Now showing items 3436-3455 of 7600

    • G-RAT | A novel graphical randomized authentication technique for consumer smart devices 

      Khan M.A.; Ud Din I.; Jadoon S.U.; Khan M.K.; Guizani M.; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)
      User authentication is the process that is exercised millions of times around the globe by using different techniques and methods. The most prominent way of authentication is alphanumerical password forms that have been ...
    • Gait recognition based on modified phase-only correlation 

      Rida, Imad; Almaadeed, Somaya; Bouridane, Ahmed ( Springer-Verlag London Ltd , 2016 , Article)
      Gait recognition is an emerging biometric technology aiming to identify people purely through the analysis of the way they walk. The technology has attracted interest as a method of identification because it is noncontact ...
    • Gait recognition for person re-identification 

      Elharrouss O.; Almaadeed N.; Al-Maadeed, Somaya; Bouridane A. ( Springer , 2021 , Article)
      Person re-identification across multiple cameras is an essential task in computer vision applications, particularly tracking the same person in different scenes. Gait recognition, which is the recognition based on the ...
    • Galvanic exchange as a novel method for carbon nitride supported coag catalyst synthesis for oxygen reduction and carbon dioxide conversion 

      Nazir, Roshan; Kumar, Anand; Ali, Sardar; Saad, Mohammed A.; Al-Marri, Mohammed J. ( MDPI AG , 2019 , Article)
      A bimetallic alloy of CoAg nanoparticles (NPs) on a carbon nitride (CN) surface was synthesized using a galvanic exchange process for the oxygen reduction reaction (ORR) and carbon dioxide electrocatalytic conversion. The ...
    • Game theoretic data privacy preservation: Equilibrium and pricing 

      Xu, Lei; Jiang, Chunxiao; Wang, Jian; Ren, Yong; Yuan, Jian; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)
      Privacy issues arising in the process of collecting, publishing and mining individuals' personal data have attracted much attention in recent years. In this paper, we consider a scenario where a data collector collects ...
    • Game Theoretical Model for Cybersecurity Risk Assessment of Industrial Control Systems 

      Nassar, Mohamed; Khoury, Joseph; Erradi, Abdelkarim; Bou-Harb, Elias ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)
      Supervisory Control and Data Acquisition (SCADA) and Distributed Control Systems (DCS) use advanced computing, sensors, control systems, and communication networks to monitor and control industrial processes and distributed ...
    • Game Theory Based Opportunistic Computation Offloading in Cloud-Enabled IoV 

      Liwang, Minghui; Wang, Jiexiang; Gao, Zhibin; Du, Xiaojiang; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)
      With the growing popularity of the fifth-generation (5G) wireless systems and cloud-enabled Internet of Vehicles, vehicular cloud has been introduced as a novel mobile device computing mode, which enables vehicles to offload ...
    • A Game Theory Based Optimal Planning for a Hybrid Energy System Considering Time of Use Tariffs 

      Tatari, Fatemeh R.; Bizhani, Hamed; Muyeen, S. M.; Ali, Liaqat; Sanjeevikumar, Padmanaban ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Conference Paper)
      In this paper, a game theory based optimization algorithm is presented for optimal planning of hybrid energy systems. Considering wind turbine, photovoltaic, and battery energy storage systems as rational players, all ...
    • Game Theory for Anti-Jamming Strategy in Multichannel Slow Fading IoT Networks 

      Gouissem, Ala; Abualsaud, Khalid; Yaacoub, Elias; Khattab, Tamer; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)
      The open nature of the wireless communication medium renders it vulnerable to jamming attacks by malicious users. To detect their presence and to avoid such attacks, several techniques are present in the literature. Most ...
    • Game-based micro-learning approach for language vocabulary acquisition using LingoSnacks 

      Erradi, Abdelkarim; Hind, Almerekhi; Sajeda, Nahia ( IEEE , 2013 , Conference Paper)
      Acquisition of new vocabulary is an important element for language learning but it requires repeated and varied exposure to the new words and their usage. This paper reports the experience of designing and developing a ...
    • Garbled computation in cloud 

