بحث بسيط
السجلات المعروضة 1 -- 10 من 34
A performance comparison of MD5 authenticated routing traffic with EIGRP, RIPv2, and OSPF
(
Zarqa University
, 2010 , Article)
Routing is the process of forwarding data across an inter-network from a designated source to a final destination. Along the way from source to destination, at least one intermediate node is considered. Due to the major ...
Software project management: Theory of constraints, risk management, and performance evaluation
(
Mundo Press
, 2014 , Article)
Constraints and risks are two critical factors that affect software project performance; more attention needs to be paid to constraints and risks in order to improve performance. In this paper, investigation will take place ...
Modern techniques and technologies applied to training and performance monitoring
(
Human Kinetics
, 2016 , Article)
Athlete preparation and performance continues to increase in complexity and costs. Modern coaches are shifting from reliance on personal memory, experience, and opinion to evidence from collected training load data. Training ...
Empirical performance evaluation of QUIC protocol for Tor anonymity network
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Tor's anonymity network is one of the most widely used anonymity networks online, it consists of thousands of routers run by volunteers. Tor preserves the anonymity of its users by relaying the traffic through a number of ...
Pass-fail decisions for borderline performers after a summative objective structured clinical examination
(
American Association of Colleges of Pharmacy
, 2019 , Article)
Objective. To determine what expert assessors value when making pass-fail decisions regarding pharmacy students based on summative data from objective structured clinical examinations (OSCE), and to determine the reliability ...
How students are using social networks? Emotional intelligence as a determinant
(
IGI Global
, 2019 , Article)
Social networks are now being used by the majority of Internet users and are becoming an important part of social life. This exploratory study utilized a sample of 254 high school students to explore their social networks' ...
Uncertainty and contract flexibility in automotive supply chains: A simulation model
(
Inderscience Enterprises Ltd.
, 2019 , Article)
Supply chains are vulnerable to uncertainties in demand and supply. Such uncertainties are often responsible for failure of contracts between buyers and suppliers. Flexible provisions in contracts are likely to reduce the ...
Performance and security improvements for Tor: A survey
(
Association for Computing Machinery
, 2016 , Article)
Tor [Dingledine et al. 2004] is the most widely used anonymity network today, serving millions of users on a daily basis using a growing number of volunteer-run routers. Since its deployment in 2003, there have been more ...
Technical and tactical discriminatory factors between winners and defeated elite karate athletes
(
Human Kinetics Publishers Inc.
, 2019 , Article)
Purpose: To assess the technical and tactical demands of elite karate athletes in relation to 3 match sequences (ie, advantage, disadvantage, and drawing) and match outcome (ie, win/defeat). Methods: One hundred twenty ...
Optimization of performance and emission characteristics of CI engine fueled with Jatropha biodiesel produced using a heterogeneous catalyst (CaO)
(
Elsevier Ltd
, 2020 , Article)
This study includes the use of heterogeneous catalyst (CaO) for the production of Jatropha biodiesel through transesterification reaction. The heterogeneous transesterification delivered a yield of 81.6% at 5 wt% catalyst ...