Monday, June 21, 2010

Biometrics - Fingerprint recognition

Fingerprint recognition or fingerprint authentication refers to the automated method of verifying a match between two human fingerprints. Fingerprints are one of many forms of biometrics used to identify an individual and verify their identity. This article touches on two major classes of algorithms (minutia and pattern) and four sensor designs (optical, ultrasonic, passive capacitance, and active capacitance).

The analysis of fingerprints for matching purposes generally requires the comparison of several features of the print pattern. These include patterns, which are aggregate characteristics of ridges, and minutia points, which are unique features found within the patterns. It is also necessary to know the structure and properties of human skin in order to successfully employ some of the imaging technologies.

The three basic patterns of fingerprint ridges are the arch, loop, and whorl. An arch is a pattern where the ridges enter from one side of the finger, rise in the center forming an arc, and then exit the other side of the finger. The loop is a pattern where the ridges enter from one side of a finger, form a curve, and tend to exit from the same side they enter. In the whorl pattern, ridges form circularly around a central point on the finger. Scientists have found that family members often share the same general fingerprint patterns, leading to the belief that these patterns are inherited.

The major Minutia features of fingerprint ridges are: ridge ending, bifurcation, and short ridge (or dot). The ridge ending is the point at which a ridge terminates. Bifurcations are points at which a single ridge splits into two ridges. Short ridges (or dots) are ridges which are significantly shorter than the average ridge length on the fingerprint. Minutiae and patterns are very important in the analysis of fingerprints since no two fingers have been shown to be identical.

A fingerprint sensor is an electronic device used to capture a digital image of the fingerprint pattern. The captured image is called a live scan. This live scan is digitally processed to create a biometric template (a collection of extracted features) which is stored and used for matching. This is an overview of some of the more commonly used fingerprint sensor technologies.

Wednesday, May 5, 2010

Bracelet cell phone from Samsung

For all tech freaks and cell phone fans that enjoy extreme sports Samsungs has a new cell phone. It’s still an early design but interesting thing about this cell phone is that actually a cell phone and a bracelet that you can actually wear while performing all kinds of activities. It’s designed for the people that tend to enjoy in extreme sports or that are always on the go.


With its fancy and future like design this cell phone from Samsung looks really amazing. Color combination give is that alien look, so it’s great for tech nerds and all the people that want to have attractive and unique bracelets. Having a cell phone with a bracelet is actually a good idea if you’re always on the move because you won’t have to worry if your phone accidentally falls from your pocket or if you leave it somewhere. You just need to get this great thing and hook it on your wrist and you’re good to go.

This device is really interesting because it’s slim and really attractive and surely it won’t produce any sweat on your wrists because it is designed to have constant airflow. We agree that it has amazing design, but what about its specifications? Well, Samsung didn’t reveal much because it’s still an early design but it is know that this cell phone bracelet will use OLED touchscreen, tactile keypad and flexible electronics that can follow all the thrill seekers out there.

Refered from: http://www.gadgetlite.com/2010/04/20/bracelet-cell-phone-samsung/

321 Water bottle wilt built-in self filter

Many people are drinking bottled water nowadays because they are suspicious of ingredients that might be hidden in regular tap water. Only downside of bottled water is that there are too many plastic bottles being used every day, but there are also all sorts of reusable bottles that have built in filters – its just that they never get noticed. Even if these bottles have existed for some time, none of them have had a design like this one.






























It is called 321 Water and it comes from the company called Half a Teaspoon. Interesting thing about these bottles is that they have their own water purifiers. Although it seems like nothing special you’ll have to see it to believe it, because these filters are looking like an alien tube. With the white design of the bottles and the light blue color of the alien tube filter these bottles look rather attractive. Design is simple and amazing but how do they work?

Simple enough, you just fill 321 Water bottle with tap water, insert the filter into the bottle and let the filter do all the work. It has carbon block so it will remove chlorine and all other unpleasant tastes leaving you with purified fresh water. It can be used more than 100 times and it can purify 50 liters of water. As for the price and release date, we should see these bottles in stores in before July but you can still per-order them for 44.60$ from the manufacturing company.

Wednesday, April 28, 2010

New Technology in the year 2010

I will be choosing to talk about:-

  1. 321 Water bottle with built-in self filter
  2. New bracelet cell phone from Samsung

Sunday, April 18, 2010

Document Management system

A document management system (DMS) is a computer system used to track and store electronic document or image of paper documents. The term has some overlap with the concepts of content management system. It is often viewed as a component of enterprise management system (ECM) systems and related to digital asset management, document imaging, workflow systems and records management systems.