      Wang, Yongge; Malluhi, Qutaibah M.; Khancb, Khaled MD ( Elsevier , 2016 , Article)
      With the wide adoption of cloud computing paradigm, it is important to develop appropriate techniques to protect client data privacy in the cloud. Encryption is one of the major techniques that could be used to achieve ...
    • Garbled computation in cloud 

      Wang, Yongge; Malluhi, Qutaibah M.; Khan, Khaled MD ( Elsevier , 2016 , Article)
      With the wide adoption of cloud computing paradigm, it is important to develop appropriate techniques to protect client data privacy in the cloud. Encryption is one of the major techniques that could be used to achieve ...
    • Gas driven fracture during gas production using 3D synchrotron computed tomography 

      Jarrar, Zaher A.; Alshibli, Khalid A.; Al-Raoush, Riyadh I.; Jung, Jongwon ( Springer Verlag , 2019 , Conference Paper)
      During methane gas production from hydrate bearing sandy sediments, fine particles can migrate or clog the pores of sediments. Fines clogging induces a change in pressure gradient which affects the gas flow pattern and ...
    • Gas Driven Fracture during Gas Production using HeleShaw Cell 

      Al-Raoush, Riyadh; Jarrar, Zaher; Alshibli, Khalid; Jung, Jongwon ( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference Paper)
      Methane hydrate is considered a potential energy source, with worldwide reserves on the order of 500-10,000 Gt of carbon. The production of Methane from hydratebearing sediments requires hydrate dissociation for releasing ...
    • Gas hydrate inhibition: A review of the role of ionic liquids 

      Tariq, M.; Rooney, D.; Othman, E.; Aparicio, S.; Atilhan, M.; ... more authors ( American Chemical Society , 2014 , Article)
      Ionic liquids (ILs) are popular designer green chemicals with great potential for use in diverse energy-related applications. Apart from the well-known low vapor pressure, the physical properties of ILs, such as ...
    • Gas Hydrate Prevention and Flow Assurance by Using Mixtures of Ionic Liquids and Synergent Compounds: Combined Kinetics and Thermodynamic Approach 

      Qureshi, M. Fahed; Atilhan, Mert; Altamash, Tausif; Tariq, Mohamad; Khraisheh, Majeda; ... more authors ( American Chemical Society , 2016 , Article)
      The thermodynamic and kinetic hydrates inhibition effects of addition of synergents poly(ethylene oxide) (PEO) and vinyl caprolactum (VCAP) with ionic liquids 1-methyl-1-propylpyrrolidinium chloride [PMPy][Cl] and ...
    • Gas hydrates inhibition via combined biomolecules and synergistic materials at wide process conditions 

      Altamash, Tausif; Qureshi, M. Fahed; Aparicio, Santiago; Aminnaji, Morteza; Tohidi, Bahman; ... more authors ( Elsevier B.V. , 2017 , Article)
      The motive of this research to present a systematic study in context of implementation of gas hydrate inhibitors that are obtained via naturally occurring amino acids (L-Alanine, Glycine, L-Histidine, L-Phenylalanine and ...
    • Gas solubility and rheological behavior study of betaine and alanine based natural deep eutectic solvents (NADES) 

      Altamash T.; Nasser M.S.; Elhamarnah Y.; Magzoub M.; Ullah R.; ... more authors ( Elsevier B.V. , 2018 , Article)
      Natural deep eutectic solvent (NADES) produced herein this work by mixing betaine and alanine with lactic acid and malic acid with 1:1 M mixing ratios. Thermophysical properties including water content, thermal stability, ...
    • Gas templating of resorcinol-formaldehyde xerogels 

      Awadallah-F A.; Al-Muhtaseb S.A. ( Elsevier B.V. , 2018 , Article)
      Gas templating of gels is a novel route in the know-how technology of templating porous gels. This technology depends basically on infusing certain gases into the media of sol-gel reaction upon the gelation process. The ...
    • Gear Tooth Crack Detection Using Modal Analysis 

      Mohammed, Omar D.; Sassi, Sadok ( IEEE , 2022 , Conference Paper)
      This paper aims to propose an experimental method to detect and quantify the existence of cracks in spur gear teeth using modal analysis. Frequency Response Functions FRFs obtained analytically in previous work are considered ...