407 results on '"A. El-Hajj"'
Search Results
2. Analysis of Hockey Forward Line Corsi: Should the Focus Be on Forward Pairs?
3. Reconfigurable Precision SRAM-based Analog In-memory-compute Macro Design.
4. Segmentation and Classification of Airborne GNSS-R Reflectivity Signals with Speckle Noise Mitigation.
5. Enhancing Resilience in Digital Twins: ASCON-Based Security Solutions for Industry 4.0.
6. A 0.67 $\mu$V-IIRN super-T$\Omega$-Z$_{IN}$ 17.5 $\mu$W/Ch Active Electrode With In-Channel Boosted CMRR for Distributed EEG Monitoring.
7. Detection of incipient faults in nine-phase machines: Impact of the star winding configuration.
8. Change Point Detection in Radar Reflectivity Measurements Contaminated by Speckle Noise.
9. A Secure and Resilient Smart Energy Meter.
10. Ground-Based Soil Moisture Retrieval Using the Correlation Between Dual-Polarization GNSS-R Interference Patterns.
11. Disease Bundling or Specimen Bundling? Cost- and Capacity-Efficient Strategies for Multidisease Testing with Genetic Assays.
12. Automatic image registration on intraoperative CBCT compared to Surface Matching registration on preoperative CT for spinal navigation: accuracy and workflow.
13. Sustainable Semantics for Sustainable Research Data.
14. CAT: Caution Aware Transfer in Reinforcement Learning via Distributional Risk.
15. LEVIS: Large Exact Verifiable Input Spaces for Neural Networks.
16. Systematic review: Comparing zk-SNARK, zk-STARK, and bulletproof protocols for privacy-preserving authentication.
17. Systematic literature review: Digital twins' role in enhancing security for Industry 4.0 applications.
18. Should we use model-free or model-based control? A case study of battery management systems.
19. SINBAD: Saliency-informed detection of breakage caused by ad blocking.
20. Machine Learning in Cybersecurity: Advanced Detection and Classification Techniques for Network Traffic Environments.
21. Survey on IoT Multi-Factor Authentication Protocols: A Systematic Literature Review.
22. Prompt Me a Dataset: An Investigation of Text-Image Prompting for Historical Image Dataset Creation Using Foundation Models.
23. Predicting the Performance-Cost Trade-off of Applications Across Multiple Systems.
24. An end-to-end Approach to a Reinforcement Learning in Transport Logistics.
25. Securing IoT Device Networks: A Digital Twin and Automated Adversary Emulation Approach.
26. Defeating MageCart Attacks in a NAISS Way.
27. Analyzing Patterns of Car Speeding in an Urban Environment using Multivariate Functional Data Clustering.
28. Parallelizing Maximal Clique Enumeration on GPUs.
29. SimplePIM: A Software Framework for Productive and Efficient Processing-in-Memory.
30. Assessment of Al Assi River Water Quality.
31. Advanced IOT Traffic Light Control System.
32. Investigation of BIM Contractual Perspective in the MENA Construction Industry.
33. Enhancing IoT Security: Design and Evaluation of a Raspberry Pi-Based Intrusion Detection System.
34. A Comparison of Authentication Protocols for Unified Client Applications.
35. ECC: Enhancing Smart Grid Communication with Ethereum Blockchain, Asymmetric Cryptography, and Cloud Services.
36. Security Aspects of Digital Twins in IoT.
37. Mining COVID-19 Data to Predict The Effect of Policies on Severity of Outbreaks.
38. Open-Domain Response Generation in Low-Resource Settings using Self-Supervised Pre-Training of Warm-Started Transformers.
39. Metadial: A Meta-learning Approach for Arabic Dialogue Generation.
40. Automated Generation of Human-readable Natural Arabic Text from RDF Data.
41. Calculated Epithelial/Absorbed Power Density for Exposure From Antennas at 10-90 GHz: Intercomparison Study Using a Planar Skin Model.
42. Investigation of Power Levels Related to Different EMF Exposure Metrics at 6 GHz.
43. Evaluating the Efficiency of zk-SNARK, zk-STARK, and Bulletproof in Real-World Scenarios: A Benchmark Study.
44. Convergent scheme for a non-local transport system modeling dislocations dynamics.
45. Automobile insurance fraud detection using data mining: A systematic literature review.
46. NAISS: A reverse proxy approach to mitigate MageCart's e-skimmers in e-commerce.
47. An ensemble-based machine learning model for predicting type 2 diabetes and its effect on bone health.
48. Augmented reality navigation in external ventricular drain insertion - a systematic review and meta-analysis.
49. Decentralized Zone-Based PKI: A Lightweight Security Framework for IoT Ecosystems.
50. Parallel Vertex Cover Algorithms on GPUs.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.