Thursday, April 15, 2010

Database Software

Datebase software is a set of data that has a regular structure and that is organized in such a way that a computer can easily find the desired information.Datebase also collection of clearly pieces of information, specially information that has been formatted in some specific way for use in analysis or making decision.

Word Processing

Word processing software is to create, edit, and print document.It also help users have the ability of creating and making any type of changes in the document. This document can also be saved changing at a later time or to be opened other computer useing the same word processor. Users can use this software to easily edited document, searched, and reprinted because it has replaced the typewritter.Word processing is performed on general purpose computers using this software such as Microsoft Word and WordPerfect.

Thursday, April 8, 2010

Presentation

Presentation is the practice of showing and explaining the content of a toipc toan audience or learner. It typically includes three major functions: an editor that allows text tobe inserted and formatted, a method for inserting and manipulating graphic images and a slide show to display the content

The examples of presentation softwares exist:-

  1. Microsoft Powerpoint
  2. Beamer
  3. KPresenter
  4. MagicPoint
  5. OpenOffice.org Impress
  6. Apple Keynote
  7. Corel Presentations
  8. Harvard Graphics
  9. IBM Lotus Freelance Graphics
  10. Adobe Persuasion
  11. CA-Cricket Presents

Wednesday, April 7, 2010

Spreadsheet

A spreadsheet is a computer application that simulates a paper, accounting worksheet. It displays multiple cells that make up a grid consisting of rows and columns , each cell containing either alphanumeric text or numeric values. A spreadsheet serves a variety of purposes. The most basic purpose of a spreadsheet is to hold and store data. Commonly used in the business and scientific fields, a spreadsheet can be set up in myriad ways using rows and columns. A spreadsheet provides structure and organization for data and often makes calculations. Microsoft Excel is likely the most commonly used computer software for creating spreadsheets.

The examples of spreadsheet softwares available are:-

  1. Microsoft Excel
  2. VisiCalc
  3. Apple iWork Numbers
  4. OpenOffice.org Calc
  5. Gnumeric
  6. Lotus 1-2-3
  7. Resolver One

Tuesday, April 6, 2010

Accounting

Accounting is the development and use of a system for recording and analyzing the financial transactions and financial status of a business or other organization.It can be a complete record of all the activities of a business, providing details of every aspect of the business, allowing the analysis of business trends, and providing insight into future prospects.

There are 5 types of account:
1) Asset-anything tangible or intangible that is capable of being owned or controlled to produce value.
2) Liability-a present obligation of the enterprise arising from past events or transactions.
3) Equity-the remaining interest in a company
4) Income-the consumption and saving opportunity gained by an entity.
5) Expense-outflow of money to another person or group to pay for an item or service.

Post by Undead

Account TypeNormal BalanceDebitCredit
AssetDebitDebits increase asset balancesCredits decrease asset balances
LiabilityCreditDebits decrease liability balancesCredits increase liability balances
EquityCreditDebits decrease equity balancesCredits increase equity balances
IncomeCreditDebits decrease income balancesCredits increase income balances
Expense







Debit




Debits increase expense balancesCredits decrease expense balances








Personal Infomation Manager (PIM)

PIM allows you to keep all your information in an electronic form.
Example:- task, to do list, notes and so on....
There are a few main features.
1. Tools to satisfy your calender, to do list, note and so on.....
2. Synchronization with outlook, mobile devices, Palm, Ipod.
3.Simple printout of any/all modules and quick export of your data into your most useful format.
4.Strong data protection.

Examples of PIM devices:

Business Software

Business software is application software that assists people while performing business activities.

Examples of business software:-
  1. Word processing software (to be done by Hum@N)
  2. Spreadsheet software (to be done by Gh0sT)
  3. Database software (to be done by Hum@N)
  4. Presentation software (to be done by Gh0sT)
  5. Personal Information Manager (PIM) software (to be done by D3@thG0D)
  6. Project management software (to be done by D3@thG0D)
  7. Accounting software (to be done by UnD3@D)
  8. Document software (to be done by UnD3@D)

Saturday, April 3, 2010

Purpose of Blogging

The purpose of blogging is to share information on what a person know. For example, i know about animation, and i keep on posting new thing and info on the blog so that others can read and know about it. It's like a news to people, then everyone starting comment about animation.

