The document describes Fortran 90 (F90) and provides tables comparing its features to C++, Fortran 77, and MATLAB. It shows that F90 has improvements over Fortran 77 like dynamic memory management, user defined data structures, matrix operations, and object-oriented capabilities. The tables are intended to serve as a quick reference guide for programming in F90 and understanding F90 programs. It lists 48 tables that will provide details on F90 syntax, data types, operators, functions, control structures, and other features.
This document provides an advanced guide for developing macros in IBM Rational Host Access Transformation Services (HATS). It covers macro structure, data types, operators, expressions, how the macro runtime processes macros, screen description and recognition, and available macro actions. The guide contains definitions of terms and includes conceptual diagrams and code samples to illustrate macro concepts and functionality. It is intended to help macro developers better understand and utilize the full capabilities of the HATS macro language.
This document provides an advanced guide for developing macros in IBM Rational Host Access Transformation Services (HATS). It covers macro structure, data types, operators, expressions, how the macro runtime processes macros, screen description and recognition, and available macro actions. The guide contains definitions of terms and includes conceptual diagrams and code samples to illustrate macro design and processing. It is intended to help macro developers better understand and utilize the full capabilities of the HATS macro language.
This document provides a guide to programming in TinyOS. It covers topics such as linking and namespaces in C, C++ and Java; interfaces and modules; tasks and concurrency; configurations and wiring; parameterized wiring; generic components; and design patterns. The document contains numerous code examples to illustrate concepts.
The document provides an overview and specification of the Java Native Interface (JNI), which allows Java code running in a Java Virtual Machine to call and be called by native platform libraries and applications. It describes the interface functions and pointers, how to load and link native methods, reference Java objects from native code, handle exceptions, and access fields and call methods on Java objects from native code. The document also defines the JNI types and data structures and provides details on the specific JNI functions.
For members of Land Surveyors United Sokkia Social Support Group at http://landsurveyorsunited.com/group/sokkiasupportgroup All images and trademarks property of Sokkia and presented for support purposes only
Notes of 8051 Micro Controller for BCA, MCA, MSC (CS), MSC (IT) & AMIE IEI- b...ssuserd6b1fd
If you are beginners in 8051 micro controller and wants to be a professional in 8051 programming then read this notes. It surely helped you in understanding of 8051 from bottom to top.
This document provides information about login scripts in Novell, including:
- Where login scripts should be located and common login script commands
- Examples of sample login scripts for containers, profiles, users, and default scripts
- Descriptions of specific login script commands and variables like MAP, IF/THEN, and INCLUDE
Notes of 8085 micro processor Programming for BCA, MCA, MSC (CS), MSC (IT) &...ssuserd6b1fd
If you are beginners in 8085 micro processor and wants to be a professional in 8085 micro processor programming then read this notes. It surely helped you in understanding of 8085 micro processor from bottom to top.
This document provides an advanced guide for developing macros in IBM Rational Host Access Transformation Services (HATS). It covers macro structure, data types, operators, expressions, how the macro runtime processes macros, screen description and recognition, and available macro actions. The guide contains definitions of terms and includes conceptual diagrams and code samples to illustrate macro concepts and functionality. It is intended to help macro developers better understand and utilize the full capabilities of the HATS macro language.
This document provides an advanced guide for developing macros in IBM Rational Host Access Transformation Services (HATS). It covers macro structure, data types, operators, expressions, how the macro runtime processes macros, screen description and recognition, and available macro actions. The guide contains definitions of terms and includes conceptual diagrams and code samples to illustrate macro design and processing. It is intended to help macro developers better understand and utilize the full capabilities of the HATS macro language.
This document provides a guide to programming in TinyOS. It covers topics such as linking and namespaces in C, C++ and Java; interfaces and modules; tasks and concurrency; configurations and wiring; parameterized wiring; generic components; and design patterns. The document contains numerous code examples to illustrate concepts.
The document provides an overview and specification of the Java Native Interface (JNI), which allows Java code running in a Java Virtual Machine to call and be called by native platform libraries and applications. It describes the interface functions and pointers, how to load and link native methods, reference Java objects from native code, handle exceptions, and access fields and call methods on Java objects from native code. The document also defines the JNI types and data structures and provides details on the specific JNI functions.
For members of Land Surveyors United Sokkia Social Support Group at http://landsurveyorsunited.com/group/sokkiasupportgroup All images and trademarks property of Sokkia and presented for support purposes only
Notes of 8051 Micro Controller for BCA, MCA, MSC (CS), MSC (IT) & AMIE IEI- b...ssuserd6b1fd
If you are beginners in 8051 micro controller and wants to be a professional in 8051 programming then read this notes. It surely helped you in understanding of 8051 from bottom to top.
This document provides information about login scripts in Novell, including:
- Where login scripts should be located and common login script commands
- Examples of sample login scripts for containers, profiles, users, and default scripts
- Descriptions of specific login script commands and variables like MAP, IF/THEN, and INCLUDE
Notes of 8085 micro processor Programming for BCA, MCA, MSC (CS), MSC (IT) &...ssuserd6b1fd
If you are beginners in 8085 micro processor and wants to be a professional in 8085 micro processor programming then read this notes. It surely helped you in understanding of 8085 micro processor from bottom to top.
This document discusses how Fortran 90 supports object-oriented programming features like encapsulation, inheritance, and polymorphism. It provides an example program that defines Rectangle and Circle classes to calculate the area of different shapes. The program uses a generic compute_area function that can accept either shape type due to polymorphism. This allows the common area calculation operation to work across different classes in an object-oriented way using Fortran 90 features.
