People often blame social media algorithms that prioritize extreme content for increasing political polarization, but this effect has been difficult to prove. Only the platform owners have access to ...
This note examines the utility of pseudorandom variables (prv) in Global Search and Optimization (GSO) using Central Force Optimization (CFO) as an example. Most GSO metaheuristics are stochastic in ...
Cryptography secures communication in banking, messaging, and blockchain. Good algorithms (AES, RSA, ECC, SHA-2/3, ChaCha20) are secure, efficient, and widely trusted. Bad algorithms (DES, MD5, SHA-1, ...
Abstract: The random Kaczmarz (RK) algorithm is an iterative method to solve overdetermined linear systems and serves as a representative example of row action methods. In this paper, we propose a ...
Researchers have successfully used a quantum algorithm to solve a complex century-old mathematical problem long considered impossible for even the most powerful conventional supercomputers. The ...
Abstract: A probabilistic approach is considered for robust optimization, where a convex objective function is minimized subject to a parameter dependent convex constraint. A novel sequential ...
Everyone is different, and we all have our own unique quirks and idiosyncrasies that make us who we are. There are some of us, though, who get inordinately irked by things the vast majority don’t have ...
High-quality random number generators are required for various applications such as cryptography, secure communications, Monte Carlo simulations, and randomized algorithms. Existing pseudorandom ...
The operation of the power grid is closely related to meteorological disasters. Changes in meteorological conditions may have an impact on the operation and stability of the power system, leading to ...