Jump to content

khaled

Senior Members
  • Posts

    594
  • Joined

  • Last visited

Posts posted by khaled

  1. There is a very powerful method, but it's not used, and none would agree to ...

     

    It's a method where we can make 3-year-old children learn complex mathematics,

     

    By using media such as TV channel, and by deploying both Graph theory & Fuzzy Media theory,

     

    This method works because of a simple reason, because this method communicate

    with the child's brain, not with the child him-self ...

     

    and the brain works the same at all times (not talking about understand level), and young

    humans have better perceiving of things ...

  2. Well there are only three programs on that list that I have opinions about and of the three none are good. I'm in a rush but ...

     

    CODE::BLOCKS is fugly and although it provides the environment equivalent it omits the important stuff, the automation tools. There is a very good reason for when I right click a project I open up a very long list of potential variables in VCStudio. This functionality is simply not provided and I would rather just use a text editor and compile Make files. I think the greatest thing about VCStudio is, aside from intellisense, row column select :P

     

    GIMP I will say is a reasonable alternative to its commercial partner, it's free I can't complain. No self respecting artist will ever utter GIMP outperforms Photoshop in any way whatsoever. Having studied Game Design in a film school I have been specially privy to such banter.

     

    Open Office has caused me a number of times to almost release some rather serious wrath upon my PC. There is nothing I hate more than completing a few hours of work on making a very pretty table just to have the program crash and leave me with a corrupt or reset file. Have I mentioned my fondness for the ribbon, no not OOo silly ....

     

    VCStudio Express is free and powerful and allows anyone to write commercial software openly. Paint.NET is a free open drawing package that has the raw power of Photoshop and is expandable through the addition of tools. It does however have some quarks in how tools are interfaced to the canvass. There is always wordpad and every Windows station is well equipped with spell checking.

     

    About Code::Blocks, it's an alternative, and I am a researcher, and It has everything you need ...

    -- ps developers do not need row column select ...

     

    About GIMP, I know that, and I don't like GIMP much, that's why I use Krita, which is easier to use, and give better results ...

     

    Open Office doesn't have problems in linux, and I work on all extensions from linux,windows,mac .. if it crashes, then you have

    a problem with your linux along with your device, also there is KOffice too ...

     

    About your last statement, VCS Express is not free, it is a share-ware, and no, it's illegal to write commerical software using that,

    Microsoft will issue your program in the court, and i'm not joking !

     

    Paint.NET is a good program, not to forget that using WineHD on Linux, you can use windows applications,

    not to mention also that there are many good Paint programs on Linux too,

     

    Linux have spell-checking with a dictionary, It appears in Firefox & Office Tools .. and Linux Programs are well-Stationed too,

     

    -- About myself, I use gedit and gcc\g++ compiler with C\C++, and NetBeans with Java

    --- and I hate Eclipse, It feels like living on Mars (you will know what I mean when you use it) !

  3. so would it sound more realistic if searches for possible viruss and sends a copy of the source code to an analyzer that could determine if it was a computer virus without effecting the original copy? that would than add the data to the antivirus of their own computer?

     

    why do hackers use linux?

    why do linux users "not know what antivirus is"?

    and why would only script kiddies keep viruss on their drive?

    what does script kiddies mean?

     

    There is a famous problem in Security Field called "source ambiguity", it means if someone wrote a virus,

    -- without leaving any trace of who wrote it, and it spread ...

     

    you cannot know who produced this virus, and if a virus exist somewhere, it doesn't necessarily mean you made it up,

    -- moreover, but the law says that sending\distributing a virus is illegal ...

     

    hackers use linux because viruses are mostly written for windows operating system, and you don't really get to see

    a trojan horse or a viruse with xxx.out or xxx.bash extensions, you usually see them with xxx.exe, and there is

    no autorun in linux, the thing that makes virus execution easier on windows ...

