- Simple client: The client connects to a Group Coordinator Daemon through a TCP/IP connection. It sends a
message to the list of group members, prints out the responses, and exists.
- Detection with Published quote: Implemented the Bellman-Ford algorithm which utilize UDC/IP
connections to monitor currency exchange rates from a price feed and prints out a message whenever arbitrage
opportunities in reverse order (showing losses instead of profit)
- Distributed Hash Table:Chord is a P2P lookup service that allows any node to join the group when the DHT is
not fully filled, and ither nodes to update their finger tables on each joining. Queriers are able to interact with
any node on the network to retrieve a value for a given key or add a key/value pair.
- BitCoin Blockchain: A P2P connection is used to fetch an old block from the BitCoin blockchain (TCP/IP). Our SU IDs corresponds to block numbers. A transaction in the block can be modified to change its output account.
Represent the modified data correctly in the block. Reports generated by programs should show how the block
hashes have changed and how peers may reject the block. Block transactions are displayed.
An image processing application was developed and the user provide an image in specified format. The API allows
user to performs combination of operations like flip, rotate to certain degree, resize, generate thumbnail and change
images to greyscale.
Designedweb-basedUI form that can capture a country-specific addressformat entered by user. The API dynamically
capture the address formats and present the list of addresses to the user.
One of the responsibilities of a governance analyst is to gauge the effectiveness of controls implemented and minimize the probability of a successful breach. If you are a security professional, you will often need to know the methods that hackers use to defeat controls implemented within an organization, as well as suggest ways to improve security overall. Once the attackers acquire valid credentials they can access an organization's IT system, which allows them to avoid many of the perimeter security controls in place.
Tennis is an arcade game which is played using paddles (racquets). This project is made keeping in mind a single player and it's opponent as an computer bot. The left paddle is being controlled by a player who uses his mouse to control the paddle, whereas the right paddle decides it's moves based on the tennis ball's position on the canvas. A player scores a point when his opponent misses to strike the ball. This project is developed using JavaScript and HTML5.
Team Redhawks created a digital library consisting of a collection of selected Computer Science books. Our product invites all levels of expertise who share a common interest in the field of computing. Our team gathered eBooks interrelated to the discipline and will be providing details, description, author(s), publication date, copyright, and etc. Our main objective was to collect these notable resources and have them readily available on one platform.