Search Results - (( java implementation case algorithm ) OR ( using curve using algorithm ))
Search alternatives:
- java implementation »
- implementation case »
- using algorithm »
- case algorithm »
- using curve »
- curve using »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
-
3
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
4
Examination timetabling using genetic algorithm case study: KUiTTHO
Published 2005Get full text
Get full text
Thesis -
5
Java based expert system for selection of natural fibre composite materials
Published 2013“…In this paper, we develop a technology for the materials selection system using Java based expert system. The weighted-range method (WRM) was implemented to identify the range value and to scrutinise the candidate materials. …”
Get full text
Get full text
Get full text
Article -
6
-
7
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…According to the simulation results, the proposed algorithm produces the best solution among all algorithms in the proposed cases. � 2021 Little Lion Scientific…”
Review -
8
A novel Bezier curve control point search algorithm for autonomous navigation using N-order polynomial search with boundary conditions
Published 2021“…However, the main challenge when using the Bezier curve fitting algorithm is finding its control points. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Improved algorithms of elliptic curve point multiplication over binary and prime fields using elliptic net
Published 2022“…For safe curves of 384 and 512 bits, the developed ENPM algorithm over prime field outperformed the BM algorithm in terms of overall multiplications with 57.60% and 59.16% average running time. …”
Get full text
Get full text
Get full text
Thesis -
10
Multi-base number representation in application to scalar multiplication and pairing computation
Published 2011“…Multi-bases number representation is used to construct new versions of Miller’s algorithm. …”
Get full text
Get full text
Thesis -
11
Curve Reconstruction By Metaheuristics Algorithms On Cubic Rational Bézier Function
Published 2019“…Curve reconstruction regularly used in reverse engineering. …”
Get full text
Get full text
Thesis -
12
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…CS and JA have implemented in the same platform (Intellij IDEA Community Edition 2020.2.3) using the same language (Java). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Cryptanalysis of elliptic curve scalar multiplication algorithms
Published 2025“…This project explores scalar multiplication algorithms in Elliptic Curve Cryptography, focusing on the binary method and elliptic net method applied in Elliptic Curve Diffie-Hellman and Elliptic Curve Digital Signature Algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
A new cryptographic algorithm based on decomposition problem in elliptic curve cryptography / Hilyati Hanina Zazali
Published 2012“…The algorithms work by arranging parameters using finite field group in elliptic curve E. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
15
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
16
Cryptanalysis of elliptic curve scalar multiplication algorithms
Published 2025“…This project explores scalar multiplication algorithms in Elliptic Curve Cryptography, focusing on the binary method and elliptic net method applied in Elliptic Curve Diffie-Hellman and Elliptic Curve Digital Signature Algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
New signed-digit {0,1,3}-NAF scalar multiplication algorithm for elliptic curve over binary field
Published 2011“…Also, a new point tripling formula and algorithm are introduced for elliptic curve over binary field using Lopez-Dahab projective coordinates. …”
Get full text
Get full text
Thesis -
18
Curve fitting by rational cubic Bézier with C1 and G1 continuity using metaheuristics methods
Published 2019“…Rational cubic Bézier curves are used to approximate the data sets while minimizing the least-squares error function using different metaheuristics algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Cryptanalysis of elliptic curve scalar multiplication algorithms
Published 2025“…This project explores scalar multiplication algorithms in Elliptic Curve Cryptography, focusing on the binary method and elliptic net method applied in Elliptic Curve Diffie-Hellman and Elliptic Curve Digital Signature Algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Data fitting by G1 rational cubic Be´zier curves using harmony search
Published 2015“…A metaheuristic algorithm, called Harmony Search (HS) is implemented for data fitting by rational cubic Be´ zier curves. …”
Get full text
Get full text
Article
