722 research outputs found

    Adding Syntax Parameters to the Sweet.JS Macro Library for JavaScript

    Get PDF
    Lisp and Scheme have demonstrated the power of macros to enable programmers to evolve and craft languages. A macro is a rule or pattern that specifies how a certain input sequence should be mapped to an output sequence according to some defined procedure. Using a macro system a programmer can introduce new syntactic elements to the programming language. Macros found in a program are expanded by a macro expander and allow a programmer to enable code reuse. Mozilla Sweet.JS provides a way for developers to enrich their JavaScript code by adding new syntax to the language through the use of macros. Sweet.JS provides the possibility to define hygienic macros inspired by Scheme. “In this paper, I present the implementation of a “syntax parameter” feature for the Sweet.JS library. A syntax parameter is a mechanism for rebinding a macro defi- nition within the dynamic context of a macro expansions thereby introducing implicit identifiers in a hygienic fashion. Some time hygienic macro bindings are insufficient such as with “anaphoric conditionals where the value of the tested expression is avail- able as an it binding. With syntax parameters, instead of introducing the binding unhygienically each time, we instead create one binding for the keyword, which we can then adjust later when we want the keyword to have a different meaning. As no new bindings are introduced hygiene is preserved

    Eight Things you should Know about Open Source Integrated Library Systems.

    Get PDF
    Open source library management systems are free alternative to costly commercial library systems. It helps to automate library functions and give a tremendous savings on library automation expenses. User ’s participation in all stages of software project ensures the development of the features that the library really wants. Lack of awareness and knowledge in open source technology among library professionals restrict wide adoption of open source library management system. This article gives an insight into the use and maintenance of open source library management systems

    On The Economics oF Organized Crime

    Get PDF
    The core function of organized crime is the selling of protection. Protection can be real, against third-party crime, or manufactured by the organized crime groups themselves. Mafias and gangs emerge in areas of weak state control, because of prohibition and geographic, ethnic, or social isolation. Although competition is considered good in economics, in the case of organized crime the predatory competition that is more likely to take place is harmful. The costs of organized crime include the resources expended on the activity, more ordinary productive and investment distortions, as well as other dynamic effects on occupational choice.Law and economics; Property rights; Governance

    Effect of Marma Therapy on Sandhigata Vata w.s.r. to Osteoarthritis

    Get PDF
    The principal aim of Ayurveda is to maintain and promote positive physical and mental health as well as ensure the prevention of diseases. Sandhigata Vata is the commonest form of articular disorder. It is a type of Vatavyadhi which mainly occurs in Vriddhavastha due to Dhatukshaya, which limits everyday activities such as walking, dressing, bathing etc. It occurs due to change in lifestyle like unsuitable sitting, sleeping, standing and look upwards or obliquely in various professions. Osteoarthritis (OA) is degenerative joint disorder, represents failure of the diarthrodial (movable, synovial lined) joint. OA of the joints comes under the inflammatory group which is almost identical to Sandhigata Vata described in Ayurveda with respect to etiology, pathology, and clinical features. Marma therapy is one which gives instant relief from pain by balancing local Vata and Kapha Dosha without any untoward effects. In the present research work, total 15 diagnosed case of Sandhigata Vata were randomly selected from OPD and IPD of department of Shalya Tantra, Rishikul Campus, Uttarakhand Ayurveda University, Haridwar (U.K.) India, all these patients were treated with the application of Marma therapy. Result was observed on the basis of subjective and objective parameters and analysed statistically. No complications were observed in this clinical study

    Design of Audio Player and Recorder on STM 32F4 Discovery Board

    Get PDF
    With the advancement in semiconductor technology, scope for development of embedded systems has increased manifolds. New processors with improved computing capabilities and low power consumption have further accelerated the developments in embedded domain. Consumers are looking for affordable multimedia devices with high performance and durability making embedded developers to think creatively and use all resources at hand to meet the desired user specifications. This is one such attempt by designing an Audio Player and Recorder to play the wave audio files from a USB flash drive and recording the audio in USB flash drive in the same format. In this application MEMS microphone is used for recording the audio dat

    Android apps of Malayalam newspapers: review of user experience

    Get PDF
    The habit of newspaper reading is an integral part of Kerala society. The advent of satellite televisions and social media could not change the daily routine of newspaper reading. Leading Malayalam dailies have introduced mobile phone apps to extend their presence among mobile phone users. The study reviews the features and performance of four leading Malayalam newspaper apps in Android platform

    Energy efficient security and privacy management in sensor clouds

    Get PDF
    Sensor Cloud is a new model of computing for Wireless Sensor Networks, which facilitates resource sharing and enables large scale sensor networks. A multi-user distributed system, however, where resources are shared, has inherent challenges in security and privacy. The data being generated by the wireless sensors in a sensor cloud need to be protected against adversaries, which may be outsiders as well as insiders. Similarly the code which is disseminated to the sensors by the sensor cloud needs to be protected against inside and outside adversaries. Moreover, since the wireless sensors cannot support complex, energy intensive measures, the security and privacy of the data and the code have to be attained by way of lightweight algorithms. In this work, we first present two data aggregation algorithms, one based on an Elliptic Curve Cryptosystem (ECC) and the other based on symmetric key system, which provide confidentiality and integrity of data against an outside adversary and privacy against an in network adversary. A fine grained access control scheme which works on the securely aggregated data is presented next. This scheme uses Attribute Based Encryption (ABE) to achieve this objective. Finally, to securely and efficiently disseminate code in the sensor cloud, we present a code dissemination algorithm which first reduces the amount of code to be transmitted from the base station. It then uses Symmetric Proxy Re-encryption along with Bloom filters and HMACs to protect the code against eavesdropping and false code injection attacks. --Abstract, page iv

    Debian: A Linux based operating system for all purposes

    Get PDF
    Debian is a Linux based operating system suitable for all types of computing purposes.Debian: A Linux based operating system for all purposes. it has not received much attention from the user community due to the lack of promotion. Ubuntu Linux derived from Debian project received much acceptance from all range of users. But Debian Linux opens up more space for customization and innovation for experts and users. It follows a strict release schedule and ensures a stable distribution of Linux. The paper is a general introduction to the package
    corecore