Subscribe Now: freedictionary

Add to The Free Dictionary

Monday, 30 January 2012

T-Rays Technology Could Help Develop Star Trek-Style Hand-Held Medical Scanners

 Scientists have developed a new way to create Terahertz waves (T-rays) that may one day lead to biomedical detective devices similar to the 'tricorder' scanner used in Star Trek












Scientists have developed a new way to create electromagnetic Terahertz (THz) waves or T-rays -- the technology behind full-body security scanners. The researchers behind the study, published recently in the journal Nature Photonics, say their new stronger and more efficient continuous wave T-rays could be used to make better medical scanning gadgets and may one day lead to innovations similar to the 'tricorder' scanner used in Star Trek.
In the study, researchers from the Institute of Materials Research and Engineering (IMRE), a research institute of the Agency for Science, Technology and Research (A*STAR) in Singapore, and Imperial College London in the UK have made T-rays into a much stronger directional beam than was previously thought possible, and have done so at room-temperature conditions. This is a breakthrough that should allow future T-ray systems to be smaller, more portable, easier to operate, and much cheaper than current devices.
The scientists say that the T-ray scanner and detector could provide part of the functionality of a Star Trek-like medical 'tricorder' -- a portable sensing, computing and data communications device -- since the waves are capable of detecting biological phenomena such as increased blood flow around tumorous growths. Future scanners could also perform fast wireless data communication to transfer a high volume of information on the measurements it makes.
T-rays are waves in the far infrared part of the electromagnetic spectrum that have a wavelength hundreds of times longer than those that make up visible light. Such waves are already in use in airport security scanners, prototype medical scanning devices and in spectroscopy systems for materials analysis. T-rays can sense molecules such as those present in cancerous tumours and living DNA, since every molecule has its unique signature in the THz range. They can also be used to detect explosives or drugs, for gas pollution monitoring or non-destructive testing of semiconductor integrated circuit chips.
Current T-ray imaging devices are very expensive and operate at only a low output power, since creating the waves consumes large amounts of energy and needs to take place at very low temperatures.
In the new technique, the researchers demonstrated that it is possible to produce a strong beam of T-rays by shining light of differing wavelengths on a pair of electrodes -- two pointed strips of metal separated by a 100 nanometre gap on top of a semiconductor wafer. The structure of the tip-to-tip nano-sized gap electrode greatly enhances the THz field and acts like a nano-antenna to amplify the wave generated. In this method, THz waves are produced by an interaction between the electromagnetic waves of the light pulses and a powerful current passing between the semiconductor electrodes. The scientists are able to tune the wavelength of the T-rays to create a beam that is useable in the scanning technology.
Lead author Dr Jing Hua Teng, from A*STAR's IMRE, said: "The secret behind the innovation lies in the new nano-antenna that we had developed and integrated into the semiconductor chip." Arrays of these nano-antennas create much stronger THz fields that generate a power output that is 100 times higher than the power output of commonly used THz sources that have conventional interdigitated antenna structures. A stronger T-ray source renders the T-ray imaging devices more power and higher resolution.
Research co-author Stefan Maier, a visiting scientist at A*STAR's IMRE and Professor in the Department of Physics at Imperial College London, said: "T-rays promise to revolutionise medical scanning to make it faster and more convenient, potentially relieving patients from the inconvenience of complicated diagnostic procedures and the stress of waiting for accurate results. Thanks to modern nanotechnology and nanofabrication, we have made a real breakthrough in the generation of T-rays that takes us a step closer to these new scanning devices. With the introduction of a gap of only 0.1 micrometers into the electrodes, we have been able to make amplified waves at the key wavelength of 1000 micrometers that can be used in such real world applications."
The research was led by scientists from A*STAR's IMRE and Imperial College London, and involved partners from A*STAR Institute for Infocomm Research (I2R) and the National University of Singapore. The research is funded under A*STAR's Metamaterials Programme and the THz Programme, as well as the Leverhume Trust and the Engineering and Physical Sciences Research Council (EPSRC) in the UK.

Sunday, 29 January 2012

Virus Effect Remover

Virus Effects Remover (V.E.R.) A tool which helps users remove the effects of either a live virus or left-over by a virus in the Windows Operating System. It re-enables blocked items like the Task Manager, Reg editor, Folder Options, WinUpdate etc.

A simple to use utility that allows you to remove virus effects from your computer.

Virus Effect Remover is the tool which help you to remove the effect of virus from windows registry and file system. It also detect the registry error caused by virus and enables the Blocked content like task manager , registry editor, folder option etc.

