Journal articles on the topic 'MFA Systems'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'MFA Systems.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Karim, Nader Abdel, Hasan Kanaker, Waleed K. Abdulraheem, Majdi Ali Ghaith, Essam Alhroob, and Abdulla Mousa Falah Alali. "Choosing the right MFA method for online systems: A comparative analysis." International Journal of Data and Network Science 8, no. 1 (2024): 201–12. http://dx.doi.org/10.5267/j.ijdns.2023.10.003.
Full textXu, Jianliang, Zhen Sui, Feng Xu, and Yulong Wang. "A Novel Model-Free Adaptive Proportional–Integral–Derivative Control Method for Speed-Tracking Systems of Electric Balanced Forklifts." Applied Sciences 13, no. 23 (2023): 12816. http://dx.doi.org/10.3390/app132312816.
Full textChe Mamat, Rufaizal, Azuin Ramli, Abd Hakim Abd Aziz, Muhammad Daniel Hakim Azhari, and Angelyna Jackson. "A Comparative Analysis of Fly Ash Enhanced Micropiles in Sustainable Foundation Systems." Smart and Green Materials 2, no. 1 (2025): 35–46. https://doi.org/10.70028/sgm.v2i1.35.
Full textBaseer, Shagufta. "Multi-Factor Authentication: A User Experience Study." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 06 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem36006.
Full textZhang, Shuhua, and Ronghu Chi. "Model-free adaptive PID control for nonlinear discrete-time systems." Transactions of the Institute of Measurement and Control 42, no. 10 (2020): 1797–807. http://dx.doi.org/10.1177/0142331219896649.
Full textAllafi, Randa, and Abdulbasit A. Darem. "Usability and security in online authentication systems." International Journal of ADVANCED AND APPLIED SCIENCES 12, no. 6 (2025): 1–12. https://doi.org/10.21833/ijaas.2025.06.001.
Full textMatey, Pritesh. "Securing Backup Systems: Addressing Vulnerabilities with Encryption, MFA, and RBAC." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 01 (2025): 1–9. https://doi.org/10.55041/ijsrem41173.
Full textAbdul Ghani, Latifah. "Use of a Socio-Ecological Framework and MFA to Assess the Resilience of Local Food Chain Systems." Proceedings of International Conference on Social Science, Political Science, and Humanities (ICoSPOLHUM) 3 (January 8, 2023): 00034. http://dx.doi.org/10.29103/icospolhum.v3i.151.
Full textShinde1, Aditya S. "Multi-Factor Authentication: A Comprehensive Review." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem50831.
Full textAL-Khaleefa, Ahmad, Isa, AL-Saffar, Esa, and Malik. "MFA-OSELM Algorithm for WiFi-Based Indoor Positioning System." Information 10, no. 4 (2019): 146. http://dx.doi.org/10.3390/info10040146.
Full textCahyanto, Iman, Husnul Madihah, Iwan Budiarso, Andy Sutrisno, and Tofan Hidayat. "EFFECTIVENESS OF MULTIFACTOR AUTHENTICATION TECHNOLOGY FOR PROTECTING STUDENT PRIVACY : A SYSTEMATIC LITERATURE REVIEW." Edum Journal 7, no. 2 (2025): 253–69. https://doi.org/10.31943/edumjournal.v7i2.286.
Full textMatey, Preeti. "Backup System Vulnerabilities: Assessing Risks and Implementing Encryption, MFA, and RBAC." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 02 (2025): 1–9. https://doi.org/10.55041/ijsrem41890.
Full textMatey, Preeti. "Strengthening Data Protection Strategies: Leveraging Advanced Encryption, Multi-Factor Authentication, and Disaster Recovery for Enterprise Resilience." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 02 (2025): 1–9. https://doi.org/10.55041/ijsrem41337.
Full textResearcher. "ADAPTIVE MULTI-FACTOR AUTHENTICATION SYSTEMS: A COMPREHENSIVE ANALYSIS OF MODERN SECURITY APPROACHES." International Journal of Computer Engineering and Technology (IJCET) 15, no. 6 (2024): 787–95. https://doi.org/10.5281/zenodo.14235976.
