Cryptography secures communication in banking, messaging, and blockchain. Good algorithms (AES, RSA, ECC, SHA-2/3, ChaCha20) are secure, efficient, and widely trusted. Bad algorithms (DES, MD5, SHA-1, ...
Abstract: This paper describes the Jaya Algorithm and compares its performance with the Genetic Algorithm for optimizing the Himmelblau function and the Rosenbrock function. The Jaya algorithm is ...
ABSTRACT: The alternating direction method of multipliers (ADMM) and its symmetric version are efficient for minimizing two-block separable problems with linear constraints. However, both ADMM and ...
Abstract: In order to improve the convergence speed of the existing LMS algorithms, a new LMS algorithm with variable step size based on the Swish function is proposed, and the effects of the ...
Tensor contradictions are used to solve problems related to different research fields, including model counting, quantum circuits, graph problems, and machine learning. But to minimize the ...
This algorithm lets you to find a the type of a binary function in O(1) complexity instead of classical O(n/2) approach. This repository is an application interface to use Deutsch-Jozsa Algorithm.
1 Chongqing Key Laboratory of Spatial Data Mining and Big Data Integration for Ecology and Environment, Rongzhi College of Chongqing Technology and Business University, Chongqing, China 2 Academic ...