[PDF][PDF] Constraint satisfaction problems solved by semidefinite relaxations

M Ettaouil, C Loqman - WSEAS Transactions on Computers, 2008 - Citeseer
We consider the constraint satisfaction problem (CSP), where the values must be assigned
to variables which are subject to a set of constraints. This problem is naturally formulated as …

[PDF][PDF] Combinatorial optimization: mutual relations among graph algorithms

E Milkova - WSEAS Transactions on Mathematics, 2008 - academia.edu
The Theory of Graphs is a wonderful, practical discipline. Informatics has played a big part in
its development, and these two fields are strongly interconnected. This can, perhaps, mainly …

A penetration testing method for e-commerce authentication system security

W Pan, W Li - … International Conference on Management of e …, 2009 - ieeexplore.ieee.org
E-Commerce systems are suffering more and more security issues. Vulnerabilities of
authentication systems are revealed when various attacks and malicious abuses are …

Hybrid Machine Learning Methods with Malay Lexicon for Public Polarity Opinion on Water Related Issue

N Amirah, M Yusoff, M Kassim - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
Opinion classifications from Twitter are still in demand among research works on related
opinions or feelings expressed on various issues. One of the concerns expressed in Twitter …

[PDF][PDF] Design and implementation of soil spatial variation analysis system

G Lingling, Z Rongqun, Z Ming, Y Hui… - WSEAS Transactions on …, 2009 - wseas.us
The advantages of traditional integrated GIS (Geographic Information System) are integrate
each component of GIS and form independent complete system, for example ArcGIS and …

Modeling trees with rugged surfaces

A Mizoguchi, K Miyata - … on Trust, Security and Privacy in …, 2011 - ieeexplore.ieee.org
In this study, a method for modeling trees with rugged surfaces by simulating tree growth is
proposed. The phenomena of cell division is considered for simulating tree growth. There …

Method of characterising a subsurface region using multiple point statistics

M Shahraeeni - US Patent 11,960,045, 2024 - Google Patents
Disclosed are methods of modelling a subsurface region. One method comprises defining a
plurality of variables for describing said subsurface region, each variable having a …

[PDF][PDF] Benchmarking in digital circuit design automation

L JÓŹWIAK, D Gawłowski, A ŚLUSARCZYK - 2008 - wseas.us
This paper focuses on benchmarking, which is the main experimental approach to the
design method and EDA-tool analysis, characterization and evaluation. We discuss the …

Model and Heuristic Algorithm for Steel Productive Resources Balance Problem

BL Zhou, Q Zhang - Advanced Materials Research, 2012 - Trans Tech Publ
A nonlinear model is proposed for balancing the steel productive resources. In the model,
the sharing and the competition between products and resources are presented, and four …

A Novel Anomaly Detection Approach for Executable Program Security

W Pan, W Li, W Zhao - 2009 International Conference on …, 2009 - ieeexplore.ieee.org
Anomaly detection of executable program is a security detection solution that examines
whether security violation issues exist in programs. The paper presents a novel anomaly …