-
101
A memristive all-inclusive hypernetwork for parallel analog deployment of full search space architectures
منشور في 2024"…<p dir="ltr">In recent years, there has been a significant advancement in memristor-based neural networks, positioning them as a pivotal processing-in-memory deployment architecture for a wide array of deep learning applications. …"
-
102
TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection
منشور في 2020"…Processing similar features that provide redundant information increases the computational time, which is a critical problem especially for users with constrained resources (battery, energy). …"
-
103
-
104
A Framework for Multi-cloud Cooperation with Hardware Reconfiguration Support
منشور في 2013"…Cloud computing is increasingly becoming a desirable and foundational element in international enterprise computing. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
105
-
106
How does varying the number of personas affect user perceptions and behavior? Challenging the ‘small personas’ hypothesis!
منشور في 2022"…Our study results from eye-tracking and survey data suggest that when using interactive persona systems, the number of personas can be increased from the conventionally suggested ‘less than ten’, without significant negative effects on user perceptions or task performance, and with the positive effects of increasing engagement with the personas, having a more diverse representation of the end-user population, as well as users accessing personas from more varied demographic groups for a design task. …"
-
107
-
108
-
109
Super Neurons
منشور في 2023"…It is highly desired to improve the receptive field size without increasing the kernel dimensions. This requires a significant upgrade over the generative neurons to achieve the “non-localized kernel operations” for each connection between consecutive layers. …"
-
110
-
111
-
112
-
113
-
114
-
115
-
116
-
117
-
118
Hybrid deep learning based threat intelligence framework for Industrial IoT systems
منشور في 2025"…A significant challenge currently confronting the Industrial Internet of Things (IIoT) is the increasing prevalence of sophisticated IoT malware threats and attacks. …"
-
119
-
120
Secure Storage of Crypto Wallet Seed Phrase Using ECC and Splitting Technique
منشور في 2024"…It was concluded that it is only possible to hack a seed phrase if a significant portion of it is already known, but even this would require a significant amount of time and computational power.…"