Skip to main content

Home/ Computer Science Knowledge Sharing/ Group items tagged of

Rss Feed Group items tagged

Janos Haits

The GDELT Project - 0 views

  •  
    "A Global Database of Society Supported by Google Jigsaw, the GDELT Project monitors the world's broadcast, print, and web news from nearly every corner of every country in over 100 languages and identifies the people, locations, organizations, themes, sources, emotions, counts, quotes, images and events driving our global society every second of every day, creating a free open platform for computing on the entire world. "
Abdelrahman Ogail

10 skills developers will need in the next five years | Between the Lines | ZDNet.com - 0 views

shared by Abdelrahman Ogail on 08 Jun 09 - Cached
Ahmed Mansour liked it
  • So bone up on JavaScript, CSS, and HTML to succeed over the next five years
  • Every top-flight developer I’ve met recommends learning at least one dynamic or functional programming language to learn new ways of thinking, and from personal experience, I can tell you that it works.
    • Abdelrahman Ogail
       
      yes, that's true (Y) some examples of these languages: LISP and Ruby. Prolog seems to be close to LISP becuase both were used in AI Applications
  •  
    1: One of the "Big Three" (.NET, Java, PHP) 2: Rich Internet Applications (RIAs) 3: Web development 4: Web services 5: Soft skills 6: One dynamic and/or functional programming language 7: Agile methodologies 8: Domain knowledge 9: Development "hygiene" 10: Mobile development
  •  
    1: One of the "Big Three" (.NET, Java, PHP) 2: Rich Internet Applications (RIAs) 3: Web development 4: Web services 5: Soft skills 6: One dynamic and/or functional programming language 7: Agile methodologies 8: Domain knowledge 9: Development "hygiene" 10: Mobile development
Islam TeCNo

What's in an HTTP request? - 0 views

shared by Islam TeCNo on 15 Jun 09 - Cached
Ahmed Mansour liked it
  • These headers tell us which web server you were trying to contact.  If that seems odd, bear in mind that many web sites can be "hosted" on a single server, so when the request is received it needs to know which web site you were attempting to access
    • Islam TeCNo
       
      el server momken yekon 3aleh aktar men site ....3ashan keda lama bab3t request ba2olo bardo ana 3ayez site eh !!
  • The request method is usually either "GET" or "POST".  Basically if you fill in and submit a form on a web page it might generate a POST request (or it might be "GET"), whereas if you just click on a link, or activate one of your browser's "bookmarks" or "favourites", then the request method will always be "GET". Therefore, if it's "POST", we can tell that a form was definitely submitted.  The contents of the form would appear here, and there would also be some "Content-" headers describing the data. Web browsers generate two kinds of "POST" data: either "multipart/form-data", which is used when uploading files to a web server, or the more common "application/x-www-form-urlencoded".
    • Islam TeCNo
       
      el 7eta deh mohema ....we fe anwa3 tania bardo 3'er el GET we el POST
  • The "referer" header tells us which document referred you to us - in essence, if you followed a link to get to this page, it is the URL of the page you came from to get here.
    • Islam TeCNo
       
      el Referer by2ol lel server el page eli enta gaii menha ....we a3taked deh el tare2a eli fe sites betsta5dmha 3ashan temna3 maslan en sora aw keda tetshaf ela men el site zat nafso
  • ...2 more annotations...
  • Connection control Connection:keep-alive Keep-Alive:300 These headers are used to fine-tune the network traffic between you and the web server.  They don't tell us much, except a little about the capabilities of your web browser.
    • Islam TeCNo
       
      kan nefsi yekon fe shar7 lel 7eta deh aktar !!
  • Authorisation Username:not present If you have "logged in" to a web site, your username appears here. Note that this only applies to web sites which use proper HTTP authentication - typically, a "login" window pops up and you get three chances to enter your username and password, otherwise you see a page which says "Authentication Required" or similar.  It doesn't apply to web sites where the "login" is a separate page. It's also possible to supply the username and password in the URL you tell your browser to visit - for example, http://user:password@www.example.com/.  In that case, the username would appear here too.
    • Ahmed Mansour
       
