Saturday, April 30, 2011

Major types of DSS

Different there are different types of decision support system and these are as Model driven, data driven.

Model Driven:

A model driven decision support system is primarily stand-alone systems isolated from major organizational information systems that use some type of model to perform “what if” and other kinds of analyses. The analytical capabilities of model driven DSS are based on a strong theory or model combined with a good user interface that made the model easy to use.

Data Driven:

The data driven decision support system analyze large pools of data found in major organizational systems. Often data from transaction processing system are collected in data warehouse for this purpose. They support decision making by allowing users to extract useful information that was previously buried in large quantities of data.     

Friday, April 29, 2011

What is Active Server Pages (ASP)?

Active server pages is marked as an-add on to internet information services and it is Microsoft’s server side script engine for dynamically generated web pages. Programming ASP websites is made easier by various built in objects. Each object corresponds to a group of frequently- used functionality useful for creating dynamic pages. Read More

What do you mean by Java Script?


Java Script is such a kind of language which is influenced by many languages and was designed to have a similar look to Java. It is much easier for a non programmer to work with. This language is very famous for its more use in the web sites. Java Script is a trademark of sun Micro systems and also used under license for technology invented and implemented by Netscape communications.  

Wednesday, April 27, 2011

What is HTML?


HTML(Hypertext Markup Language), is the predominant markup language for web pages. It provides a means to describe the structure of text- based information in a document- by denoting certain text as headings, paragraphs, lists, and so on- and to supplement that text with interactive forms, embedded images, and other objects. 

Difference between open source Software & proprietary Software


Open source software is software where the source code is available. Users are free to make improvements and redistribute as long as they abide by certain. The most famous OSS is the operating system, Linux. Conversely, the source code for proprietary software is generally kept secret. A user purchases only the compiled version of proprietary software and has no choice but to use the software as is.

Tuesday, April 26, 2011

Advantage of Open Source Software

The advantage of open source software is a lot this are as follows:

First:

Open- source software is considerably less expensive than proprietary alternatives. For example, Linux can be installed for free while Microsoft’s Windows operating system can cost thousands of dollars a month to license.


Second:

Access to under dying Source code means users can detect and fix programming bugs, also OSS can be tailored to a user’s specific needs and upgrades happen at a pace chosen by the user, not the vendor.

Third :

The transparency of OSS improves security because security flaws can be detected and corrected.


History of open Source Software


The open source initiative formed in February 1998 by Raymond & Perens. With about 20 years of evidence from case histories of closed and open development already provided by the internet, the OSI continued to present the “open source” case to commercial businesses. They sought to bring a higher profile to the practical benefits of freely available source code, and wanted to bring major software businesses and other high-tech industries into open source.    

Monday, April 25, 2011

Merits of Optical Fiber


The advantage of optical fiber is a lot. Some of the advantage of optical fiber is as follows, like small size and weight, electrical isolation, immunity to interference and crosstalk, ruggedness and flexibility, system reliability and ease of maintenance.

Small Size and weight:

Optical fiber have very small diameters which are often no greater than the diameter of a human hair. Hence, even when such fibers are covered with protective coatings they are far smaller and much lighter than corresponding copper cables. This is a tremendous boon towards the alleviation of duet congestion in cities, as well as allowing for an expansion of signal transmission within mobiles such as aircraft, satellites and even ships.


Electrical isolation:

Optical fibers which are fabricated from glass, or sometimes a plastic polymer, are electrical insulators and therefore, unlike their metallic counterparts, they do not exhibit earth loop and interface problems.


Immunity to interference and crosstalk:

Optical fibers from a dielectric waveguide and are therefore free from electromagnetic interference, radio frequency interference, or switching transients giving electromagnetic signals.

Ruggedness and flexibility:

 Although protective coatings are essential, optical fibers may be manufactured with very tensile strengths. Perhaps surprisingly for a glassy substance, the fibers may also be bent to quite small radii or twisted without damage.
  

Sunday, April 24, 2011

What is Antenna?


For two way communication, the same antenna can be and often is used for both transmission and reception. This is possible because any antenna transfer energy from the surrounding environment to its input receiver terminals with the same efficiency that it transfers energy from the output transmitter terminal into the surrounding environment,



 assuming that the same frequency is used in both directions. Put another way. Antenna way, antenna way, antenna characteristics are essentially the same whether an antenna is sending or receiving electromagnetic energy.        

Friday, April 22, 2011

What is Medium Access Control?


The basic MAC protocol for IEEE 802.11 is carrier sense multiple access with collision avoidance. In this case, the coordination decision is distributed over all the stations. In addition to this, the standard specifies a centralized MAC algorithm, called the point coordination function.

