In this paper, we propose a new asymmetric cryptographic algorithm (HOOD CRYPT) based on the Elliptical Curve Cryptographic approach. The algorithm describes how an orthogonal fre...
Robert Steven Owor, Khalil Dajani, Zephyrinus Okon...
A new method of skeletonisation (stroke extraction) of handwritten character images is presented. The method has been designed to extract the skeleton which is very close to human...
Vladimir Pervouchine, Graham Leedham, Konstantin M...
The analysis of spectral data constitutes new challenges for machine learning algorithms due to the functional nature of the data. Special attention is paid to the metric used in t...
Petra Schneider, Frank-Michael Schleif, Thomas Vil...
Recent study for congestion control in high speed networks indicates that the derivative information for the congestion at the common buffer for multiple sources could be useful i...
An asynchronous program is one that contains procedure calls which are not immediately executed from the callsite, but stored and "dispatched" in a non-deterministic ord...