Search
Search Results
-
Source Attribution and Emissions Quantification for Methane Leak Detection: A Non-linear Bayesian Regression Approach
Methane leak detection and remediation efforts are critical for combating climate change due to methane’s role as a potent greenhouse gas. In this... -
Location Privacy
Location-based services exploit location information to provide a variety of fancy applications. For instance, E-911 in the USA (correspondingly... -
Clustering-Based Partitioning of Water Distribution Networks for Leak Zone Location
In recent years, there has been an increase in leak zone identification strategies in water distribution networks. This paper presents an analysis of... -
CFD-FEA based model to predict leak-points in a 90-degree pipe elbow
The aim of this paper is to numerically investigate Vibration-Based Leak Detection (VBLD) method in pipeline systems based on Fluid–Structure...
-
Towards an understanding of memory leak patterns: an empirical study in Python
Memory leaks, an important and difficult issue in software development, occur when an object is inadvertently retained longer than necessary....
-
dLeak: An IoT-Based Gas Leak Detection Framework for Smart Factory
Gas industries very often suffer from leakage. This paper proposes an IoT-enabled acoustic-based leak detection system to detect leaks more...
-
A Novel Leak Localization Method for Water Pipeline Systems Based on Acoustic Emission Monitoring and Event Correlation
This paper proposes a novel method for leak localization in water pipeline systems through the monitoring of acoustic emissions and cross-correlation... -
Incorporating Physics-Based Models into Data Driven Approaches for Air Leak Detection in City Buses
In this work-in-progress paper two types of physics-based models, for accessing elastic and non-elastic air leakage processes, were evaluated and... -
Identifying the Leak Sources of Hard Copy Documents
Technological advancements have made it possible to use relatively inexpensive hardware and software to replicate and leak sensitive documents. This... -
Algorithmic Protection Study Based on a Virtual Location
With the development of big data technology and wireless communication technology, Internet-of-Vehicles (IOV) has been widely used. In order to... -
Leak detection and localization in water distribution networks by combining expert knowledge and data-driven models
Leaks represent one of the most relevant faults in water distribution networks (WDN), resulting in severe losses. Despite the growing research...
-
Location Independence
In the not too distant past, most programs ran on a single computer. After the proliferation of JavaScript in the web browser, apps on mobile phones,... -
A New Proposal for Detection and Location of Cyberattacks in Industrial Processes
In the Industry 4.0 paradigm, the cybersecurity is a key aim to obtain high levels of performance of the industries based on the use of the IoT... -
A trusted de-swinging k-anonymity scheme for location privacy protection
K-anonymity has been gaining widespread attention as one of the most widely used technologies to protect location privacy. Nevertheless, there are...
-
EP2LBS: efficient privacy-preserving scheme for location-based services
Mobile users frequently change their location and often desire to avail of location-based services (LBS). LBS server provides services to users at...
-
A Leak Detection in Water Pipelines Using Discrete Wavelet Decomposition and Artificial Neural Network
This paper proposes an ANN(Artificial Neuron Network) model to find the location of leakage in water-distribution systems. To detect the water... -
SHELBRS: Location-Based Recommendation Services Using Switchable Homomorphic Encryption
Location-Based Recommendation Services (LBRS) has seen an unprecedented rise in its usage in recent years. LBRS facilitates a user by recommending... -
Anonymous location sharing in urban area mobility
This work studies the location-privacy preserving location update in the context of data-centric people mobility applications. The mobility model...
-
Simple electromagnetic analysis attack based on geometric leak on ASIC implementation of ring-oscillator PUF
Physically unclonable functions (PUFs) are assumed to provide high tamper resistance against counterfeiting and hardware attacks since PUFs extract...
-
Multiproduct Pipeline Leak Detection and Localization System Using Artificial Intelligence
The modeling and simulation of a leak detection system with incidence localization for a multiproduct unidirectional flow pipeline is presented in...