     

    there are three kinds of hackes, white hat are the good hackers that use hacking techniques to test servers,OSs,..etc ,

    script-kiddies and they write viruses,trojan horses,..etc and they use pre-made hacking systems,

    black hats and they are the worst ones, and if you are targeted by one, I can't assure you that your device will be safe

    anymore, black hats don't write viruses,trojan horses,..etc , they do mainly three things:

     

    - Passive Attack: Collecting Information About targets (called Social Engineering)

     

    - Active Attack: direct Attack to the target's devices\systems (not using pre-packed systems)

     

    - Program Black Agents: This is worst than viruses\trojan horses\..etc, this is a mobile programmed agent,

    -- it moves through systems, and network, it has a job to do, either collecting information, or that it's a member

    -- of a distributed group to commit a DDOS attack that is untraceable

     

    About myself, I'm a white hat ...

  4. Yeah I've read that one a few times now. I think I will be deploying project builds with scons, it is a little more up to date then make.

     

    I didn't have the ability to check with the Rosetta people until my account cleared. This just happened to occur at the same time as I realised why the build was breaking and so I posted my solution. I wish Rosetta was a graphical program root up but in the time honoured nix tradition it is text based with a rendered result(I think it has renders, pretty sure.) Oh well I'll just have to learn FASTA until I get my own software to a better place. Looking at their code I think I will be getting there sooner than anticipated. I'll be sure to work in both environments, I mean who says nix is restricted to the command line, right?

     

    go to my thread: http://www.scienceforums.net/topic/54475-linux-have-everything-you-need/

  5. In this thread I will list Linux-Free-Programs that are alternative to famous programs used by developers\researchers,

    You are welcome to request an alternative to any program you usually use on another Operating System ...

     

     

    C\C++ IDE: Code::Blocks, Netbeans (full edition), Eclipse, KDevelop

     

    Java IDE: Netbeans, Eclipse

     

    HTML\CSS\..\JS: Blue Fish

     

    All Sources Codes editor: gedit

     

    Photoshop-alternative: Krita, GIMP

     

    Visio-alternative: Dia

     

    Download Manager: Kget, Wget

     

    Office: Open-Office, KOffice

     

    Latex IDE: Kile, Tex Maker

     

    Matlab-alternative: GNU Octave

     

    Mathematics Tool: Genius Math Tool

     

    Sound-Editing: ReZound

     

    Video-Editing: Open Movie Editor

     

    Sound-Covertion: Sound Converter

     

    Sound-To-Command for ease of use: KMouth

     

     

    note: I'd like this thread to be pinned, so everyone can request anytime ...

  6. it also had the function of someone tried to hack the computer the virus jumped into the hackers computer and deleted all the hackers viruss he had made to hack people's computers.(that's not possible is it?)

    but i don't see what makes this program a virus because by definition (i think) a computer virus

    has to be harmful. so if someone made an antivirus that spreads like a virus and would that even be a virus?

     

    You know what is really funny, hackers use linux, as a linux user, we don't know what an anti-virus means,

    -- only script-kiddies keeps viruses on their computer, hackers never keep any copy of a virus on their drive,

     

    True (about your last question) that includes performance-eaters (multiplies in the cpu), halters (lead computer to halt),

    -- memory-jammers (fills up memory), and no-ops (keep doing nothing in cpu)

  7. Probably a stupid question, but have you looked at the "number three" article on wiki?

     

    Also khaled, just at a glance you're missing the "address-of" operators that should precede the variable names in printf. Not that it makes any difference.

     

    I haven't looked any article about "number three" ...

     

    in C printf you do not need to give "address-of" to variables, that is needed only when using scanf

     

    int A = 0 ;
    
    scanf ( "%d", &A ) ;
    
    printf ( " A = %d ", A ) ;
    

  8. This concept is some different.

    The main point what I state is the difference between arithmetic calculation and real life calculation.

    Arithmetic calculation should be done by using nondimensional number.

    If not, the result gives us some confusion.

    So good problem solving procedure is like this.

    make equation--->transfer dimensionless form --------> calculation ------>transfer dimension form----->result

     

    I didn't bring anything from my brain, this problem is well-known and already have solutions ...