Full textPuspita Ayu, Yolanda Dewi, Daeng Rahmatullah, and Istiyo Winarno. "Koordinasi Adaptif DOCR Pada Sistem Transmisi Loop Multi Generator Menggunakan Modified Firefly Algorithm-Artificial Neural Network." Jurnal Ilmiah Telsinas Elektro, Sipil dan Teknik Informasi 4, no. 1 (2022): 31–40. http://dx.doi.org/10.38043/telsinas.v4i1.2093.
Full textCheng, G. S. "Model-free adaptive (MFA) control." Computing and Control Engineering 15, no. 3 (2004): 28–33. http://dx.doi.org/10.1049/cce:20040305.
Full textSong, Bingjie, Guy Robinson, and Douglas Bardsley. "Measuring Multifunctional Agricultural Landscapes." Land 9, no. 8 (2020): 260. http://dx.doi.org/10.3390/land9080260.
Full textArutyunov, A. G., T. I. Batluk, R. A. Bashkinov, and M. A. Trubnikova. "Multifocal atherosclerosis: focus on the prevention of ischemic events." Russian Journal of Cardiology 26, no. 12 (2021): 4808. http://dx.doi.org/10.15829/1560-4071-2021-4808.
Full textDesai, Trunil S., and Shireesh Srivastava. "FluxPyt: a Python-based free and open-source software for 13C-metabolic flux analyses." PeerJ 6 (April 27, 2018): e4716. http://dx.doi.org/10.7717/peerj.4716.
Full textTidke, Sonali. "Fortifying Data Resilience: A Comprehensive Approach to Securing Backup Systems." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 01 (2025): 1–9. https://doi.org/10.55041/ijsrem41174.
Full textAGYAPONG, KWAKYE, and ISAAC BOAKYE. "EVALUATING THE EFFECTIVENESS OF MULTI-FACTOR AUTHENTICATION IN MITIGATING CYBER THREATS IN DIGITAL BANKING PLATFORM IN GHANA." International Journal of Social Sciences and Management Review 08, no. 01 (2025): 91–104. https://doi.org/10.37602/ijssmr.2025.8106.
Full textWestrell, T., O. Bergstedt, G. Heinicke, and E. Kärrman. "A systems analysis comparing drinking water systems - central physical-chemical treatment and local membrane filtration." Water Supply 2, no. 2 (2002): 11–18. http://dx.doi.org/10.2166/ws.2002.0040.
Full textBezzateev, Sergey, Vadim Davydov, and Aleksandr Ometov. "On Secret Sharing with Newton’s Polynomial for Multi-Factor Authentication." Cryptography 4, no. 4 (2020): 34. http://dx.doi.org/10.3390/cryptography4040034.
Full textMahmud, Md Rasel, Ahmed F. Abdou, and Hemanshu Pota. "Stability Analysis of Grid-Connected Photovoltaic Systems with Dynamic Phasor Model." Electronics 8, no. 7 (2019): 747. http://dx.doi.org/10.3390/electronics8070747.
Full textBai, Liang, Yun-Wen Feng, Ning Li, and Xiao-Feng Xue. "Robust Model-Free Adaptive Iterative Learning Control for Vibration Suppression Based on Evidential Reasoning." Micromachines 10, no. 3 (2019): 196. http://dx.doi.org/10.3390/mi10030196.
Full textAkula, Kishore Kumar, Maura Marcucci, Romain Jouffroy, et al. "Medical Image Classification using a Many to Many Relation, Multilayered Fuzzy Systems and AI." WSEAS TRANSACTIONS ON COMPUTERS 23 (July 3, 2024): 173–86. http://dx.doi.org/10.37394/23205.2024.23.16.
Full textGoel, Narendra S., and Richard L. Thompson. "Movable Finite Automata (MFA) models for biological systems II: Protein biosynthesis." Journal of Theoretical Biology 134, no. 1 (1988): 9–49. http://dx.doi.org/10.1016/s0022-5193(88)80300-x.
