Search alternatives:
computation » computational (Expand Search)
increased » increase (Expand Search)
decrease » increase (Expand Search)
Showing 121 - 140 results of 382 for search '(( significant computation increased ) OR ( significantly (impacts OR impact) decrease ))', query time: 0.11s Refine Results
  1. 121
  2. 122

    Pore-scale simulation of fine particles migration in porous media using coupled CFD-DEM by Ahmed Elrahmani (17128837)

    Published 2022
    “…The time required to develop bridging and subsequent clogging of the pore space that lead to permeability reduction decreases as the flow velocity increases. The size of the fine particles has a significant impact on permeability reduction where the reduction in permeability increases as the size of particles increases. …”
  3. 123
  4. 124

    Supporting secure dynamic alert zones using searchable encryption and graph embedding by Sina Shaham (17707254)

    Published 2023
    “…Our extensive experimental evaluation shows that our solutions can significantly improve computational overhead compared to existing baselines.…”
  5. 125
  6. 126

    A novel mobile and vehicular Ad Hoc cloud framework for intursion detection. (c2017) by Dbouk, Toufic H

    Published 2017
    “…Based on our IOD module, our approach is capable of significantly reducing energy consumption, execution time, and number of selected computational nodes.…”
    Get full text
    Get full text
    Get full text
    masterThesis
  7. 127
  8. 128

    Artificial Intelligence for Detecting and Quantifying Fatty Liver in Ultrasound Images: A Systematic Review by Fahad Muflih Alshagathrh (18427950)

    Published 2022
    “…According to the qualitative analysis, AI significantly enhanced the diagnosis of NAFLD, Non-Alcoholic Steatohepatitis (NASH), and liver fibrosis. …”
  9. 129
  10. 130

    LightEnsemble-Guard: An Optimized Ensemble Learning Framework for Securing Resource-Constrained IoT Systems by Muhammad Usama Tanveer (22225360)

    Published 2025
    “…The results highlight LightEnsemble-Guard as an effective, scalable and lightweight solution for real-time IoT security, significantly outperforming traditional models in both accuracy and computational efficiency.…”
  11. 131
  12. 132
  13. 133
  14. 134

    Dimensional and positional temporomandibular joint osseous characteristics in normodivergent facial patterns with and without temporomandibular disorders by Maged S. Alhammadi (14150757)

    Published 2023
    “…Three-dimensional positional and dimensional temporomandibular joint characteristics, including glenoid fossa, mandibular condyles, and joint spaces, were assessed by cone beam computed tomography.</p><h3>Results</h3><p dir="ltr">The glenoid fossa positions in the three orthogonal planes and height showed statistical significance between the two studied groups. …”
  15. 135

    Internet of everything meets the metaverse: Bridging physical and virtual worlds with blockchain by Wajid Rafique (19757058)

    Published 2024
    “…However, despite substantial advancements in related fields, there remains a significant gap in comprehensive surveys that address the integration of AI/ML, 6G, and blockchain in the Metaverse. …”
  16. 136

    Psychological inoculation against problematic social media use among adolescents: An experimental study by Sameha Alshakhsi (17032311)

    Published 2025
    “…The passive inoculation group showed a significant decrease in deception only. No changes were observed in the control group. …”
  17. 137
  18. 138

    Exploiting Sparsity in Amplify-and-Forward Broadband Multiple Relay Selection by Ala Gouissem (7006463)

    Published 2019
    “…<p dir="ltr">Cooperative communication has attracted significant attention in the last decade due to its ability to increase the spatial diversity order with only single-antenna nodes. …”
  19. 139

    The use of multi-task learning in cybersecurity applications: a systematic literature review by Shimaa Ibrahim (22155739)

    Published 2024
    “…<p dir="ltr">Cybersecurity is crucial in today’s interconnected world, as digital technologies are increasingly used in various sectors. The risk of cyberattacks targeting financial, military, and political systems has increased due to the wide use of technology. …”
  20. 140