-
61
-
62
A Framework for Multi-cloud Cooperation with Hardware Reconfiguration Support
Published 2013“…Cloud computing is increasingly becoming a desirable and foundational element in international enterprise computing. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
63
Analyzing the Influence of Climate and Anthropogenic Development on Vegetation Cover in the Coastal Ecosystems of GCC
Published 2025“…Our results revealed significant changes in land cover, as seen by an increase in artificial built-up areas by 15.5% in two decades and a corresponding decrease in bareland and dense vegetation. …”
-
64
-
65
How does varying the number of personas affect user perceptions and behavior? Challenging the ‘small personas’ hypothesis!
Published 2022“…Our study results from eye-tracking and survey data suggest that when using interactive persona systems, the number of personas can be increased from the conventionally suggested ‘less than ten’, without significant negative effects on user perceptions or task performance, and with the positive effects of increasing engagement with the personas, having a more diverse representation of the end-user population, as well as users accessing personas from more varied demographic groups for a design task. …”
-
66
-
67
-
68
-
69
Super Neurons
Published 2023“…It is highly desired to improve the receptive field size without increasing the kernel dimensions. This requires a significant upgrade over the generative neurons to achieve the “non-localized kernel operations” for each connection between consecutive layers. …”
-
70
-
71
-
72
Set-based approach for efficient evaluation and analysis of XACML policies. (c2014)
Published 2014Get full text
Get full text
masterThesis -
73
-
74
-
75
-
76
-
77
-
78
Hybrid deep learning based threat intelligence framework for Industrial IoT systems
Published 2025“…A significant challenge currently confronting the Industrial Internet of Things (IIoT) is the increasing prevalence of sophisticated IoT malware threats and attacks. …”
-
79
-
80
Secure Storage of Crypto Wallet Seed Phrase Using ECC and Splitting Technique
Published 2024“…It was concluded that it is only possible to hack a seed phrase if a significant portion of it is already known, but even this would require a significant amount of time and computational power.…”