Function of Blogger

Function of Blogger:-

  • As a personal diary to express out feelings
  • Community building
  • Do assignment for colleges
  • Make money
  • As a forum

Wednesday, March 31, 2010

Advantages and Disadvantages of Internet Blogging

Advantages:

  • Easy and quick
  • The ability to vent your feelings
  • Can lead to unreal expectations for business blog
  • Able to post new information quickly
Disadvantages:
  • Posting too much information about personal information
  • Wasting time
  • Make organisations look like disorganisations, with multiple tones and opinion
  • Need to been maintained while maintaining a blog is not easy
Post by Satan

Monday, March 29, 2010

How to create a blog with Blogger


Post by Ghost

The advantage and disadvantage of social network website

These days the social networking sites have become extremely popular among the youth as well as the professional people. Keeping in mind, the growing popularity of these sites and the effect it has and the benefits that it brings along, it can be easily predicted that its popularity is sure to grow much more. Some of the sites such as Friendster and MySpace are the two most popular sites that aim to build special niche for people who share common interests and passions. Whereas social networking sites such as Twitter and LinkedIn are more professionally related and help the business men promote their businesses.

However, everything has a positive and negative side. Similarly, the social networking sites are also made up of their set of pros and cons.

Analyzing The Pros of social networking: The social networking websites are more like the virtual meeting places where people can just chill and hang out with friends. They can discuss on different topics, share information, and exchange files and pictures. There are some people who use these sites as a platform to meet long lost friend and batch mates, whereas there are others for whom it becomes a bridge to meet their future love. You can either reconnect with your friends and family members or search a dating partner. Some people also use these websites to promote their blogs and services. The professional people uses this as a medium to raise their visibility, get noticed, tell about their company, service, and get more clients.

By joining different communities, now people can easily know about the latest news related to that community. You can easily get the experts advice on any challenge you may face related to their topic of interest. And the best part of this is that the advice is free. You don’t need to pay a single paisa for it. Experts are always ready to give their advice and share information with you. These are just some of the several positive things that have contributed to make social networking really popular among people and spread smiles. It has made world a small pace and everyone can stay connected.

Analyzing The Cons of social networking:

Social networking of course helps in a lot of ways but the users have to really careful to stay secure and safe. Security is one of the topmost concerns of social networking sites that you currently use. This is mainly because the social networking sites allow you to display your personal information such as name, location, and email address. There are some people who always in search of a fake identity. If they get all the information about you on internet, they may use your identity for different type of illegal activities, which may cause you problems in future. It is always advisable to don’t provide your entire identity information online.

You may get many requests for adding as friends or joining different communities. Always try to know as much as possible before adding anyone as friend or joining any community. Because they may use fake identity or may involve in some illegal activities, which may spoil your image.

http://thetechedition.com/advantages-and-disadvantages-of-social-networking-sites/

Post by Undead


Friday, March 26, 2010

Blogger

Blogger is a blog storage service that allows private or multi-user blogs with time-stamped entries. It is funded by on-screen ads. It was created by Pyra Labs, which was bought by Google in 2003.The service itself is located at www.blogger.com. Generally, the blogs are hosted by Google at subdomains of blogspot.com. Until May 1 2010 [3] an FTP service allows pages edited through Blogger to be published to other hosts. If this service ceases, all blogger blogs will be hosted by Google, though domains other than blogspot.com may be used.

Blogger
Blogger screen.png

Major events in the history of Blogger:

  • On August 23, 1999, Blogger was launched by Pyra Labs. As one of the earliest dedicated blog-publishing tools, it is credited for helping popularize the format.
  • In February 2003, Pyra Labs was acquired by Google under undisclosed terms. The acquisition allowed premium features (for which Pyra had charged) to become free. About a year later, Pyra Labs' co-founder, Evan Williams, left Google.
  • In 2004, Google purchased Picasa; it integrated Picasa and its photo sharing utility Hello into Blogger, allowing users to post photos to their blogs.
  • On May 9, 2004, Blogger introduced a major redesign, adding features such as web standards-compliant templates, individual archive pages for posts, comments, and posting by email.
  • On August 14, 2006, Blogger launched its latest version in beta, codenamed "Invader", alongside the gold release. This migrated users to Google servers and included some new features.
  • In December 2006, this new version of Blogger was taken out of beta.
  • By May 2007, Blogger had completely moved over to Google operated servers.

