Debug Information
Array
(
[meilisearch] => Array
(
[url] => https://msin.fadunews.in/indexes/zipri/search
[http_code] => 200
[response] => {"hits":[],"query":"Aes-Encryption-Algorithm-Use-Case-Diagram","processingTimeMs":1,"limit":3,"offset":0,"estimatedTotalHits":0}
[curl_error] =>
[parsed] => Array
(
[hits] => Array
(
)
[query] => Aes-Encryption-Algorithm-Use-Case-Diagram
[processingTimeMs] => 1
[limit] => 3
[offset] => 0
[estimatedTotalHits] => 0
)
)
[image_search] => Array
(
[url] => http://206.189.178.169:3001/?freshness=All&show=1&q=Aes-Encryption-Algorithm-Use-Case-Diagram+INR+loc%3Ain
[http_code] => 200
[response] => {"name":"aes-encryption-algorithm-use-case-diagram inr loc:in","totalEstimatedMatches":100,"nextOffset":100,"currentOffset":0,"value":{"770C287851BC603CE42013B75F9F6A1E34D14FAE":{"name":"AES encryption for Radio remote Controls","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP._eUzBCMY1eyLCqesAT1dfgHaDv?pid=Api","datePublished":"2020-07-21T04:08:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.anandcontrol.in/dist/assets/img/radio/aes_encryption.jpg","hostPageUrl":"https://www.anandcontrol.in/blog/aes_encryption_radio_remote_controls.html","contentSize":"55128 B","width":1600,"height":809,"cDNContentUrl":"https://th.bing.com/th/id/R.fde533042318d5ec8b0aa7ac013d5d7e?rik=d8CChxXLBsNOAg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"EAF41D43E1A6F9F57B31024EC306CB158782C077","accentColor":"0A7EC1"},"05D8C6BE9FE064EDD8239DF74DA77CEED5DA84B0":{"name":"Top 8 Strongest Data Encryption Algorithms in Cryptography","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP._AmD9FmXegNtZ92-ASX9kAHaED?pid=Api","datePublished":"2020-01-21T10:32:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://acodez.in/wp-content/uploads/2020/01/Asymmetric-Encryption.png","hostPageUrl":"https://acodez.in/data-encryption-algorithms/","contentSize":"42146 B","width":796,"height":435,"cDNContentUrl":"https://th.bing.com/th/id/R.fc0983f459977a036d67ddbe0125fd90?rik=UI1s6%2fkORt6NMg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"0B48AD5DEEC77AD47FD9328DDE460EF9EB6C8D50","accentColor":"264D7F"},"26CB59EBD404814C1428A21DABA90D85A66D020C":{"name":"An Efficient Encryption Algorithm for the Security of Sensitive Private ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.xWSbLS1NxnBoazwx5g2N8gHaJo?pid=Api","datePublished":"2019-10-25T09:01:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://pub.mdpi-res.com/electronics/electronics-08-01220/article_deploy/html/images/electronics-08-01220-g001.png?1574878782","hostPageUrl":"https://www.mdpi.com/2079-9292/8/11/1220","contentSize":"101633 B","width":1983,"height":2578,"cDNContentUrl":"https://th.bing.com/th/id/R.c5649b2d2d4dc670686b3c31e60d8df2?rik=YryVvk1AGMRBgg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"C020D66A58D09ABAD12A8241C418404DBE95BC62","accentColor":"3B3B3B"},"047EBB7FBA9EA6C60460641D095B03C6751AED89":{"name":"AES Cryptography - Advance encryption algorithm - Asigmumemt en AES ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.P-KyVWEGcGZrbJZJw4ijzQHaKe?pid=Api","datePublished":"2024-11-24T16:29:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/07612162ef3bc4c330fc27b2331c5080/thumb_1200_1698.png","hostPageUrl":"https://www.studocu.com/in/document/rajiv-gandhi-proudyogiki-vishwavidyalaya/cryptography-and-network-security/aes-cryptography-advance-encryption-algorithm/111766582","contentSize":"971577 B","width":1200,"height":1698,"cDNContentUrl":"https://th.bing.com/th/id/R.3fe2b255610670666b6c9649c388a3cd?rik=QOe796vpamxABg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"98DEA1576C30B590D14606406C6AE9ABF7BBE740","accentColor":"966635"},"CFA13D2ED221C0E7020CE6AAFC88089894CA944A":{"name":"Hybrid Encryption Algorithm Based on AES&RC5 to Improve Data Security ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.fop_H2i4AW18jRzK672adAAAAA?pid=Api","datePublished":"2022-03-11T10:22:00.0000000Z","isFamilyFriendly":true,"contentUrl":"http://rukmini1.flixcart.com/image/300/300/kiqbma80-0/book/k/g/c/hybrid-encryption-algorithm-based-on-aes-rc5-to-improve-data-original-imafygd7exjuevy9.jpeg","hostPageUrl":"https://www.flipkart.com/hybrid-encryption-algorithm-based-aes-rc5-improve-data-security/p/itm3cb22f80c8f9b","contentSize":"15480 B","width":200,"height":300,"cDNContentUrl":"https://th.bing.com/th/id/R.7e8a7f1f68b8016d7c8d1ccaebbd9a74?rik=%2fBrT4i0SDH4gwA&riu=http%3a%2f%2frukmini1.flixcart.com%2fimage%2f300%2f300%2fkiqbma80-0%2fbook%2fk%2fg%2fc%2fhybrid-encryption-algorithm-based-on-aes-rc5-to-improve-data-original-imafygd7exjuevy9.jpeg&ehk=wkb3vzg8fULPRd8k6XRk6AEwcRPRFxplrsgAlxa%2fxtg%3d&risl=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"A449AC49898088CFAA6EC0207E0C122DE2D31AFC","accentColor":"AE1D20"},"612B1C184A635A53D4D19DF74DA77CEED5DA84B0":{"name":"Top 8 Strongest Data Encryption Algorithms in Cryptography","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.bX-gzxfQ0qaudrPs5zwymQHaEj?pid=Api","datePublished":"2020-01-21T10:32:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://acodez.in/wp-content/uploads/2020/01/how-encryption-works-symmetric-encryption.png","hostPageUrl":"https://acodez.in/data-encryption-algorithms/","contentSize":"67377 B","width":664,"height":408,"cDNContentUrl":"https://th.bing.com/th/id/R.6d7fa0cf17d0d2a6ae76b3ece73c3299?rik=FrLBgaQ2pTVNHQ&pid=ImgRaw&r=0","isTransparent":true,"imageId":"0B48AD5DEEC77AD47FD91D4D35A536A481C1B216","accentColor":"BE550D"},"E73F088A22FD8B31A4862F7823FF9B872113CBD1":{"name":"Advanced Encryption Standard & AES Rijndael Explained | Splunk","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.w9PImoGnkGOT70CWZbDf_AHaEI?pid=Api","datePublished":"2023-02-15T00:00:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.splunk.com/content/dam/splunk-blogs/images/en_us/2025/05/llms-best-to-use0.jpg","hostPageUrl":"https://www.splunk.com/en_us/blog/learn/aes-advanced-encryption-standard.html","contentSize":"109635 B","width":2020,"height":1126,"cDNContentUrl":"https://th.bing.com/th/id/R.c3d3c89a81a7906393ef409665b0dffc?rik=fvOAqCLfuBNKaA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"1DBC311278B9FF3287F2684A13B8DF22A880F37E","accentColor":"197AB2"},"810EFBE112F579F589A2DC2126D50A6D9224A0EC":{"name":"Data Encryption: Securing Data at Rest and in Transit with Encryption ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.-Dx7CNjZQ3052RRP-C9dmQHaED?pid=Api","datePublished":"2023-08-19T07:28:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://dev-to-uploads.s3.amazonaws.com/uploads/articles/nrrd7d2ev32lp1e4e59j.png","hostPageUrl":"https://j471n.in/blogs/data-encryption-securing-data-at-rest-and-in-transit-with-encryption-technologies","contentSize":"227905 B","width":2000,"height":1094,"cDNContentUrl":"https://th.bing.com/th/id/R.f83c7b08d8d9437d39d9144ff82f5d99?rik=GOC%2fHiFfl1%2bYKg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"CE0A4229D6A05D6212CD2A985F975F211EBFE018","accentColor":"B88713"},"BE02A6B023FBBFAFBEF8B81A51422126BCB53E37":{"name":"Types et méthodes de chiffrement des données : une introduction | Splunk","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.SdvR47ktRyvY0JgWjX1xbwHaFK?pid=Api","datePublished":"2025-05-10T03:52:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.splunk.com/content/dam/splunk-blogs/images/en_us/2023/02/triple-des2.png","hostPageUrl":"https://www.splunk.com/fr_fr/blog/learn/data-encryption-methods-types.html","contentSize":"17218 B","width":602,"height":420,"cDNContentUrl":"https://th.bing.com/th/id/R.49dbd1e3b92d472bd8d098168d7d716f?rik=6yBqCzK%2f%2b%2frrjw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"73E35BCB62122415A18B8FEBFAFBBF320B6A20EB","accentColor":"666666"},"3AD52E66940F8412D21CA1B85F89DF13F6E978EC":{"name":"What is Digital Signature, Type of Digital Signature, Difference in ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.kDKMHPh7Ouy_jOkeFU_xHQHaEj?pid=Api","datePublished":"2021-08-09T14:53:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://static.wixstatic.com/media/4c0a1d_bef86910b52f41c68c5d8f608f7602d2~mv2.jpg/v1/fill/w_617,h_380,al_c/4c0a1d_bef86910b52f41c68c5d8f608f7602d2~mv2.jpg","hostPageUrl":"https://www.digital-signatures.in/about-digital-signature-what-is-digital-signature","contentSize":"33670 B","width":617,"height":380,"cDNContentUrl":"https://th.bing.com/th/id/R.90328c1cf87b3aecbf8ce91e154ff11d?rik=o13iZknwSCEtwQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"CE879E6F31FD98F58B1AC12D2148F04966E25DA3","accentColor":"B32A18"},"B9D52E53F850D67FB17372BA185F69279DC7F719":{"name":"Common REST API Authentication Methods","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.3hFdTNihL0fcuBsagMayZAHaEa?pid=Api","datePublished":"2025-02-20T13:37:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.swimlane.com/assets/uploads/images/OAuth2-Authentication-Diagram-2.png","hostPageUrl":"https://www.1985.co.in/blog/securing-your-integration-layer/","contentSize":"35022 B","width":2087,"height":1245,"cDNContentUrl":"https://th.bing.com/th/id/R.de115d4cd8a12f47dcb81b1a80c6b264?rik=m13iNY8FbfcbNw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"917F7CD97296F581AB27371BF76D058F35E25D9B","accentColor":"1D2885"},"5E04A1ED8D97D45DDF66B8373115F1D2451FB9C5":{"name":"Use Case Diagram Relationships Explained with Examples - In fact many ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.wBdBqojpPNsiyOCoAZFgAgHaJl?pid=Api","datePublished":"2022-11-17T10:00:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/2953b320e1c8d89d597609b07b6b2ee1/thumb_1200_1553.png","hostPageUrl":"https://www.studocu.com/in/document/apj-abdul-kalam-technological-university/software-architecture-and-design-patterns/use-case-diagram-relationships-explained-with-examples/29401891","contentSize":"282837 B","width":1200,"height":1553,"cDNContentUrl":"https://th.bing.com/th/id/R.c01741aa88e93cdb22c8e0a801916002?rik=5UAa3th5TdX9Zg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"5C9BF1542D1F5113738B66FDD54D79D8DE1A40E5","accentColor":"0000CC"},"1A48ABE7662B68D76F64DC2126D50A6D9224A0EC":{"name":"Data Encryption: Securing Data at Rest and in Transit with Encryption ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.ZfOWBYEpLqfoVV0RfH3R0AHaDa?pid=Api","datePublished":"2023-08-19T07:28:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://dev-to-uploads.s3.amazonaws.com/uploads/articles/lreszt6pqw335q18fe4d.png","hostPageUrl":"https://j471n.in/blogs/data-encryption-securing-data-at-rest-and-in-transit-with-encryption-technologies","contentSize":"175940 B","width":2000,"height":921,"cDNContentUrl":"https://th.bing.com/th/id/R.65f3960581292ea7e8555d117c7dd1d0?rik=oYS6fmayhn32Rg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"CE0A4229D6A05D6212CD46F67D86B2667EBA84A1","accentColor":"736658"},"CCDECF4A3FCE797D0FB402688DB95A3604E262DE":{"name":"Securing Converged Wired/Wireless LAN Designs: Part 1 - EE Times","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.y1LH09oYHyV7H0d9QRfZewAAAA?pid=Api","datePublished":"2020-09-14T07:33:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.eetimes.com/wp-content/uploads/media-1055554-sinettpt1-fig3.jpg","hostPageUrl":"https://www.eetimes.com/securing-converged-wired-wireless-lan-designs-part-1-2/","contentSize":"18408 B","width":450,"height":238,"cDNContentUrl":"https://th.bing.com/th/id/R.cb52c7d3da181f257b1f477d4117d97b?rik=zO38pPPsl9fwSw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"ED262E4063A59BD886204BF0D797ECF3A4FCEDCC","accentColor":"B9B912"},"11955870EB773FC34073825E0457AC58B0B4041C":{"name":"Cyber Swachhta Kendra: WastedLocker Ransomware","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.CLJ5Bu9V9u2F1uqQCqEoDAHaMv?pid=Api","datePublished":"2020-07-17T07:14:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.csk.gov.in/image/other/wlr01.jpg","hostPageUrl":"https://www.csk.gov.in/alerts/WastedLockerRansomware.html","contentSize":"515221 B","width":1076,"height":1851,"cDNContentUrl":"https://th.bing.com/th/id/R.08b27906ef55f6ed85d6ea900aa1280c?rik=EVmFB7538zwENw&pid=ImgRaw&r=0","isTransparent":true,"imageId":"C1404B0B85CA7540E52837043CF377BE07855911","accentColor":"0196C6"},"111E7EAF4A9601F1B6B36A223FE35AC60ECA90F1":{"name":"AES Algorithm : Explanation with Animation ~ I. T. Engg Portal","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.bZXg9URVkDUAG3ulU1AxiQAAAA?pid=Api","datePublished":"2011-10-05T20:42:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://lh3.googleusercontent.com/proxy/H5ddS1w7A-qNE0N_OV7rhIqTsCARe06l56sbNP6cf39AP-qtKzFkN6sgAwMgS08K1CHwnr99NuxJKtGVScSBAR8dX8WlRoJKeyaKAm-toEcjqZSXMCMiQS38Xyu0z3wH=w1200-h630-p-k-no-nu","hostPageUrl":"http://www.itportal.in/2011/10/aes-algorithm.html","contentSize":"9318 B","width":297,"height":268,"cDNContentUrl":"https://th.bing.com/th/id/R.6d95e0f544559035001b7ba553503189?rik=EeHn%2bqRpEB9rOw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"1F09ACE06CA53EF322A63B6B1F1069A4FAE7E111","accentColor":"C70504"},"26EF1265F546D061A0B59379BADBF807B751631D":{"name":"Visakha Institue of Engg & Technology","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.54Zjju7EC7yiy7hb9Zn_6AHaFj?pid=Api","datePublished":"2023-06-10T13:37:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.viet.edu.in/img/courses-tab/ug/CSE/projects/batch-7-project.jpg","hostPageUrl":"https://www.viet.edu.in/CSE.php","contentSize":"64885 B","width":602,"height":451,"cDNContentUrl":"https://th.bing.com/th/id/R.e786638eeec40bbca2cbb85bf599ffe8?rik=Yv4hVl9kDRYKWw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"D136157B708FBDAB97395B0A160D645F5621FE62","accentColor":"507B75"},"130D906B90D3E05ADD96B81A51422126BCB53E37":{"name":"Types et méthodes de chiffrement des données : une introduction | Splunk","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.EyhgPyqMc1Ni01B3ta6TZAHaGx?pid=Api","datePublished":"2025-05-10T03:52:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.splunk.com/content/dam/splunk-blogs/images/en_us/2023/02/key-mgmt1.png","hostPageUrl":"https://www.splunk.com/fr_fr/blog/learn/data-encryption-methods-types.html","contentSize":"20249 B","width":500,"height":457,"cDNContentUrl":"https://th.bing.com/th/id/R.1328603f2a8c735362d35077b5ae9364?rik=MdAJtgk9DqXdaQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"73E35BCB62122415A18B69DDA50E3D09B609D031","accentColor":"C60579"},"86D61A425183E7F44C7EE45F50830A9AA712398C":{"name":"SSH Tutorial: What is SSH, Encryptions and Ports","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.RNTZNhz5kNlQVMZKxyU57wHaEm?pid=Api","datePublished":"2017-07-04T04:09:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.hostinger.in/tutorials/wp-content/uploads/sites/2/2017/07/asymmetric-encryption.jpg","hostPageUrl":"https://www.hostinger.in/tutorials/ssh-tutorial-how-does-ssh-work","contentSize":"39122 B","width":900,"height":560,"cDNContentUrl":"https://th.bing.com/th/id/R.44d4d9361cf990d95054c64ac72539ef?rik=aG2hJBU4fk%2fE5w&pid=ImgRaw&r=0","isTransparent":false,"imageId":"C893217AA9A03805F54EE7C44F7E381524A16D68","accentColor":"AB2030"},"41AA3A99D082BE34A614333C572F62B9D9304458":{"name":"Research Paper on Breast Cancer Prediction Using Machine Learning","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.1XibqcLAkuR53Xgwp44-dAAAAA?pid=Api","datePublished":"2022-07-31T18:43:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.ijraset.com/images/text_version_uploads/imag%201_14432.png","hostPageUrl":"https://www.ijraset.com/research-paper/paper-on-breast-cancer-prediction-using-machine-learning","contentSize":"48089 B","width":466,"height":368,"cDNContentUrl":"https://th.bing.com/th/id/R.d5789ba9c2c092e479dd7830a78e3e74?rik=FKqjmQ0o60NqQQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"8544039D9B26F275C333416A43EB280D99A3AA14","accentColor":"141414"},"A170F9B8A8306B6BA3A0506D9487F501194D8734":{"name":"Use Case Diagram for CRM System for You","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.DntZK6Cr1KOP0znpTT3CtQHaEQ?pid=Api","datePublished":"2024-11-14T03:06:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://images.wondershare.com/edrawmax/templates/use-case-diagram-for-book-publishing.png","hostPageUrl":"https://edrawmax.wondershare.com/templates/use-case-diagram-for-crm-system.html","contentSize":"105534 B","width":1516,"height":872,"cDNContentUrl":"https://th.bing.com/th/id/R.0e7b592ba0abd4a38fd339e94d3dc2b5?rik=Ggefi4oDtrY6Cg&pid=ImgRaw&r=0","isTransparent":true,"imageId":"4378D491105F7849D6050A3AB6B6038A8B9F071A","accentColor":"C80304"},"405E24CEE123C30658F3F0130565146600D8B435":{"name":"Data Encryption Standard","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.hCaVEZYCVOaeYxlsIfP6JwHaIv?pid=Api","datePublished":"2022-12-25T14:49:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://manansingh.github.io/Cryptolab-Offline/images/c/des-1.GIF","hostPageUrl":"https://pclub.in/cryptography/2019/04/15/des/","contentSize":"9201 B","width":663,"height":783,"cDNContentUrl":"https://th.bing.com/th/id/R.84269511960254e69e63196c21f3fa27?rik=BOVC7B4yPGCFPw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"534B8D0066415650310F3F85603C321EEC42E504","accentColor":"1B1B1B"},"D724DD22975161596BEC5519D7E6AFFB418F68FE":{"name":"Backpropagation","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.GOmyJGzqoxcPYnEpXoU_kAHaD2?pid=Api","datePublished":"2021-07-28T14:32:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.guru99.com/images/1/030819_0937_BackPropaga1.png","hostPageUrl":"https://www.niser.ac.in/~smishra/teach/cs460/2020/lectures/lec19_1/","contentSize":"127040 B","width":883,"height":460,"cDNContentUrl":"https://th.bing.com/th/id/R.18e9b2246ceaa3170f6271295e853f90?rik=fULdInkVFpW2zg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"EF86F814BFFA6E7D9155CEB69516157922DD427D","accentColor":"40CC00"},"0E8096DB9B1A1D7E8B18F802D02F739049A20F1A":{"name":"Pixrron - Food and Drinks","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.F4bAnNtUPWfxVxsC_I60fAHaDv?pid=Api","datePublished":"2020-06-05T13:35:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://1.bp.blogspot.com/-OAKVPFtMGWU/Xp56zWF5MRI/AAAAAAAADNU/RGyR5jBOVD4GryZat1T77_-6InPftvb6wCLcBGAsYHQ/s1600/IMPORTANCE%2BOF%2BDATA%2BENCRYPTION.png","hostPageUrl":"https://www.pixrron.in/2020/03/what-is-data-encryption-encryption.html","contentSize":"149838 B","width":1600,"height":809,"cDNContentUrl":"https://th.bing.com/th/id/R.1786c09cdb543d67f1571b02fc8eb47c?rik=4Ahpvbmh0ee4gQ&pid=ImgRaw&r=0","isTransparent":true,"imageId":"A1F02A940937F20D208F81B8E7D1A1B9BD6908E0","accentColor":"019E86"},"DA3F7494940AF2D2D2EA4912ECF6A9DD7BED5339":{"name":"What Is TLS (Transport Layer Security) And How It Works","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.NU19tt9whB9pGm2Ng24VPwHaFU?pid=Api","datePublished":"2022-09-09T14:11:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.hostinger.in/tutorials/wp-content/uploads/sites/2/2022/09/image1.png","hostPageUrl":"https://www.hostinger.in/tutorials/what-is-tls","contentSize":"38787 B","width":1601,"height":1149,"cDNContentUrl":"https://th.bing.com/th/id/R.354d7db6df70841f691a6d8d836e153f?rik=rfNHSUmgLy0trg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"9335DEB7DD9A6FCE2194AE2D2D2FA0494947F3AD","accentColor":"0434C7"},"8173CF482C9D21788F70333C572F62B9D9304458":{"name":"Research Paper on Breast Cancer Prediction Using Machine Learning","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.wM4O4HOX1-LphgaaICI_4wAAAA?pid=Api","datePublished":"2022-07-31T18:43:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.ijraset.com/images/text_version_uploads/imag%201_14434.png","hostPageUrl":"https://www.ijraset.com/research-paper/paper-on-breast-cancer-prediction-using-machine-learning","contentSize":"24040 B","width":324,"height":286,"cDNContentUrl":"https://th.bing.com/th/id/R.c0ce0ee07397d7e2e986069a20223fe3?rik=GDf8hMLZEof4Bw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"8544039D9B26F275C33307F88712D9C284FC3718","accentColor":"0C0C0C"},"9F0A13C9D0F50F4A1035FB8A9A3A02E70C9E028D":{"name":"Зачем нужны криптовалютные кошельки? — Teletype","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.5UFYfuDZHwjd2gHavEtORwHaD9?pid=Api","datePublished":"2023-04-07T15:48:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://cheapsslsecurity.com/p/wp-content/uploads/2019/08/private-key-encryption.png","hostPageUrl":"https://teletype.in/@cryptoscamm/wallet_basic","contentSize":"22502 B","width":624,"height":334,"cDNContentUrl":"https://th.bing.com/th/id/R.e541587ee0d91f08ddda01dabc4b4e47?rik=%2baAxnA1f8KQBUw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"D820E9C07E20A3A9A8BF5301A4F05F0D9C31A0F9","accentColor":"BB3810"},"5E73285DE8EF4D36D285506D9487F501194D8734":{"name":"Use Case Diagram for CRM System for You","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.B77VvwuhT7ddHQIob8L74gHaEQ?pid=Api","datePublished":"2024-11-14T03:06:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://images.wondershare.com/edrawmax/templates/use-case-diagram-for-online-ticketing-system.png","hostPageUrl":"https://edrawmax.wondershare.com/templates/use-case-diagram-for-crm-system.html","contentSize":"99966 B","width":1516,"height":872,"cDNContentUrl":"https://th.bing.com/th/id/R.07bed5bf0ba14fb75d1d02286fc2fbe2?rik=5TeC1Y7%2b1GMtWA&pid=ImgRaw&r=0","isTransparent":true,"imageId":"4378D491105F7849D605582D63D4FE8ED58237E5","accentColor":"C0110B"},"AFD20DFD2A72F706626451492A360EBA79419C1E":{"name":"Final-Case tools-Print Out - 1. PASSPORT AUTOMATION SYSTEM USE CASE ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.77RqFMx4MHJ1OAE9gEQG7AHaJl?pid=Api","datePublished":"2022-09-17T09:16:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/ad19c27282b08bc6ae8109a714e7f2a3/thumb_1200_1553.png","hostPageUrl":"https://www.studocu.com/in/document/panimalar-institute-of-technology/networks/final-case-tools-print-out/31947512","contentSize":"168424 