Skip to main content

Home/ Computer Science Knowledge Sharing/ Group items tagged a

Rss Feed Group items tagged

Abdelrahman Ogail

SOAP - Wikipedia, the free encyclopedia - 0 views

  • SOAP, originally defined as Simple Object Access Protocol, is a protocol specification for exchanging structured information in the implementation of Web Services in computer networks. It relies on Extensible Markup Language (XML) as its message format, and usually relies on other Application Layer protocols (most notably Remote Procedure Call (RPC) and HTTP) for message negotiation and transmission. SOAP can form the foundation layer of a web services protocol stack, providing a basic messaging framework upon which web services can be built.
Islam TeCNo

Model-view-controller - Wikipedia, the free encyclopedia - 0 views

  • Model–view–controller (MVC) is an architectural pattern used in software engineering. Successful use of the pattern isolates business logic from user interface considerations, resulting in an application where it is easier to modify either the visual appearance of the application or the underlying business rules without affecting the other. In MVC, the model represents the information (the data) of the application; the view corresponds to elements of the user interface such as text, checkbox items, and so forth; and the controller manages the communication of data and the business rules used to manipulate the data to and from the model.
    • Abdelrahman Ogail
       
      MVC one of the important patterns used at any software. Especially in Web Development, Database Systems and sure in Game Development
    • Islam TeCNo
       
      please ya zikas 7ot more comments l eni mesh fahem awi ...ana eli fahmo eni afsl el GUI 3an el core code
  • MVC is often seen in web applications, where the view is the actual HTML or XHTML page, and the controller is the code that gathers dynamic data and generates the content within the HTML or XHTML. Finally, the model is represented by the actual content, which is often stored in a database or in XML nodes, and the business rules that transform that content based on user actions.
    • Islam TeCNo
       
      i think this is like PHP or ASP page .... you just See HTML (view) that is Generated by PHP/ASP Code (controller) that gather data from Database (content)
Abdelrahman Ogail

Voice over Internet Protocol - Wikipedia, the free encyclopedia - 0 views

shared by Abdelrahman Ogail on 01 Jul 09 - Cached
Ahmed One liked it
  • Voice over Internet Protocol (VoIP) is a general term for a family of transmission technologies for delivery of voice communications over IP networks such as the Internet or other packet-switched network
  • Internet telephony refers to communications services—voice, facsimile, and/or voice-messaging applications—that are transported via the Internet, rather than the public switched telephone network (PSTN). The basic steps involved in originating an Internet telephone call are conversion of the analog voice signal to digital format and compression/translation of the signal into Internet protocol (IP) packets for transmission over the Internet; the process is reversed at the receiving end.[1]
Islam TeCNo

Design pattern - Wikipedia, the free encyclopedia - 0 views

  • A pattern must explain why a particular situation causes problems, and why the proposed solution is considered a good one. Christopher Alexander describes common design problems as arising from "conflicting forces" -- such as the conflict between wanting a room to be sunny and wanting it not to overheat on summer afternoons. A pattern would not tell the designer how many windows to put in the room; instead, it would propose a set of values to guide the designer toward a decision that is best for their particular application. Alexander, for example, suggests that enough windows should be included to direct light all around the room. He considers this a good solution because he believes it increases the enjoyment of the room by its occupants. Other authors might come to different conclusions, if they place higher value on heating costs, or material costs. These values, used by the pattern's author to determine which solution is "best", must also be documented within the pattern. A pattern must also explain when it is applicable. Since two houses may be very different from one another, a design pattern for houses must be broad enough to apply to both of them, but not so vague that it doesn't help the designer make decisions. The range of situations in which a pattern can be used is called its context. Some examples might be "all houses", "all two-story houses", or "all places where people spend time." The context must be documented within the pattern. For instance, in Christopher Alexander's work, bus stops and waiting rooms in a surgery are both part of the context for the pattern "A PLACE TO WAIT."
    • Islam TeCNo
       
      This is Not a CS related articile ....check this link !! http://en.wikipedia.org/wiki/Design_pattern_(computer_science)
  •  
    Design Patterns
  •  
    Design Patterns
computersciencej

Process Control Block - 0 views

  •  
    What is Process Control Block ? Today in this Computer Science Study Material for Gate we will discuss about process control block and its various field which provides the information about process. .So let see what is process control block. A Process Control Block is a data structure maintained by the Operating System for every process. Each process has it own data structure. When a process is created then a unique id is assigned to the process Operating system identify a process among all processes on the basis of this process id. A PCB keeps all the information needed to keep track of a process. Generally a process control block contains the following information about a process. To read full tutorial click on the given link http://www.computersciencejunction.in/2018/02/introduction-to-process-control-block-in-operating-system.html
Ahmed Mansour

