning
( IEEE , 2014 , Conference Paper)General anesthesia is required for patients undergoing surgery as well as for some patients in the intensive care units with acute respiratory distress syndrome. How-ever, most anesthetics affect cardiac and respiratory ... -
Closing a gap - First records of bryophytes from the Qatar Peninsula
( A.D.A.C. , 2018 , Article)The ephemeral or annual mosses Entosthodon fascicularis (Funariaceae), Microbryum starckeanum (Pottiaceae) and Pohlia melanodon (Mniaceae) were found in the understorey of natural Ziziphus nummularia shrubland in Qatar. ... -
The closing ceremony of the Traffic Safety Ambassadors Program for high school students
( Qatar University , 2021 , Video) -
Clostridium difficile Infection and Risk of Colectomy in Patients with Inflammatory Bowel Disease: A Bias-adjusted Meta-analysis
( Wolters Kluwer , 2017 , Article)Clostridium difficile infection (CDI) is a common complication of inflammatory bowel diseases (IBDs) and is associated with worse outcome. Variable rates of colectomy have been reported among IBD complicated by CDI. We ... -
Closure to "Fully softened shear strength for soil slope stability analyses" by Hisham T. Eid and Khaled H. Rabie
( American Society of Civil Engineers (ASCE) , 2018 , Article)[No abstract available] -
Cloud Computing and Healthcare Services
( OMICS International , 2016 , Article)There is a significant volume of healthcare data generated daily. The data are important and vital for decision making and delivering the best care for patients. Cloud computing is a cost effective method that facilitates ... -
Cloud computing without seeing
( Association for Computing Machinery , 2011 , Conference Paper)In the emerging cloud computing model, security is of paramount concern. This paper discusses the need for practical techniques that enable private outsourcing on the cloud by allowing the service provider to work on ... -
Cloud database encryption technology based on combinatorial encryption
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)Traditional cloud database directly stores user plaintext information, information security is directly related to the security of Cloud server, which will create a great security risk. The user's information security is ... -
Cloud energy micro-moment data classification: A platform study
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)Energy efficiency is a crucial factor in the wellbeing of our planet. In parallel, Machine Learning (ML) plays an instrumental role in automating our lives and creating convenient workflows for enhancing behavior. So, ... -
Cloud of things for sensing as a service: sensing resource discovery and virtualization
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)We propose Cloud of Things for Sensing as a Service: a global architecture that scales up cloud computing by exploiting the global sensing resources of the highly dynamic and growing Internet of Things (IoT) to enable ... -
Cloud Storage Forensics: BaiduNetDisk, WeiYun, and 115yun on a Wireless Network
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)With the development of cloud computing and wireless networks, cloud storage services are widely used in daily life. People can get access to cloud storage anytime and anywhere. Cloud storage forensics is a computer forensic ... -
Cloud, Fog, and Edge Computing: A Software Engineering Perspective
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)Cloud, Fog, and Edge Computing paradigms have been introduced for data-driven organizations in order to facilitate data computation and processing in an easier manner. Considering that there has been a huge increase in the ... -
Cloud-assisted mobile computing and pervasive services [Guest Editorial]
(2013 , Other)[No abstract available] -
Cloud-based mobile system for biometrics authentication
( IEEE , 2013 , Conference Paper)This paper introduces a new framework to perform handwritten password authentication as an Internet service based on the cloud computing technology. Using the proposed cloud-based authentication platform, we would be able ... -
Cloud-Ready Biometric System for Mobile Security Access
( Springer , 2012 , Conference Paper)In this contribution, we introduce an application that allows a mobile phone to be used as a biometric-capture device for secure access to the cloud. In this application, the biometric capture and recognition are performed ... -
CloudFlow: A data-aware programming model for cloud workflow applications on modern HPC systems
( Elsevier , 2015 , Article)Traditional High-Performance Computing (HPC) based big-data applications are usually constrained by having to move large amount of data to compute facilities for real-time processing purpose. Modern HPC systems, represented ... -
Cloudlet-Based Intelligent Auctioning Agents for Truthful Autonomous Electric Vehicles Energy Crowdsourcing
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)This paper proposes cloudlet-based intelligent agents for energy crowdsourcing from autonomous electric vehicles (AEVs). Existing energy crowdsourcing mechanisms focus on load shedding and cost savings, but lack incentive ... -
CloudSafe: A tool for an automated security analysis for cloud computing
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)Cloud computing has been adopted widely, providing on-demand computing resources to improve performance and reduce operational costs. However, these new functionalities also bring new ways to exploit the cloud computing ...