Sign Up to like & get
recommendations!
0
Published in 2017 at "Journal of Network and Systems Management"
DOI: 10.1007/s10922-017-9421-4
Abstract: In the early days of network and service management, researchers paid much attention to the design of management frameworks and protocols. Since then the focus of research has shifted from the development of management technologies…
read more here.
Keywords:
management;
detection;
brute force;
network ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "Electric Power Systems Research"
DOI: 10.1016/j.epsr.2019.04.015
Abstract: Abstract The massive introduction of generation at the distribution level changes the electric network operation paradigm. According to the rules that govern the relationship between the distribution system operator and the transmission system operator, it…
read more here.
Keywords:
feeder reconfiguration;
distribution feeder;
approach;
force approach ... See more keywords
Photo from archive.org
Sign Up to like & get
recommendations!
0
Published in 2018 at "IFAC-PapersOnLine"
DOI: 10.1016/j.ifacol.2018.11.498
Abstract: Abstract Due to significant advancements in embedded systems, sensor devices, and wireless communication technology, sensor networks have been attracting widespread attention in areas such as target tracking, monitoring, and surveillance. Technological advancements made it possible…
read more here.
Keywords:
assignment methods;
matrix inequalities;
task assignment;
linear matrix ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "Solid state nuclear magnetic resonance"
DOI: 10.1016/j.ssnmr.2019.02.002
Abstract: A method based on highly concentrated radical solutions is investigated for the suppression of the NMR signals arising from solvents that are usually used for dynamic nuclear polarization experiments. The presented method is suitable in…
read more here.
Keywords:
natural isotopic;
suppression;
brute force;
isotopic abundance ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "Scientific Reports"
DOI: 10.1038/s41598-025-01080-5
Abstract: Remote Access Services (RAS)—including protocols such as Remote Desktop Protocol (RDP), Secure Shell (SSH), Virtual Network Computing (VNC), Telnet, File Transfer Protocol (FTP), and Secure File Transfer Protocol (SFTP)—are essential to modern network infrastructures, particularly…
read more here.
Keywords:
access services;
software defined;
access;
brute force ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2020 at "IEEE Access"
DOI: 10.1109/access.2020.2997681
Abstract: The ultimate goal of Brain-Computer Interface (BCI) research is to enable individuals to interact with their environment by translating their mental imagery. In this regard, a salient issue is the identification of brain activity patterns…
read more here.
Keywords:
brute force;
accurate classification;
model selection;
classification ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2017 at "Communications of the ACM"
DOI: 10.1145/3107239
Abstract: Mathematics solves problems by pen and paper. CS helps us to go far beyond that.
read more here.
Keywords:
science brute;
brute force;
Sign Up to like & get
recommendations!
0
Published in 2024 at "Advances in Civil Engineering"
DOI: 10.1155/2024/6245201
Abstract: Sustainable construction practices rely on carefully selecting building materials and balancing environmental and economic considerations. This study examines the complex link between local climate, market dynamics, and building material selection. Market data analysis, parametric modeling,…
read more here.
Keywords:
energy;
material selection;
analysis;
brute force ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "Indonesian Journal of Electrical Engineering and Computer Science"
DOI: 10.11591/ijeecs.v33.i3.pp1653-1659
Abstract: Despite ongoing efforts to convince users of the value of password security and to enforce password creation standards on them, in many information systems the human factor still plays a role. In addition, not only…
read more here.
Keywords:
force attacks;
ethical hacking;
password cracking;
brute force ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2021 at "Indonesian Journal of Electrical Engineering and Informatics"
DOI: 10.11591/ijeei.v9i1.2450
Abstract: A car electronic security system aims to prevent its theft, the theft of its parts or of elements in its interior. Studying these systems allows identifying and mitigating vulnerabilities. Nowadays, there are different types of…
read more here.
Keywords:
analysis locking;
attack;
vulnerability analysis;
brute force ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "Computer-Aided Design and Applications"
DOI: 10.14733/cadaps.2021.714-737
Abstract: This paper presents a method to generate toolpaths for continuous B-Axis turning operations. Modern CNC turning centres allow continuous tool rotation about the B-Axis during operation; a suitably programmed tool orientation allows it to remove…
read more here.
Keywords:
toolpath;
sample cover;
cover brute;
tool ... See more keywords