Web Based ‘C’ IDE: Approach
Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 3
Abstract
A Web based environment has been designed to execute C programs without explicitly installing any compilers on the machine, thus addressing the concerns of portability and accessibility. The environment runs on a Linux server, uses password authentication and provides each user with separate project directories to store all his programs. These can be accessed and modified by the respective user only. The entered code can be compiled and executed easily without using licensed software for the same. This saves installation time as well as memory of the client machine. The configuration of the machine need not be an issue as the system is web based and thus platform independent.
Authors and Affiliations
Sravanthi Emani , N. B. Pokale , Arti Chetwani , Archana Patwari
A Simple Message-Encryption Scheme based on Amino-acid Protein Sequence
Recently, biological techniques become more and more popular, as they are applied to many kinds of applications, authentication protocols, biochemistry, and cryptography. . Bioinformatics [2] plays a very important role...
DATA WAREHOUSING, DATA MINING, OLAP AND OLTP TECHNOLOGIES ARE ESSENTIAL ELEMENTS TO SUPPORT DECISION-MAKING PROCESS IN INDUSTRIES
This paper provides an overview of Data warehousing, Data Mining, OLAP, OLTP technologies, exploring the features, applications and the architecture of Data Warehousing. The data warehouse supports on-line analytical pro...
Great Circle Distance Methode for Improving Operational Control System Based on GPS Tracking System
Fleet monitoring conducted to determine the position of the movement of the fleet to a point of reference. There are three applications that are necessary for the implementation of the monitoring system. They are Global...
Simultaneous Pattern and Data Clustering Using Modified K-Means Algorithm
In data mining and knowledge discovery, for finding the ignificant correlation among events Pattern discovery (PD) is used. PD typically produces an overwhelming number of patterns. Since there are too many patterns, it...
Data Encryption and Decryption process Using Bit Shifting and Stuffing (BSS) Methodology
Commonly in encryption or decryption process some of the characters are inter changed by using some encryption and decryption algorithms (like DES, IDEA) with key. But in Bit Shifting and Stuffing (BSS) system to represe...