B","width":1200,"height":1553,"cDNContentUrl":"https://th.bing.com/th/id/R.efb46a14cc7830727538013d804406ec?rik=%2bi3Q36Inf2AmRg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E1C91497ABE063A294154626607F27A2DFD02DFA","accentColor":"1499B7"},"BC8324DFBB5F7F1E93941C29977C19452F713612":{"name":"What Are the Different Types of Encryption?","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.9XQnV2TjTtwg9SfCynOAdQHaDt?pid=Api","datePublished":"2021-01-11T11:44:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://in-media.apjonlinecdn.com/wysiwyg/blog/cybersecurity.jpg","hostPageUrl":"https://www.hp.com/in-en/shop/tech-takes/post/what-are-the-different-types-of-encryption","contentSize":"49433 B","width":1000,"height":500,"cDNContentUrl":"https://th.bing.com/th/id/R.f574275764e34edc20f527c2ca738075?rik=yzhC%2fbv19%2bE5SQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"216317F25491C77992C14939E1F7F5BBFD4238CB","accentColor":"9A8231"},"C5FC3543D3C5AF5AD1CF750FF4F54EB1FA5A7769":{"name":"What is Elliptic Curve Cryptography (ECC) Discuss ECC algorithm with ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.y0ENmn-Bw1byCD0t1brCWAHaJl?pid=Api","datePublished":"2023-03-02T02:38:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/fab92a17457959c344d7273f210a4b31/thumb_1200_1553.png","hostPageUrl":"https://www.studocu.com/in/document/jain-deemed-to-be-university/information-security/what-is-elliptic-curve-cryptography-ecc-discuss-ecc-algorithm-with-neat-diagram/48980482","contentSize":"175643 B","width":1200,"height":1553,"cDNContentUrl":"https://th.bing.com/th/id/R.cb410d9a7f81c356f2083d2dd5bac258?rik=XM9TND1c%2bqUd%2fA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"9677A5AF1BE45F4FF057FC1DA5FA5C3D3453CF5C","accentColor":"C93102"},"BFF6451AE61CE0DD7964F456DBA541D3B9F2EF6E":{"name":"eLearning - Use Case Diagram - Admin | Download Project Diagram","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.sNuL9TMmDwZSH3vOnqhM1wHaIA?pid=Api","datePublished":"2023-10-11T02:10:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://programmer2programmer.net/tips/project_diagram/diagram-images/eLearning%20System/eLearning%20-%20Use%20Case%20Diagram%20-%20%20Admin.jpg","hostPageUrl":"https://programmer2programmer.net/tips/project_diagram/downlaod_diagram.aspx?category=Class%20Diagram&diagram=eLearning%20-%20Use%20Case%20Diagram%20-%20%20Admin&diaid=13","contentSize":"130872 B","width":570,"height":616,"cDNContentUrl":"https://th.bing.com/th/id/R.b0db8bf533260f06521f7bce9ea84cd7?rik=%2b29UoW7BDt2XRg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E6FE2F9B3D145ABD654F4697DD0EC16EA1546FFB","accentColor":"05C6C3"},"D5952D3E51F6CA6E8D5F9AE50AA80A840F879A0F":{"name":"Software Requirements : Use Case Diagram","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.hCvzRmhn_oTEtyaOikCwfQHaF7?pid=Api","datePublished":"2018-06-28T18:17:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://minigranth.in/software-engineering-tutorial/images/tutorials/SOFTENGI%20IMAGES/Attendance%20System%20USe%20case%20diagram.jpeg","hostPageUrl":"https://minigranth.in/software-engineering-tutorial/software-requirements-sdlc","contentSize":"34919 B","width":605,"height":485,"cDNContentUrl":"https://th.bing.com/th/id/R.842bf3466867fe84c4b7268e8a40b07d?rik=XVnS4xVvrObY9Q&pid=ImgRaw&r=0","isTransparent":false,"imageId":"F0A978F048A08AA05EA9F5D8E6AC6F15E3D2595D","accentColor":"1CAF1E"},"3FFDCDC1A49FF75D1D27FCCB77E7CA7CD38860F2":{"name":"Computer Science Project Diagram","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.0xk3pv08I-fjbpeItI2eDwHaHG?pid=Api","datePublished":"2023-04-10T13:45:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://programmer2programmer.net/tips/project_diagram/diagram-images/Hotel%20Management%20System/Hotel%20Management%20System%20-%20Use%20Case%20-%20User%20Login.jpg","hostPageUrl":"https://programmer2programmer.net/tips/project_diagram/downlaod_diagram.aspx?category=use%20case%20diagram&diagram=Hotel%20Management%20System%20-%20Use%20Case%20-%20User%20Login&diaid=28","contentSize":"82774 B","width":641,"height":615,"cDNContentUrl":"https://th.bing.com/th/id/R.d31937a6fd3c23e7e36e9788b48d9e0f?rik=89%2fcHEr5f9XRcg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"2F06883DC7AC7E77BCCF72D1D57FF94A1CDCDFF3","accentColor":"0912C2"},"FC3FEF171A3299E72377692E4AAF97A0AE84200A":{"name":"Caesar cipher encryption and decryption python code solution ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.4o4w7zhNJ3HfblQCT9LuIQHaEK?pid=Api","datePublished":"2023-02-04T08:04:00.0000000Z","isFamilyFriendly":true,"contentUrl":"http://www.innovativecodesacademy.in/wp-content/uploads/2022/01/Caesar-cipher-encryption-1024x576.png","hostPageUrl":"http://www.innovativecodesacademy.in/caesar-cipher-encryption-and-decryption-python-code-solution/","contentSize":"70464 B","width":1024,"height":576,"cDNContentUrl":"https://th.bing.com/th/id/R.e28e30ef384d2771df6e54024fd2ee21?rik=z%2fP%2bcaEjmX4ydw&riu=http%3a%2f%2fwww.innovativecodesacademy.in%2fwp-content%2fuploads%2f2022%2f01%2fCaesar-cipher-encryption-1024x576.png&ehk=NdNRveBX2ivyEgHcJ%2bNfy7jYR5Pdpiz3tXGMi3dnp8M%3d&risl=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"A00248EA0A79FAA4E29677327E9923A171FEF3CF","accentColor":"B85813"},"1823766BCF419191942892EDE5498212525DD206":{"name":"eCommerce - Use Case Diagram - User | Download Project Diagram","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.P-74pjbJq09h5JM--N1QiAHaG2?pid=Api","datePublished":"2023-10-11T02:10:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://programmer2programmer.net/tips/project_diagram/diagram-images/eCommerce/eCommerce%20-%20Use%20Case%20Diagram%20-%20User.jpg","hostPageUrl":"https://programmer2programmer.net/tips/project_diagram/downlaod_diagram.aspx?category=Class%20Diagram&diagram=eCommerce%20-%20Use%20Case%20Diagram%20-%20User&diaid=114","contentSize":"82181 B","width":766,"height":708,"cDNContentUrl":"https://th.bing.com/th/id/R.3feef8a636c9ab4f61e4933ef8dd5088?rik=gTJntvwUGRlJgg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"602DD5252128945EDE298249191914FCB6673281","accentColor":"3B6190"},"4B46EFC1ED9DA7681D570E9C12D58AA5E7578367":{"name":"Flowchart Algorithm","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.kkNTfl5RfVg4wHwLLSORCwAAAA?pid=Api","datePublished":"2020-12-12T16:46:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://vedveethi.co.in/PrincipleOfCLang/Algorithm%20and%20Flowchart_files/image003.jpg","hostPageUrl":"https://vedveethi.co.in/PrincipleOfCLang/Algorithm%20and%20Flowchart.htm","contentSize":"16053 B","width":436,"height":633,"cDNContentUrl":"https://th.bing.com/th/id/R.9243537e5e517d5838c07c0b2d23910b?rik=tGT%2bHN7ZeobRdQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"7638757E5AA85D21C9E075D1867AD9DE1CFE64B4","accentColor":"5F4E44"},"FA74425EFA21C25C5DE266C391B3DCAAE893DCED":{"name":"Algorithms and Flow Chart - C Tutorial | Study Glance","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.AOCZasfTja6hADYPsVuBMAHaIU?pid=Api","datePublished":"2021-12-03T09:52:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.studyglance.in/c/images/flowchart-symbols.webp","hostPageUrl":"https://studyglance.in/c/display.php?tno=5&topic=Algorithms-and-Flow-Chart","contentSize":"157858 B","width":1950,"height":2192,"cDNContentUrl":"https://th.bing.com/th/id/R.00e0996ac7d38daea100360fb15b8130?rik=r0ck5a8SLMXVLg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"DECD398EAACD3B193C662ED5C52C12AFE52447AF","accentColor":"656665"},"13D31001C6FF0EC6C9D2637D48726279F973C50A":{"name":"Apricorn Aegis Secure Key 3 NX 8GB 256-bit Encrypted FIPS 140-2 Level 3 ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.S9VALb-2mbY03IzzLzYRJQHaHg?pid=Api","datePublished":"2020-10-08T18:23:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/719pd2ToGxL._AC_.jpg","hostPageUrl":"https://www.amazon.in/Apricorn-Secure-256-bit-Encrypted-Validated/dp/B07GKZWB6N","contentSize":"118144 B","width":1857,"height":1884,"cDNContentUrl":"https://th.bing.com/th/id/R.4bd5402dbfb699b634dc8cf32f361125?rik=MT0BEGz%2f4GycLQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"A05C379F97262784D7362D9C6CE0FF6C10013D31","accentColor":"973436"},"7CDA55A52AC243CD2EAB333C572F62B9D9304458":{"name":"Research Paper on Breast Cancer Prediction Using Machine Learning","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.EZYEY5KouD3tI0HkeGSFkgAAAA?pid=Api","datePublished":"2022-07-31T18:43:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.ijraset.com/images/text_version_uploads/imag%201_14436.png","hostPageUrl":"https://www.ijraset.com/research-paper/paper-on-breast-cancer-prediction-using-machine-learning","contentSize":"29486 B","width":260,"height":249,"cDNContentUrl":"https://th.bing.com/th/id/R.1196046392a8b83ded2341e478648592?rik=x61VWqIsNNziug&pid=ImgRaw&r=0","isTransparent":false,"imageId":"8544039D9B26F275C333BAE2DC342CA25A55ADC7","accentColor":"666666"},"6F182571AC981967997126864711C1594F362B14":{"name":"A New Mixture Differential Cryptanalysis on Round-Reduced AES","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.75hVTXi2LuIMh4Uu6DdhnAHaFi?pid=Api","datePublished":"2022-12-13T13:06:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://pub.mdpi-res.com/mathematics/mathematics-10-04736/article_deploy/html/images/mathematics-10-04736-g003.png?1670936539","hostPageUrl":"https://www.mdpi.com/2227-7390/10/24/4736","contentSize":"31902 B","width":2651,"height":1983,"cDNContentUrl":"https://th.bing.com/th/id/R.ef98554d78b62ee20c87852ee837619c?rik=9oFSF8qJkXaZFw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"41B263F4951C117468621799769189CA175281F6","accentColor":"CCC300"},"B017C5B055DC2AD5758D6B1D48D417886F5DDC23":{"name":"Construct a E-R Diagram for a Hospital with a set of patients and a set ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.oun79yX7wzo9FNNjKQEGdgHaHX?pid=Api","datePublished":"2021-10-19T12:04:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://hi-static.z-dn.net/files/d94/d4f9a0ee4d11141823929f025c8e0682.jpg","hostPageUrl":"https://brainly.in/question/48038083","contentSize":"49151 B","width":720,"height":716,"cDNContentUrl":"https://th.bing.com/th/id/R.a2e9fbf725fbc33a3d14d36329010676?rik=C3FcC1XNol1X2A&pid=ImgRaw&r=0","isTransparent":false,"imageId":"32CDD5F688714D84D1B6D8575DA2CD550B5C710B","accentColor":"5C6F5C"},"FBBD8B8BD1CDE6121D8C9E3747C38C6C3988B0BE":{"name":"The Importance of Data Encryption on Public Cloud Platforms - Utimaco","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.k6eLRqDbqfGgKZz3D7N2XAAAAA?pid=Api","datePublished":"2023-09-08T15:11:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://utimaco.com/sites/default/files/2023-03/use-case-security-for-cloud-stored-data-for-cloud-cloud-service-providers-teaser.jpg","hostPageUrl":"https://utimaco.com/news/blog-posts/importance-data-encryption-public-cloud-platforms","contentSize":"109934 B","width":474,"height":266,"cDNContentUrl":"https://th.bing.com/th/id/R.93a78b46a0dba9f1a0299cf70fb3765c?rik=v9u4uB3cbiHRyA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"EB0B8893C6C83C7473E9C8D1216EDC1DB8B8DBBF","accentColor":"146EB7"},"CD7A25659CABB8234FB75BC7A9AA30867533F254":{"name":"Virtual Labs","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.z8dSVg8MlqTkif_3Knid6wHaDx?pid=Api","datePublished":"2021-03-25T04:08:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://ds2-iiith.vlabs.ac.in/exp/dijkstra-algorithm/analysis/images/pseudo_algo.jpeg","hostPageUrl":"https://ds2-iiith.vlabs.ac.in/exp/dijkstra-algorithm/analysis/time-and-space-complexity.html","contentSize":"65881 B","width":846,"height":431,"cDNContentUrl":"https://th.bing.com/th/id/R.cfc752560f0c96a4e489fff72a789deb?rik=3KdSVsm6izL0ew&pid=ImgRaw&r=0","isTransparent":false,"imageId":"452F33576803AA9A7CB57BF4328BBAC95652A7DC","accentColor":"084F7F"},"B2D30DEF4391549A642C287C534166A68BD1D5FE":{"name":"F2L Method Explained: Why It Is Essential to Learn F2L to Solve Cube","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.5JMbl3BPUhrsZAS_Lx1_PgHaDO?pid=Api","datePublished":"2021-02-10T05:22:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://cdn.shopify.com/s/files/1/0270/0342/0758/files/cubing_notations_600x600.png?v=1612173651","hostPageUrl":"https://www.cubelelo.com/blogs/cubing/f2l-method-explained-solve-rubiks-cube-under-30-seconds","contentSize":"125231 B","width":600,"height":262,"cDNContentUrl":"https://th.bing.com/th/id/R.e4931b97704f521aec6404bf2f1d7f3e?rik=Kz3Q%2fjQZRalGwg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"EF5D1DB86A661435C782C246A9451934FED03D2B","accentColor":"C30814"},"3BCA2BD135384F221AECD603D2BA35DAA45E089F":{"name":"Demonstrate a Use Case diagram using Unified Modeling Notation for an ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.oN2g4wqXBG8mtoorIWOi0QHaEM?pid=Api","datePublished":"2022-06-07T19:13:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://hi-static.z-dn.net/files/d8e/fa1825c917bb5e52e1fe78285010bfd5.png","hostPageUrl":"https://brainly.in/question/52272924","contentSize":"48748 B","width":1260,"height":715,"cDNContentUrl":"https://th.bing.com/th/id/R.a0dda0e30a97046f26b68a2b2163a2d1?rik=s6yyHVOD9CKhzg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"F980E54AAD53AB2D306DCEA122F483531DB2ACB3","accentColor":"464646"},"A3AACAA0DC0918FB2F44BFBD8F8611FEBA1F42EC":{"name":"ML+Cheat+Sheet 2 - ML practice material and document - - Studocu","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.RuNc9ye-SSN1LQ4Grb6qAgHaGJ?pid=Api","datePublished":"2022-12-16T04:20:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/1fe315b895aa2b48ad9ad3560ada0636/thumb_1200_996.png","hostPageUrl":"https://www.studocu.com/in/document/srm-institute-of-science-and-technology/machine-learning/mlcheatsheet-2-ml-practice-material-and-document/37311673","contentSize":"496335 B","width":1200,"height":996,"cDNContentUrl":"https://th.bing.com/th/id/R.46e35cf727be4923752d0e06adbeaa02?rik=OqqsCs2Qgb%2fyRA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"CE24F1ABEF1168F8DBFB44F2BF8190CD0AACAA3A","accentColor":"0296C9"},"D2A713F88D3B84CF9E0360CA331E9277DF85079D":{"name":"Intravenous fluid therapy in adults in hospital: NICE Guidelines","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.zePepM05LOK25783u0l-agAAAA?pid=Api","datePublished":"2017-05-30T15:10:00.0000000Z","isFamilyFriendly":true,"contentUrl":"http://speciality.medicaldialogues.in/wp-content/uploads/2017/05/Algorithms-for-IV-fluid-therapy-420x281.jpg","hostPageUrl":"https://speciality.medicaldialogues.in/intravenous-fluid-therapy-in-adults-in-hospital-nice-guidelines","contentSize":"30130 B","width":420,"height":281,"cDNContentUrl":"https://th.bing.com/th/id/R.cde3dea4cd392ce2b6e7bf37bb497e6a?rik=LXoxj9izSPzpMA&riu=http%3a%2f%2fspeciality.medicaldialogues.in%2fwp-content%2fuploads%2f2017%2f05%2fAlgorithms-for-IV-fluid-therapy-420x281.jpg&ehk=oyj5vXpkTtMVMHdouFR5unHelVXFZ5y4vc2%2fc1FNq74%3d&risl=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"D97058FD7729E133AC0630E9FC48B3D88F317A2D","accentColor":"827349"},"1408AFC3158DA27B0C08880FA7E5FD1698ABB59C":{"name":"Virtual Lab for Computer Organisation and Architecture","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.o48sv_QecFq9-XvIizqS0QHaFs?pid=Api","datePublished":"2018-05-02T20:34:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://cse.iitkgp.ac.in/~chitta/coldvl/images/bckt1.png","hostPageUrl":"https://cse.iitkgp.ac.in/~chitta/coldvl/booth.html","contentSize":"9600 B","width":742,"height":571,"cDNContentUrl":"https://th.bing.com/th/id/R.a38f2cbff41e705abdf97bc88b3a92d1?rik=QYD6PFHYKrfAgA&pid=ImgRaw&r=0","isTransparent":true,"imageId":"C95BBA8961DF5E7AF08880C0B72AD8513CFA8041","accentColor":"373737"},"7F38B8AA415431BB51733BE49A10EA83130027FF":{"name":"Which of the following sorting algorithms has the lowest worst-case ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.P7GimZu1JNhNsdmtz7koywHaEK?pid=Api","datePublished":"2022-12-02T23:36:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://edurev.gumlet.io/ApplicationImages/Temp/a5d8f710-434d-4b40-8833-75a5b661f2eb_lg.jpeg?w=576&dpr=1.0","hostPageUrl":"https://edurev.in/question/1792340/Which-of-the-following-sorting-algorithms-has-the-lowest-worst-case-complexity-a-Merge-sortb-Bubble-","contentSize":"36622 B","width":576,"height":324,"cDNContentUrl":"https://th.bing.com/th/id/R.3fb1a2999bb524d84db1d9adcfb928cb?rik=94OLqhRFE7sVNw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"FF72003138AE01A94EB33715BB134514AA8B83F7","accentColor":"62715A"},"FD0515CE70D582ACD840EFDA58DC2BC87C958C19":{"name":"X32/M32: AES50 i/o Sharing between different consoles and stage boxes","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.g_OnYLxegoF2IYhDw-Td_AHaEK?pid=Api","datePublished":"2021-01-30T07:35:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://i.ytimg.com/vi/oE6jwulgmWU/maxresdefault.jpg","hostPageUrl":"https://www.ndetech.org.in/ASTM-E317-Block-Figure-6-Metric-Alloy-Steel","contentSize":"199678 B","width":1280,"height":720,"cDNContentUrl":"https://th.bing.com/th/id/R.83f3a760bc5e828176218843c3e4ddfc?rik=31BR7AddKMqNBA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"91C859C78CB2CD85ADFE048DCA285D07EC5150DF","accentColor":"4C6880"},"D0CD893008D4AD591254C096DB4C2ADDFA5FADB2":{"name":"E-commerce System ER Diagram","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.hYOS6vo-6GBbEpQD_yZQkgHaEQ?pid=Api","datePublished":"2024-06-15T21:32:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://images.wondershare.com/edrawmax/templates/er-diagram-for-fyp-system.png","hostPageUrl":"https://edrawmax.wondershare.com/templates/er-diagram-e-commerce-system.html","contentSize":"157314 B","width":1516,"height":872,"cDNContentUrl":"https://th.bing.com/th/id/R.858392eafa3ee8605b129403ff265092?rik=DdyYA4BN2pUhRQ&pid=ImgRaw&r=0","isTransparent":true,"imageId":"2BDAF5AFDDA2C4BD690C452195DA4D800398DC0D","accentColor":"00AF4D"},"1258CD05E591B97374E95DD2A9F7983E3147514D":{"name":"Introduction to Algorithm and Data Structures | As per SPPU syllabus","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.CiAZ6HpO0D9dNCv5HesPPAHaFj?pid=Api","datePublished":"2022-08-14T21:03:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://i.ytimg.com/vi/vOEN65nm4YU/sddefault.jpg","hostPageUrl":"https://dse.cwipedia.in/2022/04/data-structures-sppu-.html","contentSize":"47217 B","width":640,"height":480,"cDNContentUrl":"https://th.bing.com/th/id/R.0a2019e87a4ed03f5d342bf91deb0f3c?rik=IYXcUF4ZmzdHng&pid=ImgRaw&r=0","isTransparent":false,"imageId":"D4157413E3897F9A2DD59E47379B195E50DC8521","accentColor":"4C677F"},"A92062D71CAE372BB8DF3FD6838316425F4A3E96":{"name":"Entity-Relationship (ER) Diagram Symbols and Notations | EdrawMax","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.0O0FDHBKWXbr47ZuJiBuZAHaFl?pid=Api","datePublished":"2016-06-02T12:35:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://images.edrawsoft.com/articles/er-diagram-symbols/erd.png","hostPageUrl":"https://www.edrawsoft.com/er-diagram-symbols.html","contentSize":"73801 B","width":1015,"height":765,"cDNContentUrl":"https://th.bing.com/th/id/R.d0ed050c704a5976ebe3b66e26206e64?rik=mgImfcHqc7KL%2fQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"69E3A4F5246138386DF3FD8BB273EAC17D26029A","accentColor":"184E87"},"57585FADC003EE3CD14B89630CB2476CA53D7D77":{"name":"How to Memorize Speedcube Algorithms Faster - Cubelelo","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.ThplbQGiffxbxG4UluejAgHaEK?pid=Api","datePublished":"2022-05-27T10:10:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://cdn.shopify.com/s/files/1/0270/0342/0758/files/image5_9a6a9ac2-569d-4d6c-b8bf-352a2b0aab39_480x480.png?v=1653644987","hostPageUrl":"https://www.cubelelo.com/blogs/cubing/memorize-speedcube-algorithms-faster","contentSize":"128854 B","width":480,"height":270,"cDNContentUrl":"https://th.bing.com/th/id/R.4e1a656d01a27dfc5bc46e1496e7a302?rik=dYX12gww7sMdtA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"77D7D35AC6742BC03698B41DC3EE300CDAF58575","accentColor":"C40707"},"03F71F8D19D1146D0636B841757B3E74F46C3EDD":{"name":"Write algorithm and create flowchart for calculating area and perimeter ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.cwq7zQIYaTXcvTI_56NMIQHaEz?pid=Api","datePublished":"2021-03-21T01:54:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://hi-static.z-dn.net/files/d8f/ec284819aa349fdd4667f23267396dd9.jpg","hostPageUrl":"https://brainly.in/question/26970442","contentSize":"26365 B","width":693,"height":449,"cDNContentUrl":"https://th.bing.com/th/id/R.730abbcd02186935dcbd323fe7a34c21?rik=MH%2fx2JEdQdZgYw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"DDE3C64F47E3B757148B6360D6411D91D8F17F30","accentColor":"5C6A6F"},"C3E9797709B3EB71C0048E8567EE411DC103B365":{"name":"Ashwani Blog","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.EZY_Nyos3QWiHvcAov-NxwHaHf?pid=Api","datePublished":"2022-07-17T20:10:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://media.geeksforgeeks.org/wp-content/uploads/insertionsort.png","hostPageUrl":"https://blog.ashwanikumarsingh.in/","contentSize":"54181 B","width":562,"height":569,"cDNContentUrl":"https://th.bing.com/th/id/R.11963f372a2cdd05a21ef700a2ff8dc7?rik=PJ6Xd5A7vhcMQA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"563B301CD114EE7658E8400C17BE3B9077979E3C","accentColor":"CC0000"},"3404E7B7EAECDDE587869834E5657040551F36B7":{"name":"[Windows 11] USB Encryption | Best USB Encryption Password Protect Lock ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.QM_mFPoTV145tMfNjCl8TwAAAA?pid=Api","datePublished":"2020-07-13T03:17:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.gilisoft.in/images/usb-stick.png","hostPageUrl":"https://www.gilisoft.in/product-usb-stick-encryption.htm","contentSize":"39374 