Showing 201 - 220 results of 338 for search 'man algorithm', query time: 0.13s Refine Results
  1. 201
  2. 202
  3. 203
  4. 204
  5. 205
  6. 206

    Twenty First Century’s Challenges, Changing Trends and Urdu Novel: A Critical Analysis by Mehroona Leghari

    Published 2022-09-01
    “…Now the corporate world better known mans choices by this algorithm but the man himself notter. …”
    Get full text
    Article
  7. 207

    Drug–target interaction prediction by integrating heterogeneous information with mutual attention network by Yuanyuan Zhang, Yingdong Wang, Chaoyong Wu, Lingmin Zhan, Aoyi Wang, Caiping Cheng, Jinzhong Zhao, Wuxia Zhang, Jianxin Chen, Peng Li

    Published 2024-11-01
    “…DrugMAN uses a graph attention network-based integration algorithm to learn network-specific low-dimensional features for drugs and target proteins by integrating four drug networks and seven gene/protein networks collected by a certain screening conditions, respectively. …”
    Get full text
    Article
  8. 208

    Lightweight Pairwise Key Distribution Scheme for IoTs by Kanwalinderjit Kaur

    Published 2023-01-01
    “…It is observed that the algorithm is resilient against man-in-the-middle attacks, forward secrecy, Denial of Service (DoS) attacks, and offers mutual authentication. …”
    Get full text
    Article
  9. 209

    A New Approach Based on the Learning Effect for Sequence-Dependent Parallel Machine Scheduling Problem under Uncertainty by Maryam Ebrahimi, Parviz Dinari, Mohamad Samaei, Rouhollah Sohrabi, Soheil Sherafatianfini

    Published 2022-01-01
    “…The results show that the hybrid algorithm can provide more substantial results than classical algorithms. …”
    Get full text
    Article
  10. 210

    Kinematics Research and Verification of Exoskeleton Robot for Upper Limb Rehabilitative by Li Jing, Cao Min

    Published 2018-01-01
    “…The rationality and feasibility of the design and algorithm is proved.…”
    Get full text
    Article
  11. 211

    Lightweight authentication for IoT devices (LAID) in sustainable smart cities by Aqeel Khalique, Farheen Siddiqui, Mohd Abdul Ahad, Imran Hussain

    Published 2025-07-01
    “…The reason behind these kinds of attacks is that an adversary has successfully obtained credentials for authentication. Several algorithms in smart cities domain have been proposed but most of them are computationally intensive schemes and some algorithms do not have password update feature. …”
    Get full text
    Article
  12. 212

    Efficient anonymous authentication protocol for internet of vehicles based on Chinese cryptographic SM2 by SU Binting, FANG He, XU Li

    Published 2025-06-01
    “…However, many existing authentication schemes were plagued by low efficiency and incompatibility with domestic cryptographic algorithms. To further enhance authentication efficiency and expand the application of domestic cryptographic algorithms in the IoV domain, an anonymous handover authentication protocol was designed based on the Chinese national cryptographic SM2 algorithm. …”
    Get full text
    Article
  13. 213

    Patient-specific phantoms versus reference phantoms: a preliminary comparison on organs dose distribution by Isabelle Viviane Batista de Lacerda, José Wilson Vieira, Mércia Liane de Oliveira, Fernando Roberto de Andrade Lima

    Published 2018-07-01
    “…The absorbed dose estimation was performed using the EGSnrc Monte Carlo code and a parallel source algorithm. In this work were used an individualized-phantom for a man (1.73m/70.3kg) and another for a woman (1.63m/60.3kg) and the male and female ICRP reference phantoms. …”
    Get full text
    Article
  14. 214

    Designing Advanced Cryptographic Solutions for Cloud Storage Security through Dual-Layer Encryption Protocols by Paul Kobina Arhin Jnr, James Ben Hayfron-Acquah, Frimpong Twum, Alfred Kumah

    Published 2025-04-01
    “…This novel system is made to provide robust defence against common cloud-based attacks such as eavesdropping, replay attacks, brute force and man-in-the-middle attacks. By making use of the strengths of both asymmetric and symmetric encryption algorithms, the system will ensure high security with better performance. …”
    Get full text
    Article
  15. 215

    Evaluation of Land Use Change Trends Using Landscape Measurements (Case Study: Pakdasht City) by Alireza Thernasab, Leila Ebrahimi, Ameneh Haghzad, Mehrdad Ramezan Por

    Published 2023-12-01
    “…These images were classified in ENVI 5.3 software based on the maximum likelihood algorithm. Then the accuracy of the maps obtained from the maximum likelihood algorithm was estimated. …”
    Get full text
    Article
  16. 216

    Lightweight security architecture design for wireless sensor network by Chao WANG, Guang-yue HU, Huan-guo ZHANG

    Published 2012-02-01
    “…Most previous security proposal did not consider key management or their authentication efficiency was very low.Lightweight security architecture and lightweight security algorithm were proposed for wireless sensor network,The problem of network encounters malicious nodes maybe occur in the procedure of backbone networks networking could be solved by threshold secret sharing mechanism.The lightweight ECC was proposed to optimize the CPK architecture based on normal ECC,authentication was efficient without the third-party CA,and could reduce the computational complexity,the key management could meet the resource limit in wireless sensor network,and the key security depended on the exponential computation complexity of the elliptic discrete logarithm decomposition.The scheme used the improved two-way authentication to ensure the communication security between common node and sink node,which could prevent man-in-the-middle attack.…”
    Get full text
    Article
  17. 217

    COMPUTER TECHNOLOGIES IN LINE STRUCTURE ROUTING by V. I. Struchenkov

    Published 2017-02-01
    “…The first approach, which realised in the existing CAD of linear structures, is not focused on the optimization of the design decisions, as the computer in these systems is used only for the decision support tasks, but all design solutions are appointed by man. The second approach involves the use of a computer to generate design solutions based on mathematical models and optimization algorithms. …”
    Get full text
    Article
  18. 218

    Shortest Walk in a Dungeon Graph by Christopher Durham, Chris Alvin

    Published 2024-05-01
    “…With games like No Man’s Sky and Diablo IV, procedural generation of content in games is ever-increasing. …”
    Get full text
    Article
  19. 219

    Research on Control System for Material Transport Vehicle Based on Stacking Model by LIU Yuanming, TANG Lingsi, Zen Shuhua

    Published 2023-10-01
    “…Finally, the control system was reinforced using an improved proportional-integral-differential (PID) control algorithm to optimize the control performance. This algorithm not only ensures control stability and accuracy, but also reduces energy consumption and mechanical wear. …”
    Get full text
    Article
  20. 220

    Pseudohypertriglyceridemia in a Patient with Pancreatitis Without Evidence for Glycerol Kinase Deficiency: A Rare Case Report and Review of the Literature by Jianping Zhu, Chunjuan Zhang, Rui Zhao

    Published 2025-01-01
    “…However, the causes of pseudo-HTG are poorly understood, and a clinical algorithm for its diagnosing remains to be developed. …”
    Get full text
    Article