Artificial Life – Simple Math

The following code transforms the struggle for survival into a mathematical equation. A user is asked to enter a number of carnivores to create between 1 – 100. Once the number has been decided, the plants, herbivores and carnivores reproduce contingent on a specific ratio between plants:herbivores:carnivores or 16:6:2.

The program takes 3 separate life forms plants, herbivores and carnivores and increases or decreases their reproduction rate depedent on their ratio in comparison to the other life forms. A ratio of ...

Read more →
0

Artificial Life Simulation

I have many software projects that I have been working on. One of my favorites is an Artificial Life Simulation. I will be using the blog portion of mikestratton.net to keep a running record of my work. The Artificial Life Simulation is being developed in Java.

Artificial Life Simulation Overview

Create a simulation that emulates life and evolution.
The simulation is governed by the same rules that govern our world. Graphic
objects in simulation represent life forms and environmental objects. Life
forms ...

Read more →
0

Java Script Browser Detection

Java Script Browser Detection & Redirection

Part of the process of web development includes testing to verify if a website
works in different browsers. Once you understand how the site will function in
each browser, you can better understand how to resolve errors. Although I do not
recommend the use of a client side script for detection and redirection for
high-traffic sites and/or web applications, I do recommend this script if you
are on a budget and/or you are in need ...

Read more →
0

RFC 20 – ASCII Character Chart

ASCII Code Chart


ASCII format for Network Interchange

Network Working Group Vint Cerf
Request for Comments: 20 UCLA
October 16, 1969
ASCII format for Network Interchange
For concreteness, we suggest the use of standard 7-bit ASCII embedded in an 8 bit byte whose high order bit is always 0. This leads to the standard code given on the attached page, copies from USAS X3, 4-1968. This code will be used over HOST-HOST primary connections. Break characters will be defined ...

Read more →
0

Security Policy Overview

Simplistic Overview of a Security Policy

A security policy is used to build an effective security infrastructure.
Without an effective security policy, a firewall implementation is ineffective.

An infrastructure with an effective security policy:
–> Secures resources, including information and systems
–> Improves employee performance
–> Determines what traffic your firewall will allow or deny.

A security policy is the first line of defense in establishing a secure
systems infrastructure. It must be effective in providing guidelines for the
entire organziation.

To reduce risk, ...

Read more →
0

MIT – Introduction to Copyright Law

MIT 6.912 Introduction to Copyright Law

Topics Covered: Introduction; Basics of Legal Research; Legal Citations

Instructor: Keith Winstein

Instructor: Keith Winstein

View the complete course:
http://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-912-introduction-to-copyright-law-january-iap-2006/index.htm

Introduction to Copyright Law: Class Notes

US Constitution: Article 1 Section 8 (Intellectual Property Clause)
The Congress shall have Power….
To promote the Progress of Science and useful Arts, by securing for limited Times to Authors and Inventors the exclusive Right to their respective Writings and Discoveries;

The Sunny Bono Copyright Term Extension ...

Read more →
0

Security Risk Management Guide

The Security Risk Management Guide

Download The Security Risk Management Guide here

The Security Risk Management Guide Overview

Chapter 1: Introduction to the Security Risk Management Guide

Chapter 1 introduces the Security Risk Management Guide (SRMG) and provides a brief overview of subsequent chapters. It also provides information about the following:

  • Keys to succeeding with a security risk management program
  • Key terms and definitions
  • Style conventions in the papers
  • References for further information

Chapter 2: Survey of Security Risk Management Practices

Chapter 2 lays ...

Read more →
0

Physics I: Classical Mechanics #1

8.01 Physics I: Classical Mechanics

Lecture #1: This lecture is about units, dimensions, measurements and associated uncertainties, dimensional analysis, and scaling arguments.

Instructor/speaker:
Prof. Walter Lewin

View the complete course at:
http://ocw.mit.edu/courses/physics/8-01-physics-i-classical-mechanics-fall-1999/

License: Creative Commons BY-NC-SA

More information at http://ocw.mit.edu/terms

More courses at http://ocw.mit.edu

Physics 1: Classical Mechanics Notes

Length = meters
Time = sec
Mass = kg

Profressor references a video entitled “The Powers of Ten” by Charles and Ray
Eames and Pyramid Media. After some searching I found the video, it displays 40
powers of ...

Read more →
0
Page 12 of 20 «...1011121314...»