- Full text PDF available (2)
- This year (0)
- Last 5 years (2)
- Last 10 years (2)
Journals and Conferences
SHA-1 (Secure Hash Algorithm-1) is one of the most used iterative algorithm used to secure data by converting that to a highly secure message digest. In this process there is a very high probability for a different message digest in case of different data. No one can retrieve data again from message digest, in this way security of data is very high. SHA-1… (More)
The multiplication operation is an integral part of any digital system or digital computer, most notably in signal processing, graphics and scientific computation. It requires more hardware resources and processing time than addition and subtraction . In fact, 8.72% of all instructions in a typical processing unit is multiplier .The speed of the system… (More)
The problem of default or irregularity in taking the medicine is a great hinderance to the eradication of the disease. An attempt has been made here to judge this problem from various angles and to pin point the factors leading to default. A cohort of 253 patients have been comprehensively interviewed and the results have been analysed statistically.