Lunes, Enero 30, 2012

Top 10 Future Gadgets.. Comment me for update

1.    Mobile Music Jewelry Concept

It is the futuristic mobile music concept unveiled by Mac Funamizu by thinking of letting you wear your music just like a bracelet on your wrist and enjoy listening to songs while flaunting around in front of people. Wearing such amazing transparent music around your wrist will not only give you abundant excitement and pleasure, but will also give you hi-tech accessory to revolutionize the fashion. This gadget also functions like a watch and the colors can be changed as per your mood. This transparent gadget can also be changed as per pattern where you can use your favorite photo on the background. The transparent screen of this gadget is very flexible and can be transformed into a device. If not on wrist, you can even put it in your pocket. Rest, the music will come from the earphones which will facilitate you with mind-blowing sound where you’ll feel like you’re sitting in a concert hall. So, don’t you think this gadget is ultra-cool.
Mobile Music Jewelry Concept

2.    USB Memory Stick (Multi-Light)

USB’s are widely searched by people as top 10 gadgets. So, if you are among those then probably this will interest you more. This memory stick is very funky and is again created by Mac Funamizu. This USB stick is made of transparent glass and enables the light to pass inside the glass due to which the glass starts glowing. This transparent USB memory stick features all those convenient functions that a memory stick basically holds. What is more attractive in this USB is its light that represents how much amount of data is stored in it. If there is no light then it means the USB is blank. When the lights fill the glass entirely, they indicate that there is no more space left. Also the colors represent the kind of data is stored in it. For instance, if pink color is visible then images are stored in the USB, Blue represents documents and green for movies. There are multiple colors which represent different data stored in the USB stick.
USB Memory Stick

3.    The Future Windows Phone

Hold your breath as now it’s time to know what’s behind the curtain. It’s the Windows Phone which could come in future and if it does, it would be entirely made of glass. This concept has the potential to transform its appearance just like a window and this depends on the weather condition. It senses the weather temperature and accordingly changes its window. This phone is designed very innovatively by keeping in mind the importance of clear, thin and transparent plastic sheet material. The plastic sheet gives clear appearance during summers and it changes to humid when the rain arrives. Also, it takes a dump outlook when snow falls down. If you want to text a message then you’ll just have to blow air on this device and your job will be done. So, isn’t it exciting? Well, there is no way you won’t get lured after seeing this breath-taking phone.
The Future Windows Phone

4.    Mobile Phone Concept (Entirely glassy)

It is another glass concept of mobile phone which is not that attractive like the Windows Phone, but has charm which cannot be overlooked. It is showed in two parts, the top glass is the screen which highlights at the top left side – network availability and at the top left is the battery symbol just like common phones. This phone displays photos and name when anyone calls you and will also give you an estimation that how much percent chances left to pick the call. The glass is separated by a metal edging. Apart from the transparent screen at the top, a transparent keypad is available at the bottom. This clamshell phone is designed by the Tokyo designer Mac Fanamizu by giving access to both the glass plates to display information. Due to the integration of two plates, the screen offers you great opportunity to see the illusion of 3D graphic presentation.
Mobile Phone Concept

5.    Digital Window (Futuristic device that shows information)

It is not a tablet, but is a device which seems just like a tablet. The uniqueness in this device is that it is entirely transparent and is bordered by a metal plate which makes the design more attractive. It’s an interactive tool which is supported well by the GPS, camera, internet, and scanner. So, all you have to do is to look through the glass and you’ll get all the information which you are looking for. The best thing what this device does is that you can see through it anything whose information will be displayed to you entirely. For example, see a building and you’ll get information on it. If you liked any place or building whose information you think should be retrieved then go for it without thinking. All the information of a particular object, place or building will be displayed on the screen through Google, Wikipedia or from other site.
Digital Window

6.    Vaio Zoom Notebook

Vaio has always achieved immense fame from its sexy gadgets. Now, it’s the time of its transparent project which looks awe-inspiring. This great futuristic design which flaunts itself as the best designed future notebook features holographic glass screen which is basically transparent. Rest, the keyboard turns opaque when the notebook is turned off. The keyboard has gained solid look of black, where if you turn on the notebook, it will showcase you best of screen just like another device. When the notebook is switched on, the touchscreen begins its holographic festivities. This amazing piece has been designed by Eno Setiawan.
Vaio Zoom Notebook

7.    HP LiM

The HP Lim which is the abbreviation of ‘Less is More’, is basically a desktop computer that not only looks sleeker as compared to the average desktop, but has also received its curvy corners as well as transparent surfaces. Apart from its majestic design, the HP LiM also offers more ergonomic experience to the users through its 19 inches of OLED touchscreen which can slide down for easy navigation. This device can also be used as a standalone tablet. This device comes with a wireless keyboard so that you can easily access it on desktop mode. Besides, virtual trackpad is also available that makes you free from using a mouse. There is also a presence of bamboo fabric stretched throughout the aluminum frame of the computer to save the device.
HP LiM

