Happy Earth Day
Culture , History / April 22, 2018

Earth is a common expression for the planet earth in a number of countries and regions, which reflects the interdependence that exists among human beings, other living species and the planet we all inhabit. The Earth and its ecosystems are our home. In order to achieve a just balance among the economic, social, and environmental needs of present and future generations, it is necessary to promote harmony with nature and the Earth. International Earth Day is celebrated to remind each of us that the Earth and its ecosystems provide us with life and sustenance. This Day also recognizes a collective responsibility, as called for in the 1992 Rio Declaration, to promote harmony with nature and the Earth to achieve a just balance among the economic, social and environmental needs of present and future generations of humanity. What is Earth Day? Earth Day is an event celebrated every year on the 22nd of April. The event is held worldwide to celebrate support for protection of the environment, and has continuously drawn more and more people in each subsequent year. Earth Day brings attention to a large number of issues in requirement of attention, such as pollution of the ocean, debris left…

What is Post office protocol 3 (POP3)?
Networking , Technology & Science / April 21, 2018

Electronic mail is the core of modern communications. People rely on email to conduct their business and stay in touch with families. The ubiquity of an email availability is one of the strengths of the internet whose phenomenal growth and popularity are also due to the popularity of an email. E-mail system has become the most popular computer based method used to send and receive E-mail messages between the network clients inside or outside the local network. The most important point in E-mail system processes is to send and retrieve the E-mail message in the best delivery time without any delay or latency. Overview of POP 3? Post Office Protocol version 3 (POP3) is a standard mail protocol used to receive emails from a remote server to a local email client. This protocol is generally used for receiving email over the Internet. POP3 server must be connected to read email from an email account. After connected with the server, all the email messages in an email account are numbered from 1 and the particular account is locked. This specified number identifies email in the given account. The account number is not changed even if the mail is deleted but the account number…

What is Object Oriented Database?
Database , Technology & Science / April 20, 2018

Databases fulfill several roles in the process of building computer applications. Like a file system, databases provide the means to store data between invocations of an application (i.e. persistence). Database systems, however, provide additional services not supported by most, if not all, file systems. History of data processing goes through many different changes with different technologies along with the time. In decade there is huge increase in the volume of data that need to be processed due to which sometimes old technology do not work and need to come with new technology to process the data. Overview of Object Oriented Database Object Oriented Databases stores data in the form of objects. An Object is something uniquely identifiable which models a real world entity and has got state and behaviour. In Object Oriented based Databases capabilities of Object based paradigm for Programming and databases are combined due remove the limitations of Relational databases and on the demand of some advanced applications. Object oriented databases are also called Object Database Management Systems (ODBMS). Object databases store objects rather than data such as integers, strings or real numbers. Objects are used in object oriented languages such as Smalltalk, C++, Java, and others. Objects…

What is Web Analytics in Big Data Analytics?
Big Data , Technology & Science / April 15, 2018

Today, the web users surf many different websites regularly in the course of their daily lives. The usability and conversion rate of a website reflect the kind of experience the web users have on the website. The success of a website rides on the usability and conversion rate of the website. The higher the usability and conversion rate of the website, the better the website is functioning. Web analytics consists of a series of metrics and techniques which are used by webmasters to gauge their website’s usability and conversion rate. What is web analytics? Web analytics is the measurement, collection, analysis, presentation and interpretation of information about visitors of web sites for the purpose of their improvement and optimization. The main task of web analytics is to monitor traffic of the website, on the basis of which the web audience is determined and the behavior of web visitors is studied in order to make decisions on the development and increasing of the functionality of a web resource. Web analytics is the measurement and analysis of data to inform an understanding of user behavior across web pages. Analytics platforms measure activity and behavior on a website, for example: how many users…

Dr B.R. Ambedkar (14th April 1891 – 6th December 1956)
History / April 14, 2018

The life and activities of every great thinker or activist, depend to a great extent on the various problematic conditions under which he/she lives and works and struggles to bring about desired changes. In the case of Ambedkar, this societal relationship is far more evident, as he was born in a community which, for centuries, had been subjected to deprivations, miseries, humiliations, oppression’s and denials in every worthy aspect of human life. General Overview Dr. Ambedkar’s thoughts as reflected in his writings and speeches have significant importance in tracing the history and growth of social thought in India. In the course of time so many of his publications are not even available in the market. In some cases the authentic editions are getting out of print. Besides, as time passes, many of his observations in matters social, economic and political are coming true. Social tensions and caste conflicts are continuously on the increase. Dr. Ambedkar’s thoughts have therefore, assumed more relevance today. If his solutions and remedies on various socioeconomic problems are understood and followed, it may help us to steer through the present turmoil and guide us for the future. It was therefore very apt on the part of…

What is Access Control in Network?

