To see the other types of publications on this topic, follow the link: Curve-key.

Journal articles on the topic 'Curve-key'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Curve-key.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Krishna, Addepalli V. N., and Addepalli Hari Narayana. "Cubic spline curve public key cryptography." Journal of Discrete Mathematical Sciences and Cryptography 20, no. 2 (February 17, 2017): 453–61. http://dx.doi.org/10.1080/09720529.2015.1112512.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Baer, Wolfram. "Key Curve-Einprobenverfahren zur Ermittlung dynamischer Risswiderstandskurven." Materials Testing 47, no. 11-12 (November 2005): 666–73. http://dx.doi.org/10.3139/120.100701.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Aljamaly, Karrar Taher R., and Ruma Kareem K. Ajeena. "The KR-Elliptic Curve Public Key Cryptosystem." Journal of Physics: Conference Series 1879, no. 3 (May 1, 2021): 032046. http://dx.doi.org/10.1088/1742-6596/1879/3/032046.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Vasundhara, Dr S. "Elliptic curve Cryptography and Diffie- Hellman Key exchange." IOSR Journal of Mathematics 13, no. 01 (January 2017): 56–61. http://dx.doi.org/10.9790/5728-1301015661.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Simonsohn, Uri, Leif D. Nelson, and Joseph P. Simmons. "P-curve: A key to the file-drawer." Journal of Experimental Psychology: General 143, no. 2 (2014): 534–47. http://dx.doi.org/10.1037/a0033242.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zhang, Yong Hong, L. H. Wang, and De Jin Hu. "Key Technologies of Image Measurement for Curve Accurate Grinding." Key Engineering Materials 329 (January 2007): 533–38. http://dx.doi.org/10.4028/www.scientific.net/kem.329.533.

Full text
Abstract:
Image analysis was used to evaluate the curve grinding process. The measurement system organization and its principle of operation were introduced. Some key technologies that influence the system precision were also studied in details. Real-time image of work piece and wheel grinding can be gathered while using CCD camera. For image de-noising, a kind of wavelet threshold function was presented to calculate the new wavelet coefficients. Local threshold algorithm was used to compute different scale threshold, another threshold is suggested when MSE is minimum. Image signals are reconstructed through invert discrete wavelet transformation with the new wavelet coefficients. For the purpose of increasing the measurement precision, a closed mathematical model of sub-pixel edge detection operator was founded according to the gray moment operator’s invariant characteristics and Tabatabai’s first three sample gray moments. An application of system validity and the comparison results of work piece were also given. From experiments it can be said that the proposed method in this paper is effective, and its detection precision and results are reasonable.
APA, Harvard, Vancouver, ISO, and other styles
7

Reddy, P. Vasudeva, and M. Padmavathamma. "An authenticated key exchange protocol in elliptic curve cryptography." Journal of Discrete Mathematical Sciences and Cryptography 10, no. 5 (October 2007): 697–705. http://dx.doi.org/10.1080/09720529.2007.10698150.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

C., Sivakumar Chellappan. "Efficient Group Key Management Using Whale Optimization Algorithm based Elliptic Curve Cryptography for Dynamic Multicast Groups." Journal of Advanced Research in Dynamical and Control Systems 12, SP3 (February 28, 2020): 1078–92. http://dx.doi.org/10.5373/jardcs/v12sp3/20201354.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ernst, M., B. Henhapl, S. Klupsch, and S. Huss. "FPGA based hardware acceleration for elliptic curve public key cryptosystems." Journal of Systems and Software 70, no. 3 (March 2004): 299–313. http://dx.doi.org/10.1016/s0164-1212(03)00075-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

B.J., Santhosh Kumar, and Kruthika Vijay. "Symmetric Key based Encryption and Decryption using Lissajous Curve Equations." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 1 (February 1, 2017): 285. http://dx.doi.org/10.11591/ijece.v7i1.pp285-288.

