An important point for computer systems is the identification of users for authentication. One of these identification methods is keystroke dynamics. The keystr
Introduction: The present work compared the prediction power of the different data mining techniques used to develop the HIV testing prediction model. Four popu
In this work, we study binary linear distinct weight codes (DW-code). We give a complete classification of -DW-codes and enumerate their equivalence classes in
This paper presents four different hybrid genetic algorithms for network design problem in closed loop supply chain. They are compared using a complete factoria