The Symbian C++ Programming Environment

2009 ◽  
pp. 29-40
Author(s):  
Morten V. Pedersen ◽  
Frank H. P. Fitzek
Author(s):  
Vahid Aryai ◽  
Mahsa Kharazi ◽  
Farid Ariai

<p><span lang="EN-AU">Four path planning and data exchange algorithms for cooperative search and coverage robotic missions are proposed and modified. The introduced methods are simulated using C++ programming environment and the results are discussed in detail for environments with static obstacles. It has been shown that using the <strong>“nearest zero-point”</strong> algorithm can greatly optimize the mission duration and also overlapping of the search trajectories. Finally, the results are compared with several existing algorithms.</span></p>


In the recent years there has been a tremendous growth in the field of engineering and sciences, which aided in the growth and development of fast and comfortable transportation media, with this development the number of automobiles have drastically increased, which for sure is a great technological achievement but sadly with this growth, the traffic and the hustle and bustle on roads is unstoppable and with it the number of accidents and road casualties have tremendously increased. But, there is no easy and practical way to reduce the usage of the automobiles. Every day the mankind read about thousands of people dying of road casualties and most of them die because the families or the concerned ones of the indulged people are not timely informed. The death casualties can be minimized to a great extent by just timely informing the families of the concerned ones. The prototype in this paper is an accident notification systemESP8266 NodeMCU and a simple vibration sensor is the heart of this system. The vibration sensor continuously senses the vibrations and on exceeding a predefined threshold limit, sends out a notification to registered numbers. In the past similar models have been proposed, which used costlier sensors such as Accelerometerbut the design in this paper, used simpler and cheaper sensor. Moreover, in earlier designs GSM technology was used but proposed design uses a Wi-Fi based controller, which in comparison to GSM technology is more reliable and fast. Also earlier GSM module needed an additional microcontroller such as Arduino but the use of NodeMCU eliminates the requirement of any additional controller. The prototype system in this paper makes the use of message queuing telemetry transport (MQTT) protocol, which is a very reliable and fast communication protocol which further uses subscribe and publish technology. The IoT cloud platform used in this prototype is Adafruit IO which is quite simpler when compared to other cloud platforms such as Losant Platform and moreover the data is updated every two seconds in Adafruit IO. For the notification purpose protocol is used with the help of IFTTT platform and ClickSend platform, Applets and Triggers are created to fulfill the requirement. The controller is programed using basic C and C++ programming languages and Arduino IDE serves as the programming environment, various library files have also been used for the programming purposes.


Author(s):  
Timothy K. Shih ◽  
Yule-Chyun Lin ◽  
Wen C. Pai ◽  
Chun-Chia Wang

Software metrics serve as a significant issue to improve software quality. It is an important research of software engineering. In line with the methodologies of object-oriented analysis and design widely developed, many software metrics techniques have been proposed. However, not many focus on the metrics evaluation of an inheritance hierarchy. In this paper, we propose a novel concept named unit repeated inheritance (URI) in Z notation to realize object-oriented software metrics. The approach describes an inheritance level technique (ILT) method as a guide to measure the software complexity of an inheritance hierarchy. The measures of inheritance metrics are formed based on the proposed mechanism. Also, we use Lex and Yacc to construct a windowing tool which is used in conjunction with a conventional C++ programming environment to assist a programmer to analyze and measure his/her C++ programs.


Author(s):  
Kin'ichi Mitsui ◽  
Hiroaki Nakamura ◽  
Theodore C. Law ◽  
Shahram Javey

2021 ◽  
pp. 102-105
Author(s):  
M.V. Kurkina ◽  
I.V. Ponomarev ◽  
D.I. Strokin

The active development of computer systems and information technologies implies an increase in the importance of ensuring the protection and security of information during its transfer or storage. Today, the fulfillment of the necessary data confidentiality requirements tends to the direction of cryptography and steganography. The choice of the applied method of encoding information directly depends on the goals of the user, as well as the available software. The main requirement for the message encoding process is the availability of acceptable computational complexity of the implementation. The article discusses methods of ensuring data confidentiality employing digital steganography, using BMP images as container files, and carrying out their subsequent compression to the JPEG format without losing hidden information. Mathematical methods of constructing a stegosystem for encoding ASCII are studied — a message, each character of which is encoded with exactly one byte. As a result, a computer program was created based on the Microsoft Visual Studio 2017 programming environment and the C# programming language (.NET Framework). The stereotype, in this case, is a sequence of steps between image pixels, into which information is embedded. In this case, the algorithm allows you to memorize not the entire sequence of steps (that is, not the entire keystroke), but only the first five characters of the key or half of the key.


Sign in / Sign up

Export Citation Format

Share Document