Showing 1 - 20 results of 5,726 for search '(man OR may) algorithm', query time: 0.16s Refine Results
  1. 1

    A Hybrid Security Algorithm AES and Blowfish for Authentication in Mobile Applications by Aji Purwinarko, Wahyu Hardyanto

    Published 2018-05-01
    “…So, it will be difficult for hackers to perform Man in the Middle (MitM) attacks.…”
    Get full text
    Article
  2. 2

    Recommender systems may enhance the discovery of novelties by Giordano De Marzo, Pietro Gravino, Vittorio Loreto

    Published 2024-01-01
    “…While some believe they may limit new content exploration and promote opinion polarization, a systematic analysis is still lacking. …”
    Get full text
    Article
  3. 3

    CATEGORIES OF COMPUTER SYSTEMS ALGORITHMS by A. V. Poltavskiy, E. Y. Rusyaeva

    Published 2016-11-01
    Subjects: “…algorithm…”
    Get full text
    Article
  4. 4

    Algorithmic indexing in MEDLINE frequently overlooks important concepts and may compromise literature search results by Alexandre Amar-Zifkin, Taline Ekmekjian, Virginie Paquet, Tara Landry

    Published 2025-01-01
    “…As a consequence, relevant publications may be omitted from search results and irrelevant ones may be retrieved. …”
    Get full text
    Article
  5. 5

    Detection and Analysis of Man-Machine Interactive Software Vulnerabilities Based on Ultrasonic Data Acquisition and Signal Processing Algorithms by Lei Zhao

    Published 2021-01-01
    “…The simulation experiment results prove that the ultrasonic data acquisition and signal processing algorithms are effective and can support the detection and analysis of man-machine interactive software vulnerabilities.…”
    Get full text
    Article
  6. 6
  7. 7
  8. 8
  9. 9

    Formulation of multicriteria problem of routing and scheduling of manned and unmanned aircraft in a dynamic environment and approach to its solution using genetic algorithms by G. N. Lebedev, V. B. Malygin, D. A. Mikhaylin, T. Byo

    Published 2018-10-01
    “…The article deals with the multi-criteria task of routing and scheduling of unmanned and manned aircraft using the method of penalty functions. …”
    Get full text
    Article
  10. 10

    Analysis of TaqMan Array Cards Data by an Assumption-Free Improvement of the maxRatio Algorithm Is More Accurate than the Cycle-Threshold Method. by Luigi Marongiu, Eric Shain, Lydia Drumright, Reidun Lillestøl, Donald Somasunderam, Martin D Curran

    Published 2016-01-01
    “…These results suggested that the assumption-free MR algorithm was more reliable than the CT method, with clear advantages for the diagnostic settings.…”
    Get full text
    Article
  11. 11

    Distributed Sparse Manifold-Constrained Optimization Algorithm in Linear Discriminant Analysis by Yuhao Zhang, Xiaoxiang Chen, Manlong Feng, Jingjing Liu

    Published 2025-03-01
    “…Each step of the algorithm has an explicit solution. Simulation experiments have verified the correctness and effectiveness of this method. …”
    Get full text
    Article
  12. 12
  13. 13
  14. 14
  15. 15

    A multilayer deep autoencoder approach for cross layer IoT attack detection using deep learning algorithms by K. Saranya, A. Valarmathi

    Published 2025-03-01
    “…This technology effectively safeguards against various cyber threats, including Man-in-the-Middle attacks at the network layer and Distributed Denial of Service (DDoS) attacks at the transport layer of IoT networks. …”
    Get full text
    Article
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20