B","width":204,"height":201,"cDNContentUrl":"https://th.bing.com/th/id/R.40cfe614fa13575e39b4c7cd8c297c4f?rik=Q0B%2be67O3V54aA&pid=ImgRaw&r=0","isTransparent":true,"imageId":"7B63F1550407565E438968785EDDCEAE7B7E4043","accentColor":"0671C5"},"D7C22BBD37398EF4C05D4B3731D11B8FCE38907F":{"name":"Architectural Diagrams: Types, Uses & Best Practices","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.dXwZ3zOaNcDmMT6L9NZY1QHaFO?pid=Api","datePublished":"2022-11-26T18:50:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://blog.novatr.com/hs-fs/hubfs/MCA-Bauhaus-Promenade-Program-Diagram.jpg?width=6000&height=4233&name=MCA-Bauhaus-Promenade-Program-Diagram.jpg","hostPageUrl":"https://www.novatr.com/blog/architectural-diagrams","contentSize":"387961 B","width":2000,"height":1411,"cDNContentUrl":"https://th.bing.com/th/id/R.757c19df339a35c0e6313e8bf4d658d5?rik=fSyy23OT6E8M1Q&pid=ImgRaw&r=0","isTransparent":false,"imageId":"F70983ECF8B11D1373B4D50C4FE89373DBB22C7D","accentColor":"BC410F"},"B49078A715DF40DB2CD29FF0DD7531BD106F0E30":{"name":"Online Examination System, PHP and MySQL Project Report Download","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.8POkVMboejhentbSrgMP6QHaFs?pid=Api","datePublished":"2016-12-18T11:37:00.0000000Z","isFamilyFriendly":true,"contentUrl":"http://programmer2programmer.net/live_projects/project_11/images/er_diagram_online_examination_system.jpg","hostPageUrl":"http://programmer2programmer.net/live_projects/project_11/online_examination_system_project_report.aspx","contentSize":"37308 B","width":487,"height":374,"cDNContentUrl":"https://th.bing.com/th/id/R.f0f3a454c6e87a385e9ed6d2ae030fe9?rik=SwmHelH9BL3CLQ&riu=http%3a%2f%2fprogrammer2programmer.net%2flive_projects%2fproject_11%2fimages%2fer_diagram_online_examination_system.jpg&ehk=L14jKWs%2fQEgoLBTh6ZoOSHvHGQTnB4hSNIOf6QiumZ0%3d&risl=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"03E0F601DB1357DD0FF92DC2BD04FD517A87094B","accentColor":"C2BF09"},"95AA1EF4E1214BD5732F5B82D985F15538206A67":{"name":"Question and Answer - MindStudy","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.qBtZ3v1oQZH8fLYYE8WBOgHaEN?pid=Api","datePublished":"2023-09-02T22:38:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://media.geeksforgeeks.org/wp-content/uploads/zbuffer.png","hostPageUrl":"https://mindstudy.in/computer-science-engineering/z-buffer-or-depth-buffer-method","contentSize":"13117 B","width":583,"height":332,"cDNContentUrl":"https://th.bing.com/th/id/R.a81b59defd684191fc7cb61813c5813a?rik=WarhTx4StF038g&pid=ImgRaw&r=0","isTransparent":false,"imageId":"76A60283551F589D28B5F2375DB4121E4FE1AA59","accentColor":"CC0016"},"CED42940D0695490C538149CD019089A0CC65802":{"name":"In-Vehicle Gateway ECU Applications - TDK | Mouser","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.S3Z8x781yXB--jTJl_-QwwHaFN?pid=Api","datePublished":"2020-11-07T22:42:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.mouser.in/images/marketingid/2020/microsites/105212872/Gateway%20ECU.png","hostPageUrl":"https://www.mouser.in/new/tdk/tdk-in-vehicle-gateway-ecu-applications/","contentSize":"293739 B","width":1200,"height":845,"cDNContentUrl":"https://th.bing.com/th/id/R.4b767cc7bf35c9707efa34c997ff90c3?rik=7E2SBA2WRQlcgw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"20856CC0A980910DC941835C0945960D04924DEC","accentColor":"CA4F01"},"676384097A7FDA1655F814FB91DB872CC4234183":{"name":"Methods to Recover Encrypted Excel Files - Stellar Data Recovery","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.T24GUvFhsDp65ipPqNtXnAHaEc?pid=Api","datePublished":"2019-06-20T03:48:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.stellarinfo.co.in/blog/wp-content/uploads/2016/12/How-to-Recover-Excel-Files-Encrypted-by-Cerber-Ransomware-Virus.jpg","hostPageUrl":"https://www.stellarinfo.co.in/blog/recover-encrypted-excel-files/","contentSize":"475659 B","width":1000,"height":600,"cDNContentUrl":"https://th.bing.com/th/id/R.4f6e0652f161b03a7ae62a4fa8db579c?rik=djZIkKf3rWFVjw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"3814324CC278BD19BF418F5561ADF7A790483676","accentColor":"A12A49"},"DB76868C05300A951D69A3D171A802105E0A417E":{"name":"Introduction to K-means Clustering - Data Clustering Algorithms | T/DG ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.d7kwJi5GuGkLE6fB6tTDnQHaFd?pid=Api","datePublished":"2015-05-26T10:03:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://blog.thedigitalgroup.com/assets/uploads/k-means3.jpg","hostPageUrl":"https://blog.thedigitalgroup.com/k-means-clustering","contentSize":"30293 B","width":624,"height":460,"cDNContentUrl":"https://th.bing.com/th/id/R.77b930262e46b8690b13a7c1ead4c39d?rik=vWdoyFADoFnRlg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E714A0E501208A171D3A96D159A00350C86867BD","accentColor":"2D619E"},"7073170F5ECD17207BD8E5DA3EBF8C7309769ECC":{"name":"all 6 ray diagram of concave mirror - Brainly.in","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.MJa3xpvoiEXdDvtkpR3iDQHaGh?pid=Api","datePublished":"2021-02-21T12:20:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://hi-static.z-dn.net/files/d75/0f275be84d7b75f4b12bbedc861fc5fd.jpg","hostPageUrl":"https://brainly.in/question/7720634","contentSize":"75712 B","width":1043,"height":918,"cDNContentUrl":"https://th.bing.com/th/id/R.3096b7c69be88845dd0efb64a51de20d?rik=Bzdx8OXccQK3jQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"CCE9679037C8FBE3AD5E8DB70271DCE5F0713707","accentColor":"272A3D"},"BCDA78017C22512B6AEC95BA9E5834522F7C3D51":{"name":"Module 3.1- Introduction to UML diagrams – Use case diagrams, Class ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.YZlpL6-i8p34cF69w5xpgwHaJl?pid=Api","datePublished":"2022-07-08T11:34:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/acccb7908920a565ded563eaab6a27d1/thumb_1200_1553.png","hostPageUrl":"https://www.studocu.com/in/document/apj-abdul-kalam-technological-university/software-architecture-and-design-patterns/module-31-introduction-to-uml-diagrams-use-case-diagrams-class-diagrams-sequence-diagrams/29401892","contentSize":"409580 B","width":1200,"height":1553,"cDNContentUrl":"https://th.bing.com/th/id/R.6199692fafa2f29df8705ebdc39c6983?rik=y62HEMciFbKmzg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"15D3C7F2254385E9AB59CEA6B21522C71087ADCB","accentColor":"464646"},"D1760A48EC01490E0CB71D253056D45D4ED6BAF1":{"name":"What is Object Oriented Design of a system? Draw the Use case diagram ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.y-dZrl2F2fkJxYwzAb4AnwHaGP?pid=Api","datePublished":"2022-12-08T14:10:00.0000000Z","isFamilyFriendly":true,"contentUrl":"http://www.gtu-paper-solution.com/upload/2160701/W2018/2170701_SE_Q3_C_2_Winter_2018.jpg","hostPageUrl":"https://gtu-paper-solution.com/Paper-Solution/SoftwareEngineering-2160701/Winter-2018/Question-3c","contentSize":"62189 B","width":1222,"height":1029,"cDNContentUrl":"https://th.bing.com/th/id/R.cbe759ae5d85d9f909c58c3301be009f?rik=HWeghM4QlODAew&riu=http%3a%2f%2fwww.gtu-paper-solution.com%2fupload%2f2160701%2fW2018%2f2170701_SE_Q3_C_2_Winter_2018.jpg&ehk=ohXURj9u2ReuPhc9O77C676q9b6%2b6CN7GM16bvS570I%3d&risl=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"1FAB6DE4D54D650352D17BC0E09410CE84A0671D","accentColor":"404040"},"22F8E8493F35F4ED59B2670F401CDAC77A0F6FD8":{"name":"Ashwani Blog","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.o23dagqqzSzesNJjospgVgHaEH?pid=Api","datePublished":"2022-08-30T22:25:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://media.geeksforgeeks.org/wp-content/uploads/20220309171621/BinarySearch.png","hostPageUrl":"https://blog.ashwanikumarsingh.in/blogposts/binary-search","contentSize":"179900 B","width":720,"height":401,"cDNContentUrl":"https://th.bing.com/th/id/R.a36ddd6a0aaacd2cdeb0d263a2ca6056?rik=Io%2bOlPNTT96VKw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"8DF6F0A77CADC104F0762B95DE4F53F3948E8F22","accentColor":"92B516"},"4652279C9B8FDC8977509834E5657040551F36B7":{"name":"[Windows 11] USB Encryption | Best USB Encryption Password Protect Lock ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.MuQezEXdyG8sW_mZpgSNcQAAAA?pid=Api","datePublished":"2020-07-13T03:17:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.gilisoft.in/images/benefit02.png","hostPageUrl":"https://www.gilisoft.in/product-usb-stick-encryption.htm","contentSize":"4199 B","width":32,"height":32,"cDNContentUrl":"https://th.bing.com/th/id/R.32e41ecc45ddc86f2c5bf999a6048d71?rik=ZCVyybn4zZh3BQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"7B63F1550407565E4389057798CDF8B9C9722564","accentColor":"019315"},"15D7D7D6B5ED1D5544AD3000DB4864522EA1332E":{"name":"Screening among Household Contacts of DR-TB Patients | Knowledge Base","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.T2g2tSnpnNaCa55hSWVJAgHaDi?pid=Api","datePublished":"2022-08-31T18:11:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://cms.swasth-egurukul.in/sites/default/files/2082.png","hostPageUrl":"https://ntep.in/node/1794/CP-screening-among-household-contacts-dr-tb-patients","contentSize":"195897 B","width":1200,"height":574,"cDNContentUrl":"https://th.bing.com/th/id/R.4f6836b529e99cd6826b9e6149654902?rik=UX19bVve0VVE2g&pid=ImgRaw&r=0","isTransparent":true,"imageId":"E2331AE2254684BD0003DA4455D1DE5B6D7D7D51","accentColor":"CC9C00"},"A1C570AA7890F40518C4E22DC581F67B113C491C":{"name":"XGBoost – What Is It and Why Does It Matter?","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.6bKX8w_Ck2PRFgn9ztowNgHaEp?pid=Api","datePublished":"2024-05-23T21:13:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.nvidia.com/content/dam/en-zz/Solutions/glossary/data-science/xgboost/img-3.png","hostPageUrl":"https://www.nvidia.com/en-in/glossary/xgboost/","contentSize":"20896 B","width":965,"height":605,"cDNContentUrl":"https://th.bing.com/th/id/R.e9b297f30fc29363d11609fdceda3036?rik=GlwHqocJT1CBTA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"C194C311B76F185CD22E4C81504F0987AA075C1A","accentColor":"518000"},"B96355CB5D1967781A086117EF1396A24F9AE502":{"name":"which mirror is used by dentist and draw its Ray diagram - Brainly.in","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.Lfd0r2F-fzRygT9PoQNemAAAAA?pid=Api","datePublished":"2018-12-10T21:22:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://hi-static.z-dn.net/files/d88/ad18098919f3a87e3c6d024db8f8b41e.jpg","hostPageUrl":"https://brainly.in/question/6248277","contentSize":"14497 B","width":317,"height":291,"cDNContentUrl":"https://th.bing.com/th/id/R.2df774af617e7f3472813f4fa1035e98?rik=mzZVvNWRdoehgA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"205EA9F42A6931FE711680A1877691D5BC55369B","accentColor":"823C39"},"09CAE5ACD2A60FFE2C2F14FB91DB872CC4234183":{"name":"Methods to Recover Encrypted Excel Files - Stellar Data Recovery","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.-B7Wz3NMtTL0827zaMvLXgHaEc?pid=Api","datePublished":"2019-09-15T01:45:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.stellarinfo.co.in/blog/wp-content/uploads/2016/12/How-to-Recover-Excel-Files-Encrypted-by-Cerber-Ransomware-Virus-1.jpg","hostPageUrl":"https://www.stellarinfo.co.in/blog/recover-encrypted-excel-files/","contentSize":"92623 B","width":1000,"height":600,"cDNContentUrl":"https://th.bing.com/th/id/R.f81ed6cf734cb532f4f36ef368cbcb5e?rik=kKxeyi1q8O%2fC8g&pid=ImgRaw&r=0","isTransparent":false,"imageId":"3814324CC278BD19BF41F2C2EFF06A2DCA5EAC90","accentColor":"304075"},"E33F8EB46881D3D8C7E790E76227A0271845EFCE":{"name":"Phasor Diagrams for Transformer on Load - Single Phase Transformer","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.RTXajRXnCs6NczEjjOWUWQAAAA?pid=Api","datePublished":"2022-12-28T14:53:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.poriyaan.in/media/imgPori/images12/q09KeSW.png","hostPageUrl":"https://eee.poriyaan.in/topic/phasor-diagrams-for-transformer-on-load-11216/","contentSize":"210113 B","width":451,"height":409,"cDNContentUrl":"https://th.bing.com/th/id/R.4535da8d15e70ace8d7331238ce59459?rik=PvPoS4YYPY18fg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"ECFE5481720A72267E097E7C8D3D18864BE8F33E","accentColor":"595972"},"D749EF1F6A0BD68485F5E8EAF58B8D398832F0CC":{"name":"Databases: ISRO2017-8","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.Xjn4XQlemJuzwhlKcYW6ZAAAAA?pid=Api","datePublished":"2017-05-07T11:31:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://gateoverflow.in/?qa=blob&qa_blobid=10296062514662501060","hostPageUrl":"https://gateoverflow.in/128553/isro2017-8","contentSize":"58255 B","width":429,"height":270,"cDNContentUrl":"https://th.bing.com/th/id/R.5e39f85d095e989bb3c2194a7185ba64?rik=fZT%2b8aawbUhYXw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"CC0F238893D8B85FAE8E5F58486DB0A6F1FE947D","accentColor":"676764"},"A173A502CE2055679A12FF30B8560800A6064F6F":{"name":"11 Cool 3x3 Speed Cube Patterns With Notations | Atharva Bhat","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.a8dHRXqX4KlG6dAU264--wHaD0?pid=Api","datePublished":"2021-10-02T10:45:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://cdn.shopify.com/s/files/1/0270/0342/0758/files/unnamed_12_b3d3e17c-9176-4ded-b807-ac7035d9a9e9.png?v=1632921657","hostPageUrl":"https://www.cubelelo.com/blogs/cubing/cool-3x3-cube-patterns","contentSize":"168042 B","width":512,"height":264,"cDNContentUrl":"https://th.bing.com/th/id/R.6bc747457a97e0a946e9d014dbae3efb?rik=GjdaIOwCVXapIQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"F6F4606A0080658B03FF21A9765502EC205A371A","accentColor":"B4B217"},"199AF2D8550FFF4CCB95DFC4B077EE59E3ECBCAD":{"name":"Virtual Labs","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.So51eqJ-IvJdqc2ycHMvCwHaHA?pid=Api","datePublished":"2021-03-24T04:02:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://ds1-iiith.vlabs.ac.in/exp/bubble-sort/analysis/images/comparison.png","hostPageUrl":"https://ds1-iiith.vlabs.ac.in/exp/bubble-sort/analysis/comparison-with-other-algorithms.html","contentSize":"97670 B","width":811,"height":767,"cDNContentUrl":"https://th.bing.com/th/id/R.4a8e757aa27e22f25da9cdb270732f0b?rik=kakvjVXw%2f8S8WQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"DACBCE3E95EE770B4CFD59BCC4FFF0558D2FA991","accentColor":"917C3A"},"196F10AF11DE22EB3EF3A3365A46CD174D88A7DC":{"name":"write an algorithm and draw a flow chart to find sum of digits of a ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.s69kHdnV3JsJdOVzQWkuMQHaGZ?pid=Api","datePublished":"2021-02-07T21:02:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://hi-static.z-dn.net/files/d7b/c067a010bf9c5bb4911c642382f48aef.png","hostPageUrl":"https://brainly.in/question/32548580","contentSize":"24652 B","width":940,"height":812,"cDNContentUrl":"https://th.bing.com/th/id/R.b3af641dd9d5dc9b0974e57341692e31?rik=kfYB%2bhHtIr7jPw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"CD7A88D471DC64A5633A3FE3BE22ED11FA01F691","accentColor":"343434"},"14AE87587F416D95F88A63AFE407AC4FC51CFB2A":{"name":"Algorithm cook rice to flowchart - Brainly.in","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.zFPQp-1kcBDp-G96EsSWMgAAAA?pid=Api","datePublished":"2022-08-26T19:55:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://hi-static.z-dn.net/files/d6f/6af615461599df96ddff76a447bb0314.jpg","hostPageUrl":"https://brainly.in/question/53327933","contentSize":"30831 B","width":446,"height":1015,"cDNContentUrl":"https://th.bing.com/th/id/R.cc53d0a7ed647010e9f86f7a12c49632?rik=Qep4hfcU1lmPqA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"A2BFC15CF4CA704EFA36A88F59D614F78578EA41","accentColor":"404040"},"43C0E4AD28233243EB6A72E8AF1F36188950E612":{"name":"Welcome to ARCOP","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.afqJhSWlRKqIrXfcD29OrQHaD9?pid=Api","datePublished":"2019-04-05T14:35:00.0000000Z","isFamilyFriendly":true,"contentUrl":"http://arcop.co.in/images/product-options/enlarge-image/20160810050107_primage.jpg","hostPageUrl":"http://arcop.co.in/inner-page-th-sub-category-by-name.php?id=41","contentSize":"297529 B","width":823,"height":440,"cDNContentUrl":"https://th.bing.com/th/id/R.69fa898525a544aa88ad77dc0f6f4ead?rik=NAxO2oIyIzS%2bpg&riu=http%3a%2f%2farcop.co.in%2fimages%2fproduct-options%2fenlarge-image%2f20160810050107_primage.jpg&ehk=snSDRE7AZGNPTTPHr6jRAcAp4YRass64voDB8hgr0I8%3d&risl=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"216E05988163F1FA8E27A6BE34233282DA4E0C34","accentColor":"9D992E"},"066B9D2F7D8845BED41D622DEED68EE4406A8F15":{"name":"Which sorting algorithm has the best asymptotic runtime complexity ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.Eda3VeIfSSo0Tyw6xFZX_AHaDv?pid=Api","datePublished":"2019-04-29T13:32:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://hi-static.z-dn.net/files/de4/628e6d48b76004a4afb95ae28aa2328e.png","hostPageUrl":"https://brainly.in/question/9205555","contentSize":"34018 B","width":779,"height":394,"cDNContentUrl":"https://th.bing.com/th/id/R.11d6b755e21f492a344f2c3ac45657fc?rik=YLbZ8teIVOtN0Q&pid=ImgRaw&r=0","isTransparent":false,"imageId":"51F8A6044EE86DEED226D14DEB5488D7F2D9B660","accentColor":"4CB70B"},"55F9E1CEFCA84338FDFA74833018AFC6927BF64C":{"name":"Draw a flowchart and write an algorithm to enter time in hours. Display ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.7a63hBLbvDW_NSwmOEv_hAHaHH?pid=Api","datePublished":"2019-01-17T16:53:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://hi-static.z-dn.net/files/d2f/8892f9d8ca984fe248ac35b905e34e2f.jpg","hostPageUrl":"https://brainly.in/question/7686656","contentSize":"59652 B","width":921,"height":885,"cDNContentUrl":"https://th.bing.com/th/id/R.edaeb78412dbbc35bf352c26384bff84?rik=VZ8e7M%2bKNIPfrw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"C46FB7296CFA81033847AFDF83348ACFEC1E9F55","accentColor":"454545"},"6E94974D63B10E2C76F765A68AF688E8343061E7":{"name":"Algorithm and flowchart to find area and perimeter of circle - Brainly.in","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.5ubUMhseLgugj7QPxHxuEgHaEZ?pid=Api","datePublished":"2020-04-21T14:02:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://hi-static.z-dn.net/files/dcc/591cb36e45ecac3ec971d18cfdfea400.jpg","hostPageUrl":"https://brainly.in/question/16767506","contentSize":"21590 B","width":1025,"height":608,"cDNContentUrl":"https://th.bing.com/th/id/R.e6e6d4321b1e2e0ba08fb40fc47c6e12?rik=5kl51DYb4MJnfw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"7E1603438E886FA86A567F67C2E01B36D47949E6","accentColor":"3E5371"},"E5655198E64CD988DB6C7EB5ADA29E489C779B61":{"name":"draw a flowchart to find the perimeter and area of rectangle. and also ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.Md4UptZSMRhRton2FdINtAHaH7?pid=Api","datePublished":"2020-10-27T13:04:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://hi-static.z-dn.net/files/df9/944f1bec242f792842015054d71cb00c.jpg","hostPageUrl":"https://brainly.in/question/26899392","contentSize":"122331 B","width":1081,"height":1158,"cDNContentUrl":"https://th.bing.com/th/id/R.31de14a6d652311851b689f615d20db4?rik=XlYViW7EnYi9xg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"16B977C984E92ADA5BE7C6BD889DC46E8915565E","accentColor":"484960"},"62DD0BA99D4C9E5520F6E0D74375EDF33EF7D30E":{"name":"Apple iPhone 16 Plus (256GB SG) Price in Bangladesh 2025, Specs ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.6bgENfPsbH-ujpzBL325OwHaHa?pid=Api","datePublished":"2024-11-06T11:05:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.mobiledokan.com/media/apple-iphone-16-plus-ultramarine-official-image_2.webp","hostPageUrl":"https://www.mobiledokan.com/mobile/apple-iphone-16-plus-256gb-sg","contentSize":"19796 B","width":1000,"height":1000,"cDNContentUrl":"https://th.bing.com/th/id/R.e9b80435f3ec6c7fae8e9cc12f7db93b?rik=Jt2wmtnE6VUCbw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E03D7FE33FDE57347D0E6F0255E9C4D99AB0DD26","accentColor":"0F3EBC"},"623F121B33E2DBABCD918D16D26587634E47FD6A":{"name":"Draw a labelled diagram of functional unit of kidney - Brainly.in","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.K-4vm5k3K8IQRPk2hD_3PwHaFj?pid=Api","datePublished":"2020-07-27T08:53:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://hi-static.z-dn.net/files/d9d/7c9973dbed0c3d50bce9acb28a9b9642.jpg","hostPageUrl":"https://brainly.in/question/20058182","contentSize":"39897 B","width":697,"height":523,"cDNContentUrl":"https://th.bing.com/th/id/R.2bee2f9b99372bc21044f936843ff73f?rik=JvMhsTMuvbrcGQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"A6DF74E43678562D61D819DCBABD2E33B121F326","accentColor":"4A4A4A"},"50329954CA13495922FCD6217237C37B6B107246":{"name":"draw a labelled diagram to show the working of a kaleidoscope.what are ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.wfY5LqkBa3dPYEFL9C3XrAHaD5?pid=Api","datePublished":"2018-10-26T11:56:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://hi-static.z-dn.net/files/d3b/39a3ca5884826b399e653660822ade51.png","hostPageUrl":"http://brainly.in/question/250534","contentSize":"59786 B","width":486,"height":256,"cDNContentUrl":"https://th.bing.com/th/id/R.c1f6392ea9016b774f60414bf42dd7ac?rik=BSOZRawxlJUizw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"642701B6B73C7327126DCF22959431AC45992305","accentColor":"0A8DC1"},"BC55E310F8F0E17E666E5476734D1F68FEFB55CA":{"name":"[Answered] Write an algorithm and draw a flowchart to find simple ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.bSWij9-IovRikGtUBXKg0gAAAA?pid=Api","datePublished":"2018-07-07T23:13:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://hi-static.z-dn.net/files/d2e/f6324063bda2deb6ea85ae3a23dc51d2.jpg","hostPageUrl":"https://brainly.in/question/4579550","contentSize":"13132 B","width":442,"height":348,"cDNContentUrl":"https://th.bing.com/th/id/R.6d25a28fdf88a2f462906b540572a0d2?rik=y1U%2bAY8PHudm5g&pid=ImgRaw&r=0","isTransparent":false,"imageId":"AC55BFEF86F1D4376745E666E71E0F8F013E55CB","accentColor":"677E4D"},"F11B5340DB7FB91D32C581C307C289AAA49722FB":{"name":"Tower