      msh fahem el goz2 dah 2wey !! .. 7d yewad7ely please ...
    • Islam TeCNo
       
      ya3ni ya mans a7yanan fe sites bykon feha UserName we password 3an tare2 el HTTP protocol .....ya3ni el mail maslan aw cisclub dol fehom username we password mesh 3an tare2 el HTTP protocol ....el HTTP protocl el username we el pass beto3o bytlbo menak 2abl ma td5ol 3ala el page asasn we bytl3lk keda pop up tekteb feha
  •  
    really very important and useful article ... thanks tecno very match :P
  •  
    Nice Article Tecno..Go On
Islam TeCNo

Design pattern - Wikipedia, the free encyclopedia - 0 views

  • A pattern must explain why a particular situation causes problems, and why the proposed solution is considered a good one. Christopher Alexander describes common design problems as arising from "conflicting forces" -- such as the conflict between wanting a room to be sunny and wanting it not to overheat on summer afternoons. A pattern would not tell the designer how many windows to put in the room; instead, it would propose a set of values to guide the designer toward a decision that is best for their particular application. Alexander, for example, suggests that enough windows should be included to direct light all around the room. He considers this a good solution because he believes it increases the enjoyment of the room by its occupants. Other authors might come to different conclusions, if they place higher value on heating costs, or material costs. These values, used by the pattern's author to determine which solution is "best", must also be documented within the pattern. A pattern must also explain when it is applicable. Since two houses may be very different from one another, a design pattern for houses must be broad enough to apply to both of them, but not so vague that it doesn't help the designer make decisions. The range of situations in which a pattern can be used is called its context. Some examples might be "all houses", "all two-story houses", or "all places where people spend time." The context must be documented within the pattern. For instance, in Christopher Alexander's work, bus stops and waiting rooms in a surgery are both part of the context for the pattern "A PLACE TO WAIT."
    • Islam TeCNo
       
      This is Not a CS related articile ....check this link !! http://en.wikipedia.org/wiki/Design_pattern_(computer_science)
  •  
    Design Patterns
  •  
    Design Patterns
Islam TeCNo

Assembly in .NET - 0 views

  • An assembly can be a single file or it may consist of the multiple files. In case of multi-file, there is one master module containing the manifest while other assemblies exist as non-manifest modules. A module in .NET is a sub part of a multi-file .NET assembly
  • The .NET assembly is the standard for components developed with the Microsoft.NET. Dot NET assemblies may or may not be executable, i.e., they might exist as the executable (.exe) file or dynamic link library (DLL) file. All the .NET assemblies contain the definition of types, versioning information for the type, meta-data, and manifest. The designers of .NET have worked a lot on the component (assembly) resolution.
    • Rock Fcis
       
      @ ISlam ma fel wiki katb aho kda The .NET assembly is the standard for components developed with the Microsoft.NET. Dot NET assemblies may or may not be executable, i.e., they might exist as the executable (.exe) file or dynamic link library (DLL) file.
  •  
    tb ana delwa2ty fhmt 2n el assembly 7agteen ya 2emma .Exe file 2w el Dll ft7t brdi fel wiki la2et 2n hoa by2ol 2n feh fel assembly ya 2emma single file or multi file 7d yfhmny eah asdo b single 2w multi hal ya3ni asdo 2n el dll feh mmkn kaza class w kda walla a
  •  
    ma3takdsh ya Rock eno y2sod bel DLL Multifile
Islam TeCNo

Belief-Desire-Intention software model - Wikipedia, the free encyclopedia - 0 views

  • The Belief-Desire-Intention (BDI) software model (usually referred to simply, but ambiguously, as BDI) is a software model developed for programming intelligent agents. Superficially characterized by the implementation of an agent's beliefs, desires and intentions, it actually uses these concepts to solve a particular problem in agent programming. In essence, it provides a mechanism for separating the activity of selecting a plan (from a plan library) from the execution of currently active plans. Consequently, BDI agents are able to balance the time spent on deliberating about plans (choosing what to do) and executing those plans (doing it). A third activity, creating the plans in the first place (planning), is not within the scope of the model, and is left to the system designer and programmer.
    • Abdelrahman Ogail
       
