Search Results - (( based encryption path algorithm ) OR ( parallel visualisation using algorithm ))
Search alternatives:
- visualisation using »
- using algorithm »
- path algorithm »
-
1
A case study : 2D Vs 3D parallel differential equation toward tumor cell detection on multi-core parallel computing atmosphere
Published 2010“…In order to detect tumour cells, 2D and 3D Partial Differential Equations (PDE) are considered and compared by using Multi-Core parallel computing atmosphere with visualisation, communication and data analysis. …”
Get full text
Get full text
Get full text
Article -
2
Agro-ento bioinformation: towards the edge of reality
Published 2002“…The primers, which entrain processes, both natural and man-induced, include mechanisms such as protocols, algorithms, visualisations, and structural and visual designs. …”
Get full text
Get full text
Inaugural Lecture -
3
Online simulation to monitor multiphase flow using laser source as transmitter
Published 2021“…Linear Back-projection (LBP) is the algorithm that is used to reconstruct the image in real-time. …”
Get full text
Get full text
Get full text
Article -
4
Online Simulation To Monitor Multiphase Flow Using Laser Source As Transmitter
Published 2024journal::journal article -
5
Route optimization security in mobile IPv6 wireless networks: a test-bed experience
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
Get full text
Get full text
Conference or Workshop Item -
6
A 'snowflake' geometrical representation for optimised degree six 3-modified chordal ring networks
Published 2016“…The results of this research are important in developing a routing algorithm for CHR6o3.…”
Get full text
Get full text
Conference or Workshop Item -
7
Security enhancement of route optimization in mobile IPv6 networks
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
Get full text
Get full text
Get full text
Article -
8
Image orientation watermarking technique for copyright protection
Published 2016“…In return, a copyright gains its validity based on such robust characteristics. Watermarking attracts much interest in algorithm design to enable a signature to be embedded on secrecy and encryption beds. …”
Get full text
Get full text
Get full text
Thesis
