Thư viện Kỹ thuật lập trình

Kỹ thuật lập trình máy tính là kỹ thuật cài đặt một hoặc nhiều thuật toán trừu tượng có liên quan với nhau bằng một hoặc nhiều ngôn ngữ lập trình để tạo ra một chương trình máy tính. Các ngôn ngữ lập trình khác nhau hỗ trợ các phong cách lập trình khác nhau. Kỹ thuật lập trình hiệu quả chính là việc lựa chọn được ngôn ngữ lập trình phù hợp nhất với bài toán cần giải quyết. Tổng hợp tài liệu, sách, giáo trình và bài giảng về hầu hết các kỹ thuật lập trình như: Lập trình hướng đối tượng, lập trình trên nền tảng .NET, lập trình ứng dụng Java, C++, lập trình Web, lập trình mã nguồn mở PHP & MySQl, lập trình Mobile IOS, Adroid, mô hình lập trình 3 lớp MVC, kiến trúc hướng dịch vụ SOA,... cùng với kho bài tập, đề kiểm tra kỹ thuật lập trình, cấu trúc dữ liệu hay dành cho sinh viên và người đi làm về CNTT.
Hiển thị 1-10 trên 5532 kết quả
  • This paper also proposes a Facet Classification Algorithm to evaluate the faceted interface. In order to demonstrate these ideas and better understand personalized faceted search, several faceted search algorithms are proposed and evaluated using the novel evaluation methodology.

    pdf6p  hongnhan878 12-04-2019 1 0   Download

  • The SQL Queries require a couple of secure database plans for it sun deniable working, yet this finally prompts protection spillage to the cloud server. For numerical range questions (>,

    pdf7p  hongnhan878 12-04-2019 3 0   Download

  • The greatest test for enormous information from a security perspective is the assurance of client's protection. Be that as it may, encoded information present new difficulties for cloud information de-duplication, which gets to be significant for huge information stockpiling and preparing in cloud.

    pdf7p  hongnhan878 12-04-2019 3 1   Download

  • Our system of CDA document creation and integration is based on cloud computing and the service is offered through Open API. Developers using different platforms thus can use our system to enhance interoperability. Cloud infrastructure with mapping software “health care information”

    pdf6p  hongnhan878 12-04-2019 3 0   Download

  • In this paper, we have presented a secure group data access control paradigm driven by Diffe Hellman ciphering exchanges. An interesting extension to this work is the implementation of a time driven self destructing cloud group data sharing model that is a sender friendly approach that can deal with the problem of revocation in an automated approach.

    pdf4p  hongnhan878 12-04-2019 0 0   Download

  • In this encryption technique, Users’ private keys and cipher texts are associated with a set of attributes. This technique completely encrypts the file and does not have any control over the individual attributes in the file. So, in order to overcome this problem a concept called attribute with weight was introduced, so that it can have control over the individual elements in the file and can be able to hide sensitive information while sharing data with the users

    pdf5p  hongnhan878 12-04-2019 0 0   Download

  • In this paper, we suggest Process-Oriented in/put Deduplication (POD) and modestly after that perform volume arranged data yield Deduplication (VOD). Proposed Process Oriented in/put Deduplication technique to some degree augment the execution and decreased information exchange limit of genuine accumulating structure in the cloud server.

    pdf5p  hongnhan878 12-04-2019 1 0   Download

  • Bi-dimensional convolution is a generally utilized operation in picture handling and PC vision, described by serious calculation and regular memory access. The proposed framework is recurrently decomposable (RD) guide plan technique for video handling that can diminish the computational multifaceted nature of Bi-dimensional convolutions by part the convolution between a picture and a huge masks converted into smaller convolution masks.

    pdf4p  hongnhan878 12-04-2019 1 0   Download

  • In the literature, number of hardware and software approaches are proposed to optimize the usage of the energy in the datacenter. Dynamic power management (DPM), Dynamic Voltage and Frequency Scaling (DVFS), thread motion, Asymmetric cores, virtualization, migration, consolidation, scheduling etc. are approaches which are used to optimize the usage of energy consumption. The goal of this paper is to provide an overview of these techniques to optimize the energy consumption.

    pdf4p  hongnhan878 12-04-2019 0 0   Download

  • The SVM suffers from the complex computational processes. Therefore, this paper presents a new space vector modulation controller based soft computing-high accuracy implementation of artificial neural network. An artificial neural network (ANN) structure is proposed to identify and estimated the conventional SVM for avoiding the complex computational problem and hence improve the performance of the photovoltaic inverter generation.

    pdf16p  hongnhan878 12-04-2019 0 0   Download

Đồng bộ tài khoản