      This model is used to simulate human behavior its under area of research and its so interesting and innovative
    • Islam TeCNo
       
      nice ..... dah tab3an related lel AI !
Islam TeCNo

COUNT (Transact-SQL) - 0 views

  • COUNT(*) returns the number of items in a group. This includes NULL values and duplicates. COUNT(ALL expression) evaluates expression for each row in a group and returns the number of nonnull values. COUNT(DISTINCT expression) evaluates expression for each row in a group and returns the number of unique, nonnull values.
    • Abdelrahman Ogail
       
      Count Function is a Mathematical Aggregation Function. Many forms of it appreas below
    • Islam TeCNo
       
      ana fahem el kalam eli maktoub :D bas mesh fahm el bo2en eli enta katbhom dol :D
    • Abdelrahman Ogail
       
      In Relational Algebra and Set Theory COUNT is a type of function called Aggregation Function that is applied to an attribute (databse column) and results in one value
    • Islam TeCNo
       
      ahaaaa ...thanks ZiKaS
Janos Haits

The A-Z of AI - 1 views

  •  
    "Making sense of artificial intelligence This A-Z guide offers a series of simple, bite-sized explainers to help anyone understand what AI is, how it works and how it's changing the world around us."
Janos Haits

Cosmos: The Internet of Blockchains - 0 views

  •  
    "The Internet of Blockchains. Cosmos is an ever-expanding ecosystem of interconnected apps and services, built for a decentralized future."
Ahmed Mansour

Introduction to Design Patterns - 0 views

  • design pattern is a widely accepted solution to a recurring design problem in OOP a design pattern describes how to structure classes to meet a given requirement provides a general blueprint to follow when implementing part of a program does not describe how to structure the entire application does not describe specific algorithms focuses on relationships between classes
  • design patterns: make you more productive help you write cleaner code Observer and Singleton are just two of the many available if you like design patterns, try these resources: GoF book -- Design Patterns: Elements of Reusable Object-oriented Software design pattern examples in Java, see Design Patterns in Java Reference and Example Site
  • learn what a design pattern is
    • Ahmed Mansour
       
      link to download Design Patterns: Elements of Reusable Object-oriented Software book : http://rs638.rapidshare.com/files/242614498/Design_Patterns_Elements_Of_Reusable_Object_Oriented_Software.pdf
  •  
    in summary :D we can say that a design pattern is a general reusable solution to a commonly occurring problem in software design. and it gives the way and relation between the classes and object to solve a certain problem and it doesn't specity the final application here is a book which Tecno give it tom me http://www.4shared.com/file/111350944/8be77835/Dummies_-_DesignPattern.html hope that it will be usefull
Ahmed  One

Biotech: Bioinformatics - 0 views

  •  
    Bioinformatics was applied in the creation and maintenance of a database to store biological information at the beginning of the "genomic revolution", such as nucleotide and amino acid sequences.
  •  
    Bioinformatics of the latest computer science, and is expected in the near future that the high demand for experts in this area. According to economic analysts, the volume of investments in this sector, close to sixty billion dollars during this year.
Abdelrahman Ogail

Genetic programming - Wikipedia, the free encyclopedia - 0 views

  • In artificial intelligence, genetic programming (GP) is an evolutionary algorithm-based methodology inspired by biological evolution to find computer programs that perform a user-defined task. It is a specialization of genetic algorithms (GA) where each individual is a computer program. Therefore it is a machine learning technique used to optimize a population of computer programs according to a fitness landscape determined by a program's ability to perform a given computational task.
  • In artificial intelligence, genetic programming (GP) is an evolutionary algorithm-based methodology inspired by biological evolution to find computer programs that perform a user-defined task. It is a specialization of genetic algorithms (GA) where each individual is a computer program. Therefore it is a machine learning technique used to optimize a population of computer programs according to a fitness landscape determined by a program's ability to perform a given computational task.
Abdelrahman Ogail

