modulo operator
Recently Published Documents


TOTAL DOCUMENTS

10
(FIVE YEARS 0)

H-INDEX

3
(FIVE YEARS 0)

From old times, information security has been an essential part of human life. Day to day developing new technologies and increasing number of users share information with each other, securing information is becoming more important. For securing information, there are several techniques out of which most common is cryptography. Cryptography is a technique involving securing transmission of messages in presence of adversaries. The basic aim is to hide the information from unauthorized users. Cryptography includes to phases: encryption of plain message and decrypting encrypted message. The aim of this paper is to use new integral transform "Kamal transform" and congruence modulo operator involving ASCII value for encryption and decryption of message.


2015 ◽  
Vol 8 (4) ◽  
pp. 1 ◽  
Author(s):  
Olivier Rukundo

In this study, the standard IEEE 754–2008 and modulo-based floor functions for rounding non-integers have been presented. Their effects on the accuracy of the bilinear interpolation algorithm have been demonstrated. The improved-floor uses the modulo operator in an effort to make each non-integer addend an integer when the remainder between the multiplicative inverse of the fractional factor and the numerator is greater than zero. The experiments demonstrated relatively positive effects with the improved-floor function and the alternativeness to the standard round function.


Author(s):  
Firas Hassan ◽  
Joao Lucas Magalini ◽  
Victor de Campos Pentea ◽  
Joan E. Carletta
Keyword(s):  

1985 ◽  
Vol 20 (9) ◽  
pp. 94-94
Author(s):  
Jonathan Thornburg
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document