Search
Now showing items 1-10 of 258
An adaptive sliding mode observer for linear systems under malicious attack
(
Institute of Electrical and Electronics Engineers Inc.
, 2017 , Conference Paper)
Recent years have witnessed extensive research activities in the development of control law architectures for cyber-physical systems consisting of sensing, computing and communication modules working together to control ...
Impact of Gender-related Legal Regulations on Pursuing Sustainable Development: A study of Kuwait's National Development Plan (Vision 2035)
(
Gulf Studies center - College of Arts & Sciences - Qatar University
, 2020 , Conference Paper)
This paper seeks to analyze the impact of gender inequality on the Sustainable Development Goals 2030 as expressed in the UN Post-Millennium global program. More specifically, it aims to illustrate how gender equality and ...
Beh Tou Cheh? (What's It to You?): Feminist Challenges in Iranian Social Media
(
Gulf Studies center - College of Arts & Sciences - Qatar University
, 2020 , Conference Paper)
Online feminist activism has opened a different path for ordinary Iranians who are not necessarily versed in post-revolutionary discourses on feminism and political activism nor are conversant with the names and past ...
A vision-based zebra crossing detection method for people with visual impairments
(
IEEE
, 2020 , Conference Paper)
Safe navigation for visually impaired is challenging without assistive technology. This paper proposes a pedestrian crossing detection approach to help visually impaired people. We introduce the use of multiple convolutional ...
Smart Grid Cybersecurity: Standards and Technical Countermeasures
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Conference Paper)
Cybersecurity in smart grids is of critical importance given the heavy reliance of modern societies on electricity and the recent cyberattacks that resulted in blackouts. The evolution of the legacy electric grid to a ...
An efficient instance hiding scheme
(
Association for Computing Machinery
, 2016 , Conference Paper)
Delegating computation, which is applicable to many practical contexts such as cloud computing or pay-TV system, concerns the task where a computationally weak client wants to securely compute a very complex function f on ...
Synthesis and Characterization of Fe3O4 Nanoparticles Using Different Experimental Methods
(
Institute of Physics Publishing
, 2020 , Conference Paper)
This paper reports a comparative study on the synthesis of Fe3O4 nanoparticles using three different methods, namely; Co-precipitation, Sonochemical and Solvothermal methods. Ferric chloride hexahydrate (FeCl3.6H2O) and ...
Privacy preserving computation in cloud using noise-free fully homomorphic encryption (FHE) schemes
(
Springer Verlag
, 2016 , Conference Paper)
With the wide adoption of cloud computing paradigm, it is important to develop appropriate techniques to protect client data privacy in the cloud. Encryption is one of the major techniques that could be used to achieve ...
Data enrichment in fine-grained classification of aquatic macroinvertebrates
(
Institute of Electrical and Electronics Engineers Inc.
, 2017 , Conference Paper)
The types and numbers of benthic macroinverte-brates found in a water body reflect water quality. Therefore, macroinvertebrates are routinely monitored as a part of freshwater ecological quality assessment. The collected ...
Corrosion behavior of API X-80 steel in hydrogen sulfide environment at different temperatures
(
National Assoc. of Corrosion Engineers International
, 2016 , Conference Paper)
The electrochemical behavior of API X-80 steel materials in 3.5% wt. of NaCI solution containing different concentration of H2S at different temperatures was studied. Potendiodynamic polarization, electrochemical impedance ...