Apple Computer, Inc. was founded by Steven Jobs and Stephen Wozniak in Jobs garage in Los Altos, California, In November of 1975, Wozniak finished assembling the Apple I-a modest device that consisted of a motherboard, a keyboard, and a display. The advantages to the Apple I were simplicity, price, neatness, and reliability. The disadvantage was that it used the 6502 MOS Technologies microprocessor chip, a cheaper alternative to the popular Intel 8080 chip. After the Apple I was released,...
Now days in much country the car traffic is a very big problem. One of the reasons for congestions is that the road capability is not optimally used. This leads to the expansion of Routing systems which use self-motivated information about the current state of the road network. By avoiding crowded roads and using substitute ways instead the network capability is browbeaten in a more optimal way. Cars that use such a Routing system are routed around the congestions. And if many cars use...
This technical paper represents the technology and the features available on Xbox console player. The elaboration on this paper will cover the architecture, hardware and software and also the technical specification on the Xbox 360. Microsoft's first video game console, the Xbox, has sold more than 20 million units worldwide since its introduction in 2001. Despite the Xbox's impressive power, the list of big-name video game titles to support it and the success of the Xbox's online component,...
Computing technology is in a state of continuous evolution. The state of the art computing paradigm called pervasive computing envisions a conglomeration of smart devices like sensors,wearable computers, etc seamlessly integrated and scattered in the environment. The ultimate goal is to enable ANY TIME ANY WHERE computing. In this paper we have proposed a new mechanism for the detection of silent heart attacks and providing an alert. The silent heart attack belongs to the high risk category....
In earlier versions of Linux, you could set permissions to files and directories at owner-level, group-level, and at user-level. However, you could not set varied levels of user permissions in which one user had read permission, while another set of users had read and write permissions. Red Hat Enterprise 5 makes varied levels of user permissions possible by providing the Access Control Lists (ACLs) feature. ACLs allow you to provide different levels of access to files and directories for...
In the era of digital transaction, in order to transact the data in a more secured manner the need for a cryptographic algorithm is inevitable. There are numerous number of cryptographic algorithms which makes the system invulnerable from the attacks of intruders and eavesdroppers. Rivest Cipher4 algorithm is one such cryptographic algorithm which is very well known for its performance and simplicity. In this paper, we propose a software toolkit for increasing the key strength so that it...
In the generation of information overloaded, text documents, digital files, images, audios, etc. all kinds of information flood our daily lives. However, when people accomplish information searching, textual retrieval system is still the mainstream system to use. Why the textual retrieval system is still important? This is because of the increased amount of electronic information are most derived from documents or newspapers. This paper is focusing on the working principle and characteristics...
A range is basically refers to a range of mathematics, where you have a set of ordered elements, you have to specify a defined start and end elements, a subset of these elements. Range between the start and end points, inclusive and representative of all the elements. Is usually in the range is within the range of key (row). Piece of the term is used to refer to the column within the line. When you specify a range, query and use random partition really no way to specify a more narrow range than...
On video compression, motion-compensated prediction is used to reduce the temporal redundancy in the video frame sequences. Among motion estimation methods, the Block- Matching Algorithm (BMA) seems to be the most popular method for its effectiveness and simplicity to apply on both software and hardware implementations. BMA is also used widely in all current international video compression standards such as MPEG-1, MPEG-2, MPEG-4, H.261, and H.263. Basically, each frame image is divided into...
A robot is an automatically guided machine, able to do tasks on its own. Another common characteristic is that by its appearance or movements, a robot often conveys a sense that it has intent or agency of its own. The word robot can refer to both physical robots and virtual software agents, but the latter are usually referred to as bots. There is no consensus on which machines qualify as robots, but there is general agreement among experts and the public that robots tend to do some or all of...