Sign Up to like & get
recommendations!
0
Published in 2017 at "Journal of Network and Systems Management"
DOI: 10.1007/s10922-017-9421-4
Abstract: In the early days of network and service management, researchers paid much attention to the design of management frameworks and protocols. Since then the focus of research has shifted from the development of management technologies…
read more here.
Keywords:
management;
detection;
brute force;
network ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2019 at "Electric Power Systems Research"
DOI: 10.1016/j.epsr.2019.04.015
Abstract: Abstract The massive introduction of generation at the distribution level changes the electric network operation paradigm. According to the rules that govern the relationship between the distribution system operator and the transmission system operator, it…
read more here.
Keywords:
feeder reconfiguration;
distribution feeder;
approach;
force approach ... See more keywords
Photo from archive.org
Sign Up to like & get
recommendations!
0
Published in 2018 at "IFAC-PapersOnLine"
DOI: 10.1016/j.ifacol.2018.11.498
Abstract: Abstract Due to significant advancements in embedded systems, sensor devices, and wireless communication technology, sensor networks have been attracting widespread attention in areas such as target tracking, monitoring, and surveillance. Technological advancements made it possible…
read more here.
Keywords:
assignment methods;
matrix inequalities;
task assignment;
linear matrix ... See more keywords
Photo by erol from unsplash
Sign Up to like & get
recommendations!
0
Published in 2019 at "Solid state nuclear magnetic resonance"
DOI: 10.1016/j.ssnmr.2019.02.002
Abstract: A method based on highly concentrated radical solutions is investigated for the suppression of the NMR signals arising from solvents that are usually used for dynamic nuclear polarization experiments. The presented method is suitable in…
read more here.
Keywords:
natural isotopic;
suppression;
brute force;
isotopic abundance ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2020 at "IEEE Access"
DOI: 10.1109/access.2020.2997681
Abstract: The ultimate goal of Brain-Computer Interface (BCI) research is to enable individuals to interact with their environment by translating their mental imagery. In this regard, a salient issue is the identification of brain activity patterns…
read more here.
Keywords:
brute force;
accurate classification;
model selection;
classification ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2017 at "Communications of the ACM"
DOI: 10.1145/3107239
Abstract: Mathematics solves problems by pen and paper. CS helps us to go far beyond that.
read more here.
Keywords:
science brute;
brute force;
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2021 at "Indonesian Journal of Electrical Engineering and Informatics"
DOI: 10.11591/ijeei.v9i1.2450
Abstract: A car electronic security system aims to prevent its theft, the theft of its parts or of elements in its interior. Studying these systems allows identifying and mitigating vulnerabilities. Nowadays, there are different types of…
read more here.
Keywords:
analysis locking;
attack;
vulnerability analysis;
brute force ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "Computer-Aided Design and Applications"
DOI: 10.14733/cadaps.2021.714-737
Abstract: This paper presents a method to generate toolpaths for continuous B-Axis turning operations. Modern CNC turning centres allow continuous tool rotation about the B-Axis during operation; a suitably programmed tool orientation allows it to remove…
read more here.
Keywords:
toolpath;
sample cover;
cover brute;
tool ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2023 at "Applied Sciences"
DOI: 10.3390/app13105979
Abstract: Studying password-cracking techniques is essential in the information security discipline as it highlights the vulnerability of weak passwords and the need for stronger security measures to protect sensitive information. While both methods aim to uncover…
read more here.
Keywords:
dictionary attack;
password cracking;
brute force;
password ... See more keywords