-
61
Analyzing the Influence of Climate and Anthropogenic Development on Vegetation Cover in the Coastal Ecosystems of GCC
Published 2025“…Our results revealed significant changes in land cover, as seen by an increase in artificial built-up areas by 15.5% in two decades and a corresponding decrease in bareland and dense vegetation. …”
-
62
A memristive all-inclusive hypernetwork for parallel analog deployment of full search space architectures
Published 2024“…<p dir="ltr">In recent years, there has been a significant advancement in memristor-based neural networks, positioning them as a pivotal processing-in-memory deployment architecture for a wide array of deep learning applications. …”
-
63
TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection
Published 2020“…Processing similar features that provide redundant information increases the computational time, which is a critical problem especially for users with constrained resources (battery, energy). …”
-
64
How does varying the number of personas affect user perceptions and behavior? Challenging the ‘small personas’ hypothesis!
Published 2022“…Our study results from eye-tracking and survey data suggest that when using interactive persona systems, the number of personas can be increased from the conventionally suggested ‘less than ten’, without significant negative effects on user perceptions or task performance, and with the positive effects of increasing engagement with the personas, having a more diverse representation of the end-user population, as well as users accessing personas from more varied demographic groups for a design task. …”
-
65
-
66
-
67
-
68
-
69
Super Neurons
Published 2023“…It is highly desired to improve the receptive field size without increasing the kernel dimensions. This requires a significant upgrade over the generative neurons to achieve the “non-localized kernel operations” for each connection between consecutive layers. …”
-
70
-
71
-
72
Set-based approach for efficient evaluation and analysis of XACML policies. (c2014)
Published 2014Get full text
Get full text
masterThesis -
73
-
74
-
75
-
76
Hybrid deep learning based threat intelligence framework for Industrial IoT systems
Published 2025“…A significant challenge currently confronting the Industrial Internet of Things (IIoT) is the increasing prevalence of sophisticated IoT malware threats and attacks. …”
-
77
-
78
-
79
-
80
Secure Storage of Crypto Wallet Seed Phrase Using ECC and Splitting Technique
Published 2024“…It was concluded that it is only possible to hack a seed phrase if a significant portion of it is already known, but even this would require a significant amount of time and computational power.…”