Search
Now showing items 211-220 of 248
Countering The Growing Cyber Threat To Gulf Security
(
Gulf Studies center - College of Arts & Sciences - Qatar University
, 2021 , Conference Paper)
The global threat of cyber attacks from hostile international and domestic actors against states, commercial enterprises and private individuals is rising exponentially. Foreign states use cyber operations against governments, ...
Understanding the Scales Formation Inhibition Mechanism on C-Steel in a Sour Media
(
The Electrochemical Society
, 2019 , Conference Paper)
Corrosion control in sour environments is a severe challenge for the oil and gas industries with respect to sour media. One of the approaches to mitigate such a problem is to use corrosion inhibitors (CI). The selection ...
Sulfide Scaling and Corrosion of Carbon Steel in a Sour Medium
(
The Electrochemical Society
, 2017 , Conference Paper)
The damage caused by the building up of scale inside wellbores and pipelines costs millions of pounds each year. A better understanding of scale formation and the kinetic nature of the process is essential, for asset ...
Coins from Al-Zubarah, Qatar: A historical-scientific study
(
Magnus Group LLC
, 2021 , Conference Paper)
A surface archaeological coins “Zu/111 found at the old town of Al-Zubarah, Qatar” has been analysed complementarily using historic and scientific characterization techniques. For example, a scanning electron microscope ...
Seismic detection of a sinkhole using spectral-based analysis
(
Society of Exploration Geophysicists
, 2014 , Conference Paper)
Seismic data recorded during a survey in the vicinity of a sinkhole revealed distinct resonances at 70 Hz. Frequency domain data inversion based on exact modeling produced effective elastic parameters for the location over ...
DQN based Blockchain Data Storage in Resource-constrained IoT System
(
Institute of Electrical and Electronics Engineers Inc.
, 2023 , Conference Paper)
Applying blockchain technology in the Internet of Things (IoT) systems to realize massive data storage is a promising technology, which can eliminate the dependence of IoT on central servers and protect data security ...
Ambivalent Sexism in the State of Qatar: Gender Roles and Patriarchal Attitudes
(
International Sociological Association
, 2021 , Conference Paper)
The State of Qatar has undertaken considerable initiatives that prioritize strategies for female empowerment and promote gender equality. This paper investigates whether the effects of these equality initiatives are reflected ...
Flow mapping of multiphase flows using a novel single stem endoscopic particle image velocimetry instrument
(
Institute of Physics Publishing
, 2011 , Conference Paper)
Particle image velocimetry (PIV) is a successful flow mapping technique which can optically quantify large portions of a flow regime. This enables the method to be completely non-intrusive. The ability to be non-intrusive ...
Design and Implementation of a Threat-Specific Security Risk Assessment Tool
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Security threats posed to individual cloud computing clients vary depending on their specific security requirements. However, Cloud Providers apply generic security risk assessment approaches which result do not consider ...
Watermarking: A review of software and hardware techniques
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Conference Paper)
Watermarking is a well-known technique traditionally used in banknotes and other documents to discourage counterfeiting. It usually consists of semi-transparent symbols embedded on paper. Similar concepts were applied to ...