Full textHeideman, Geert, Jacques W. M. Noordermeer, Rabin N. Datta, and Ben van Baarle. "Multifunctional Additives as Zinc-Free Curatives for Sulfur Vulcanization." Rubber Chemistry and Technology 79, no. 4 (2006): 561–88. http://dx.doi.org/10.5254/1.3547952.
Full textRebecca Ling Ze Siew, Brendan Chan Kah Le, Lee Kai Yue, Nuri Nazirah Binti Ismail, Xavier Liong Zhi Hao, and Muhammad Faisal. "Enhancing Security in Industrial IoT: Authentication Solutions Leveraging Blockchain Technology." International Journal of Computer Technology and Science 1, no. 3 (2024): 87–105. http://dx.doi.org/10.62951/ijcts.v1i3.29.
Full textRivera, JJD, A. Muhammad, and WC Song. "Securing Digital Identity in the Zero Trust Architecture: A Blockchain Approach to Privacy-Focused Multi-Factor Authentication." Ieee Open Journal Of The Communications Society 5 (January 1, 2024): 2792–814. https://doi.org/10.1109/OJCOMS.2024.3391728.
Full textMadhavi, Dasari, V. S. Bharath Dr., Palati Dr.Madhu, and M. Ganapathi Dr.D. "UPQC BASED POWER QUALITY IMPROVEMENT OF SOLAR PHOTOVOLTAIC SYSTEMS USING ANFIS AND MFA." Journal of NeuroQuantology 20, no. 14 (2022): 505–20. https://doi.org/10.5281/zenodo.7497176.
Full textMatey, Preeti. "Combining Disaster Recovery, Backup Security, and Compliance: Best Practices for Encryption, RBAC, and MFA." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 02 (2025): 1–9. https://doi.org/10.55041/ijsrem41891.
Full textManoj, Greeshma. "Export performance of Indian Textile Industry in the Post Multi Fibre Agreement Regime." Artha - Journal of Social Sciences 13, no. 4 (2014): 63. http://dx.doi.org/10.12724/ajss.31.5.
Full textMali, Saroj. "Assessing the Effectiveness of Multi-Factor Authentication in Cloud-Based Big Data Environments." Internet of Things and Cloud Computing 12, no. 2 (2024): 17–27. http://dx.doi.org/10.11648/j.iotcc.20241202.11.
Full textOkeke, Remigius Obinna, and Stanislaus Okechukwu Orimadike. "Enhanced Cloud Computing Security Using Application-Based Multi-Factor Authentication (MFA) for Communication Systems." European Journal of Electrical Engineering and Computer Science 8, no. 2 (2024): 1–8. http://dx.doi.org/10.24018/ejece.2024.8.2.593.
Full textAravind Ayyagiri, Shalu Jain, and Anshika Aggarwal. "Innovations in Multi-Factor Authentication: Exploring OAuth for Enhanced Security." Innovative Research Thoughts 9, no. 4 (2023): 254–67. http://dx.doi.org/10.36676/irt.v9.i4.1461.
Full textTerekhanova, T. A., B. Helm, J. Traenckner, and P. Krebs. "IWRM decision support with material flow analysis: consideration of urban system input." Water Science and Technology 66, no. 11 (2012): 2432–38. http://dx.doi.org/10.2166/wst.2012.470.
Full textWiesen, B., K. H. Weyrich, and R. Siems. "Comparison of MFA and MD Results for Systems with an Isolated Defect." Japanese Journal of Applied Physics 24, S2 (1985): 995. http://dx.doi.org/10.7567/jjaps.24s2.995.
Full textZhi, Jing, Ze Qiang Fu, Peng Shen, and Bao Gao. "Analysis of Material Metabolism for Ningdong Energy(Coal) and Coal Chemical Base." Applied Mechanics and Materials 71-78 (July 2011): 2132–35. http://dx.doi.org/10.4028/www.scientific.net/amm.71-78.2132.