of Hanoi recursion game algorithm explained - Codeamy: Learn ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.6_vDzpKMem-u_OFH47KY6QHaD4?pid=Api","datePublished":"2019-10-29T09:09:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://1.bp.blogspot.com/-4R0ZfbGOspM/XVaYRFnk16I/AAAAAAAAIP8/xFG876BVNi4VZiOy8DCH0dZoBw2ecZhSgCLcBGAs/w1200-h630-p-k-no-nu/towerofhanoi.png","hostPageUrl":"https://www.codeamy.in/2019/08/tower-of-hanoi.html","contentSize":"90804 B","width":1200,"height":630,"cDNContentUrl":"https://th.bing.com/th/id/R.ebfbc3ce928c7a6faefce147e3b298e9?rik=H7E1BL33m9EjXA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"BF22794AAA982C703C185C23D19BF7BD0435B11F","accentColor":"B25219"},"D1DE2A7B758B45D17BFFDB5C6B612DDC4AA6599D":{"name":"Future Plans | About | Ahmedabad Education Society","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.uj-glJy40r1EwwWDVgcKcgHaCj?pid=Api","datePublished":"2018-01-31T06:12:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://aesahd.edu.in/img/pagetop/aes-sports-complex.jpg","hostPageUrl":"https://aesahd.edu.in/futureplans.shtml","contentSize":"43481 B","width":680,"height":234,"cDNContentUrl":"https://th.bing.com/th/id/R.ba3fa0949cb8d2bd44c3058356070a72?rik=He2it1e4VB23%2fw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"D9956AA4CDD216B6C5BDFFB71D54B857B7A2ED1D","accentColor":"BB1018"},"DD5F41DF8BC3E9850261574674A64DBACDF38244":{"name":"Speech On THE RAT RACE OF COMPETITIVE EXAMS. - Brainly.in","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.Rn_jwsssiNm-ZWprND1mrAHaOq?pid=Api","datePublished":"2022-02-24T09:57:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://hi-static.z-dn.net/files/d04/f8d052b16b9f049b25a59c75ec28ebaf.jpg","hostPageUrl":"https://brainly.in/question/50412468","contentSize":"175654 B","width":680,"height":1347,"cDNContentUrl":"https://th.bing.com/th/id/R.467fe3c2cb2c88d9be656a6b343d66ac?rik=3fUU%2fbg8nlggFg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"44283FDCABD46A4764751620589E3CB8FD14F5DD","accentColor":"529635"},"0DD3D720B1F850E6C96D3D6786DAC6C41267742E":{"name":"Devuan GNU+Linux Free Operating System","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.DPPoCs93kYcDnUq9fkdCpAHaFj?pid=Api","datePublished":"2020-06-10T04:36:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.devuan.org/os/documentation/install-guides/beowulf/img/encrypt5.png","hostPageUrl":"https://www.devuan.org/os/documentation/install-guides/beowulf/full-disk-encryption","contentSize":"5102 B","width":640,"height":480,"cDNContentUrl":"https://th.bing.com/th/id/R.0cf3e80acf779187039d4abd7e4742a4?rik=0D19AhuPBW6c1g&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E24776214C6CAD6876D3D69C6E058F1B027D3DD0","accentColor":"0000B0"},"DB9024B866E852DC5FFA1EEE91DCFB6D4252BDDE":{"name":"Livpure Envy Plus RO+UV+UF Water Purifier with Pre Filter: Amazon.in ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP._3ZptaMzNaD99SSMogd7sgHaD7?pid=Api","datePublished":"2019-11-18T16:41:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://images-na.ssl-images-amazon.com/images/G/31/aplusautomation/vendorimages/7825300b-7426-4192-baae-74a5ea408f77.jpg._CB268449727_.jpg","hostPageUrl":"https://www.amazon.in/Livpure-Envy-Water-Purifier-Filter/dp/B010T06VUI","contentSize":"126228 B","width":2122,"height":1124,"cDNContentUrl":"https://th.bing.com/th/id/R.ff7669b5a33335a0fdf5248ca2077bb2?rik=vQlCi2aOJc31rw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"EDDB2524D6BFCD19EEE1AFF5CD258E668B4209BD","accentColor":"A5262B"},"34778A457DF1DAAF2AE5A86A71543E653DC4CED1":{"name":"Input a day number and display the name of the day.(If number is 1 ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.41MuC-HbShHFAes5Jsc0ZwHaD0?pid=Api","datePublished":"2018-12-13T09:00:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://hi-static.z-dn.net/files/d44/0854f5e8243bf49d4ddbfd3345c6a05f.jpg","hostPageUrl":"https://brainly.in/question/5940398","contentSize":"45426 B","width":848,"height":438,"cDNContentUrl":"https://th.bing.com/th/id/R.e3532e0be1db4a11c501eb3926c73467?rik=Q3eoVNcfrfqiXg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"1DEC4CD356E34517A68A5EA2FAAD1FD754A87743","accentColor":"3C4768"},"DB38C7E2DC935B9EEDC5C0E23AC68C63CF1CFF24":{"name":"Bihar: Who is Responsible for the Death of 100 Children?","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.a48KdZXsqtfVz1_-Fsp9EgHaFH?pid=Api","datePublished":"2019-06-18T07:50:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://cdn.thewire.in/wp-content/uploads/2019/06/17132609/Bihar-AES-Muzaffarpur-Photo-Umesh-Ray-3-1024x707.jpg","hostPageUrl":"https://thewire.in/health/bihar-acute-encephalitis-syndrome-children-dead-nitish","contentSize":"189358 B","width":1024,"height":707,"cDNContentUrl":"https://th.bing.com/th/id/R.6b8f0a7595ecaad7d5cf5ffe16ca7d12?rik=vYN8Ls05teneXA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"42FFC1FC36C86CA32E0C5CDEE9B539CD2E7C83BD","accentColor":"AC1F24"},"8C702C8358C66F7E9BB53D6786DAC6C41267742E":{"name":"Devuan GNU+Linux Free Operating System","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.1cHQ5yHUjK6-wh1vrf7rkQHaFj?pid=Api","datePublished":"2020-06-10T04:36:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.devuan.org/os/documentation/install-guides/beowulf/img/encrypt9.png","hostPageUrl":"https://www.devuan.org/os/documentation/install-guides/beowulf/full-disk-encryption","contentSize":"5714 B","width":640,"height":480,"cDNContentUrl":"https://th.bing.com/th/id/R.d5c1d0e721d48caebec21d6fadfeeb91?rik=yAfCOIVs9ue5Ww&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E24776214C6CAD6876D35BB9E7F66C8538C207C8","accentColor":"0000A9"},"9929BB491CAABDF53F873CAF68C33340849E66BB":{"name":"Blind Coding Qubit 2022 - MGIT","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP._bATv8imk3K7Lq9IEyzyCAHaKf?pid=Api","datePublished":"2022-06-27T09:25:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://mgit.ac.in/wp-content/uploads/2022/06/blind-coding-qubit-2k22.jpeg","hostPageUrl":"https://mgit.ac.in/events/blind-coding-qubit-2022/","contentSize":"305417 B","width":904,"height":1280,"cDNContentUrl":"https://th.bing.com/th/id/R.fdb013bfc8a69372bb2eaf48132cf208?rik=mZK7lMGq21%2fzeA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"BB66E94804333C86FAC378F35FDBAAC194BB9299","accentColor":"02192E"},"9896B725C928F575FC843D6786DAC6C41267742E":{"name":"Devuan GNU+Linux Free Operating System","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.KYyNSeqZEo9Nway7WQR0bwHaFj?pid=Api","datePublished":"2020-06-10T04:36:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.devuan.org/os/documentation/install-guides/beowulf/img/encrypt4.png","hostPageUrl":"https://www.devuan.org/os/documentation/install-guides/beowulf/full-disk-encryption","contentSize":"7961 B","width":640,"height":480,"cDNContentUrl":"https://th.bing.com/th/id/R.298c8d49ea99128f4dc1acbb5904746f?rik=iWl7UpyCX1fPSA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E24776214C6CAD6876D348CF575F829C527B6989","accentColor":"0000A9"},"F07A4DCDB7A7325368B63D6786DAC6C41267742E":{"name":"Devuan GNU+Linux Free Operating System","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.t7-W67gxwtFaEusEIVzOcQHaFj?pid=Api","datePublished":"2020-06-10T04:36:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.devuan.org/os/documentation/install-guides/beowulf/img/encrypt7.png","hostPageUrl":"https://www.devuan.org/os/documentation/install-guides/beowulf/full-disk-encryption","contentSize":"9642 B","width":640,"height":480,"cDNContentUrl":"https://th.bing.com/th/id/R.b7bf96ebb831c2d15a12eb04215cce71?rik=D6fU3Ht6IzWGaw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E24776214C6CAD6876D36B8635237A7BDCD4A70F","accentColor":"0101A9"},"4BDA6A2EA4B3E01BC1AE82D3FCB333E590133D6D":{"name":"Tapo C500 | Outdoor Pan/Tilt Security WiFi Camera | TP-Link India","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.zM72_Iw71sYvzqkF_6550AHaFi?pid=Api","datePublished":"2022-12-01T09:26:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://static-product.tp-link.com/tapo-c500_v1/img/g-6.jpg","hostPageUrl":"https://www.tp-link.com/in/home-networking/cloud-camera/tapo-c500/","contentSize":"33936 B","width":530,"height":396,"cDNContentUrl":"https://th.bing.com/th/id/R.cccef6fc8c3bd6c62fcea905ffae79d0?rik=tK2m4ko7DrEc6g&pid=ImgRaw&r=0","isTransparent":false,"imageId":"D6D331095E333BCF3D28EA1CB10E3B4AE2A6ADB4","accentColor":"089BC3"},"20792FBFF5EA913626A0485E47BCA3FDC30A9A6D":{"name":"Using Euclid's Division Algorithm, find the HCF of 6496 and 376 ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.uQQgoMmcHnlmusfJWlQEgQHaEK?pid=Api","datePublished":"2018-04-26T10:24:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://hi-static.z-dn.net/files/d52/a0c5e30c6d5e6212a8e4c75221244391.jpg","hostPageUrl":"https://brainly.in/question/3432228","contentSize":"489558 B","width":4128,"height":2322,"cDNContentUrl":"https://th.bing.com/th/id/R.b90420a0c99c1e7966bac7c95a540481?rik=Apfy%2b1%2buGWNiCg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"D6A9A03CDF3ACB74E5840A626319AE5FFBF29702","accentColor":"694F43"},"717CF50D6E5810A579AEB0568EF0EB37C1F0B08F":{"name":"NCB Drug Case: WhatsApp Officially Denies Any Chats Being Leaked Out","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.dbpw1ZfQoN93RLuCXImv5AHaD4?pid=Api","datePublished":"2020-09-25T09:16:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://im.indiatimes.in/content/2020/Sep/Facebook-Image-3_5f6c726ea4b22.jpg","hostPageUrl":"https://www.indiatimes.com/technology/news/ncb-drug-case-whatsapp-chat-leak-523646.html","contentSize":"57340 B","width":800,"height":420,"cDNContentUrl":"https://th.bing.com/th/id/R.75ba70d597d0a0df7744bb825c89afe4?rik=F8df0OaFAVqX6g&pid=ImgRaw&r=0","isTransparent":false,"imageId":"F80B0F1C73BE0FE8650BEA975A0185E6D05FC717","accentColor":"76555D"},"86CE3BA4B3E1E1AA3F493C8DEEBDC7276D59A28E":{"name":"How To Lock A Folder In Windows 10 If You Want To Protect Your Files ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.JmahpABPoWIke151lxUVCgHaG8?pid=Api","datePublished":"2020-02-07T09:32:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://img.mobygeek.com/resize/730x-/2020/02/07/how-to-lock-a-folder-in-windows-10-5-e31e.jpg","hostPageUrl":"https://mobygeek.com/how-to/how-to-lock-a-folder-in-windows-10-11607","contentSize":"93766 B","width":730,"height":684,"cDNContentUrl":"https://th.bing.com/th/id/R.2666a1a4004fa162247b5e759715150a?rik=aOyzSjseHqrzlA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E82A95D6727CDBEED8C394F3AA1E1E3B4AB3EC68","accentColor":"3E5F8D"}},"relatedSearches":[{"text":"Aes Encryption Diagram","displayText":"Aes Encryption Diagram","webSearchUrl":"https://www.bing.com/images/search?q=Aes+Encryption+Diagram&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5724.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Aes+Encryption+Diagram","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Aes+Encryption+Diagram&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Aes Encryption Process Diagram","displayText":"Aes Encryption Process Diagram","webSearchUrl":"https://www.bing.com/images/search?q=Aes+Encryption+Process+Diagram&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5726.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Aes+Encryption+Process+Diagram","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Aes+Encryption+Process+Diagram&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Aes Encryption Function Diagram","displayText":"Aes Encryption Function Diagram","webSearchUrl":"https://www.bing.com/images/search?q=Aes+Encryption+Function+Diagram&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5728.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Aes+Encryption+Function+Diagram","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Aes+Encryption+Function+Diagram&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Aes Encryption Block Diagram","displayText":"Aes Encryption Block Diagram","webSearchUrl":"https://www.bing.com/images/search?q=Aes+Encryption+Block+Diagram&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5730.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Aes+Encryption+Block+Diagram","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Aes+Encryption+Block+Diagram&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Aes Encryption Algorithm","displayText":"Aes Encryption Algorithm","webSearchUrl":"https://www.bing.com/images/search?q=Aes+Encryption+Algorithm&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5732.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Aes+Encryption+Algorithm","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Aes+Encryption+Algorithm&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Rsa Encryption Process Diagram","displayText":"Rsa Encryption Process Diagram","webSearchUrl":"https://www.bing.com/images/search?q=Rsa+Encryption+Process+Diagram&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5734.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Rsa+Encryption+Process+Diagram","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Rsa+Encryption+Process+Diagram&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Rsa Encryption Diagram","displayText":"Rsa Encryption Diagram","webSearchUrl":"https://www.bing.com/images/search?q=Rsa+Encryption+Diagram&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5736.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Rsa+Encryption+Diagram","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Rsa+Encryption+Diagram&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Aes Encryption Flow Chart","displayText":"Aes Encryption Flow Chart","webSearchUrl":"https://www.bing.com/images/search?q=Aes+Encryption+Flow+Chart&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5738.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Aes+Encryption+Flow+Chart","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Aes+Encryption+Flow+Chart&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Aes Encryption Process","displayText":"Aes Encryption Process","webSearchUrl":"https://www.bing.com/images/search?q=Aes+Encryption+Process&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5740.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Aes+Encryption+Process","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Aes+Encryption+Process&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Aes Encryption And Decryption Diagram","displayText":"Aes Encryption And Decryption Diagram","webSearchUrl":"https://www.bing.com/images/search?q=Aes+Encryption+And+Decryption+Diagram&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5742.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Aes+Encryption+And+Decryption+Diagram","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Aes+Encryption+And+Decryption+Diagram&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Aes Encryption Flowchart","displayText":"Aes Encryption Flowchart","webSearchUrl":"https://www.bing.com/images/search?q=Aes+Encryption+Flowchart&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5744.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Aes+Encryption+Flowchart","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Aes+Encryption+Flowchart&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Aes Encryption Architecture Diagram","displayText":"Aes Encryption Architecture Diagram","webSearchUrl":"https://www.bing.com/images/search?q=Aes+Encryption+Architecture+Diagram&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5746.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Aes+Encryption+Architecture+Diagram","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Aes+Encryption+Architecture+Diagram&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Aes Encryption Algorithm Use Case Diagram","displayText":"Aes Encryption Algorithm Use Case Diagram","webSearchUrl":"https://www.bing.com/images/search?q=Aes+Encryption+Algorithm+Use+Case+Diagram&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5748.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Aes+Encryption+Algorithm+Use+Case+Diagram","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Aes+Encryption+Algorithm+Use+Case+Diagram&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Des Encryption Diagram","displayText":"Des Encryption Diagram","webSearchUrl":"https://www.bing.com/images/search?q=Des+Encryption+Diagram&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5750.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Des+Encryption+Diagram","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Des+Encryption+Diagram&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Encryption In Aes","displayText":"Encryption In Aes","webSearchUrl":"https://www.bing.com/images/search?q=Encryption+In+Aes&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5752.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Encryption+In+Aes","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Encryption+In+Aes&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Aes Encryption Flow","displayText":"Aes Encryption Flow","webSearchUrl":"https://www.bing.com/images/search?q=Aes+Encryption+Flow&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5754.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Aes+Encryption+Flow","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Aes+Encryption+Flow&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Aes Encryption Steps","displayText":"Aes Encryption Steps","webSearchUrl":"https://www.bing.com/images/search?q=Aes+Encryption+Steps&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5756.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Aes+Encryption+Steps","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Aes+Encryption+Steps&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Aes Encryption Algorithm Flowchart","displayText":"Aes Encryption Algorithm Flowchart","webSearchUrl":"https://www.bing.com/images/search?q=Aes+Encryption+Algorithm+Flowchart&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5758.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Aes+Encryption+Algorithm+Flowchart","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Aes+Encryption+Algorithm+Flowchart&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Assymetric Encryption Diagram","displayText":"Assymetric Encryption Diagram","webSearchUrl":"https://www.bing.com/images/search?q=Assymetric+Encryption+Diagram&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5760.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Assymetric+Encryption+Diagram","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Assymetric+Encryption+Diagram&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Aes Encryption Explained","displayText":"Aes Encryption Explained","webSearchUrl":"https://www.bing.com/images/search?q=Aes+Encryption+Explained&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5762.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Aes+Encryption+Explained","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Aes+Encryption+Explained&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}}],"createdate":1769239491049}
[curl_error] =>
[product_name_used] => Aes-Encryption-Algorithm-Use-Case-Diagram
[parsed] => Array
(
[name] => aes-encryption-algorithm-use-case-diagram inr loc:in
[totalEstimatedMatches] => 100
[nextOffset] => 100
[currentOffset] => 0
[value] => Array
(
[770C287851BC603CE42013B75F9F6A1E34D14FAE] => Array
(
[name] => AES encryption for Radio remote Controls
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP._eUzBCMY1eyLCqesAT1dfgHaDv?pid=Api
[datePublished] => 2020-07-21T04:08:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.anandcontrol.in/dist/assets/img/radio/aes_encryption.jpg
[hostPageUrl] => https://www.anandcontrol.in/blog/aes_encryption_radio_remote_controls.html
[contentSize] => 55128 B
[width] => 1600
[height] => 809
[cDNContentUrl] => https://th.bing.com/th/id/R.fde533042318d5ec8b0aa7ac013d5d7e?rik=d8CChxXLBsNOAg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => EAF41D43E1A6F9F57B31024EC306CB158782C077
[accentColor] => 0A7EC1
)
[05D8C6BE9FE064EDD8239DF74DA77CEED5DA84B0] => Array
(
[name] => Top 8 Strongest Data Encryption Algorithms in Cryptography
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP._AmD9FmXegNtZ92-ASX9kAHaED?pid=Api
[datePublished] => 2020-01-21T10:32:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://acodez.in/wp-content/uploads/2020/01/Asymmetric-Encryption.png
[hostPageUrl] => https://acodez.in/data-encryption-algorithms/
[contentSize] => 42146 B
[width] => 796
[height] => 435
[cDNContentUrl] => https://th.bing.com/th/id/R.fc0983f459977a036d67ddbe0125fd90?rik=UI1s6%2fkORt6NMg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 0B48AD5DEEC77AD47FD9328DDE460EF9EB6C8D50
[accentColor] => 264D7F
)
[26CB59EBD404814C1428A21DABA90D85A66D020C] => Array
(
[name] => An Efficient Encryption Algorithm for the Security of Sensitive Private ...
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.xWSbLS1NxnBoazwx5g2N8gHaJo?pid=Api
[datePublished] => 2019-10-25T09:01:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://pub.mdpi-res.com/electronics/electronics-08-01220/article_deploy/html/images/electronics-08-01220-g001.png?1574878782
[hostPageUrl] => https://www.mdpi.com/2079-9292/8/11/1220
[contentSize] => 101633 B
[width] => 1983
[height] => 2578
[cDNContentUrl] => https://th.bing.com/th/id/R.c5649b2d2d4dc670686b3c31e60d8df2?rik=YryVvk1AGMRBgg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => C020D66A58D09ABAD12A8241C418404DBE95BC62
[accentColor] => 3B3B3B
)
[047EBB7FBA9EA6C60460641D095B03C6751AED89] => Array
(
[name] => AES Cryptography - Advance encryption algorithm - Asigmumemt en AES ...
