Submit Search
Upload
пл 168 юстус дз 5
•
Download as PPTX, PDF
•
0 likes
•
354 views
A
AnnJus
Follow
homework fot IT
Read less
Read more
Science
Report
Share
Report
Share
1 of 7
Download now
Recommended
UTILIZATION OF THRUST REVERSER MECHANISM IN TURBOFAN ENGINES – A REVIEW
Ijtra130519
Ijtra130519
International Journal of Technical Research & Application
This paper presents new approach for shrinkage compensation in Selective Laser Sintering (SLS) process to improve the accuracy of parts produced. By optimizing tools like Pattern search tool and Genetic algorithm available in MATLAB 2011. Shrinkage is compensated along X, Y, Z direction of the part produced. The scaling factor used in this compensation is calculated from shrinkage model (It is the empirical relation between percentage shrinkage and the machine manufacturer, Shrinkage model). Software is available in MATLAB 2011, automate the compensation process. Two case studies were presented to quantify the effectiveness of the developed compensation approach over the existing compensation method. From the comparison experiments, the ability of the proposed compensation method in improving the accuracy of laser sintered parts is established.
OPTIMIZATION OF SCALE FACTORS IN SHRINKAGE COMPENSATIONS IN SLS USING PATTERN...
OPTIMIZATION OF SCALE FACTORS IN SHRINKAGE COMPENSATIONS IN SLS USING PATTERN...
International Journal of Technical Research & Application
Jaringan Nirkabel
Jaringan Nirkabel
Ari Yandi
The current research was conducted to quantify the heavy metals accumulation in vegetables imported from India and compared with same vegetables collected from vegetable market in Pakistan. Green chili, capsicum, tomato and ginger were selected to analyze their heavy metal contents by atomic absorption spectrophotometer. Samples were prepared by dry ash method and wet digestion method to find out the efficient method for heavy metals analysis. Maximum concentration of heavy metals detected by dry ash method in Indian vegetables were of Cu (0.34ppm) in capsicum, Cd (0.0ppm) in capsicum, Cr (0.22ppm) in Ginger, Pb (0.22ppm) in ginger and Ni (0.14ppm) in Ginger while in Pakistani vegetables, it were of Cu (0.62ppm) in Tomato, Cd (0.04ppm) in Capsicum, Cr (0.17ppm) in Tomato, Pb (0.36ppm) in Ginger. Heavy metal contents determined by wet digestion method were of Cu (0.57ppm) in Ginger, Cd (0.01ppm) in capsicum, Cr (0.17ppm) in Ginger, Pb (0.27ppm) in capsicum while in Pakistani vegetables these were of Cu (0.19ppm) in Ginger, Cd (0.04ppm) in green chili, Cr (0.09ppm) in Tomato, Pb (0.25ppm) in Ginger. It was found that the concentrations of these heavy metals in vegetables of both the countries were within WHO/FAO permissible limits so at present these are not hazardous but long term use of these vegetables can magnify heavy metals contents in human body. For statistical analysis two factor ANOVA was run, which indicated that almost all the vegetables had accumulated heavy metals but there was a difference in the uptake of Indian and Pakistani vegetables.
ASSESSMENT OF HEAVY METALS CONCENTRATION IN INDIAN AND PAKISTANI VEGETABLES
ASSESSMENT OF HEAVY METALS CONCENTRATION IN INDIAN AND PAKISTANI VEGETABLES
International Journal of Technical Research & Application
обдарована дитина
2015 опис досвіду обдаровані блог
2015 опис досвіду обдаровані блог
OlgaVladychko
SKILLS AND BEHAVIOR IN EFFECTIVE CLASSROOM TEACHING
SKILLS AND BEHAVIOR IN EFFECTIVE CLASSROOM TEACHING
SKILLS AND BEHAVIOR IN EFFECTIVE CLASSROOM TEACHING
International Journal of Technical Research & Application
ANALYSIS OF EXPERIMENTAL VALUES OF BEND LOSS BY OTDR
Ijtra130512
Ijtra130512
International Journal of Technical Research & Application
smile :)
Firewallpresentation 100826052003-phpapp02(1)
Firewallpresentation 100826052003-phpapp02(1)
Prabhdeep Kaur
Recommended
UTILIZATION OF THRUST REVERSER MECHANISM IN TURBOFAN ENGINES – A REVIEW
Ijtra130519
Ijtra130519
International Journal of Technical Research & Application
This paper presents new approach for shrinkage compensation in Selective Laser Sintering (SLS) process to improve the accuracy of parts produced. By optimizing tools like Pattern search tool and Genetic algorithm available in MATLAB 2011. Shrinkage is compensated along X, Y, Z direction of the part produced. The scaling factor used in this compensation is calculated from shrinkage model (It is the empirical relation between percentage shrinkage and the machine manufacturer, Shrinkage model). Software is available in MATLAB 2011, automate the compensation process. Two case studies were presented to quantify the effectiveness of the developed compensation approach over the existing compensation method. From the comparison experiments, the ability of the proposed compensation method in improving the accuracy of laser sintered parts is established.
