-
1
A Hybrid Security Algorithm AES and Blowfish for Authentication in Mobile Applications
Published 2018-05-01“…So, it will be difficult for hackers to perform Man in the Middle (MitM) attacks.…”
Get full text
Article -
2
Recommender systems may enhance the discovery of novelties
Published 2024-01-01“…While some believe they may limit new content exploration and promote opinion polarization, a systematic analysis is still lacking. …”
Get full text
Article -
3
CATEGORIES OF COMPUTER SYSTEMS ALGORITHMS
Published 2016-11-01Subjects: “…algorithm…”
Get full text
Article -
4
Algorithmic indexing in MEDLINE frequently overlooks important concepts and may compromise literature search results
Published 2025-01-01“…As a consequence, relevant publications may be omitted from search results and irrelevant ones may be retrieved. …”
Get full text
Article -
5
Detection and Analysis of Man-Machine Interactive Software Vulnerabilities Based on Ultrasonic Data Acquisition and Signal Processing Algorithms
Published 2021-01-01“…The simulation experiment results prove that the ultrasonic data acquisition and signal processing algorithms are effective and can support the detection and analysis of man-machine interactive software vulnerabilities.…”
Get full text
Article -
6
-
7
Lightweight Anomaly-Based Detection Using Cuckoo Search Algorithm and Decision Tree to Mitigate Man-in-the-Middle Attacks in DNS
Published 2025-04-01Subjects: “…man-in-the-middle attacks…”
Get full text
Article -
8
-
9
Formulation of multicriteria problem of routing and scheduling of manned and unmanned aircraft in a dynamic environment and approach to its solution using genetic algorithms
Published 2018-10-01“…The article deals with the multi-criteria task of routing and scheduling of unmanned and manned aircraft using the method of penalty functions. …”
Get full text
Article -
10
Analysis of TaqMan Array Cards Data by an Assumption-Free Improvement of the maxRatio Algorithm Is More Accurate than the Cycle-Threshold Method.
Published 2016-01-01“…These results suggested that the assumption-free MR algorithm was more reliable than the CT method, with clear advantages for the diagnostic settings.…”
Get full text
Article -
11
Distributed Sparse Manifold-Constrained Optimization Algorithm in Linear Discriminant Analysis
Published 2025-03-01“…Each step of the algorithm has an explicit solution. Simulation experiments have verified the correctness and effectiveness of this method. …”
Get full text
Article -
12
High sensitivity of HIV antibody screening tests may lead to longer time to diagnosis: a Case Report
Published 2025-05-01Get full text
Article -
13
A Space-Time Plume Algorithm to Represent and Compute Dynamic Places
Published 2025-07-01Get full text
Article -
14
-
15
A multilayer deep autoencoder approach for cross layer IoT attack detection using deep learning algorithms
Published 2025-03-01“…This technology effectively safeguards against various cyber threats, including Man-in-the-Middle attacks at the network layer and Distributed Denial of Service (DDoS) attacks at the transport layer of IoT networks. …”
Get full text
Article -
16
-
17
-
18
DEFINITION AND ANALYSIS OF MOTION ACTIVITY AFTER-STROKE PATIENT FROM THE VIDEO STREAM
Published 2014-10-01Subjects: “…motion activity of man…”
Get full text
Article -
19
Quantum-annealing-inspired algorithms for multijet clustering
Published 2025-05-01Get full text
Article -
20