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.P-KyVWEGcGZrbJZJw4ijzQHaKe?pid=Api
[datePublished] => 2024-11-24T16:29:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/07612162ef3bc4c330fc27b2331c5080/thumb_1200_1698.png
[hostPageUrl] => https://www.studocu.com/in/document/rajiv-gandhi-proudyogiki-vishwavidyalaya/cryptography-and-network-security/aes-cryptography-advance-encryption-algorithm/111766582
[contentSize] => 971577 B
[width] => 1200
[height] => 1698
[cDNContentUrl] => https://th.bing.com/th/id/R.3fe2b255610670666b6c9649c388a3cd?rik=QOe796vpamxABg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 98DEA1576C30B590D14606406C6AE9ABF7BBE740
[accentColor] => 966635
)
[CFA13D2ED221C0E7020CE6AAFC88089894CA944A] => Array
(
[name] => Hybrid Encryption Algorithm Based on AES&RC5 to Improve Data Security ...
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.fop_H2i4AW18jRzK672adAAAAA?pid=Api
[datePublished] => 2022-03-11T10:22:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => http://rukmini1.flixcart.com/image/300/300/kiqbma80-0/book/k/g/c/hybrid-encryption-algorithm-based-on-aes-rc5-to-improve-data-original-imafygd7exjuevy9.jpeg
[hostPageUrl] => https://www.flipkart.com/hybrid-encryption-algorithm-based-aes-rc5-improve-data-security/p/itm3cb22f80c8f9b
[contentSize] => 15480 B
[width] => 200
[height] => 300
[cDNContentUrl] => https://th.bing.com/th/id/R.7e8a7f1f68b8016d7c8d1ccaebbd9a74?rik=%2fBrT4i0SDH4gwA&riu=http%3a%2f%2frukmini1.flixcart.com%2fimage%2f300%2f300%2fkiqbma80-0%2fbook%2fk%2fg%2fc%2fhybrid-encryption-algorithm-based-on-aes-rc5-to-improve-data-original-imafygd7exjuevy9.jpeg&ehk=wkb3vzg8fULPRd8k6XRk6AEwcRPRFxplrsgAlxa%2fxtg%3d&risl=&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => A449AC49898088CFAA6EC0207E0C122DE2D31AFC
[accentColor] => AE1D20
)
[612B1C184A635A53D4D19DF74DA77CEED5DA84B0] => Array
(
[name] => Top 8 Strongest Data Encryption Algorithms in Cryptography
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.bX-gzxfQ0qaudrPs5zwymQHaEj?pid=Api
[datePublished] => 2020-01-21T10:32:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://acodez.in/wp-content/uploads/2020/01/how-encryption-works-symmetric-encryption.png
[hostPageUrl] => https://acodez.in/data-encryption-algorithms/
[contentSize] => 67377 B
[width] => 664
[height] => 408
[cDNContentUrl] => https://th.bing.com/th/id/R.6d7fa0cf17d0d2a6ae76b3ece73c3299?rik=FrLBgaQ2pTVNHQ&pid=ImgRaw&r=0
[isTransparent] => 1
[imageId] => 0B48AD5DEEC77AD47FD91D4D35A536A481C1B216
[accentColor] => BE550D
)
[E73F088A22FD8B31A4862F7823FF9B872113CBD1] => Array
(
[name] => Advanced Encryption Standard & AES Rijndael Explained | Splunk
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.w9PImoGnkGOT70CWZbDf_AHaEI?pid=Api
[datePublished] => 2023-02-15T00:00:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.splunk.com/content/dam/splunk-blogs/images/en_us/2025/05/llms-best-to-use0.jpg
[hostPageUrl] => https://www.splunk.com/en_us/blog/learn/aes-advanced-encryption-standard.html
[contentSize] => 109635 B
[width] => 2020
[height] => 1126
[cDNContentUrl] => https://th.bing.com/th/id/R.c3d3c89a81a7906393ef409665b0dffc?rik=fvOAqCLfuBNKaA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 1DBC311278B9FF3287F2684A13B8DF22A880F37E
[accentColor] => 197AB2
)
[810EFBE112F579F589A2DC2126D50A6D9224A0EC] => Array
(
[name] => Data Encryption: Securing Data at Rest and in Transit with Encryption ...
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.-Dx7CNjZQ3052RRP-C9dmQHaED?pid=Api
[datePublished] => 2023-08-19T07:28:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://dev-to-uploads.s3.amazonaws.com/uploads/articles/nrrd7d2ev32lp1e4e59j.png
[hostPageUrl] => https://j471n.in/blogs/data-encryption-securing-data-at-rest-and-in-transit-with-encryption-technologies
[contentSize] => 227905 B
[width] => 2000
[height] => 1094
[cDNContentUrl] => https://th.bing.com/th/id/R.f83c7b08d8d9437d39d9144ff82f5d99?rik=GOC%2fHiFfl1%2bYKg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => CE0A4229D6A05D6212CD2A985F975F211EBFE018
[accentColor] => B88713
)
[BE02A6B023FBBFAFBEF8B81A51422126BCB53E37] => Array
(
[name] => Types et méthodes de chiffrement des données : une introduction | Splunk
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.SdvR47ktRyvY0JgWjX1xbwHaFK?pid=Api
[datePublished] => 2025-05-10T03:52:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.splunk.com/content/dam/splunk-blogs/images/en_us/2023/02/triple-des2.png
[hostPageUrl] => https://www.splunk.com/fr_fr/blog/learn/data-encryption-methods-types.html
[contentSize] => 17218 B
[width] => 602
[height] => 420
[cDNContentUrl] => https://th.bing.com/th/id/R.49dbd1e3b92d472bd8d098168d7d716f?rik=6yBqCzK%2f%2b%2frrjw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 73E35BCB62122415A18B8FEBFAFBBF320B6A20EB
[accentColor] => 666666
)
[3AD52E66940F8412D21CA1B85F89DF13F6E978EC] => Array
(
[name] => What is Digital Signature, Type of Digital Signature, Difference in ...
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.kDKMHPh7Ouy_jOkeFU_xHQHaEj?pid=Api
[datePublished] => 2021-08-09T14:53:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://static.wixstatic.com/media/4c0a1d_bef86910b52f41c68c5d8f608f7602d2~mv2.jpg/v1/fill/w_617,h_380,al_c/4c0a1d_bef86910b52f41c68c5d8f608f7602d2~mv2.jpg
[hostPageUrl] => https://www.digital-signatures.in/about-digital-signature-what-is-digital-signature
[contentSize] => 33670 B
[width] => 617
[height] => 380
[cDNContentUrl] => https://th.bing.com/th/id/R.90328c1cf87b3aecbf8ce91e154ff11d?rik=o13iZknwSCEtwQ&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => CE879E6F31FD98F58B1AC12D2148F04966E25DA3
[accentColor] => B32A18
)
[B9D52E53F850D67FB17372BA185F69279DC7F719] => Array
(
[name] => Common REST API Authentication Methods
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.3hFdTNihL0fcuBsagMayZAHaEa?pid=Api
[datePublished] => 2025-02-20T13:37:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.swimlane.com/assets/uploads/images/OAuth2-Authentication-Diagram-2.png
[hostPageUrl] => https://www.1985.co.in/blog/securing-your-integration-layer/
[contentSize] => 35022 B
[width] => 2087
[height] => 1245
[cDNContentUrl] => https://th.bing.com/th/id/R.de115d4cd8a12f47dcb81b1a80c6b264?rik=m13iNY8FbfcbNw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 917F7CD97296F581AB27371BF76D058F35E25D9B
[accentColor] => 1D2885
)
[5E04A1ED8D97D45DDF66B8373115F1D2451FB9C5] => Array
(
[name] => Use Case Diagram Relationships Explained with Examples - In fact many ...
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.wBdBqojpPNsiyOCoAZFgAgHaJl?pid=Api
[datePublished] => 2022-11-17T10:00:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/2953b320e1c8d89d597609b07b6b2ee1/thumb_1200_1553.png
[hostPageUrl] => https://www.studocu.com/in/document/apj-abdul-kalam-technological-university/software-architecture-and-design-patterns/use-case-diagram-relationships-explained-with-examples/29401891
[contentSize] => 282837 B
[width] => 1200
[height] => 1553
[cDNContentUrl] => https://th.bing.com/th/id/R.c01741aa88e93cdb22c8e0a801916002?rik=5UAa3th5TdX9Zg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 5C9BF1542D1F5113738B66FDD54D79D8DE1A40E5
[accentColor] => 0000CC
)
[1A48ABE7662B68D76F64DC2126D50A6D9224A0EC] => Array
(
[name] => Data Encryption: Securing Data at Rest and in Transit with Encryption ...
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.ZfOWBYEpLqfoVV0RfH3R0AHaDa?pid=Api
[datePublished] => 2023-08-19T07:28:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://dev-to-uploads.s3.amazonaws.com/uploads/articles/lreszt6pqw335q18fe4d.png
[hostPageUrl] => https://j471n.in/blogs/data-encryption-securing-data-at-rest-and-in-transit-with-encryption-technologies
[contentSize] => 175940 B
[width] => 2000
[height] => 921
[cDNContentUrl] => https://th.bing.com/th/id/R.65f3960581292ea7e8555d117c7dd1d0?rik=oYS6fmayhn32Rg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => CE0A4229D6A05D6212CD46F67D86B2667EBA84A1
[accentColor] => 736658
)
[CCDECF4A3FCE797D0FB402688DB95A3604E262DE] => Array
(
[name] => Securing Converged Wired/Wireless LAN Designs: Part 1 - EE Times
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.y1LH09oYHyV7H0d9QRfZewAAAA?pid=Api
[datePublished] => 2020-09-14T07:33:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.eetimes.com/wp-content/uploads/media-1055554-sinettpt1-fig3.jpg
[hostPageUrl] => https://www.eetimes.com/securing-converged-wired-wireless-lan-designs-part-1-2/
[contentSize] => 18408 B
[width] => 450
[height] => 238
[cDNContentUrl] => https://th.bing.com/th/id/R.cb52c7d3da181f257b1f477d4117d97b?rik=zO38pPPsl9fwSw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => ED262E4063A59BD886204BF0D797ECF3A4FCEDCC
[accentColor] => B9B912
)
[11955870EB773FC34073825E0457AC58B0B4041C] => Array
(
[name] => Cyber Swachhta Kendra: WastedLocker Ransomware
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.CLJ5Bu9V9u2F1uqQCqEoDAHaMv?pid=Api
[datePublished] => 2020-07-17T07:14:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.csk.gov.in/image/other/wlr01.jpg
[hostPageUrl] => https://www.csk.gov.in/alerts/WastedLockerRansomware.html
[contentSize] => 515221 B
[width] => 1076
[height] => 1851
[cDNContentUrl] => https://th.bing.com/th/id/R.08b27906ef55f6ed85d6ea900aa1280c?rik=EVmFB7538zwENw&pid=ImgRaw&r=0
[isTransparent] => 1
[imageId] => C1404B0B85CA7540E52837043CF377BE07855911
[accentColor] => 0196C6
)
[111E7EAF4A9601F1B6B36A223FE35AC60ECA90F1] => Array
(
[name] => AES Algorithm : Explanation with Animation ~ I. T. Engg Portal
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.bZXg9URVkDUAG3ulU1AxiQAAAA?pid=Api
[datePublished] => 2011-10-05T20:42:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://lh3.googleusercontent.com/proxy/H5ddS1w7A-qNE0N_OV7rhIqTsCARe06l56sbNP6cf39AP-qtKzFkN6sgAwMgS08K1CHwnr99NuxJKtGVScSBAR8dX8WlRoJKeyaKAm-toEcjqZSXMCMiQS38Xyu0z3wH=w1200-h630-p-k-no-nu
[hostPageUrl] => http://www.itportal.in/2011/10/aes-algorithm.html
[contentSize] => 9318 B
[width] => 297
[height] => 268
[cDNContentUrl] => https://th.bing.com/th/id/R.6d95e0f544559035001b7ba553503189?rik=EeHn%2bqRpEB9rOw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 1F09ACE06CA53EF322A63B6B1F1069A4FAE7E111
[accentColor] => C70504
)
[26EF1265F546D061A0B59379BADBF807B751631D] => Array
(
[name] => Visakha Institue of Engg & Technology
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.54Zjju7EC7yiy7hb9Zn_6AHaFj?pid=Api
[datePublished] => 2023-06-10T13:37:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.viet.edu.in/img/courses-tab/ug/CSE/projects/batch-7-project.jpg
[hostPageUrl] => https://www.viet.edu.in/CSE.php
[contentSize] => 64885 B
[width] => 602
[height] => 451
[cDNContentUrl] => https://th.bing.com/th/id/R.e786638eeec40bbca2cbb85bf599ffe8?rik=Yv4hVl9kDRYKWw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => D136157B708FBDAB97395B0A160D645F5621FE62
[accentColor] => 507B75
)
[130D906B90D3E05ADD96B81A51422126BCB53E37] => Array
(
[name] => Types et méthodes de chiffrement des données : une introduction | Splunk
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.EyhgPyqMc1Ni01B3ta6TZAHaGx?pid=Api
[datePublished] => 2025-05-10T03:52:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.splunk.com/content/dam/splunk-blogs/images/en_us/2023/02/key-mgmt1.png
[hostPageUrl] => https://www.splunk.com/fr_fr/blog/learn/data-encryption-methods-types.html
[contentSize] => 20249 B
[width] => 500
[height] => 457
[cDNContentUrl] => https://th.bing.com/th/id/R.1328603f2a8c735362d35077b5ae9364?rik=MdAJtgk9DqXdaQ&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 73E35BCB62122415A18B69DDA50E3D09B609D031
[accentColor] => C60579
)
[86D61A425183E7F44C7EE45F50830A9AA712398C] => Array
(
[name] => SSH Tutorial: What is SSH, Encryptions and Ports
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.RNTZNhz5kNlQVMZKxyU57wHaEm?pid=Api
[datePublished] => 2017-07-04T04:09:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.hostinger.in/tutorials/wp-content/uploads/sites/2/2017/07/asymmetric-encryption.jpg
[hostPageUrl] => https://www.hostinger.in/tutorials/ssh-tutorial-how-does-ssh-work
[contentSize] => 39122 B
[width] => 900
[height] => 560
[cDNContentUrl] => https://th.bing.com/th/id/R.44d4d9361cf990d95054c64ac72539ef?rik=aG2hJBU4fk%2fE5w&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => C893217AA9A03805F54EE7C44F7E381524A16D68
[accentColor] => AB2030
)
[41AA3A99D082BE34A614333C572F62B9D9304458] => Array
(
[name] => Research Paper on Breast Cancer Prediction Using Machine Learning
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.1XibqcLAkuR53Xgwp44-dAAAAA?pid=Api
[datePublished] => 2022-07-31T18:43:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.ijraset.com/images/text_version_uploads/imag%201_14432.png
[hostPageUrl] => https://www.ijraset.com/research-paper/paper-on-breast-cancer-prediction-using-machine-learning
[contentSize] => 48089 B
[width] => 466
[height] => 368
[cDNContentUrl] => https://th.bing.com/th/id/R.d5789ba9c2c092e479dd7830a78e3e74?rik=FKqjmQ0o60NqQQ&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 8544039D9B26F275C333416A43EB280D99A3AA14
[accentColor] => 141414
)
[A170F9B8A8306B6BA3A0506D9487F501194D8734] => Array
(
[name] => Use Case Diagram for CRM System for You
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.DntZK6Cr1KOP0znpTT3CtQHaEQ?pid=Api
[datePublished] => 2024-11-14T03:06:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://images.wondershare.com/edrawmax/templates/use-case-diagram-for-book-publishing.png
[hostPageUrl] => https://edrawmax.wondershare.com/templates/use-case-diagram-for-crm-system.html
[contentSize] => 105534 B
[width] => 1516
[height] => 872
[cDNContentUrl] => https://th.bing.com/th/id/R.0e7b592ba0abd4a38fd339e94d3dc2b5?rik=Ggefi4oDtrY6Cg&pid=ImgRaw&r=0
[isTransparent] => 1
[imageId] => 4378D491105F7849D6050A3AB6B6038A8B9F071A
[accentColor] => C80304
)
[405E24CEE123C30658F3F0130565146600D8B435] => Array
(
[name] => Data Encryption Standard
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.hCaVEZYCVOaeYxlsIfP6JwHaIv?pid=Api
[datePublished] => 2022-12-25T14:49:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://manansingh.github.io/Cryptolab-Offline/images/c/des-1.GIF
[hostPageUrl] => https://pclub.in/cryptography/2019/04/15/des/
[contentSize] => 9201 B
[width] => 663
[height] => 783
[cDNContentUrl] => https://th.bing.com/th/id/R.84269511960254e69e63196c21f3fa27?rik=BOVC7B4yPGCFPw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 534B8D0066415650310F3F85603C321EEC42E504
[accentColor] => 1B1B1B
)
[D724DD22975161596BEC5519D7E6AFFB418F68FE] => Array
(
[name] => Backpropagation
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.GOmyJGzqoxcPYnEpXoU_kAHaD2?pid=Api
[datePublished] => 2021-07-28T14:32:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.guru99.com/images/1/030819_0937_BackPropaga1.png
[hostPageUrl] => https://www.niser.ac.in/~smishra/teach/cs460/2020/lectures/lec19_1/
[contentSize] => 127040 B
[width] => 883
[height] => 460
[cDNContentUrl] => https://th.bing.com/th/id/R.18e9b2246ceaa3170f6271295e853f90?rik=fULdInkVFpW2zg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => EF86F814BFFA6E7D9155CEB69516157922DD427D
[accentColor] => 40CC00
)
[0E8096DB9B1A1D7E8B18F802D02F739049A20F1A] => Array
(
[name] => Pixrron - Food and Drinks
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.F4bAnNtUPWfxVxsC_I60fAHaDv?pid=Api
[datePublished] => 2020-06-05T13:35:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://1.bp.blogspot.com/-OAKVPFtMGWU/Xp56zWF5MRI/AAAAAAAADNU/RGyR5jBOVD4GryZat1T77_-6InPftvb6wCLcBGAsYHQ/s1600/IMPORTANCE%2BOF%2BDATA%2BENCRYPTION.png
[hostPageUrl] => https://www.pixrron.in/2020/03/what-is-data-encryption-encryption.html
[contentSize] => 149838 B
[width] => 1600
[height] => 809
[cDNContentUrl] => https://th.bing.com/th/id/R.1786c09cdb543d67f1571b02fc8eb47c?rik=4Ahpvbmh0ee4gQ&pid=ImgRaw&r=0
[isTransparent] => 1
[imageId] => A1F02A940937F20D208F81B8E7D1A1B9BD6908E0
[accentColor] => 019E86
)
[DA3F7494940AF2D2D2EA4912ECF6A9DD7BED5339] => Array
(
[name] => What Is TLS (Transport Layer Security) And How It Works
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.NU19tt9whB9pGm2Ng24VPwHaFU?pid=Api
[datePublished] => 2022-09-09T14:11:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.hostinger.in/tutorials/wp-content/uploads/sites/2/2022/09/image1.png
[hostPageUrl] => https://www.hostinger.in/tutorials/what-is-tls
[contentSize] => 38787 B
[width] => 1601
[height] => 1149
[cDNContentUrl] => https://th.bing.com/th/id/R.354d7db6df70841f691a6d8d836e153f?rik=rfNHSUmgLy0trg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 9335DEB7DD9A6FCE2194AE2D2D2FA0494947F3AD
[accentColor] => 0434C7
)
[8173CF482C9D21788F70333C572F62B9D9304458] => Array
(
[name] => Research Paper on Breast Cancer Prediction Using Machine Learning
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.wM4O4HOX1-LphgaaICI_4wAAAA?pid=Api
[datePublished] => 2022-07-31T18:43:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.ijraset.com/images/text_version_uploads/imag%201_14434.png
[hostPageUrl] => https://www.ijraset.com/research-paper/paper-on-breast-cancer-prediction-using-machine-learning
[contentSize] => 24040 B
[width] => 324
[height] => 286
[cDNContentUrl] => https://th.bing.com/th/id/R.c0ce0ee07397d7e2e986069a20223fe3?rik=GDf8hMLZEof4Bw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 8544039D9B26F275C33307F88712D9C284FC3718
[accentColor] => 0C0C0C
)
[9F0A13C9D0F50F4A1035FB8A9A3A02E70C9E028D] => Array
(
[name] => Зачем нужны криптовалютные кошельки? — Teletype
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.5UFYfuDZHwjd2gHavEtORwHaD9?pid=Api
[datePublished] => 2023-04-07T15:48:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://cheapsslsecurity.com/p/wp-content/uploads/2019/08/private-key-encryption.png
[hostPageUrl] => https://teletype.in/@cryptoscamm/wallet_basic
[contentSize] => 22502 B
[width] => 624
[height] => 334
[cDNContentUrl] => https://th.bing.com/th/id/R.e541587ee0d91f08ddda01dabc4b4e47?rik=%2baAxnA1f8KQBUw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => D820E9C07E20A3A9A8BF5301A4F05F0D9C31A0F9
[accentColor] => BB3810
)
[5E73285DE8EF4D36D285506D9487F501194D8734] => Array
(
[name] => Use Case Diagram for CRM System for You
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.B77VvwuhT7ddHQIob8L74gHaEQ?pid=Api
[datePublished] => 2024-11-14T03:06:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://images.wondershare.com/edrawmax/templates/use-case-diagram-for-online-ticketing-system.png
[hostPageUrl] => https://edrawmax.wondershare.com/templates/use-case-diagram-for-crm-system.html
[contentSize] => 99966 B
[width] => 1516
[height] => 872
[cDNContentUrl] => https://th.bing.com/th/id/R.07bed5bf0ba14fb75d1d02286fc2fbe2?rik=5TeC1Y7%2b1GMtWA&pid=ImgRaw&r=0
[isTransparent] => 1
[imageId] => 4378D491105F7849D605582D63D4FE8ED58237E5
[accentColor] => C0110B
)
[AFD20DFD2A72F706626451492A360EBA79419C1E] => Array
(
[name] => Final-Case tools-Print Out - 1. PASSPORT AUTOMATION SYSTEM USE CASE ...
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.77RqFMx4MHJ1OAE9gEQG7AHaJl?pid=Api
[datePublished] => 2022-09-17T09:16:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/ad19c27282b08bc6ae8109a714e7f2a3/thumb_1200_1553.png
[hostPageUrl] => https://www.studocu.com/in/document/panimalar-institute-of-technology/networks/final-case-tools-print-out/31947512
[contentSize] => 168424 B
[width] => 1200
[height] => 1553
[cDNContentUrl] => https://th.bing.com/th/id/R.efb46a14cc7830727538013d804406ec?rik=%2bi3Q36Inf2AmRg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => E1C91497ABE063A294154626607F27A2DFD02DFA
[accentColor] => 1499B7
)
[BC8324DFBB5F7F1E93941C29977C19452F713612] => Array
(
[name] => What Are the Different Types of Encryption?
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.9XQnV2TjTtwg9SfCynOAdQHaDt?pid=Api
[datePublished] => 2021-01-11T11:44:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://in-media.apjonlinecdn.com/wysiwyg/blog/cybersecurity.jpg
[hostPageUrl] => https://www.hp.com/in-en/shop/tech-takes/post/what-are-the-different-types-of-encryption
[contentSize] => 49433 B
[width] => 1000
[height] => 500
[cDNContentUrl] => https://th.bing.com/th/id/R.f574275764e34edc20f527c2ca738075?rik=yzhC%2fbv19%2bE5SQ&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 216317F25491C77992C14939E1F7F5BBFD4238CB
[accentColor] => 9A8231
)
[C5FC3543D3C5AF5AD1CF750FF4F54EB1FA5A7769] => Array
(
[name] => What is Elliptic Curve Cryptography (ECC) Discuss ECC algorithm with ...