Introduction to Design Patterns - 0 views

  • design pattern is a widely accepted solution to a recurring design problem in OOP a design pattern describes how to structure classes to meet a given requirement provides a general blueprint to follow when implementing part of a program does not describe how to structure the entire application does not describe specific algorithms focuses on relationships between classes
  • design patterns: make you more productive help you write cleaner code Observer and Singleton are just two of the many available if you like design patterns, try these resources: GoF book -- Design Patterns: Elements of Reusable Object-oriented Software design pattern examples in Java, see Design Patterns in Java Reference and Example Site
  • learn what a design pattern is
    • Ahmed Mansour
       
      link to download Design Patterns: Elements of Reusable Object-oriented Software book : http://rs638.rapidshare.com/files/242614498/Design_Patterns_Elements_Of_Reusable_Object_Oriented_Software.pdf
  •  
    in summary :D we can say that a design pattern is a general reusable solution to a commonly occurring problem in software design. and it gives the way and relation between the classes and object to solve a certain problem and it doesn't specity the final application here is a book which Tecno give it tom me http://www.4shared.com/file/111350944/8be77835/Dummies_-_DesignPattern.html hope that it will be usefull
Ahmed Mansour

CRC Cards Tutorial - 0 views

  • Object Oriented Analysis and Design using CRC Cards
  • A CRC cards is an index card that is use to represent the responsibilities of classes and the interaction between the classes. CRC cards are an informal approach to object oriented modeling. The cards are created through scenarios, based on the system requirements, that model the behavior of the system. The name CRC comes from Class, Responsibilities, and Collaborators which the creators found to be the essential dimensions of object oriented modeling.
    • Ahmed Mansour
       
      One of the most popular methods for identifying and categorizing classes is to use class-responsibility-collaboration cards (CRC). Each CRC card represents a single class's data attributes, responsibilities, and collaborations. source : Thought Process Book..
    • Ahmed Mansour
       
      You need to create three sections on each card: - The name of the class - The responsibilities of the class - The collaborations of the class
  • Why uses CRC cards?
  • ...4 more annotations...
  • They are portable... No computers are required so they can be used anywhere. Even away from the office. The allow the participants to experience first hand how the system will work. No computer tool can replace the interaction that happens by physically picking up the cards and playing the roll of that object... The are a useful tool for teaching people the object-oriented paradigm. They can be used as a methodology them selves or as a front end to a more formal methodology such as Booch, Wirfs-Brock, Jacobson, etc.
  • Tutorial
    • Ahmed Mansour
       
      here we can found simple tutorial for illustration...
  • A CRC cards is an index card that is use to represent the responsibilities of classes and the interaction between the classes. CRC cards are an informal approach to object oriented modeling. The cards are created through scenarios, based on the system requirements, that model the behavior of the system. The name CRC comes from Class, Responsibilities, and Collaborators which the creators found to be the essential dimensions of object oriented modeling.
  • Why uses CRC cards? They are portable... No computers are required so they can be used anywhere. Even away from the office. The allow the participants to experience first hand how the system will work. No computer tool can replace the interaction that happens by physically picking up the cards and playing the roll of that object... The are a useful tool for teaching people the object-oriented paradigm. They can be used as a methodology them selves or as a front end to a more formal methodology such as Booch, Wirfs-Brock, Jacobson, etc.
  •  
    This is great tutorial for CRC cards ( sort of object oriented modeling approach) \ni think it was useful for me ... hoping to be useful for all of us : ) ..
Abdelrahman Ogail

ELIZA - Wikipedia, the free encyclopedia - 0 views

  • ELIZA was a computer program and an early example (by modern standards) of primitive natural language processing. ELIZA operated by processing users' responses to scripts, the most famous of which was DOCTOR, a simulation of a Rogerian psychotherapist. In this mode, ELIZA mostly rephrased the user's statements as questions and posed those to the 'patient.' ELIZA was written by Joseph Weizenbaum between 1964 to 1966
Islam TeCNo

3APL - Wikipedia, the free encyclopedia - 0 views

shared by Islam TeCNo on 24 Jun 09 - Cached
Ahmed One liked it
  • An Abstract Agent Programming Language or Artificial Autonomous Agents Programming Language or 3APL (pronounced triple-A-P-L) is an experimental tool and programming language for the development, implementation and testing of multiple cognitive agents using the Belief-Desire-Intention (BDI) approach. The newest incarnation of 3APL is 2APL (A Practical Agent Programming Language).
    • Abdelrahman Ogail
       
