Search alternatives:
computation » computational (Expand Search)
Showing 181 - 200 results of 500 for search '(( significant (computation OR composition) increase ) OR ( significantly impact decrease ))*', query time: 0.11s Refine Results
  1. 181
  2. 182
  3. 183
  4. 184

    Internet of everything meets the metaverse: Bridging physical and virtual worlds with blockchain by Wajid Rafique (19757058)

    Published 2024
    “…However, despite substantial advancements in related fields, there remains a significant gap in comprehensive surveys that address the integration of AI/ML, 6G, and blockchain in the Metaverse. …”
  5. 185

    Exploiting Sparsity in Amplify-and-Forward Broadband Multiple Relay Selection by Ala Gouissem (7006463)

    Published 2019
    “…<p dir="ltr">Cooperative communication has attracted significant attention in the last decade due to its ability to increase the spatial diversity order with only single-antenna nodes. …”
  6. 186
  7. 187

    LightEnsemble-Guard: An Optimized Ensemble Learning Framework for Securing Resource-Constrained IoT Systems by Muhammad Usama Tanveer (22225360)

    Published 2025
    “…The results highlight LightEnsemble-Guard as an effective, scalable and lightweight solution for real-time IoT security, significantly outperforming traditional models in both accuracy and computational efficiency.…”
  8. 188

    Performance evaluation of interrupted and hybrid channel heat sinks for a triple junction high concentrator photovoltaic cell by Muhammad Usman Sajid (14778232)

    Published 2025
    “…The results reveal that the hybrid channel design (Geometry F) significantly reduces the maximum solar cell temperature from 82 °C to 78 °C at CR = 1500 and Re = 400, achieving up to a 39.5 % increase in the Nusselt number compared to the conventional straight channel design (Geometry A). …”
  9. 189
  10. 190

    Dimensional and positional temporomandibular joint osseous characteristics in normodivergent facial patterns with and without temporomandibular disorders by Maged S. Alhammadi (14150757)

    Published 2023
    “…Three-dimensional positional and dimensional temporomandibular joint characteristics, including glenoid fossa, mandibular condyles, and joint spaces, were assessed by cone beam computed tomography.</p><h3>Results</h3><p dir="ltr">The glenoid fossa positions in the three orthogonal planes and height showed statistical significance between the two studied groups. …”
  11. 191

    Influence of co-current vapor flow on falling film over horizontal tube by Furqan Tahir (14429547)

    Published 2021
    “…First, the liquid load is varied between 0.02 and 0.05 kg/(m·s), and its effects on the film thickness and the wetting time are calculated, presented and discussed. Afterwards, the impact of co-current vapor flow on film distribution, wetting time, minimum thickness and its location are quantified and examined by increasing the vapor velocity up to 6 m/s with 2 m/s intervals. …”
  12. 192

    Intelligent scaling for 6G IoE services for resource provisioning by Abdullah Alharbi (4173502)

    Published 2021
    “…For 6G, more innovative technological resources are required to be handled by Mobile Edge Computing (MEC). Although the demand for change in service from different sectors, the increase in IoE, the limitation of available computing resources of MEC, and intelligent resource solutions are getting much more significant. …”
  13. 193
  14. 194
  15. 195
  16. 196
  17. 197

    Tamp-X: Attacking explainable natural language classifiers through tampered activations by Hassan Ali (3348749)

    Published 2022
    “…Recently Explainable Artificial Intelligence (XAI) methods have been proposed as a method for increasing DNN’s reliability and trustworthiness. These XAI methods are however open to attack and can be manipulated in both white-box (gradient-based) and black-box (perturbation-based) scenarios. …”
  18. 198
  19. 199

    The use of multi-task learning in cybersecurity applications: a systematic literature review by Shimaa Ibrahim (22155739)

    Published 2024
    “…<p dir="ltr">Cybersecurity is crucial in today’s interconnected world, as digital technologies are increasingly used in various sectors. The risk of cyberattacks targeting financial, military, and political systems has increased due to the wide use of technology. …”
  20. 200

    Efficient experimental design for uncertainty reduction in gene regulatory networks by Roozbeh Dehghannasiri (5725805)

    Published 2015
    “…In this paper, we propose a computationally efficient experimental design method. …”