Does anyone have any reference to help for the comparison of DES, Triple DES, AES, blowfish encryption for data?
Yes, I have ... Go to google search and search about your question within it :)
Regards
Thank you Dr.Hiba for your answering.... I will try it
I modeled a simple crack in abaqus. I get J-integral as output as well as components of stress intensity factor KI, KII, KIII. However, I do not know how to get GI, GII and GIII. I searched in...
04 January 2021 1,783 2 View
I model and simulate the contact between two gear. I applied torque on one of the gears and I fix the other using fix displacement in Ansys. Automatic contact detects the contact between gears...
20 December 2019 869 3 View
Heat transfer principle
01 February 2019 4,672 1 View
experimental device for low velocities of gases
24 January 2019 2,137 1 View
free convection from inclined surfaces
31 December 2018 6,890 0 View
what is the biot number in heat transfer? and where it used ?
31 December 2018 4,717 0 View
heat transfer
31 December 2018 1,314 2 View
I am looking for a journal related to the foloowing title: WAT and VKS: Measures of depth but predictors of breadth of vocaulary
12 August 2018 5,492 1 View
Even the latest version of Abaqus ran with python 2.7 and it comes with numpy version 1.6. To be able to use latest version of scipy, I need to upgrade numpy. In addition, the package does not...
26 July 2018 3,348 3 View
I know that by using the UMATHT subroutine, one can write a heat transfer equation subroutine, but it is for transient analysis. Can I use same subroutine to get steady state solution or I must...
23 December 2017 193 3 View
Dear colleagues, I have found that many authors have a concern regarding their missing citation in RG because often citation in RG is lower than google scholars. I also missed some citation...
26 February 2021 928 6 View
26 February 2021 7,279 2 View
Hello, I would like to do homomorphic encryption using Microsoft SEAL on my dataset and then use it as an input to the Cloudsim simulator to do clustering on. Is it possible and compatible with...
16 February 2021 3,915 1 View
UACI - Unified Averaged Changed Intensity between cipher images. Why some papers refer ideal value to be 33.33 and some refer it to be 33.46? Which is the correct value? (In reference to image...
11 February 2021 9,562 2 View
The ideal theoretical value for UACI(Unified Average Changed Intensity) is 33.33% for testing the robustness of image encryption algorithm against differential attacks. Is it better to have a UACI...
30 January 2021 2,016 3 View
Is there a metric to find if one histogram of cipher image is better than other? I tried calculating the variance of the image but couldn't get the intended results. Are there ways to compare...
28 January 2021 479 3 View
This question in the relation to calculating the horizontal, vertical, and diagonal correlation of a cipher image in an encryption algorithm. I have read that the correlation values should be as...
13 January 2021 1,297 4 View
I am using 3D Arnold transform for my EC-ElGamal encryption technique but it consumes a lot of time during the execution of the program using Python. So I was wondering if there are BETTER ideas...
07 January 2021 205 2 View
I have developed a project based on Arduino that communicates through Bluetooth with Android application, I want to enhance its privacy through encryption so that data should be prevented up to...
07 January 2021 7,933 5 View
What is the main reason that most of the researcher uses ACM to encrypt the watermark? There is various other image encryption technique but for watermarking ACM technique is used?
24 December 2020 9,807 1 View