This document contains an errata file and correspondence regarding errors found in the book "OOP via F90" by Prof. Akin. A reviewer notes a coding error on line 156 of Test_DLL_Integers.f90 in chapter 7. Another reviewer emails Prof. Akin with updates to the source code index and additional errors found. Prof. Akin replies thanking the reviewer for their comments and corrections.
The Dhaka University Science Society is a science-based club at the University of Dhaka that was started in 2014. The society aims to popularize science, encourage the practice and use of science, and acquaint students with recent scientific activities and research to help groom them for science-related careers. The society organizes regular activities like study circles, science festivals, seminars on research and careers, workshops in fields like astronomy, and celebrations of scientific holidays. It has a panel of moderators from various science departments and the Vice Chancellor of the University of Dhaka as its chief patron. The society also plans future activities like a science conference, journal reviews, science publications and videos, and outreach programs.
This document outlines the define phase of an 8-step continuous process improvement (CPI) roadmap. The define phase includes activities like identifying problems, validating the problem statement, establishing strategic alignment, gathering customer input, and creating a goal statement. It also lists required deliverables for the define tollgate, such as a problem statement, goal statement, project scope, timeline, and high-level process map. The document provides an overview of the key elements and documentation needed to properly define a CPI project.
Credits-
Dr. C.-K. Shene
Professor
Department of Computer Science
Michigan Technological University
This presentation was downloaded from this link- http://www.cs.mtu.edu/~shene/COURSES/cs201/NOTES/F90-Basics.pdf
This book provides style and usage guidelines for programmers using Fortran. It is intended for anyone using Fortran, from beginners to experts. The book describes best practices for formatting, naming conventions, documentation, programming principles, input/output handling, and other aspects of the Fortran language. It focuses primarily on Fortran 2003 but also describes features of Fortran 90/95 and 2008.
Fortran is a programming language developed by IBM in the 1950s for scientific and engineering use. It was the first optimizing compiler. While still used for high performance computing, its usage is declining. Fortran is case insensitive and whitespace insensitive. It is highly optimized for numeric computing but lacks modern features like strong type checking and exception handling.
The document provides an overview of the FORTRAN programming language. It discusses the history and origins of FORTRAN as one of the oldest programming languages developed in 1957. Key features of FORTRAN include being machine independent, having a natural way to express mathematical functions, and efficient execution for number crunching applications in science and engineering. The document also demonstrates the basic structure of a FORTRAN program with declarations, execution, and termination sections. It shows a simple example program that reads input, performs a calculation, and outputs the result.
The document provides a table of contents for a National Guard Black Belt training module on continuous process improvement (CPI). It outlines the course schedule and content by week and phase, including modules on defining problems, measuring processes, analyzing data, improving processes, and controlling results. The training integrates Lean Six Sigma tools and methods and uses simulations and projects to teach CPI approaches.
This document provides an introduction to programming in Fortran 90 for novice programmers. It discusses variables and data types in Fortran, including integer, real, complex, character, and logical types. It describes naming conventions for variables and how to specify or declare variables, including using the PARAMETER attribute to define constants. Implicit declaration of some variables is also mentioned.
This document provides an overview of module 1 of a National Guard Black Belt training. The module introduces participants and instructors, establishes expectations and logistics, reviews adult learning principles and CPI methodology. It also establishes baselines for participants' Six Sigma and Lean knowledge and outlines requirements for presenting projects throughout the training. The goal is to prepare participants to apply CPI tools to their individual process improvement projects.
This document provides an overview of Fortran 77 programming concepts including input/output statements, format specifiers, and the OPEN statement. Key points covered include:
- READ and WRITE statements are used for formatted and list-directed input/output. FORMAT defines the format for READ/WRITE.
- Common format specifiers include I, F, E for integers, reals, and scientific notation. A is for characters.
- The OPEN statement makes a file available for input/output using READ and WRITE and assigns a unit number for file access.
This document discusses various aspects of Fortran 77 programming including:
1. Variable names consist of letters and digits but are not case sensitive. Common declarations include integer and real variables.
2. Fortran 77 uses a fixed format with strict column rules for statements and labels. Comments can start in column 1.
3. A basic Fortran program structure includes the main program name, declarations, statements, and stop/end lines. Subprograms can also be included.
- The document discusses a company's quarterly financial results.
- Revenue increased significantly year-over-year due to strong performance across business segments.
- Expenses also rose but profit margins improved due to cost-cutting initiatives and higher sales.
- The company expects continued revenue growth and further margin expansion in the coming quarters.
Emulex - Management Mind Meld (A. Ordoubadian)Ali Ordoubadian
Converged networking combines existing local area networks (LANs) and storage area networks (SANs) into a single high-performance 10 gigabit Ethernet framework. This results in an overlap of responsibilities for network and storage administrators. The document provides an overview of key storage and networking concepts to help administrators understand changes from converged networking and how it will impact their roles, covering topics such as SANs, performance, availability, security and management.
Emulex - Management Mind Meld (A. Ordoubadian)Ali Ordoubadian
Converged networking combines existing local area networks (LANs) and storage area networks (SANs) into a single high-performance 10 gigabit Ethernet framework. This results in an overlap of responsibilities for network and storage administrators. The document provides an overview of key storage and networking concepts to help administrators understand changes from converged networking and how it will impact their roles, covering topics such as SANs, performance, availability, security and management.
This document is the user and service guide for the HP StorageWorks N1200-320 4Gb Network Storage Router. It provides information on installing and cabling the router, configuring the SCSI bus and Fibre Channel ports, and managing the device through the serial port or Ethernet interface. The guide describes the router's external features and indicators, and covers topics such as rack mounting instructions, interface connections, logical unit management, and the command line and graphical user interfaces for management.
