Various cryptosystems exploit exhaustive techniques to search, missing-the-mark, key space. Such search techniques should be guided in order to be computationally adequate. Here, ...
Hasan Mohammed Hasan Husein, Bayoumi I. Bayoumi, F...
This study investigates an optimization-based heuristic for the Robotic Cell Problem. This problem arises in automated cells and is a complex ow shop problem with a single transpo...
Jacques Carlier, Mohamed Haouari, Mohamed Kharbech...
An extension of principal component analysis called ipPCA has been proposed earlier for analyzing structure in genetic data. This non-parametric framework iteratively classifies ...
Our visual analytics tool GeneTracer, developed for the VAST 2010 genetic sequence mini challenge, visualizes gene sequences of current outbreaks and native sequences along with d...
Abstract. IEEE 802.16, also known as WiMAX, is a new wireless access technology for currently increasing demand of wireless high-speed broadband service. Efficient and effective d...