The main back-bone operation in elliptic curve cryptosystems is scalar point multiplication. The most frequently used method implementing the scalar point multiplication which is ...
—Triangulated meshes have become ubiquitous discrete surface representations. In this paper, we address the problem of how to maintain the manifold properties of a surface while ...
We propose a new remote multimodal biometric authentication framework based on fragile watermarking for transferring multi-biometrics over networks to server for authentication. A...
This paper proposes a new connectionist approach to numeric law discovery; i.e., neural networks (law-candidates) are trained by using a newly invented second-order learning algor...
The steady state of the quasilinear convection-diffusion-reaction equation ut − (D(u) u) + b(u) u + c(u) = 0 (1) is studied. Depending on the ratio between convection and diff...