Search alternatives:
man » many (Expand Search), mean (Expand Search)
Showing 1,881 - 1,900 results of 6,339 for search '(man OR main) algorithm', query time: 0.16s Refine Results
  1. 1881

    Increase success rate of weather forecasts for the airfield by integration of measurements of meteorological parameters of the atmosphere by E. A. Bolelov

    Published 2019-10-01
    “…Accuracy of aviation weather forecasts is one of the main indicators characterizing the quality of meteorological support of flights. …”
    Get full text
    Article
  2. 1882

    The impact of war-related traumatic events on the functional psycho-emotional state of student youth in a front-line city: preliminary findings of the study by T.V. Peresypkina, V.G. Nesterenko, K.G. Pomohaibo, T.V. Merkulova

    Published 2025-04-01
    “…The revealed imperfection of organizational aspects on the part of the state and local authorities regarding timely support for the population in crisis situations, ensuring the provision of medical and psychological assistance, and the dissemination of information should be taken into account in the organizational algorithm in the event of a possible further occurrence of humanitarian, environmental, or man-made crises.…”
    Get full text
    Article
  3. 1883

    Drug–target interaction prediction by integrating heterogeneous information with mutual attention network by Yuanyuan Zhang, Yingdong Wang, Chaoyong Wu, Lingmin Zhan, Aoyi Wang, Caiping Cheng, Jinzhong Zhao, Wuxia Zhang, Jianxin Chen, Peng Li

    Published 2024-11-01
    “…DrugMAN uses a graph attention network-based integration algorithm to learn network-specific low-dimensional features for drugs and target proteins by integrating four drug networks and seven gene/protein networks collected by a certain screening conditions, respectively. …”
    Get full text
    Article
  4. 1884

    Lightweight Pairwise Key Distribution Scheme for IoTs by Kanwalinderjit Kaur

    Published 2023-01-01
    “…It is observed that the algorithm is resilient against man-in-the-middle attacks, forward secrecy, Denial of Service (DoS) attacks, and offers mutual authentication. …”
    Get full text
    Article
  5. 1885

    Improved OAM-Based Radar Targets Detection Using Uniform Concentric Circular Arrays by Mingtuan Lin, Yue Gao, Peiguo Liu, Jibin Liu

    Published 2016-01-01
    “…The performance of the MUSIC algorithm to detect targets not illuminated by the main lobes is further evaluated. …”
    Get full text
    Article
  6. 1886

    A New Approach Based on the Learning Effect for Sequence-Dependent Parallel Machine Scheduling Problem under Uncertainty by Maryam Ebrahimi, Parviz Dinari, Mohamad Samaei, Rouhollah Sohrabi, Soheil Sherafatianfini

    Published 2022-01-01
    “…The results show that the hybrid algorithm can provide more substantial results than classical algorithms. …”
    Get full text
    Article
  7. 1887

    Recreational and tourist destination research methods by Tetiana Bozhuk

    Published 2016-06-01
    “… The methodological basis of the concept RTDe are the main provisions of the modern structural and socio-economic geography to study the spatial and temporal aspects of relations in the system "Man - Nature" and related sciences (knowladge about a tourizm, recreational geography, natural resources, etc.) that appeal to spatial heterogeneity of the studied phenomena. …”
    Get full text
    Article
  8. 1888

    MODERN ARCHITECTURE BOARD INFORMATION AND CONTROL SYSTEMS OF HEAVY VEHICLES by V. V. Filinov, S. A. Mikaeva, M. S. Rodyukov, A. V. Filinova

    Published 2017-06-01
    “…Therefore, MN and MAN carry different information about the physical and mechanical properties of steels, and the parameters of their signals in interrelation can be used to construct new algorithms for monitoring and diagnosing the physical and mechanical properties of articles made of ferromagnetic materials, for example, the stressed state of the critical products from these steels. …”
    Get full text
    Article
  9. 1889

    Kinematics Research and Verification of Exoskeleton Robot for Upper Limb Rehabilitative by Li Jing, Cao Min

    Published 2018-01-01
    “…The rationality and feasibility of the design and algorithm is proved.…”
    Get full text
    Article
  10. 1890

    Lightweight authentication for IoT devices (LAID) in sustainable smart cities by Aqeel Khalique, Farheen Siddiqui, Mohd Abdul Ahad, Imran Hussain

