Designing and Executing The Program Logic Using Flowgramming
Journal Title: International Journal of Computer & organization Trends(IJCOT) - Year 2013, Vol 3, Issue 4
Abstract
Generally software supports the execution of coding and complex instruction steps. There is an unbreakable relation between the program and coding back from the olden days and we are now, dependent mostly on complex coding for the programs.By the introduction of Flowgramming, we have got an ultimate remedy for this problem. I have tried to provide an alternate approach to this. This paper allows the programmer to design a flow chart and execute it directly without the creation of any intermediate codes. No limitations, if the logic of the program is known, the flowchart can be designed and executed easily.This paper contains standard flowchart symbols for designing the program and directly visualizes the execution of the program. It has the facility of modularizing the program, which allows us to develop complex programs by dividing the program into modules, which can then be integrated together . This task has been achieved by predefining the significance of such flow chart symbols in visual basics without any backend
Authors and Affiliations
M. Krishnamoorthy , P. S. Udaya Banu
Detecting and Alerting Tcp –Ip Packets againt TCP SYN attacks
Transmission Control Protocol Synchronized ( TCP SYN) Flood has become a problem to the network management to maintain the network server from being attacked by the malicious attackers. Possibly one of the problems...
Bionic Feet
In general, prosthetic feet can be classified in three categories. These are, following the time line: Conventional Feet (CF), Energy-Storing-and-Returning (ESR) feet, and recent socalled ‘bionic’ feet. R...
Identity Security Using Authentication and Authorization in Cloud Computing
The Growth of the Cloud Computing invention suggests attractive and innovative computing services through resource pooling and virtualization techniques. Cloud gives delivers different types of Computing Services to thei...
Power Efficient Weighted Modulo 2n+1 Adder
The comparison of three different architectures for modulo 2n+1 adders are introduced in this paper. The first two architecture can be implemented different power consumptions, while maintain the same delay. The partitio...
Denoising of a Color image using fuzzy Filtering Techniques
In this paper, different types of filtering techniques are used for the removal of noise in an image. The results are obtained by three steps in the filtering process. Step by step the noise is removed in a considerable...