     

    Look up Binary Knapsack Problem HERE

  9. In mathematical logic, we have a tertiary operator: ( C ? A : B )

     

    where C is a condition, A and B are statements

     

    the operator works like this: if C is TRUE do A, if C is FALSE do B

     

    this operator is used in programming languages: C\C++

     

    example:

    int A = 10 * 2 ;
    
    int B = 40 / 2 ;
    
    char R [8] = ( A == B ? "TRUE" : "FALSE" );
    
    printf(" ( %d == %d ) = %s ", A, B, R );
    

     

    output:

    ( 20 == 20 ) = TRUE
    

  10. I read a short scifi story where there was a computer virus that was programed to delete hostile programs(other virus) . it was also designed to shut down a system if it "thought" that the security of the computer was comprised and to identify any new virus based upon their actions and source code.

    is that possible?

    is there any benefit of such a program over a antivirus software?

    what would make this a virus rather than a normal program?

     

    Yes, it is highly possible in the future, based on Artificial Intelligence and Analysis

    -- basically, normal anti-viruses can suspect a code to be harmful, it asks the user to put them in the Quarantine !

    -- then, the anti-virus sends an isolated copy of Quarantined files to the vendor's e-labs to check the files ...

     

    yes, only if the Analyzer is trustworthy !

     

    It can turn into a virus, if the Analyzer is either not good, or if it was modified !

    -- this assumption also includes if a free anti-virus was programmed to be a virus initially ...

  11. This problem is not a normal mathematical division, it's an integer division:

     

    let's assume that A is number of divided Objects, and B is number of members

     

    1. using Integer division:

    X = A div B

    Y = A mod B

    if X = 1 then objects divided success, else failure

    if Y > 0 then Y objects remain after division

    if Y = A then division failed

     

    2. using recurrence definition:

    S = { 0, 0, 0, ... }, S represent what every member owns

    -------------

    a. IF [ B < 1 ] OR [ A < 1 ] THEN STOP

    b. z = A mod cut, where cut is number of objects meant for every member

    c. A = A - z

    d. Sb = z

    e. B = B - 1

    f. GOTO STEP a

    -------------

  12. 1. what is the best brand of computer and whats the best operating system?

    2. do desktop computers have better performance than laptops?

    3. what is the difference between a notebook a netbook and a laptop?

    4. which is the best browser and why?

    5. what is the best antivirus software?

    6. what is the best free antivirus software?

    7. can a laptop be gotten for $x<$300? and if so will it be crappy?

     

    A1: best brand is MacBook Pro & iMac, best operating system is Mac OS X

     

    A2: yes, depending on the architecture you use, and the addings

     

    A3: netbook is a small laptop that is good only for those who use internet and office programs usually powered by Intel Atom Processor

    -- notebooks are meduim laptops in the size of a notebook ("13) with a fair performance usually comes with Intel i3 and i5,

    -- laptops are big laptops ("15 and "17) that comes with Intel i5 and i7 and huge supports and add-ons

     

    A4: Firefox, for many reasons, including supportability, cross-platform, rich with good add-ons, good HTML interpreter,

    -- and soon it will support HTML5 + CSS3

     

    A5: Kaspersky

     

    A6: Avira

     

    A7: yes, you can get a good low-price laptop that is used, usually a clean used Acer\Assus laptop can be bought with a price

    -- between 160 and 280 US $, and powered by Intel Core 2 Duo with speed range 1.4 ~ 2.0

     

    Good luck

    ~khaled

  13. 1. C for programming mathematics, system programming under Linux, and when speed is needed

     

    2. C++ when programming Data Structures, Object-Oriented, system programming under Windows

     

    3. Objective-C when programming Object-Oriented & Data Structures with high performance, system programming under Mac

     

    4. Java when programming Web applications, hybrid applications, Cross-Platform applications

     

     

    Programming\Scripting languages that are good to know and work with are:

     

    General: C \ Objective-C 2.0 \ C++ \ { C# OR VB.net } \ Java

     

    Web: HTML AND CSS \ Java Script \ JSP \ PHP

     

    Kernel: MS DOS \ Bash \ Mac Kernel

     

    Database: SQL \ PL.SQL

     

    Writing: Latex OR Word Processor

     

    and I program with all languages, mentioned above ...