OPTIMIZATION OF SCALE FACTORS IN SHRINKAGE COMPENSATIONS IN SLS USING PATTERN...
OPTIMIZATION OF SCALE FACTORS IN SHRINKAGE COMPENSATIONS IN SLS USING PATTERN...
International Journal of Technical Research & Application
Jaringan Nirkabel
Jaringan Nirkabel
Ari Yandi
The current research was conducted to quantify the heavy metals accumulation in vegetables imported from India and compared with same vegetables collected from vegetable market in Pakistan. Green chili, capsicum, tomato and ginger were selected to analyze their heavy metal contents by atomic absorption spectrophotometer. Samples were prepared by dry ash method and wet digestion method to find out the efficient method for heavy metals analysis. Maximum concentration of heavy metals detected by dry ash method in Indian vegetables were of Cu (0.34ppm) in capsicum, Cd (0.0ppm) in capsicum, Cr (0.22ppm) in Ginger, Pb (0.22ppm) in ginger and Ni (0.14ppm) in Ginger while in Pakistani vegetables, it were of Cu (0.62ppm) in Tomato, Cd (0.04ppm) in Capsicum, Cr (0.17ppm) in Tomato, Pb (0.36ppm) in Ginger. Heavy metal contents determined by wet digestion method were of Cu (0.57ppm) in Ginger, Cd (0.01ppm) in capsicum, Cr (0.17ppm) in Ginger, Pb (0.27ppm) in capsicum while in Pakistani vegetables these were of Cu (0.19ppm) in Ginger, Cd (0.04ppm) in green chili, Cr (0.09ppm) in Tomato, Pb (0.25ppm) in Ginger. It was found that the concentrations of these heavy metals in vegetables of both the countries were within WHO/FAO permissible limits so at present these are not hazardous but long term use of these vegetables can magnify heavy metals contents in human body. For statistical analysis two factor ANOVA was run, which indicated that almost all the vegetables had accumulated heavy metals but there was a difference in the uptake of Indian and Pakistani vegetables.
ASSESSMENT OF HEAVY METALS CONCENTRATION IN INDIAN AND PAKISTANI VEGETABLES
ASSESSMENT OF HEAVY METALS CONCENTRATION IN INDIAN AND PAKISTANI VEGETABLES
International Journal of Technical Research & Application
обдарована дитина
2015 опис досвіду обдаровані блог
2015 опис досвіду обдаровані блог
OlgaVladychko
SKILLS AND BEHAVIOR IN EFFECTIVE CLASSROOM TEACHING
SKILLS AND BEHAVIOR IN EFFECTIVE CLASSROOM TEACHING
SKILLS AND BEHAVIOR IN EFFECTIVE CLASSROOM TEACHING
International Journal of Technical Research & Application
ANALYSIS OF EXPERIMENTAL VALUES OF BEND LOSS BY OTDR
Ijtra130512
Ijtra130512
International Journal of Technical Research & Application
smile :)
Firewallpresentation 100826052003-phpapp02(1)
Firewallpresentation 100826052003-phpapp02(1)
Prabhdeep Kaur
UNIVERSIDAD METROPOLITANA
UNIVERSIDAD METROPOLITANA
Dario Fernando Verax Bravoz
Carlos Ezequiel Flores González Tarea4BasesDatosII2016a
Creación indices y constraints en bases de datos de sql server
Creación indices y constraints en bases de datos de sql server
Carlos Flores Glez
2012HAITI research report strengthening local capactities
2012HAITI research report strengthening local capactities
Nathalie Reijer van Schagen
Content Based Image Retrieval (CBIR) is one of the most active in the current research field of multimedia retrieval. It retrieves the images from the large databases based on images feature like color, texture and shape. In this paper, Image retrieval based on multi feature fusion is achieved by color and texture features as well as the similarity measures are investigated. The work of color feature extraction is obtained by using Quadratic Distance and texture features by using Pyramid Structure Wavelet Transforms and Gray level co-occurrence matrix. We are comparing all these methods for best image retrieval
IMAGE RETRIEVAL USING QUADRATIC DISTANCE BASED ON COLOR FEATURE AND PYRAMID S...
