Zobrazeno 1 - 10
of 13
pro vyhledávání: '"Surendra Singh Chauhan"'
Publikováno v:
Aqua, Vol 72, Iss 6, Pp 996-1024 (2023)
The present study aims to investigate the use of response surface methodology (RSM) modelling and experimental investigation for the optimization of lead(II) adsorption onto spent tea grains (STG). Independent process variables were optimized and fou
Externí odkaz:
https://doaj.org/article/36d8273d4ae64539982bd0c76c09feed
Publikováno v:
2023 6th International Conference on Information Systems and Computer Networks (ISCON).
Publikováno v:
2022 IEEE International Conference on Data Science and Information System (ICDSIS).
Publikováno v:
2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE).
Publikováno v:
International Journal of Engineering and Advanced Technology. 9:4235-4240
In this era of digital age a lot of secret and non-secret data is transmitted over the internet. Cryptography is one of the many techniques to secure data on network. It is one of the techniques that can be used to ensure information security and dat
Publikováno v:
Micro-Electronics and Telecommunication Engineering ISBN: 9789811687204
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::df9292ff9c36a3cf40bccb8c92e5d942
https://doi.org/10.1007/978-981-16-8721-1_64
https://doi.org/10.1007/978-981-16-8721-1_64
Autor:
Nitin Jain, Surendra Singh Chauhan
Publikováno v:
2021 International Conference on Technological Advancements and Innovations (ICTAI).
Publikováno v:
2021 International Conference on Intelligent Technologies (CONIT).
In this paper, we have proposed two models to classify dogs according to their breeds. Since the classification of dogs is becoming very difficult and moreover, these classifications are taken on the deep learning concept and training a fully defined
Publikováno v:
Communications in Computer and Information Science ISBN: 9783030848415
In the ongoing years with the headway of innovation, cloud computing has gotten colossal mainstream among organizations, aggressors just as people because of a few favorable circumstances however the fundamental advantages being versatility, flexibil
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4947a2020e0eee6df0a4a191769bee98
https://doi.org/10.1007/978-3-030-84842-2_2
https://doi.org/10.1007/978-3-030-84842-2_2
Publikováno v:
International Journal of Computer Applications. 104:13-19
In today’s digital world cryptography is used to secure information in order to provide the privacy for the intended sender and receiver by managing the message with the public key. The objective of this work is to securing the key of Playfair ciph