Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Nitin Uniyal"'
Publikováno v:
International Journal of Mathematical, Engineering and Management Sciences, Vol 5, Iss 4, Pp 732-743 (2020)
Optimization has been a hot topic due to its inevitably in the development of new algorithms in almost every applied branch of Mathematics. Despite the broadness of optimization techniques in research fields, there is always an open scope of further
Externí odkaz:
https://doaj.org/article/dda5b01b4e5b4510b9540763e1d8f2b3
Autor:
NITIN UNIYAL
The heavy dependency of cryptography methods on mathematical theory and computational science necessitates the designing of a computationally secure cryptographic algorithm which is hard to break by an adversary. Matrix methods are intensively used i
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7408935303597834826368d2d617e8bb
https://doi.org/10.21203/rs.3.rs-1992239/v1
https://doi.org/10.21203/rs.3.rs-1992239/v1
Publikováno v:
2022 IEEE Delhi Section Conference (DELCON).
Publikováno v:
Wireless Personal Communications.
Nowadays, with the advancement of technologies in modern life communication and networks, the secrecy of a cryptographic technique has become a strong necessity. The Vernam’s cipher which is a specific form of Vigenere cipher is gaining attention o
A Note on Vorticity of Hydromagnetic Two-Phase Flow Through Two Parallel Plates in a Rotating System
Publikováno v:
Algorithms for Intelligent Systems ISBN: 9789813363069
In the present paper, an attempt has been made to find the vorticity of incompressible fluid in the hydromagnetic two-phase flow through two parallel plates in a rotating system. Variations in the vorticity are studied through vorticity profiles, and
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f192e6d1ed0c068fcd38f162af5687c9
https://doi.org/10.1007/978-981-33-6307-6_79
https://doi.org/10.1007/978-981-33-6307-6_79
Publikováno v:
Algorithms for Intelligent Systems ISBN: 9789813363069
Encryption–decryption method is the soul of cryptography, and their secrecy is not just the need of hour in modern era. In this paper, we improve the key domain maximization technique (Uniyal et al. in Int J Recent Technol Eng (IJRTE) 8(5):1385–1
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ef3f3010aa1c7aedbfd40cd72ca084ad
https://doi.org/10.1007/978-981-33-6307-6_70
https://doi.org/10.1007/978-981-33-6307-6_70
Autor:
Mukesh Kumar, Nitin Uniyal
Publikováno v:
IOSR Journal of Mathematics. 1:39-42
Roter (1964) and Matsumoto (1969) have studied on second order recurrent spaces and Kaehlerian spaces with parallel or vanishing Bochner curvature tensor. Singh (1972) have defined and studied Kaehlerian recurrent and Ricci- recurrent spaces of secon
Autor:
Nitin Uniyal, K S Rawat
Publikováno v:
Journal of the Tensor Society. 4:69-76
Tachibana (1967), Singh (1971) studied and defined the Bochner curvature tensor and Kaehlerian spaces with recurrent Bochner curvature tensor. Further , Negi and Rawat (1994), (1997) studied some bi-recurrence and bi-symmetric properties in a Kaehler