Series-3 (Mar. – Apr. 2025)Mar. – Apr. 2025 Issue Statistics
- Citation
- Abstract
- Reference
- Full PDF
- Cover Paper
Abstract : Background: In this study, the thermal management of electronic devices, specifically CPUs, using carbon nanotubes (CNT) dispersed in polyethylene glycol (PEG-400) under the influence of a magnetic field was studied. The research aims to optimize cooling performance by enhancing efficiency, extending the operating temperature range, and improving the reliability of such systems.......
Keywords: Hartmann Number; Nusselt Number; Porosity; Heat Transfer; Viscosity; Density; Thermal Conductivity; Single-phase Nanofluid
[1].
Ahmadi, G., Toghraie, D., Sedighi, K., & Karimipour, A. (2018). A Review On Nanofluids: Preparation, Stability Mechanisms, Thermal Conductivity, And Applications. Journal Of Molecular Liquids, 266, 420-437. Doi:10.1016/J.Molliq.2018.06.106
[2].
Calmidi, V. V., & Mahajan, R. L. (2000). Forced Convection In High Porosity Metal Foams. J. Heat Transfer, 122(3), 557-565.
[3].
Dhinesh Kumar, R., & Suresh, S. (2021). Magnetic Field-Induced Thermal Convection Of Nanofluids In Geothermal Applications. Geofluids, 2021, 3209855.
[4].
Do, K. H., Kim, T. H., & Kim, S. J. (2010). Analytical And Experimental Investigations On Fluid Flow And Thermal Characteristics Of A Plate-Fin Heat Sink Subject To A Uniformly Impinging Jet. International Journal Of Heat And Mass Transfer, 53(9-10), 2318-2323.
[5].
Einstein, A. (1926). A New Determination Of Molecular Dimensions. Annalen Der Physik, 324(2), 289-306..
- Citation
- Abstract
- Reference
- Full PDF
Abstract : Cryptography, the science of encoding and decoding information, has a rich history that spans thousands of years, evolving from simple substitution ciphers to complex modern encryption algorithms. This paper explores the chronological development of cryptographic techniques, beginning with early systems used by ancient civilizations, such as the Egyptians and Greeks, and advancing through key milestones like the Caesar cipher and the Vigenère cipher. The role of cryptography during medieval and Renaissance periods is highlighted, with particular focus on......
Keywords: Cryptography, ancient ciphers, Caesar cipher, Vigenère cipher, World War
[1]
Adams, C., & Lloyd, S. (2003). Understanding Public-Key Infrastructure: Concepts, Standards, And Deployment Considerations (2nd Ed.). Addison-Wesley.
[2]
Al-Kindi. (9th Century). Risalah Fi Istikhraj Al-Mu'amma [Manuscript For The Deciphering Cryptographic Messages].
[3]
Antonopoulos, A. M., & Wood, G. (2018). Mastering Ethereum: Building Smart Contracts And Dapps. O'Reilly Media.
[4]
Babbage, D., & Mckenna, R. (2019). Quantum Computing And Its Implications For Modern Cryptography. Journal Of Cryptographic Engineering, 9(3), 45–62. Https://Doi.Org/10.1007/S13389-019-00231-0
[5]
Boneh, D., Franklin, M. K., & Venkatesan, R. (2001). Identity-Based Encryption From The Weil Pairing. SIAM Journal On Computing, 32(3), 586–615. Https://Doi.Org/10.1137/S0097539700384746