Browsing by Title
Now showing items 6970-6989 of 49208
-
Detecting anomalies within smart buildings using do-it-yourself internet of things
( Springer , 2022 , Article)Detecting anomalies at the time of happening is vital in environments like buildings and homes to identify potential cyber-attacks. This paper discussed the various mechanisms to detect anomalies as soon as they occur. We ... -
Detecting Attackers during Quantum Key Distribution in IoT Networks using Neural Networks
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)Internet of Things (IoT) deployments face significant security challenges due to the limited energy and computational power of IoT devices. These challenges are more serious in the quantum communications era, where certain ... -
Detecting deception attacks in cyber-physical linear parameter varying systems with packet loss
( John Wiley and Sons Ltd , 2023 , Article)The increased connectivity of cyber-physical systems (CPS) to enterprise networks raises challenging security concerns. Detecting attacks on CPS is a vital step to improving their security. Most of the existing attack ... -
Detecting different tasks using EEG-source-temporal features
( Springer Nature , 2012 , Conference Paper)This study proposes a new type of features extracted from Electroencephalography (EEG) signals to distinguish between different tasks. EEG signals are collected from six children aged between two to six years old during ... -
Detecting emotions in English and Arabic tweets
( MDPI AG , 2019 , Article)Assigning sentiment labels to documents is, at first sight, a standardmulti-label classification task. Many approaches have been used for this task, but the current state-of-the-art solutions use deep neural networks (DNNs). ... -
Detecting False Data Injection Attacks in Linear Parameter Varying Cyber-Physical Systems
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)In this paper, we investigate the process of detection of False Data Injection (FDI) in a Linear Parameter Varying (LPV) cyber-physical system (CPS). We design a model based FDI detector capable of detecting false data ... -
Detecting Fetal Movements Using Non-Invasive Accelerometers: A Preliminary Analysis
( IEEE , 2010 , Article)Monitoring fetal movement is important to assess fetal health. Standard clinical fetal monitoring technologies include ultrasound imaging and cardiotocography. Both have limited prognostic value and require significant ... -
Detecting Malware by Analyzing App Permissions on Android Platform: A Systematic Literature Review
( MDPI , 2022 , Article Review)Smartphone adaptation in society has been progressing at a very high speed. Having the ability to run on a vast variety of devices, much of the user base possesses an Android phone. Its popularity and flexibility have ... -
Detecting market manipulation in stock market data
(2017 , Master Thesis)Anomaly Detection is an extensively researched problem that has diverse applications in many domains. Anomaly detection is the process of finding data points or patterns that do not conform to expected behavior within a ... -
Detecting Non-Technical Losses in Smart Grids Using Statistical Distances of Forecasting Residuals
(2024 , Master Thesis)Energy theft poses a significant challenge to the sustainability of smart grids, affecting the financial stability of electrical utilities and the overall management of resources. In this thesis, we present a novel load ... -
Detecting Organic Nitrogen with 1H-15N HMBC Spectra
( Qatar University Press , 2021 , Poster)NMR spectroscopy has been the most important tool for organic chemistry research, providing detailed structure information. While 1H and 13C NMR spectra were frequently measured, 15N NMR spectra were relatively rare, even ... -
Detecting Promotion Attacks in the App Market Using Neural Networks
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)App markets play an important role in distributing various apps to mobile users. The app market vendors provide reputation systems to assist users in finding useful and reputable apps by ranking them. Unfortunately, there ... -
Detecting the greedy spectrum occupancy threat in cognitive radio networks
( IEEE Computer Society , 2014 , Conference Paper)Recently, security of cognitive radio (CR) is becoming a severe issue. There is one kind of threat, which we call greedy spectrum occupancy threat (GSOT) in this paper, has long been ignored in previous work. In GSOT, a ... -
Detecting Users Prone to Spread Fake News on Arabic Twitter
( European Language Resources Association , 2022 , Conference Paper)The spread of misinformation has become a major concern to our society, and social media is one of its main culprits. Evidently, health misinformation related to vaccinations has slowed down global efforts to fight the ... -
Detection and assessment of marine litter in an uninhabited island, Arabian Gulf: A case study with conventional and machine learning approaches
( Elsevier , 2022 , Article)In 2018, the Ministry of Municipality and Environment, Qatar removed 90 t of marine litter (ML) from the Ras Rakan Island (RRI), a remote uninhabited island in the Arabian Gulf (hereinafter referred to as Gulf). To identify ... -
DETECTION AND COLLECTION OF WASTE USING A PARTIALLY SUBMERGED AQUATIC ROBOT
(06-2 , Master Thesis)With the amount of waste being dispersed into oceans on the rise, mitigating this issue has become a global concern. In the past few decades, governments, scientists, organizations, and individuals have been attempting to ... -
Detection and Collection of Waste Using a Partially Submerged Aquatic Robot
( Springer Science and Business Media Deutschland GmbH , 2023 , Conference Paper)With the amount of waste being dispersed into oceans on the rise, mitigating this issue has become a global concern. In the past few decades, governments, scientists, organizations, and individuals have been attempting to ... -
Detection and Genotyping of Torque Teno Virus (TTV) in Healthy Blood Donors and Patients Infected With HBV or HCV in Qatar
( Wiley Periodicals, Inc , 2015 , Article)Torque Teno virus (TTV) has been associated with non A–G hepatitis. The goal of this study was to estimate the infection rates and genotypic characteristics of TTV in the State of Qatar. A total of 644 blood samples ... -
Detection and Phylogenetic Analysis of Human Pegivirus (GBV-C) Among Blood Donors and Patients Infected With Hepatitis B Virus (HBV) in Qatar
( Wiley , 2015 , Article)Human Pegivirus (HPgV), formerly GB virus-C/ Hepatitis G virus (GBV-C/HGV), collectively known as GBV-C, is widely spread and has been reported to be associated with non-A–E hepatitis. To our knowledge, no previous ...