We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 21-40 of 411 results
  1. Scientific Investigation on Movable Cultural Heritage

    The aim of this paper is to illustrate parts of a 45 pages scientific investigation, delivering a significative sample of the results achieved...
    Conference paper 2021
  2. Solving the electronic Schrödinger equation for multiple nuclear geometries with weight-sharing deep neural networks

    The Schrödinger equation describes the quantum-mechanical behaviour of particles, making it the most fundamental equation in chemistry. A solution...

    Michael Scherbela, Rafael Reisenhofer, ... Philipp Grohs in Nature Computational Science
    Article 19 May 2022
  3. Image Forgery Detection Using Cryptography and Deep Learning

    The advancement of technology has undoubtedly exposed everyone to a remarkable array of visual imagery. Nowadays, digital technology is eating away...
    Ayodeji Oke, Kehinde O. Babaagba in Big Data Technologies and Applications
    Conference paper 2024
  4. Hardware Implementations of Pairings at Updated Security Levels

    Pairings are cornerstones to several interesting cryptographic protocols including Non-interactive ARgument of Knowledge currently used in Zcash...
    Arthur Lavice, Nadia El Mrabet, ... Julien Proy in Smart Card Research and Advanced Applications
    Conference paper 2022
  5. Pairing-Friendly Twisted Hessian Curves

    This paper presents efficient formulas to compute Miller doubling and Miller addition utilizing degree-3 twists on curves with j-invariant 0 written...
    Chitchanok Chuengsatiansup, Chloe Martindale in Progress in Cryptology – INDOCRYPT 2018
    Conference paper 2018
  6. Design and Installation of an IoT Electricity and Water Technological and Monitoring Solution

    Nowadays, monitoring electricity and water usage is becoming very important to obtain consumption baselines towards establishing savings goals....
    Ponciano J. Escamilla-Ambrosio, Maria G. Pulido-Navarro, ... J. Humberto Sossa-Azuela in Smart Cities
    Conference paper 2022
  7. Efficient Software Implementation of GMT6-672 and GMT8-542 Pairing-Friendly Curves for a 128-Bit Security Level

    A Bilinear pairing on an elliptic curve defined over a finite field provides an attractive prospect for designing cryptographic schemes with various...
    Zihao Song, Junichi Sakamoto, ... Tsutomu Matsumoto in Applied Cryptography and Network Security Workshops
    Conference paper 2022
  8. Using algebraic geometry to reconstruct a darboux cyclide from a calibrated camera picture

    The task of recognizing an algebraic surface from a single apparent contour can be reduced to the recovering of a homogeneous equation in four...

    E. Hoxhaj, J. M. Menjanahary, J. Schicho in Applicable Algebra in Engineering, Communication and Computing
    Article 07 March 2023
  9. Almost Injective and Invertible Encodings for Jacobi Quartic Curves

    This paper introduces a novel encoding scheme for hashing values from the finite field...
    **uxiu Li, Wei Yu, ... Luying Li in Science of Cyber Security
    Conference paper 2023
  10. Self-organizing Maps

    Self-organizing maps are closely related to radial basis function networks. They can be seen as radial basis function networks without an output...
    Rudolf Kruse, Sanaz Mostaghim, ... Matthias Steinbrecher in Computational Intelligence
    Chapter 2022
  11. Some remarks on how to hash faster onto elliptic curves

    This article proposes four optimizations of indifferentiable hashing onto (prime-order subgroups of) ordinary elliptic curves over finite fields ...

    Article 18 March 2024
  12. Efficient Ate-Based Pairing over the Attractive Classes of BN Curves

    This paper proposes two attractive classes of Barreto-Naehrig curve for ate-based pairing by imposing certain condition...
    Yuki Nanjo, Md. Al-Amin Khandaker, ... Yasuyuki Nogami in Information Security Applications
    Conference paper 2019
  13. Two-dimensional materials for future information technology: status and prospects

    Over the past 70 years, the semiconductor industry has undergone transformative changes, largely driven by the miniaturization of devices and the...

    Hao Qiu, Zhihao Yu, ... **nran Wang in Science China Information Sciences
    Article Open access 29 May 2024
  14. CFFU Cycle Design Mode of Programmable Creases - An Example of Fibonacci Folding Sequence Pattern

    Kirigami is a Japanese art of paper cutting. It is used to obtain three-dimensional shapes via cutting and folding the paper. Origami, however, is...
    Chiung-Hui Chen, Meng-Chih Lin in Culture and Computing
    Conference paper 2022
  15. Computer Animation

    This chapter introduces you to the world of computer animation, which is essential to show virtual worlds that change over time. The main motion...
    Mario A. Gutiérrez A., Frédéric Vexo, Daniel Thalmann in Step** into Virtual Reality
    Chapter 2023
  16. Interval Occlusion Calculus with Size Information

    Spatial occlusion is an important way for human beings to build up the visual perceptions and the awareness of environments. Focusing on 2D disk-like...
    Juan Chen, Ang Gao, ... **anglu Zhou in Knowledge Science, Engineering and Management
    Conference paper 2021
  17. Hacking the Shadow Terminator

    Using ray tracing for shadows is a great method to get accurate direct illumination: precise hard shadows throughout the scene at all scales, and...
    Johannes Hanika in Ray Tracing Gems II
    Chapter 2021
  18. 2D Data Plotting

    In this chapter, you will look at styles and techniques for plotting two-dimensional data. You will start with some simple plots and then progress to...
    Bernard Korites in Python Graphics
    Chapter 2023
  19. Magnetometric SQUID Systems and Magnetic Measurement Methods for Biomedical Research

    Abstract

    This article presents a review of domestic research on the development of new medical equipment and technologies using equipment and methods...

    Yu. V. Maslennikov, V. Yu. Slobodchikov, ... Yu. V. Gulyaev in Pattern Recognition and Image Analysis
    Article 01 December 2023
  20. Some new linear codes from skew cyclic codes and computer algebra challenges

    One of the main problems of coding theory is to construct codes with best possible parameters. Cyclic codes and their various generalizations, such...

    Article 05 March 2019
Did you find what you were looking for? Share feedback.