Engineering Concepts Tutorials

Engineering Concepts Tutorials for UML, Operations Research, Numerical Methods and many more.
  Title / Author Reverse Sort Order Replies
Cyclomatic Complexity its a type of white box testing for Structural testing use under reference of code complexity. Facts about why White Box Testing? Most programe coding represents what the program actually dose and not what intended to do. It minimizes delay between defect injection...
Arbitrary Precision In most computer programs and computing environments, the precision of any calculation (even including addition) is limited by the word size of the computer, that is, by largest number that can be stored in one of the processor's registers. As of mid-2002, the most common...
Hi All ! we all use browsers, different kinds of browsers, to surf the internet. But do we know what makes a browser work ? How do a browser come to know that when to show which color or when to show which kind of style of text ? We can say we give instructions by using HTML or DHTML or...
Analytics and its tools have been very well received by bigger corporations in the recent past. This technical term has gained a lot of importance in the technology world. Corporations such as Google, Facebook are investing heavily to create a unique platform to do big data analysis. This analysis...
I have nothing to say the guide is self explanatory about itself, if a m confusing u read on.... lol BIOS Beep Codes When a computer is first turned on, or rebooted, its BIOS performs a power-on self test (POST) to test the system's hardware, checking to make sure that all of the system's...
In mathematical numeral systems, the base or radix is usually the number of various unique digits, including zero, that a positional numeral system uses to represent numbers. For example, the decimal system, the most common system in use today, uses base ten, hence the maximum number a single digit...
In this article we will explore the two main choices of graphic format that can be used on the Web to represent simple graphics, schemas or logos: · GIF (stands for Graphics Interchange Format) was developed in the late 1980's and it is still widely used. · PNG (Portable Network Graphics) was...
What is an IP address? Think of an IP address like you do a mailing address. It's basically the exact same thing. Consider this, when you send out a letter, what do you do? You put that letter in an envelope, write the address, put a stamp on it, stick in the mailbox and put that red flag up on...
Lossless Encoding is a method of encoding that allows no loss of data while converting to and from encoded data to normal data. Lossless Audio Encoding Q: Why special encoding methods for audio? A : Lossless encoding is not only done in audio, video etc. We actually have a ton of genric...
Microservices are: Small and highly decoupled apps They have a single purpose/functionality Accessible via APIs Microservices are self-sufficient and they do not depend on other microservices. Containerless & installed as well-behaved services Installed the same way you would install https...
It tries to solve the demand supply matrix with Vogel Approximation method. The code The code I have tried to keep is pretty self explanatory to the person who knows what VAM is all about. #include <stdio.h> #include <conio.h> #define TRUE 1
Introduction Just imagine, At the end of a busy day, you are sitting on the sofa and you need a hot cup of tea… You just thought for a cup of tea, and it step to you! Don’t think me a mad or I’m not joking! This impossible thing can be possible by the help of BMI or Brain Machine Interfacing...
Introduction Now-a-days mobiles are the signal of our presence! If we switched off our cell phone then we will be de-touched from the world! Now if such a important thing is affected by a virus or stopped working then? My purpose of writing this article is to let you know about some back...
In the early days of computers, memories were small & expensive. In those days the programmer spent a lot of time trying to squeeze programs into the tiny memory. Often it was necessary to use an algorithm that ran a great deal slower than another, better algorithm simply because the better...
This is known to all that AMD is the only one competitor of Intel’s market. In this “Dual-Core” era of CPU’s AMD is going to launch their APU or Accelerated Processing Unit in this year. Not only AMD Intel is also working with this architecture and hopefully they will also release their new...
Whether you are a newbie who is interested in learning some basic concepts related to computer networks or an experienced fellow looking for a quick refresher on computer network fundamentals, this article is for you. In this article, we will discuss some basic terminologies related to computer...
Adware Adware is any computer program or software package in which advertisements or other marketing material are included with or automatically loaded by the software and displayed or played back after installation. The justification for adware is that it helps recover programming...
TCP/IP (Transmission Control Protocol/Internet Protocol), the suite of communications protocols used to connect hosts on the Internet. TCP/IP uses several protocols, the two main ones being TCP and IP. TCP/IP is built into the UNIX operating system and is used by the Internet, making it the de...
Introduction A VLAN is a grouping of computers that is logically segmented by functions, project teams, or applications without regard to the physical location of users. For example, several end stations might be grouped as a department, such as Engineering or Accounting, having the same...
One of the most common procedures that occurs in computer programs is the copying of data. An object is a composite data type in object-oriented programming languages. Object copy thus describes the action wherein an object has its attributes copied to another object of the same data type. An...