Search Results Collection Resources (462)

View
Selected filters:
  • Najran University
Activity diagram
Conditions of Use:
Remix and Share
Rating

Retrieved from Wikipedia URL:https://en.wikipedia.org/wiki/Activity_diagram License: Creative Commons Attribution-ShareAlike Activity diagrams are graphical ...

Retrieved from Wikipedia URL:https://en.wikipedia.org/wiki/Activity_diagram License: Creative Commons Attribution-ShareAlike

Activity diagrams are graphical representations of workflows of stepwise activities and actions with support for choice, iteration and concurrency.

Subject:
Applied Science
Material Type:
Reading
Author:
Dalal Alqahtani
Date created
18-محرم-1440
Advanced Encryption Standard
Conditions of Use:
Remix and Share
Rating

This article is about advanced encryption standard. The article explains AES security, ...

This article is about advanced encryption standard. The article explains AES security, attacks against AES and AES performance.

Subject:
Education
Material Type:
Reading
Author:
Maha Alwuthaynani
Date created
25-محرم-1440
Affine cipher
Rating

This lesson is about Affine cipher. It explains how to encrypt and ...

This lesson is about Affine cipher. It explains how to encrypt and decrypt using Affine cipher.

Subject:
Education
Material Type:
Lesson
Author:
Maha Alwuthaynani
Date created
4-صفر-1440
Analysing Use Case Diagrams in a Calculus of Context-aware Ambients
Conditions of Use:
Remix and Share
Rating

Use case diagrams are an excellent tool for capturing and analyzing the ...

Use case diagrams are an excellent tool for capturing and analyzing the functional requirements of a system under development. Context-aware use case diagrams are an extension of use case diagrams to cater for both the functional requirements and the context-awareness requirements of context-aware and pervasive systems. They provide (graphical) notations for specifying, visualizing and documenting the intended behavior of a context-aware system at an early stage of the system development life-cycle. This paper proposes an approach to analyzing context-aware use case diagrams usind a Calculus of Context-aware Ambients (CCA). An algorithm is proposed that translates a context-aware use case diagram into a CCA process. This process can then be analyzed using the CCA tools such as the simulator ccaPL which enables the execution of CCA processes and the model-checker ccaSPIN that can check automatically whether a CCA process satisfies a desired property, e.g. deadlock freedom and reachability. The proposed approach is evaluated using a real-word example of a context-aware pedestrian collision avoidance system.

Subject:
Career and Technical Education
Material Type:
Case Study
Author:
أحمد الشهي
Date created
15-جمادي الآخرة-1438
Attribute-based encryption
Conditions of Use:
Remix and Share
Rating

This article is about Attribute-based encryption. The article explains Attribute-based encryption types, ...

This article is about Attribute-based encryption. The article explains Attribute-based encryption types, Attribute-based encryption usage, Attribute-based encryption challenges, Attribute revocation mechanism.

Subject:
Education
Material Type:
Reading
Author:
Maha Alwuthaynani
Date created
4-صفر-1440
Authentication
Conditions of Use:
Remix and Share
Rating

This article is about Authentication. The article explains authentication types, authentication security ...

This article is about Authentication. The article explains authentication types, authentication security and digital authentication.

Subject:
Education
Material Type:
Reading
Author:
Maha Alwuthaynani
Date created
25-محرم-1440
Big Data Modelling
Rating

Capture the requirements of big data will be valuable data and information ...

Capture the requirements of big data will be valuable data and information in our systems and the information is the most expensive source in our life and smart using of data and information can produce important resource such as oil or gold.

Subject:
Career and Technical Education
Material Type:
Activity/Lab
Author:
أحمد الشهي
Date created
19-جمادي الأولى-1438
Bitcoin
Conditions of Use:
Remix and Share
Rating

This article is about bitcoin. The article explains bitcoin, bitcoin blockchain, bitcoin ...

This article is about bitcoin. The article explains bitcoin, bitcoin blockchain, bitcoin network, bitcoin mining and bitcoin wallet

Subject:
Education
Material Type:
Reading
Author:
Maha Alwuthaynani
Date created
4-صفر-1440
Blind Signature
Conditions of Use:
Remix and Share
Rating

This article is about blind signature. The article explains blind signature usages, ...

This article is about blind signature. The article explains blind signature usages, blind signature scheme, blind signature applications and blind signature attacks

Subject:
Education
Material Type:
Reading
Author:
Maha Alwuthaynani
Date created
25-محرم-1440
Block Cipher
Conditions of Use:
Remix and Share
Rating

This article is about Block Cipher. The article explains modern design of ...

This article is about Block Cipher. The article explains modern design of block ciphers, block ciphers algorithms and Block ciphers evaluation criteria.

Subject:
Education
Material Type:
Reading
Author:
Maha Alwuthaynani
Date created
25-محرم-1440
Blockchain
Conditions of Use:
Remix and Share
Rating

This article is about Blockchain. The article explains blockchain design and blockchain ...

This article is about Blockchain. The article explains blockchain design and blockchain networks types

Subject:
Education
Material Type:
Reading
Author:
Maha Alwuthaynani
Date created
25-محرم-1440
Block cipher mode of operation
Conditions of Use:
Remix and Share
Rating

This article is about block cipher mode of operation. The article explains ...

This article is about block cipher mode of operation. The article explains block cipher mode of operation, Electronic Codebook, Cipher Block Chaining, Cipher Feedback, Output Feedback and Counter.

Subject:
Education
Material Type:
Reading
Author:
Maha Alwuthaynani
Date created
27-محرم-1440
Blue-ray Technology
Rating

هو نوع من ادوات التخزين المستخدمة في الكمبيوتر والتي تستخدم لحفظ ملفات ...

هو نوع من ادوات التخزين المستخدمة في الكمبيوتر والتي تستخدم لحفظ ملفات ذات احجام كبيرة وبتكلفة اقل

Subject:
Career and Technical Education
Material Type:
Activity/Lab
Author:
علي المصعبي
Date created
14-جمادي الآخرة-1438
Brute-force attack
Conditions of Use:
Remix and Share
Rating

This article is about Brute-force attack. The article explains brute-force attack, password-guessing ...

This article is about Brute-force attack. The article explains brute-force attack, password-guessing method, and Break a symmetric key by brute force.

Subject:
Education
Material Type:
Reading
Author:
Maha Alwuthaynani
Date created
27-محرم-1440