Which is built on top of the distributed algorithm? PCF provides contention-free service and is primarily intended for configurations in which a number of wireless stations are interconnected with each other and some sort of base station that attaches to a wired backbone. This is especially useful if some of the data is time sensitive or high priority.

Distributed Coordination Function:

  1. CSMA/CA used for access control
  2. when a collision is detected, a random back off timer is set
  3. Positive acknowledgements are used.

Point Coordination Function:

  1. built on top DCE, the point coordinator uses DCE to seize the medium
  2. A point coordinator determines which station currently has the right to transmit by polling.


Thursday, April 21, 2011

Internal Structure of Optical Fiber


The internal structure of the optical fiber are making with a lot of materials. It has a combination of glasses, a tube. The quartz rod, having undergone the modified chemical vapor deposition process, is now placed vertically in a drawing tower where  it is further heated and drawn downward by means of a computer-controlled melting and drawing process which produced  a fine, high quality fiber thread approximately 125 micro meter in diameter and about 6.25 km in length.


The optically pure center, called the core is surrounded by less optically pure quartz called the cladding. The cladding is approximately 117micro meter of boundary material formed during MCVD process. All data concerning the fiber is then measured and recorded. This data is stored with the spool of fiber as a permanent record. The is coated during the drawing process with polyethylene or epoxy for protection, and in some instances color coding is applied, according to the users needs          

Wednesday, April 20, 2011

The importance of optical fiber technology


Optical fiber technology is very important for our high speed communications. The optical with its low weight and high frequency characteristics (approximately 40 GHz) and its imperiousness to interference from electromagnetic radiation, has become the choice for all heavy demand long line telephone communication systems.

The reason why optical fiber used is as follows:
  
The light weight and noncorrosiveness of the fiber make it very practical for aircraft and automotive applications

A single fiber can handle as many voice channels as a 1500- pair cable can.
      The spacing of repeaters from 35 to 80 km for fibers as opposed to from 1 to 1 and1/2 km for wire is a great advantage.

      Fiber is immune to interference from lightning cross talk and electromagnetic radiation.    
             

          Tuesday, April 19, 2011

          Different Characteristics of Switching System


          There are different characteristics of circuit switching and packet switching. There characteristics are as follows:

          Characteristics of circuit switching:

          1. Need 64 Kbps channel for voice transmission.
          2. 8 Kbps used for framing, so uses bandwidth is 56 Kbps. 3.Circuit switching support analog and digital signals at a time. 4. 24 dso (Every digital signal channel is known as dso) make 1 multi channel trunk.


          Characteristics of  Packet switching:

          1. Message broken into smaller unites or packets. 2. Source and destination address in packet header. 3. Connectionless, packets routed independently. 4. Packet may arrive out of order.

          Different types of switching System


          There are two types of switching system, these are as follows:

          Circuit Switching:
          It is the most familiar technique used to build a communication network. Used in ordinary telephone lines and it allows communications equipment and circuits to be shared among users. Each user has the sole access to a circuit during network use.

          Packet Switching:

           A network technology that breaks up a message into small packets for transmission, unlike circuit switching, which requires the establishment of a dedicated point to point connections each packet in a packed switched network contains a destination address. Thus all packets in a single message do not have to follow the same path. Packet can arrive out of order. Destination computer reassembles the packets into their proper sequence.   

          Sunday, April 17, 2011

          Free PC error Software Download Technique..


          Anyone could go to a computer store and search for such software, but the internet has rendered such a trip unnecessary. Today, one can download PC error software and immediately put it to use. There are several free versions that can simply be downloaded. There are even more that offer a free trial before purchase period. Or, if one is sure which title he/she desires, many will allow an immediate download of the full version as soon as payment is made.

          Before downloading, one should read up on several different titles and understand their features. There are many different titles out there. Each one has some unique quality that sets it apart from the others. Some are better than others. One should review several and choose from the best rated and reviewed ones to ensure getting his/her money's worth.

          One should certainly know what features are absolute must haves in the PC error fix software one chooses in order to narrow the field down. One thing that should really be considered is how the software will repair registry errors. Sometimes, allowing the software to automatically change everything it perceives as an error can cause even worse problems. Yet, an operator who is not familiar with the registry and registry keys can do a great deal of damage trying to clean it up manually.

          The best PC error software download will likely list the errors out and offer the operator the choice of which one's to delete or change. The very best will also explain what each erroneous entry goes to and what change is recommended. In this way, the operator maintains control over the system without risking the creation of a major error that can render the computer completely useless by preventing it from booting up properly.

          Saturday, April 16, 2011

          The importance of fading


          Perhaps the most challenging technical problems facing communication system engineers are fading in a mobile environment. The term fading refers to the time variation of received signal power caused by changes in the transmission medium or paths. In a fixed environment, fading is affected by changes in atmosphere conditions, such as rainfall, but in a mobile environment, where one of the two antennas is moving relative to the other. The relative location of various obstacles charges over time creating complex transmission effects.

