Search
Search Results
-
Modular Neural Networks
We describe in this chapter the basic concepts, theory and algorithms of modular and ensemble neural networks. We will also give particular attention... -
Modular language product lines: concept, tool and analysis
Modelling languages are intensively used in paradigms like model-driven engineering to automate all tasks of the development process. These languages...
-
Energy efficient triple-modular exponential techniques for batch verification schemes
Most of the authentication protocols have modular multi-exponentiation (MME) as their core operation in the verification step. Triple modular-multi...
-
Partial and Simultaneous Transitive Orientations via Modular Decompositions
A natural generalization of the recognition problem for a geometric graph class is the problem of extending a representation of a subgraph to a...
-
Modeling control strategies for prosumers in a Python-based modular simulation tool
The planned massive increase of producers and consumers such as electric vehicles, heat pumps and photovoltaic systems in distribution grids will...
-
Modular Polynomial Multiplication Using RSA/ECC Coprocessor
Modular polynomial multiplication is a core and costly operation of ideal lattice-based schemes. In the context of embedded devices, previous works... -
Polynomial Analysis of Modular Arithmetic
The modular polynomial abstract domain, MPAD, is proposed, whose invariants are systems of polynomial equations that hold modulo a power of 2. Its... -
Advances on Strictly \(\varDelta \) -Modular IPs
There has been significant work recently on integer programs (IPs) $$\min \{c^\top x... -
Improving the performance of authentication protocols using efficient modular multi exponential technique
Efficient and secure authentication of the user in today’s world, where most of the multimedia data is shared over the public network, is essential....
-
Homomorphic Modular Reduction and Improved Bootstrap** for BGV Scheme
Bootstrap** is a crucial subroutine of fully homomorphic encryption (FHE), where a homomorphic encryption scheme evaluates its own decryption... -
Rethinking modular multi-exponentiation in real-world applications
The importance of efficient multi-exponentiation algorithms in a large spectrum of cryptographic applications continues to grow. Previous literature...
-
A modular approach to build a hardware testbed for cloud resource management research
Research on resource management focuses on optimizing system performance and energy efficiency by distributing shared resources like processor cores,...
-
Modular Reduction
Modular reduction is the computation of x mod m. Such computation is implicit in all modular-arithmetic operations, because it is necessary to... -
Application of optimized photovoltaic grid-connected control system based on modular multilevel converters
Photovoltaic power generation is a promising method for generating electricity with a wide range of applications and development potential. It...
-
Design of a bi-level PSO based modular neural network for multi-step time series prediction
Derived from an effective strategy - direct and multiple-input multiple-output strategy, a modular neural network based on a bi-level particle swarm...
-
Modular stochastic configuration network prediction interval for furnace temperature in municipal solid waste incineration
The high dimensionality of characteristic variables and the presence of numerous uncertain factors affecting furnace temperature during municipal...
-
An ECC processor for IoT using Edwards curves and DFT modular multiplication
In this work, an elliptic curve cryptography (ECC) processor is proposed to be used in the Internet of Things (IoT) devices. The ECC processor is...
-
A performance evaluation of modular functions and state databases for Hyperledger Fabric blockchain systems
The performance of blockchains is a critical issue in various applications, such as digital currency transactions and balance checking. Blockchain...
-
Symbolic Transformation of Expressions in Modular Arithmetic
We present symbolic methods to improve the precision of static analyses of modular integer expressions based on Abstract Interpretation. Like similar... -
An energy-efficient reconfigurable asymmetric modular cryptographic operation unit for RSA and ECC
RSA and ellipse curve cryptography (ECC) algorithms are widely used in authentication, data security, and access control. In this paper, we analyze...