Engineering Concepts Tutorials

Engineering Concepts Tutorials for UML, Operations Research, Numerical Methods and many more.
  Title / Author Replies Reverse Sort Order
Views
The Component Object Model (COM) is a softwarearchitecture that allows applications to be built frombinary software components. COM is the underlyingarchitecture that forms the foundation forhigher-level software services, like those provided byOLE. OLE services span various aspects of...
1
5,436
Imagine a network based on inexpensive, high volume chipsets, with data rates up to 12Mbit/second and a 25 meter distance capacity, designed from the start with “plug and play” in mind. Add 5 Volt power, with up to 500mA current capacity, and compatibility with many consumer products. ...
1
13,967
Net - The Net is a common term for the Internet. Netiquette - The ethical and cultural rules of using the Internet, such as not posting advertisements to Usenet discussion groups (unless they allow them), not posting the same message to several newsgroups, avoidance of 'shouting' in e-mails...
1
4,238
If you have used a computer for more than five minutes, then you have heard the words bits and bytes. Both RAM and hard disk capacities are measured in bytes, as are file sizes when you examine them in a file viewer. You might hear an advertisement that says, "This computer has a 32-bit...
1
8,756
I have nothing to say the guide is self explanatory about itself, if a m confusing u read on.... lol BIOS Beep Codes When a computer is first turned on, or rebooted, its BIOS performs a power-on self test (POST) to test the system's hardware, checking to make sure that all of the system's...
1
4,736
In this article we will explore the two main choices of graphic format that can be used on the Web to represent simple graphics, schemas or logos: · GIF (stands for Graphics Interchange Format) was developed in the late 1980's and it is still widely used. · PNG (Portable Network Graphics) was...
1
3,252
A binary-safe function is a function or operation that can be performed on a binary file without modifying the contents of the file. This ensures that the file is not corrupted or mutilated by the function or operation. Binary data is encoded as a string of ones and zeros (bits), but is not...
1
6,332
The second step in NLP is called syntax. Once the basic of a sentence have been determined to be correct using morphology, syntax can be used to check they are properly combined. The most widely used method of checking a sentence is syntactically correct is to attempt to use a grammar to...
0
4,261
Advance concept Once a parse tree has been built using syntaic analysis, the semantics, or meaning, of the sentence needs to be found. This is a very difficult task as it requires world knowledge. The need for semantic information is illustrated by trying to follow a recipe. Knowing that the...
0
3,954
Arbitrary Precision In most computer programs and computing environments, the precision of any calculation (even including addition) is limited by the word size of the computer, that is, by largest number that can be stored in one of the processor's registers. As of mid-2002, the most common...
0
3,991
Have you ever wondered why e-mail attachments are encoded? Well read ahead tro find the answer to this. Internet e-mail and Usenet news posts were designed for plain text messages. As such, many systems expect the messages to only contain printable characters from the 7-bit (first bit of the...
0
2,877
GSM, short for Global System for Mobile Communication, is the standard behind digital mobile phones. It has opened up a new era of digital communications, which extends beyond voice to include data. GSM was planned from the outsell to provide a full range of data and fax transmission on the move,...
0
4,885
Introduction SSL shorts for Secure Sockets Layer, a protocol developed by Netscape for transmitting private documents via the Internet. SSL works by using a public key to encrypt data that's transferred over the SSL connection. Both Netscape Navigator and Internet Explorer support SSL, and many...
0
7,987
Adware Adware is any computer program or software package in which advertisements or other marketing material are included with or automatically loaded by the software and displayed or played back after installation. The justification for adware is that it helps recover programming...
0
3,826
Amazon SQS (Simple Queue Service) is yet another amazing product from Amazon, which provides a reliable, easy & highly scalable hosted queue service for storing messages, which can be accessed by any computer on any network. This provides a way to simply move around messages between computers or...
0
2,646
After Introduction to Git VCS, this is the second installment in the series, here we'll be see how to setup a workflow, copying repositories & maintaining a central repository to help developers/contributors collaborate. Cloning In most of the other version control systems, checking out is a...
0
2,719
Memcached is a free & open-source, robust, fast & distributed memory object caching system. Memcached was originally developed by Brad Fitzpatrick for LiveJournal in 2003. Since then it has gone a long way and today top websites like Youtube, Facebook & Twitter use memcached. Memcached works on...
0
2,701
Lossless Encoding is a method of encoding that allows no loss of data while converting to and from encoded data to normal data. Lossless Audio Encoding Q: Why special encoding methods for audio? A : Lossless encoding is not only done in audio, video etc. We actually have a ton of genric...
0
2,775
DKIM stands for DomainKeys Identified Mail, it helps associate a domain with an email message to help prove the authenticity of the message. DKIM is a successor of DomainKeys developed by Yahoo!, it was deprecated in 2007 but some providers still use it. DKIM was created by an informal group and...
0
2,739
GCM or Google Cloud Messaging is a service for developers to send notifications from remote servers to their Android apps or Chrome extensions, the notification may be sent anytime irrespective of the Android device being online or not, the notification will be delivered when the device comes...
0
4,459