بدائل البحث:
computation » computational (توسيع البحث)
increased » increase (توسيع البحث)
impacted » impact (توسيع البحث), impacts (توسيع البحث)
decrease » increase (توسيع البحث)
computation » computational (توسيع البحث)
increased » increase (توسيع البحث)
impacted » impact (توسيع البحث), impacts (توسيع البحث)
decrease » increase (توسيع البحث)
-
101
CFD Study of Particle Concentration and Stokes Number Effect on Erosion Profile.
منشور في 2017احصل على النص الكامل
doctoralThesis -
102
-
103
How does varying the number of personas affect user perceptions and behavior? Challenging the ‘small personas’ hypothesis!
منشور في 2022"…Our study results from eye-tracking and survey data suggest that when using interactive persona systems, the number of personas can be increased from the conventionally suggested ‘less than ten’, without significant negative effects on user perceptions or task performance, and with the positive effects of increasing engagement with the personas, having a more diverse representation of the end-user population, as well as users accessing personas from more varied demographic groups for a design task. …"
-
104
-
105
A memristive all-inclusive hypernetwork for parallel analog deployment of full search space architectures
منشور في 2024"…<p dir="ltr">In recent years, there has been a significant advancement in memristor-based neural networks, positioning them as a pivotal processing-in-memory deployment architecture for a wide array of deep learning applications. …"
-
106
TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection
منشور في 2020"…Processing similar features that provide redundant information increases the computational time, which is a critical problem especially for users with constrained resources (battery, energy). …"
-
107
-
108
-
109
Super Neurons
منشور في 2023"…It is highly desired to improve the receptive field size without increasing the kernel dimensions. This requires a significant upgrade over the generative neurons to achieve the “non-localized kernel operations” for each connection between consecutive layers. …"
-
110
-
111
-
112
-
113
-
114
-
115
Hybrid deep learning based threat intelligence framework for Industrial IoT systems
منشور في 2025"…A significant challenge currently confronting the Industrial Internet of Things (IIoT) is the increasing prevalence of sophisticated IoT malware threats and attacks. …"
-
116
-
117
-
118
-
119
-
120
Secure Storage of Crypto Wallet Seed Phrase Using ECC and Splitting Technique
منشور في 2024"…It was concluded that it is only possible to hack a seed phrase if a significant portion of it is already known, but even this would require a significant amount of time and computational power.…"