Voice over Internet Protocol - Wikipedia, the free encyclopedia - 0 views

shared by Abdelrahman Ogail on 01 Jul 09 - Cached
Ahmed One liked it
  • Voice over Internet Protocol (VoIP) is a general term for a family of transmission technologies for delivery of voice communications over IP networks such as the Internet or other packet-switched network
  • Internet telephony refers to communications services—voice, facsimile, and/or voice-messaging applications—that are transported via the Internet, rather than the public switched telephone network (PSTN). The basic steps involved in originating an Internet telephone call are conversion of the analog voice signal to digital format and compression/translation of the signal into Internet protocol (IP) packets for transmission over the Internet; the process is reversed at the receiving end.[1]
Abdelrahman Ogail

Hill climbing - Wikipedia, the free encyclopedia - 0 views

  • In computer science, hill climbing is a mathematical optimization technique which belongs to the family of local search. It is relatively simple to implement, making it a popular first choice. Although more advanced algorithms may give better results, in some situations hill climbing works just as well. Hill climbing can be used to solve problems that have many solutions, some of which are better than others. It starts with a random (potentially poor) solution, and iteratively makes small changes to the solution, each time improving it a little. When the algorithm cannot see any improvement anymore, it terminates. Ideally, at that point the current solution is close to optimal, but it is not guaranteed that hill climbing will ever come close to the optimal solution. For example, hill climbing can be applied to the traveling salesman problem. It is easy to find a solution that visits all the cities but will be very poor compared to the optimal solution. The algorithm starts with such a solution and makes small improvements to it, such as switching the order in which two cities are visited. Eventually, a much better route is obtained. Hill climbing is used widely in artificial intelligence, for reaching a goal state from a starting node. Choice of next node and starting node can be varied to give a list of related algorithms.
Islam TeCNo

List of network protocols - Wikipedia, the free encyclopedia - 0 views

  • IPv4 Internet Protocol version 4
    • Islam TeCNo
       
      el mafroud dah eli howa asasn e7na bensta5dmo now ...maslan el IP beta3i 217.154.89.2 ....el mafroud dah IPv4 we el mafroud ba2a ba3den netawr we neb2a IPv6 :D
  • IPv6 Internet Protocol version 6
    • Islam TeCNo
       
      المفروض ده بقي البروتوكول الجديد الي إن شاء الله هيطبق بعيدن
    • Ahmed Mansour
       
      Currently there are two types of Internet Protocol (IP) addresses in active use: IP version 4 (IPv4) and IP version 6 (IPv6). IPv4 was initially deployed on 1 January 1983 and is still the most commonly used version. IPv4 addresses are 32-bit numbers often expressed as 4 octets in "dotted decimal" notation (for example, 192.0.2.53). Deployment of the IPv6 protocol began in 1999. IPv6 addresses are 128-bit numbers and are conventionally expressed using hexadecimal strings (for example, 2001:0db8:582:ae33::29). source : http://www.iana.org/numbers/ thanks tecno for your useful comments :) keep it up(Y)
  • TCP Transmission Control Protocol UDP User Datagram Protocol
    • Islam TeCNo
       
      The Diffrance between TCP and UDP is that TCP check the packet that packets are sent correctly ... but UDP just send and don't check ....so UDP is faster than TCP but TCP check that data is sent correctly .... so UDP is used in applications like Video Streaming (You Tube) and Voice Streaming too
    • Islam TeCNo
  • ...6 more annotations...
  • Jabber, an instant-messaging protocol
    • Islam TeCNo
       
      Great protcol .....also Called XMPP and this is the protocol used by Google Talk
    • Islam TeCNo
       
      port 5222 i think is it's default :D
  • Internet Relay Chat (IRC)
    • Islam TeCNo
       
      I think this is a very old chat protocol
  • ED2K, A peer-to-peer file sharing protocol
    • Islam TeCNo
       
      I think this is used by emule P2P program !! A Great P2P File Sharing program
  • FTP, File Transfer Protocol
    • Islam TeCNo
       
      use port 21 :D
    • Islam TeCNo
       
      loooooooot of protocols ....any one know simple explainations ?
  • HTTP, HyperText Transfer Protocol
Islam TeCNo