Full text
Abstract:
Sender and receiver both uses two large similar prime numbers and uses parametric equations for swapping values of kx and by product of kx and ky is the common secret key. Generated secret key is used for encryption and decryption using ASCII key matrix of order 16X16. Applying playfair rules for encryption and decryption. Playfair is a digraph substitution cipher. Playfair makes use of pairs of letters for encryption and decryption. This application makes use of all ASCII characters which makes brute force attack impossible.
APA, Harvard, Vancouver, ISO, and other styles
11

Vigila, S. Maria Celestin, and K. Muneeswaran. "Key generation based on elliptic curve over finite prime field." International Journal of Electronic Security and Digital Forensics 4, no. 1 (2012): 65. http://dx.doi.org/10.1504/ijesdf.2012.045391.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Pouw, Mieke F., Charlotte L. Krieckaert, Michael T. Nurmohamed, Desiree van der Kleij, Lucien Aarden, Theo Rispens, and Gertjan Wolbink. "Key findings towards optimising adalimumab treatment: the concentration–effect curve." Annals of the Rheumatic Diseases 74, no. 3 (December 10, 2013): 513–18. http://dx.doi.org/10.1136/annrheumdis-2013-204172.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Gajbhiye, Samta, Sanjeev Karmakar, and Monisha Sharma. "Diffie-Hellman Key Agreement with Elliptic Curve Discrete Logarithm Problem." International Journal of Computer Applications 129, no. 12 (November 17, 2015): 25–27. http://dx.doi.org/10.5120/ijca2015907030.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Byrne, Daniel, Nilufer Onder, and Zhenlin Wang. "mPart: miss-ratio curve guided partitioning in key-value stores." ACM SIGPLAN Notices 53, no. 5 (December 7, 2018): 84–95. http://dx.doi.org/10.1145/3299706.3210571.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Jaiswal, Priyanka, and Sachin Tripathi. "An authenticated group key transfer protocol using elliptic curve cryptography." Peer-to-Peer Networking and Applications 10, no. 4 (February 10, 2016): 857–64. http://dx.doi.org/10.1007/s12083-016-0434-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Yin, X. C. "A simple iterative key curve method for determining JR curves." International Journal of Pressure Vessels and Piping 53, no. 1 (January 1992): 143–57. http://dx.doi.org/10.1016/0308-0161(93)90108-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Rusovs, Gundars. "Biomechanical Response to Dynamic Curve Loading as the Key Factor in Structural Curve Formation in Idiopathic Scoliosis." International Journal of Rehabilitation Research 32 (August 2009): S34. http://dx.doi.org/10.1097/00004356-200908001-00046.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Ekta Narwal , Sumeet Gill, Ekta Narwal ,. Sumeet Gill. "Secure and Faster Key Management of Elliptical Curve Cryptography in Vanets." International Journal of Computer Science Engineering and Information Technology Research 7, no. 4 (2017): 25–30. http://dx.doi.org/10.24247/ijcseitraug20174.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Rajendiran, Kishore. "A Secure Key Predistribution Scheme for WSN Using Elliptic Curve Cryptography." ETRI Journal 33, no. 5 (October 4, 2011): 791–801. http://dx.doi.org/10.4218/etrij.11.0110.0665.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

PratapSingh, Uday, and Rajkumar Singh Rathore. "Distributed Hierarchical Group Key Management using Elliptic Curve and Hash Function." International Journal of Computer Applications 61, no. 19 (January 18, 2013): 35–40. http://dx.doi.org/10.5120/10039-5055.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Wang, Jianliang, and Lianyong Feng. "Curve-fitting models for fossil fuel production forecasting: Key influence factors." Journal of Natural Gas Science and Engineering 32 (May 2016): 138–49. http://dx.doi.org/10.1016/j.jngse.2016.04.013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Singh, Soram Ranbir, and Khan Kumar Ajoy. "Key Management Scheme for Internet of Things Using an Elliptic Curve." Journal of Computational and Theoretical Nanoscience 17, no. 1 (January 1, 2020): 115–21. http://dx.doi.org/10.1166/jctn.2020.8637.