Cisco routers for the small business a practical guide for it professionals...Mark Smith
This document provides a guide for configuring Cisco routers for small businesses. It discusses connecting to the router through the console port and navigating the command line interface. It then covers configuring the router by setting the hostname, IP addresses for LAN and WAN interfaces, enabling DHCP services, and setting security parameters like passwords. The goal is to provide IT professionals with the knowledge needed to get a Cisco router up and running for a small business network.
Quagga is a routing software package for TCP/IP networks that supports protocols like RIP, OSPF, and BGP. The document provides instructions on configuring, building, and installing Quagga on supported platforms like Linux. It also gives overviews of Quagga's components like Zebra (the routing daemon) and the command-line tools for interacting with routing protocols.
This document provides an overview of the Symmetrix 8000 Enterprise Plus storage systems. It describes the system architecture including components like channel directors, disk directors, cache memory and Enginuity software. It also outlines various data protection options available on the systems like mirroring, RAID parity and remote data replication using Symmetrix Remote Data Facility. Dynamic sparing is also mentioned for improving storage utilization and availability.
This document provides an introduction to using R, an open-source programming language and software environment for statistical analysis and graphics. It covers basic R operations like vectors, arrays, matrices, data frames, reading data, probability distributions, and writing functions. The document contains copyright information and a table of contents describing its 10 chapters on getting started with R and its core functionality.
This document discusses how Fortran 90 supports object-oriented programming features like encapsulation, inheritance, and polymorphism. It provides an example program that defines Rectangle and Circle classes to calculate the area of different shapes. The program uses a generic compute_area function that can accept either shape type due to polymorphism. This allows the common area calculation operation to work across different classes in an object-oriented way using Fortran 90 features.
This document contains an errata file and correspondence regarding errors found in the book "OOP via F90" by Prof. Akin. A reviewer notes a coding error on line 156 of Test_DLL_Integers.f90 in chapter 7. Another reviewer emails Prof. Akin with updates to the source code index and additional errors found. Prof. Akin replies thanking the reviewer for their comments and corrections.
The Dhaka University Science Society is a science-based club at the University of Dhaka that was started in 2014. The society aims to popularize science, encourage the practice and use of science, and acquaint students with recent scientific activities and research to help groom them for science-related careers. The society organizes regular activities like study circles, science festivals, seminars on research and careers, workshops in fields like astronomy, and celebrations of scientific holidays. It has a panel of moderators from various science departments and the Vice Chancellor of the University of Dhaka as its chief patron. The society also plans future activities like a science conference, journal reviews, science publications and videos, and outreach programs.
This document outlines the define phase of an 8-step continuous process improvement (CPI) roadmap. The define phase includes activities like identifying problems, validating the problem statement, establishing strategic alignment, gathering customer input, and creating a goal statement. It also lists required deliverables for the define tollgate, such as a problem statement, goal statement, project scope, timeline, and high-level process map. The document provides an overview of the key elements and documentation needed to properly define a CPI project.
Credits-
Dr. C.-K. Shene
Professor
Department of Computer Science
Michigan Technological University
This presentation was downloaded from this link- http://www.cs.mtu.edu/~shene/COURSES/cs201/NOTES/F90-Basics.pdf
This book provides style and usage guidelines for programmers using Fortran. It is intended for anyone using Fortran, from beginners to experts. The book describes best practices for formatting, naming conventions, documentation, programming principles, input/output handling, and other aspects of the Fortran language. It focuses primarily on Fortran 2003 but also describes features of Fortran 90/95 and 2008.
Fortran is a programming language developed by IBM in the 1950s for scientific and engineering use. It was the first optimizing compiler. While still used for high performance computing, its usage is declining. Fortran is case insensitive and whitespace insensitive. It is highly optimized for numeric computing but lacks modern features like strong type checking and exception handling.
The document provides an overview of the FORTRAN programming language. It discusses the history and origins of FORTRAN as one of the oldest programming languages developed in 1957. Key features of FORTRAN include being machine independent, having a natural way to express mathematical functions, and efficient execution for number crunching applications in science and engineering. The document also demonstrates the basic structure of a FORTRAN program with declarations, execution, and termination sections. It shows a simple example program that reads input, performs a calculation, and outputs the result.
The document provides a table of contents for a National Guard Black Belt training module on continuous process improvement (CPI). It outlines the course schedule and content by week and phase, including modules on defining problems, measuring processes, analyzing data, improving processes, and controlling results. The training integrates Lean Six Sigma tools and methods and uses simulations and projects to teach CPI approaches.
This document provides an introduction to programming in Fortran 90 for novice programmers. It discusses variables and data types in Fortran, including integer, real, complex, character, and logical types. It describes naming conventions for variables and how to specify or declare variables, including using the PARAMETER attribute to define constants. Implicit declaration of some variables is also mentioned.
This document provides an overview of module 1 of a National Guard Black Belt training. The module introduces participants and instructors, establishes expectations and logistics, reviews adult learning principles and CPI methodology. It also establishes baselines for participants' Six Sigma and Lean knowledge and outlines requirements for presenting projects throughout the training. The goal is to prepare participants to apply CPI tools to their individual process improvement projects.
This document provides an overview of Fortran 77 programming concepts including input/output statements, format specifiers, and the OPEN statement. Key points covered include:
- READ and WRITE statements are used for formatted and list-directed input/output. FORMAT defines the format for READ/WRITE.
- Common format specifiers include I, F, E for integers, reals, and scientific notation. A is for characters.
- The OPEN statement makes a file available for input/output using READ and WRITE and assigns a unit number for file access.
This document discusses various aspects of Fortran 77 programming including:
1. Variable names consist of letters and digits but are not case sensitive. Common declarations include integer and real variables.
