Engineering Concepts Tutorials

Engineering Concepts Tutorials for UML, Operations Research, Numerical Methods and many more.
  Title / Author Replies
Views Reverse Sort Order
Instead of defining what is design pattern lets define what we mean by design and what we mean by pattern. According to me design is blue print or sketch of something so it can be defined as creation of something in mind. Moving to pattern, we can define it as guideline, or something that repeats....
A Server is a computer or device on a network that manages network resources. For example, a file server is a computer and storage device dedicated to storing files Any user on the network can store files on the server. A print server is a computer that manages one or more printers and a network...
What is MD5 or MD5sum? Its a formula - a way to take a message of an arbitrary length, and create a 128-bit "fingerprint" or "message digest" of the message. MD5 is a way to verify data integrity. On these forums, it comes up fairly often in discussions about storing user passwords and other...
Introduction A VLAN is a grouping of computers that is logically segmented by functions, project teams, or applications without regard to the physical location of users. For example, several end stations might be grouped as a department, such as Engineering or Accounting, having the same...
Although they are not directly executable as programs, the many DLL files present in Windows contain libraries of functions that are used throughout the operating system and in application software. Generally, these functions are used internally by programs and are not directly visible to the...
Introduction and background Computer viruses tend to grab our attention. On the one hand, viruses show us how vulnerable we are. A properly engineered virus can have an amazing effect on the worldwide Internet. On the other hand, they show how sophisticated and interconnected human beings have...
Introduction Artificial Intelligence (AI) is a broad field, and means different things to different people. It is concerned with getting computers to do tasks that require human intelligence. However, having said that, there are many tasks which we might reasonably think require intelligence -...
SSL (Secure Sockets Layer) certificates are perhaps the most common way to protect information being transmitted between a visitor Web browser and your Web site. SSL provides encryption services to information flowing between systems and can protect Web traffic, e-mail, instant messages and a host...
Are You Invisible Online? It's true that your IP address is no secret. It's a basic part of internet communication protocols to send your IP address whenever you connect to another site, request a web page, chat, play an online game, etc. Without your IP address, the computer on the other...
It tries to solve the demand supply matrix with Vogel Approximation method. The code The code I have tried to keep is pretty self explanatory to the person who knows what VAM is all about. #include <stdio.h> #include <conio.h> #define TRUE 1
What is an IP address? Think of an IP address like you do a mailing address. It's basically the exact same thing. Consider this, when you send out a letter, what do you do? You put that letter in an envelope, write the address, put a stamp on it, stick in the mailbox and put that red flag up on...
OOP OOP is the abbreviation for Object orientated programming. OOP is a paradigm which defines the way a developer structures software into objects. Because such objects often correlate to real existing articles or procedures, it is often easier to read and less complicated to manage A type...
Behind the scenes, the commands sent to mail servers are simple text commands. These commands can be to sent to an email server manually via telnet. This is a quick way to test an email server to determine if it is an open relay. First, determine the MX for the domain in question, run this...
Introduction The Transmission Control Protocol / Internet Protocol (TCP/IP) is a nonproprietary, routable network protocol suite that enables computers to communicate over all types of networks. TCP/IP is the native protocol of the Internet and is required for Internet Connectivity. The...
Routing and switching can be two terms that are difficult to differentiate, so here is a simple explanation that may help to clarify things. First of all switching and routing are not the same thing. Switching involves moving packets between devices on the same network. Conversely, routing involves...
Cyclomatic Complexity its a type of white box testing for Structural testing use under reference of code complexity. Facts about why White Box Testing? Most programe coding represents what the program actually dose and not what intended to do. It minimizes delay between defect injection...
In the early days of computers, memories were small & expensive. In those days the programmer spent a lot of time trying to squeeze programs into the tiny memory. Often it was necessary to use an algorithm that ran a great deal slower than another, better algorithm simply because the better...
So, what is a cipher anyway? A cipher is an algorithm or set of algorithms that systematically convert a sender's intended message text to what appears to be meaningless text, which can be converted back to the sender's original message only by authorized recipients. The following terms and...
In the earlier articles, we came across the concepts of RSA algorithm in Public Key cryptography. Being a generic topic, it can be implemented in security applications of variant technologies. We shall see the implementation of RSA algorithm using C#. RSA Encryption RSA Encryption can be...
Imagine a network based on inexpensive, high volume chipsets, with data rates up to 12Mbit/second and a 25 meter distance capacity, designed from the start with “plug and play” in mind. Add 5 Volt power, with up to 500mA current capacity, and compatibility with many consumer products. ...