      Anyone get anything about 2APL kindly tell me :D
    • Islam TeCNo
       
      wad7 enha 7aga 7elwa awi !
Islam TeCNo

What's in an HTTP request? - 0 views

shared by Islam TeCNo on 15 Jun 09 - Cached
Ahmed Mansour liked it
  • These headers tell us which web server you were trying to contact.  If that seems odd, bear in mind that many web sites can be "hosted" on a single server, so when the request is received it needs to know which web site you were attempting to access
    • Islam TeCNo
       
      el server momken yekon 3aleh aktar men site ....3ashan keda lama bab3t request ba2olo bardo ana 3ayez site eh !!
  • The request method is usually either "GET" or "POST".  Basically if you fill in and submit a form on a web page it might generate a POST request (or it might be "GET"), whereas if you just click on a link, or activate one of your browser's "bookmarks" or "favourites", then the request method will always be "GET". Therefore, if it's "POST", we can tell that a form was definitely submitted.  The contents of the form would appear here, and there would also be some "Content-" headers describing the data. Web browsers generate two kinds of "POST" data: either "multipart/form-data", which is used when uploading files to a web server, or the more common "application/x-www-form-urlencoded".
    • Islam TeCNo
       
      el 7eta deh mohema ....we fe anwa3 tania bardo 3'er el GET we el POST
  • The "referer" header tells us which document referred you to us - in essence, if you followed a link to get to this page, it is the URL of the page you came from to get here.
    • Islam TeCNo
       
      el Referer by2ol lel server el page eli enta gaii menha ....we a3taked deh el tare2a eli fe sites betsta5dmha 3ashan temna3 maslan en sora aw keda tetshaf ela men el site zat nafso
  • ...2 more annotations...
  • Connection control Connection:keep-alive Keep-Alive:300 These headers are used to fine-tune the network traffic between you and the web server.  They don't tell us much, except a little about the capabilities of your web browser.
    • Islam TeCNo
       
      kan nefsi yekon fe shar7 lel 7eta deh aktar !!
  • Authorisation Username:not present If you have "logged in" to a web site, your username appears here. Note that this only applies to web sites which use proper HTTP authentication - typically, a "login" window pops up and you get three chances to enter your username and password, otherwise you see a page which says "Authentication Required" or similar.  It doesn't apply to web sites where the "login" is a separate page. It's also possible to supply the username and password in the URL you tell your browser to visit - for example, http://user:password@www.example.com/.  In that case, the username would appear here too.
    • Ahmed Mansour
       
      msh fahem el goz2 dah 2wey !! .. 7d yewad7ely please ...
    • Islam TeCNo
       
      ya3ni ya mans a7yanan fe sites bykon feha UserName we password 3an tare2 el HTTP protocol .....ya3ni el mail maslan aw cisclub dol fehom username we password mesh 3an tare2 el HTTP protocol ....el HTTP protocl el username we el pass beto3o bytlbo menak 2abl ma td5ol 3ala el page asasn we bytl3lk keda pop up tekteb feha
  •  
    really very important and useful article ... thanks tecno very match :P
  •  
    Nice Article Tecno..Go On
Abdelrahman Ogail

Steady state - Wikipedia, the free encyclopedia - 0 views

  • A system in a steady state has numerous properties that are unchanging in time. The concept of steady state has relevance in many fields, in particular thermodynamics. Steady state is a more general situation than dynamic equilibrium. If a system is in steady state, then the recently observed behavior of the system will continue into the future. In stochastic systems, the probabilities that various different states will be repeated will remain constant.
Janos Haits

BabelNet | The largest multilingual encyclopedic dictionary and semantic network - 0 views

  •  
    "BabelNet is both a multilingual encyclopedic dictionary, with lexicographic and encyclopedic coverage of terms, and a semantic network which connects concepts and named entities in a very large network of semantic relations, made up of about 15 million entries, called Babel synsets. Each Babel synset represents a given meaning and contains all the synonyms which express that meaning in a range of different languages. Its evolution, BabelNet live, is a new, continuously growing resource, .."
Janos Haits

Zotero | Home - 0 views

  •  
    A personal research assistant. Zotero is the only research tool that automatically senses content, allowing you to add it to your personal library with a single click. Whether you're searching for a preprint on arXiv.org, a journal article from JSTOR, a news story from the New York Times, or a book from your university library catalog, Zotero has you covered with support for thousands of sites.
Islam TeCNo