2. Fortran 77 uses a fixed format with strict column rules for statements and labels. Comments can start in column 1.
3. A basic Fortran program structure includes the main program name, declarations, statements, and stop/end lines. Subprograms can also be included.
- The document discusses a company's quarterly financial results.
- Revenue increased significantly year-over-year due to strong performance across business segments.
- Expenses also rose but profit margins improved due to cost-cutting initiatives and higher sales.
- The company expects continued revenue growth and further margin expansion in the coming quarters.
Emulex - Management Mind Meld (A. Ordoubadian)Ali Ordoubadian
Converged networking combines existing local area networks (LANs) and storage area networks (SANs) into a single high-performance 10 gigabit Ethernet framework. This results in an overlap of responsibilities for network and storage administrators. The document provides an overview of key storage and networking concepts to help administrators understand changes from converged networking and how it will impact their roles, covering topics such as SANs, performance, availability, security and management.
Emulex - Management Mind Meld (A. Ordoubadian)Ali Ordoubadian
Converged networking combines existing local area networks (LANs) and storage area networks (SANs) into a single high-performance 10 gigabit Ethernet framework. This results in an overlap of responsibilities for network and storage administrators. The document provides an overview of key storage and networking concepts to help administrators understand changes from converged networking and how it will impact their roles, covering topics such as SANs, performance, availability, security and management.
This document is the user and service guide for the HP StorageWorks N1200-320 4Gb Network Storage Router. It provides information on installing and cabling the router, configuring the SCSI bus and Fibre Channel ports, and managing the device through the serial port or Ethernet interface. The guide describes the router's external features and indicators, and covers topics such as rack mounting instructions, interface connections, logical unit management, and the command line and graphical user interfaces for management.
Cisco routers for the small business a practical guide for it professionals...Mark Smith
This document provides a guide for configuring Cisco routers for small businesses. It discusses connecting to the router through the console port and navigating the command line interface. It then covers configuring the router by setting the hostname, IP addresses for LAN and WAN interfaces, enabling DHCP services, and setting security parameters like passwords. The goal is to provide IT professionals with the knowledge needed to get a Cisco router up and running for a small business network.
Quagga is a routing software package for TCP/IP networks that supports protocols like RIP, OSPF, and BGP. The document provides instructions on configuring, building, and installing Quagga on supported platforms like Linux. It also gives overviews of Quagga's components like Zebra (the routing daemon) and the command-line tools for interacting with routing protocols.
This document provides an overview of the Symmetrix 8000 Enterprise Plus storage systems. It describes the system architecture including components like channel directors, disk directors, cache memory and Enginuity software. It also outlines various data protection options available on the systems like mirroring, RAID parity and remote data replication using Symmetrix Remote Data Facility. Dynamic sparing is also mentioned for improving storage utilization and availability.
This document provides an introduction to using R, an open-source programming language and software environment for statistical analysis and graphics. It covers basic R operations like vectors, arrays, matrices, data frames, reading data, probability distributions, and writing functions. The document contains copyright information and a table of contents describing its 10 chapters on getting started with R and its core functionality.
IMPLEMENTATION OF IMAGE PROCESSING ALGORITHMS ON FPGA HARDWARE.pdfvenkatesh231416
This document summarizes Anthony Nelson's master's thesis on implementing image processing algorithms on FPGA hardware. Nelson developed VHDL implementations of three algorithms - rank order filtering, morphological operators, and convolution - on two FPGA architectures, Altera FLEX 10K100 and Xilinx Virtex XCV300. He compared the VHDL implementations to MATLAB implementations in terms of functionality and performance. The thesis also describes integrating the VHDL algorithms into ISIS's Algorithm Construction Set modeling tools.
This document provides an overview and tutorial on the Python programming language. It introduces Python's main features like lists, dictionaries, functions, object-oriented programming and modules. The tutorial includes example code and explanations of Python concepts like data types, scope, exceptions, classes and inheritance. It also covers debugging tools and accessing Python's online documentation. The goal is to quickly teach the essentials of Python in a painless manner.
This document provides an introduction to using the R programming environment for data analysis and graphics. It covers basic R concepts like vectors, matrices, arrays, factors, lists and data frames. It also describes how to perform common data manipulations and access help documentation. The document is copyrighted by the R Development Core Team and permission is granted to distribute verbatim or modified copies.
This document is a PDF version of the Python Programming Wikibook, which provides instruction on a variety of Python topics. It includes the LaTeX source code as an attachment, and specifies how to extract and decompress the source code from the PDF. The document also describes various licenses that may apply to parts of the content within, due to being derived from Wikibooks and Wikipedia projects.
This document provides contact information and revision history for the MATLAB Primer. It lists ways to contact MathWorks for sales, support, and community help. It also provides the copyright information and lists revisions made from 1996 to 2014. The document contains 23 printing revisions and online revisions for MATLAB releases from versions 5 through 8.4 (R2014b).
The document provides design considerations for building a high-performance campus local area network (LAN). It discusses a layered network architecture with access, aggregation and core layers. Key access layer topics include wired/wireless connectivity, power-over-Ethernet, VLANs and wireless solutions. Aggregation design focuses on segmentation and distributed switching. The core layer section reviews high-performance solutions and consolidating the core and aggregation layers. High availability techniques like device redundancy, link aggregation and virtual chassis are also covered.
This document provides an introduction to using the R programming environment. It covers basic topics like vectors, factors, arrays, matrices, lists and data frames. The document is copyrighted by multiple individuals and development teams between 1990-2010. Permission is granted to distribute verbatim or modified copies of the manual under certain conditions.
