we employed a fast Gröbner basis algorithm, namely F5[17], for solving this system. This approach is efficient in practice and obliges to modify the current security criteria for IP. We have indeed broken several challenges proposed in literature [28, 29, 5]. For instance, we solved a...
Moreover, based on the study of symmetric cryptography, public-key cryptography, and hash algorithms, AHB-SIP for cryptographic accelerators in an IoT security chip is proposed. Even without detailed knowledge of the AHB bus protocol, designers can quickly transform a cryptographic accelerator with a...
The Rowling case: a proposed standard analytic protocol for authorship questions. Patrick Juola. Digital Scholarship in the Humanities (2015) [link] The development and psychometric properties of LIWC2015. James W Pennebaker, Ryan L Boyd, Kayla Jordan, and Kate Blackburn. No venue (2015) [link...
The seagull optimization algorithm (SOA) is a recently proposed meta-heuristic optimization algorithm inspired by seagull foraging behavior. It has the adv
The Rowling case: a proposed standard analytic protocol for authorship questions. Patrick Juola. Digital Scholarship in the Humanities (2015) [link] The development and psychometric properties of LIWC2015. James W Pennebaker, Ryan L Boyd, Kayla Jordan, and Kate Blackburn. No venue (2015) [link]...
Given the difficulties of defining “machine” and “think”, Turing proposed to replace the question “Can machines think?” with a proxy: how well can an agent engage in sustained conversation with a human? Though Turing neither described himself as a philosopher nor published much on philosoph...
For constrained set-valued optimization problem, Yu [14] proposed the the higher-order radial derivative of set-valued maps, by means of the derivative, they developed optimality conditions for lower weak minimal solution. In practical application, the mathematical programming models are usually not ...
This order is firstly proposed in the set of fuzzy numbers and then adapted to the set of discrete fuzzy numbers. It relies on the use of the so-called left and right dominance. Let us recall these concepts. For each discrete fuzzy number A, the lower and upper limits of the k t h...
To tackle this problem, the proximal gradient method to solve composite optimization problems is proposed on Riemannian manifolds. Under some reasonable conditions, the convergence of the proximal gradient method with the backtracking procedure in the nonconvex case is presented. Furthermore, a sublinear...
[38] proposed a bi-level model in the form of an (MPEC), with the aim of providing assistance to a generation company making long-term generation capacity investment decisions, considering uncertainty regarding the investments of the other generation companies. The (MPEC) model was employed to ...