Search alternatives:
impaired » impacted (Expand Search)
decrease » increase (Expand Search)
Showing 101 - 120 results of 266 for search '(( significant (computation OR computational) increases ) OR ( significantly impaired decrease ))', query time: 0.11s Refine Results
  1. 101
  2. 102
  3. 103
  4. 104
  5. 105

    Internet of everything meets the metaverse: Bridging physical and virtual worlds with blockchain by Wajid Rafique (19757058)

    Published 2024
    “…</p><h2>Other Information</h2> <p> Published in: Computer Science Review<br> License: <a href="http://creativecommons.org/licenses/by/4.0/" target="_blank">http://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1016/j.cosrev.2024.100678" target="_blank">https://dx.doi.org/10.1016/j.cosrev.2024.100678</a></p>…”
  6. 106
  7. 107

    LightEnsemble-Guard: An Optimized Ensemble Learning Framework for Securing Resource-Constrained IoT Systems by Muhammad Usama Tanveer (22225360)

    Published 2025
    “…The results highlight LightEnsemble-Guard as an effective, scalable and lightweight solution for real-time IoT security, significantly outperforming traditional models in both accuracy and computational efficiency.…”
  8. 108
  9. 109

    Dimensional and positional temporomandibular joint osseous characteristics in normodivergent facial patterns with and without temporomandibular disorders by Maged S. Alhammadi (14150757)

    Published 2023
    “…Three-dimensional positional and dimensional temporomandibular joint characteristics, including glenoid fossa, mandibular condyles, and joint spaces, were assessed by cone beam computed tomography.</p><h3>Results</h3><p dir="ltr">The glenoid fossa positions in the three orthogonal planes and height showed statistical significance between the two studied groups. …”
  10. 110

    Tamp-X: Attacking explainable natural language classifiers through tampered activations by Hassan Ali (3348749)

    Published 2022
    “…</p><h2>Other Information</h2> <p> Published in: Computers & Security<br> License: <a href="http://creativecommons.org/licenses/by/4.0/" target="_blank">http://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1016/j.cose.2022.102791" target="_blank">https://dx.doi.org/10.1016/j.cose.2022.102791</a></p>…”
  11. 111
  12. 112
  13. 113
  14. 114
  15. 115

    The use of multi-task learning in cybersecurity applications: a systematic literature review by Shimaa Ibrahim (22155739)

    Published 2024
    “…<p dir="ltr">Cybersecurity is crucial in today’s interconnected world, as digital technologies are increasingly used in various sectors. The risk of cyberattacks targeting financial, military, and political systems has increased due to the wide use of technology. …”
  16. 116
  17. 117
  18. 118
  19. 119
  20. 120

    Intelligent scaling for 6G IoE services for resource provisioning by Abdullah Alharbi (4173502)

    Published 2021
    “…For 6G, more innovative technological resources are required to be handled by Mobile Edge Computing (MEC). Although the demand for change in service from different sectors, the increase in IoE, the limitation of available computing resources of MEC, and intelligent resource solutions are getting much more significant. …”