The document analyzes a crackme challenge at multiple levels of abstraction. It begins with an outer layer analysis of the binary file format to gather clues. This includes examining the PE structure, sections, imports, and other metadata. It then performs an inner layer analysis, including disassembly of key functions like the main entry point and VM interpreter. Different reverse engineering techniques are discussed like static analysis, debugging, and symbolic/concolic execution to understand the crackme's protection mechanism and calculate the magic value.
This document provides an introduction to using the R programming environment. It covers basic topics like vectors, factors, arrays, matrices, lists and data frames. The document is copyrighted by multiple individuals and development teams between 1990-2010. Permission is granted to distribute copies of the manual if the copyright notice is preserved.
This document provides an introduction to using the R programming environment. It covers basic topics like vectors, factors, arrays, matrices, lists and data frames. It also discusses getting help, executing commands interactively or from files, and managing objects and attributes in R. The document is copyrighted by the R Development Core Team and permission is granted to distribute verbatim or modified copies.
This document provides an introduction to using the R programming environment. It discusses R's interactive features, basic data types like vectors and factors, and programming objects like arrays, matrices, lists, and data frames. The document is copyrighted by the R Development Core Team and permission is granted to distribute verbatim or modified copies.
This document provides an introduction to using the R programming environment. It covers basic topics like vectors, factors, arrays, matrices, lists and data frames. It also discusses getting help, executing commands interactively or from files, and managing objects and attributes in R. The document is copyrighted by the R Development Core Team and permission is granted to distribute verbatim or modified copies.
This document provides an introduction to using the R programming environment. It discusses R's interactive features, data types like vectors and matrices, and objects like factors, arrays and lists. The document also covers getting help, executing commands, and importing/exporting data. It serves as a manual for basic use and exploration of R's functionality for data analysis and graphics.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving
What began over 115 years ago as a supplier of precision gauges to the automotive industry has evolved into being an industry leader in the manufacture of product branding, automotive cockpit trim and decorative appliance trim. Value-added services include in-house Design, Engineering, Program Management, Test Lab and Tool Shops.
Session 1 - Intro to Robotic Process Automation.pdfUiPathCommunity
👉 Check out our full 'Africa Series - Automation Student Developers (EN)' page to register for the full program:
https://bit.ly/Automation_Student_Kickstart
In this session, we shall introduce you to the world of automation, the UiPath Platform, and guide you on how to install and setup UiPath Studio on your Windows PC.
📕 Detailed agenda:
What is RPA? Benefits of RPA?
RPA Applications
The UiPath End-to-End Automation Platform
UiPath Studio CE Installation and Setup
💻 Extra training through UiPath Academy:
Introduction to Automation
UiPath Business Automation Platform
Explore automation development with UiPath Studio
👉 Register here for our upcoming Session 2 on June 20: Introduction to UiPath Studio Fundamentals: https://community.uipath.com/events/details/uipath-lagos-presents-session-2-introduction-to-uipath-studio-fundamentals/
"Scaling RAG Applications to serve millions of users", Kevin GoedeckeFwdays
How we managed to grow and scale a RAG application from zero to thousands of users in 7 months. Lessons from technical challenges around managing high load for LLMs, RAGs and Vector databases.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
Must Know Postgres Extension for DBA and Developer during MigrationMydbops
Mydbops Opensource Database Meetup 16
Topic: Must-Know PostgreSQL Extensions for Developers and DBAs During Migration
Speaker: Deepak Mahto, Founder of DataCloudGaze Consulting
Date & Time: 8th June | 10 AM - 1 PM IST
Venue: Bangalore International Centre, Bangalore
Abstract: Discover how PostgreSQL extensions can be your secret weapon! This talk explores how key extensions enhance database capabilities and streamline the migration process for users moving from other relational databases like Oracle.
Key Takeaways:
* Learn about crucial extensions like oracle_fdw, pgtt, and pg_audit that ease migration complexities.
* Gain valuable strategies for implementing these extensions in PostgreSQL to achieve license freedom.
* Discover how these key extensions can empower both developers and DBAs during the migration process.
* Don't miss this chance to gain practical knowledge from an industry expert and stay updated on the latest open-source database trends.
Mydbops Managed Services specializes in taking the pain out of database management while optimizing performance. Since 2015, we have been providing top-notch support and assistance for the top three open-source databases: MySQL, MongoDB, and PostgreSQL.
Our team offers a wide range of services, including assistance, support, consulting, 24/7 operations, and expertise in all relevant technologies. We help organizations improve their database's performance, scalability, efficiency, and availability.
Contact us: info@mydbops.com
Visit: https://www.mydbops.com/
Follow us on LinkedIn: https://in.linkedin.com/company/mydbops
For more details and updates, please follow up the below links.
Meetup Page : https://www.meetup.com/mydbops-databa...
Twitter: https://twitter.com/mydbopsofficial
Blogs: https://www.mydbops.com/blog/
Facebook(Meta): https://www.facebook.com/mydbops/
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...Fwdays
Direct losses from downtime in 1 minute = $5-$10 thousand dollars. Reputation is priceless.
As part of the talk, we will consider the architectural strategies necessary for the development of highly loaded fintech solutions. We will focus on using queues and streaming to efficiently work and manage large amounts of data in real-time and to minimize latency.
We will focus special attention on the architectural patterns used in the design of the fintech system, microservices and event-driven architecture, which ensure scalability, fault tolerance, and consistency of the entire system.
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Fortran 90 overview
1. 1
Fortran 90 Overview
J.E. Akin, Copyright 1998
This overview of Fortran 90 (F90) features is presented as a series of tables that illustrate the syntax
and abilities of F90. Frequently comparisons are made to similar features in the C++ and F77 languages
and to the Matlab environment.
