## Public Key Cryptography w/ JAVA (tutorial 03) – DHKE w/ Encryption

this is a prebuilt version of the application so if we go ahead and start the server and two clients and this will be the server and this is the first client and this is the second one and p here is prime and alpha is a cyclic group generator so both Alice and Bob […]

## How to send password protected Outlook attachments | GDPR compliance

In this video, we’ll take a look how to automatically password-protect attachments in outgoing emails so that the email correspondence complies with a European General Data Protection regulation or GDPR. This can be easily achieved with Attachments Processor for Outlook add-in by MAPILab. The product that allows to archive specific attached files automatically and encrypt […]

## How SVM (Support Vector Machine) algorithm works

Hello, I will explain how SVM algorithm works. This video will explain the support vector machine for linearly separable binary sets Suppose we have this two features, x1 and x2 here and we want to classify all this elements You can see that we have the class square and the class rectangle So the goal […]

## Merge Two Binary Trees by doing Node Sum (Recursive) | GeeksforGeeks

Hello friends! And, welcome to another tutorial on GeeksforGeeks. In this video we are going to understand the program which merges two binary trees by doing node sum. First, let us take an example. The merge rule is that if two nodes overlap, then sum node values up as the new value of the merged […]

## Largest value in each level of Binary Tree | Set-2 (Iterative Approach) | GeeksforGeeks

Hello friends! And, welcome to another tutorial on GeeksforGeeks. In this video we are going to understand the program which helps us in ifnding the Largest value in each level of Binary Tree. First, let us take an example. The idea is to perform iterative level order traversal of the binary tree using queue. While […]

In this video we will look at how to access an interlibrary loan document provided electronically from the British Library. The delivery method is called DRM Lite. To order a document please submit an interlibrary loan request form choosing either Journal Article or Book Chapter. In this example we will order a Journal Article, please […]

## Getting Started with SSIS Productivity Pack: Encryption and Compression Components

Thank you for watching this video from KingswaySoft. Today I will be introducing the components for Encryption and Compression from within the SSIS Productivity Pack. The SSIS Productivity Pack is a collection of premium SSIS components which enable greater developer productivity and increases the power of SSIS. As of this recording, the SSIS Productivity Pack […]

## Coding Tutorial – Part 6

Coding Tutorial – Part 6 Time Shifts Plan for Time Shifts We plan to use two methods during time shifts: The process will be directed by these two buttons: ‘1350’ and ‘1750’. The first method will simply change the year shown under the ‘CITY’ title, making the actual one active, while the other inactive We […]

## Simulate internet TV – Python tutorial

Hi everyone, welcome to the Python tutorial. In this tutorial, I am going to simulate an internet TV. So I have to create two class first. One is called the network … NetworkDevice, and the second one is called the Television class. And I will create some methods for each of the classes. And then […]

## Emotion Detection Too Easy Tutorial | Facial Emotion Recognition Using CNN | Deep Learning – KERAS

guys thank you for the response your amazing response really motivate me and finally I got about 2.5 k views on my Instagram page on the face motion video so guys really thank you and as I promised that on this Saturday means now today I am going to give you a video that how […]