This contribution proposes a modification of method of divisors group operation in the Jacobian of hyperelliptic curve over even and odd characteristic fields in projective coordi...
Drawing on our previous work on survey and reporting tools that compare faculty expectations with what students report experiencing in class, this paper presents details of a new ...
Judith Ann Ouimet, Sermsak Buntha, Sergiu M. Dasca...
This paper introduced coding guidelines for use by academics developing code as part of their research in areas of computer science or similar disciplines. We introduce the guidel...
Requirement analysis is an important process in the design and development of information systems. Various tools and methodologies are used to gather the user requirements. These ...
Jawed I. A. Siddiqi, Babak Akhgar, Nazaraf Shah, F...
A hypergraphs-based image representation is already used for 2D lossless image compression. In this paper we extend this hypergraph representation on 3D-image and we add an α-tol...
Lots of efforts in the last decades have been done to prove or disprove whether the set of polynomially bounded problems is equal to the set of polynomially verifiable problems. T...
Sina Jafarpour, Mohammad Ghodsi, Keyvan Sadri, Zuh...
This paper presents the recognition of Handwritten Hindi Numerals based on the modified exponential membership function fitted to the fuzzy sets derived from normalized distance f...
Madasu Hanmandlu, J. Grover, Vamsi Krishna Madasu,...
— MPLS security is an evolving issue which has been raised by many researchers and service providers. The basic architecture of MPLS network does not provide security services su...
Message aggregation can be used to reduce the communication overhead in a network where many messages have the “same” content. However, it may make the network less secure bec...