-
1881
Increase success rate of weather forecasts for the airfield by integration of measurements of meteorological parameters of the atmosphere
Published 2019-10-01“…Accuracy of aviation weather forecasts is one of the main indicators characterizing the quality of meteorological support of flights. …”
Get full text
Article -
1882
The impact of war-related traumatic events on the functional psycho-emotional state of student youth in a front-line city: preliminary findings of the study
Published 2025-04-01“…The revealed imperfection of organizational aspects on the part of the state and local authorities regarding timely support for the population in crisis situations, ensuring the provision of medical and psychological assistance, and the dissemination of information should be taken into account in the organizational algorithm in the event of a possible further occurrence of humanitarian, environmental, or man-made crises.…”
Get full text
Article -
1883
Drug–target interaction prediction by integrating heterogeneous information with mutual attention network
Published 2024-11-01“…DrugMAN uses a graph attention network-based integration algorithm to learn network-specific low-dimensional features for drugs and target proteins by integrating four drug networks and seven gene/protein networks collected by a certain screening conditions, respectively. …”
Get full text
Article -
1884
Lightweight Pairwise Key Distribution Scheme for IoTs
Published 2023-01-01“…It is observed that the algorithm is resilient against man-in-the-middle attacks, forward secrecy, Denial of Service (DoS) attacks, and offers mutual authentication. …”
Get full text
Article -
1885
Improved OAM-Based Radar Targets Detection Using Uniform Concentric Circular Arrays
Published 2016-01-01“…The performance of the MUSIC algorithm to detect targets not illuminated by the main lobes is further evaluated. …”
Get full text
Article -
1886
A New Approach Based on the Learning Effect for Sequence-Dependent Parallel Machine Scheduling Problem under Uncertainty
Published 2022-01-01“…The results show that the hybrid algorithm can provide more substantial results than classical algorithms. …”
Get full text
Article -
1887
Recreational and tourist destination research methods
Published 2016-06-01“… The methodological basis of the concept RTDe are the main provisions of the modern structural and socio-economic geography to study the spatial and temporal aspects of relations in the system "Man - Nature" and related sciences (knowladge about a tourizm, recreational geography, natural resources, etc.) that appeal to spatial heterogeneity of the studied phenomena. …”
Get full text
Article -
1888
MODERN ARCHITECTURE BOARD INFORMATION AND CONTROL SYSTEMS OF HEAVY VEHICLES
Published 2017-06-01“…Therefore, MN and MAN carry different information about the physical and mechanical properties of steels, and the parameters of their signals in interrelation can be used to construct new algorithms for monitoring and diagnosing the physical and mechanical properties of articles made of ferromagnetic materials, for example, the stressed state of the critical products from these steels. …”
Get full text
Article -
1889
Kinematics Research and Verification of Exoskeleton Robot for Upper Limb Rehabilitative
Published 2018-01-01“…The rationality and feasibility of the design and algorithm is proved.…”
Get full text
Article -
1890
Lightweight authentication for IoT devices (LAID) in sustainable smart cities
Published 2025-07-01“…The reason behind these kinds of attacks is that an adversary has successfully obtained credentials for authentication. Several algorithms in smart cities domain have been proposed but most of them are computationally intensive schemes and some algorithms do not have password update feature. …”
Get full text
Article -
1891
Efficient anonymous authentication protocol for internet of vehicles based on Chinese cryptographic SM2
Published 2025-06-01“…However, many existing authentication schemes were plagued by low efficiency and incompatibility with domestic cryptographic algorithms. To further enhance authentication efficiency and expand the application of domestic cryptographic algorithms in the IoV domain, an anonymous handover authentication protocol was designed based on the Chinese national cryptographic SM2 algorithm. …”
Get full text
Article -
1892
Patient-specific phantoms versus reference phantoms: a preliminary comparison on organs dose distribution
Published 2018-07-01“…The absorbed dose estimation was performed using the EGSnrc Monte Carlo code and a parallel source algorithm. In this work were used an individualized-phantom for a man (1.73m/70.3kg) and another for a woman (1.63m/60.3kg) and the male and female ICRP reference phantoms. …”
Get full text
Article -
1893
Designing Advanced Cryptographic Solutions for Cloud Storage Security through Dual-Layer Encryption Protocols
Published 2025-04-01“…This novel system is made to provide robust defence against common cloud-based attacks such as eavesdropping, replay attacks, brute force and man-in-the-middle attacks. By making use of the strengths of both asymmetric and symmetric encryption algorithms, the system will ensure high security with better performance. …”
Get full text
Article -
1894
A Multiobjective Mathematical Model for Truck Scheduling Problem in Multidoor Cross-Docking System
Published 2022-01-01“…Using the Taguchi method, the proposed algorithms are tuned. Considering a temporary storage space and the multiple receiving and shipping docks is the main contribution of the paper. …”
Get full text
Article -
1895
The algorithnt software program for cakulating the mechanical parameters of multilayer rod
Published 2004-12-01“…The program is developed for training purposes, so the algorithm used is idealized and not sophisticated but preserving the main features of multilayer structural elements calculation. …”
Get full text
Article -
1896
Assessing carbon footprint and performance of the Kalman filter track fitter in the CBM experiment
Published 2025-07-01Get full text
Article -
1897
Efficient Depth Map Estimation Method Based on Gradient Weight Cost Aggregation Strategy for Distributed Video Sensor Networks
Published 2014-01-01“…The second step is to aggregate the matching cost for the gradient-based weight of the support region at the outmost pixel. The proposed algorithm achieves strong results in an efficient manner using the two main steps. …”
Get full text
Article -
1898
Search Optimization of a Web Site Based on the Content Analysis
Published 2015-06-01Get full text
Article -
1899
Abscess of the spleen in typhoid fever: clinical and morphological interpretation of the complication
Published 2014-09-01“…Experience in diagnosis and treatment of such complication in young man is presented in this article. The diagnostic algorithm included the use of ultrasound diagnostics, computerized tomography and magnetic resonance imaging. …”
Get full text
Article -
1900
Lightweight security architecture design for wireless sensor network
Published 2012-02-01“…Most previous security proposal did not consider key management or their authentication efficiency was very low.Lightweight security architecture and lightweight security algorithm were proposed for wireless sensor network,The problem of network encounters malicious nodes maybe occur in the procedure of backbone networks networking could be solved by threshold secret sharing mechanism.The lightweight ECC was proposed to optimize the CPK architecture based on normal ECC,authentication was efficient without the third-party CA,and could reduce the computational complexity,the key management could meet the resource limit in wireless sensor network,and the key security depended on the exponential computation complexity of the elliptic discrete logarithm decomposition.The scheme used the improved two-way authentication to ensure the communication security between common node and sink node,which could prevent man-in-the-middle attack.…”
Get full text
Article