Wednesday, September 8, 2010

Tikon Username and Password

In The Tikona Digital Networks If You have other users username (Userid) and Password than you can easy Access it and one more Benefit is that Multi User Can Use that same username and password at time. that is not posssible in Reliance wimax.

Friday, August 6, 2010

How Neural Networks differ from Conventional Computer?

Neural Networks perform computation in a very different way than conventional computers, where a single central processing unit sequential dictates every piece of the action. Neural Networks are built from a large number of very simple processing elements that individually deal with pieces of a big problem. A processing element (PE) simply multiplies an output value (table lookup). The principles of neural computation come from the massive processing tasks, and from the adaptive nature of the parameters (weights) that interconnected the PEs.

Wednesday, August 4, 2010

dot net framework 2.0

.net Framework 2.0 having mainly two component 
1.CLR (Common Language RunTime)
>>CLR is main component of the .net framework
>>CLR provide basic execution environment for framework.
>>CLR is automatically remove unused object so we not need to write any special program for that purpose.
2.BCL (Basic Class Library)
>>BCL is basic building block of .net framework.
>>BCL contain collection of  basic class for every language which are used for programing purpose. 

Sunday, July 11, 2010

Satellites in HEO

Satellites in HEO constellations orbit the Earth in planes that are inclined nominally 63,4° against the equatorial plane.This is necessary in order to keep the apogees in the most northern (southern) positions within their elliptical orbits.Typically HEO orbital periods are between 8 and 24 hours. HEO satellites are normally active only about their apogees where they appear nearly stationary to an earth observer for about eight hours, and then have to hand over to a following satellite.The satellites belonging to one particular system appear in time shift in the same celestial region. In the HEO track is sketched in profile showing at every point the true distance to the Earth's surface. In this specially depicted case, the orbital period is 12 hours and the satellites  appear
alternatively at the opposite sides of the rotating globe. Therefore the illustrated HEO track reaches a maximum height at both ends above the geographical latitude of 63,4° North. At both upper ends (solid line), the satellite payloads are active. The dotted line constitutes the part where the satellite payloads are (typically) switched off. For comparison, see figure 2, where two HEO loops are indicated corresponding
to the two ends in profile in figure 1.Under the above conditions, the HEO apogee (maximum height above the Earth's surface) can be up to 42 000 km.However the maximum range to the Earth's surface is in the order of 47 000 km resulting in a maximum propagation delay of the order of 310 ms. HEO satellites reach high relative speeds during their active phase (order of magnitude:2 km/s), so that the Doppler shift (1.3 x 10-5 of radio frequency and bit rate) cannot be neglected: the radio frequency
shift is mainly due to the microwave feeder link and is of the order of 50 kHz for C-band feeder links. The satellite motion is mainly radial relative to the user community, so that common compensation of the Doppler main component is feasible.Irrespective of any user roaming, HEO systems require handover from the descending to the ascending satellite typically every eight hours. Depending on the specific system design, the distance to the two satellites at handover could be significant and a jump in path length cannot be excluded. However, a large Doppler jump will always happen.Within Europe HEO satellites can appear near the zenith. Therefore the user can work under vertical line-of-sight condition for most of the time, with blockage only being experienced in tunnels or under bridges, trees, etc. However vertical propagation is not very good within multi-storey buildings and hence paging, alerting, etc. may not be  satisfactory.
Because vertical propagation can be in principle multipath-free, high data rate services are possible for outdoor operation.A number of HEO orbits have been studied extensively and given names such as "Molnya", "Tundra", and "Loopus".

Satellites in GSO

GSO satellites orbit the Earth in the equatorial plane with the same angular velocity as the Earth at a height of about 36 000 km above the equator. Geostationary satellites therefore appear stationary to an earth-bound observer  and a single satellite can provide continuous service to roughly one third of the Earth's surface (but excludingpolar regions above ± 75 degrees of latitude). The maximum distance the satellite can "see" on the Earth's surface is about 42 000 km and means the propagation delay for a single hop via the satellite (once up and down) can be up to 280 ms. Geostationary satellites also move about their nominal positions causing a small but noticeable Doppler shift on both the feeder and mobile links.For personal and vehicle terminals, handover during a call between GSO satellites is unnecessary because the coverage is static and wide. However handover might be contemplated for aircraft terminals between different spot beams of the same satellite. In the latter case there is practically no difference in path length to consider. Within Europe, GSO satellites appear at low elevation angles. For the geographical latitude of 50°North (e.g.Luxembourg), the satellites reach approximately 31° elevation as a maximum when the satellite is due South: either East or West of this position the elevation slowly reduces. Frequent blocking of the line-of-sight signal therefore occurs from trees, buildings and hills. GSO satellites can work in such a shadowed environment but the satellite Equivalent Isotropic Radiated Power (EIRP) would have to be increased by 15 dB to 20 dB or more depending on the coverage required.This could be achieved but has a serious impact on the size and cost of the satellite. In addition, assuming that the mobile EIRP is limited, the satellite receive sensitivity also has to increase and this can only be done with very large spacecraft dish antennas. For this reason, only very low bit rate services (i.e. paging, alerting, etc.) might be viable under such circumstances until the user moves to a more favourable position to receive a voice call.

