Showing 281 - 300 results of 338 for search 'man algorithm', query time: 0.10s Refine Results
  1. 281

    Industry 6.0: methodology, tools, practice by Babkin Aleksandr, Liberman Irina, Klachek Pavel, Shkarupeta Elena

    Published 2025-02-01
    “…The concept of Industry 6.0 is considered as a qualitatively new phase of industrial and socio-economic development, characterized by comprehensive intellectual and technological immersive hyperconnectivity and physical-cognitive-emotional fusion of virtual twins of man and machine within the framework of symbiotic interaction. …”
    Get full text
    Article
  2. 282
  3. 283

    Successful nonoperative management of a simultaneous high-grade splenic injury and devascularized kidney in Australia: a case report by Peter Thanh Tam Nguyen, Jeremy M. Hsu

    Published 2023-12-01
    “…Severe blunt injuries to isolated solid abdominal viscera have been previously managed nonoperatively; however, management algorithms for simultaneous visceral injuries are less well defined. …”
    Get full text
    Article
  4. 284

    Is It Possible to Maintain Consciousness and Spontaneous Ventilation with Chest Compression in the Early Phase of Cardiac Arrest? by Menekse Oksar, Selim Turhanoglu

    Published 2016-01-01
    “…Here we describe the case of a 69-year-old man who underwent femoral bypass surgery and was extubated at the end of the procedure. …”
    Get full text
    Article
  5. 285
  6. 286

    Sources of right to freedom of peaceful assembly by М. А. Sambor

    Published 2019-12-01
    “…However, without historical origins it is impossible to form an objective and necessary for the modern man to understand the content of the right to freedom of peaceful assembly. …”
    Get full text
    Article
  7. 287

    Secure and efficient batch authentication scheme based on dynamic revocation mechanism in space information network by Yinghui ZHANG, Lingyun HU, Yixin LI, Jianting NING, Dong ZHENG

    Published 2022-04-01
    “…A secure and efficient batch authentication scheme based on dynamic revocation mechanism was proposed for the problem of cross-domain authentication of a large number of mobile users in space information networks.Early key negotiation was achieved by predicting the satellite trajectory and updating the session key in real time.Algorithms were designed for a single as well as a large number of mobile terminals to perform signing and verification, which effectively reduce the computational burden of satellites.Cuckoo filters were adopted by the new scheme to achieve dynamic revocation and malicious access control of mobile terminals.Finally, under the Diffie-Hellman assumption, the proposed scheme was proved to be resistant to replay and man-in-the-middle attacks based on a random oracle model and automated validation of internet security protocols and applications.Security goals such as traceability and revocability were achieved by the scheme, thus improving the efficiency of transmission and computation by more than 80% and 20%, respectively, compared with the existing optimal scheme.…”
    Get full text
    Article
  8. 288

    Interactive Embodied Intelligence of Machines by Deyi Li

    Published 2024-12-01
    “…The increased capacity for brute force computation has facilitated increased collaborative innovation between man and machines. For example, the intelligent farming machines have overcome the confines of computational power, algorithms, and data, and the next generation of intelligent farming machines is expected to interact, learn, and grow autonomously. …”
    Get full text
    Article
  9. 289
  10. 290

    Artificial Intellect and Methodology of Economic Science by M. V. Dubovik, S. G. Dmitriev

    Published 2025-03-01
    “…Apart from that, the issue of public trust to applying algorithms and elaboration of evidence-based policy become hardly attainable without relevant interpretation of model functioning, in spite of hypothetic accuracy of forecasts made with their help. …”
    Get full text
    Article
  11. 291

    Autoinflammatory diseases: An immunologist’s view by A. Yu. Shcherbina

    Published 2015-03-01
    “…Moreover, it is important that the detection of a causative genetic defect frequently determines man-agement tactics for patients.For AIS treatment, there is a spectrum of agents modulating these or those inflammatory components. …”
    Get full text
    Article
  12. 292

    Ethno-Specific Codes: Metaphor and Everyday Symbolization of Objectified Space in Anna Nerkagy’s Story “The White Moss” by D. E. Ertner, O. B. Ulyanova, S. B. Khabibullina

