Cryptography secures communication in banking, messaging, and blockchain. Good algorithms (AES, RSA, ECC, SHA-2/3, ChaCha20) are secure, efficient, and widely trusted. Bad algorithms (DES, MD5, SHA-1, ...
ABSTRACT: The paper continues the research on algorithms for generating nondeterministic finite automata possessing the following property (the so-called walibad property): among their covering ...
The operation of the power grid is closely related to meteorological disasters. Changes in meteorological conditions may have an impact on the operation and stability of the power system, leading to ...
1 Energy, Materials and Methods Research Laboratory, National High Polytechnic School of Douala, Douala, Cameroon. 2 National Advanced School of Engineering, University of Yaounde I, Yaounde, Cameroon ...
The Njord Centre, Department of Physics, University of Oslo, Sem Sælands vei 24, NO-0316 Oslo, Norway ...
BioInsectiNet is an advanced computational pipeline designed to accelerate the discovery and optimization of bioinsecticides targeting specific proteins. By combining deep learning models—including ...
Add a description, image, and links to the genetic-programming-algorithm topic page so that developers can more easily learn about it.
Abstract: A pixelated metamaterial was designed using a genetic algorithm (GA) to match the reflection coefficient to that of a Gap Ring Resonator structure. The significance of this is that a GA can ...