Scalability - Wikipedia, the free encyclopedia - 0 views

  • In telecommunications and software engineering, scalability is a desirable property of a system, a network, or a process, which indicates its ability to either handle growing amounts of work in a graceful manner, or to be readily enlarged.[1] For example, it can refer to the capability of a system to increase total throughput under an increased load when resources (typically hardware) are added. An analogous meaning is implied when the word is used in a commercial context, where scalability of a company implies that the underlying business model offers the potential for economic growth within the company.
    • Abdelrahman Ogail
       
      In web applications, the client objects are removed from the server when they are sent to the client browser. This is great for scalability, but it can hurt the user and developer experience
    • Islam TeCNo
       
      mesh fahem ya Zikas commentak :D. we men el examples 3ala el scalabilty ...Gooogle we Gmail
    • Abdelrahman Ogail
       
      In Web applications client data are saved on the server (then the server memory is decreased that decreases the scalability - الإستيعاب-) So removing the client data improvers scalability becuase it saves server memory
    • Islam TeCNo
       
      ahaa :D Keshta.... ya3ni by3mlo delete 3ala el server ba3d lama el client ye3mel download :D hehe
Islam TeCNo

Neuroplasticity - Wikipedia, the free encyclopedia - 0 views

  • Neuroplasticity (also referred to as brain plasticity, cortical plasticity or cortical re-mapping) is the changing of neurons and the organization of their networks and so their function by experience. This idea was first proposed in 1892 by Santiago Ramón y Cajal the proposer of the neuron doctrine though the idea was largely neglected for the next fifty years.[1] The first person to use the term neural plasticity appears to have been the Polish neuroscientist Jerzy Konorski.[2]
    • Abdelrahman Ogail
       
      This is why when a person thinks more he/she be more smarter!
    • Islam TeCNo
       
      3azeem .....bas deh mesh 7agat related l CS ya Zi3'az
    • Abdelrahman Ogail
       
      How said that? It's related to Artificial Neural Networks that require understanding of actual Human Neurons. BTW, plasticity principle is used in Games AI where the Controlled-AI determines if it forgot what happened or still remember it and seeks to revenge
    • Islam TeCNo
       
      oooooooooh ........ 3'reaaaaaat
Islam TeCNo

Rich Internet application - Wikipedia, the free encyclopedia - 0 views

  • Rich Internet applications (RIAs) are web applications that have some of the characteristics of desktop applications, typically delivered by way of a proprietary web browser plug-ins or independently via sandboxes or virtual machines[1]. Examples of RIA frameworks include Curl (programming language), Adobe Flash/Adobe Flex/AIR, Java/JavaFX[2], uniPaaS[3] and Microsoft Silverlight[4].
    • Abdelrahman Ogail
       
      RIA Application Definition. Seems to be applications that could be used to Web and Desktop Development as Java
    • Islam TeCNo
       
      (Y) .....ana bardo kont 3ayez a3ref eh RIA deh :D
  •  
    Very clear document :D .....need no explanation :D
Abdelrahman Ogail

Belief-Desire-Intention software model - Wikipedia, the free encyclopedia - 0 views

  • The Belief-Desire-Intention (BDI) software model (usually referred to simply, but ambiguously, as BDI) is a software model developed for programming intelligent agents. Superficially characterized by the implementation of an agent's beliefs, desires and intentions, it actually uses these concepts to solve a particular problem in agent programming. In essence, it provides a mechanism for separating the activity of selecting a plan (from a plan library) from the execution of currently active plans. Consequently, BDI agents are able to balance the time spent on deliberating about plans (choosing what to do) and executing those plans (doing it). A third activity, creating the plans in the first place (planning), is not within the scope of the model, and is left to the system designer and programmer.
    • Abdelrahman Ogail
       
      Stress on the point "BDI Agents spent time about choosing what to do more that how to execute them"
helen troy

Blue Screen of Death - 1 views

I was working with my school project and doing my part time job at the same time, so it happened that I opened numerous windows and tabs one after another. When all of a sudden my computer displaye...

need computer help

started by helen troy on 02 May 11 no follow-up yet
« First ‹ Previous 41 - 60 of 222 Next › Last »
Showing 20 items per page