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.y0ENmn-Bw1byCD0t1brCWAHaJl?pid=Api
[datePublished] => 2023-03-02T02:38:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/fab92a17457959c344d7273f210a4b31/thumb_1200_1553.png
[hostPageUrl] => https://www.studocu.com/in/document/jain-deemed-to-be-university/information-security/what-is-elliptic-curve-cryptography-ecc-discuss-ecc-algorithm-with-neat-diagram/48980482
[contentSize] => 175643 B
[width] => 1200
[height] => 1553
[cDNContentUrl] => https://th.bing.com/th/id/R.cb410d9a7f81c356f2083d2dd5bac258?rik=XM9TND1c%2bqUd%2fA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 9677A5AF1BE45F4FF057FC1DA5FA5C3D3453CF5C
[accentColor] => C93102
)
[BFF6451AE61CE0DD7964F456DBA541D3B9F2EF6E] => Array
(
[name] => eLearning - Use Case Diagram - Admin | Download Project Diagram
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.sNuL9TMmDwZSH3vOnqhM1wHaIA?pid=Api
[datePublished] => 2023-10-11T02:10:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://programmer2programmer.net/tips/project_diagram/diagram-images/eLearning%20System/eLearning%20-%20Use%20Case%20Diagram%20-%20%20Admin.jpg
[hostPageUrl] => https://programmer2programmer.net/tips/project_diagram/downlaod_diagram.aspx?category=Class%20Diagram&diagram=eLearning%20-%20Use%20Case%20Diagram%20-%20%20Admin&diaid=13
[contentSize] => 130872 B
[width] => 570
[height] => 616
[cDNContentUrl] => https://th.bing.com/th/id/R.b0db8bf533260f06521f7bce9ea84cd7?rik=%2b29UoW7BDt2XRg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => E6FE2F9B3D145ABD654F4697DD0EC16EA1546FFB
[accentColor] => 05C6C3
)
[D5952D3E51F6CA6E8D5F9AE50AA80A840F879A0F] => Array
(
[name] => Software Requirements : Use Case Diagram
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.hCvzRmhn_oTEtyaOikCwfQHaF7?pid=Api
[datePublished] => 2018-06-28T18:17:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://minigranth.in/software-engineering-tutorial/images/tutorials/SOFTENGI%20IMAGES/Attendance%20System%20USe%20case%20diagram.jpeg
[hostPageUrl] => https://minigranth.in/software-engineering-tutorial/software-requirements-sdlc
[contentSize] => 34919 B
[width] => 605
[height] => 485
[cDNContentUrl] => https://th.bing.com/th/id/R.842bf3466867fe84c4b7268e8a40b07d?rik=XVnS4xVvrObY9Q&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => F0A978F048A08AA05EA9F5D8E6AC6F15E3D2595D
[accentColor] => 1CAF1E
)
[3FFDCDC1A49FF75D1D27FCCB77E7CA7CD38860F2] => Array
(
[name] => Computer Science Project Diagram
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.0xk3pv08I-fjbpeItI2eDwHaHG?pid=Api
[datePublished] => 2023-04-10T13:45:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://programmer2programmer.net/tips/project_diagram/diagram-images/Hotel%20Management%20System/Hotel%20Management%20System%20-%20Use%20Case%20-%20User%20Login.jpg
[hostPageUrl] => https://programmer2programmer.net/tips/project_diagram/downlaod_diagram.aspx?category=use%20case%20diagram&diagram=Hotel%20Management%20System%20-%20Use%20Case%20-%20User%20Login&diaid=28
[contentSize] => 82774 B
[width] => 641
[height] => 615
[cDNContentUrl] => https://th.bing.com/th/id/R.d31937a6fd3c23e7e36e9788b48d9e0f?rik=89%2fcHEr5f9XRcg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 2F06883DC7AC7E77BCCF72D1D57FF94A1CDCDFF3
[accentColor] => 0912C2
)
[FC3FEF171A3299E72377692E4AAF97A0AE84200A] => Array
(
[name] => Caesar cipher encryption and decryption python code solution ...
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.4o4w7zhNJ3HfblQCT9LuIQHaEK?pid=Api
[datePublished] => 2023-02-04T08:04:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => http://www.innovativecodesacademy.in/wp-content/uploads/2022/01/Caesar-cipher-encryption-1024x576.png
[hostPageUrl] => http://www.innovativecodesacademy.in/caesar-cipher-encryption-and-decryption-python-code-solution/
[contentSize] => 70464 B
[width] => 1024
[height] => 576
[cDNContentUrl] => https://th.bing.com/th/id/R.e28e30ef384d2771df6e54024fd2ee21?rik=z%2fP%2bcaEjmX4ydw&riu=http%3a%2f%2fwww.innovativecodesacademy.in%2fwp-content%2fuploads%2f2022%2f01%2fCaesar-cipher-encryption-1024x576.png&ehk=NdNRveBX2ivyEgHcJ%2bNfy7jYR5Pdpiz3tXGMi3dnp8M%3d&risl=&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => A00248EA0A79FAA4E29677327E9923A171FEF3CF
[accentColor] => B85813
)
[1823766BCF419191942892EDE5498212525DD206] => Array
(
[name] => eCommerce - Use Case Diagram - User | Download Project Diagram
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.P-74pjbJq09h5JM--N1QiAHaG2?pid=Api
[datePublished] => 2023-10-11T02:10:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://programmer2programmer.net/tips/project_diagram/diagram-images/eCommerce/eCommerce%20-%20Use%20Case%20Diagram%20-%20User.jpg
[hostPageUrl] => https://programmer2programmer.net/tips/project_diagram/downlaod_diagram.aspx?category=Class%20Diagram&diagram=eCommerce%20-%20Use%20Case%20Diagram%20-%20User&diaid=114
[contentSize] => 82181 B
[width] => 766
[height] => 708
[cDNContentUrl] => https://th.bing.com/th/id/R.3feef8a636c9ab4f61e4933ef8dd5088?rik=gTJntvwUGRlJgg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 602DD5252128945EDE298249191914FCB6673281
[accentColor] => 3B6190
)
[4B46EFC1ED9DA7681D570E9C12D58AA5E7578367] => Array
(
[name] => Flowchart Algorithm
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.kkNTfl5RfVg4wHwLLSORCwAAAA?pid=Api
[datePublished] => 2020-12-12T16:46:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://vedveethi.co.in/PrincipleOfCLang/Algorithm%20and%20Flowchart_files/image003.jpg
[hostPageUrl] => https://vedveethi.co.in/PrincipleOfCLang/Algorithm%20and%20Flowchart.htm
[contentSize] => 16053 B
[width] => 436
[height] => 633
[cDNContentUrl] => https://th.bing.com/th/id/R.9243537e5e517d5838c07c0b2d23910b?rik=tGT%2bHN7ZeobRdQ&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 7638757E5AA85D21C9E075D1867AD9DE1CFE64B4
[accentColor] => 5F4E44
)
[FA74425EFA21C25C5DE266C391B3DCAAE893DCED] => Array
(
[name] => Algorithms and Flow Chart - C Tutorial | Study Glance
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.AOCZasfTja6hADYPsVuBMAHaIU?pid=Api
[datePublished] => 2021-12-03T09:52:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.studyglance.in/c/images/flowchart-symbols.webp
[hostPageUrl] => https://studyglance.in/c/display.php?tno=5&topic=Algorithms-and-Flow-Chart
[contentSize] => 157858 B
[width] => 1950
[height] => 2192
[cDNContentUrl] => https://th.bing.com/th/id/R.00e0996ac7d38daea100360fb15b8130?rik=r0ck5a8SLMXVLg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => DECD398EAACD3B193C662ED5C52C12AFE52447AF
[accentColor] => 656665
)
[13D31001C6FF0EC6C9D2637D48726279F973C50A] => Array
(
[name] => Apricorn Aegis Secure Key 3 NX 8GB 256-bit Encrypted FIPS 140-2 Level 3 ...
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.S9VALb-2mbY03IzzLzYRJQHaHg?pid=Api
[datePublished] => 2020-10-08T18:23:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://m.media-amazon.com/images/I/719pd2ToGxL._AC_.jpg
[hostPageUrl] => https://www.amazon.in/Apricorn-Secure-256-bit-Encrypted-Validated/dp/B07GKZWB6N
[contentSize] => 118144 B
[width] => 1857
[height] => 1884
[cDNContentUrl] => https://th.bing.com/th/id/R.4bd5402dbfb699b634dc8cf32f361125?rik=MT0BEGz%2f4GycLQ&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => A05C379F97262784D7362D9C6CE0FF6C10013D31
[accentColor] => 973436
)
[7CDA55A52AC243CD2EAB333C572F62B9D9304458] => Array
(
[name] => Research Paper on Breast Cancer Prediction Using Machine Learning
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.EZYEY5KouD3tI0HkeGSFkgAAAA?pid=Api
[datePublished] => 2022-07-31T18:43:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.ijraset.com/images/text_version_uploads/imag%201_14436.png
[hostPageUrl] => https://www.ijraset.com/research-paper/paper-on-breast-cancer-prediction-using-machine-learning
[contentSize] => 29486 B
[width] => 260
[height] => 249
[cDNContentUrl] => https://th.bing.com/th/id/R.1196046392a8b83ded2341e478648592?rik=x61VWqIsNNziug&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 8544039D9B26F275C333BAE2DC342CA25A55ADC7
[accentColor] => 666666
)
[6F182571AC981967997126864711C1594F362B14] => Array
(
[name] => A New Mixture Differential Cryptanalysis on Round-Reduced AES
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.75hVTXi2LuIMh4Uu6DdhnAHaFi?pid=Api
[datePublished] => 2022-12-13T13:06:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://pub.mdpi-res.com/mathematics/mathematics-10-04736/article_deploy/html/images/mathematics-10-04736-g003.png?1670936539
[hostPageUrl] => https://www.mdpi.com/2227-7390/10/24/4736
[contentSize] => 31902 B
[width] => 2651
[height] => 1983
[cDNContentUrl] => https://th.bing.com/th/id/R.ef98554d78b62ee20c87852ee837619c?rik=9oFSF8qJkXaZFw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 41B263F4951C117468621799769189CA175281F6
[accentColor] => CCC300
)
[B017C5B055DC2AD5758D6B1D48D417886F5DDC23] => Array
(
[name] => Construct a E-R Diagram for a Hospital with a set of patients and a set ...
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.oun79yX7wzo9FNNjKQEGdgHaHX?pid=Api
[datePublished] => 2021-10-19T12:04:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://hi-static.z-dn.net/files/d94/d4f9a0ee4d11141823929f025c8e0682.jpg
[hostPageUrl] => https://brainly.in/question/48038083
[contentSize] => 49151 B
[width] => 720
[height] => 716
[cDNContentUrl] => https://th.bing.com/th/id/R.a2e9fbf725fbc33a3d14d36329010676?rik=C3FcC1XNol1X2A&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 32CDD5F688714D84D1B6D8575DA2CD550B5C710B
[accentColor] => 5C6F5C
)
[FBBD8B8BD1CDE6121D8C9E3747C38C6C3988B0BE] => Array
(
[name] => The Importance of Data Encryption on Public Cloud Platforms - Utimaco
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.k6eLRqDbqfGgKZz3D7N2XAAAAA?pid=Api
[datePublished] => 2023-09-08T15:11:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://utimaco.com/sites/default/files/2023-03/use-case-security-for-cloud-stored-data-for-cloud-cloud-service-providers-teaser.jpg
[hostPageUrl] => https://utimaco.com/news/blog-posts/importance-data-encryption-public-cloud-platforms
[contentSize] => 109934 B
[width] => 474
[height] => 266
[cDNContentUrl] => https://th.bing.com/th/id/R.93a78b46a0dba9f1a0299cf70fb3765c?rik=v9u4uB3cbiHRyA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => EB0B8893C6C83C7473E9C8D1216EDC1DB8B8DBBF
[accentColor] => 146EB7
)
[CD7A25659CABB8234FB75BC7A9AA30867533F254] => Array
(
[name] => Virtual Labs
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.z8dSVg8MlqTkif_3Knid6wHaDx?pid=Api
[datePublished] => 2021-03-25T04:08:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://ds2-iiith.vlabs.ac.in/exp/dijkstra-algorithm/analysis/images/pseudo_algo.jpeg
[hostPageUrl] => https://ds2-iiith.vlabs.ac.in/exp/dijkstra-algorithm/analysis/time-and-space-complexity.html
[contentSize] => 65881 B
[width] => 846
[height] => 431
[cDNContentUrl] => https://th.bing.com/th/id/R.cfc752560f0c96a4e489fff72a789deb?rik=3KdSVsm6izL0ew&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 452F33576803AA9A7CB57BF4328BBAC95652A7DC
[accentColor] => 084F7F
)
[B2D30DEF4391549A642C287C534166A68BD1D5FE] => Array
(
[name] => F2L Method Explained: Why It Is Essential to Learn F2L to Solve Cube
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.5JMbl3BPUhrsZAS_Lx1_PgHaDO?pid=Api
[datePublished] => 2021-02-10T05:22:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://cdn.shopify.com/s/files/1/0270/0342/0758/files/cubing_notations_600x600.png?v=1612173651
[hostPageUrl] => https://www.cubelelo.com/blogs/cubing/f2l-method-explained-solve-rubiks-cube-under-30-seconds
[contentSize] => 125231 B
[width] => 600
[height] => 262
[cDNContentUrl] => https://th.bing.com/th/id/R.e4931b97704f521aec6404bf2f1d7f3e?rik=Kz3Q%2fjQZRalGwg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => EF5D1DB86A661435C782C246A9451934FED03D2B
[accentColor] => C30814
)
[3BCA2BD135384F221AECD603D2BA35DAA45E089F] => Array
(
[name] => Demonstrate a Use Case diagram using Unified Modeling Notation for an ...
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.oN2g4wqXBG8mtoorIWOi0QHaEM?pid=Api
[datePublished] => 2022-06-07T19:13:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://hi-static.z-dn.net/files/d8e/fa1825c917bb5e52e1fe78285010bfd5.png
[hostPageUrl] => https://brainly.in/question/52272924
[contentSize] => 48748 B
[width] => 1260
[height] => 715
[cDNContentUrl] => https://th.bing.com/th/id/R.a0dda0e30a97046f26b68a2b2163a2d1?rik=s6yyHVOD9CKhzg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => F980E54AAD53AB2D306DCEA122F483531DB2ACB3
[accentColor] => 464646
)
[A3AACAA0DC0918FB2F44BFBD8F8611FEBA1F42EC] => Array
(
[name] => ML+Cheat+Sheet 2 - ML practice material and document - - Studocu
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.RuNc9ye-SSN1LQ4Grb6qAgHaGJ?pid=Api
[datePublished] => 2022-12-16T04:20:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/1fe315b895aa2b48ad9ad3560ada0636/thumb_1200_996.png
[hostPageUrl] => https://www.studocu.com/in/document/srm-institute-of-science-and-technology/machine-learning/mlcheatsheet-2-ml-practice-material-and-document/37311673
[contentSize] => 496335 B
[width] => 1200
[height] => 996
[cDNContentUrl] => https://th.bing.com/th/id/R.46e35cf727be4923752d0e06adbeaa02?rik=OqqsCs2Qgb%2fyRA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => CE24F1ABEF1168F8DBFB44F2BF8190CD0AACAA3A
[accentColor] => 0296C9
)
[D2A713F88D3B84CF9E0360CA331E9277DF85079D] => Array
(
[name] => Intravenous fluid therapy in adults in hospital: NICE Guidelines
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.zePepM05LOK25783u0l-agAAAA?pid=Api
[datePublished] => 2017-05-30T15:10:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => http://speciality.medicaldialogues.in/wp-content/uploads/2017/05/Algorithms-for-IV-fluid-therapy-420x281.jpg
[hostPageUrl] => https://speciality.medicaldialogues.in/intravenous-fluid-therapy-in-adults-in-hospital-nice-guidelines
[contentSize] => 30130 B
[width] => 420
[height] => 281
[cDNContentUrl] => https://th.bing.com/th/id/R.cde3dea4cd392ce2b6e7bf37bb497e6a?rik=LXoxj9izSPzpMA&riu=http%3a%2f%2fspeciality.medicaldialogues.in%2fwp-content%2fuploads%2f2017%2f05%2fAlgorithms-for-IV-fluid-therapy-420x281.jpg&ehk=oyj5vXpkTtMVMHdouFR5unHelVXFZ5y4vc2%2fc1FNq74%3d&risl=&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => D97058FD7729E133AC0630E9FC48B3D88F317A2D
[accentColor] => 827349
)
[1408AFC3158DA27B0C08880FA7E5FD1698ABB59C] => Array
(
[name] => Virtual Lab for Computer Organisation and Architecture
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.o48sv_QecFq9-XvIizqS0QHaFs?pid=Api
[datePublished] => 2018-05-02T20:34:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://cse.iitkgp.ac.in/~chitta/coldvl/images/bckt1.png
[hostPageUrl] => https://cse.iitkgp.ac.in/~chitta/coldvl/booth.html
[contentSize] => 9600 B
[width] => 742
[height] => 571
[cDNContentUrl] => https://th.bing.com/th/id/R.a38f2cbff41e705abdf97bc88b3a92d1?rik=QYD6PFHYKrfAgA&pid=ImgRaw&r=0
[isTransparent] => 1
[imageId] => C95BBA8961DF5E7AF08880C0B72AD8513CFA8041
[accentColor] => 373737
)
[7F38B8AA415431BB51733BE49A10EA83130027FF] => Array
(
[name] => Which of the following sorting algorithms has the lowest worst-case ...
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.P7GimZu1JNhNsdmtz7koywHaEK?pid=Api
[datePublished] => 2022-12-02T23:36:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://edurev.gumlet.io/ApplicationImages/Temp/a5d8f710-434d-4b40-8833-75a5b661f2eb_lg.jpeg?w=576&dpr=1.0
[hostPageUrl] => https://edurev.in/question/1792340/Which-of-the-following-sorting-algorithms-has-the-lowest-worst-case-complexity-a-Merge-sortb-Bubble-
[contentSize] => 36622 B
[width] => 576
[height] => 324
[cDNContentUrl] => https://th.bing.com/th/id/R.3fb1a2999bb524d84db1d9adcfb928cb?rik=94OLqhRFE7sVNw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => FF72003138AE01A94EB33715BB134514AA8B83F7
[accentColor] => 62715A
)
[FD0515CE70D582ACD840EFDA58DC2BC87C958C19] => Array
(
[name] => X32/M32: AES50 i/o Sharing between different consoles and stage boxes
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.g_OnYLxegoF2IYhDw-Td_AHaEK?pid=Api
[datePublished] => 2021-01-30T07:35:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://i.ytimg.com/vi/oE6jwulgmWU/maxresdefault.jpg
[hostPageUrl] => https://www.ndetech.org.in/ASTM-E317-Block-Figure-6-Metric-Alloy-Steel
[contentSize] => 199678 B
[width] => 1280
[height] => 720
[cDNContentUrl] => https://th.bing.com/th/id/R.83f3a760bc5e828176218843c3e4ddfc?rik=31BR7AddKMqNBA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 91C859C78CB2CD85ADFE048DCA285D07EC5150DF
[accentColor] => 4C6880
)
[D0CD893008D4AD591254C096DB4C2ADDFA5FADB2] => Array
(
[name] => E-commerce System ER Diagram
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.hYOS6vo-6GBbEpQD_yZQkgHaEQ?pid=Api
[datePublished] => 2024-06-15T21:32:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://images.wondershare.com/edrawmax/templates/er-diagram-for-fyp-system.png
[hostPageUrl] => https://edrawmax.wondershare.com/templates/er-diagram-e-commerce-system.html
[contentSize] => 157314 B
[width] => 1516
[height] => 872
[cDNContentUrl] => https://th.bing.com/th/id/R.858392eafa3ee8605b129403ff265092?rik=DdyYA4BN2pUhRQ&pid=ImgRaw&r=0
[isTransparent] => 1
[imageId] => 2BDAF5AFDDA2C4BD690C452195DA4D800398DC0D
[accentColor] => 00AF4D
)
[1258CD05E591B97374E95DD2A9F7983E3147514D] => Array
(
[name] => Introduction to Algorithm and Data Structures | As per SPPU syllabus
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.CiAZ6HpO0D9dNCv5HesPPAHaFj?pid=Api
[datePublished] => 2022-08-14T21:03:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://i.ytimg.com/vi/vOEN65nm4YU/sddefault.jpg
[hostPageUrl] => https://dse.cwipedia.in/2022/04/data-structures-sppu-.html
[contentSize] => 47217 B
[width] => 640
[height] => 480
[cDNContentUrl] => https://th.bing.com/th/id/R.0a2019e87a4ed03f5d342bf91deb0f3c?rik=IYXcUF4ZmzdHng&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => D4157413E3897F9A2DD59E47379B195E50DC8521
[accentColor] => 4C677F
)
[A92062D71CAE372BB8DF3FD6838316425F4A3E96] => Array
(
[name] => Entity-Relationship (ER) Diagram Symbols and Notations | EdrawMax
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.0O0FDHBKWXbr47ZuJiBuZAHaFl?pid=Api
[datePublished] => 2016-06-02T12:35:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://images.edrawsoft.com/articles/er-diagram-symbols/erd.png
[hostPageUrl] => https://www.edrawsoft.com/er-diagram-symbols.html
[contentSize] => 73801 B
[width] => 1015
[height] => 765
[cDNContentUrl] => https://th.bing.com/th/id/R.d0ed050c704a5976ebe3b66e26206e64?rik=mgImfcHqc7KL%2fQ&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 69E3A4F5246138386DF3FD8BB273EAC17D26029A
[accentColor] => 184E87
)
[57585FADC003EE3CD14B89630CB2476CA53D7D77] => Array
(
[name] => How to Memorize Speedcube Algorithms Faster - Cubelelo
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.ThplbQGiffxbxG4UluejAgHaEK?pid=Api
[datePublished] => 2022-05-27T10:10:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://cdn.shopify.com/s/files/1/0270/0342/0758/files/image5_9a6a9ac2-569d-4d6c-b8bf-352a2b0aab39_480x480.png?v=1653644987
[hostPageUrl] => https://www.cubelelo.com/blogs/cubing/memorize-speedcube-algorithms-faster
[contentSize] => 128854 B
[width] => 480
[height] => 270
[cDNContentUrl] => https://th.bing.com/th/id/R.4e1a656d01a27dfc5bc46e1496e7a302?rik=dYX12gww7sMdtA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 77D7D35AC6742BC03698B41DC3EE300CDAF58575
[accentColor] => C40707
)
[03F71F8D19D1146D0636B841757B3E74F46C3EDD] => Array
(
[name] => Write algorithm and create flowchart for calculating area and perimeter ...
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.cwq7zQIYaTXcvTI_56NMIQHaEz?pid=Api
[datePublished] => 2021-03-21T01:54:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://hi-static.z-dn.net/files/d8f/ec284819aa349fdd4667f23267396dd9.jpg
[hostPageUrl] => https://brainly.in/question/26970442
[contentSize] => 26365 B
[width] => 693
[height] => 449
[cDNContentUrl] => https://th.bing.com/th/id/R.730abbcd02186935dcbd323fe7a34c21?rik=MH%2fx2JEdQdZgYw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => DDE3C64F47E3B757148B6360D6411D91D8F17F30
[accentColor] => 5C6A6F
)
[C3E9797709B3EB71C0048E8567EE411DC103B365] => Array
(
[name] => Ashwani Blog
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.EZY_Nyos3QWiHvcAov-NxwHaHf?pid=Api
[datePublished] => 2022-07-17T20:10:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://media.geeksforgeeks.org/wp-content/uploads/insertionsort.png
[hostPageUrl] => https://blog.ashwanikumarsingh.in/
[contentSize] => 54181 B
[width] => 562
[height] => 569
[cDNContentUrl] => https://th.bing.com/th/id/R.11963f372a2cdd05a21ef700a2ff8dc7?rik=PJ6Xd5A7vhcMQA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 563B301CD114EE7658E8400C17BE3B9077979E3C
[accentColor] => CC0000
)
[3404E7B7EAECDDE587869834E5657040551F36B7] => Array
(
[name] => [Windows 11] USB Encryption | Best USB Encryption Password Protect Lock ...
