Search Results - (( java implementation modified algorithm ) OR ( using curve using algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- using algorithm »
- using curve »
- curve using »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
4
A novel Bezier curve control point search algorithm for autonomous navigation using N-order polynomial search with boundary conditions
Published 2021“…However, the main challenge when using the Bezier curve fitting algorithm is finding its control points. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
6
Improved algorithms of elliptic curve point multiplication over binary and prime fields using elliptic net
Published 2022“…For safe curves of 384 and 512 bits, the developed ENPM algorithm over prime field outperformed the BM algorithm in terms of overall multiplications with 57.60% and 59.16% average running time. …”
Get full text
Get full text
Get full text
Thesis -
7
Multi-base number representation in application to scalar multiplication and pairing computation
Published 2011“…Multi-bases number representation is used to construct new versions of Miller’s algorithm. …”
Get full text
Get full text
Thesis -
8
Curve Reconstruction By Metaheuristics Algorithms On Cubic Rational Bézier Function
Published 2019“…Curve reconstruction regularly used in reverse engineering. …”
Get full text
Get full text
Thesis -
9
Cryptanalysis of elliptic curve scalar multiplication algorithms
Published 2025“…This project explores scalar multiplication algorithms in Elliptic Curve Cryptography, focusing on the binary method and elliptic net method applied in Elliptic Curve Diffie-Hellman and Elliptic Curve Digital Signature Algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
A new cryptographic algorithm based on decomposition problem in elliptic curve cryptography / Hilyati Hanina Zazali
Published 2012“…The algorithms work by arranging parameters using finite field group in elliptic curve E. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Cryptanalysis of elliptic curve scalar multiplication algorithms
Published 2025“…This project explores scalar multiplication algorithms in Elliptic Curve Cryptography, focusing on the binary method and elliptic net method applied in Elliptic Curve Diffie-Hellman and Elliptic Curve Digital Signature Algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
New signed-digit {0,1,3}-NAF scalar multiplication algorithm for elliptic curve over binary field
Published 2011“…Also, a new point tripling formula and algorithm are introduced for elliptic curve over binary field using Lopez-Dahab projective coordinates. …”
Get full text
Get full text
Thesis -
13
Curve fitting by rational cubic Bézier with C1 and G1 continuity using metaheuristics methods
Published 2019“…Rational cubic Bézier curves are used to approximate the data sets while minimizing the least-squares error function using different metaheuristics algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Cryptanalysis of elliptic curve scalar multiplication algorithms
Published 2025“…This project explores scalar multiplication algorithms in Elliptic Curve Cryptography, focusing on the binary method and elliptic net method applied in Elliptic Curve Diffie-Hellman and Elliptic Curve Digital Signature Algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Data fitting by G1 rational cubic Be´zier curves using harmony search
Published 2015“…A metaheuristic algorithm, called Harmony Search (HS) is implemented for data fitting by rational cubic Be´ zier curves. …”
Get full text
Get full text
Article -
16
Investigation And Development Of Flattening Algorithms For Curved Latent Fingerprint Images
Published 2015“…Since curved image appears to be rectangular shape, parabolic approximation and ellipse approximation are being used to design algorithms for flattening. …”
Get full text
Get full text
Thesis -
17
Enhancement of {0, 1, 3}-NAF Recoding Algorithm using Block Method Technique for Elliptic Curve Cryptosystem
Published 2015“…In mid 80s Neal Koblitz and Victor Miller independently proposed the use of elliptic curves in cryptography. Elliptic Curve Cryptosystem (ECC) is a type of public key cryptography (PKC) based on the algebraic structure of elliptic curve over finite fields. …”
Get full text
Get full text
Thesis -
18
An improved public key cryptography based on the elliptic curve
Published 2002“…Thus this reduction will speed up the computation of adding two points on the elliptic curve by 11 percent. Moreover, the new formula can be used more efficiently when it is combined with the suggested sparse elements algorithms. …”
Get full text
Get full text
Thesis -
19
Reconstruction of Arabic calligraphy by using Wang-Ball curves / Noorehan Awang ... [et al.]
Published 2021“…A recursive algorithm for plotting rational Bezier and Wang-ball is obtained by the de Casteljau and Wang algorithm using homogeneous coordinates and an efficient algorithm for evaluating a rational Wang-ball curve is attained and has a linear time complexity (Dejdumrong et al., 2001). …”
Get full text
Get full text
Monograph -
20
Data Fitting by G1 Rational Cubic Bézier Curves Using Harmony Search
Published 2015“…A metaheuristic algorithm, called Harmony Search (HS) is implemented for data fitting by rational cubic Bézier curves. …”
Get full text
Get full text
Get full text
Article