Full textAsim, Jamil, Adnan Shahid Khan, Rashad Mahmood Saqib, et al. "Blockchain-based Multifactor Authentication for Future 6G Cellular Networks: A Systematic Review." Applied Sciences 12, no. 7 (2022): 3551. http://dx.doi.org/10.3390/app12073551.
Full textHuang, Yu-Pei, Cheng-En Ye, and Xiang Chen. "A Modified Firefly Algorithm with Rapid Response Maximum Power Point Tracking for Photovoltaic Systems under Partial Shading Conditions." Energies 11, no. 9 (2018): 2284. http://dx.doi.org/10.3390/en11092284.
Full textLEANDRA SHANIA ANDERSON and USHA J. "MedSecure: Blockchain-enhanced patient data security with asymmetric cryptography and MFA." World Journal of Advanced Engineering Technology and Sciences 13, no. 2 (2024): 718–27. https://doi.org/10.30574/wjaets.2024.13.2.0386.
Full textSiswanto, Markhaban, Saiful Arfaah, Rukslin Rukslin, Muhlasin Muhlasin, and Machrus Ali. "Rekonfigurasi 33 Kanal Irigasi Menggunakan Metode Firefly Algorithm (MFA)." Jurnal FORTECH 4, no. 1 (2023): 43–47. http://dx.doi.org/10.56795/fortech.v4i1.4106.
Full textHan, Jinho. "CNN-Based Multi-Factor Authentication System for Mobile Devices Using Faces and Passwords." Applied Sciences 14, no. 12 (2024): 5019. http://dx.doi.org/10.3390/app14125019.
Full textCai, Ji Wei, Ji Xu Wu, Zheng Hang Lü, and Guang Liang Gao. "Effects of Powdery Mill Tailings from Magnetite on Workability and Strength of Concretes." Key Engineering Materials 477 (April 2011): 233–38. http://dx.doi.org/10.4028/www.scientific.net/kem.477.233.
Full textNISHIYAMA, SEIYA, JOÃO DA PROVIDÊNCIA та OSAMU OHNO. "EFFICIENT DESCRIPTION FOR π AND σ MESONS BY RESONATING MEAN-FIELD APPROXIMATION TO TWO-FLAVOR NAMBU-JONA-LASINIO MODEL". International Journal of Modern Physics E 15, № 05 (2006): 1087–114. http://dx.doi.org/10.1142/s0218301306004703.
Full textShatrunjai, Singh, Singh Ishan, Shanker Yadav Hari, Kumar Sharma Sunil, Anna Alphy Dr., and Gajendra Kumar Dr. "Payment Gateway with Multifactor Authentication: A Security Mechanism." International Journal of Innovative Science and Research Technology (IJISRT) 9, no. 12 (2025): 1966–73. https://doi.org/10.5281/zenodo.14576753.
Full textThompson, Richard L., and Narendra S. Goel. "Movable Finite Automata (MFA) models for biological systems I: Bacteriophage assembly and operation." Journal of Theoretical Biology 131, no. 3 (1988): 351–85. http://dx.doi.org/10.1016/s0022-5193(88)80230-3.
Full textRamli, Nur Fariza, Nor Azwan Mohamed Kamari, Syahirah Abd Halim, Asrul Ibrahim, and Ismail Musirin. "Implementation of Flower Pollination Algorithm for Solving Economic Dispatch Problems in Power System." Jurnal Kejuruteraan 33, no. 4 (2021): 1053–60. http://dx.doi.org/10.17576/jkukm-2021-33(4)-27.
Full textNica, Mihaela-Alexandra, Valentina Anuța, Cristian Andi Nicolae, et al. "Exploring Deep Eutectic Solvents as Pharmaceutical Excipients: Enhancing the Solubility of Ibuprofen and Mefenamic Acid." Pharmaceuticals 17, no. 10 (2024): 1316. http://dx.doi.org/10.3390/ph17101316.
Full text