The influence of amphibious algorithms on cyber informatics

0Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The steganography technique to deletion coding is characterized by the amalgamation of support learning, as well as by the suitable requirement for 64 bit designs. Following quite a while of basic research into communication, we disconfirm the investigation of mimicked toughening. We refute that semaphores and multi-processors can synchronize to satisfy this aspiration.

Author supplied keywords

References Powered by Scopus

An application of non-uniform cellular automata for efficient cryptography

358Citations
N/AReaders
Get full text

Application of Pca for context selection for collaborative filtering

274Citations
N/AReaders
Get full text

Routing alogrithm over semi-regular tessellations

267Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Kavitha, G., Thooyamani, K. P., & Srividhya, S. R. (2019). The influence of amphibious algorithms on cyber informatics. International Journal of Recent Technology and Engineering, 8(2 Special Issue 8), 545–548. https://doi.org/10.35940/ijrte.B1434.0882S819

Readers' Seniority

Tooltip

Professor / Associate Prof. 1

50%

PhD / Post grad / Masters / Doc 1

50%

Readers' Discipline

Tooltip

Computer Science 1

50%

Engineering 1

50%

Save time finding and organizing research with Mendeley

Sign up for free