          Types of fading:

           1. Fast fading
           2. Slow fading
           3. Flat fading
           4. Selective fading.

          Saturday, April 9, 2011

          The procedure of running your Laptop fast


           
          If you want to keep your computer fast and easily run it than you had to follow some tips. Without these types of tips you can not running your computer fast. These types of tips are as follows:

          Too many programs:
          Your computer memory is also known as RAM or random access memory is must be unlimited. When you raining too many program in your computer in you’re at that time the memory of the computer used fully so that reason your PC became slow. In that case you might be increased your RAM or you can delete some unnecessary programs. I think it is better to go for increased your RAM.
          Mala-wares, Viruses and Spy-ware:

          There are so many programs which make your computer slow down and destroy your important data and also can damaged your hard disk. The mala-wares, various types of viruses and spy- wares are very dangerous for your pc. For avoiding these problems you must installed anti-mala-wares, anti-viruses and anti- spy-ware software. 

          Hardware:

          So many people forget about hardware problems because they don’t know a damaged hardware is always a bad hardware. If you used special software for your pc but your hardware is not good enough for supporting it more in that case you can protect your hardware also. Someone must protect his hardware from bumps, high temperature, drops etc.

          Sunday, April 3, 2011

          Security system used in Museum.

           Museum Security Sector in the long struggle with the criminals continue to improve preventive measures, additional material from the first anti-air defense to the development of civil air defense, anti-matter anti-added technology, technology is also on the collection of protection against its constant development. Museum collection with a natural, historical, scientific, cultural and artistic value of the rich collection is a valuable non-renewable resource.

          Study of its history, outstanding cultural heritage, dissemination of scientific and cultural knowledge, Education the masses, is of great significance and role. It's fine to attract people to visit and study. Also attracted the attention of lawless greed, they attempt to Theft Collections to achieve their dreams of riches. Therefore, protecting the collection became the responsibility of the museum.

          Museum Security and Protection is to make criminals away from the collection to collection from the criminals Damage and steal the fight produced and developed. I. Review of Museum Security and Protection (A), in the fight against criminals and produce been generated from the museum, there are certain evil hands of criminals to stretch their collections.

          Increase of anti-air defense to protect the museum collection of the early important means. Increase of anti-air defense deficiencies have time and space. In the August 15, 1959 Wu Qinghui thieves sneaked into the compound with high walls, and a very strong force to defend the Palace

          Ministry of Public Security 1982 First Research Institute, under the anti-theft alarm at the development of technology for the Forbidden City Hall installed a lot of active infrared, passive infrared, microwave, ultrasound, voice and other anti-theft Detector To form a variety of detection means of anti-theft alarm system, burglar alarm to a new level of technology. Since then, the evil hands of criminals repeatedly stretched David, but because of the installed alarm to play a role, watch keeping personnel immediately arrived at the scene and arrested him. This is the anti-theft alarm system Forbidden role; its deterrent effect is even greater. (2), universal and norms 84 years after the security technology to prevent spread in China has entered a stage with the increase, and rapid development.

          Have various museums, banks, shopping malls, supermarkets, housing estates have gradually established a Security and Protection System, such as the Revolutionary Museum, the Museum of History, Lu Xun Museum, the Capital Museum, Museum of Liaoning, Fujian Museum, Shanghai Museum, Shenzhen Museum, Museum of Chinese technology China Business is OK, the Potala Palace are all established

          The Imperial Palace has established a comprehensive Fireproof Security, preventive security technology television monitoring system. 84 years in particular, the 35th anniversary of National Day to strengthen security work, the establishment of a television monitor in Tiananmen Square project on the work of our security technology has fueled anti-defense role. Since then into the TV monitor technology have anti-theft alarm system and urban traffic control, which improves system functionality. 92 on September 18 took place in Kaifeng large cultural theft, 69 artifacts were stolen, the case named "918," the case.

          Offenders forced open the window into the exhibition hall will showcase the top step in with a pre-tested against the anti-technology means more than one passive infrared detector cover, loss of alarm function, so that theft succeed. People have gained a lot of inspiration, noted the importance of prevention perimeter. Meanwhile, in the protection zone and the restricted area with 3 or more detectors with different detection principles to build more lines of defense, at the same time block the function of

          Anti-detectors have appeared, and to promote technological development of intrusion detectors. A deeper appreciation of property is the basis for defense, civil air defense is the guarantee against its construction technology platform can play a role, otherwise the advanced security technology to prevent, discover the criminals could not catch him, will still be stolen heritage . Understanding to overcome one-sidedness, but also promoted the cause of security technology to prevent development. With the development of future technology showcase, a showcase alarm uprising is widely used, but also to improve the Museum Security and Protection is an important part.