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.QM_mFPoTV145tMfNjCl8TwAAAA?pid=Api
[datePublished] => 2020-07-13T03:17:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.gilisoft.in/images/usb-stick.png
[hostPageUrl] => https://www.gilisoft.in/product-usb-stick-encryption.htm
[contentSize] => 39374 B
[width] => 204
[height] => 201
[cDNContentUrl] => https://th.bing.com/th/id/R.40cfe614fa13575e39b4c7cd8c297c4f?rik=Q0B%2be67O3V54aA&pid=ImgRaw&r=0
[isTransparent] => 1
[imageId] => 7B63F1550407565E438968785EDDCEAE7B7E4043
[accentColor] => 0671C5
)
[D7C22BBD37398EF4C05D4B3731D11B8FCE38907F] => Array
(
[name] => Architectural Diagrams: Types, Uses & Best Practices
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.dXwZ3zOaNcDmMT6L9NZY1QHaFO?pid=Api
[datePublished] => 2022-11-26T18:50:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://blog.novatr.com/hs-fs/hubfs/MCA-Bauhaus-Promenade-Program-Diagram.jpg?width=6000&height=4233&name=MCA-Bauhaus-Promenade-Program-Diagram.jpg
[hostPageUrl] => https://www.novatr.com/blog/architectural-diagrams
[contentSize] => 387961 B
[width] => 2000
[height] => 1411
[cDNContentUrl] => https://th.bing.com/th/id/R.757c19df339a35c0e6313e8bf4d658d5?rik=fSyy23OT6E8M1Q&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => F70983ECF8B11D1373B4D50C4FE89373DBB22C7D
[accentColor] => BC410F
)
[B49078A715DF40DB2CD29FF0DD7531BD106F0E30] => Array
(
[name] => Online Examination System, PHP and MySQL Project Report Download
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.8POkVMboejhentbSrgMP6QHaFs?pid=Api
[datePublished] => 2016-12-18T11:37:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => http://programmer2programmer.net/live_projects/project_11/images/er_diagram_online_examination_system.jpg
[hostPageUrl] => http://programmer2programmer.net/live_projects/project_11/online_examination_system_project_report.aspx
[contentSize] => 37308 B
[width] => 487
[height] => 374
[cDNContentUrl] => https://th.bing.com/th/id/R.f0f3a454c6e87a385e9ed6d2ae030fe9?rik=SwmHelH9BL3CLQ&riu=http%3a%2f%2fprogrammer2programmer.net%2flive_projects%2fproject_11%2fimages%2fer_diagram_online_examination_system.jpg&ehk=L14jKWs%2fQEgoLBTh6ZoOSHvHGQTnB4hSNIOf6QiumZ0%3d&risl=&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 03E0F601DB1357DD0FF92DC2BD04FD517A87094B
[accentColor] => C2BF09
)
[95AA1EF4E1214BD5732F5B82D985F15538206A67] => Array
(
[name] => Question and Answer - MindStudy
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.qBtZ3v1oQZH8fLYYE8WBOgHaEN?pid=Api
[datePublished] => 2023-09-02T22:38:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://media.geeksforgeeks.org/wp-content/uploads/zbuffer.png
[hostPageUrl] => https://mindstudy.in/computer-science-engineering/z-buffer-or-depth-buffer-method
[contentSize] => 13117 B
[width] => 583
[height] => 332
[cDNContentUrl] => https://th.bing.com/th/id/R.a81b59defd684191fc7cb61813c5813a?rik=WarhTx4StF038g&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 76A60283551F589D28B5F2375DB4121E4FE1AA59
[accentColor] => CC0016
)
[CED42940D0695490C538149CD019089A0CC65802] => Array
(
[name] => In-Vehicle Gateway ECU Applications - TDK | Mouser
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.S3Z8x781yXB--jTJl_-QwwHaFN?pid=Api
[datePublished] => 2020-11-07T22:42:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.mouser.in/images/marketingid/2020/microsites/105212872/Gateway%20ECU.png
[hostPageUrl] => https://www.mouser.in/new/tdk/tdk-in-vehicle-gateway-ecu-applications/
[contentSize] => 293739 B
[width] => 1200
[height] => 845
[cDNContentUrl] => https://th.bing.com/th/id/R.4b767cc7bf35c9707efa34c997ff90c3?rik=7E2SBA2WRQlcgw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 20856CC0A980910DC941835C0945960D04924DEC
[accentColor] => CA4F01
)
[676384097A7FDA1655F814FB91DB872CC4234183] => Array
(
[name] => Methods to Recover Encrypted Excel Files - Stellar Data Recovery
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.T24GUvFhsDp65ipPqNtXnAHaEc?pid=Api
[datePublished] => 2019-06-20T03:48:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.stellarinfo.co.in/blog/wp-content/uploads/2016/12/How-to-Recover-Excel-Files-Encrypted-by-Cerber-Ransomware-Virus.jpg
[hostPageUrl] => https://www.stellarinfo.co.in/blog/recover-encrypted-excel-files/
[contentSize] => 475659 B
[width] => 1000
[height] => 600
[cDNContentUrl] => https://th.bing.com/th/id/R.4f6e0652f161b03a7ae62a4fa8db579c?rik=djZIkKf3rWFVjw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 3814324CC278BD19BF418F5561ADF7A790483676
[accentColor] => A12A49
)
[DB76868C05300A951D69A3D171A802105E0A417E] => Array
(
[name] => Introduction to K-means Clustering - Data Clustering Algorithms | T/DG ...
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.d7kwJi5GuGkLE6fB6tTDnQHaFd?pid=Api
[datePublished] => 2015-05-26T10:03:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://blog.thedigitalgroup.com/assets/uploads/k-means3.jpg
[hostPageUrl] => https://blog.thedigitalgroup.com/k-means-clustering
[contentSize] => 30293 B
[width] => 624
[height] => 460
[cDNContentUrl] => https://th.bing.com/th/id/R.77b930262e46b8690b13a7c1ead4c39d?rik=vWdoyFADoFnRlg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => E714A0E501208A171D3A96D159A00350C86867BD
[accentColor] => 2D619E
)
[7073170F5ECD17207BD8E5DA3EBF8C7309769ECC] => Array
(
[name] => all 6 ray diagram of concave mirror - Brainly.in
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.MJa3xpvoiEXdDvtkpR3iDQHaGh?pid=Api
[datePublished] => 2021-02-21T12:20:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://hi-static.z-dn.net/files/d75/0f275be84d7b75f4b12bbedc861fc5fd.jpg
[hostPageUrl] => https://brainly.in/question/7720634
[contentSize] => 75712 B
[width] => 1043
[height] => 918
[cDNContentUrl] => https://th.bing.com/th/id/R.3096b7c69be88845dd0efb64a51de20d?rik=Bzdx8OXccQK3jQ&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => CCE9679037C8FBE3AD5E8DB70271DCE5F0713707
[accentColor] => 272A3D
)
[BCDA78017C22512B6AEC95BA9E5834522F7C3D51] => Array
(
[name] => Module 3.1- Introduction to UML diagrams – Use case diagrams, Class ...
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.YZlpL6-i8p34cF69w5xpgwHaJl?pid=Api
[datePublished] => 2022-07-08T11:34:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/acccb7908920a565ded563eaab6a27d1/thumb_1200_1553.png
[hostPageUrl] => https://www.studocu.com/in/document/apj-abdul-kalam-technological-university/software-architecture-and-design-patterns/module-31-introduction-to-uml-diagrams-use-case-diagrams-class-diagrams-sequence-diagrams/29401892
[contentSize] => 409580 B
[width] => 1200
[height] => 1553
[cDNContentUrl] => https://th.bing.com/th/id/R.6199692fafa2f29df8705ebdc39c6983?rik=y62HEMciFbKmzg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 15D3C7F2254385E9AB59CEA6B21522C71087ADCB
[accentColor] => 464646
)
[D1760A48EC01490E0CB71D253056D45D4ED6BAF1] => Array
(
[name] => What is Object Oriented Design of a system? Draw the Use case diagram ...
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.y-dZrl2F2fkJxYwzAb4AnwHaGP?pid=Api
[datePublished] => 2022-12-08T14:10:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => http://www.gtu-paper-solution.com/upload/2160701/W2018/2170701_SE_Q3_C_2_Winter_2018.jpg
[hostPageUrl] => https://gtu-paper-solution.com/Paper-Solution/SoftwareEngineering-2160701/Winter-2018/Question-3c
[contentSize] => 62189 B
[width] => 1222
[height] => 1029
[cDNContentUrl] => https://th.bing.com/th/id/R.cbe759ae5d85d9f909c58c3301be009f?rik=HWeghM4QlODAew&riu=http%3a%2f%2fwww.gtu-paper-solution.com%2fupload%2f2160701%2fW2018%2f2170701_SE_Q3_C_2_Winter_2018.jpg&ehk=ohXURj9u2ReuPhc9O77C676q9b6%2b6CN7GM16bvS570I%3d&risl=&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 1FAB6DE4D54D650352D17BC0E09410CE84A0671D
[accentColor] => 404040
)
[22F8E8493F35F4ED59B2670F401CDAC77A0F6FD8] => Array
(
[name] => Ashwani Blog
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.o23dagqqzSzesNJjospgVgHaEH?pid=Api
[datePublished] => 2022-08-30T22:25:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://media.geeksforgeeks.org/wp-content/uploads/20220309171621/BinarySearch.png
[hostPageUrl] => https://blog.ashwanikumarsingh.in/blogposts/binary-search
[contentSize] => 179900 B
[width] => 720
[height] => 401
[cDNContentUrl] => https://th.bing.com/th/id/R.a36ddd6a0aaacd2cdeb0d263a2ca6056?rik=Io%2bOlPNTT96VKw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 8DF6F0A77CADC104F0762B95DE4F53F3948E8F22
[accentColor] => 92B516
)
[4652279C9B8FDC8977509834E5657040551F36B7] => Array
(
[name] => [Windows 11] USB Encryption | Best USB Encryption Password Protect Lock ...
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.MuQezEXdyG8sW_mZpgSNcQAAAA?pid=Api
[datePublished] => 2020-07-13T03:17:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.gilisoft.in/images/benefit02.png
[hostPageUrl] => https://www.gilisoft.in/product-usb-stick-encryption.htm
[contentSize] => 4199 B
[width] => 32
[height] => 32
[cDNContentUrl] => https://th.bing.com/th/id/R.32e41ecc45ddc86f2c5bf999a6048d71?rik=ZCVyybn4zZh3BQ&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 7B63F1550407565E4389057798CDF8B9C9722564
[accentColor] => 019315
)
[15D7D7D6B5ED1D5544AD3000DB4864522EA1332E] => Array
(
[name] => Screening among Household Contacts of DR-TB Patients | Knowledge Base
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.T2g2tSnpnNaCa55hSWVJAgHaDi?pid=Api
[datePublished] => 2022-08-31T18:11:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://cms.swasth-egurukul.in/sites/default/files/2082.png
[hostPageUrl] => https://ntep.in/node/1794/CP-screening-among-household-contacts-dr-tb-patients
[contentSize] => 195897 B
[width] => 1200
[height] => 574
[cDNContentUrl] => https://th.bing.com/th/id/R.4f6836b529e99cd6826b9e6149654902?rik=UX19bVve0VVE2g&pid=ImgRaw&r=0
[isTransparent] => 1
[imageId] => E2331AE2254684BD0003DA4455D1DE5B6D7D7D51
[accentColor] => CC9C00
)
[A1C570AA7890F40518C4E22DC581F67B113C491C] => Array
(
[name] => XGBoost – What Is It and Why Does It Matter?
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.6bKX8w_Ck2PRFgn9ztowNgHaEp?pid=Api
[datePublished] => 2024-05-23T21:13:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.nvidia.com/content/dam/en-zz/Solutions/glossary/data-science/xgboost/img-3.png
[hostPageUrl] => https://www.nvidia.com/en-in/glossary/xgboost/
[contentSize] => 20896 B
[width] => 965
[height] => 605
[cDNContentUrl] => https://th.bing.com/th/id/R.e9b297f30fc29363d11609fdceda3036?rik=GlwHqocJT1CBTA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => C194C311B76F185CD22E4C81504F0987AA075C1A
[accentColor] => 518000
)
[B96355CB5D1967781A086117EF1396A24F9AE502] => Array
(
[name] => which mirror is used by dentist and draw its Ray diagram - Brainly.in
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.Lfd0r2F-fzRygT9PoQNemAAAAA?pid=Api
[datePublished] => 2018-12-10T21:22:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://hi-static.z-dn.net/files/d88/ad18098919f3a87e3c6d024db8f8b41e.jpg
[hostPageUrl] => https://brainly.in/question/6248277
[contentSize] => 14497 B
[width] => 317
[height] => 291
[cDNContentUrl] => https://th.bing.com/th/id/R.2df774af617e7f3472813f4fa1035e98?rik=mzZVvNWRdoehgA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 205EA9F42A6931FE711680A1877691D5BC55369B
[accentColor] => 823C39
)
[09CAE5ACD2A60FFE2C2F14FB91DB872CC4234183] => Array
(
[name] => Methods to Recover Encrypted Excel Files - Stellar Data Recovery
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.-B7Wz3NMtTL0827zaMvLXgHaEc?pid=Api
[datePublished] => 2019-09-15T01:45:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.stellarinfo.co.in/blog/wp-content/uploads/2016/12/How-to-Recover-Excel-Files-Encrypted-by-Cerber-Ransomware-Virus-1.jpg
[hostPageUrl] => https://www.stellarinfo.co.in/blog/recover-encrypted-excel-files/
[contentSize] => 92623 B
[width] => 1000
[height] => 600
[cDNContentUrl] => https://th.bing.com/th/id/R.f81ed6cf734cb532f4f36ef368cbcb5e?rik=kKxeyi1q8O%2fC8g&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 3814324CC278BD19BF41F2C2EFF06A2DCA5EAC90
[accentColor] => 304075
)
[E33F8EB46881D3D8C7E790E76227A0271845EFCE] => Array
(
[name] => Phasor Diagrams for Transformer on Load - Single Phase Transformer
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.RTXajRXnCs6NczEjjOWUWQAAAA?pid=Api
[datePublished] => 2022-12-28T14:53:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.poriyaan.in/media/imgPori/images12/q09KeSW.png
[hostPageUrl] => https://eee.poriyaan.in/topic/phasor-diagrams-for-transformer-on-load-11216/
[contentSize] => 210113 B
[width] => 451
[height] => 409
[cDNContentUrl] => https://th.bing.com/th/id/R.4535da8d15e70ace8d7331238ce59459?rik=PvPoS4YYPY18fg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => ECFE5481720A72267E097E7C8D3D18864BE8F33E
[accentColor] => 595972
)
[D749EF1F6A0BD68485F5E8EAF58B8D398832F0CC] => Array
(
[name] => Databases: ISRO2017-8
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.Xjn4XQlemJuzwhlKcYW6ZAAAAA?pid=Api
[datePublished] => 2017-05-07T11:31:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://gateoverflow.in/?qa=blob&qa_blobid=10296062514662501060
[hostPageUrl] => https://gateoverflow.in/128553/isro2017-8
[contentSize] => 58255 B
[width] => 429
[height] => 270
[cDNContentUrl] => https://th.bing.com/th/id/R.5e39f85d095e989bb3c2194a7185ba64?rik=fZT%2b8aawbUhYXw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => CC0F238893D8B85FAE8E5F58486DB0A6F1FE947D
[accentColor] => 676764
)
[A173A502CE2055679A12FF30B8560800A6064F6F] => Array
(
[name] => 11 Cool 3x3 Speed Cube Patterns With Notations | Atharva Bhat
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.a8dHRXqX4KlG6dAU264--wHaD0?pid=Api
[datePublished] => 2021-10-02T10:45:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://cdn.shopify.com/s/files/1/0270/0342/0758/files/unnamed_12_b3d3e17c-9176-4ded-b807-ac7035d9a9e9.png?v=1632921657
[hostPageUrl] => https://www.cubelelo.com/blogs/cubing/cool-3x3-cube-patterns
[contentSize] => 168042 B
[width] => 512
[height] => 264
[cDNContentUrl] => https://th.bing.com/th/id/R.6bc747457a97e0a946e9d014dbae3efb?rik=GjdaIOwCVXapIQ&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => F6F4606A0080658B03FF21A9765502EC205A371A
[accentColor] => B4B217
)
[199AF2D8550FFF4CCB95DFC4B077EE59E3ECBCAD] => Array
(
[name] => Virtual Labs
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.So51eqJ-IvJdqc2ycHMvCwHaHA?pid=Api
[datePublished] => 2021-03-24T04:02:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://ds1-iiith.vlabs.ac.in/exp/bubble-sort/analysis/images/comparison.png
[hostPageUrl] => https://ds1-iiith.vlabs.ac.in/exp/bubble-sort/analysis/comparison-with-other-algorithms.html
[contentSize] => 97670 B
[width] => 811
[height] => 767
[cDNContentUrl] => https://th.bing.com/th/id/R.4a8e757aa27e22f25da9cdb270732f0b?rik=kakvjVXw%2f8S8WQ&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => DACBCE3E95EE770B4CFD59BCC4FFF0558D2FA991
[accentColor] => 917C3A
)
[196F10AF11DE22EB3EF3A3365A46CD174D88A7DC] => Array
(
[name] => write an algorithm and draw a flow chart to find sum of digits of a ...
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.s69kHdnV3JsJdOVzQWkuMQHaGZ?pid=Api
[datePublished] => 2021-02-07T21:02:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://hi-static.z-dn.net/files/d7b/c067a010bf9c5bb4911c642382f48aef.png
[hostPageUrl] => https://brainly.in/question/32548580
[contentSize] => 24652 B
[width] => 940
[height] => 812
[cDNContentUrl] => https://th.bing.com/th/id/R.b3af641dd9d5dc9b0974e57341692e31?rik=kfYB%2bhHtIr7jPw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => CD7A88D471DC64A5633A3FE3BE22ED11FA01F691
[accentColor] => 343434
)
[14AE87587F416D95F88A63AFE407AC4FC51CFB2A] => Array
(
[name] => Algorithm cook rice to flowchart - Brainly.in
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.zFPQp-1kcBDp-G96EsSWMgAAAA?pid=Api
[datePublished] => 2022-08-26T19:55:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://hi-static.z-dn.net/files/d6f/6af615461599df96ddff76a447bb0314.jpg
[hostPageUrl] => https://brainly.in/question/53327933
[contentSize] => 30831 B
[width] => 446
[height] => 1015
[cDNContentUrl] => https://th.bing.com/th/id/R.cc53d0a7ed647010e9f86f7a12c49632?rik=Qep4hfcU1lmPqA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => A2BFC15CF4CA704EFA36A88F59D614F78578EA41
[accentColor] => 404040
)
[43C0E4AD28233243EB6A72E8AF1F36188950E612] => Array
(
[name] => Welcome to ARCOP
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.afqJhSWlRKqIrXfcD29OrQHaD9?pid=Api
[datePublished] => 2019-04-05T14:35:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => http://arcop.co.in/images/product-options/enlarge-image/20160810050107_primage.jpg
[hostPageUrl] => http://arcop.co.in/inner-page-th-sub-category-by-name.php?id=41
[contentSize] => 297529 B
[width] => 823
[height] => 440
[cDNContentUrl] => https://th.bing.com/th/id/R.69fa898525a544aa88ad77dc0f6f4ead?rik=NAxO2oIyIzS%2bpg&riu=http%3a%2f%2farcop.co.in%2fimages%2fproduct-options%2fenlarge-image%2f20160810050107_primage.jpg&ehk=snSDRE7AZGNPTTPHr6jRAcAp4YRass64voDB8hgr0I8%3d&risl=&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 216E05988163F1FA8E27A6BE34233282DA4E0C34
[accentColor] => 9D992E
)
[066B9D2F7D8845BED41D622DEED68EE4406A8F15] => Array
(
[name] => Which sorting algorithm has the best asymptotic runtime complexity ...
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.Eda3VeIfSSo0Tyw6xFZX_AHaDv?pid=Api
[datePublished] => 2019-04-29T13:32:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://hi-static.z-dn.net/files/de4/628e6d48b76004a4afb95ae28aa2328e.png
[hostPageUrl] => https://brainly.in/question/9205555
[contentSize] => 34018 B
[width] => 779
[height] => 394
[cDNContentUrl] => https://th.bing.com/th/id/R.11d6b755e21f492a344f2c3ac45657fc?rik=YLbZ8teIVOtN0Q&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 51F8A6044EE86DEED226D14DEB5488D7F2D9B660
[accentColor] => 4CB70B
)
[55F9E1CEFCA84338FDFA74833018AFC6927BF64C] => Array
(
[name] => Draw a flowchart and write an algorithm to enter time in hours. Display ...
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.7a63hBLbvDW_NSwmOEv_hAHaHH?pid=Api
[datePublished] => 2019-01-17T16:53:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://hi-static.z-dn.net/files/d2f/8892f9d8ca984fe248ac35b905e34e2f.jpg
[hostPageUrl] => https://brainly.in/question/7686656
[contentSize] => 59652 B
[width] => 921
[height] => 885
[cDNContentUrl] => https://th.bing.com/th/id/R.edaeb78412dbbc35bf352c26384bff84?rik=VZ8e7M%2bKNIPfrw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => C46FB7296CFA81033847AFDF83348ACFEC1E9F55
[accentColor] => 454545
)
[6E94974D63B10E2C76F765A68AF688E8343061E7] => Array
(
[name] => Algorithm and flowchart to find area and perimeter of circle - Brainly.in
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.5ubUMhseLgugj7QPxHxuEgHaEZ?pid=Api
[datePublished] => 2020-04-21T14:02:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://hi-static.z-dn.net/files/dcc/591cb36e45ecac3ec971d18cfdfea400.jpg
[hostPageUrl] => https://brainly.in/question/16767506
[contentSize] => 21590 B
[width] => 1025
[height] => 608
[cDNContentUrl] => https://th.bing.com/th/id/R.e6e6d4321b1e2e0ba08fb40fc47c6e12?rik=5kl51DYb4MJnfw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 7E1603438E886FA86A567F67C2E01B36D47949E6
[accentColor] => 3E5371
)
[E5655198E64CD988DB6C7EB5ADA29E489C779B61] => Array
(
[name] => draw a flowchart to find the perimeter and area of rectangle. and also ...
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.Md4UptZSMRhRton2FdINtAHaH7?pid=Api
[datePublished] => 2020-10-27T13:04:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://hi-static.z-dn.net/files/df9/944f1bec242f792842015054d71cb00c.jpg
[hostPageUrl] => https://brainly.in/question/26899392
[contentSize] => 122331 B
[width] => 1081
[height] => 1158
[cDNContentUrl] => https://th.bing.com/th/id/R.31de14a6d652311851b689f615d20db4?rik=XlYViW7EnYi9xg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 16B977C984E92ADA5BE7C6BD889DC46E8915565E
[accentColor] => 484960
)
[62DD0BA99D4C9E5520F6E0D74375EDF33EF7D30E] => Array
(
[name] => Apple iPhone 16 Plus (256GB SG) Price in Bangladesh 2025, Specs ...
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.6bgENfPsbH-ujpzBL325OwHaHa?pid=Api
[datePublished] => 2024-11-06T11:05:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.mobiledokan.com/media/apple-iphone-16-plus-ultramarine-official-image_2.webp
[hostPageUrl] => https://www.mobiledokan.com/mobile/apple-iphone-16-plus-256gb-sg
[contentSize] => 19796 B
[width] => 1000
[height] => 1000
[cDNContentUrl] => https://th.bing.com/th/id/R.e9b80435f3ec6c7fae8e9cc12f7db93b?rik=Jt2wmtnE6VUCbw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => E03D7FE33FDE57347D0E6F0255E9C4D99AB0DD26
[accentColor] => 0F3EBC
)
[623F121B33E2DBABCD918D16D26587634E47FD6A] => Array
(
[name] => Draw a labelled diagram of functional unit of kidney - Brainly.in
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.K-4vm5k3K8IQRPk2hD_3PwHaFj?pid=Api
[datePublished] => 2020-07-27T08:53:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://hi-static.z-dn.net/files/d9d/7c9973dbed0c3d50bce9acb28a9b9642.jpg
[hostPageUrl] => https://brainly.in/question/20058182
[contentSize] => 39897 B
[width] => 697
[height] => 523
[cDNContentUrl] => https://th.bing.com/th/id/R.2bee2f9b99372bc21044f936843ff73f?rik=JvMhsTMuvbrcGQ&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => A6DF74E43678562D61D819DCBABD2E33B121F326
[accentColor] => 4A4A4A
)
[50329954CA13495922FCD6217237C37B6B107246] => Array
(
[name] => draw a labelled diagram to show the working of a kaleidoscope.what are ...
