Engineering Concepts Tutorials

Engineering Concepts Tutorials for UML, Operations Research, Numerical Methods and many more.
  Title / Author Replies
The article extends the Cryptography concepts to explain the Symmetric Key encryption. Additionally, it throws light on the capabilities of Symmetric key encryption and its operational modes. Symmetric-Key encryption Symmetric key cryptography is encrypting or decrypting message using a...
Define the Multicore Computing As software developers we have enjoyed a long trend of consistent performance improvement from processor technology. In fact, for the last 20 years processor performance has consistently doubled about every two years or so. But, day by day the truth is realizing...
Although they are not directly executable as programs, the many DLL files present in Windows contain libraries of functions that are used throughout the operating system and in application software. Generally, these functions are used internally by programs and are not directly visible to the...
Introduction Artificial Intelligence (AI) is a broad field, and means different things to different people. It is concerned with getting computers to do tasks that require human intelligence. However, having said that, there are many tasks which we might reasonably think require intelligence -...
A set of processes is deadlocked if each process in the set is waiting for an event that can be caused by another process in the set. The events that we are mainly concerned with are resource acquisition and release. The resources may be physical resources (CPU, I/O devices, memory) or logical...
In a single processor multiprogramming system the processor switches between the various jobs until to finish the execution of all jobs. These jobs will share the processor time to get the simultaneous execution. Here the overhead is involved in switching back and forth between processes. ...
Introduction Now-a-days mobiles are the signal of our presence! If we switched off our cell phone then we will be de-touched from the world! Now if such a important thing is affected by a virus or stopped working then? My purpose of writing this article is to let you know about some back...
Introduction Just imagine, At the end of a busy day, you are sitting on the sofa and you need a hot cup of tea… You just thought for a cup of tea, and it step to you! Don’t think me a mad or I’m not joking! This impossible thing can be possible by the help of BMI or Brain Machine Interfacing...
One of the most common procedures that occurs in computer programs is the copying of data. An object is a composite data type in object-oriented programming languages. Object copy thus describes the action wherein an object has its attributes copied to another object of the same data type. An...
What is Blu-ray? Blu-ray, also known as Blu-ray Disc (BD) is the name of a next-generation optical disc format. The format was developed to enable recording, rewriting and playback of high-definition video (HD), as well as storing large amounts of data. The format offers more than five times...
We found it necessary to devote a chapter to Trojans. Trojan's are probably the most compromising of all types of attacks. Trojans are being released by the hundreds every week, each more cleverly designed that the other. We all know the story of the Trojan horse probably the greatest strategic...
Introduction Pocket Pc is a handheld sized computer.It runs on Microsoft windows mobile operating systems.It may have capability to run on alternative operating system like NetBSD,Linux,Android (or) others.It has many of the capability of modern desktop PC Pocket PC is an evolution from...
Hi All ! we all use browsers, different kinds of browsers, to surf the internet. But do we know what makes a browser work ? How do a browser come to know that when to show which color or when to show which kind of style of text ? We can say we give instructions by using HTML or DHTML or...
It tries to solve the demand supply matrix with Vogel Approximation method. The code The code I have tried to keep is pretty self explanatory to the person who knows what VAM is all about. #include <stdio.h> #include <conio.h> #define TRUE 1
Net - The Net is a common term for the Internet. Netiquette - The ethical and cultural rules of using the Internet, such as not posting advertisements to Usenet discussion groups (unless they allow them), not posting the same message to several newsgroups, avoidance of 'shouting' in e-mails...
SSL (Secure Sockets Layer) certificates are perhaps the most common way to protect information being transmitted between a visitor Web browser and your Web site. SSL provides encryption services to information flowing between systems and can protect Web traffic, e-mail, instant messages and a host...
Behind the scenes, the commands sent to mail servers are simple text commands. These commands can be to sent to an email server manually via telnet. This is a quick way to test an email server to determine if it is an open relay. First, determine the MX for the domain in question, run this...
What is an IP address? Think of an IP address like you do a mailing address. It's basically the exact same thing. Consider this, when you send out a letter, what do you do? You put that letter in an envelope, write the address, put a stamp on it, stick in the mailbox and put that red flag up on...
The Component Object Model (COM) is a softwarearchitecture that allows applications to be built frombinary software components. COM is the underlyingarchitecture that forms the foundation forhigher-level software services, like those provided byOLE. OLE services span various aspects of...
A binary-safe function is a function or operation that can be performed on a binary file without modifying the contents of the file. This ensures that the file is not corrupted or mutilated by the function or operation. Binary data is encoded as a string of ones and zeros (bits), but is not...