- Presentations
- Documents
- Infographics
Application of GIS in Mine Contamination and Associated Environmental Impacts
Arsalan Syed, PMP
•
7 years ago
Remote sensing
John Lanser
•
9 years ago
Remote sensing
Prabhat Paudel
•
5 years ago
Introduction to remote sensing and gis
Mohsin Siddique
•
9 years ago
Remote Sensing PPT
Amal Murali
•
10 years ago
Secure Hash Algorithm (SHA-512)
DUET
•
8 years ago
Computer Security Lecture 1: Overview
Mohamed Loey
•
7 years ago
Matrix Manipulation in Matlab
Mohamed Loey
•
8 years ago
Computer Security Lecture 3: Classical Encryption Techniques 2
Mohamed Loey
•
7 years ago
Computer Security Lecture 2: Classical Encryption Techniques 1
Mohamed Loey
•
7 years ago
Computer Security Lecture 4.1: DES Supplementary Material
Mohamed Loey
•
7 years ago
Computer Security Lecture 7: RSA
Mohamed Loey
•
7 years ago
Computer Security Lecture 5: Simplified Advanced Encryption Standard
Mohamed Loey
•
7 years ago
Message Authentication Code & HMAC
Krishna Gehlot
•
9 years ago
One time pad Encryption:
Asad Ali
•
9 years ago
Computer Security Lecture 4: Block Ciphers and the Data Encryption Standard
Mohamed Loey
•
7 years ago
Cryptography
Karwan Mustafa Kareem
•
9 years ago
Dynamic and Static Modeling
Saurabh Kumar
•
10 years ago
Syntax and semantics of propositional logic
Janet Stemwedel
•
13 years ago