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.wfY5LqkBa3dPYEFL9C3XrAHaD5?pid=Api
[datePublished] => 2018-10-26T11:56:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://hi-static.z-dn.net/files/d3b/39a3ca5884826b399e653660822ade51.png
[hostPageUrl] => http://brainly.in/question/250534
[contentSize] => 59786 B
[width] => 486
[height] => 256
[cDNContentUrl] => https://th.bing.com/th/id/R.c1f6392ea9016b774f60414bf42dd7ac?rik=BSOZRawxlJUizw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 642701B6B73C7327126DCF22959431AC45992305
[accentColor] => 0A8DC1
)
[BC55E310F8F0E17E666E5476734D1F68FEFB55CA] => Array
(
[name] => [Answered] Write an algorithm and draw a flowchart to find simple ...
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.bSWij9-IovRikGtUBXKg0gAAAA?pid=Api
[datePublished] => 2018-07-07T23:13:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://hi-static.z-dn.net/files/d2e/f6324063bda2deb6ea85ae3a23dc51d2.jpg
[hostPageUrl] => https://brainly.in/question/4579550
[contentSize] => 13132 B
[width] => 442
[height] => 348
[cDNContentUrl] => https://th.bing.com/th/id/R.6d25a28fdf88a2f462906b540572a0d2?rik=y1U%2bAY8PHudm5g&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => AC55BFEF86F1D4376745E666E71E0F8F013E55CB
[accentColor] => 677E4D
)
[F11B5340DB7FB91D32C581C307C289AAA49722FB] => Array
(
[name] => Tower of Hanoi recursion game algorithm explained - Codeamy: Learn ...
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.6_vDzpKMem-u_OFH47KY6QHaD4?pid=Api
[datePublished] => 2019-10-29T09:09:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://1.bp.blogspot.com/-4R0ZfbGOspM/XVaYRFnk16I/AAAAAAAAIP8/xFG876BVNi4VZiOy8DCH0dZoBw2ecZhSgCLcBGAs/w1200-h630-p-k-no-nu/towerofhanoi.png
[hostPageUrl] => https://www.codeamy.in/2019/08/tower-of-hanoi.html
[contentSize] => 90804 B
[width] => 1200
[height] => 630
[cDNContentUrl] => https://th.bing.com/th/id/R.ebfbc3ce928c7a6faefce147e3b298e9?rik=H7E1BL33m9EjXA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => BF22794AAA982C703C185C23D19BF7BD0435B11F
[accentColor] => B25219
)
[D1DE2A7B758B45D17BFFDB5C6B612DDC4AA6599D] => Array
(
[name] => Future Plans | About | Ahmedabad Education Society
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.uj-glJy40r1EwwWDVgcKcgHaCj?pid=Api
[datePublished] => 2018-01-31T06:12:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://aesahd.edu.in/img/pagetop/aes-sports-complex.jpg
[hostPageUrl] => https://aesahd.edu.in/futureplans.shtml
[contentSize] => 43481 B
[width] => 680
[height] => 234
[cDNContentUrl] => https://th.bing.com/th/id/R.ba3fa0949cb8d2bd44c3058356070a72?rik=He2it1e4VB23%2fw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => D9956AA4CDD216B6C5BDFFB71D54B857B7A2ED1D
[accentColor] => BB1018
)
[DD5F41DF8BC3E9850261574674A64DBACDF38244] => Array
(
[name] => Speech On THE RAT RACE OF COMPETITIVE EXAMS. - Brainly.in
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.Rn_jwsssiNm-ZWprND1mrAHaOq?pid=Api
[datePublished] => 2022-02-24T09:57:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://hi-static.z-dn.net/files/d04/f8d052b16b9f049b25a59c75ec28ebaf.jpg
[hostPageUrl] => https://brainly.in/question/50412468
[contentSize] => 175654 B
[width] => 680
[height] => 1347
[cDNContentUrl] => https://th.bing.com/th/id/R.467fe3c2cb2c88d9be656a6b343d66ac?rik=3fUU%2fbg8nlggFg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 44283FDCABD46A4764751620589E3CB8FD14F5DD
[accentColor] => 529635
)
[0DD3D720B1F850E6C96D3D6786DAC6C41267742E] => Array
(
[name] => Devuan GNU+Linux Free Operating System
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.DPPoCs93kYcDnUq9fkdCpAHaFj?pid=Api
[datePublished] => 2020-06-10T04:36:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.devuan.org/os/documentation/install-guides/beowulf/img/encrypt5.png
[hostPageUrl] => https://www.devuan.org/os/documentation/install-guides/beowulf/full-disk-encryption
[contentSize] => 5102 B
[width] => 640
[height] => 480
[cDNContentUrl] => https://th.bing.com/th/id/R.0cf3e80acf779187039d4abd7e4742a4?rik=0D19AhuPBW6c1g&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => E24776214C6CAD6876D3D69C6E058F1B027D3DD0
[accentColor] => 0000B0
)
[DB9024B866E852DC5FFA1EEE91DCFB6D4252BDDE] => Array
(
[name] => Livpure Envy Plus RO+UV+UF Water Purifier with Pre Filter: Amazon.in ...
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP._3ZptaMzNaD99SSMogd7sgHaD7?pid=Api
[datePublished] => 2019-11-18T16:41:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://images-na.ssl-images-amazon.com/images/G/31/aplusautomation/vendorimages/7825300b-7426-4192-baae-74a5ea408f77.jpg._CB268449727_.jpg
[hostPageUrl] => https://www.amazon.in/Livpure-Envy-Water-Purifier-Filter/dp/B010T06VUI
[contentSize] => 126228 B
[width] => 2122
[height] => 1124
[cDNContentUrl] => https://th.bing.com/th/id/R.ff7669b5a33335a0fdf5248ca2077bb2?rik=vQlCi2aOJc31rw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => EDDB2524D6BFCD19EEE1AFF5CD258E668B4209BD
[accentColor] => A5262B
)
[34778A457DF1DAAF2AE5A86A71543E653DC4CED1] => Array
(
[name] => Input a day number and display the name of the day.(If number is 1 ...
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.41MuC-HbShHFAes5Jsc0ZwHaD0?pid=Api
[datePublished] => 2018-12-13T09:00:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://hi-static.z-dn.net/files/d44/0854f5e8243bf49d4ddbfd3345c6a05f.jpg
[hostPageUrl] => https://brainly.in/question/5940398
[contentSize] => 45426 B
[width] => 848
[height] => 438
[cDNContentUrl] => https://th.bing.com/th/id/R.e3532e0be1db4a11c501eb3926c73467?rik=Q3eoVNcfrfqiXg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 1DEC4CD356E34517A68A5EA2FAAD1FD754A87743
[accentColor] => 3C4768
)
[DB38C7E2DC935B9EEDC5C0E23AC68C63CF1CFF24] => Array
(
[name] => Bihar: Who is Responsible for the Death of 100 Children?
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.a48KdZXsqtfVz1_-Fsp9EgHaFH?pid=Api
[datePublished] => 2019-06-18T07:50:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://cdn.thewire.in/wp-content/uploads/2019/06/17132609/Bihar-AES-Muzaffarpur-Photo-Umesh-Ray-3-1024x707.jpg
[hostPageUrl] => https://thewire.in/health/bihar-acute-encephalitis-syndrome-children-dead-nitish
[contentSize] => 189358 B
[width] => 1024
[height] => 707
[cDNContentUrl] => https://th.bing.com/th/id/R.6b8f0a7595ecaad7d5cf5ffe16ca7d12?rik=vYN8Ls05teneXA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 42FFC1FC36C86CA32E0C5CDEE9B539CD2E7C83BD
[accentColor] => AC1F24
)
[8C702C8358C66F7E9BB53D6786DAC6C41267742E] => Array
(
[name] => Devuan GNU+Linux Free Operating System
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.1cHQ5yHUjK6-wh1vrf7rkQHaFj?pid=Api
[datePublished] => 2020-06-10T04:36:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.devuan.org/os/documentation/install-guides/beowulf/img/encrypt9.png
[hostPageUrl] => https://www.devuan.org/os/documentation/install-guides/beowulf/full-disk-encryption
[contentSize] => 5714 B
[width] => 640
[height] => 480
[cDNContentUrl] => https://th.bing.com/th/id/R.d5c1d0e721d48caebec21d6fadfeeb91?rik=yAfCOIVs9ue5Ww&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => E24776214C6CAD6876D35BB9E7F66C8538C207C8
[accentColor] => 0000A9
)
[9929BB491CAABDF53F873CAF68C33340849E66BB] => Array
(
[name] => Blind Coding Qubit 2022 - MGIT
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP._bATv8imk3K7Lq9IEyzyCAHaKf?pid=Api
[datePublished] => 2022-06-27T09:25:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://mgit.ac.in/wp-content/uploads/2022/06/blind-coding-qubit-2k22.jpeg
[hostPageUrl] => https://mgit.ac.in/events/blind-coding-qubit-2022/
[contentSize] => 305417 B
[width] => 904
[height] => 1280
[cDNContentUrl] => https://th.bing.com/th/id/R.fdb013bfc8a69372bb2eaf48132cf208?rik=mZK7lMGq21%2fzeA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => BB66E94804333C86FAC378F35FDBAAC194BB9299
[accentColor] => 02192E
)
[9896B725C928F575FC843D6786DAC6C41267742E] => Array
(
[name] => Devuan GNU+Linux Free Operating System
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.KYyNSeqZEo9Nway7WQR0bwHaFj?pid=Api
[datePublished] => 2020-06-10T04:36:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.devuan.org/os/documentation/install-guides/beowulf/img/encrypt4.png
[hostPageUrl] => https://www.devuan.org/os/documentation/install-guides/beowulf/full-disk-encryption
[contentSize] => 7961 B
[width] => 640
[height] => 480
[cDNContentUrl] => https://th.bing.com/th/id/R.298c8d49ea99128f4dc1acbb5904746f?rik=iWl7UpyCX1fPSA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => E24776214C6CAD6876D348CF575F829C527B6989
[accentColor] => 0000A9
)
[F07A4DCDB7A7325368B63D6786DAC6C41267742E] => Array
(
[name] => Devuan GNU+Linux Free Operating System
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.t7-W67gxwtFaEusEIVzOcQHaFj?pid=Api
[datePublished] => 2020-06-10T04:36:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.devuan.org/os/documentation/install-guides/beowulf/img/encrypt7.png
[hostPageUrl] => https://www.devuan.org/os/documentation/install-guides/beowulf/full-disk-encryption
[contentSize] => 9642 B
[width] => 640
[height] => 480
[cDNContentUrl] => https://th.bing.com/th/id/R.b7bf96ebb831c2d15a12eb04215cce71?rik=D6fU3Ht6IzWGaw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => E24776214C6CAD6876D36B8635237A7BDCD4A70F
[accentColor] => 0101A9
)
[4BDA6A2EA4B3E01BC1AE82D3FCB333E590133D6D] => Array
(
[name] => Tapo C500 | Outdoor Pan/Tilt Security WiFi Camera | TP-Link India
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.zM72_Iw71sYvzqkF_6550AHaFi?pid=Api
[datePublished] => 2022-12-01T09:26:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://static-product.tp-link.com/tapo-c500_v1/img/g-6.jpg
[hostPageUrl] => https://www.tp-link.com/in/home-networking/cloud-camera/tapo-c500/
[contentSize] => 33936 B
[width] => 530
[height] => 396
[cDNContentUrl] => https://th.bing.com/th/id/R.cccef6fc8c3bd6c62fcea905ffae79d0?rik=tK2m4ko7DrEc6g&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => D6D331095E333BCF3D28EA1CB10E3B4AE2A6ADB4
[accentColor] => 089BC3
)
[20792FBFF5EA913626A0485E47BCA3FDC30A9A6D] => Array
(
[name] => Using Euclid's Division Algorithm, find the HCF of 6496 and 376 ...
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.uQQgoMmcHnlmusfJWlQEgQHaEK?pid=Api
[datePublished] => 2018-04-26T10:24:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://hi-static.z-dn.net/files/d52/a0c5e30c6d5e6212a8e4c75221244391.jpg
[hostPageUrl] => https://brainly.in/question/3432228
[contentSize] => 489558 B
[width] => 4128
[height] => 2322
[cDNContentUrl] => https://th.bing.com/th/id/R.b90420a0c99c1e7966bac7c95a540481?rik=Apfy%2b1%2buGWNiCg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => D6A9A03CDF3ACB74E5840A626319AE5FFBF29702
[accentColor] => 694F43
)
[717CF50D6E5810A579AEB0568EF0EB37C1F0B08F] => Array
(
[name] => NCB Drug Case: WhatsApp Officially Denies Any Chats Being Leaked Out
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.dbpw1ZfQoN93RLuCXImv5AHaD4?pid=Api
[datePublished] => 2020-09-25T09:16:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://im.indiatimes.in/content/2020/Sep/Facebook-Image-3_5f6c726ea4b22.jpg
[hostPageUrl] => https://www.indiatimes.com/technology/news/ncb-drug-case-whatsapp-chat-leak-523646.html
[contentSize] => 57340 B
[width] => 800
[height] => 420
[cDNContentUrl] => https://th.bing.com/th/id/R.75ba70d597d0a0df7744bb825c89afe4?rik=F8df0OaFAVqX6g&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => F80B0F1C73BE0FE8650BEA975A0185E6D05FC717
[accentColor] => 76555D
)
[86CE3BA4B3E1E1AA3F493C8DEEBDC7276D59A28E] => Array
(
[name] => How To Lock A Folder In Windows 10 If You Want To Protect Your Files ...
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.JmahpABPoWIke151lxUVCgHaG8?pid=Api
[datePublished] => 2020-02-07T09:32:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://img.mobygeek.com/resize/730x-/2020/02/07/how-to-lock-a-folder-in-windows-10-5-e31e.jpg
[hostPageUrl] => https://mobygeek.com/how-to/how-to-lock-a-folder-in-windows-10-11607
[contentSize] => 93766 B
[width] => 730
[height] => 684
[cDNContentUrl] => https://th.bing.com/th/id/R.2666a1a4004fa162247b5e759715150a?rik=aOyzSjseHqrzlA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => E82A95D6727CDBEED8C394F3AA1E1E3B4AB3EC68
[accentColor] => 3E5F8D
)
)
[relatedSearches] => Array
(
[0] => Array
(
[text] => Aes Encryption Diagram
[displayText] => Aes Encryption Diagram
[webSearchUrl] => https://www.bing.com/images/search?q=Aes+Encryption+Diagram&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5724.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Aes+Encryption+Diagram
[thumbnail] => Array
(
[thumbnailUrl] => https://tse2.mm.bing.net/th?q=Aes+Encryption+Diagram&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[1] => Array
(
[text] => Aes Encryption Process Diagram
[displayText] => Aes Encryption Process Diagram
[webSearchUrl] => https://www.bing.com/images/search?q=Aes+Encryption+Process+Diagram&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5726.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Aes+Encryption+Process+Diagram
[thumbnail] => Array
(
[thumbnailUrl] => https://tse3.mm.bing.net/th?q=Aes+Encryption+Process+Diagram&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[2] => Array
(
[text] => Aes Encryption Function Diagram
[displayText] => Aes Encryption Function Diagram
[webSearchUrl] => https://www.bing.com/images/search?q=Aes+Encryption+Function+Diagram&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5728.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Aes+Encryption+Function+Diagram
[thumbnail] => Array
(
[thumbnailUrl] => https://tse4.mm.bing.net/th?q=Aes+Encryption+Function+Diagram&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[3] => Array
(
[text] => Aes Encryption Block Diagram
[displayText] => Aes Encryption Block Diagram
[webSearchUrl] => https://www.bing.com/images/search?q=Aes+Encryption+Block+Diagram&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5730.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Aes+Encryption+Block+Diagram
[thumbnail] => Array
(
[thumbnailUrl] => https://tse3.mm.bing.net/th?q=Aes+Encryption+Block+Diagram&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[4] => Array
(
[text] => Aes Encryption Algorithm
[displayText] => Aes Encryption Algorithm
[webSearchUrl] => https://www.bing.com/images/search?q=Aes+Encryption+Algorithm&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5732.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Aes+Encryption+Algorithm
[thumbnail] => Array
(
[thumbnailUrl] => https://tse4.mm.bing.net/th?q=Aes+Encryption+Algorithm&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[5] => Array
(
[text] => Rsa Encryption Process Diagram
[displayText] => Rsa Encryption Process Diagram
[webSearchUrl] => https://www.bing.com/images/search?q=Rsa+Encryption+Process+Diagram&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5734.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Rsa+Encryption+Process+Diagram
[thumbnail] => Array
(
[thumbnailUrl] => https://tse2.mm.bing.net/th?q=Rsa+Encryption+Process+Diagram&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[6] => Array
(
[text] => Rsa Encryption Diagram
[displayText] => Rsa Encryption Diagram
[webSearchUrl] => https://www.bing.com/images/search?q=Rsa+Encryption+Diagram&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5736.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Rsa+Encryption+Diagram
[thumbnail] => Array
(
[thumbnailUrl] => https://tse1.mm.bing.net/th?q=Rsa+Encryption+Diagram&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[7] => Array
(
[text] => Aes Encryption Flow Chart
[displayText] => Aes Encryption Flow Chart
[webSearchUrl] => https://www.bing.com/images/search?q=Aes+Encryption+Flow+Chart&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5738.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Aes+Encryption+Flow+Chart
[thumbnail] => Array
(
[thumbnailUrl] => https://tse3.mm.bing.net/th?q=Aes+Encryption+Flow+Chart&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[8] => Array
(
[text] => Aes Encryption Process
[displayText] => Aes Encryption Process
[webSearchUrl] => https://www.bing.com/images/search?q=Aes+Encryption+Process&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5740.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Aes+Encryption+Process
[thumbnail] => Array
(
[thumbnailUrl] => https://tse4.mm.bing.net/th?q=Aes+Encryption+Process&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[9] => Array
(
[text] => Aes Encryption And Decryption Diagram
[displayText] => Aes Encryption And Decryption Diagram
[webSearchUrl] => https://www.bing.com/images/search?q=Aes+Encryption+And+Decryption+Diagram&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5742.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Aes+Encryption+And+Decryption+Diagram
[thumbnail] => Array
(
[thumbnailUrl] => https://tse2.mm.bing.net/th?q=Aes+Encryption+And+Decryption+Diagram&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[10] => Array
(
[text] => Aes Encryption Flowchart
[displayText] => Aes Encryption Flowchart
[webSearchUrl] => https://www.bing.com/images/search?q=Aes+Encryption+Flowchart&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5744.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Aes+Encryption+Flowchart
[thumbnail] => Array
(
[thumbnailUrl] => https://tse3.mm.bing.net/th?q=Aes+Encryption+Flowchart&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[11] => Array
(
[text] => Aes Encryption Architecture Diagram
[displayText] => Aes Encryption Architecture Diagram
[webSearchUrl] => https://www.bing.com/images/search?q=Aes+Encryption+Architecture+Diagram&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5746.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Aes+Encryption+Architecture+Diagram
[thumbnail] => Array
(
[thumbnailUrl] => https://tse1.mm.bing.net/th?q=Aes+Encryption+Architecture+Diagram&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[12] => Array
(
[text] => Aes Encryption Algorithm Use Case Diagram
[displayText] => Aes Encryption Algorithm Use Case Diagram
[webSearchUrl] => https://www.bing.com/images/search?q=Aes+Encryption+Algorithm+Use+Case+Diagram&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5748.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Aes+Encryption+Algorithm+Use+Case+Diagram
[thumbnail] => Array
(
[thumbnailUrl] => https://tse2.mm.bing.net/th?q=Aes+Encryption+Algorithm+Use+Case+Diagram&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[13] => Array
(
[text] => Des Encryption Diagram
[displayText] => Des Encryption Diagram
[webSearchUrl] => https://www.bing.com/images/search?q=Des+Encryption+Diagram&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5750.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Des+Encryption+Diagram
[thumbnail] => Array
(
[thumbnailUrl] => https://tse3.mm.bing.net/th?q=Des+Encryption+Diagram&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[14] => Array
(
[text] => Encryption In Aes
[displayText] => Encryption In Aes
[webSearchUrl] => https://www.bing.com/images/search?q=Encryption+In+Aes&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5752.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Encryption+In+Aes
[thumbnail] => Array
(
[thumbnailUrl] => https://tse2.mm.bing.net/th?q=Encryption+In+Aes&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[15] => Array
(
[text] => Aes Encryption Flow
[displayText] => Aes Encryption Flow
[webSearchUrl] => https://www.bing.com/images/search?q=Aes+Encryption+Flow&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5754.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Aes+Encryption+Flow
[thumbnail] => Array
(
[thumbnailUrl] => https://tse3.mm.bing.net/th?q=Aes+Encryption+Flow&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[16] => Array
(
[text] => Aes Encryption Steps
[displayText] => Aes Encryption Steps
[webSearchUrl] => https://www.bing.com/images/search?q=Aes+Encryption+Steps&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5756.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Aes+Encryption+Steps
[thumbnail] => Array
(
[thumbnailUrl] => https://tse4.mm.bing.net/th?q=Aes+Encryption+Steps&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[17] => Array
(
[text] => Aes Encryption Algorithm Flowchart
[displayText] => Aes Encryption Algorithm Flowchart
[webSearchUrl] => https://www.bing.com/images/search?q=Aes+Encryption+Algorithm+Flowchart&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5758.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Aes+Encryption+Algorithm+Flowchart
[thumbnail] => Array
(
[thumbnailUrl] => https://tse4.mm.bing.net/th?q=Aes+Encryption+Algorithm+Flowchart&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[18] => Array
(
[text] => Assymetric Encryption Diagram
[displayText] => Assymetric Encryption Diagram
[webSearchUrl] => https://www.bing.com/images/search?q=Assymetric+Encryption+Diagram&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5760.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Assymetric+Encryption+Diagram
[thumbnail] => Array
(
[thumbnailUrl] => https://tse3.mm.bing.net/th?q=Assymetric+Encryption+Diagram&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[19] => Array
(
[text] => Aes Encryption Explained
[displayText] => Aes Encryption Explained
[webSearchUrl] => https://www.bing.com/images/search?q=Aes+Encryption+Explained&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5762.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Aes+Encryption+Explained
[thumbnail] => Array
(
[thumbnailUrl] => https://tse1.mm.bing.net/th?q=Aes+Encryption+Explained&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
)
[createdate] => 1769239491049
)
[json_error] => No error
[products_count] => 103
[related_searches_count] => 20
[first_product_sample] => Array
(
[name] => AES encryption for Radio remote Controls
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP._eUzBCMY1eyLCqesAT1dfgHaDv?pid=Api
[datePublished] => 2020-07-21T04:08:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.anandcontrol.in/dist/assets/img/radio/aes_encryption.jpg
[hostPageUrl] => https://www.anandcontrol.in/blog/aes_encryption_radio_remote_controls.html
[contentSize] => 55128 B
[width] => 1600
[height] => 809
[cDNContentUrl] => https://th.bing.com/th/id/R.fde533042318d5ec8b0aa7ac013d5d7e?rik=d8CChxXLBsNOAg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => EAF41D43E1A6F9F57B31024EC306CB158782C077
[accentColor] => 0A7EC1
)
)
[skipped_products] => Array
(
)
)