Engineering Concepts Tutorials

Engineering Concepts Tutorials for UML, Operations Research, Numerical Methods and many more.
  Title / Author Replies
Views
Introduction First and foremost, we need to define what we mean by Natural Language Processing or NLP. The first and most general definition is simply that NLP encompasses anything a computer needs to do in order for it to understand natural language (whether it be typed or spoken). We'll...
0
6,166
The second step in NLP is called syntax. Once the basic of a sentence have been determined to be correct using morphology, syntax can be used to check they are properly combined. The most widely used method of checking a sentence is syntactically correct is to attempt to use a grammar to...
0
4,641
Advance concept Once a parse tree has been built using syntaic analysis, the semantics, or meaning, of the sentence needs to be found. This is a very difficult task as it requires world knowledge. The need for semantic information is illustrated by trying to follow a recipe. Knowing that the...
0
4,278
Newspapers Internet magazines came with cover stories when Denial of service (DoS) attacks assaulted a number of large and very successful companies' websites last year. Those who claim to provide security tools were under attack. If Yahoo, Amazon, CNN and Microsoft feel victim to DoS attacks, can...
0
10,232
WAP stands for Wireless Application Protocol, a secure specification that allows users to access information instantly via handheld wireless devices such as mobile phones, pagers, two-way radios, smartphones and communicators. The idea comes from the wireless industry, from companies such as...
0
4,270
So, what is a cipher anyway? A cipher is an algorithm or set of algorithms that systematically convert a sender's intended message text to what appears to be meaningless text, which can be converted back to the sender's original message only by authorized recipients. The following terms and...
0
12,301
What is a firewall? A firewall protects networked computers from intentional hostile intrusion that could compromise confidentiality or result in data corruption or denial of service. It may be a hardware device running on a secure host computer. In either case, it must have at least...
3
7,056
The term Web services describe a standardized way of integrating Web-based applications. Web services technology represents an important way for businesses to communicate with each other and with clients as well. It is a truly distributed computing model in which applications talk to one another....
0
4,110
Routing and switching can be two terms that are difficult to differentiate, so here is a simple explanation that may help to clarify things. First of all switching and routing are not the same thing. Switching involves moving packets between devices on the same network. Conversely, routing involves...
0
16,485
Hard Drives are one of the most important parts on your computer. They are also one of the most expensive. All hard drives share a basic structure and are composed of the same physical features. However, not all hard drives perform the same way, as the quality of the parts of the hard drive will...
0
6,534
Introduction A VLAN is a grouping of computers that is logically segmented by functions, project teams, or applications without regard to the physical location of users. For example, several end stations might be grouped as a department, such as Engineering or Accounting, having the same...
3
42,582
Imagine a network based on inexpensive, high volume chipsets, with data rates up to 12Mbit/second and a 25 meter distance capacity, designed from the start with “plug and play” in mind. Add 5 Volt power, with up to 500mA current capacity, and compatibility with many consumer products. ...
1
14,278
Q: What are the seven layers of the OSI model? A: The layers are physical, data link, network, transport, session, presentation, and application layers. Q: In the TCP client-servel model, how does the three-way handshake work in opening connection? A: The client first sends a...
0
3,031
Direct Attached Storage (DAS) Today, greater than 95% of all computer storage devices such as disk drives, disk arrays and RAID systems are directly attached to a client computer through various adapters with standardized software protocols such as SCSI, Fibre Channel and others. This type of...
0
3,290
Continuation from Denail of Service (DoS) by Pradeep. Have you ever tried to make a telephone call but couldn't because all the telephone circuits were busy? In fact, in India, telephone companies used to air commercials on television and radio that suggested you avoid peak calling times by...
3
5,771
The Web has become the most significant technology of the 21st century. The nature and structure of the Web, as well as the way we use it, have been continuously changing. The Web evolution is huge that we have started to place the evolution—past, current, and anticipated—into different stages as...
7
9,365
This is known to all that AMD is the only one competitor of Intel’s market. In this “Dual-Core” era of CPU’s AMD is going to launch their APU or Accelerated Processing Unit in this year. Not only AMD Intel is also working with this architecture and hopefully they will also release their new...
2
3,631
Digital certificates are files which are used to prove the authenticity of the user or computer to whom it is issued. It is very similar to an identification proof like passport, driving license or PAN, which gives assurance to the other party that the transaction of information from the...
4
5,404
DKIM stands for DomainKeys Identified Mail, it helps associate a domain with an email message to help prove the authenticity of the message. DKIM is a successor of DomainKeys developed by Yahoo!, it was deprecated in 2007 but some providers still use it. DKIM was created by an informal group and...
0
3,554
Git is popular distributed version control system, it was developed by inventor of Linux, Linus Torvalds. Git has been gaining huge popularity in the ope-source community as well as in the corporate world due to it's distributed nature and efficiency. I had a written a few articles on Git to...
0
4,215