
Sunday, November 16, 2008
Cray XT Jaguar: The New Worlds Fastest Supercomputer

Saturday, November 8, 2008
Optical Fibre Communication technology - Communicating at lightning speed.
The lights used to guide ships at sea are another way of using light as a signal. Each light gives out flashes of different timing and length so that sailors can tell which light they are seeing many kilometres away – just by timing the light and looking it up in a guide book.
But there are some major problems with using light this way to send messages. For one thing, even very powerful lights such as those used at sea (which can have millions of candlepower) can only be seen from a relatively short distance. This is partly because the Earth is curved, and partly because as light radiates out from a source it gradually becomes weaker because of the effects of dust and smoke in the air and because of the inverse square law of radiation.
A cleverer way of using light to send messages is to push it through a pipe – much in the same way as water is moved around through pipes. This is where 'light pipes' – better know as optical fibres – come in. Optical fibres are long strands of transparent material which let the light pass through the middle. Of course, the light tries to get out (left to itself, light will always travel in a dead straight line) but the outer walls of the optical fibres act like a continual tube of mirror. So the light travels along the fibre bouncing off the mirror-like outer casing until it arrives at the other end of the fibre.
These optical fibres – which are thinner than a human hair – work when bent around corners, laid underground or even laid on the ocean floor. And because the light is contained within the walls of the fibre and can't disperse or radiate away, it takes very little light energy to send a signal over a long distance. In theory, if you had a single optical fibre that ran right across Australia, you could use a torch to flash a message to a person watching the other end! Also, as light travels at about 300,000 kilometres per second, you could use your torch to flash a signal right around the world in next to no time.
Of course, actually doing it is much more complicated than that, but that is the principle on which it works.
Three questions had to be answered when optical fibres were considered for use in telecommunications.
- How does light behave when it is sent through a long fibre?
- What sort of physical equipment do you need to make it work?
- How are you going to use the flashes of light to carry a message?
How light behaves
When light passes down an optical fibre, it continues to travel in straight lines – until it hits the mirror-like side of the fibre and bounces off. It then travels in a straight line again until it bounces off another part of the fibre wall. Because of the angle of reflection, the light cannot go back on itself so it must always go in the same direction, bouncing its way along until it reaches the end. Various things affect the way the light is transmitted – including the quality of the original light source, the exact composition of the transmitting fibre, and the material used for the walls of the fibre. Each of these qualities must be understood in order to predict what the light will do under differing circumstances.
What sort of equipment do you need?
To send a flash or 'pulse' of light along an optical fibre you need something to generate the light in the first place. You could use a hand-held torch but this would be very slow and inefficient. The optical fibre communications network uses lasers to generate a suitable light source. Lasers can produce very tightly focused pulses of light – and they can do it many times a second. The pulses are then picked up at the other end of the fibre by a light-sensitive cell which can convert the pulses of light into pulses of electricity. These pulses of electricity are then fed into a computer and decoded to reveal the message.
Using the flashes of light to carry a message
Simply flashing messages down an optical fibre on the 'one flash for yes, two flashes for no' principle would take a very long time. So, complex digital codes have been worked out to take advantage of the very high speed and volume of data that can be sent through an optical fibre. Using a standard commercial system, it is possible to send the entire contents of the 32 volumes of the Encyclopaedia Britannica through an optical connection in less than one second! In fact, using a combination of codes, many messages can be sent along an optical fibre at the same time.
In many ways, optical fibre systems work in the same way as electrical cables but they are cheaper, more reliable and much, much faster.
Optical fibres are now used in many telecommunications systems, so the next time you pick up a phone to speak – or use a computer modem to send a message – you may well be using an optical fibre system to do it.
Wednesday, October 29, 2008
Tuesday, October 28, 2008
mGuard Theft Recovery for your mobile phone
mGuard provides protection and safety from theft or loosing your cellphone device and helps to retrieve it back. Now the users can forget the fear of loosing their phone by protecting it using mGuard Software. As of now, mGuard is the world’s only Theft Recovery Software for Java phones(J2ME, JavaME, MIDP cellphones). mGuard does not rely on Bluetooth, GPRS or GPS for its functionality and hence it can be used on mobile phones and areas where these are unavailable. SMS based Remote Control and spy on the stolen phones will be possible on the next release of mGuard. The complete documentation is available at www.dexmobile.com in PDF format. | ||||||||||||||||||||||
| ||||||||||||||||||||||
| ||||||||||||||||||||||
Make sure to enable Messaging and autostart permissions after installation. You can get a free unlock code from www.dexmobile.com |
Wednesday, October 22, 2008
Google announces Android mobile platform
Google on Monday announced a widely expected open-development platform for mobile devices backed by industry heavyweights like T-Mobile, HTC, Qualcomm and Motorola that could shake the wireless market to its core by simplifying and reducing the cost of developing mobile applications. The platform, called Android, has been developed by Google and others as part of the Open Handset Alliance, which has over 30 partners supporting it. The goal of this ambitious initiative is to spur innovation in the mobile space and accelerate improvements in how people use the Web via cell phones. The open-source platform will have a complete set of components, including an operating system, middleware stack, customizable user interface and applications.
The first Android-based phones should hit the market in the second half of 2008. The platform will be made available under an open-source license that will give a lot of flexibility to those who adopt it to modify its components and design services and products, Google said. Other founding members of the alliance include Broadcom, eBay, China Mobile, Intel, LG Electronics, NTT DoCoMo, Nvidia, Samsung, Sprint Nextel, Telecom Italia, Telefonica, Texas Instruments and Wind River. Noticeably absent from the list is traditional Google ally Apple, whose popular iPhone might see its innovation lead cut sooner than expected thanks to this Google effort. It looks we will see Google products everywhere sooner or later…
Source: PC World, Computerworld, releaselog
Monday, October 20, 2008
Worlds Best Download Manager-IDM
The best way to handle your downloads and increase download speeds. Added full support for Windows Vista, YouTube, Google Video, MySpaceTV, IE7 and Firefox.
