Abstract: This study introduces a brand-new swarm-inspired algorithm dubbed dholes hunting-based optimization (DhoH) based on an animal hunting strategy to solve global optimization problems. The ...
Abstract: Due to the advancement of technology, information security and user privacy have become a critical issue resulting in the use of various encryption techniques. Especially with the increasing ...
This article was co-authored with Emma Myer, a student at Washington and Lee University who studies Cognitive/Behavioral Science and Strategic Communication. In today’s digital age, social media has ...
This project is built to practice my computer architecture design skills and to explore the potential of RISC-V in depth. This repo keeps updating periodically. The marked symbol represents the ...