Search Results Collection Resources (483)

View
Selected filters:
  • Najran University
Activity diagram
Conditions of Use:
Remix and Share
Rating

Retrieved from Wikipedia URL:https://en.wikipedia.org/wiki/Activity_diagram License: Creative Commons Attribution-ShareAlike Activity diagrams are graphical ...

Retrieved from Wikipedia URL:https://en.wikipedia.org/wiki/Activity_diagram License: Creative Commons Attribution-ShareAlike

Activity diagrams are graphical representations of workflows of stepwise activities and actions with support for choice, iteration and concurrency.

Subject:
Applied Science
Material Type:
Reading
Provider:
Najran University
Author:
Dalal Alqahtani
Date created
18-محرم-1440
Algebra and Trigonometry
Rating

Algebra and Trigonometry provides a comprehensive exploration of algebraic principles and meets ...

Algebra and Trigonometry provides a comprehensive exploration of algebraic principles and meets scope and sequence requirements for a typical introductory algebra and trigonometry course. The modular approach and the richness of content ensure that the book meets the needs of a variety of courses. Algebra and Trigonometry offers a wealth of examples with detailed, conceptual explanations, building a strong foundation in the material before asking students to apply what they’ve learned.

Subject:
Mathematics
Material Type:
Data Set
Provider:
Najran University
Author:
أ.مها جابر مرشد ال صلاح
Date created
8-شعبان-1439
Analysing Use Case Diagrams in a Calculus of Context-aware Ambients
Conditions of Use:
Remix and Share
Rating

Use case diagrams are an excellent tool for capturing and analyzing the ...

Use case diagrams are an excellent tool for capturing and analyzing the functional requirements of a system under development. Context-aware use case diagrams are an extension of use case diagrams to cater for both the functional requirements and the context-awareness requirements of context-aware and pervasive systems. They provide (graphical) notations for specifying, visualizing and documenting the intended behavior of a context-aware system at an early stage of the system development life-cycle. This paper proposes an approach to analyzing context-aware use case diagrams usind a Calculus of Context-aware Ambients (CCA). An algorithm is proposed that translates a context-aware use case diagram into a CCA process. This process can then be analyzed using the CCA tools such as the simulator ccaPL which enables the execution of CCA processes and the model-checker ccaSPIN that can check automatically whether a CCA process satisfies a desired property, e.g. deadlock freedom and reachability. The proposed approach is evaluated using a real-word example of a context-aware pedestrian collision avoidance system.

Subject:
Career and Technical Education
Material Type:
Case Study
Provider:
Najran University
SHMS
Provider Set:
Open Author Resources
Author:
أحمد الشهي
Date created
15-جمادي الآخرة-1438
Animations of unseeable biology
Rating

We have no ways to directly observe molecules and what they do ...

We have no ways to directly observe molecules and what they do -- but Drew Berry wants to change that. He demos his scientifically accurate (and entertaining!) animations that help researchers see unseeable processes within our own cells.

Subject:
Applied Science
Material Type:
Interactive
Provider:
Najran University
Author:
أ.مها جابر مرشد ال صلاح
Date created
22-رجب-1439
Attribute-based encryption
Conditions of Use:
Remix and Share
Rating

This article is about Attribute-based encryption. The article explains Attribute-based encryption types, ...

This article is about Attribute-based encryption. The article explains Attribute-based encryption types, Attribute-based encryption usage, Attribute-based encryption challenges, Attribute revocation mechanism.

Subject:
Education
Material Type:
Reading
Provider:
Najran University
Author:
Maha Alwuthaynani
Date created
4-صفر-1440
Authentication
Conditions of Use:
Remix and Share
Rating

This article is about Authentication. The article explains authentication types, authentication security ...

This article is about Authentication. The article explains authentication types, authentication security and digital authentication.

Subject:
Education
Material Type:
Reading
Provider:
Najran University
Author:
Maha Alwuthaynani
Date created
25-محرم-1440
Big Data Modelling
Rating

Capture the requirements of big data will be valuable data and information ...

Capture the requirements of big data will be valuable data and information in our systems and the information is the most expensive source in our life and smart using of data and information can produce important resource such as oil or gold.

Subject:
Career and Technical Education
Material Type:
Activity/Lab
Provider:
Najran University
SHMS
Provider Set:
Open Author Resources
Author:
أحمد الشهي
Date created
19-جمادي الأولى-1438
Bitcoin
Conditions of Use:
Remix and Share
Rating

This article is about bitcoin. The article explains bitcoin, bitcoin blockchain, bitcoin ...

This article is about bitcoin. The article explains bitcoin, bitcoin blockchain, bitcoin network, bitcoin mining and bitcoin wallet

Subject:
Education
Material Type:
Reading
Provider:
Najran University
Author:
Maha Alwuthaynani
Date created
4-صفر-1440
Blind Signature
Conditions of Use:
Remix and Share
Rating

This article is about blind signature. The article explains blind signature usages, ...

This article is about blind signature. The article explains blind signature usages, blind signature scheme, blind signature applications and blind signature attacks

Subject:
Education
Material Type:
Reading
Provider:
Najran University
Author:
Maha Alwuthaynani
Date created
25-محرم-1440
Block Cipher
Conditions of Use:
Remix and Share
Rating

This article is about Block Cipher. The article explains modern design of ...

This article is about Block Cipher. The article explains modern design of block ciphers, block ciphers algorithms and Block ciphers evaluation criteria.

Subject:
Education
Material Type:
Reading
Provider:
Najran University
Author:
Maha Alwuthaynani
Date created
25-محرم-1440
Blockchain
Conditions of Use:
Remix and Share
Rating

This article is about Blockchain. The article explains blockchain design and blockchain ...

This article is about Blockchain. The article explains blockchain design and blockchain networks types

Subject:
Education
Material Type:
Reading
Provider:
Najran University
Author:
Maha Alwuthaynani
Date created
25-محرم-1440
Block cipher mode of operation
Conditions of Use:
Remix and Share
Rating

This article is about block cipher mode of operation. The article explains ...

This article is about block cipher mode of operation. The article explains block cipher mode of operation, Electronic Codebook, Cipher Block Chaining, Cipher Feedback, Output Feedback and Counter.

Subject:
Education
Material Type:
Reading
Provider:
Najran University
Author:
Maha Alwuthaynani
Date created
27-محرم-1440