Full text
Abstract:
With the advancements in wireless internet technology, a new computing ecosystem, the Internet of Things(IoT), has ushered in numerous devices in many areas in our life as well as in industries. The IoT is a computing notion that describes a scenario in which objects we use everyday are accessible using the internet and can be controlled from anywhere (Kung, Y.F., et al., 2018. Home Monitoring System Based Internet of Things. 2018 IEEE International Conference on Applied System Invention (ICASI), April; IEEE. pp.325–327; Singh, S. and Singh, N., 2015. Internet of Things (IoT): Security Challenges, Business Opportunities and Reference Architecture for E-Commerce. 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), October; IEEE. pp.1577–1581). It could comprise devices with sensors to gather and broadcast data over the Internet (Singh, S. and Singh, N., 2015. Internet of Things (IoT): Security Challenges, Business Opportunities and Reference Architecture for E-Commerce. 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), October; IEEE. pp.1577–1581). As per report of the research firm Gartner, the number of IoT objects will surpass 11.2 billion by 2018, and 20.4 billion by 2020. By 2020, the IoT industries will make revenue of almost 3 trillion US Dollars. As IoT devices are largely used in various areas of importance, it will definitely bring a lot of interests to hackers. It is worthwhile to quote here that hackers took away more than Rs 78 crore by hacking into router of Cosmos Bank based in Pune by duplicating debit cards in August, 2018. They carried out about 12 thousand unethical transactions worth Rs 78 crore in 28 countries. Hence, it is necessary to consider data privacy so that we can protect the data with limited system resource and technology. This paper proposes a new key management scheme with entity authentication for IoT devices. The proposed scheme uses modified Tate pairing. The presented scheme is apposite for IoT devices such as sensor networks due to their lower computational requirements.
APA, Harvard, Vancouver, ISO, and other styles
23

Singh, Soram Ranbir, and Khan Kumar Ajoy. "An Elliptic Curve based Key Management Scheme for Wireless Sensor Networks." Journal of Computational and Theoretical Nanoscience 17, no. 1 (January 1, 2020): 409–17. http://dx.doi.org/10.1166/jctn.2020.8683.

Full text
Abstract:
Wireless sensor network (WSN) is a growing expertise which has been used in many areas such as airports, smart watches, smart cities, smart health organizations, and smart homes. It has provided mankind with a lot of benefits in different areas and domains. They are also used in disaster management, habitat monitoring in forests, and many applications in hostile areas such as military; therefore, there is a need to enforce security policy. Also, in many instances of data transfer in WSNs, there is a need of stricter authentication process. Presently, authentication in WSNs is commonly achieved through the use of usernames and passwords. A wicked attacker can impersonate to the network as a genuine user by using stolen password(s). This is chiefly due to the lack of proper key management scheme(s) currently available for WSNs. Moreover, because of limited memory and computing power, it is problematic to decide the proper key management system for WSNs. We propose a key management scheme (KMS) for WSNs using an elliptic curve in this paper. The proposed KMS is implemented in Java SE 6(Mustang) and evaluated for critical performance by using an elliptic curve in a WSN of varied cluster head (CH) sizes.
APA, Harvard, Vancouver, ISO, and other styles
24

Guyton, A. C. "Renal function curve--a key to understanding the pathogenesis of hypertension." Hypertension 10, no. 1 (July 1987): 1–6. http://dx.doi.org/10.1161/01.hyp.10.1.1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Zhang, Qiang, Xiang Xue, Dongsheng Zhou, and Xiaopeng Wei. "Motion Key-frames extraction based on amplitude of distance characteristic curve." International Journal of Computational Intelligence Systems 7, no. 3 (October 28, 2013): 506–14. http://dx.doi.org/10.1080/18756891.2013.859873.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Kaabneh, K., and H. Al-Bdour. "Key Exchange Protocol in Elliptic Curve Cryptography with No Public Point." American Journal of Applied Sciences 2, no. 8 (August 1, 2005): 1232–35. http://dx.doi.org/10.3844/ajassp.2005.1232.1235.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Su, Pin-Chang, Erl-Huei Lu, and Henry Ker-Chang Chang. "A knapsack public-key cryptosystem based on elliptic curve discrete logarithm." Applied Mathematics and Computation 168, no. 1 (September 2005): 40–46. http://dx.doi.org/10.1016/j.amc.2004.08.027.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Sui, Aifen, Lucas C. K. Hui, Yixian Yang, and K. P. Chow. "Elliptic curve cryptography based authenticated key agreement with pre-shared password." Journal of Electronics (China) 22, no. 3 (May 2005): 268–72. http://dx.doi.org/10.1007/bf02687982.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Udin, Md Nizam, Farah Azaliney Mohd Amin, Aminah Abdul Malek, Nur Annisa Zulkifili, Nur Atiqah Ghazali, and Siti Aisyah Mohd Ridzuwan. "IMPLEMENTATION OF BLOM’S KEY PREDISTRIBUTION SCHEME BY USING ELLIPTIC CURVE CRYPTOGRAPHY." MALAYSIAN JOURNAL OF COMPUTING 6, no. 2 (May 12, 2021): 812. http://dx.doi.org/10.24191/mjoc.v6i2.11508.

