-
361
-
362
A Novel Hybrid Method Using Grey Wolf Algorithm and Genetic Algorithm for IoT Botnet DDoS Attacks Detection
Published 2025-03-01Get full text
Article -
363
-
364
-
365
-
366
-
367
-
368
Application of Traditional Denoising Algorithms to Zoom-In the Color Images
Published 2010-12-01Get full text
Article -
369
Quantum cryptanalysis of lightweight block cipher Piccolo
Published 2023-06-01Get full text
Article -
370
Algorithms for the management of scars: the importance of systematizing behaviors
Published 2023-08-01“…Four articles were excluded after analysis and consensus meeting due to the absence of algorithms with scientific rigor; this study is composed of four articles. …”
Get full text
Article -
371
Assistance algorithm of nursing for amiodarone intravenous infusion
Published 2014-10-01“…The sample consisted of nine articles. The evidence pointed the incidence of phlebitis due to the infusion of amiodarone and the need to control this event. …”
Get full text
Article -
372
Assistance algorithm of nursing for amiodarone intravenous infusion
Published 2014-10-01“…The sample consisted of nine articles. The evidence pointed the incidence of phlebitis due to the infusion of amiodarone and the need to control this event. …”
Get full text
Article -
373
The energy reconstruction algorithm for high injection background
Published 2025-01-01Get full text
Article -
374
Deep Learning-Based Object Detection Algorithms
Published 2025-01-01“…This article examines some of the most well-known algorithms from the deep learning period, classifies them into four types of object identification algorithms—two-stage, one-stage, keypoint-based, and transformer-based — and describes their primary advances, benefits, and drawbacks. …”
Get full text
Article -
375
-
376
-
377
Utilization in Microgrids through Advanced Predictive Algorithms
Published 2025-01-01Get full text
Article -
378
Algorithmic Literacy and the Role of Librarians in Its Education
Published 2025-02-01“…In this way, related articles were extracted by searching the term algorithmic literacy in domestic and foreign reliable scientific databases. …”
Get full text
Article -
379
ALGORITHM FOR DYNAMIC SCALING RELATIONAL DATABASE IN CLOUDS
Published 2016-08-01“…This article analyzes the main methods of scalingdatabases (replication, sharding) and their supportat the popular relational databases and NoSQLsolutions with different data models: document-oriented, key-value, column-oriented and graph.The article presents an algorithm for the dynamicscaling of a relational database (DB), that takesinto account the specifics of the different types of logic database model. …”
Get full text
Article -
380
Application of Algorithms on Lattices in Post-Quantum Cryptography
Published 2024-03-01“…The article analyzes approaches to the development of post-quantum algorithms, reviews progress in the field of quantum computers and post-quantum cryptographic encryption systems. …”
Get full text
Article