We investigate efficient protocols for password-authenticated key exchange based on the RSA public-key cryptosystem. To date, most of the published protocols for password-authentic...
In this paper a new method for the combination of 2D GIS vector data and 2.5D DTM represented by triangulated irregular networks (TIN) to derive integrated triangular 2.5D object-b...
In this paper, a new realization for logic functions, namely Reversible Programmable Logic Array (RPLA), has been proposed. The proposed realization has the advantage of regularit...
Ahsan Raja Chowdhury, Rumana Nazmul, Hafiz Md. Has...
The main objective of an information retrieval system is to be effective in providing a user with relevant information in response to a query. However, especially given the inform...
Real-time transaction processing becomes concerns as embedded time coming rapidly. However, the transaction process in real-time embedded system still has some problems in resource...