Full text
Abstract:
Cryptography, along with its various methods is used to serve the security communication purpose. Cryptography is said to be secure if the encryption key is hard to break by the attacker. Initially, Blom’s Key pre-distribution uses an integer finite field which makes this scheme easy to be intervened by attackers and criminal activists. Hence, this study suggests implementing the Elliptic Curve Cryptography to better enhance the security of the original Blom’s. In this proposed scheme, points generated from the elliptic curve will be appointed as public identifiers to be used in the original scheme. The private key and session key of each user are generated using the addition law mathematical operation with public identifiers assigned. Two users who intend to communicate with each other will obtain a common session key. Overall, the modification of Blom’s Key pre-distribution scheme will be presented in this study.
APA, Harvard, Vancouver, ISO, and other styles
30

Brünighaus, K., W. Hesse, M. Twickler, R. Twickler, and W. Dahl. "THE INFLUENCE OF LOADING RATE ON JR-CURVE OF 20 MnMoNi 5 5 STEEL USING THE KEY CURVE METHOD." Le Journal de Physique Colloques 46, no. C5 (August 1985): C5–227—C5–232. http://dx.doi.org/10.1051/jphyscol:1985529.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Shen, Yong Luo, Jun Zhang, Di Wei Yang, and Lin Bo Luo. "A Bezier Curve Based Key Management Scheme for Hierarchical Wireless Sensor Networks." Applied Mechanics and Materials 263-266 (December 2012): 2979–85. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.2979.

Full text
Abstract:
In this paper, we propose a novel key management scheme based on Bezier curves for hierarchical wireless sensor networks (WSNs). The design of our scheme is motivated by the idea that a Bezier curve can be subdivided into arbitrarily continuous pieces of sub Bezier curves. The subdivided sub Bezier curves are easily organized to a hierarchical architecture that is similar to hierarchical WSNs. The subdivided Bezier curves are unique and independent from each other so that it is suitable to assign each node in the WSN with a sub Bezier curve. Since a piece of Bezier curve can be presented by its control points, in the proposed key management scheme, the secret keys for each node are selected from the corresponding Bezier curve’s control points. Comparing with existing key management schemes, the proposed scheme is more suitable for distributing secret keys for hierarchical WSNs and more efficient in terms of computational and storage cost.
APA, Harvard, Vancouver, ISO, and other styles
32

Chinniah, Porkodi, and Sangavai Krishnamoorthi. "An Efficient Elliptic Curve based Key Management Scheme for Distributed Sensor Networks." European Journal of Engineering Research and Science 4, no. 6 (June 26, 2019): 111–16. http://dx.doi.org/10.24018/ejers.2019.4.6.1316.

Full text
Abstract:
Distributed Sensor Networks are broadly used in many applications and key distribution is a challenging task. In this work, a key management scheme is developed for distributed sensor networks based on elliptic curve cryptography over prime field. Key distribution among the nodes and interactive as well as non interactive protocols for agreement of common secret key for message transmission between two nodes are discussed. The probability for connectivity of the network generated according to the proposed key distribution scheme is discussed in detail. The implementation of the proposed scheme is done using NetSim interfaced with MATLAB. Connectivity of the network is also checked through eigenvalues of the Laplacian matrix of the network.
APA, Harvard, Vancouver, ISO, and other styles
33

WU, Yu, Xue-peng JIA, and Hong-bo LI. "Key frame extraction based on curvature detection of multi-feature similarity curve." Journal of Computer Applications 28, no. 12 (February 26, 2009): 3084–88. http://dx.doi.org/10.3724/sp.j.1087.2008.03084.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Ray, Sangram, and Biswas G. P. "Design of Mobile Public Key Infrastructure (M-PKI) Using Elliptic Curve Cryptography." International Journal on Cryptography and Information Security 3, no. 1 (March 31, 2013): 25–37. http://dx.doi.org/10.5121/ijcis.2013.3104.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Alghazzawi, Daniyal M. "A Novel Password based Multi Party Key Agreement Protocol on Elliptic Curve." International Journal of Computer Science and Information Technology 4, no. 1 (February 29, 2012): 75–82. http://dx.doi.org/10.5121/ijcsit.2012.4106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Nimbhorkar, Sonali, and Latesh Malik. "Comparative Analysis of Authenticated Key Agreement Protocols Based on Elliptic Curve Cryptography." Procedia Computer Science 78 (2016): 824–30. http://dx.doi.org/10.1016/j.procs.2016.02.065.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

