Engineering Concepts Tutorials

Engineering Concepts Tutorials for UML, Operations Research, Numerical Methods and many more.
  Title / Author Replies
Views Reverse Sort Order
The second step in NLP is called syntax. Once the basic of a sentence have been determined to be correct using morphology, syntax can be used to check they are properly combined. The most widely used method of checking a sentence is syntactically correct is to attempt to use a grammar to...
0
4,749
TLS (Transport Layer Security), defined in RFC 2246, is a protocol for establishing a secure connection between a client and a server. TLS (Transport Layer Security) is capable of authenticating both the client and the server and creating a encrypted connection between the two. The TLS...
0
4,714
Git is popular distributed version control system, it was developed by inventor of Linux, Linus Torvalds. Git has been gaining huge popularity in the ope-source community as well as in the corporate world due to it's distributed nature and efficiency. I had a written a few articles on Git to...
0
4,564
Arbitrary Precision In most computer programs and computing environments, the precision of any calculation (even including addition) is limited by the word size of the computer, that is, by largest number that can be stored in one of the processor's registers. As of mid-2002, the most common...
0
4,409
Advance concept Once a parse tree has been built using syntaic analysis, the semantics, or meaning, of the sentence needs to be found. This is a very difficult task as it requires world knowledge. The need for semantic information is illustrated by trying to follow a recipe. Knowing that the...
0
4,377
WAP stands for Wireless Application Protocol, a secure specification that allows users to access information instantly via handheld wireless devices such as mobile phones, pagers, two-way radios, smartphones and communicators. The idea comes from the wireless industry, from companies such as...
0
4,349
The article continues the discussion on Algorithms available in Symmetric Key cryptography. It explains the whereabouts of DES algorithm. Due to the limitations of DES on security context, we shall include Triple DES in the scope. Triple DES is a stronger form of DES algorithm. Understanding...
0
4,305
All software developers must have used some VCS (Version Control System) at a point of their career, most would say SVN, which is currently the widely used VCS in the software industry. Enter Git, created by Linus Torvalds in response to missing features & performance issues in the other VCSs,...
0
4,261
The term Web services describe a standardized way of integrating Web-based applications. Web services technology represents an important way for businesses to communicate with each other and with clients as well. It is a truly distributed computing model in which applications talk to one another....
0
4,257
Adware Adware is any computer program or software package in which advertisements or other marketing material are included with or automatically loaded by the software and displayed or played back after installation. The justification for adware is that it helps recover programming...
0
4,212
Introduction Pocket Pc is a handheld sized computer.It runs on Microsoft windows mobile operating systems.It may have capability to run on alternative operating system like NetBSD,Linux,Android (or) others.It has many of the capability of modern desktop PC Pocket PC is an evolution from...
2
4,160
Amazon SQS (Simple Queue Service) is yet another amazing product from Amazon, which provides a reliable, easy & highly scalable hosted queue service for storing messages, which can be accessed by any computer on any network. This provides a way to simply move around messages between computers or...
0
4,082
A set of processes is deadlocked if each process in the set is waiting for an event that can be caused by another process in the set. The events that we are mainly concerned with are resource acquisition and release. The resources may be physical resources (CPU, I/O devices, memory) or logical...
3
4,028
Advanced Encryption Standard is a block cipher symmetric encryption algorithm. It is preferred to protect network communications, personal data etc using AES over DES. It encrypts or decrypts the data through several rounds. Categorization It is categorized under three types of key sizes –...
0
3,996
Introduction Just imagine, At the end of a busy day, you are sitting on the sofa and you need a hot cup of tea… You just thought for a cup of tea, and it step to you! Don’t think me a mad or I’m not joking! This impossible thing can be possible by the help of BMI or Brain Machine Interfacing...
8
3,959
DKIM stands for DomainKeys Identified Mail, it helps associate a domain with an email message to help prove the authenticity of the message. DKIM is a successor of DomainKeys developed by Yahoo!, it was deprecated in 2007 but some providers still use it. DKIM was created by an informal group and...
0
3,839
ADSL (Asymmetrical Digital Subscriber Line) - A means of delivering high communication speeds over existing copper phone lines. Analog - The technology used by the original mobile phones. Like traditional radio broadcasts, phone conversations and information are transmitted in the form of a...
0
3,768
This is known to all that AMD is the only one competitor of Intel’s market. In this “Dual-Core” era of CPU’s AMD is going to launch their APU or Accelerated Processing Unit in this year. Not only AMD Intel is also working with this architecture and hopefully they will also release their new...
2
3,752
After Introduction to Git VCS, this is the second installment in the series, here we'll be see how to setup a workflow, copying repositories & maintaining a central repository to help developers/contributors collaborate. Cloning In most of the other version control systems, checking out is a...
0
3,734
In this article we will explore the two main choices of graphic format that can be used on the Web to represent simple graphics, schemas or logos: · GIF (stands for Graphics Interchange Format) was developed in the late 1980's and it is still widely used. · PNG (Portable Network Graphics) was...
1
3,712