IMAGE RETRIEVAL USING QUADRATIC DISTANCE BASED ON COLOR FEATURE AND PYRAMID S...
International Journal of Technical Research & Application
Bismillah at First
proposal kualitatif
proposal kualitatif
Elly Ana
The software industry has had significant progress in recent years. The entire life of software includes two phases: Production and Maintenance. Software maintenance cost is increasingly growing and estimates showed that about 90%, if software life cost is related to its maintenance phase. Extraction and considering the factors affecting software maintenance cost help to estimate the cost and reduce it by controlling the factors. Cost estimation of maintenance phase is necessary to predict the reliability, improve the productivity, project planning, controlling and adaptability of the software. Though there are various models to estimate the maintenance cost of traditional software like COCOMO, SLIM, Function Point etc., but till now there is no such model to estimate the maintenance cost using fourth generation language environment. Software maintenance will continue to exist in the fourth generation environment, as systems will still be required to evolve. In this kind of situation there is needed to develop a model to estimate the maintenance cost using fourth generation environment. We propose a systematic approach and development for software maintenance cost estimation model using fourth generation language environment on the basis of COCOMO II. This model is based on three parameters: SMCE with Fourth Generation Language Environment, ACT (Annual Change Traffic), Technical and NonTechnical factors which affect the maintenance cost. The favorable results closely matching and it can be achieved by using model implementation.
DEVELOPMENT OF A SOFTWARE MAINTENANCE COST ESTIMATION MODEL: 4 TH GL PERSPECTIVE
DEVELOPMENT OF A SOFTWARE MAINTENANCE COST ESTIMATION MODEL: 4 TH GL PERSPECTIVE
International Journal of Technical Research & Application
Keamanan Jaringan Komputer
Keamanan Jaringan Komputer
Ari Yandi
Nowadays digital cameras are equipped with a single sensor (CCD/CMOS), to reduce the size and cost of the camera. The color filter array (CFA) is used to cover the sensor and it consist of three primary colors such as red, green and blue and it samples only one color component at each pixel location. The process of estimating the other two missing color components at each pixel location is known as demosaicing. The proposed algorithm uses the directional color difference and multiscale gradient method for green plane interpolation, this type of interpolation method is used to reduce the artifacts and improve the image quality. The red and blue plane are interpolated using the estimated green plane, the bayer pattern is used for the interpolation technique. The performance of the image is measured using the CPSNR value
COLOR FILTER ARRAY DEMOSAICING USING DIRECTIONAL COLOR DIFFERENCE AND GRADIEN...
COLOR FILTER ARRAY DEMOSAICING USING DIRECTIONAL COLOR DIFFERENCE AND GRADIEN...
International Journal of Technical Research & Application
Jaringan Nirkabel
Jaringan Nirkabel
Ari Yandi
Fingerprints are imprints formed by friction ridges of the skin and thumbs. They have long been used for identification because of their immutability and individuality. Immutability refers to the permanent and unchanging character of the pattern on each finger. Individuality refers to the uniqueness of ridge details across individuals; the probability that two fingerprints are alike is about 1 in 1.9x1015. In despite of this improvement which is adopted by the Federal Bureau of Investigation (FBI), the fact still is “The larger the fingerprint files became, the harder it was to identify somebody from their fingerprints alone. Moreover, the fingerprint requires one of the largest data templates in the biometric field”. The finger data template can range anywhere from several hundred bytes to over 1,000 bytes depending upon the level of security that is required and the method that is used to scan one's fingerprint. For these reasons this work is motivated to present another way to tackle the problem that is relies on the properties of Vector Quantization coding algorithm.