By this you can also terminate the virus process and can remove it permanently.
Requirements:

· .Net Framework 2 Or Higher




Thursday, 19 January 2012

Free Computer Graphics Ebooks

Free 3d graphics, vrml, atari graphics, basic graphics, computer theoretical graphics, encyclopedia of graphics, graphics programming in icons, adobe photoshop tutorials, coreldraw tutorials, dreamweaver tutorials, JPOT tutorials, OpenGl tutorials, PNG, vision systems, etc are found in this computer graphics ebook blog.
Following are the various free ebooks provided by this site. I found this is a real good ebook resource for computer graphics.
  1. 3D Graphics & VRML 2.0 by Laura Lemay, Justin Couch and Kelly Murdock
  2. Atari Graphics & Arcade Game Design By Jeffrey Stanton with Dan Pinal
  3. Basic Graphics Programming With The Xlib Library
  4. Compute!'s First Book of Atari Graphics
  5. Computer Graphics - cc.gatech.edu
  6. Computer Graphics - cs.brown.edu By Andries van Dam
  7. Computer Graphics C Version Second Edition By Donald Hearn and M. Pauline Baker
  8. Computer Graphics Primer By Mitchell Waite
  9. Computer Graphics: Image Synthesis Techniques By Pat Hanrahan
  10. Dreamweaver MX - Tutorial Part 1
  11. Encyclopedia of Graphics File Formats, Second Edition by James D. Murray and William vanRyper
  12. Graphics Programming in Icon By Ralph E. Griswold, Clinton L. Jeffery, and Gregg M. Townsend
  13. Introduction to Adobe Photoshop
  14. Introduction to VRML
  15. Introduction to VRML 97 By David R. Nadeau
  16. Java Personal OpenGL Tutorial (JPOT)
  17. OpenGL Programming Guide Second Edition
  18. OpenGL Simple Shading Example -Sample Chapter
  19. OpenGL Texture Mapping - Sample Chapter
  20. OpenGL Tutorial
  21. PNG - The Definitive Guide By Greg Roelofs
  22. Real-Time Graphics Architectures By Kurt Akeley and Pat Hanrahan
  23. Simulating Humans: Computer Graphics, Animation and Control By Norman I. Badler, Cary B. Phillips and Bonnie L. Webber
  24. Teach Yourself CorelDRAW 8 in 24 Hours
  25. Teach Yourself Illustrator 7 in 24 Hours By Mordy Golding
  26. Teach Yourself Photoshop® in 14 Days By Bront Davis, Carla Rose and Steve Mulder
  27. Texture Mapping in VRML by Cindy Ballreich
  28. The OpenGL Utility Toolkit (GLUT) Programming Interface By Mark J. Kilgard
  29. Using OpenGL in Visual C++ By Alan Oursland
  30. Vector Math for 3D Computer Graphics
  31. Vision Systems By Dr A D Marshall
  32. Visualization By Pat Hanrahan
  33. VRML Audio Tutorial
  34. VRML Interactive Tutorial By Antonio Ramires Fernandes
  35. VRML Primer and Tutorial By Daniel K. Schneider and Sylvere Martin-Michiellot
  36. VRML Tutorial By Markus Roskothen


Wednesday, 18 January 2012

Cryptographic Development Kits (CDKs)

Overview

ISC CDKs are flexible, cost effective libraries of linkable cryptographic modules that allow you to add encryption, digital signatures, and message authentication to any application. They reduce the cost of developing secure applications by applying readily available, commercially supported, conventional and public key technology.
ISC CDKs make standards-based cryptographic building blocks available to developers and integrators. Use them to construct secure corporate applications for internal use or OEM products for resale.
Purchase a complete toolkit or have us customize one that targets your specific application. ISC can provide implementations of the following federal and industry standards:
  • NIST Advanced Encryption Standard (AES†)
  • NIST Data Encryption Standard (DES), triple DES (TDES), and DESX
  • NIST Digital Signature Algorithm (DSA) and Elliptic Curve DSA (ECDSA†)
  • Rivest-Shamir-Adleman (RSA) public key technology
  • NIST Secure Hash Algorithm (SHA-1, SHA-224/256/384/512†)
  • MD2/MD5 hash algorithms
  • Diffie-Hellman (DH) and Elliptic Curve Diffie-Hellman (ECDH†) Key Agreement
  • ElGamal, and elliptic curve ElGamal, public key cryptosystems
  • AT&T proprietary exportable DES replacement (EA2)
(†NSA Suite B algorithms; a more complete list of the available cryptographic algorithms, protocols, and schemes in the CDK appears on the Standards tab.


