
Computer codes
-
Recent attacks, infections, and malicious code are mostly exploited by hackers as a potential vulnerability on unsecured user computers. The issue for administrators is how to protect hundreds of computers within the organization from such insecurity.
6p
tuetuebinhan000
23-01-2025
2
2
Download
-
What is ASP? – Server-side scripting technology – Files containing HTML and scripting code – Access via HTTP requests – Scripting code is interpreted on server side • What can I do with ASP? – Easily and quickly create simple Web applications – Generate dynamic Web content – Client-side scripting for validation – Access COM components to extend functionality
30p
kiditer
28-09-2009
451
244
Download
-
In its role as a high level assembler used for writing operating systems, C is often used to access memory locations and change individual bits. You might for example need to access individual bits in an int. It can sometimes be useful to conserve memory by using a byte to hold 8 flags though with an abundance of ram it's common to just use one byte per flag or even one per int. Knowing how to extract or alter individual bits is still worthwhile knowing; you may never have to use it but when you have to maintain code that...
49p
gaconht
04-06-2011
74
9
Download
-
Mechanism to create new classes using existing classes The existing class is called the parent class, or superclass, or base class The derived class is called the child class or subclass As the name implies, the child inherits characteristics of the parent That is, the child class inherits the methods and data defined by the parent class. Once a behavior (method) is defined in a super class, that behavior is automatically inherited by all subclasses
77p
nguyenvanhabk1
04-09-2012
81
10
Download
-
provide request information for HTTP servlets. The servlet container creates an HttpServletRequest object and passes it as an argument to the servlet's service methods (doGet, doPost, etc).Client request information including : parameter name and values, and an input stream Attributes : custom information about a request. Extends the ServletRequest interface Returns the value of attribute : public Object getAttribute(String name)
36p
nguyenvanhabk1
04-09-2012
106
7
Download
-
Bài giảng Nhập môn Tin học - Chương 4 cung cấp những kiến thức cơ bản về mã máy (Computer codes). Nội dung chính trong chương này gồm có: Dữ liệu máy tính, mã máy, mã máy thông dụng.
47p
nomoney13
04-05-2017
95
5
Download
-
Bài giảng Nhập môn Tin học 2 - Chương 3: Mã máy cung cấp cho người học những kiến thức như: Các loại mã máy; Trình tự sắp xếp; Câu hỏi và Bài tập. Mời các bạn cùng tham khảo!
33p
caphesuadathemchanh
25-10-2021
30
4
Download
-
Tensegrity is a structural system constructed of tensile cables and compressive bars. This thesis proposes several general methods for creating tensegrity structures. The author has developed new methods for creating specific tensegrity cells and the corresponding computer code. Furthermore, the author has constructed various physical models to validate the methods. A proposal for an observation tower on top of the Eureka building in Melbourne has also been devised by the author.
88p
runthenight07
01-03-2023
7
3
Download
-
In this document, we present a simplified geometrical model (0D model) for the in-core corium propagation transient. A degraded core with a formed corium pool is used as an initial state. This state can be obtained from a simulation computed with an integral code.
9p
christabelhuynh
30-05-2020
5
0
Download
-
In this work, two different thermodynamic softwares, ANGE using the TBASE database, and OPENCALPHAD using the TAF-ID (Thermodynamics of Advanced Fuels – International Database), have been integrated into the GERMINAL V2 fuel performance code (of the PLEIADES platform) in order to evaluate the chemical state of (U,Pu)O2 fuel and fission products in sodium cooled fast reactors.
12p
christabelhuynh
29-05-2020
18
0
Download
-
Sensitivity and uncertainty analysis in error propagation studies are carried out based on nuclear data uncertainty information available in the basic nuclear data libraries such as ENDF, JEFF, JENDL and others.
5p
christabelhuynh
29-05-2020
14
2
Download
-
This work presents a computational analysis of the molecular characteris-tics shared by the adenylation domains from traditional nonribosomal pep-tide synthetases (NRPSs) and the group of the freestanding homologous enzymes: a-aminoadipate semialdehyde dehydrogenase, a-aminoadipate reductase and the protein Ebony. The results of systematic sequence com-parisons allow us to conclude that a specificity-conferring code, similar to that described for the NRPSs, can be recognized in such enzymes.
