Zobrazeno 1 - 10
of 69
pro vyhledávání: '"I. Sen Gupta"'
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
I. Sen Gupta, Lokenath Debnath
Publikováno v:
International Journal of Mathematical Education in Science and Technology. 37:624-628
This paper deals with a simple method of evaluation of certain multiple difinite integrals. This is followed by two main theorems concerning multiple difinite integrals. Some examples of applications are given.
Publikováno v:
Engineering in Life Sciences. 5:54-57
Recovery of 2,3-butanediol from a fermentation broth entails the separation of cells and other suspended solids as the initial step for subsequent separation stages. The aim of this work was to study the cross-flow filtration of broth in the fermenta
Publikováno v:
International Journal of Systems Science. 23:2025-2035
The outcome of an effort to implement the concurrent fault simulation algorithm on a transputer based multiprocessor is reported. The algorithm as implemented has been run on several ISCAS benchmark circuits (Brglez and Fujiwara 1985) and the perform
Publikováno v:
TENCON 2008 - 2008 IEEE Region 10 Conference.
As the feature size is scaled down with process technology advancement, power minimization has become a serious problem for the designers as well as the test engineers. Test vector reordering for dynamic power minimization during combinational circui
Publikováno v:
TENCON 2007 - 2007 IEEE Region 10 Conference.
In this paper, we present a robust mechanism for digital watermarking in media files. We have combined cryptographic and steganographic operations so that a violator cannot easily change the copyright information hidden inside the files. We propose t
Publikováno v:
TENCON 2007 - 2007 IEEE Region 10 Conference.
Public key cryptosystem RSA is computationally secure against all traditional algorithmic attacks. However, their hardware implementations may be insecure against the analysis of its required time and consumed power during specific computations. This
Autor:
A. Jain, I. Sen Gupta
Publikováno v:
TENCON 2007 - 2007 IEEE Region 10 Conference.
Steganography is the science and art of hiding data into inconspicuous media. Various steganography schemes exist which can be utilized to hide data in digital images without bringing about any perceptible change in the image. Most of these schemes l
Publikováno v:
Ultra-Wideband Short-Pulse Electromagnetics 8 ISBN: 9780387730455
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::299ccc874cd46465ed25a85ff3d71cf0
https://doi.org/10.1007/978-0-387-73046-2_12
https://doi.org/10.1007/978-0-387-73046-2_12