mroctavious
Software architect and metaprogrammer, combining the power of memory and the compile to make powerful tools for developers.
Banco AztecaMexico
Pinned Repositories
Ajedrez-Parlanchin
Modded version of PythonChess https://uniformlyuninformative.wordpress.com/projects/python-chess/ with spanish voice
Alineamiento-Ehecatl
CentzonThinClient
A small virtual machine streamer using the SPICE protocol with a simple access from a RFID(MFRC522) Card for Raspberry Pi 3B+
Cuderberos
CUDA movement detector, out guardian Cuda Cerberos
HelloWorld
iTochcrypt
Encryption is a process for the protection of data by means of an encryption associated with a key so that the information is not visible, this with the aim of protecting the information of third parties that are not authorized to visualize, for this a symmetric algorithm is used of encryption called Hill Cipher (HC). The HC algorithm was perfectly adapted to the solution of the problem that already uses with a square matrix to encrypt the channels of the pixel of an image or the characters of a text. This is applied to an instant messaging application, thus preventing third parties from understanding the message.
Metaqueue
Metaserializer
Serializer and Desarializer class using binary data only with the power of metaprogramming
ProyectoFinalMelchor
Proyecto Final de Administración de Sistemas Operativos para el Profesor Melchor Adrián Leal Suárez de la Facultad de Informática de la Universidad Autónoma de Queretaro.
Tochcrypt
File encryption and decryption using the Hill Cipher algorithm
mroctavious's Repositories
mroctavious/Tochcrypt
File encryption and decryption using the Hill Cipher algorithm
mroctavious/Metaqueue
mroctavious/Metaserializer
Serializer and Desarializer class using binary data only with the power of metaprogramming
mroctavious/iTochcrypt
Encryption is a process for the protection of data by means of an encryption associated with a key so that the information is not visible, this with the aim of protecting the information of third parties that are not authorized to visualize, for this a symmetric algorithm is used of encryption called Hill Cipher (HC). The HC algorithm was perfectly adapted to the solution of the problem that already uses with a square matrix to encrypt the channels of the pixel of an image or the characters of a text. This is applied to an instant messaging application, thus preventing third parties from understanding the message.
mroctavious/Cuderberos
CUDA movement detector, out guardian Cuda Cerberos
mroctavious/ProyectoFinalMelchor
Proyecto Final de Administración de Sistemas Operativos para el Profesor Melchor Adrián Leal Suárez de la Facultad de Informática de la Universidad Autónoma de Queretaro.
mroctavious/Ajedrez-Parlanchin
Modded version of PythonChess https://uniformlyuninformative.wordpress.com/projects/python-chess/ with spanish voice
mroctavious/Alineamiento-Ehecatl
mroctavious/CentzonThinClient
A small virtual machine streamer using the SPICE protocol with a simple access from a RFID(MFRC522) Card for Raspberry Pi 3B+
mroctavious/HelloWorld
mroctavious/Phylogeny
An exploration on phylogenetic reconstruction algorithms.
mroctavious/planets
Clase de Github en la Escuela de verano de BioInformatica
mroctavious/RPi-RFID
Raspberry Pi RFID Library for MFRC522
mroctavious/Xipetotec-File-System
Xipetotec File System is a school project that combines the power of C++, Python and MySQL. The program can transfer files between sockets and between users.
mroctavious/Merkabot
mroctavious/Pipe
Wrapper for opening pipes in c++