These tables show that F90 has significant improvements over F77 and matches or exceeds newer
software capabilities found in C++ and Matlab for dynamic memory management, user defined data
structures, matrix operations, operator definition and overloading, intrinsics for vector and parallel pro-
cessors and the basic requirements for object-oriented programming.
They are intended to serve as a condensed quick reference guide for programming in F90 and for
understanding programs developed by others.
4. 4 LIST OF TABLES
Language Syntax Location
M ATLAB % comment (to end of line) anywhere
C /*comment*/ anywhere
F90 ! comment (to end of line) anywhere
F77 * comment (to end of line) column 1
Table 1: Comment syntax.
Storage M ATLAB a C++ F90 F77
byte char character:: character
integer int integer:: integer
single precision float real:: real
double precision double real*8:: double precision
b
complex complex:: complex
Boolean bool logical:: logical
argument parameter:: parameter
pointer * pointer::
structure struct type::
a M ATLAB 4 requires no variable type declaration; the only two distinct types in M ATLAB are strings and reals (which include
complex). Booleans are just 0s and 1s treated as reals. M ATLAB 5 allows the user to select more types.
b There is no specific data type for a complex variable in C++; they must be created by the programmer.
Table 2: Intrinsic data types of variables.
Description M ATLAB a C++ Fortranb
addition + + +
subtractionc - - -
multiplication * and .* * *
division / and ./ / /
exponentiation ˆ and .ˆ powd **
remainder %
increment ++
decrement --
parentheses (expres- () () ()
sion grouping)
a When doing arithmetic operations on matrices in M ATLAB , a period (‘.’) must be put before the operator if scalar arithmetic
is desired. Otherwise, M ATLAB assumes matrix operations; figure out the difference between ‘*’ and ‘.*’. Note that since matrix
and scalar addition coincide, no ‘.+’ operator exists (same holds for subtraction).
b Fortran 90 allows the user to change operators and to define new operator symbols.
c In all languages the minus sign is used for negation (i.e., changing sign).
¨¦¤¢
§ ¥ £ ¡
d In C++ the exponentiation is calculated by function pow .
Table 3: Arithmetic operators.
5. LIST OF TABLES 5
Description M ATLAB C++ F90 F77
Equal to == == == .EQ.
Not equal to ˜= != /= .NE.
Less than < < < .LT.
Less or equal <= <= <= .LE.
Greater than > > > .GT.
Greater or equal >= >= >= .GE.
Logical NOT ˜ ! .NOT. .NOT.
Logical AND & && .AND. .AND.
Logical inclusive OR ! || .OR. .OR.
Logical exclusive OR xor .XOR. .XOR.
Logical equivalent == == .EQV. .EQV.
Logical not equivalent ˜= != .NEQV. .NEQV.
Table 4: Relational operators (arithmetic and logical).
M ATLAB
C++ Operators F90 Operatorsa F77 Operators
Operators
() () [] -> . () ()
+ - ! ++ -- + ** **
- * & (type)
sizeof
* / * / % * / * /
+ -b + -b + -b + -b
< <= > >= << >> // //
== ˜= < <= > => == /= < <= > .EQ. .NE.
>= .LT. .LE.
.GT. .GE.
˜ == != .NOT. .NOT.
& && .AND. .AND.
| || .OR. .OR.
= | .EQV. .NEQV. .EQV. .NEQV.
?:
= += -= *= /=
%= &= ˆ= |=
<<= >>=
,
a User-defined unary (binary) operators have the highest (lowest) precedence in F90.
b These are binary operators representing addition and subtraction. Unary operators + and - have higher precedence.
Table 5: Precedence pecking order.
B = Beginning, E = Ending, I = Increment
Syntax F90 M ATLAB Use F90 M ATLAB
Default B:E:I B:I:E Array subscript ranges yes yes
Character positions in a string yes yes
B B: B:
Loop control no yes
¡
E :E :E
Full range : : Array element generation no yes
Table 6: Colon Operator Syntax and its Applications.
7. LIST OF TABLES 7
Description C++ F90 F77 M ATLAB
Conditionally execute statements if if if if
¡ ¢ end if end if end
Loop a specific number of times for k=1:n do k=1,n do # k=1,n for k=1:n
¡ ¢ end do # continue end
Loop an indefinite number of times while do while — while
¡ ¢ end do — end
Terminate and exit loop break exit go to break
Skip a cycle of loop continue cycle go to —
Display message and abort error() stop stop error
Return to invoking function return return return return
Conditional array action — where — if
Conditional alternate statements else else else else
else if elseif elseif elseif
Conditional array alternatives — elsewhere — else
— — — elseif
Conditional case selections switch
¡ ¢ select case if if
end select end if end
Table 8: Flow Control Statements.
Loop M ATLAB C++ Fortran
Indexed loop for index=matrix for (init;test;inc)
do index=b,e,i
statements statements
end statements
¡ end do
Pre-test loop while test while (test)
do while (test)
statements statements
¡ statements
end end do
Post-test loop do
do
statements
¡ statements
while (test) if (test) exit
end do
Table 9: Basic loop constructs.
8. 8 LIST OF TABLES
M ATLAB Fortran C++
if l expression IF (l expression) THEN if (l expression)
true group true group
end END IF true group;
¡
IF (l expression) true statement if (l expression)
true state-
ment;
Table 10: IF Constructs. The quantity l expression means a logical expression having a value that
is either TRUE of FALSE. The term true statement or true group means that the statement or group
of statements, respectively, are executed if the conditional in the if statement evaluates to TRUE.
M ATLAB Fortran C++
if l expression1 IF (l expression1) THEN if (l expression1)
true group A true group A
if l expression2 IF (l expression2) THEN true group A
true group B true group B if (l expression2)
end END IF
true group C true group C true group B
¡
end END IF
statement group D statement group D true group C
¡
statement group D
Table 11: Nested IF Constructs.