8.    Nikon D80 Skelton Model

This is again a transparent camera with all the common features what other digital cameras with lens offer. The unique thing in this is that you can see all the inside art that make the camera function actively. The Nikon D80 Skelton Model gives you full access to see how the inner fittings work when the camera is on and is ready to shoot and click. The camera has only received transparent body.
Nikon D80 Skelton Model

9.    Cobalto Transparent Mobile Phone Design

This is again a transparent as well as futuristic concept device, inspired from Sci-Fi movies such as Minority Report. It has received a glass screen and is envisioned to produce 3D objects in the air which seems really exciting. The device also has a deformable medal that enables you to use traditional number buttons or dial just like iPod.
Cobalto Transparent Mobile Phone Design

10.    Transparent Keyboard and Mouse

Kicjstarter is the one that has developed this amazing project and is set to sell it soon in the market. It is a set of transparent keyboard and also a fabulously designed transparent mouse. The keyboard features multi-touch functionality, which is build of quality tempered glass, solid metal base and some of the finest components in their class. The keyboard is made of rechargeable Lithium Polymer Battery and functions wirelessly. It can also be used with the connection of USB cable. The touch screen technology that these gadgets have received is of FTIR (Frustrated Total Itnernal Reflection). The sensitive IR camera detects the light particles that your skin touch scatters and registers each touch into a registered button press.
Transparent Keyboard Transparent  Mouse

Lunes, Enero 16, 2012

DATA STRUCTURE TASK

                                                               Case 4



1. What is hash collision?
When considering duplications technologies, other vendors and some analysts bring up the bogeyman of hash collisions.

So, what is a hash collision, and is it really a concern for data safety in a system like Permabit Enterprise Archive?
The short version is that deduplicating systems that use cryptographic hashes use those hashes to generate shorter “fingerprints” to uniquely identify each piece of data, and determine if that data already exists in the system. The trouble is, by a mathematical rule called the “pigeonhole principle”, you can’t uniquely map any possible files or file chunk to a shorter fingerprint. Statistically, there are multiple possible files that have the same hash. 


2. What really happens during a hash collision? Include an image.




In computer science, a hash table or hash map is a data structure that uses a hash function to map identifying values, known as keys (e.g., a person's name), to their associated values (e.g., their telephone number). Thus, a hash table implements an associative array. The hash function is used to transform the key into the index (the hash) of an array element (the slot or bucket) where the corresponding value is to be sought.
File:Hash table 3 1 1 0 1 0 0 SP.svgIdeally, the hash function should map each possible key to a unique slot index, but this ideal is rarely achievable in practice (unless the hash keys are fixed; i.e. new entries are never added to the table after it is created). Instead, most hash table designs assume





that hash collisions—different keys that map to the same hash value—will occur and must be accommodated in some way.









3. What are the ways and methods to resolve hash collision? Explain Each

Basic hash function guidelines

What we basically want to achieve with a hash function is as follows:
  • we want to combine all data values that vary into the hash code;
  • we want the bits of the data that vary most randomly to affect the lower bits of the hash code;
  • given a set of typical random keys, we want hash codes where as many bits as possible have roughly 50-50 chance of being a 0 or 1 (in other words are "as randomly distributed as possible"), especially in the lower bits;
  • we want the hash function to execute quickly: in other words, it should be a "couple of lines of code" written with a few simple arithmetic operations.
The desire to have hash codes that have a random distribution especially in the lower bits isn't necessarily a universal requirement, but it is desirable because of the way Java hash maps work1.
Here are some examples of data fields and how we might achieve the above goals. Note that we'll just give the "raw" hash function here, and look separately at how to actually build hash functions into a class.
Object fieldsExample hash codeComments
Two ints, each fairly randomly distributed between 0 and a fairly large number2.x ^ yXORing two numbers with roughly random distribution results in another number still with roughly random distribution3, but which now depends on the two values.
Two objects whose classes already have good hash functions (for example Strings or generally other standard library classes).x.hashCode() ^ y.hashCode()If the two classes already have good (randomly distributed) hash code functions, then you can treat the two hash codes as "randomly distributed integers" and XOR them.
Two ints that have a biased distribution.(x * p) ^ y
Where p is a prime number4 and/or odd number close to a power of 2, such as 17 or 33.
Multiplying one of the numbers (or, put another way, shifting plus adding/subtracting from itself) will help to ensure that the "biased" bits of one number interact with the more "random" bits of the other, so that the bias is "ironed out" over more of the bits.
enumsTreat as "biased ints":
(x.hashCode() * 17) ^ y.hashCode()
Enums typically have low values (favour the lower bits), so they should be combined with a multiplication to spread them across a wider bit range of the hash code.
Two doubles or floats.Wrap the primitive in a Float or Double object then call its hashCode() method.
new Float(x).hashCode() ^ new Double(y).hashCode()
(new Double(x).hashCode() >> 13) ^ new Double(y).hashCode()
For efficiency (but the JIT compiler may remove the need) you could directly copy the code from Double.hashCode() or Float.hashCode() directly into your hash function. See the hashCode() method of Point2D for an example of this.
Hash codes of floats and doubles, in particular those representing powers of 2 (including negative powers of 2: 1/2, 1/4 etc), typically have more variation in the upper bits than in the lower ones. The HashMap's secondary hash code alleviates this problem somewhat, but it may be worth combining the hash codes by shifting one of them right by several bits so that more variation ends up in the lower bits.


public int hashCode() {
  int hc = cachedHashCode;
  if (hc == 0) {
    String varstr = var1 + var2 + var3;
    hc = varstr.hashCode();
  }
  return hc;
}
 
 
                                      Case 5
 
 
......Give at least three scenarios in the real world wherein HASH COLLISION can happen. 
Include an image. 
 