     

    C++ with MFC is a good choice ! :(

     

    i think MFC died at 2005, there is no MFC in Visual Studio 2008 & later versions ...

     

    and, we are talking about programming languages, not using Moderated Codes and Libraries ...

  14. Maybe you want something like

     

    [math]A\cup_{p}B = \{\left. a \in A \cup B\right| p(a) = \textnormal{True} \} [/math],

     

     

    for some criterion [math]p[/math]. Then you would have to see if this is really what you are looking for.

     

    I think that's a good definition, for one constraint

     

    Hmm, well, the structure that forgetful functors "forget" is algebraic, so unless our sets are algebraic, I'm not sure it applies. Two classic examples: the functor that sends the category of vector spaces to the category of abelian groups, "forgets" the algebraic operation of scalar multiplication by the field over which our vector spaces are defined.

     

    Likewise, the forgetful functor that sends the category of general groups to their underlying sets "forgets" about the group binary operation

     

    Although the OP was not very clear, even less so his/her follow-ups, I suspect the "new" operation being described is disjoint union of sets. So that is, say, we have a set of all colours, and a subset of all objects, then their disjoint union is the set {{red,car}, {red, dress}, {blue, car},....,{white, car},....,, {blue, moon},....}}

     

    Contrast this to the the "ordinary" union of sets: here we do NOT forget the origin of each set element entering into the union. In a certain sense this is opposite to the forgetful functor!

     

    I think the one big set would be complex to represent, but easier we would have:

     

    Set of Objects = { car, dress, moon, ... }

     

    Set of Colors = { white, black, red, green, ..., phi }

     

    Set of Shapes = { cubic, rectangular, ..., phi }

     

    Set of Sizes = { long, short, wide, huge, ..., phi }

     

    Set of Measurements = { um, mm, cm, m, Km, Mm, Gm, ..., phi } .. and so on,

     

    and you can form a definition using: Color,{Shape}+,Object,{[iNTEGER],Measurement,Size}+,...

     

    where + means "1 or more recurrence" .. { .. }+ means "1 or more recurrence" of the sub-set

     

    example: { "blue", { "spiral", "circular", "cylinder" }, "tube", { [40], "cm", "long" }, { [60], "mm", "wide" } }

     

    Good luck

  15. If you want to implement a cycle detection, you need a graph search, using a Queue with a good

    heuristic, and a marking list,

     

    If you look up Wikipedia, you can find a complex but good algorithms, especially ones that run in Polynomial time

    and in open graphs (graph with infinite number of vertices) .. since cycle detection is a Decision Problem,

  16.  

    Q1: do you use Linux with GNOME or KDE ..?

     

    Q2: you installed Linux on a disk partition directly or you installed Linux inside windows ?

     

     

    note: first you have to check if your BIOS disabled your hardware, or limiting some of them,

     

    check BIOS for details and check the manual of your Cards, then when BIOS is validated,

     

    move to Linux (recovery mode) and check for settings and everything else ...

     

  17. Hey Guys/Girls,

     

    I'm less than a year from completing my B.A. in Computer Science at Wright State University. I had an epiphany though. I realized I don't want to spend the rest of my life sitting in front of a computer screen.

     

    Are there any options out there for jobs with my degree that don't involve operating a computer all day long? I'm starting to think my only choice would be to go back for a Math degree or something similar but I've been in school for 7+ years and even then my future seems bleak.

     

    Thanks!

     

    Are you good in Research and Teaching ?

