Cryptography secures communication in banking, messaging, and blockchain. Good algorithms (AES, RSA, ECC, SHA-2/3, ChaCha20) are secure, efficient, and widely trusted. Bad algorithms (DES, MD5, SHA-1, ...
ABSTRACT: The objective of this work is to determine the true owner of a land—public or private—in the region of Kumasi (Ghana). For this purpose, we applied different machine learning methods to the ...
Abstract: The Nearest-Better Network (NBN) is a powerful method to visualize sampled data for continuous optimization problems while preserving multiple landscape features. However, the calculation of ...
There's a familiar TV discourse taking shape online right now, the kind that I suspect will look awfully familiar to you if you remember the way Game of Thrones crashed and burned in its eighth and ...
The original version of this story appeared in Quanta Magazine. Computer scientists often deal with abstract problems that are hard to comprehend, but an exciting new algorithm matters to anyone who ...
ABSTRACT: To ensure the efficient operation and timely maintenance of wind turbines, thereby enhancing energy security, it is critical to monitor the operational status of wind turbines and promptly ...
Abstract: Nearest Insertion Algorithm is heuristic algorithm which has been proven a successful technique applied on number of combinatorial optimization problems. Nearest Neighbor Insertion Algorithm ...
Used in a modified TSP algorithm to find the nearest neighbor at each iteration for efficient route selection. Red-Black Tree (RBT): O (log n) time complexity for insertion, search, and deletion. Most ...
The project focuses on efficiently finding paths from a single source to multiple destination nodes within a strongly connected, directed graph with positive edge weights, specifically tailored for an ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results