M ATLAB Fortran C++
if l expression IF (l expression) THEN if (l expression)
true group A true group A
else ELSE true group A
¡
false group B false group B
end END IF else
false group B
¡
Table 12: Logical IF-ELSE Constructs.
M ATLAB Fortran C++
if l expression1 IF (l expression1) THEN if (l expression1)
true group A true group A
elseif l expression2 ELSE IF (l expression2) THEN true group A
¡
true group B true group B
elseif l expression3 ELSE IF (l expression3) THEN else if (l expression2)
true group C true group C
else ELSE true group B
¡
default group D default group D
end END IF else if (l expression3)
true group C
¡
else
default group D
¡
Table 13: Logical IF-ELSE-IF Constructs.
9. LIST OF TABLES 9
F90 C++
SELECT CASE (expression) switch (expression)
CASE (value 1)
group 1 case value 1 :
CASE (value 2) group 1
group 2 break;
.
. case value 2 :
. group 2
CASE (value n) break;
group n .
CASE DEFAULT .
.
default group case value n :
END SELECT group n
break;
default:
default group
¡ break;
Table 14: Case Selection Constructs.
F90 Named IF F90Named SELECT
name: IF (logical 1) THEN name: SELECT CASE (expression)
true group A CASE (value 1)
ELSE IF (logical 2) THEN group 1
true group B CASE (value 2)
ELSE group 2
default group C CASE DEFAULT
ENDIF name default group
END SELECT name
Table 15: F90 Optional Logic Block Names.
Fortran C++
DO 1 ...
DO 2 ...
for (...)
for (...)
... ...
IF (disaster) THEN if (disaster)
GO TO 3 go to error
END IF ¡¡ ...
...
2 END DO
1 END DO error:
3 next statement
Table 16: GO TO Break-out of Nested Loops. This situation can be an exception to the general recom-
mendation to avoid GO TO statements.
10. 10 LIST OF TABLES
F77 F90 C++
DO 1 I = 1,N DO I = 1,N for (i=1; in; i++)
... ...
IF (skip condi- IF (skip condi- if (skip condition)
tion) THEN tion) THEN continue; // to next
GO TO 1 CYCLE ! to next I else if
ELSE ELSE false group
false group false group end
END IF END IF ¡
1 continue END DO
Table 17: Skip a Single Loop Cycle.
F77 F90 C++
DO 1 I = 1,N DO I = 1,N for (i=1; in; i++)
IF (exit condi- IF (exit condi-
tion) THEN tion) THEN if (exit condition)
GO TO 2 EXIT ! this do break;// out of loop
ELSE ELSE else if
false group false group false group
END IF END IF end
¡
1 CONTINUE END DO
2 next statement next statement next statement
Table 18: Abort a Single Loop.
main: DO ! forever
test: DO k=1,k max
third: DO m=m max,m min,-1
IF (test condition) THEN
CYCLE test ! loop on k
END IF
END DO third ! loop on m
fourth: DO n=n min,n max,2
IF (main condition) THEN
EXIT main ! forever loop
END DO fourth ! on n
END DO test ! over k
END DO main
next statement
Table 19: F90 DOs Named for Control.
11. LIST OF TABLES 11
M ATLAB C++
initialize test initialize test
while l expression while (l expression)
true group
change test true group
end change test
¡
F77 F90
initialize test initialize test
# continue do while (l expression)
IF (l expression) THEN true group
true group change test
change test end do
go to #
END IF
Table 20: Looping While a Condition is True.
Function
M ATLABa C++ Fortran
Type
program statements main(argc,char **argv)
program main
[y1...yn]=f(a1,...,am) type y
[end of file] statements type a1,...,type am
y = f(a1,I,am); ¡ statements
y = f(a1,...,am)
call s(a1,...,am)
end program
subroutine void f subroutine s(a1,...,am)
(type a1,...,type am)
type a1,...,type am
statements
statements
¡ end
function function [r1...rn] type f (type a1,...,type am) function f(a1,...,am)
=f(a1,...,am) type f
statements ¡
statements type a1,...,type am
statements
end
a Every function or program in M ATLAB must be in separate files.
Table 21: Function definitions. In each case, the function being defined is named f and is called with m
arguments a1,...,am.
12. 12 LIST OF TABLES
One-Input, One-Result Procedures
M ATLAB function out = name (in)
F90 function name (in) ! name = out
function name (in) result (out)
C++ name (in, out)
Multiple-Input, Multiple-Result Procedures
M ATLAB function [inout, out2] = name (in1, in2, inout)
F90 subroutine name (in1, in2, inout, out2)
C++ name(in1, in2, inout, out2)
Table 22: Arguments and return values of subprograms.
Global Variable Declaration
M ATLAB global list of variables
F77 common /set name/ list of variables
F90 module set name
save
type (type tag) :: list of variables
end module set name
C++ extern list of variables
Access to Global Variables
M ATLAB global list of variables
F77 common /set name/ list of variables
F90 use set name, only subset of variables
use set name2 list of variables
C++ extern list of variables
Table 23: Defining and referring to global variables.
Action C++ F90
Bitwise AND iand
Bitwise exclusive OR ieor
Bitwise exclusive OR ¡ ior
Circular bit shift ishftc
Clear bit ibclr
Combination of bits mvbits
Extract bit ibits
Logical complement ¢ not
Number of bits in integer sizeof bit size
Set bit ibset
Shift bit left £ ishft
Shift bit right ¤ ishft
Test on or off btest
Transfer bits to integer transfer
Table 24: Bit Function Intrinsics.