Blogger was ranked 16 on the list of top 50 domains in terms of number of unique visitors in 2007.[4][dated info]

As part of the Blogger redesign in 2006, all blogs associated with a user's Google Account were migrated to Google servers. Blogger claims that the service is now more reliable because of the quality of the servers.[5]

Along with the migration to Google servers, several new features were introduced, including label organization, a drag-and-drop template editing interface, reading permissions (to create private blogs) and new Web feed options. Furthermore, blogs are updated dynamically, as opposed to rewriting HTML files.

In a version of the service called Blogger in Draft,[6] new features are tested before being released to all users. New features are discussed in the service's official blog.

In September 2009, Google introduced new features into Blogger as part of its tenth anniversary celebration. The features included a new interface for post editing, improved image handling, Raw HTML Conversion, and other Google Docs-based implementations, including:

  • Adding location to posts via geotagging.
  • Post time-stamping at publication, not at original creation.
  • Vertical re-sizing of the post editor. The size is saved in a per-user, per-blog preference.
  • Link editing in Compose mode.
  • Full Safari 3 support and fidelity on both Windows and Mac OS.
  • New Preview dialog that shows posts in a width and font size approximating what is seen in the published view.
  • Placeholder image for tags so that embeds are movable in Compose mode.
  • New toolbar with Google aesthetics, faster loading time, and "undo" and "redo" buttons. Also added was the full justification button, a strike-through button, and an expanded color palette.

The new post editor was criticized for being less reliable than its predecessor.[7]



Post By Ghost

Why Do People Use Online Social Networking?

Online social networking can provide a valuable way for people to connect, share interest, and stay in touch with people across the miles. The reasons people use online social networking are:

1) Helping People Connect
The reason so many people use online social networking is that it provides a way for people to connect. You can keep in touch with friends, share information about events and even help one another with homework with online social networking tools.

With online social networks, you can get in touch with old friends and make new ones. Most social networking Web sites have tools that enable you to track down old friends and colleagues. You can also use an online social network to make new friends with similar interests. Online social networking is a great way to expand your social circle and get in touch with people you otherwise wouldn’t speak with regularly, or at all.

2) Collaborating at Work
Social networking tools are also very useful for work. If you're looking for a job, you can use it to get references from old coworkers. You can also connect with other people who work for the same company, or in the same industry. Managers looking to hire people with specific skills can then find you using social networking tools.

Both businesses and individuals use social networking for marketing purposes. They use it to advertise new products and deals, to stay in touch with customers or to follow other people who might have items or offerings they could use. Social networking can be a great forum for viral marketing, but it's important to be clear that you're marketing a product or the message won't get through.

3) The Quest for Popularity
Along with the positives, social networking carries a few negatives. Some people see social networking as a big popularity contest. These people use social networks to grab as many friends as possible, and people with few friends may be seen as losers or people with poor social skills. However, friends’ lists in online social networks can be very misleading, as many of those people may simply be acquaintances who are also looking to collect and acquire online friends.

4) Hiding from Real Life
People with poor social skills may use online social networks to withdraw from real life. They may feel less pressured in online interactions, and rely more and more on online tools to interact with friends and peers. Using online social networks and withdrawing from real life interactions is a real danger, and parents must be vigilant to ensure kids are still spending quality time with friends in person. There's simply no substitute for spending time together with friends in the real world.

http://www.life123.com/parenting/tweens-teens/social-networking/why-do-people-use-online-social-networking.shtml


Post By Ghost

Thursday, March 25, 2010

Definitions of Social Network Website

In Wikipedia, a Social Network Website or Social Network Service focuses on building and reflecting of social networks or social relations among people.



A Social Network Website is defined as a website that enable to link people all around the world for communication, business, studies etc. The few examples of famous Social Network Website existed in this world is Facebook (http://www.facebook.com/), Twitter (http://twitter.com/), Friendster (http://www.friendster.com/), and nevertheless Blogspot (https://www.blogger.com/start)


Post by Ghost

Social Network Website

Topic : Blog

(Don't copy our topic anymore!!! Its copy right protected)

hahahah!~!


Post by Human

Wednesday, March 24, 2010

Inti-Dementile

Harloo~this time is my first time for playing blogging...

Team Member:

HuM@n (Boon Hui)
Gh0sT (Chen Kit)
D3@thG0D (Kendrick)
Und3@D (Sam)

Post By Human