scispace - formally typeset
Search or ask a question
Topic

Handshake

About: Handshake is a research topic. Over the lifetime, 1105 publications have been published within this topic receiving 15166 citations. The topic is also known as: 🤝.


Papers
More filters
Journal Article•DOI•
24 Feb 2018
TL;DR: The results of the study showed that the use of the handshake context can help students to understand of the Combination concept.
Abstract: This research used design research. It was constructing a learning trajectory through handshake context to help students’ understanding of the Combination concept. This research used PMRI approach. The participants of the research were the students of 10 th class SMA Negeri 15 Palembang. For retrospective analysis, the data were collected from a teaching experiment in form of student’s work, field notes, and interviews. The obtained data is a learning trajectory which is consists of 1) students do a role-play scene of the handshake activity; this activity supports students’ understanding that A do handshake with B is the same with B do handshake with A, which it indicates order does not matter in Combination. 2) students utilize their knowledge about factorial forms to analyze the general pattern of the Combination. 3) students solve problems related to the Combination concept to help them think about how to solve the similar problems in the daily life. The results of the study showed that the use of the handshake context can help students to understand of the Combination concept.

8 citations

Proceedings Article•DOI•
01 Oct 2019
TL;DR: A novel haptic handshake protocol that facilitates exchange of haptic metadata between TI nodes through Tactile Internet Metadata (TIM) scheme is presented and through WebRTC-based implementation and real haptic devices, a proof of concept of the proposed protocol is provided.
Abstract: The rapidly rising interest in Tactile Internet (TI) has lead to the inception of IEEE 1918.1 working group (WG) with a primary objective of envisioning and standardizing various modules crucial for the realization of TI. One of the several core activities of the WG is to standardize haptic codecs for human-in-the-loop applications. This subsumes standardization of haptic handshake scheme for orchestration between heterogeneous nodes for seamless TI interaction. To this end, we present a novel haptic handshake protocol that facilitates exchange of haptic metadata between TI nodes through Tactile Internet Metadata (TIM) scheme. Through WebRTC-based implementation and real haptic devices, we provide a proof of concept of the proposed protocol. The mean and the standard deviation of the handshake latency is measured to be 47.25 ms and 23.38 ms, respectively, thereby making it a strong candidate for employment in TI applications. Finally, we shed light on future refinements to our implementation.

8 citations

Journal Article•DOI•
TL;DR: Monitoring the effect of temporal violations of the expected length of a handshake administered unobtrusively in a naturalistic experiment found participants reacted behaviorally to temporal manipulations of handshakes, with relevant implications for interactions in interviews, business, educational, and social settings and for assisting patients with social skills difficulties.
Abstract: Although detailed descriptions of proper handshakes partly comprise many etiquette books, how a normal handshake can be described, its proper duration, and the consequences of violating handshake e...

8 citations

Patent•
01 Oct 2014
TL;DR: In this paper, a method and device for recognizing an Android simulator is presented, which comprises the steps of receiving a connecting request sent by a terminal and obtaining a handshake data packet in the connecting request; analyzing the handshake data packets, and obtaining information inside a designated field in the handshake packet; when the information inside the designated field meets the preset condition, determining that the Android simulator used for the terminal is recognized.
Abstract: The invention discloses a method and device for recognizing an Android simulator, and belongs to the technical field of terminals. The method comprises the steps of receiving a connecting request sent by a terminal, and obtaining a handshake data packet in the connecting request; analyzing the handshake data packet, and obtaining information inside a designated field in the handshake data packet; when the information inside the designated field in the handshake data packet meets the preset condition, determining that the Android simulator used for the terminal is recognized. According to the method and device for recognizing the Android simulator, the operation of recognizing the Android simulator is carried out by a server side according to the connecting request after the server side receives the connecting request of the terminal, no extra communication processes are needed, then the phenomenon that the feedback information for recognizing the terminal is not accurate due to extra communication does not exist, and the efficiency for recognizing the terminal is improved.

8 citations

Journal Article•DOI•
TL;DR: An original approach to identify synchronize (SYN) flooding attacks from the victim's side, on the basis of a classification of the different forms that TCP handshakes can take during a connection set-up between a client and a server.
Abstract: We present an original approach to identify synchronize (SYN) flooding attacks from the victim's side, on the basis of a classification of the different forms that TCP handshakes can take during a connection set-up between a client and a server (e.g. for Web traffic). We first identify the unusual handshake sequences that result from an attack and show how such observations can be used for SYN flooding attack detection. We then introduce a data structure to monitor, in real time, the state of the TCP handshake and study its performance. In addition, we explain the management of the data structure for operations such as initialization, adding and removing flows. Finally, we analyse the effectiveness of our TCP handshake monitoring to identify the presence of SYN flooding attacks by applying it to real traffic traces. To allow quick protection and help guarantee a proper defence, the detection is done in real time. Our detection system uses a non-parametric cumulative sum algorithm (CUSUM), which has the benefit of not requiring a detailed model of the normal and attack traffic while achieving excellent detection levels. Copyright © 2011 John Wiley & Sons, Ltd.

8 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
79% related
Social network
42.9K papers, 1.5M citations
74% related
Wireless
133.4K papers, 1.9M citations
74% related
Encryption
98.3K papers, 1.4M citations
73% related
Wireless network
122.5K papers, 2.1M citations
72% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202358
2022140
202137
202065
201991
201877