13p
awards
05-04-2013
35
3
Download
-
Task A executes and starts to write the string “Hello world” to the LCD. Task A is pre-empted by Task B after outputting just the beginning of the string – “Hello w”. Task B writes “Abort, Retry, Fail?” to the LCD before entering the Blocked state. Task A continues from the point at which it was preempted and completes outputting the remaining characters – “orld”. The LCD will now be displaying the corrupted string “Hello wAbort, Retry, Fail?orld”. Read, Modify, Write Operations /* The C code being compiled. */ 155: PORTA |= 0x01; /* The assembly code produced. */ LDR R0,[PC,#0x0070] ;...
19p
la_la123
04-04-2013
55
9
Download
-
For each of the AVL trees obtained in Question 1 determine the tree obtained when the root is withdrawn. Question 3. Write a global function in pseudo code to generate an AVL tree from an input list by insert elements in the list into an initial empty AVL. Refer to Question 1 for an example. algorithm generateAVLfromList (val list ) This algorithm generate a AVL from the input list Pre Post the AVL is built by inserting elements in the list into an initial empty tree one-by-one from the beginning...
4p
loc_x_m
23-12-2012
86
3
Download
-
This paper presents the experiences gained from ongoing research collaboration between the School of Computer Engineering at Nanyang Technological University and the Southampton e-Science centre at the University of Southampton using a serviceoriented approach for complex engineering design optimization. The service-oriented approach enables programmatic collaboration to be realized while maintaining the autonomy of individual codes at the different institutes and organizations. In the current work, a Genetic algorithm optimization logic implemented as a Grid...
6p
khangoc239
10-08-2012
55
6
Download
-
Tuyển tập báo cáo các nghiên cứu khoa học quốc tế ngành hóa học dành cho các bạn yêu hóa học tham khảo đề tài: Computationally Efficient Blind Code Synchronization for Asynchronous DS-CDMA Systems with Adaptive
15p
sting12
11-03-2012
47
4
Download
-
EURASIP Journal on Applied Signal Processing 2003:10, 1016–1026 c 2003 Hindawi Publishing Corporation Model-Based Speech Signal Coding Using Optimized Temporal Decomposition for Storage and Broadcasting Applications Chandranath R. N. Athaudage ARC Special Research Center for Ultra-Broadband Information Networks (CUBIN), Department of Electrical and Electronic Engineering, The University of Melbourne, Victoria 3010, Australia Email: cath@ee.mu.oz.au Alan B. Bradley Institution of Engineers Australia, North Melbourne, Victoria 3051, Australia Email: abradley@ieaust.org.
11p
sting12
10-03-2012
44
6
Download
-
EURASIP Journal on Applied Signal Processing 2003:12, 1181–1187 c 2003 Hindawi Publishing Corporation A Fast and Efficient Topological Coding Algorithm for Compound Images Xin Li Lane Department of Computer Science and Electrical Engineering, West Virginia University, Morgantown, WV 26506, USA Email: xinl@csee.wvu.edu Received 11 September 2002 and in revised form 8 June 2003 We present a fast and efficient coding algorithm for compound images.
7p
sting12
10-03-2012
48
7
Download
-
EURASIP Journal on Applied Signal Processing 2003:13, 1328–1334 c 2003 Hindawi Publishing Corporation Interleaved Convolutional Code and Its Viterbi Decoder Architecture Jun Jin Kong Department of Electrical and Computer Engineering, University of Minnesota, 200 Union Street, Minneapolis, MN 55455, USA Email: jjkong@ece.umn.edu Keshab K. Parhi Department of Electrical and Computer Engineering, University of Minnesota, 200 Union Street, Minneapolis, MN 55455, USA Email: parhi@ece.umn.
7p
sting12
10-03-2012
43
4
Download
-
EURASIP Journal on Applied Signal Processing 2003:6, 530–542 c 2003 Hindawi Publishing Corporation An FPGA Implementation of (3, 6)-Regular Low-Density Parity-Check Code Decoder Tong Zhang Department of Electrical, Computer, and Systems Engineering, Rensselaer Polytechnic Institute, Troy, NY 12180, USA Email: tzhang@ecse.rpi.edu Keshab K. Parhi Department of Electrical and Computer Engineering, University of Minnesota, Minneapolis, MN 55455, USA Email: parhi@ece.umn.
13p
sting12
10-03-2012
48
8
Download
CHỦ ĐỀ BẠN MUỐN TÌM
