Cryptography secures communication in banking, messaging, and blockchain. Good algorithms (AES, RSA, ECC, SHA-2/3, ChaCha20) are secure, efficient, and widely trusted. Bad algorithms (DES, MD5, SHA-1, ...
ABSTRACT: The objective of this work is to determine the true owner of a land—public or private—in the region of Kumasi (Ghana). For this purpose, we applied different machine learning methods to the ...
Ask the publishers to restore access to 500,000+ books. An icon used to represent a menu that can be toggled by interacting with this icon. A line drawing of the Internet Archive headquarters building ...
Abstract: An adaptive k-nearest neighbor algorithm (AdaNN) is brought forward in this paper to overcome the limitation of the traditional k-nearest neighbor algorithm (kNN) which usually identifies ...
A collection of fundamental sorting algorithms implemented in Java, including Bubble Sort, Selection Sort, Count Sort, and Insertion Sort. This repository serves as a valuable resource for ...
Add a description, image, and links to the insertion-sort-algorithm topic page so that developers can more easily learn about it.
Abstract: This paper presents a tabu insertion search algorithm (TIS) based on the merits of insertion method (IM) and tabu search (TS) algorithm for solving travel salesman problem (TSP). TIS ...
一些您可能无法访问的结果已被隐去。
显示无法访问的结果