|It is currently Thu Mar 28, 2024 10:37 am Login / Join Codemiles

Java

C/C++

PHP

C#

HTML

CSS

ASP

Javascript

JQuery

AJAX

XSD

Python

Matlab

R Scripts

Weka


Blog Links

Blog Stats
4Total Entries
3Total Comments

Search Blogs


Category Blogs 
General Articles

General blog articles related to forums area or in general things.

1

Programming

Articles related programming (java,c++,csharp,dotNet)

1


 [ 24 blog entries ]  1, 2, 3, 4, 5  Next
Feed Random Blog Entries
pls help me IMP URGENT abt compression in java by tanmay005 on Mon Apr 04, 2011 11:15 am
i am tanmay from india studying in final year computer engineering
my final year mini project is "Multimedia file compressor using netbeans"
we are facing many problems in implementing diff algos such as huffman RLE and etc etc.....
so pls if u r havin any project of image,audio compression using netbeans
pass it to me....i badly need yur help.... pls reply me if u r havin some modules of image n audio compression....
we are also using encryption and decryption algorithms....pls help
pls pass me your email id so dat i can send u some of our GUI images.....

Just need to complete my program for snake game by behumanizer on Wed Aug 17, 2011 8:17 am
Program below is working i just don't know what to do for the algorithm on keyevents for right,left,up and down
The code like y+=10; is just my assumption for the snake movement.....
I believe below the path.reset() code has to be change since stack is being use...
Can anyone help me program to run correctly?


/***
* PROVIDE THE MISSING CODE in the keyPressed() method
* in order to move the 'snake' around the interface
* by pressing:
*
* --> cursor keys
* --> CTRL-Z to 'undo' last move
* --> CTRL-Y to 'redo' past/last move
*/

package midterms;

import java.awt.*;
import java.awt.event.*;
import java.awt.geom.*;
import javax.swing.*;
import java.util.*;
import javax.swing.border.*;



public class Snakes extends JPanel implements KeyListener {
final static long serialVersionUID = 1;
final private int WIDTH = 600;
final private int HEIGHT = 400;

LinkedList<Point> snake = new LinkedList<Point>();
Stack<Point> undo = new...

[ Continued ]

4 things to note down while using wait and notify method in java by javabuddy on Fri Jun 03, 2011 2:35 pm
while using wait and notify or notifyAll method in Java following things must be remember :

1) use notifyAll instead of notify if you expect more than one thread is waiting for lock.
2)wait() and notify() method must be called from synchronized context, see the link for more detailed explanation http://javarevisited.blogspot.com/2011/05/wait-notify-and-notifyall-in-java.html.
3) Always call wait() method in loop because if multiple threads are waiting for lock and one of them got lock and reset the condition and other thread needs to check the condition after they got wake up to see whether they need to wait again or can start processing.
4) use same object for calling wait() and notify() method, every object has its own lock so calling wait() on objectA and notify() on object B will not make any sense.

Working and Life by DrRakha on Wed Mar 16, 2011 10:06 pm
Well , I started to hate my current job ,programming and solving the same type of bugs , I lost my goal and interest in it , when I think about people around ,I see that most of them work by the relation win-to-win. They always looking for money, but in fact money is not the only thing which will make someone happy. (Yes it is important), but it is not the main reason to be happy in your life, sometimes you see a man has millions then he kills himself. Well don’t that I am rich and I will kill myself: D, actually I don’t have a car. This life is a big race … rate race. Who will win??!

Common Techniques used by Enterprises to Secure Data by extendcode on Fri Sep 07, 2012 1:58 pm
In today’s digital age information is power and all critical information is currently stored on protected servers operated by companies themselves or by 3rd party operators. If a company cannot protect its data from access by unauthorized individuals, the result can be devastating for the company itself as well as all vendors and stakeholders involved with the company. Such critical data which are usually protected using leading information security services can be used by unauthorized individuals to commit crimes such as insider trading, tender fixing etc. Countries all over the world have laws to prevent such unauthorized data access and non-compliance with the guidelines is cognizable offence with the companies paying hefty fines to the government, if the data security measures are breached. However, a common question that arises is how to companies ensure that their data stays protected from access by unauthorized individuals. Some of the security solutions designed to ensure proper d...

[ Continued ]

 [ 24 blog entries ]  1, 2, 3, 4, 5  Next

All times are UTC [ DST ]


cron






Powered by phpBB © 2000, 2002, 2005, 2007 phpBB Group
All copyrights reserved to codemiles.com 2007-2011
mileX v1.0 designed by codemiles team
Codemiles.com is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to Amazon.com