Download Youtube Videos in a Flash with Internet Download Manager 5.14
Download Here
MediaFire Mirror
Installation Procedure
======================
step 1: Go to C:\WINDOWS\system32\drivers\etc\
(To do this Just copy the above address and paste it in RUN window , if You have Installed your OS in C: Drive )
step 2: Backup the hosts file (Copy and Paste it to My Document Folder)
step 3: Open the hosts file in Notepad (Use Open With)
step 4: Enter the text bellow to end (You can use any IP without IDM site IP - I recommend to Use the Router address Eg: 192.168.1.1 my router)
You can see how my one is appears ar hosts.txt file and make your one accordingly.
192.168.2.1 www.internetdownloadmanager.com
192.168.2.1 http://www.internetdownloadmanager.com/
192.168.2.1 http://internetdownloadmanager.com/
step 5: Save and Close
{{{ After edit with notepad it's like this
127.0.0.1 localhost
192.168.2.1 www.internetdownloadmanager.com
192.168.2.1 http://www.internetdownloadmanager.com/
192.168.2.1 http://internetdownloadmanager.com/
}}}
step 6: Restart the computer
step 7: After restart install internet download manager
step 8: After install open internet download manager
step 9: In registration menu click registration
step 10: Now run keygenerator
step 11: After register open ur browser and try to visit www.internetdownloadmanager.com
step 12: If browser dont go to the Above THREE URLs, everything is successfull.
If you want any help contact me
harshana84sl@gmail.com
Monday, October 13, 2008
Applications of ARTIFICIAL INTELLIGENCE
- Gaming
- You can buy machines that can play master level chess for a few hundred dollars. There is some AI in them, but they play well against people mainly through brute force computation--looking at hundreds of thousands of positions. To beat a world champion by brute force and known reliable heuristics requires being able to look at 200 million positions per second.
- Speech recognition
- In the 1990s, computer speech recognition reached a practical level for limited purposes. Thus United Airlines has replaced its keyboard tree for flight information by a system using speech recognition of flight numbers and city names. It is quite convenient. On the the other hand, while it is possible to instruct some computers using speech, most users have gone back to the keyboard and the mouse as still more convenient.
- Understanding natural language
- Just getting a sequence of words into a computer is not enough. Parsing sentences is not enough either. The computer has to be provided with an understanding of the domain the text is about, and this is presently possible only for very limited domains.
- Computer vision
- The world is composed of three-dimensional objects, but the inputs to the human eye and computers' TV cameras are two dimensional. Some useful programs can work solely in two dimensions, but full computer vision requires partial three-dimensional information that is not just a set of two-dimensional views. At present there are only limited ways of representing three-dimensional information directly, and they are not as good as what humans evidently use.
- Expert systems
- A ``knowledge engineer'' interviews experts in a certain domain and tries to embody their knowledge in a computer program for carrying out some task. How well this works depends on whether the intellectual mechanisms required for the task are within the present state of AI. When this turned out not to be so, there were many disappointing results. One of the first expert systems was MYCIN in 1974, which diagnosed bacterial infections of the blood and suggested treatments. It did better than medical students or practicing doctors, provided its limitations were observed. Namely, its ontology included bacteria, symptoms, and treatments and did not include patients, doctors, hospitals, death, recovery, and events occurring in time. Its interactions depended on a single patient being considered. Since the experts consulted by the knowledge engineers knew about patients, doctors, death, recovery, etc., it is clear that the knowledge engineers forced what the experts told them into a predetermined framework. In the present state of AI, this has to be true. The usefulness of current expert systems depends on their users having common sense.
- Heuristic classification
- One of the most feasible kinds of expert system given the present knowledge of AI is to put some information in one of a fixed set of categories using several sources of information. An example is advising whether to accept a proposed credit card purchase. Information is available about the owner of the credit card, his record of payment and also about the item he is buying and about the establishment from which he is buying it (e.g., about whether there have been previous credit card frauds at this establishment).
Friday, October 10, 2008
Interactive art
Interactive art is a form of art that involves the spectator in some way that experience the reality. Some objects achieve this by letting the observer walk in, on, and around the piece. Digital art are highly interactive. Sometimes viewers are able to navigate through a virtual environment.
Interactive art can be distinguished from Generative art,Electronic art or Immersion art in that it is a dialog between the piece and the participant;. In contrast, Generative Art tends to be a monologue -- the artwork may change or evolve in the presence of the viewer, but the viewer may not be invited to engage in the reaction but "merely" enjoy it.
In terms of the creation of agency, unique interface design, electronic artists are at the forefront of the artistic exploration of interactivity. Such artists have been early adopters of new interfaces and techniques for obtaining user input (such as dog vision, alternative sensors, voice analysis, etc.); new forms and tools for information display (such as video projection, lasers, robotic and mechatronic actuators, etc.); new modes for human-human and human-machine communication (through the Internet and other telecommunications networks); and new social contexts for interactive systems (including but not limited to utilitarian tools, formal experiments, games and entertainment, social critique, and political liberation).Interactive art also can used to virtually restore ancient artifacts.
Wednesday, October 8, 2008
Wearable computers
One of the main features of a wearable computer is a constant interaction between the computer and user. Another feature is the ability to multi-task. It is not necessary to stop what you are doing to use the device. it is augmented into all other actions. It can therefore be an extension of the user’s mind and/or body.
Wearable Computing is very useful for military purposes, which military personal can interact directly with the device without blocking the mind in the middle of the war field.