Neuroplasticity - Wikipedia, the free encyclopedia - 0 views

  • Neuroplasticity (also referred to as brain plasticity, cortical plasticity or cortical re-mapping) is the changing of neurons and the organization of their networks and so their function by experience. This idea was first proposed in 1892 by Santiago Ramón y Cajal the proposer of the neuron doctrine though the idea was largely neglected for the next fifty years.[1] The first person to use the term neural plasticity appears to have been the Polish neuroscientist Jerzy Konorski.[2]
    • Abdelrahman Ogail
       
      This is why when a person thinks more he/she be more smarter!
    • Islam TeCNo
       
      3azeem .....bas deh mesh 7agat related l CS ya Zi3'az
    • Abdelrahman Ogail
       
      How said that? It's related to Artificial Neural Networks that require understanding of actual Human Neurons. BTW, plasticity principle is used in Games AI where the Controlled-AI determines if it forgot what happened or still remember it and seeks to revenge
    • Islam TeCNo
       
      oooooooooh ........ 3'reaaaaaat
Abdelrahman Ogail

Mutation testing - Wikipedia, the free encyclopedia - 1 views

  • Mutation testing (or Mutation analysis) is a method of software testing, which involves modifying program's source code in small ways.[1] These, so-called mutations, are based on well-defined mutation operators that either mimic typical programming errors (such as using the wrong operator or variable name) or force the creation of valuable tests (such as driving each expression to zero). The purpose is to help the tester develop effective tests or locate weaknesses in the test data used for the program or in sections of the code that are seldom or never accessed during execution.
  • For example, consider the following C++ code fragment: if (a && b) c = 1; else c = 0; The condition mutation operator would replace '&&' with '||' and produce the following mutant: if (a || b) c = 1; else c = 0;
  • Many mutation operators can produce equivalent mutants. For example, consider the following code fragment: int index=0; while (...) { . . .; index++; if (index==10) break; } Boolean relation mutation operator will replace "==" with ">=" and produce the following mutant: int index=0; while (...) { . . .; index++; if (index>=10) break; }
cafe software

My Profitable Business Career - 1 views

Managing a cafe is a tedious task because I need to have a close supervision with my business sales and transactions. So I decided to purchase a cafe POS software that will help me have an easier m...

Online system

started by cafe software on 23 Jan 12 no follow-up yet
Islam TeCNo

Elmasri's Home Page - 0 views

shared by Islam TeCNo on 09 Jun 09 - Cached
  • Dr. Elmasri is Professor of Computer Science and Engineering at The University of Texas at Arlington. Dr. Elmasri received his B.S. in Electrical Engineering from Alexandria University, Egypt, in 1972. He completed his M.S. and Ph.D. degrees in Computer Science at Stanford University in 1980
    • Abdelrahman Ogail
       
      An Egyption computer scientst published many papers. Also published Database Systems Fundamentals textbox of database courses at many colleges
    • Islam TeCNo
       
      howa ana bas 3andi comment ....en wade7 fe3lan en kol 3olma2 el computer science kano bydrso 7agat tania el awel zaii maslan el Math we keda we dah tab3an yerga3 l2n el science dah lesa geded
Abdelrahman Ogail

Stochastic optimization - Wikipedia, the free encyclopedia - 0 views

  • Stochastic optimization (SO) methods are optimization algorithms which incorporate probabilistic (random) elements, either in the problem data (the objective function, the constraints, etc.), or in the algorithm itself (through random parameter values, random choices, etc.), or in both [1]. The concept contrasts with the deterministic optimization methods, where the values of the objective function are assumed to be exact, and the computation is completely determined by the values sampled so far.
  •  
    In Artificial Intelligence, Genetic Algorithms belongs to class Stochastic search that is explained below
Abdelrahman Ogail

Defensive programming - Wikipedia, the free encyclopedia - 3 views

  • Defensive programming is a form of defensive design intended to ensure the continuing function of a piece of software in spite of unforeseeable usage of said software. The idea can be viewed as reducing or eliminating the prospect of Murphy's Law having effect. Defensive programming techniques are used especially when a piece of software could be misused mischievously or inadvertently to catastrophic effect.
Janos Haits

Made with Code | Google - 0 views

  •  
    "First, complete a coding activity to build a Snapchat Geofilter that expresses your vision for the future. Then write a statement about the future you envision and how you plan to achieve it. Submit both to the #MyFutureMe Challenge for a chance to build your own live Snapchat lens and more!"
‹ Previous 21 - 40 of 260 Next › Last »
Showing 20 items per page