    Published 2025-07-01
    “…The reason behind these kinds of attacks is that an adversary has successfully obtained credentials for authentication. Several algorithms in smart cities domain have been proposed but most of them are computationally intensive schemes and some algorithms do not have password update feature. …”
    Get full text
    Article
  11. 1891

    Efficient anonymous authentication protocol for internet of vehicles based on Chinese cryptographic SM2 by SU Binting, FANG He, XU Li

    Published 2025-06-01
    “…However, many existing authentication schemes were plagued by low efficiency and incompatibility with domestic cryptographic algorithms. To further enhance authentication efficiency and expand the application of domestic cryptographic algorithms in the IoV domain, an anonymous handover authentication protocol was designed based on the Chinese national cryptographic SM2 algorithm. …”
    Get full text
    Article
  12. 1892

    Patient-specific phantoms versus reference phantoms: a preliminary comparison on organs dose distribution by Isabelle Viviane Batista de Lacerda, José Wilson Vieira, Mércia Liane de Oliveira, Fernando Roberto de Andrade Lima

    Published 2018-07-01
    “…The absorbed dose estimation was performed using the EGSnrc Monte Carlo code and a parallel source algorithm. In this work were used an individualized-phantom for a man (1.73m/70.3kg) and another for a woman (1.63m/60.3kg) and the male and female ICRP reference phantoms. …”
    Get full text
    Article
  13. 1893

    Designing Advanced Cryptographic Solutions for Cloud Storage Security through Dual-Layer Encryption Protocols by Paul Kobina Arhin Jnr, James Ben Hayfron-Acquah, Frimpong Twum, Alfred Kumah

    Published 2025-04-01
    “…This novel system is made to provide robust defence against common cloud-based attacks such as eavesdropping, replay attacks, brute force and man-in-the-middle attacks. By making use of the strengths of both asymmetric and symmetric encryption algorithms, the system will ensure high security with better performance. …”
    Get full text
    Article
  14. 1894

    A Multiobjective Mathematical Model for Truck Scheduling Problem in Multidoor Cross-Docking System by Mahziar Taghizadeh, Amir Abbas Shojaie, Amir Homayoun Sarfaraz, Sadigh Raissi

    Published 2022-01-01
    “…Using the Taguchi method, the proposed algorithms are tuned. Considering a temporary storage space and the multiple receiving and shipping docks is the main contribution of the paper. …”
    Get full text
    Article
  15. 1895

    The algorithnt software program for cakulating the mechanical parameters of multilayer rod by Vytautas Kleiza, Rita Laurikietytė

    Published 2004-12-01
    “…The program is developed for training purposes, so the algorithm used is idealized and not sophisticated but preserving the main features of multilayer structural elements calculation. …”
    Get full text
    Article
  16. 1896
  17. 1897

    Efficient Depth Map Estimation Method Based on Gradient Weight Cost Aggregation Strategy for Distributed Video Sensor Networks by Gwang-Soo Hong, Byung-Gyu Kim, Kee-Koo Kwon

    Published 2014-01-01
    “…The second step is to aggregate the matching cost for the gradient-based weight of the support region at the outmost pixel. The proposed algorithm achieves strong results in an efficient manner using the two main steps. …”
    Get full text
    Article
  18. 1898
  19. 1899

    Abscess of the spleen in typhoid fever: clinical and morphological interpretation of the complication by A. N. Kovalenko, V. V. Kolkutin, A. V. Kovalev, V. A. Zinserling, A. A. Murachev

    Published 2014-09-01
    “…Experience in diagnosis and treatment of such complication in young man is presented in this article. The diagnostic algorithm included the use of ultrasound diagnostics, computerized tomography and magnetic resonance imaging. …”
    Get full text
    Article
  20. 1900

    Lightweight security architecture design for wireless sensor network by Chao WANG, Guang-yue HU, Huan-guo ZHANG

    Published 2012-02-01
    “…Most previous security proposal did not consider key management or their authentication efficiency was very low.Lightweight security architecture and lightweight security algorithm were proposed for wireless sensor network,The problem of network encounters malicious nodes maybe occur in the procedure of backbone networks networking could be solved by threshold secret sharing mechanism.The lightweight ECC was proposed to optimize the CPK architecture based on normal ECC,authentication was efficient without the third-party CA,and could reduce the computational complexity,the key management could meet the resource limit in wireless sensor network,and the key security depended on the exponential computation complexity of the elliptic discrete logarithm decomposition.The scheme used the improved two-way authentication to ensure the communication security between common node and sink node,which could prevent man-in-the-middle attack.…”
    Get full text
    Article