He, Debiao, Lina Wang, Huaqun Wang, and Muhammad Khurram Khan. "Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography." IET Communications 10, no. 14 (September 20, 2016): 1795–802. http://dx.doi.org/10.1049/iet-com.2016.0091.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Shengbao Wang, Zhenfu Cao, M. A. Strangio, and Lihua Wang. "Cryptanalysis and improvement of an elliptic curve Diffie-Hellman key agreement protocol." IEEE Communications Letters 12, no. 2 (February 2008): 149–51. http://dx.doi.org/10.1109/lcomm.2008.071307.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Phoa, Wesley, and Michael Shearer. "A Note on Arbitrary Yield Curve Reshaping Sensitivities Using Key Rate Durations." Journal of Fixed Income 7, no. 3 (December 31, 1997): 67–71. http://dx.doi.org/10.3905/jfi.1997.408212.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Zhang, Li Hua, Li Ping Zhang, and Er Fei Bai. "Generalized Elliptic Curve Digital Signature Chain Based Authentication and Key Agreement Scheme." Advanced Materials Research 108-111 (May 2010): 1503–8. http://dx.doi.org/10.4028/www.scientific.net/amr.108-111.1503.

Full text
Abstract:
Recently, several one time password authentication schemes have been proposed. However, most one-time password authentication schemes have security flaws. In this paper, a novel one-time password authentication and key agreement scheme (EAKAS) based on elliptic curve digital signature chain is developed. The proposed scheme has the following merits password or verification table is not required in the server; users can choose or change password; it can resist off-line dictionary attacks and achieves mutual authentication; it has no system clock synchronization and no constraint of transmission delay; it can resist replay attacks, man-in-the-middle attack and insider attack; it is sensitive to password error and strong in security restoration; the session keys in proposed scheme have the feature of freshness, confidentiality, known key security and forward security. Compared with the related schemes, our proposed scheme has better security and well suited to scenarios requiring a high level security.
APA, Harvard, Vancouver, ISO, and other styles
41

Sugumar, B., and M. Ramakrishnan. "Key Escrow with Elliptic Curve Cryptography – Conceptual Framework for Distributed Mobile Networks." Indonesian Journal of Electrical Engineering and Computer Science 11, no. 3 (September 1, 2018): 1060. http://dx.doi.org/10.11591/ijeecs.v11.i3.pp1060-1067.

Full text
Abstract:
In the large scale distributive environment involving mobile network, metadata server and storage applications, the data access and the security measures are of paramount importance. In parallel application processing, data is distributed across multiple servers and storage location. Ensuring confidentiality and availability of the data to the authorised users at the appropriate time involves high level of encryption algorithms, key management schemes and security algorithms. In this paper, key escrow scheme is implemented with the light weighted symmetric algorithm, elliptic curve cryptography in the distributed environment. Key escrow centre is established along with the metadata server and the encryption keys are segmented and shared among the multiple sub agents using Shamir threshold sharing scheme. The implementation of Key Escrow mechanism with Elliptical Curve Cryptography provides wide range of flexibility and confidentiality in the distributed environment. It also eliminates private secret sub key problem and thereby ensuring better security.
APA, Harvard, Vancouver, ISO, and other styles
42

