تصفح College of Engineering حسب العنوان
السجلات المعروضة 5866 -- 5885 من 7773
-
Present landscape of quantum computing
( John Wiley and Sons Inc , 2020 , Other)Quantum computing is currently a topic of interest that harnesses the phenomena of quantum mechanics. It can address several scientific challenges and generate new business opportunities. Recently, for the first time in ... -
Preserving And Improving Traditional Built Environments In Doha: The Case Of Old-mushaireb Area
( Hamad bin Khalifa University Press (HBKU Press) , 2014 , Conference Paper)Due to rapid urbanization during the past few decades, Doha has witnessed the disappearance of significant areas of its traditional built environment that were replaced by modern mega real-estate developments, public ... -
Prevention of barite sag in water-based drilling fluids by a urea-based additive for drilling deep formations
( MDPI , 2020 , Article)Barite sag is a challenging phenomenon encountered in deep drilling with barite-weighted fluids and associated with fluid stability. It can take place in vertical and directional wells, whether in dynamic or static conditions. ... -
Preventive replacement policies with aging failure and third-part damage
( SciTePress , 2016 , Conference Paper)In general, corrosions, degrading the mechanical strength of pipelines gradually with its age in a stochastic way, is the predominant cause of pipeline leaks. In addition, the third-part damage is the leading cause of ... -
Principles and recommendations for client information requirements for BIM enabled construction projects in Qatar
( Inderscience Publishers , 2016 , Article)Employer's information requirements (EIR) is one of the key early documents in projects using building information modelling (BIM). EIR, introduced by the UK BIM Task Group, sets out information deliverables and the standards ... -
Principles of excellence in Engineering education applied to GCC/MENA Engineering Colleges and comparison with Australia and France: A thesis with analysis, results, observations
(2013 , Conference Paper)This invited paper aims at reviewing the current status of Engineering education in the GCC countries and proposing a few guidelines for reform and improvement. The principles applied to this process have been developed ... -
Principles of time-frequency feature extraction for change detection in non-stationary signals: Applications to newborn EEG abnormality detection
( Elsevier Ltd , 2015 , Article)This paper considers the general problem of detecting change in non-stationary signals using features observed in the time-frequency (t,f) domain, obtained using a class of quadratic time-frequency distributions (QTFDs). ... -
Prior zero forcing for cognitive relaying
( IEEE , 2013 , Article)Relaying primary signals by cognitive base-stations (CBSs) can help the primary system and thus win CBSs a higher chance to transmit their own signals. For this purpose, conventional zero-forcing (CZF) beamforming is a ... -
Prioritisation of lean construction barriers in Qatari context: A fuzzy AHP approach
( Inderscience Enterprises Ltd. , 2019 , Article)This study identifies, reviews and prioritises lean construction barriers in Qatari context. Lean has been widely adopted in manufacturing and service sectors, but its applications in construction sector are found in scarce. ... -
Prioritising solutions for Lean Six Sigma adoption barriers through fuzzy AHP-modified TOPSIS framework
( Emerald Group Publishing Ltd. , 2018 , Article)Purpose: This paper aims to guide about prioritisation and ranking of the solutions and overcoming barriers to facilitate the adoption of Lean Six Sigma (LSS) by using a hybrid framework. Design/methodology/approach: It ... -
Prioritizing deadline-constrained data flows in cloud datacenter networks
( Association for Computing Machinery , 2016 , Conference Paper)Real-time interactive application workloads (e.g. web search, social networking, etc.) are composed of a remarkably large number of mini request partitions that require stringent delayminimal aggregation of responses and ... -
Priority-based medium access control for wireless body area networks with high-performance design
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)The wireless body area network (WBAN) has attracted considerable attention. Two main problems exist in WBANs: 1) the quality of service (QoS) requirements and 2) the energy efficiency of data transmission. To solve the ... -
Priority-based scheduling for limited energy cognitive relaying
( IEEE , 2010 , Conference Paper)We study the problem of cognitive relaying with limited-energy constraint in opportunistic spectrum access cognitive networks. Under this network setting, the cognitive user increases the spectrum availability for its own ... -
Priority-based zero-forcing in spectrum sharing cognitive systems
( IEEE , 2013 , Article)We consider a spectrum sharing scenario between cognitive radio (CR) users and a licensed primary user (PU), in which the PU is not able to successfully transmit data to its destined receiver. The cognitive base station ... -
Privacy and security issues in online social networks
( MDPI AG , 2018 , Article)The advent of online social networks (OSN) has transformed a common passive reader into a content contributor. It has allowed users to share information and exchange opinions, and also express themselves in online virtual ... -
Privacy Leakage in Smart Homes and Its Mitigation: IFTTT as a Case Study
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)The combination of smart home platforms and automation apps introduce many conveniences to smart home users. However, this also brings the potential of privacy leakage. If a smart home platform is permitted to collect all ... -
Privacy-Aware Collaborative Task Offloading in Fog Computing
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)Numerous new applications have been proliferated with the mature of 5G, which generates a large number of latency-sensitive and computationally intensive mobile data requests. The real-time requirement of these mobile data ... -
Privacy-preserving artificial intelligence in healthcare: Techniques and applications
( Elsevier , 2023 , Article Review)There has been an increasing interest in translating artificial intelligence (AI) research into clinically-validated applications to improve the performance, capacity, and efficacy of healthcare services. Despite substantial ... -
Privacy-Preserving Distributed IDS Using Incremental Learning for IoT Health Systems
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)Existing techniques for incremental learning are computationally expensive and produce duplicate features leading to higher false positive and true negative rates. We propose a novel privacy-preserving intrusion detection ... -
A Privacy-Preserving Medical Data Sharing Scheme Based on Consortium Blockchain
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)Electronic medical records (EMRs) can provide medical institutes with a number of research materials, which could promote the development of medical field. In order to protect patients' privacy while achieving efficient ...