-
201
-
202
An mRNA Vaccine for Herpes Zoster and Its Efficacy Evaluation in Naïve/Primed Murine Models
Published 2025-03-01Get full text
Article -
203
-
204
-
205
-
206
Twenty First Century’s Challenges, Changing Trends and Urdu Novel: A Critical Analysis
Published 2022-09-01“…Now the corporate world better known mans choices by this algorithm but the man himself notter. …”
Get full text
Article -
207
Drug–target interaction prediction by integrating heterogeneous information with mutual attention network
Published 2024-11-01“…DrugMAN uses a graph attention network-based integration algorithm to learn network-specific low-dimensional features for drugs and target proteins by integrating four drug networks and seven gene/protein networks collected by a certain screening conditions, respectively. …”
Get full text
Article -
208
Lightweight Pairwise Key Distribution Scheme for IoTs
Published 2023-01-01“…It is observed that the algorithm is resilient against man-in-the-middle attacks, forward secrecy, Denial of Service (DoS) attacks, and offers mutual authentication. …”
Get full text
Article -
209
A New Approach Based on the Learning Effect for Sequence-Dependent Parallel Machine Scheduling Problem under Uncertainty
Published 2022-01-01“…The results show that the hybrid algorithm can provide more substantial results than classical algorithms. …”
Get full text
Article -
210
Kinematics Research and Verification of Exoskeleton Robot for Upper Limb Rehabilitative
Published 2018-01-01“…The rationality and feasibility of the design and algorithm is proved.…”
Get full text
Article -
211
Lightweight authentication for IoT devices (LAID) in sustainable smart cities
Published 2025-07-01“…The reason behind these kinds of attacks is that an adversary has successfully obtained credentials for authentication. Several algorithms in smart cities domain have been proposed but most of them are computationally intensive schemes and some algorithms do not have password update feature. …”
Get full text
Article -
212
Efficient anonymous authentication protocol for internet of vehicles based on Chinese cryptographic SM2
Published 2025-06-01“…However, many existing authentication schemes were plagued by low efficiency and incompatibility with domestic cryptographic algorithms. To further enhance authentication efficiency and expand the application of domestic cryptographic algorithms in the IoV domain, an anonymous handover authentication protocol was designed based on the Chinese national cryptographic SM2 algorithm. …”
Get full text
Article -
213
Patient-specific phantoms versus reference phantoms: a preliminary comparison on organs dose distribution
Published 2018-07-01“…The absorbed dose estimation was performed using the EGSnrc Monte Carlo code and a parallel source algorithm. In this work were used an individualized-phantom for a man (1.73m/70.3kg) and another for a woman (1.63m/60.3kg) and the male and female ICRP reference phantoms. …”
Get full text
Article -
214
Designing Advanced Cryptographic Solutions for Cloud Storage Security through Dual-Layer Encryption Protocols
Published 2025-04-01“…This novel system is made to provide robust defence against common cloud-based attacks such as eavesdropping, replay attacks, brute force and man-in-the-middle attacks. By making use of the strengths of both asymmetric and symmetric encryption algorithms, the system will ensure high security with better performance. …”
Get full text
Article -
215
Evaluation of Land Use Change Trends Using Landscape Measurements (Case Study: Pakdasht City)
Published 2023-12-01“…These images were classified in ENVI 5.3 software based on the maximum likelihood algorithm. Then the accuracy of the maps obtained from the maximum likelihood algorithm was estimated. …”
Get full text
Article -
216
Lightweight security architecture design for wireless sensor network
Published 2012-02-01“…Most previous security proposal did not consider key management or their authentication efficiency was very low.Lightweight security architecture and lightweight security algorithm were proposed for wireless sensor network,The problem of network encounters malicious nodes maybe occur in the procedure of backbone networks networking could be solved by threshold secret sharing mechanism.The lightweight ECC was proposed to optimize the CPK architecture based on normal ECC,authentication was efficient without the third-party CA,and could reduce the computational complexity,the key management could meet the resource limit in wireless sensor network,and the key security depended on the exponential computation complexity of the elliptic discrete logarithm decomposition.The scheme used the improved two-way authentication to ensure the communication security between common node and sink node,which could prevent man-in-the-middle attack.…”
Get full text
Article -
217
COMPUTER TECHNOLOGIES IN LINE STRUCTURE ROUTING
Published 2017-02-01“…The first approach, which realised in the existing CAD of linear structures, is not focused on the optimization of the design decisions, as the computer in these systems is used only for the decision support tasks, but all design solutions are appointed by man. The second approach involves the use of a computer to generate design solutions based on mathematical models and optimization algorithms. …”
Get full text
Article -
218
Shortest Walk in a Dungeon Graph
Published 2024-05-01“…With games like No Man’s Sky and Diablo IV, procedural generation of content in games is ever-increasing. …”
Get full text
Article -
219
Research on Control System for Material Transport Vehicle Based on Stacking Model
Published 2023-10-01“…Finally, the control system was reinforced using an improved proportional-integral-differential (PID) control algorithm to optimize the control performance. This algorithm not only ensures control stability and accuracy, but also reduces energy consumption and mechanical wear. …”
Get full text
Article -
220
Pseudohypertriglyceridemia in a Patient with Pancreatitis Without Evidence for Glycerol Kinase Deficiency: A Rare Case Report and Review of the Literature
Published 2025-01-01“…However, the causes of pseudo-HTG are poorly understood, and a clinical algorithm for its diagnosing remains to be developed. …”
Get full text
Article