Browsing by Title
Now showing items 24868-24887 of 49153
-
Thin, flexible supercapacitors made from carbon nanofiber electrodes decorated at room temperature with manganese oxide nanosheets
( Hindawi Publishing Corporation , 2013 , Article)We report the fabrication and electrochemical performance of a flexible thin film supercapacitor with a novel nanostructured composite electrode. The electrode was prepared by in situ coprecipitation of two-dimensional ... -
Thin-film composite hollow fiber membranes incorporated with graphene oxide in polyethersulfone support layers for enhanced osmotic power density
( Elsevier B.V. , 2019 , Article)This study focused on the development of pressure retarded osmosis (PRO) thin film composite (TFC) membranes for enhanced osmotic power using hollow fiber polyethersulfone (PES) support structure modified by incorporating ... -
Think like a Virus: Toward Improving Nanovaccine Development against SARS-CoV-2
( MDPI , 2022 , Article Review)There is no doubt that infectious diseases present global impact on the economy, society, health, mental state, and even political aspects, causing a long-lasting dent, and the situation will surely worsen if and when the ... -
Thiostrepton inhibits growth and induces apoptosis by targeting FoxM1/SKP2/MTH1 axis in B-precursor acute lymphoblastic leukemia cells
( Taylor and Francis Group , 2021 , Article)Forkhead box M1 (FoxM1) is a transcription factor that plays an important role in the etiology of many cancers, however, its role has not been elucidated in B-precursor acute lymphoblastic leukemia (B-pre-ALL). In the ... -
Third Harmonic Operation of Current Fed Resonant Inverters for Inductive Power Transfer Systems
( IEEE Computer Society , 2020 , Conference Paper)This paper presents Third Harmonic Operation (THO) of Current Fed Parallel Resonant Push-pull Inverter (CFPRPI) for Inductive Power Transfer (IPT) systems. THO is proposed for CFPRPI to achieve higher voltage ratio with ... -
The third reunion concert (2011) حفل لم الشمل الثالث
( جامعة قطر , 2011 , Video) -
The Third Youth Research Forum - Day 1
( Qatar University , 2021 , Video) -
‘The Third Youth Research Forum - Day 2
( Qatar University , 2021 , Video) -
THIRD-PARTY PRESENCE EFFECT WITH PROPENSITY SCORE MATCHING
( Oxford University Press , 2015 , Article)This paper attempts to measure the effect of third-party presence during the interview on sensitive questions about women’s empowerment in Morocco, a country with Muslim culture and traditions. Data are from the 2003 ... -
This House believes that considering the continuous quarantine and precautionary measures should be of a priority over lifting the restrictions to avoid the negative economic and social consequences
( College of Medicine - Qatar University , 2020 , Video)NA -
This is not new! Spotting previously-verified claims over Twitter
( Elsevier , 2023 , Article)Several fake claims are commonly repeated over time, especially on social media. To identify such previous claims, the verified claim retrieval task was studied, where, for a given input claim, the goal is to find ... -
This is the day your life must surely change [11] Prioritising behavioural change in musculoskeletal practice
( Elsevier Ltd , 2021 , Other)Behavioural change is the modification or transformation of behaviour. Health behaviour has been defined as, ‘any activity undertaken for the purpose of preventing or detecting disease or for improving health and wellbeing’ ... -
Thornton Wilder's Our Town and The Skin of Our Teeth
( Qatar University , 1989 , Article) -
Threat and vulnerability risk assessment for existing subway stations: A simplified approach
( Elsevier Ltd , 2018 , Article)People use infrastructure systems mostly without realizing how important these systems are until an attack or damage occurs and results in casualties or causes discomfort or inconvenience. Even though there have been ... -
A Threat-Specific Risk Evaluation Tool For Cloud Environments
(2018 , Professional Masters Project)With the spread of using cloud computing; both as organizations and individual, it has become a target for attackers. The cloud environment has several weaknesses that pose threats to its users’ assets. To assess any type ... -
Threat-specific security risk evaluation in the cloud
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)Existing security risk evaluation approaches (e.g., asset-based) do not consider specific security requirements of individual cloud computing clients in the security risk evaluation. In this paper, we propose a threat-specific ... -
ThreatBased Security Risk Evaluation in the Cloud
( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference Paper)Research ProblemCyber attacks are targeting the cloud computing systems, where enterprises, governments, and individuals are outsourcing their storage and computational resources for improved scalability and dynamic ...