Personal Information
Organización/Lugar de trabajo
Bangladesh Bangladesh
Ocupación
Ph.D Student at Tokyo Institute of Technology
Sector
Consumer Products
Etiquetas
programming with c
let us c
introduction to programming
introduction to c
introduction to computer
non comparison sort
way to effective qa
verbal and non-verbal presentation
presentation and communication skill development
how to present a poster
how to make a poster
how to give a successful presentation
how to make power point presentation
how to prepare presentation slides as professional
how to email a professor for letter of consent
how to communicate with a professor efficiently
how to handle qa
how to present a research
how to write a promising research proposal
road to higher study in japan
depth first search applications
application of dfs
bfs and dfs for traversing and searching in a grap
depth first search (dfs)
breadth first search (bfs)
islamic jurisprudence
mubah
sunnah
mustahab
makrooh and haram.
definition of fardh
wajeeb
introduction to medical imaging
basics of medical imaging
first chapter of digital image processing book by
fundamentals of digital image processing
image compression technique
lossy image compression algorithm
jpeg compression
digital image processing
islam
introduction to quran
surah fatiha
hash algorithms
do while loop
for loop
while loop
decision making and looping
switch
else if ladder
decision making and branching
goto statement
nested if else
else if
if
conditional operator
parameters of digital signature
how digital signature works
electronic signature
digital signature
verification of of digital signature
key generation of digital signature
mathematical base of digital signature
algorithm of digital signature
key computation of digital signature
confidentiality of digital signature
integrity of digital signature
standard of digital signature
authenticity of digital signature
mathematical base of caesar cipher
weakness of caesar cipher
example of caesar cipher
caesar cipher
effectiveness of rsa
rivest shamir adleman
prove of rsa
analyze rsa
rsa
how rsa works
attacks against rsa
cipher attack
security of cryptographic algorithm
fundamentals of cryptography
steam cipher
encryption
public key cryptography
transposition cipher
decryption
introduction to cryptography
plaintext
block cipher
secret key cryptography
ciphertext
how to programming in c
how to programming in c
how to programming in c
how to programming in c
components of a digital image processing system
advantages of digital image processing
analog image
digital image
introduction to digital image processing
fields of digital image processing
limitations of digital image processing
formation of digital image
image processing
x-ray imaging
ultrasound imaging
level of digital image processing
tem
sem
pet
differential engine
abacus
analytical engine
history of computing
evolution of computer
past present and future of computer
generations of computer
history of computer
how printers work
comparison between different types of printer
how to print using a printer
introduction to printers
qwerty keyboard
how keyboards works
introduction to input mouse
ergonomics. computer basics
introduction to input devices of computer system
introduction to input keyboard
dvorak keyboard
delete a value from bst
introduction to binary search tree
insert a value in bst
binary tree search algorithm
definition of binary tree
computer basics
computer fundamentals
bucket sor
algorithm
counting sort
digital logic system
Ver más
Presentaciones
(27)Recomendaciones
(1)Artefacts
namrathrs87
•
Hace 8 años
Personal Information
Organización/Lugar de trabajo
Bangladesh Bangladesh
Ocupación
Ph.D Student at Tokyo Institute of Technology
Sector
Consumer Products
Etiquetas
programming with c
let us c
introduction to programming
introduction to c
introduction to computer
non comparison sort
way to effective qa
verbal and non-verbal presentation
presentation and communication skill development
how to present a poster
how to make a poster
how to give a successful presentation
how to make power point presentation
how to prepare presentation slides as professional
how to email a professor for letter of consent
how to communicate with a professor efficiently
how to handle qa
how to present a research
how to write a promising research proposal
road to higher study in japan
depth first search applications
application of dfs
bfs and dfs for traversing and searching in a grap
depth first search (dfs)
breadth first search (bfs)
islamic jurisprudence
mubah
sunnah
mustahab
makrooh and haram.
definition of fardh
wajeeb
introduction to medical imaging
basics of medical imaging
first chapter of digital image processing book by
fundamentals of digital image processing
image compression technique
lossy image compression algorithm
jpeg compression
digital image processing
islam
introduction to quran
surah fatiha
hash algorithms
do while loop
for loop
while loop
decision making and looping
switch
else if ladder
decision making and branching
goto statement
nested if else
else if
if
conditional operator
parameters of digital signature
how digital signature works
electronic signature
digital signature
verification of of digital signature
key generation of digital signature
mathematical base of digital signature
algorithm of digital signature
key computation of digital signature
confidentiality of digital signature
integrity of digital signature
standard of digital signature
authenticity of digital signature
mathematical base of caesar cipher
weakness of caesar cipher
example of caesar cipher
caesar cipher
effectiveness of rsa
rivest shamir adleman
prove of rsa
analyze rsa
rsa
how rsa works
attacks against rsa
cipher attack
security of cryptographic algorithm
fundamentals of cryptography
steam cipher
encryption
public key cryptography
transposition cipher
decryption
introduction to cryptography
plaintext
block cipher
secret key cryptography
ciphertext
how to programming in c
how to programming in c
how to programming in c
how to programming in c
components of a digital image processing system
advantages of digital image processing
analog image
digital image
introduction to digital image processing
fields of digital image processing
limitations of digital image processing
formation of digital image
image processing
x-ray imaging
ultrasound imaging
level of digital image processing
tem
sem
pet
differential engine
abacus
analytical engine
history of computing
evolution of computer
past present and future of computer
generations of computer
history of computer
how printers work
comparison between different types of printer
how to print using a printer
introduction to printers
qwerty keyboard
how keyboards works
introduction to input mouse
ergonomics. computer basics
introduction to input devices of computer system
introduction to input keyboard
dvorak keyboard
delete a value from bst
introduction to binary search tree
insert a value in bst
binary tree search algorithm
definition of binary tree
computer basics
computer fundamentals
bucket sor
algorithm
counting sort
digital logic system
Ver más