Friday, July 9, 2010

How to connect to pc in LAN ?

If you use windows xp than both pc must having windows xp operating system.  connect pc using ethernet cable.
start->Control Panel -> Network and Internet Connections -> Network Connections -> Local Area Connection -> Properties -> Internet protocol (TCP/IP) -> Properties 


Select Use the following Ip address Option in that fill
IP Address      192.168.0.1
   Subnet mask     255.255.255.0
   Default gateway 192.168.0.1
than OK.
Same Process in Second Pc but in that IP Address Range sholud
 be from 192.169.0.2 to 192.168.0.254
than OK.
After that in second pc start -> run -> cmd  
  ping  192.168.0.1 
 in 1st pc ping 192.168.1.2
 now both pc are connected in LAN.
 you can set permission of sharing what ever you want to sharing data. 

Tuesday, February 9, 2010

A BRIEF HISTORY OF VIRUSES

Over the past decades, the computer viruses have evolved through numerous avatars. From being rather 'dumb', they have developed into programs exhibiting surprising 'smart¬ness'. We give you an overview of how viruses have developed over time.

1950'S-1970:THE PRE-HISTORIC PERIOD

The viruses, as we know them now, actually started out in unpretentious surroundings of research laboratories. In the 1950's, researchers studied, what they called as-'Self-altering Automata' programs. Simple program codes were writ-ten to demonstrate rather limited characteristics. In a way, these programs were the pre-historic (in a manner of speaking) ancestors of the modern virus.

In the 1960's computer scientists at the Bell Laboratories had viruses battling each other in a game called Core Wars. The object of the game was to create a virus small enough to destroy opposing viruses without being caught. Like computers, viruses too were studied keeping in mind their military implications. Of course, several research foundations too worked on the non-military uses of viruses.

1970'S-1980:THE EARLY TIMES

This was the time when the term 'VIRUS' gained recognition by moving from the research labs to the living rooms of common users. Science fiction novels in the early 1970's were replete with several instances of viruses and their resultant effects. In fact, an entire episode of the famous science fiction TV series, Star Trek, was devoted to viruses. Around the same time, researchers at the Xerox Corp. demonstrated a self-replicating code they had developed.

By now, the use of computers had proliferated to include most government and corporate users. These computers were beginning to be connected by networks. Several or-ganizations began working on developing useful viruses which could help in improving productivity.

1980'S-1990:THE MIDDLE AGES

While on the one hand, the exponentially increasing use of computers and their availability proved to be a boon to the common users, on the other hand, the ugly faces of compu¬ter viruses also made their appearances. From the compu¬ter-science labs, viruses fell into the hands of cyberpunks -unprincipled programmers; who obtained sadistic pleasures from ruining computer systems across the globe.

Among the earliest instances of malicious uses of viruses was when Gene Burelon a disgruntled employee of a US securities firm, introduced a virus in the company computer network and managed to destroy nearly 1, 68,000 records of the corporate database. In October 1987, the (c) Brain virus, later to be known as the 'Pakistani' virus, was found to be working its way quietly through the computer systems in¬stalled at the University of Delaware. This was probably the first mass distributed virus of its kind. In 1988, the so-called Internet Virus was responsible for the breakdown of nearly 6000 UNIX based computers connected to the Internet network in the US. Other well known viruses that made their appearances were Cascade, Jerusalem, Dark Avenger, etc. During this decade, viruses were written to attack different operating software platforms such as, DOS, MAC, UNIX, etc.

1990'S-2004:THE CURRENT PICTURE

The early part of the 1990's was witness to development of sophisticated strains of existing viruses. It was more of a matching of wits between the developers of viruses and the developers of anti-virus programs. In addition to plugging the loopholes in existing viruses, a new family of viruses called the Macro Viruses also made their appearance. These viruses affected files created in the popular MS Word and MS Excel programs.
The decade of the 1990's has seen more and more virus developers writing stealth virus codes giving rise to sophis¬ticated viruses such as the Zero Hunt virus, the Michael Angelo virus, etc. In addition, viruses written to invade net¬worked environments have also come into being, in line with the increasing use of communication networks. The Year 2000 problem, in all probability, will generate families of new viruses which will come in the guise of Y2K solution pro¬grams.

2005-2015: THE EMERGING SCENARIO

The first decade in the next millennium will see the generation of the 'intelligent viruses' displaying fuzzy logic characteristics. These viruses will be programmed to alter their codes as and when they detect the presence of anti-virus programs. They will not only attack the traditional computer systems and communication networks, but also, software controlled components in cars, trains, air-traffic control systems, defense equipment, etc. The virus developers in all likelihood will include more and more young adolescents and even, children." Viruses will become the new tools of terrorism; giving rise to 'Cyber Terrorists'.

Since Internet will connect the farthest corners of the globe, the time it takes for a virus to proliferate will be greatly reduced. However, on the flip side, special software development tools will be available to common users to automatically develop anti-virus programs to counter most virus threats.