We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 5,708 results
  1. Source Attribution and Emissions Quantification for Methane Leak Detection: A Non-linear Bayesian Regression Approach

    Methane leak detection and remediation efforts are critical for combating climate change due to methane’s role as a potent greenhouse gas. In this...
    Mirco Milletarì, Sara Malvar, ... Anirudh Badam in Machine Learning, Optimization, and Data Science
    Conference paper 2023
  2. Location Privacy

    Location-based services exploit location information to provide a variety of fancy applications. For instance, E-911 in the USA (correspondingly...
    Yunhao Liu, Zheng Yang in Location, Localization, and Localizability
    Chapter 2024
  3. Clustering-Based Partitioning of Water Distribution Networks for Leak Zone Location

    In recent years, there has been an increase in leak zone identification strategies in water distribution networks. This paper presents an analysis of...
    Marlon J. Ares-Milián, Marcos Quiñones-Grueiro, ... Orestes Llanes-Santiago in Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications
    Conference paper 2021
  4. CFD-FEA based model to predict leak-points in a 90-degree pipe elbow

    The aim of this paper is to numerically investigate Vibration-Based Leak Detection (VBLD) method in pipeline systems based on Fluid–Structure...

    Ahmed A. Abuhatira, Salim M. Salim, Jan B. Vorstius in Engineering with Computers
    Article Open access 03 June 2023
  5. Towards an understanding of memory leak patterns: an empirical study in Python

    Memory leaks, an important and difficult issue in software development, occur when an object is inadvertently retained longer than necessary....

    Jie Chen, Dong** Yu, Haiyang Hu in Software Quality Journal
    Article 17 June 2023
  6. dLeak: An IoT-Based Gas Leak Detection Framework for Smart Factory

    Gas industries very often suffer from leakage. This paper proposes an IoT-enabled acoustic-based leak detection system to detect leaks more...

    Anamika Rajbanshi, Debanjan Das, ... Rajarshi Mahapatra in SN Computer Science
    Article 05 May 2022
  7. A Novel Leak Localization Method for Water Pipeline Systems Based on Acoustic Emission Monitoring and Event Correlation

    This paper proposes a novel method for leak localization in water pipeline systems through the monitoring of acoustic emissions and cross-correlation...
    Conference paper 2024
  8. Incorporating Physics-Based Models into Data Driven Approaches for Air Leak Detection in City Buses

    In this work-in-progress paper two types of physics-based models, for accessing elastic and non-elastic air leakage processes, were evaluated and...
    Conference paper 2023
  9. Identifying the Leak Sources of Hard Copy Documents

    Technological advancements have made it possible to use relatively inexpensive hardware and software to replicate and leak sensitive documents. This...
    Pulkit Garg, Garima Gupta, ... Gaurav Gupta in Advances in Digital Forensics XVIII
    Conference paper 2022
  10. Algorithmic Protection Study Based on a Virtual Location

    With the development of big data technology and wireless communication technology, Internet-of-Vehicles (IOV) has been widely used. In order to...
    Zehui Wen, Yiqun Zhu in 6GN for Future Wireless Networks
    Conference paper 2024
  11. Leak detection and localization in water distribution networks by combining expert knowledge and data-driven models

    Leaks represent one of the most relevant faults in water distribution networks (WDN), resulting in severe losses. Despite the growing research...

    Adrià Soldevila, Giacomo Boracchi, ... Vicenç Puig in Neural Computing and Applications
    Article 14 November 2021
  12. Location Independence

    In the not too distant past, most programs ran on a single computer. After the proliferation of JavaScript in the web browser, apps on mobile phones,...
    Michael L. Perry in The Art of Immutable Architecture
    Chapter 2024
  13. A New Proposal for Detection and Location of Cyberattacks in Industrial Processes

    In the Industry 4.0 paradigm, the cybersecurity is a key aim to obtain high levels of performance of the industries based on the use of the IoT...
    Adrián Rodríguez-Ramos, Eloy Irigoyen, ... Orestes Llanes-Santiago in Progress in Artificial Intelligence and Pattern Recognition
    Conference paper 2024
  14. A trusted de-swinging k-anonymity scheme for location privacy protection

    K-anonymity has been gaining widespread attention as one of the most widely used technologies to protect location privacy. Nevertheless, there are...

    Manxiang Yang, Baopeng Ye, ... **aomei Yu in Journal of Cloud Computing
    Article Open access 08 January 2022
  15. EP2LBS: efficient privacy-preserving scheme for location-based services

    Mobile users frequently change their location and often desire to avail of location-based services (LBS). LBS server provides services to users at...

    Vijay Kumar Yadav, Nitish Andola, ... S. Venkatesan in The Journal of Supercomputing
    Article 11 April 2022
  16. A Leak Detection in Water Pipelines Using Discrete Wavelet Decomposition and Artificial Neural Network

    This paper proposes an ANN(Artificial Neuron Network) model to find the location of leakage in water-distribution systems. To detect the water...
    Conference paper 2021
  17. SHELBRS: Location-Based Recommendation Services Using Switchable Homomorphic Encryption

    Location-Based Recommendation Services (LBRS) has seen an unprecedented rise in its usage in recent years. LBRS facilitates a user by recommending...
    Mishel Jain, Priyanka Singh, Balasubramanian Raman in Security, Privacy, and Applied Cryptography Engineering
    Conference paper 2022
  18. Anonymous location sharing in urban area mobility

    This work studies the location-privacy preserving location update in the context of data-centric people mobility applications. The mobility model...

    Osman Abul, Ozan Berk Bitirgen in Knowledge and Information Systems
    Article 15 May 2021
  19. Simple electromagnetic analysis attack based on geometric leak on ASIC implementation of ring-oscillator PUF

    Physically unclonable functions (PUFs) are assumed to provide high tamper resistance against counterfeiting and hardware attacks since PUFs extract...

    Mitsuru Shiozaki, Takeshi Fu**o in Journal of Cryptographic Engineering
    Article 03 September 2020
  20. Multiproduct Pipeline Leak Detection and Localization System Using Artificial Intelligence

    The modeling and simulation of a leak detection system with incidence localization for a multiproduct unidirectional flow pipeline is presented in...

    Bukunmi Omojugba, Samson Oyetunji, Oluwumi Adetan in SN Computer Science
    Article 23 April 2020
Did you find what you were looking for? Share feedback.