detex for tex.

detex – a filter to strip TeX commands from a .tex file.


$cat resume.tex
\documentclass[10pt,a4paper,twocolumn]{article}
\date{}
\usepackage{amsmath}
\setlength\topmargin{0in}
\setlength\headheight{0in}
\setlength\headsep{0in}
\setlength\oddsidemargin{0in}
\setlength\evensidemargin{0in}
\begin{document}
\title {\texttt{R\'{e}sum\'{e}}}
\maketitle
\section*{\texttt{IDEA}}
\texttt{Work for student community} \\

output after detex resume.tex | more


[10pt,a4paper,twocolumn]article

amsmath
0in
0in
0in
0in
0in

Resume

*IDEA
Work for student community
to help acquire knowledge.
*Experiance
*Project Member
GNU Source Installer
www.gnu.org/software/sourceinstall
GNU Source Installer is a source package manager for Unix-likes.
*February 2004 - March 2005
Scientific Assistant.
Division of Computing Sciences.

struct keyword and getopt_long

The  getopt() function parses the command-line arguments.  Its
arguments argc and argv are the argument count and
array as passed to the main() function on program invocation.
An element of argv that starts with  '-'  (and  is not  exactly
"-" or "--") is an option element.  The characters of this
element (aside from the initial '-') are option characters.
If getopt() is called repeatedly, it returns successively each
of the option characters  from each of the option elements.
longopts is a pointer to the first element of an array of struct option
declared in <getopt.h> as

           struct option {
               const char *name;
               int         has_arg;
               int        *flag;
               int         val;
           };

Example Code


static const struct option long_options[] =
{
{"domain", no_argument, 0, 'd'},
{"boot", no_argument, 0, 'b'},
{"file", required_argument, 0, 'F'},
{"fqdn", no_argument, 0, 'f'},
{"all-fqdns", no_argument, 0, 'A'},
{"help", no_argument, 0, 'h'},
{"long", no_argument, 0, 'f'},
{"short", no_argument, 0, 's'},
{"version", no_argument, 0, 'V'},
{"verbose", no_argument, 0, 'v'},
{"alias", no_argument, 0, 'a'},
{"ip-address", no_argument, 0, 'i'},
{"all-ip-addresses", no_argument, 0, 'I'},
{"nis", no_argument, 0, 'y'},
{"yp", no_argument, 0, 'y'},
{0, 0, 0, 0}
};

gtf . generalized timing formula



$gtf 1024 768 75

# 1024x768 @ 75.00 Hz (GTF) hsync: 60.15 kHz; pclk: 81.80 MHz
Modeline "1024x768_75.00" 81.80 1024 1080 1192 1360 768 769 772 802 -HSync +Vsync

$

Generalized Timing Formula is a standard by VESA which defines exact
parameters of the component video signal for analog VGA display
interface.

The parameters defined by the standard include horizontal blanking
(retrace) and vertical blanking intervals, horizontal frequency and
vertical frequency (collectively, pixel clock rate or video signal
bandwidth), and horizontal/vertical sync polarity. These parameters are
used by the XFree86 Modeline, for example. This standard is available from VESA for $350. [1]

The standard was adopted in 1999, and was superseded by the
Coordinated Video Timings specification in 2002.

Reference :
http://en.wikipedia.org/wiki/Generalized_Timing_Formula

signal “expose-event”



g_signal_connect .
The second argument for this function is
detailed_signal : a string of the form "signal-name::detail".
source :http://library.gnome.org/devel/gobject/unstable/gobject-Signals.html
GtkWidget is the base class for all widgets.
"expose-event" is an signal and the signal list is available at
http://library.gnome.org/devel/gtk/unstable/GtkWidget.html

IP Puzzles +

Amidst the traffic of the Internet is an enormous amount of undesirable communication.
Currently there is no significant disincentive for clients who contribute to this
flood of undesirable communication. A mechanism for punishing only the malicious
is required in order to discourage clients from behaving badly. The standard response
has been to disconnect clients exhibiting suspicious behavior from the rest of the
network using a binary fillter. Ideally though, the mechanism should be analog to
allow falsely identified clients to prove that they are legitimate, so that service to
them can be reinstated. Client puzzles have been proposed in several protocols as a
mechanism well suited for this task;  clients do all the work involved in proving their
legitimacy.
Reference :
Reducing Malicious Traffic With IP Puzzles
Ed Kaiser Wu-chang Feng Wu-chi Feng Antoine Luu
OGI@OHSU
ENSEIRB
{edkaiser, wuchang, wuchi}@cse.ogi.edu
luu@enseirb.fr

rectangle +



A closed planar quadrilateral with opposite sides of equal lengths and ,
and with four right angles. A square is a degenerate rectangle with a=b

The area of the rectangle is A=ab

and its polygon diagonals p and q are of length

[latex]
p = q = \sqrt{(a{^2}+b{^2})}
[/latex]

A rectangle has a circumcircle with circumradius

[latex]
R = (1 \div 2) \sqrt{(a{^2}+b{^2})}
[/latex]

but incircle only in the degenerate case of a square.
Reference :
http://mathworld.wolfram.com/Rectangle.html

definition circle.

A circle is the set of points equidistant from a point C(h,k) called the
center. The fixed distance r from the center to any point on the circle is
called the radius.
The standard equation of a circle with center C(h,k) and radius r is as follows.

[latex]
(x-h){^2} + (y-k){^2} = r{^2}
[/latex]

Reference.
http://www.analyzemath.com/CircleEq/Tutorials.html