A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUA...
A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUA...
International Journal of Technical Research & Application
Business Project Power Point Draft
Providing incentives
Providing incentives
Joseph Grabel
- Security is a concept similar to being cautious or alert against any danger. Network security is the condition of being protected against any danger or loss. Thus safety plays a important role in bank transactions where disclosure of any data results in big loss. We can define networking as the combination of two or more computers for the purpose of resource sharing. Resources here include files, database, emails etc. It is the protection of these resources from unauthorized users that brought the development of network security. It is a measure incorporated to protect data during their transmission and also to ensure the transmitted is protected and authentic. Security of online bank transactions here has been improved by increasing the number of bits while establishing the SSL connection as well as in RSA asymmetric key encryption along with SHA1 used for digital signature to authenticate the user
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
International Journal of Technical Research & Application
сокальщина
сокальщина гра
сокальщина гра
OlgaVladychko
творчі учні
2015 опис досвіду обдаровані блог
2015 опис досвіду обдаровані блог
OlgaVladychko
- This paper shows an approach for designing a system which implement a microcontroller-based control module that receives its instructions and commands from a cellular phone over the GSM (Global system for mobile communication) network. The microcontroller then will carry out the issued commands and then communicate the status of a given appliance or device back to the cellular phone.This device allows a user to remotely control and monitor multiple home/office appliances using a cellular phone. This system will be a powerful and flexible tool that will offer this service at any time, and from anywhere that has network coverage. Due to the fact that the combination and sequential logic circuits have more components soldered together, inflexible, more difficult to the user, and not programmable, the 8951 micro controller was chosen because it can be written to and read from and also has an internal memory which makes it to be versatile in application and user friendly. Apart from the micro controller, other electrical / electronic components used include: resistors, filters, voltage regulator, transformer, rectifiers, capacitors, DTMF (Dual Tone Multi Frequency) Integrated circuit etc.
GSM CONTROL OF ELECTRICAL APPLIANCES
GSM CONTROL OF ELECTRICAL APPLIANCES
International Journal of Technical Research & Application
Social media mediasharing-monicamcginnis
Social media mediasharing-monicamcginnis
monicamcg0789
INSTRUCCIONES: Deberás elaborar un archivo en el que tienes que codificar lo necesario en el lenguje PHP para cumplir con los siguientes pasos: Deberás declarar una variable de tipo numérica llamada: $operador1 Deberás declarar una variable de tipo numerica llamada: $operador2 El valor de la variable: $operador1 será = 58 El valor de la variable: $operador2 será = 42 Una vez que tengas las 2 variables con valores deberás realizar las 4 operaciones básicas con esos dos números, es decir, realizarás: La suma de esos dos números La resta de esos dos números La multiplicación de esos dos números La división de esos dos números DESPUES Deberás mostrar en pantalla mendiante 4 <?php> y con encabezados de html del tipo <h4> consecutivos los resultados de esas 4 operaciones básicas con los textos de: La suma de esos 2 números es: _____ La resta de esos 2 números es: ______ La multiplicación de esos 2 números es: _______ La división de esos 2 números es: ____________ Ejemplo: <?php> DESPUES Declaras una variable llamada $MiNombre A esa variable le asignas tu nombre completo sin apellidos (recuerda que tu nombre es una cadena de texto) Con la variable de tu nombre deberás usar las funciones para el manejo de textos como lo son: strlen() str_word_count() strrev() echo strpos() str_replace() La teoría de estas funciones la encuentras en el video de: http://www.w3schools.com/php/php_string.asp La primer función te dice la longitud del texto de tu nombre por lo que deberás mostrar en pantalla un texto que diga: Mi nombre tiene "x" caracteres. Ejemplo: <?php> La segunda función es para contar el número de palabras de tu nombre por lo que deberás mostrar en pantalla un texto que diga cuántas palabras conforman tu nombre. Ejemplo: Mi nombre tiene <?php> palabras La tercer función es para escribir tu nombre de manera inversa, por lo tanto deberás imprimir en pantalla un texto que diga algo así como: Mi nombre en sentido inverso se escribe así: <?php> La cuarta función es para buscar un texto en específico dentro de otro texto. En este caso buscarás la letra "a" en la variable de tu nombre y escribirás en pantalla un texto que diga: La letra "a" en mi nombre se encuentra en la posición: <?php> La quinta función es para reemplazar un texto en específico dentro de otro texto. En este caso reemplezarás la letra "a" en la variable de tu nombre y escribirás en pantalla un texto que diga: La letra "a" en mi nombre la reemplaze por la letra "Z" y entonces mi nombre queda así : <?php> FINALIZA tu ejercicio de tarea con un TEXTO DINAMICO que muestre la fecha y la hora actual mediante PHP.