The need for network security is a relatively new requirement. Security incidents are rising at an alarming rate every year. As the complexity of the threats increases, so do the security measures required to protect networks. Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security industry standards, as mechanisms of protection and prevention, at three levels or layers: Physical, personal and organizational. Overview of Access Control Access control is generally a policy or procedure that allows, denies or restricts access to a system. It may, as well, monitor and record all attempts made to access a system. Access Control may also identify users attempting to access a system unauthorized. It is a mechanism which is very much important for protection in computer security. Access control approaches determine how users interact with data and other network resources. Furthermore, access control measures ensure data are protected from unauthorized disclosure or modification. Access control is the traditional center of gravity of computer security. It is where security engineering meets computer science. Its function is to control which principals have access to which resources in the system—which files they can read, which…

What is Virtual Reality in Computer Graphics?

Virtual Reality is a major asset and aspect of our future. It is the key to experiencing, feeling and touching the past, present and the future. It is the medium of creating our own world, our own customized reality. Modeling is used to build structures that serve as proxies for other objects. Virtual reality is more than just interacting with 3D worlds. By offering presence simulation to users as an interface metaphor, it allows operators to perform tasks on remote real worlds, computer generated worlds or any combination of both. The simulated world does not necessarily have to obey natural laws of behavior. Such a statement makes nearly every area of human activity a candidate for a virtual reality application. However, we can identify some application areas were benefits are more straightforward than others. Overview of Virtual Reality A virtual reality system is essentially an interactive simulation that can represent a real or abstract system. Virtual Reality (VR) is the use of computer graphics and other technologies to create a simulated environment in which the user interacts.  While computer graphics supplies the visual component of the experience via a normal screen, a stereoscopic display, or head‐mounted technology; a variety of other devices…

What is Multimedia Database in Computer Graphics?

The exponential growth of the technological advancements has resulted in high-resolution devices, such as digital cameras, scanners, monitors, and printers, which enable the capturing and displaying of multimedia data in high-density storage devices. Furthermore, more and more applications need to live with multimedia data. However, the gap between the characteristics of various media types and the application requirements has created the need to develop advanced techniques for multimedia data management and the extraction of relevant information from multimedia databases. At the heart of multimedia information systems lies the multimedia database management system. Everyone deals with multimedia at every walk of lives. We work with multimedia and are surrounded by multimedia. Due to the advancement of modern computer and information technology, multimedia systems play more and more impact on our lives. Overview of Multimedia Database Multimedia database is a kind of database like any other databases containing multimedia collections. Multimedia is defined as the combination of more than one media, they may be of two types–static and dynamic media. Text, graphics, and images are categorized as static media; on the other hand, objects like- animation, music, audio, speech, video are categorized as dynamic media. Graphic images may consist of cliparts, photographs,…

What is HIPERLAN in Wireless Network?
Networking , Technology & Science / April 8, 2018

There has been a remarkable growth in the field of wireless communication standards. Wireless networks are becoming popular as they allow users, the ability to remain connected while on the move.  These wireless standards are characterized based on their range, maximum signal rate, number of channels, channel bandwidth, data protection, frequency band, Quality of Service (QoS) and applications. Overview of HiperLan HIPERLAN is a European (ETSI) standardization initiative for a HIgh PERformance wireless Local Area Network. Radio waves are used instead of a cable as a transmission medium to connect stations. Either, the radio transceiver is mounted to the movable station as an add-on and no base station has to be installed separately, or a base station is needed in addition per room. The stations may be moved during operation-pauses or even become mobile. The maximum data rate for the user depends on the distance of the communicating stations. With short distances (<50 m) and asynchronous transmission a data rate of 20 Mbit/s is achieved, with up to 800 m distance a data rate of 1 Mbit/s are provided. For connection-oriented services, e.g. video-telephony, at least 64 kbit/s are offered. The standard serves to ensure the possible interoperability of different…

What is Secure Hash Algorithm (SHA) in Network Security

Cryptographic hash functions cannot be thought of outside mathematics. Cryptographic hash functions are a valuable tool in cryptography. They are applied in many areas of information security to provide protection of the authenticity of messages; data integrity verification which prevents modification of data from going undetected, time stamping and digital signature scheme. The hash functions that are used in various security related applications are called cryptographic hash functions. Secure Hashing Algorithms, also known as SHA, are a family of cryptographic functions designed to keep data secured. Overview of SHA The SHA i.e. Secure Hash Algorithm is basically based on the concept of hash function. The basic idea of a hash function is that it takes a variable length message as input and produces a fixed length message as output which can also be called as hash or message-digest. The trick behind building a good, secured cryptographic hash function is to devise a good compression function in which each input bit affects as many output bits as possible. In computer cryptography, a popular message compress standard is utilized known as Secure Hash Algorithm (SHA). Its enhanced version is called SHA-1. It has the ability to compress a fairly lengthy message and create…

Insert math as
Additional settings
Formula color
Text color
Type math using LaTeX
Nothing to preview