    Published 2022-10-01
    “…This article is intended to reveal certain “algorithms of speech behavior” embedded in the language, the principles of mythologization and metaphorical objectification of the real world, to reveal more deeply the structure of understanding a literary text. …”
    Get full text
    Article
  13. 293

    QBPP: Quality of services–based location privacy protection method for location-based services in cloud-enabled Internet of vehicles by Ji-ming Chen, Ting-ting Li, Liang-jun Wang

    Published 2019-07-01
    “…Moreover, asymmetric key algorithms are used in the Internet of vehicles environment to reduce the cost. …”
    Get full text
    Article
  14. 294

    THE EMERGENCE OF ARTIFICIAL CONSCIOUSNESS AND ITS IMPORTANCE TO REACH THE TECHNOLOGICAL SINGULARITY by Luiz Raimundo Tadeu da Silva Silva, Alex Fernandes da Veiga Machado, Pablo de Lara Sanches

    Published 2019-01-01
    “…Human evolution is about to meet its peak through the Technological Singularity, which can be understood as the future milestone reached at the moment that a computer program can think like a human, yet with quick access to all information already registered by society. It will not be like a man, but more intelligent than all mankind in history. …”
    Get full text
    Article
  15. 295

    Advanced Imaging and Preoperative MR-Based Cinematic Rendering Reconstructions for Neoplasms in the Oral and Maxillofacial Region by Adib Al-Haj Husain, Milica Stojicevic, Nicolin Hainc, Bernd Stadlinger

    Published 2024-12-01
    “…This case study highlights the use of cinematic rendering (CR) in preoperative planning for the excision of a cyst in the oral and maxillofacial region of a 60-year-old man. The patient presented with a firm, non-tender mass in the right cheek, clinically suspected to be an epidermoid cyst. …”
    Get full text
    Article
  16. 296

    Acute Appendicitis Remains a Great Mimicker – The Pitfalls in the Differential Diagnosis and Tactics - A Case Report by Georgi Popivanov, Marina Konaktchieva, Vladimir Vasilev, Kirien Kjossev, Marin Penkov, Dimitar Penchev

    Published 2020-09-01
    “…We present the case of a 41-year-old man who had been admitted to another hospital with an initial diagnosis of acute appendicitis and changed to Crohn’s disease (CD). …”
    Get full text
    Article
  17. 297

    Subliminal Channels in CRYSTALS-Kyber Key-Encapsulation Mechanism and Their Use in Quantum-Resistant TLS Protocols by Roberto Roman, Rosario Arjona, Iluminada Baturone

    Published 2025-01-01
    “…In the found subliminal channels, the covert message is embedded in the random data needed by the encapsulation or the key generation algorithms. Two settings are differentiated depending on if the covert receiver is an overt entity executing the key exchange protocol or a man-in-the-middle. …”
    Get full text
    Article
  18. 298

    Intrusion Detection Framework for Internet of Things with Rule Induction for Model Explanation by Kayode S. Adewole, Andreas Jacobsson, Paul Davidsson

    Published 2025-03-01
    “…The results show that XGBoost outperformed the other ensemble algorithms on two publicly available datasets for intrusion detection. …”
    Get full text
    Article
  19. 299

    THE SIMULATION OF ELECTRICAL SIGNALS PROPAGATION IN THE HEART MUSCLE OF THE HUMAN USING SOFTWARE PACKAGE COMSOL by A. V. Dyadova, A. S. Ogorodnikov

    Published 2014-08-01
    “…This paper is devoted to the modeling of the electrical system of the man’s cardiac tissue. The paper aims creating of the model, that geometrical structure is close to the actual geometry of the human heart. …”
    Get full text
    Article
  20. 300

    DNS over HTTPS Tunneling Detection System Based on Selected Features via Ant Colony Optimization by Hardi Sabah Talabani, Zrar Khalid Abdul, Hardi Mohammed Mohammed Saleh

    Published 2025-05-01
    “…DNS over HTTPS (DoH) is an advanced version of the traditional DNS protocol that prevents eavesdropping and man-in-the-middle attacks by encrypting queries and responses. …”
    Get full text
    Article