Web Application Life Cycle


A web application consists of web components, static resource files such as images, and helper classes and libraries. The web container provides many supporting services that enhance the capabilities of web components and make them easier to develop. However, because a web application must take these services into account, the process for creating and running a web application is different from that of traditional stand-alone Java classes. The process for creating, deploying, and executing a web application can be summarized as follows: Develop the web component code. Develop the web application deployment descriptor. Compile the web application components and helper classes referenced by the components. Optionally package the application into a deployable unit. Deploy the application into a web container. Access a URL that references the web application.


Developing web component code is covered in the later chapters. Steps 2 through 4 are expanded on in the following sections and illustrated with a Hello, World-style presentation-oriented application. This application allows a user to enter a name into an HTML form (Figure 3-3) and then displays a greeting after the name is submitted (Figure 3-4). Greeting Form Figure 3-3 Greeting Form Response Figure 3-4 Response The Hello application contains two web components that generate the greeting and the response. This chapter discusses two versions of the application: a JSP version called hello1, in which the components are implemented by two JSP pages (index.jsp and response.jsp) and a servlet version called hello2, in which the components are implemented by two servlet classes (GreetingServlet.java and ResponseServlet.java). The two versions are used to illustrate tasks involved in packaging, deploying, configuring, and running an application that contains web components. The section About the Examples explains how to get the code for these examples. After you install the tutorial bundle, the source code for the examples is in /j2eetutorial14/examples/web/hello1/ and /j2eetutorial14/examples/web/hello2/.


Tutiya Dil - 2012


Media Player-128 Kbps

Tutiya Dil  Ram Sampath, Prakriti Kakar

                                                                                                                                                                   Alak Niranjan  Divya Kumar

Le Chalo  Meenal Jain, Jasvinder Singh

Hip Hop Saiyaan  Akriti Kakar, Sayantini Das

Aag Lage  Alamgir Khan

  


Requirements Engineering

Requirements Engineering

Editors-in-Chief: P. Loucopoulos
Main editor: W.N. Robinson
ISSN: 0947-3602 (print version)
ISSN: 1432-010X (electronic version)
Journal no. 766.



Software Requirements Engineering: What, Why, Who, When, and How
By Linda Westfall

Key words: requirements engineering, requirements elicitation, requirements analysis,
requirements specification, requirements management, stakeholder



ABSTRACT
If software requirements are not right, companies will not end up with the software they
need. This article will discuss:
• What: The various levels and types of requirements that need to be defined
• Why: The benefits of having the right software requirements
• Who: The stakeholders of the software requirements and getting them involved in
the process
• When: Requirements activities throughout the software development life cycle
• How: Techniques for eliciting, analyzing, specifying, and validating software
requirements






 


Tuesday, 17 January 2012

Computer Graphics Application





New security model for widgets, Opera 10 and network="public"

For Opera 10, we're introducing a new security model which among other things means that widgets don't have network access on by default. In order to enable network access for non-intranet sites, add a network attribute to the widget element in the config.xml of your widget with the value public. ... This will make your widget work as intended in Opera 10, but will not affect previous versions. Older browsers will simply ignore the network attribute and give your widget access as per the existing security model. We'll update the documentation with more details as we get closer to a release of Opera 10. Note that this affects http://widgets.opera.com. If you submit a widget to us without the network attribute, the widget will probably not work in Opera 10. Consequently, your widget will not be approved for that version, and wont show up in the lists of widgets when people browse the site.




Sunday, 15 January 2012

Web Design – Development

The Internet is the new medium for promoting and selling your products and services to customers across the globe. A Good designed website is therefore the most important tool to attract customers. A Good website design must have visual appeal, user friendliness, rich content and above all, be search engine optimized in order to attract & retain visitors.
We at Web Werks ensure your website works for your business. Mere presence is no presence on the web; users should actually know your existence, visit your website, appreciate you and translate to leads or sales.


For Websites that are Web 2.0 standard compliant, designs that are simple, un-cluttered, functional, search engine friendly and result-oriented get in touch with our team.

Technology Expertise
.Net, Java, PHP, ColdFusion, Silverlight, Flash/Flex, HTML/HTML5/XHTML, CSS/CSS3, Flash Action Script 2.0/3.0, Javascript, JQuery






Tuesday, 10 January 2012

Software Engineering, Pankaj Jalote, – A Precise Approach, Wiley India



 
A Concise Introduction to  tware Engineering
                                                                        by  
                                                          Pankaj Jalote
                                      






 


Add to Google





Engineering -Thinks of Words

Subscribe Now: google

Add to Google Reader or Homepage