Práctica web de la sesión 3
Práctica web de la sesión 3
Carlos Flores Glez
UNIVERSIDAD METROPOLITANA
UNIVERSIDAD METROPOLITANA
Dario Fernando Verax Bravoz
Your file uploaded successfully! View it here.
Symbols of rev book
Symbols of rev book
Ishak Tamang
More Related Content
Viewers also liked
UNIVERSIDAD METROPOLITANA
UNIVERSIDAD METROPOLITANA
Dario Fernando Verax Bravoz
Carlos Ezequiel Flores González Tarea4BasesDatosII2016a
Creación indices y constraints en bases de datos de sql server
Creación indices y constraints en bases de datos de sql server
Carlos Flores Glez
2012HAITI research report strengthening local capactities
2012HAITI research report strengthening local capactities
Nathalie Reijer van Schagen
Content Based Image Retrieval (CBIR) is one of the most active in the current research field of multimedia retrieval. It retrieves the images from the large databases based on images feature like color, texture and shape. In this paper, Image retrieval based on multi feature fusion is achieved by color and texture features as well as the similarity measures are investigated. The work of color feature extraction is obtained by using Quadratic Distance and texture features by using Pyramid Structure Wavelet Transforms and Gray level co-occurrence matrix. We are comparing all these methods for best image retrieval
IMAGE RETRIEVAL USING QUADRATIC DISTANCE BASED ON COLOR FEATURE AND PYRAMID S...
IMAGE RETRIEVAL USING QUADRATIC DISTANCE BASED ON COLOR FEATURE AND PYRAMID S...
International Journal of Technical Research & Application
Bismillah at First
proposal kualitatif
proposal kualitatif
Elly Ana
The software industry has had significant progress in recent years. The entire life of software includes two phases: Production and Maintenance. Software maintenance cost is increasingly growing and estimates showed that about 90%, if software life cost is related to its maintenance phase. Extraction and considering the factors affecting software maintenance cost help to estimate the cost and reduce it by controlling the factors. Cost estimation of maintenance phase is necessary to predict the reliability, improve the productivity, project planning, controlling and adaptability of the software. Though there are various models to estimate the maintenance cost of traditional software like COCOMO, SLIM, Function Point etc., but till now there is no such model to estimate the maintenance cost using fourth generation language environment. Software maintenance will continue to exist in the fourth generation environment, as systems will still be required to evolve. In this kind of situation there is needed to develop a model to estimate the maintenance cost using fourth generation environment. We propose a systematic approach and development for software maintenance cost estimation model using fourth generation language environment on the basis of COCOMO II. This model is based on three parameters: SMCE with Fourth Generation Language Environment, ACT (Annual Change Traffic), Technical and NonTechnical factors which affect the maintenance cost. The favorable results closely matching and it can be achieved by using model implementation.
DEVELOPMENT OF A SOFTWARE MAINTENANCE COST ESTIMATION MODEL: 4 TH GL PERSPECTIVE
DEVELOPMENT OF A SOFTWARE MAINTENANCE COST ESTIMATION MODEL: 4 TH GL PERSPECTIVE
International Journal of Technical Research & Application
Keamanan Jaringan Komputer
Keamanan Jaringan Komputer
Ari Yandi
Nowadays digital cameras are equipped with a single sensor (CCD/CMOS), to reduce the size and cost of the camera. The color filter array (CFA) is used to cover the sensor and it consist of three primary colors such as red, green and blue and it samples only one color component at each pixel location. The process of estimating the other two missing color components at each pixel location is known as demosaicing. The proposed algorithm uses the directional color difference and multiscale gradient method for green plane interpolation, this type of interpolation method is used to reduce the artifacts and improve the image quality. The red and blue plane are interpolated using the estimated green plane, the bayer pattern is used for the interpolation technique. The performance of the image is measured using the CPSNR value
COLOR FILTER ARRAY DEMOSAICING USING DIRECTIONAL COLOR DIFFERENCE AND GRADIEN...