 
A distributed hash table (DHT) is a class of a decentralized distributed system that provides a lookup service similar to a hash table; (key, value) pairs are stored in a DHT, and any participating node
 can efficiently retrieve the value associated with a given key. 
Responsibility for maintaining the mapping from keys to values is 
distributed among the nodes, in such a way that a change in the set of 
participants causes a minimal amount of disruption. This allows a DHT to
 scale to extremely large numbers of nodes and to handle continual node arrivals, departures, and failures. 
......Give at least three specific software/program/application wherein 
HASHING and HASH COLLISION might occur. Include the name of the 
software/program/application, description and a screenshot.
 
 
 
 
 
The additive hash, seen in commercial code: 
ub4 additive( char *key, size_t len, ub4 prime) { ub4 hash; size_t i; for (hash=(ub4)len, i=0; i<len; ++i) hash = hash+key[i]; return (hash % prime); } This takes 5n+3 instructions. There is no mixing step. The combining step handles one byte at a time. Bytes are treated commutatively, and every bit affects on average two output bits (one directly, and an average of one more due to carries). Bytes above the low-order byte of hash are affected only by carries. One of the instructions is mod, which can many cycles -- tens (on a MIPS) or hundreds (on a SPARC). It forces the use of prime table lengths, which makes it hard to dynamically increase the table size. Also, the prime can't be much bigger than one byte because the original hash value won't be much bigger than one byte. Knuth described this hash, except he required the key to be an array of words, not an array of bytes. The rotating hash, also seen in commercial code:
ub4 rotating( char *key, size_t len, ub4 prime) { ub4 hash; size_t i; for (hash=(ub4)len, i=0; i<len; ++i) hash = (hash<<5)^(hash>>27)^key[i]; return (hash % prime); } This is the same as the additive hash, except it has a mixing step (a barrelshift by 5) and the combining step is exclusive-or instead of addition. Speed is 8n+3 instructions. Every input bit affects exactly one output bit (because of the exclusive-or instead of addition). Because of the mixing step, before the % prime, hash is equally likely to be any 32-bit value. This lets any size prime be used. Most input bytes are not treated commutatively. This hash was also described by Knuth , except he required the key to be an array of words, not an array of bytes. Pearson's hash
char pearson( char *key, size_t len, char tab[256]) { char hash; size_t i; for (i=0, hash=0; i<len; ++i) hash=tab[hash^key[i]]; return (hash); }
 
 

Lunes, Enero 9, 2012

HCSD Data Structure Case Studies

Case Study 1
To aid the fight against computer viruses and other types of malicious software, many security advisory organizations and developers of anti-virus software compile and publish lists of viruses.
The compilation of a unified list of viruses is made difficult because of naming. When a new virus appears, the rush begins to identify and understand it as well as develop appropriate counter-measures to stop its propagation. Along the way, a name is attached to the virus. As the developers of anti-virus software compete partly based on how quickly they react to the new threat, they usually study and name the viruses independently. By the time the virus is identified, many names denote the same virus.
Another source of ambiguity in names is that sometimes a virus initially identified as a completely new virus is found to be a variation of an earlier known virus.There are many viruses and it is can fix using anti viruses.
                                                               Case Study 2
  Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose. People who engage in computer hacking activities are often called hackers.Since the word “hack” has long been used to describe someone who is incompetent at his/her profession, some hackers claim this term is offensive and fails to give appropriate recognition to their skills.
Computer hacking is most common among teenagers and young adults, although there are many older hackers as well. Many hackers are true technology buffs who enjoy learning more about how computers work and consider computer hacking an “art” form. They often enjoy programming and have expert-level skills in one particular program. For these individuals, computer hacking is a real life application of their problem-solving skills. It’s a chance to demonstrate their abilities, not an opportunity to harm others.
Bad hackers is making  a virus to indicate all cases to make a wrong doing. They build a viruses to spread to web site or to company to hack the server using their talent of programming.The all hackers are secured and it is safety to as to make them a hack to the public.

                                                                       Case Study 3

a.Silicon Valley Programmer-This people are all group of programming that are testing or examine how to create a real robots.They success in there experiment but I think there is an errors to the robot cause   of death by the operator.


b.I make a rules that indicate of safety first.I make a  laboratory for the robots that the user is easily program the robot.First I make my own uniform that can protect the body and using programming I also chick first my codes in my data base before I run it, to make it safety.


c.I think it is hard to select witch is I make my codes fake.Because first is my name is involved  in the case and I can prove to my self as a good programmer i can fix the codes using the previous codes that I use.