Engineering Concepts Tutorials

Engineering Concepts Tutorials for UML, Operations Research, Numerical Methods and many more.
  Title Reverse Sort Order / Author Replies
Views
The Bouncy Castle Crypto APIs is a set of implementations of cryptographic concepts and algorithms. Bouncy Castle APIs are developed in both Java and C#. These APIs can be freely downloaded from the Bouncy Castle home page. Let us have a glance at some of the important type of implementations...
2
9,323
Introduction Fuzzy systems is an alternative to traditional notions of set membership and logic that has its origins in ancient Greek philosophy, and applications at the leading edge of Artificial Intelligence. Yet, despite its long-standing origins, it is a relatively new field, and as such...
6
5,283
All software developers must have used some VCS (Version Control System) at a point of their career, most would say SVN, which is currently the widely used VCS in the software industry. Enter Git, created by Linus Torvalds in response to missing features & performance issues in the other VCSs,...
0
3,399
Lossless Encoding is a method of encoding that allows no loss of data while converting to and from encoded data to normal data. Lossless Audio Encoding Q: Why special encoding methods for audio? A : Lossless encoding is not only done in audio, video etc. We actually have a ton of genric...
0
2,998
Advance concept Once a parse tree has been built using syntaic analysis, the semantics, or meaning, of the sentence needs to be found. This is a very difficult task as it requires world knowledge. The need for semantic information is illustrated by trying to follow a recipe. Knowing that the...
0
4,100
Introduction First and foremost, we need to define what we mean by Natural Language Processing or NLP. The first and most general definition is simply that NLP encompasses anything a computer needs to do in order for it to understand natural language (whether it be typed or spoken). We'll...
0
5,882
The second step in NLP is called syntax. Once the basic of a sentence have been determined to be correct using morphology, syntax can be used to check they are properly combined. The most widely used method of checking a sentence is syntactically correct is to attempt to use a grammar to...
0
4,412
What is an IP address? Think of an IP address like you do a mailing address. It's basically the exact same thing. Consider this, when you send out a letter, what do you do? You put that letter in an envelope, write the address, put a stamp on it, stick in the mailbox and put that red flag up on...
2
19,702
Net - The Net is a common term for the Internet. Netiquette - The ethical and cultural rules of using the Internet, such as not posting advertisements to Usenet discussion groups (unless they allow them), not posting the same message to several newsgroups, avoidance of 'shouting' in e-mails...
1
4,406
ADSL (Asymmetrical Digital Subscriber Line) - A means of delivering high communication speeds over existing copper phone lines. Analog - The technology used by the original mobile phones. Like traditional radio broadcasts, phone conversations and information are transmitted in the form of a...
0
3,522
Introduction Now-a-days mobiles are the signal of our presence! If we switched off our cell phone then we will be de-touched from the world! Now if such a important thing is affected by a virus or stopped working then? My purpose of writing this article is to let you know about some back...
9
6,374
HAProxy stands for High Availability Proxy, is an open-source TCP/HTTP load balancer. In case you are new to the idea of a load balancer, the work of a load balancer is to distribute incoming requests to an array of upstream servers so as no single upstream server is overworked/overloaded by...
0
4,418
What is MD5 or MD5sum? Its a formula - a way to take a message of an arbitrary length, and create a 128-bit "fingerprint" or "message digest" of the message. MD5 is a way to verify data integrity. On these forums, it comes up fairly often in discussions about storing user passwords and other...
17
83,463
TCP/IP (Transmission Control Protocol/Internet Protocol), the suite of communications protocols used to connect hosts on the Internet. TCP/IP uses several protocols, the two main ones being TCP and IP. TCP/IP is built into the UNIX operating system and is used by the Internet, making it the de...
2
8,319
Introduction Multithreading is a concept where a program is broken into two or more parts called threads and all these threads run in parallel. Multithreading can make programs more responsive and effective and it increases its performance too. For example, today web pages need to display...
0
5,253
OOP OOP is the abbreviation for Object orientated programming. OOP is a paradigm which defines the way a developer structures software into objects. Because such objects often correlate to real existing articles or procedures, it is often easier to read and less complicated to manage A type...
3
18,987
Packet sniffing is listening (with software) to the raw network device for packets that interest you. When your software sees a packet that fits certain criteria, it logs it to a file. The most common criteria for an interesting packet is one that contains words like "login" or "password." ...
0
12,246
Using authoritative name service, DNS servers primarily advertise to the world the various records associated with the domain they serve. Because users prefer common names and networks prefer numbers, DNS servers handle the translation between what a user types in a browser—such as...
0
5,591
In a single processor multiprogramming system the processor switches between the various jobs until to finish the execution of all jobs. These jobs will share the processor time to get the simultaneous execution. Here the overhead is involved in switching back and forth between processes. ...
2
9,275
It might happen that your hard disk died on you, or the DVD backup you had does not read correctly. Generally, CD & DVD media retain data correctly for a few years (or more, depending on the quality of the media), after which data loss starts slowly with read errors increasing from the outer tracks...
1
4,366