COLOR FILTER ARRAY DEMOSAICING USING DIRECTIONAL COLOR DIFFERENCE AND GRADIEN...
International Journal of Technical Research & Application
Jaringan Nirkabel
Jaringan Nirkabel
Ari Yandi
Fingerprints are imprints formed by friction ridges of the skin and thumbs. They have long been used for identification because of their immutability and individuality. Immutability refers to the permanent and unchanging character of the pattern on each finger. Individuality refers to the uniqueness of ridge details across individuals; the probability that two fingerprints are alike is about 1 in 1.9x1015. In despite of this improvement which is adopted by the Federal Bureau of Investigation (FBI), the fact still is “The larger the fingerprint files became, the harder it was to identify somebody from their fingerprints alone. Moreover, the fingerprint requires one of the largest data templates in the biometric field”. The finger data template can range anywhere from several hundred bytes to over 1,000 bytes depending upon the level of security that is required and the method that is used to scan one's fingerprint. For these reasons this work is motivated to present another way to tackle the problem that is relies on the properties of Vector Quantization coding algorithm.
A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUA...
A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUA...
International Journal of Technical Research & Application
Business Project Power Point Draft
Providing incentives
Providing incentives
Joseph Grabel
- Security is a concept similar to being cautious or alert against any danger. Network security is the condition of being protected against any danger or loss. Thus safety plays a important role in bank transactions where disclosure of any data results in big loss. We can define networking as the combination of two or more computers for the purpose of resource sharing. Resources here include files, database, emails etc. It is the protection of these resources from unauthorized users that brought the development of network security. It is a measure incorporated to protect data during their transmission and also to ensure the transmitted is protected and authentic. Security of online bank transactions here has been improved by increasing the number of bits while establishing the SSL connection as well as in RSA asymmetric key encryption along with SHA1 used for digital signature to authenticate the user
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
International Journal of Technical Research & Application
сокальщина
сокальщина гра
сокальщина гра
OlgaVladychko
творчі учні
2015 опис досвіду обдаровані блог
2015 опис досвіду обдаровані блог
OlgaVladychko
- This paper shows an approach for designing a system which implement a microcontroller-based control module that receives its instructions and commands from a cellular phone over the GSM (Global system for mobile communication) network. The microcontroller then will carry out the issued commands and then communicate the status of a given appliance or device back to the cellular phone.This device allows a user to remotely control and monitor multiple home/office appliances using a cellular phone. This system will be a powerful and flexible tool that will offer this service at any time, and from anywhere that has network coverage. Due to the fact that the combination and sequential logic circuits have more components soldered together, inflexible, more difficult to the user, and not programmable, the 8951 micro controller was chosen because it can be written to and read from and also has an internal memory which makes it to be versatile in application and user friendly. Apart from the micro controller, other electrical / electronic components used include: resistors, filters, voltage regulator, transformer, rectifiers, capacitors, DTMF (Dual Tone Multi Frequency) Integrated circuit etc.