  18. Shouldn't the derivative of f(g(x)) = f'(g(x)) * g'(x) ..?

     

    [imath]f(x) = \sqrt{x}[/imath]

     

    [imath]g(x) = 29 \tan^{-1}{(x)}[/imath]

     

    [imath]\frac{dy}{dx} f(g(x)) = f^{'}(g(x)) \times g^{'}(x)[/imath]

     

    [imath]\frac{dy}{dx} \sqrt{29 \tan^{-1}{(x)}} = {(\sqrt{29 \tan^{-1}{(x)}})}^{'} \times {(29 \tan^{-1}{(x)})}^{'}[/imath]

     

    [latex]

    = \frac{1}{2 (\sqrt{29 \tan^{-1}{(x)}}) } \times \frac{29}{1 + x^2}

    [/latex]

     

    [latex]

    = \frac{29}{2 (\sqrt{29 \tan^{-1}{(x)}}) \times (1 + x^2) }

    [/latex]

  19. (emphasis mine)

     

    That is a lot of calculation to finally choose the 2 clocks with negative value. See my post #7.

     

    Your answer is true, if we are not working according to given Algorithm or a method,

    Well, i study clocks and synchronization, calculations are needed to elect clocks ...

     

    his problem has many options:

     

    - choose two clocks that chime with minimal drift, 2 chimes hourly,

     

    - choose two clocks that chime perfectly at some point, the second clock is faster by some rate, they meet

    -- at some point, the faster clock should chime at (assuming that drift is measured by minutes) (60/drift)*60 O'clock

    -- the slower clock will chime at ((60/drift)*60) - 1,

     

    - choose two clocks with minimal drift from nominally perfect reference, to chime on a synchronization point

    -- synchronization point is where clocks are synchronized to interpolated value between readings,

  20. There are five clocks. Each one of them chime when it has made a full hour. They run at consistent rates but at different and incorrect rates. Each hour (according to an accurate clock) at least two clocks chime. How would i prove that i can throw away at least 3 of the 5 clocks and still end up hearing a chime at each true hour?

     

    ? Just to let you know, this question is under Theoretical Computer Science - Distributed Systems - Synchronization & Clocks ...

     

    > you have 5 Clocks, denoted C1, C2, .., C5 .. with different consistent rates ...

     

    1. you calculate Clock-per-Clock Drift (difference in rate), so you have 10 drift rates ...

    ---- Dij = rate difference between Clock Ci and Clock Cj

     

    2. get minimal Dij among the 10 Drift Rates

     

    3. by choosing Dij, you keep Clock Ci and Cj only, throwing other clocks

     

    :: you will get 2 ticks per hour, unless if Dij (minimal D) is Zero, but the error is minimized as possible ...

     

    ----------------------------------------------------------------------------------------------------

     

    example:

     

    assume that every clocks, gives the skew (difference in reading) per second:

    -- C1 = -1.05, C2 = +0.8, C3 = +0.2, C4 = -1.0, C5 = +0.35

     

    Dij: D12 = 1.85, D13 = 1.25, D14 = 0.05, D15 = 1.4, D23 = 0.6, D24 = 1.8,

    -- D25 = 0.45, D34 = 1.2, D35 = 0.15, D45 = 1.35

     

    choosing minimum Dij: D14 = 0.05

     

    solution: keep clocks C1 and C4, throw other clocks

    result: you will get two ticks with 0.05 difference every hour

    constraint: the clocks must be hourly synchronized

  21. Oh you read the book? Surely you have more to say than that, because it is about more than that.

     

    Perhaps you know at what age a child can grasp mathematical concepts? How many 3 year olds have worked with and what was the most successful for getting a young child to understand the concepts?

     

    I haven't read any book but what i think is that teaching a child math concepts need to

    transform the concepts into games, I suggest the following:

     

    - Count Specific Cars in the other side of the street (group game in car)

    - Addition and Subtraction using logos at home

    - play monopoly, learn how to count money, and raise odds on bets

    - Ask your child about the change before getting the change in a shop

    - Multiplication using group theory (ex: if you have 5 dollars, and so 5 boys, how many dollars we have seen ?)

    - Multiplication by letting the child look at a matrix of glass windows of a building

    ...

×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.