NetFind Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. List of quantum chemistry and solid-state physics software

    en.wikipedia.org/wiki/List_of_quantum_chemistry...

    Quantum chemistry computer programs are used in computational chemistry to implement the methods of quantum chemistry. Most include the Hartree–Fock (HF) and some post-Hartree–Fock methods. They may also include density functional theory (DFT), molecular mechanics or semi-empirical quantum chemistry methods.

  3. Accelerator physics codes - Wikipedia

    en.wikipedia.org/wiki/Accelerator_Physics_Codes

    Accelerator physics is a field of physics encompassing all the aspects required to design and operate the equipment and to understand the resulting dynamics of the charged particles. There are software packages associated with each domain. The 1990 edition of the Los Alamos Accelerator Code Group's compendium [1] provides summaries of more than ...

  4. List of amateur radio software - Wikipedia

    en.wikipedia.org/wiki/List_of_amateur_radio_software

    Proprietary. macOS. MacLoggerDX is a full-featured amateur radio contact logger for macOS with Transceiver control, Rotor control, Callbook lookup, QSL handling (Hardcopy / LoTW / eQSL / Club Log), DX Cluster and spotting, and basic contesting support. It also works with WSJT-X to control the transceiver while making digital contacts, etc.

  5. Comparison of code generation tools - Wikipedia

    en.wikipedia.org/wiki/Comparison_of_code...

    Apeel PHP Code Generator Pro City Business Logic Windows ... VB.NET and SQL Script Generator Cove Bay Software Limited Windows 2013 4.0.0.0 2015-05-05 Proprietary:

  6. Comparison of documentation generators - Wikipedia

    en.wikipedia.org/wiki/Comparison_of...

    full semantic analysis of source code, including parameter types, conditional compilation directives, macro expansions Javadoc: JSDoc: Yes JsDoc Toolkit: Yes mkd: Customisable for all type of comments 'as-is' in comments all general documentation; references, manual, organigrams, ... Including the binary codes included in the comments. all ...

  7. List of software for nuclear engineering - Wikipedia

    en.wikipedia.org/wiki/List_of_software_for...

    DOORS3.2A, 1-,2-,3-dimensional discrete-ordinates system for deep-penetration neutron and photon transport. uscd1234. DRAGON 3.05D, Reactor Cell Calculation System with Burnup. nesc0784. DSNP, Program and Data Library System for Dynamic Simulation of Nuclear Power Plant. nea-1683.

  8. List of ray tracing software - Wikipedia

    en.wikipedia.org/wiki/List_of_ray_tracing_software

    List of ray tracing software. Ray tracing is a technique that can generate near photo-realistic computer images. A wide range of free software and commercial software is available for producing these images. This article lists notable ray-tracing software. Software.

  9. Magik (programming language) - Wikipedia

    en.wikipedia.org/wiki/Magik_(programming_language)

    Magik is an object-oriented programming language that supports multiple inheritance and polymorphism, and it is dynamically typed. It was designed and implemented in 1989 by Arthur Chance of Smallworld Systems Ltd. as part of Smallworld Geographical Information System (GIS). Following Smallworld's acquisition in 2000, Magik is now provided by ...

  10. Operator Training Simulator - Wikipedia

    en.wikipedia.org/wiki/Operator_Training...

    Operator Training Simulator. An Operator Training Simulator (OTS) is a computer-based training system that uses a dynamic simulation model of an industrial process, usually integrated with an emulator of the process plant's Distributed Control System (DCS).

  11. The Power of 10: Rules for Developing Safety-Critical Code

    en.wikipedia.org/wiki/The_Power_of_10:_Rules_for...

    The ten rules are: [1] Avoid complex flow constructs, such as goto and recursion. All loops must have fixed bounds. This prevents runaway code. Avoid heap memory allocation. Restrict functions to a single printed page. Use a minimum of two runtime assertions per function. Restrict the scope of data to the smallest possible.