GSM CONTROL OF ELECTRICAL APPLIANCES
GSM CONTROL OF ELECTRICAL APPLIANCES
International Journal of Technical Research & Application
Social media mediasharing-monicamcginnis
Social media mediasharing-monicamcginnis
monicamcg0789
INSTRUCCIONES: Deberás elaborar un archivo en el que tienes que codificar lo necesario en el lenguje PHP para cumplir con los siguientes pasos: Deberás declarar una variable de tipo numérica llamada: $operador1 Deberás declarar una variable de tipo numerica llamada: $operador2 El valor de la variable: $operador1 será = 58 El valor de la variable: $operador2 será = 42 Una vez que tengas las 2 variables con valores deberás realizar las 4 operaciones básicas con esos dos números, es decir, realizarás: La suma de esos dos números La resta de esos dos números La multiplicación de esos dos números La división de esos dos números DESPUES Deberás mostrar en pantalla mendiante 4 <?php> y con encabezados de html del tipo <h4> consecutivos los resultados de esas 4 operaciones básicas con los textos de: La suma de esos 2 números es: _____ La resta de esos 2 números es: ______ La multiplicación de esos 2 números es: _______ La división de esos 2 números es: ____________ Ejemplo: <?php> DESPUES Declaras una variable llamada $MiNombre A esa variable le asignas tu nombre completo sin apellidos (recuerda que tu nombre es una cadena de texto) Con la variable de tu nombre deberás usar las funciones para el manejo de textos como lo son: strlen() str_word_count() strrev() echo strpos() str_replace() La teoría de estas funciones la encuentras en el video de: http://www.w3schools.com/php/php_string.asp La primer función te dice la longitud del texto de tu nombre por lo que deberás mostrar en pantalla un texto que diga: Mi nombre tiene "x" caracteres. Ejemplo: <?php> La segunda función es para contar el número de palabras de tu nombre por lo que deberás mostrar en pantalla un texto que diga cuántas palabras conforman tu nombre. Ejemplo: Mi nombre tiene <?php> palabras La tercer función es para escribir tu nombre de manera inversa, por lo tanto deberás imprimir en pantalla un texto que diga algo así como: Mi nombre en sentido inverso se escribe así: <?php> La cuarta función es para buscar un texto en específico dentro de otro texto. En este caso buscarás la letra "a" en la variable de tu nombre y escribirás en pantalla un texto que diga: La letra "a" en mi nombre se encuentra en la posición: <?php> La quinta función es para reemplazar un texto en específico dentro de otro texto. En este caso reemplezarás la letra "a" en la variable de tu nombre y escribirás en pantalla un texto que diga: La letra "a" en mi nombre la reemplaze por la letra "Z" y entonces mi nombre queda así : <?php> FINALIZA tu ejercicio de tarea con un TEXTO DINAMICO que muestre la fecha y la hora actual mediante PHP.
Práctica web de la sesión 3
Práctica web de la sesión 3
Carlos Flores Glez
UNIVERSIDAD METROPOLITANA
UNIVERSIDAD METROPOLITANA
Dario Fernando Verax Bravoz
Your file uploaded successfully! View it here.
Symbols of rev book
Symbols of rev book
Ishak Tamang
Viewers also liked
(19)
UNIVERSIDAD METROPOLITANA
UNIVERSIDAD METROPOLITANA
Creación indices y constraints en bases de datos de sql server
Creación indices y constraints en bases de datos de sql server
2012HAITI research report strengthening local capactities
2012HAITI research report strengthening local capactities
IMAGE RETRIEVAL USING QUADRATIC DISTANCE BASED ON COLOR FEATURE AND PYRAMID S...
IMAGE RETRIEVAL USING QUADRATIC DISTANCE BASED ON COLOR FEATURE AND PYRAMID S...
proposal kualitatif
proposal kualitatif
DEVELOPMENT OF A SOFTWARE MAINTENANCE COST ESTIMATION MODEL: 4 TH GL PERSPECTIVE
DEVELOPMENT OF A SOFTWARE MAINTENANCE COST ESTIMATION MODEL: 4 TH GL PERSPECTIVE
Keamanan Jaringan Komputer
Keamanan Jaringan Komputer
COLOR FILTER ARRAY DEMOSAICING USING DIRECTIONAL COLOR DIFFERENCE AND GRADIEN...
COLOR FILTER ARRAY DEMOSAICING USING DIRECTIONAL COLOR DIFFERENCE AND GRADIEN...
Jaringan Nirkabel
Jaringan Nirkabel
A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUA...
A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUA...
Providing incentives
Providing incentives
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
сокальщина гра
сокальщина гра
2015 опис досвіду обдаровані блог
2015 опис досвіду обдаровані блог
GSM CONTROL OF ELECTRICAL APPLIANCES
GSM CONTROL OF ELECTRICAL APPLIANCES
Social media mediasharing-monicamcginnis
Social media mediasharing-monicamcginnis
Práctica web de la sesión 3
Práctica web de la sesión 3
UNIVERSIDAD METROPOLITANA
UNIVERSIDAD METROPOLITANA
Symbols of rev book
Symbols of rev book
Download now