Anandakumar, N. Nalla, M. Prem Laxman Das, Somitra K. Sanadhya, and Mohammad S. Hashmi. "Reconfigurable Hardware Architecture for Authenticated Key Agreement Protocol Over Binary Edwards Curve." ACM Transactions on Reconfigurable Technology and Systems 11, no. 2 (November 12, 2018): 1–19. http://dx.doi.org/10.1145/3231743.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Asif, Shahzad, Md Selim Hossain, and Yinan Kong. "High‐throughput multi‐key elliptic curve cryptosystem based on residue number system." IET Computers & Digital Techniques 11, no. 5 (July 27, 2017): 165–72. http://dx.doi.org/10.1049/iet-cdt.2016.0141.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Li, Xiangxue, Haifeng Qian, and Yuan Zhou. "Pitfalls in identity based encryption using an elliptic curve combined public key." Applied Mathematics Letters 25, no. 8 (August 2012): 1111–13. http://dx.doi.org/10.1016/j.aml.2012.02.013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Rawat, Arjun, and Maroti Deshmukh. "Tree and elliptic curve based efficient and secure group key agreement protocol." Journal of Information Security and Applications 55 (December 2020): 102599. http://dx.doi.org/10.1016/j.jisa.2020.102599.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Huang, Shuai Jun, Jian Wu, and Yan Ping Du. "Key Parameter Function of Wine Cushioning Package of Honeycomb Paper Core." Advanced Materials Research 821-822 (September 2013): 1135–40. http://dx.doi.org/10.4028/www.scientific.net/amr.821-822.1135.

Full text
Abstract:
This paper presents methods of cushioning package design. The analysis of existing shortcoming is made when the maximum accelerationstatic stress curve (what is called curve) is applied to the cushion package design, at the same time ,the principle and method steps to get curve are briefly introduced when the stressenergy method is used .the function between the key parameters of cushioning package design is acquired by the stressenergy method .By comparing the data produced with matlab software with the real experimental ones in some paper, the possibilities to get curve of casual drop height and cushion thickness by one-time experiment to get curve with stress-energy method is demonstrated. Based on the function of key parameters of cushioning package acquired, the reversed cushioning package design method is carried out.
APA, Harvard, Vancouver, ISO, and other styles
47

Liu, Shu Qun, and Kun Sun. "Hand-Painted Curve Fitting Method Based on NURBS Curve." Advanced Materials Research 1049-1050 (October 2014): 1385–88. http://dx.doi.org/10.4028/www.scientific.net/amr.1049-1050.1385.

Full text
Abstract:
In hand-drawn graphics modeling method, the input to the system free hand draw curve is the first step in modeling. Effective fitting the curve of the input is the key to modeling effect is good or bad. For noise, free shape features of hand-painted curve, presents a method of using NURBS curve fitting of hand-painted curves. Experiments show that using NURBS hand-drawn curve fitting, the fitting effect is good, easy to modify, for later use of curve, not only can be used in hand-painted curve modeling system, can also be applied to the mainstream way of WIMP modeling system.
APA, Harvard, Vancouver, ISO, and other styles
48

Tang, Jing Qiu, and Yan Bin Cui. "High Voltage Breaker Cam Actuator’s Optimization Design on the Virtual Prototype Technology." Key Engineering Materials 419-420 (October 2009): 97–100. http://dx.doi.org/10.4028/www.scientific.net/kem.419-420.97.

Full text
Abstract:
In this paper, the virtual prototype technology is used for the analyzing and optimizing high voltage breaker actuator’s cam machine. While the high voltage breaker closing, the moving contactor can have the perfect dynamic property by the optimal data. The contactor’s dynamic property curve should be in line with perfect dynamic property curve. The velocity curve can be gotten by analyzing virtual prototype. According to the theory of high voltage breaker’s dynamic property, a smooth voltage curve can be fitted. This fitting curve as the perfect voltage curve can be used for optimizing the cam machine. Supposing other work condition is invariable, the key points on cam profile which decide the dynamic property of the cam machine are analyzed. The coordinates of the key points are optimized and the cam profile is amended. Analyzing the dynamic property of the breaker’s virtual prototype with the amended cam machine, the contactor’s dynamic property curve is perfect. In this paper, the optimal coordinates of the key points are used on the cam profile, and the high voltage breaker actuator’s cam machine is optimal.
APA, Harvard, Vancouver, ISO, and other styles
49

Kumar, Abhimanyu, and Sachin Tripathi. "Ternary Tree based Group Key Agreement Protocol Over Elliptic Curve for Dynamic Group." International Journal of Computer Applications 86, no. 7 (January 16, 2014): 17–25. http://dx.doi.org/10.5120/14997-3072.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Iyengar, Vinay S. "Novel Elliptic Curve Scalar Multiplication Algorithms for Faster and Safer Public-Key Cryptosystems." International Journal on Cryptography and Information Security 2, no. 3 (September 30, 2012): 57–66. http://dx.doi.org/10.5121/ijcis.2012.2305.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography