Showing 1 - 11 results of 11 for search 'Bakhtiari M', query time: 0.04s
Refine Results
-
1
JPEG mage encryption with Elliptic Curve Cryptography by Bakhtiari, S., Ibrahim, S., Salleh, M., Bakhtiari, M.
Published 2015Conference or Workshop Item -
2
Biometric encryption to enhance confidentiality in cloud computing by Omar, M. N., Salleh, M., Bakhtiari, M.
Published 2015
Conference or Workshop Item -
3
-
4
-
5
A comprehensive literature review of asymmetric key cryptography algorithms for establishment of the existing gap by Gaithuru, J. N., Bakhtiari, M., Salleh, M., Muteb, A. M.
Published 2016Conference or Workshop Item -
6
Applying graphics processor units to Monte Carlo dose calculation in radiation therapy by Bakhtiari M, Malhotra H, Jones M, Chaudhary V, Walters J, Nazareth D
Published 2010-01-01
Article -
7
-
8
-
9
-
10
Gas Jet Disruption Mitigation Studies on Alcator C-Mod and DIII-D by Hollmann, E.M., Whyte, D.G., Izzo, V.A., Antar, G.Y., Bader, A., Bakhtiari, M., Biewer, T., Boedo, J.A., Evans, T.E., Hutchinson, I.H., Jernigan, T.C., Gray, D.S., Groth, M., Humphreys, D.A., Lasnier, C.J., Moyer, R.A., Parks, P.B., Reinke, M.L., Rudakov, D.L., Strait, E.J., Terry, J.L., Wesley, J., West, W.P., Wurden, G., Yu, J.
Published 2015
-
11
Gas jet disruption mitigation studies on Alcator C-Mod and DIII-D by Hollmann, E. M., Whyte, D. G., Antar, G. Y., Bakhtiari, M., Boedo, J. A., Evans, T. E., Jernigan, T. C., Gray, D. S., Groth, M., Humphreys, D. A., Lasnier, C. J., Moyer, R. A., Parks, P. B, Rudakov, D. L., Strait, E. J., Wesley, J., West, W. P., Wurden, G., Yu, J., Granetz, Robert S., Izzo, Viviana A., Bader, Aaron Craig, Biewer, T., Hutchinson, Ian H., Reinke, Matthew Logan, Terry, James L, Hutchinson, Ian Horner
Published 2010
Get full text
Article