scholarly journals ROSESIM: An Interactive Tool for Plant Growth Modeling

1996 ◽  
Vol 6 (1) ◽  
pp. 76-79
Author(s):  
Douglas A. Hopper

One should choose the simplest form of a model as a tool that adequately represents the processes and relationships of interest. ROSESIM was first developed in SLAM II and FORTRAN to run on a mainframe computer, where it had few users and it was cumbersome to learn and use. As use of models on a personal computer (PC) has become more popular for instruction and simulation, ROSESIM was translated first into the American Standard Code for Information Interchange (ASCII) to run in the Beginner's All-purpose Symbolic Instruction Code (BASIC) language in the popular Microsoft Disk Operating System (MS-DOS). As graphical user interface (GUI) Windows applications have gained increased popularity, ROSESIM has been translated into C++ as object-oriented programming (OOP) to run inside Microsoft Windows 3.1. This makes ROSESIM for Windows readily available to virtually every PC user. Features of ROSESIM for Windows are listed and discussed.

2009 ◽  
Vol 19 (1) ◽  
pp. 51-60
Author(s):  
Sergio Ledesma ◽  
Gustavo Cerda-Villafana ◽  
Donato Hernández Fusilier ◽  
Miguel Torres Cisneros

The Multiple Document Interface (MDI) is a Microsoft Windows specification that allows managing multiple documents using a single graphic interface application. An MDI application allows opening several documents simultaneously. Only one document is active at a particular time. MDI applications can be deployed using Win32 or Microsoft Foundation Classes (MFC). Programs developed using Win32 are faster than those using MFC. However, Win32applications are difficult to implement and prone to errors. It should be mentioned that, learning how to properly use MFC to deploy MDI applications is not simple, and performance is typically worse than that of Win32 applications. A method to simplify the development of MDI applications using Object-Oriented Programming (OOP) is proposed. Subsequently, it is shown that this method generates compact code that is easier to read and maintain than other methods (i.e., MFC). Finally, it is demonstrated that the proposed method allowsthe rapid development of MDI applications without sacrificing application performance.


1996 ◽  
Vol 25 (505) ◽  
Author(s):  
Søren Brandt ◽  
Rene Wenzel Schmidt

We present a runtime metalevel interface for BETA. BETA is a compiled and statically typed object-oriented programming language. The metalevel interface preserves the type safe properties of the language and supports static type checking. This is achieved through a novel language construct, the <em>attribute reference</em>, on top of which the metalevel interfacer is built. The metalevel interface is based on a simple conceptual model that reifies a few basic language primitives. For the implementation, a metalevel architecture based on a virtual machine view of the runtime system is introduced. In this model, an open implementation of compiled language is achieved by providening the runtime virtual machine with a metalevel interface supporting runtime reflection.


1996 ◽  
Vol 24 (4) ◽  
pp. 279-290 ◽  
Author(s):  
M. Darwish ◽  
H. Diab ◽  
F. Moukalled

This paper describes IDGG, an Interactive Dynamic Grid Generator, for use as an educational tool by students studying computational fluid dynamics. The package is a Windows applications and runs on IBM PC, or compatible, computers. It is written in Pascal and built using object-oriented programming. The computer program allows the user to generate boundary-fitted curvilinear grids in any two-dimensional domain. The procedure adopted requires the user to perform the transformation step by step allowing him/her to easily grasp the concept of boundary-fitted coordinate systems. In addition, IDGG may be used by CFD researchers to display results graphically in the form of vector fields, contours, and two- and three-dimensional plots. The examples provided show the effectiveness of the package as a teaching aid.


2018 ◽  
Vol 7 (4.10) ◽  
pp. 1
Author(s):  
Krishnaja. R. ◽  
Parameswaran. R.

The security of information passed through the communication channel has become a major concern. Encoding of the messages before transmitting through the channel is most vital. We propose a three level encryption (encoding) using musical notes in traditional Indian and Western system as well as the American Standard Code for Information Interchange (ASCII). A unique method for the decryption is also mentioned in the paper.  


2020 ◽  
Vol 9 (6) ◽  
pp. 2555-2561
Author(s):  
Azizi Abas ◽  
Yuhanis Yusof ◽  
Roshidi Din ◽  
Fazli Azali ◽  
Baharudin Osman

Quick response (QR) code is a printed code of black and white squares that is able to store data without the use of any of the electronic devices. There are many existing researches on coloured QR code to increase the storage capacity but from time to time the storage capacity still need to be improved. This paper proposes the use ofcompress, multiplexing and multilayered techniques, as an integrated technique known as CoMM, to increase the storage of the existing QR code. The American Standard Code for Information Interchange (ASCII) text characters are used as an input and performance is measured by the number of characters that can be stored in a single black and white QR code version 40. The experiment metrics also include percentage of missing characters, number of produced QR code, and elapsed time to create the QR code. Simulation results indicate that the proposed algorithm stores 24 times more characters than the black and white QR code and 9 times more than other coloured QR code. Hence, this shows that the coloured QR code has the potential of becoming useful mini-data storage as it does not rely on internet connection.


2021 ◽  
Vol 6 (3) ◽  
pp. 197
Author(s):  
Nur Putrananda Setyapuji Winarno ◽  
Triawan Adi Cahyanto

Cryptography is a technique or method for securing data from other unauthorized parties. The substitution algorithm is the simplest algorithm and is classified as a classic in the field of cryptography, for example the Caesar cipher algorithm. ASCII code (American Standard Code for Information Interchange) is a code that contains characters that can be processed by a computer. By type, not all ASCII characters can be printed by the computer. Some characters are not printed or illegible as usual. These unreadable characters are called control characters. The control character can be used to improve the performance of the Caesar Cipher algorithm, because it focuses on processing text data. The application of control characters uses a simple method but has a complex solution. The results of this study are in the form of a new method with the Caesar cipher algorithm as a classical cryptographic method or technique and ASCII characters as the basis for the development of the ciphertext performance resulting from the encryption process. In testing this method, the success rate reaches 100% in securing the contents of the document with a sample of 500 letters. While the possibility of solving the ciphertext results is classified as difficult because the control characters of the ciphertext results that are illegible will make the decryption result multiple interpretations.


2021 ◽  
Author(s):  
Sajini S ◽  
Mary Anita E.A ◽  
J Janet

Abstract Now-a-days, with the augmenting accident statistics, Vehicular Ad-hoc Networks (VANET) are turning out to be more popular, which in-turn eradicates accidents in addition to damage to the vehicles together with populace. In a VANET, message can well be transmitted within a pre-stated region to attain safety of a system and also its efficacy. Next, it is challenge to ensure authenticity of messages in such a dynamic environment. Though some researchers have already worked on this, security has not been much focussed. Thus, secured data communication with enhanced security on the VANET environment utilizing the American Standard Code for Information Interchange centred Elliptic Curve Cryptography (ASCII-ECC) is proposed. The proposed scheme allows all vehicles to register with the Trusted Authority (TA) and uses Median-centred K-Means (MKM) to find out the cluster head among all cluster and at the last phase verification is done by TA. The performance of the proposed algorithm ASCII-ECC is analysed and proved that the system renders better performance when it is weighed against the top-notch methods.


Sign in / Sign up

Export Citation Format

Share Document