Search

Results: 31
Reversible Data Hiding with Multiple Data for Multiple Users in an Encrypted Image
This article presents a new method which embeds multiple data from multiple users in an encrypted image. Here, the data from several users is embedded into an encrypted image. Initially, the image is encrypted by the owner...
Managing E-Patient Case Notes in Tertiary Hospitals
Telemedicine is the use of information and communication technologies to extend healthcare work to the vulnerable in the rural areas. It is unfortunate that telemedicine is yet to be deployed in sub Sahara Africa where there is...
A Trajectory Toward the Periphery
Scott M. Thomas
Jan 01, 0001
If one day Muslim Americans will be forced to register their identities, then that is the day this proud Jew will register as a Muslim. (Khomami and Sidahmed 2016Khomami, Nadia, and Mazin Sidahmed. 2016. “Jonathan Greenblatt...
A Trajectory Toward the Periphery
Scott M. Thomas
Jan 01, 0001
If one day Muslim Americans will be forced to register their identities, then that is the day this proud Jew will register as a Muslim. (Khomami and Sidahmed 2016Khomami, Nadia, and Mazin Sidahmed. 2016. “Jonathan Greenblatt...
Imaging Cu2O nanocube hollowing in solution by quantitative in situ X-ray ptychography.
Understanding morphological changes of nanoparticles in solution is essential to tailor the functionality of devices used in energy generation and storage. However, we lack experimental methods that can visualize these processes...
Imaging Cu2O nanocube hollowing in solution by quantitative in situ X-ray ptychography.
Understanding morphological changes of nanoparticles in solution is essential to tailor the functionality of devices used in energy generation and storage. However, we lack experimental methods that can visualize these processes...

|<

<

1

2

>

>|