13. LIST OF TABLES 13
0 NUL 1 SOH 2 STX 3 ETX 4 EOT 5 ENQ 6 ACK 7 BEL
8 BS 9 HT 10 NL 11 VT 12 NP 13 CR 14 SO 15 SI
16 DLE 17 DC1 18 DC2 19 DC3 20 DC4 21 NAK 22 SYN 23 ETB
24 CAN 25 EM 26 SUB 27 ESC 28 FS 29 GS 30 RS 31 US
32 SP 33 ! 34 35 # 36 $ 37 % 38 39 ’
40 ( 41 ) 42 * 43 + 44 , 45 - 46 . 47 /
48 0 49 1 50 2 51 3 52 4 53 5 54 6 55 7
56 8 57 9 58 : 59 ; 60 61 = 62 63 ?
64 @ 65 A 66 B 67 C 68 D 69 E 70 F 71 G
72 H 73 I 74 J 75 K 76 L 77 M 78 N 79 O
80 P 81 Q 82 R 83 S 84 T 85 U 86 V 87 W
88 X 89 Y 90 Z 91 [ 92 93 ] 94 ˆ 95 _
96 ‘ 97 a 98 b 99 c 100 d 101 e 102 f 103 g
104 h 105 i 106 j 107 k 108 l 109 m 110 n 111 o
112 p 113 q 114 r 115 s 116 t 117 u 118 v 119 w
120 x 121 y 122 z 123 { 124 | 125 } 126 ˜ 127 DEL
Table 25: The ACSII Character Set.
ACHAR (I) Character number I in ASCII collating set
ADJUSTL (STRING) Adjust left
ADJUSTR (STRING) Adjust right
CHAR (I)
Character I in processor collating set
IACHAR (C) Position of C in ASCII collating set
ICHAR (C) Position of C in processor collating set
INDEX (STRING, SUBSTRING)a Starting position of a substring
LEN (STRING) Length of a character entity
LEN TRIM (STRING) Length without trailing blanks
LGE (STRING A, STRING B) Lexically greater than or equal
LGT (STRING A, STRING B) Lexically greater than
LLE (STRING A, STRING B) Lexically less than or equal
LLT (STRING A, STRING B) Lexically less than
REPEAT (STRING, NCOPIES) Repeated concatenation
SCAN (STRING, SET)a Scan a string for a character in a set
TRIM (STRING) Remove trailing blank characters
VERIFY (STRING, SET)a Verify the set of characters in a string
STRING A//STRING B Concatenate two strings
a Optional arguments not shown.
Table 26: F90 Character Functions.
Action ASCII Character F90 Inputa C++ Input¡
Alert (Bell) 7 Ctrl-G a
¡
Backspace 8 Ctrl-H b
¡
Carriage Return 13 Ctrl-M r
End of Transmission 4 Ctrl-D Ctrl-D
¡
Form Feed 12 Ctrl-L f
¡
Horizontal Tab 9 Ctrl-I t
¡
New Line 10 Ctrl-J n
¡
Vertical Tab 11 Ctrl-K v
a “Ctrl-” denotes control action. That is, simultaneous pressing of the CONTROL key and the letter following.
Table 27: How to type non-printing characters.
14. 14 LIST OF TABLES
C, C++ Variable.component.sub component
F90 Variable%component%sub component
Table 28: Referencing Structure Components.
C, C++ struct data tag
intrinsic type 1 component names;
¡ intrinsic type 2 component names;
;
F90 type data tag
intrinsic type 1 :: component names;
intrinsic type 2 :: component names;
end type data tag
Table 29: Defining New Types of Data Structure.
C, C++ struct data tag
intrinsic type 1 component names;
¡ struct tag 2 component names;
;
F90 type data tag
intrinsic type :: component names;
type (tag 2) :: component names;
end type data tag
Table 30: Nested Data Structure Definitions.
C, C++ struct data tag variable list; /* Definition */
¡
struct data tag variable = component values ; /* Initializa-
tion */
variable.component.sub component = value; /* Assignment */
F90 type (data tag) :: variable list ! Definition
variable = data tag (component values) ! Initialization
variable%component%sub component = value ! Assignment
Table 31: Declaring, initializing, and assigning components of user-defined datatypes.
15. LIST OF TABLES 15
INTEGER, PARAMETER :: j max = 6
TYPE meaning demo
INTEGER, PARAMETER :: k max = 9, word = 15
CHARACTER (LEN = word) :: name(k max)
END TYPE meaning demo
TYPE (meaning demo) derived(j max)
Construct Interpretation
derived All components of all derived’s elements
¤¢
£ ¡
derived(j) All components of element of derived
¦¥
£ ¡
derived(j)%name All k max components of name within element of derived
derived%name(k) Component k of the name array for all elements of derived
¦¥
£ ¡
derived(j)%name(k) Component k of the name array of element of derived
Table 32: F90 Derived Type Component Interpretation.
C++ F90
Declaration type tag *pointer name; type (type tag), pointer ::
pointer name
Target target name type (type tag), target :: target name
Examples char *cp, c; character, pointer :: cp
int *ip, i; integer, pointer :: ip
float *fp, f; real, pointer :: fp
cp = c; cp = c
§
ip = i; ip = i
§
fp = f; fp = f
§
Table 33: Definition of pointers and accessing their targets.
C, C++ pointer name = NULL
F90 nullify (list of pointer names)
F95 pointer name = NULL()
Table 34: Nullifing a Pointer to Break Association with Target.
Purpose F90 M ATLAB
Form subscripts () ()
Separates subscripts elements , ,
Generates elements subscripts : :
Separate commands ; ;
Forms arrays (/ /) []
Continue to new line ...
Indicate comment ! %
Suppress printing default ;
Table 35: Special Array Characters.