Human Eye interaction with Computer

                 Human  Eye interaction with Computer


Human-computer Interaction (HCI) is concerned with design, evaluation and
implementation of interactive computing systems for human use and with the
study of major phenomena surrounding them. It deals with the interaction be-
tween users and computers. The basic goal of HCI is to improve this interaction
by making computers more usable and receptive to the user's needs. That means
that we want to make the barrier between the human's cognitive model of what
they want to accomplish and the computer's understanding of the user's task as
minimal as possible.
The central character for interactive systems is the human. In order to de-
sign a system which full_ls the requirements of the user we need to understand
capabilities and limitations of the human body , human's thinking as well as
human's psychology.


Input-Output Channels of Human Eye:

A person interacts with a computer through sending and receiving information.
The user receives information as input which is output of the computer and
can response by sending information as input to the computer. That means the
human's input is the computer's output and vice versa. Human can receive infor-
mation mainly through the senses. We call these senses human input channels.
There are _ve di_erent input channels, vision, hearing, touch, taste and smell.
The _rst three channels are the most important for HCI purposes. Human out-
put on the other side occurs through motor control of human body parts like the
limbs, _ngers, eyes, head and the vocal system. Of course the _ngers play the
most important role for interacting with a computer. We need them for typing
at the keyboard and controlling the mouse. When you use an application at a
computer, you interact through an interface with menu bars, icons and windows.
By interacting with the interface we receive information mainly through sight.
To understand human sight we will have a closer look at the visual input channel

now.

Project Proposal: Project (Contact Information Diary)

Introduction :
Purpose :
          Phone and personal information diary which include the phone number and personal information in which e-mail address include address in which we can include the data of that personal by giving as input. In which we can add, delete and search that person’s data which we want.
          This specification defines the operation of searching, deleting and addition of the personal information of personal and mobile number of that person.
          In now days this is in great demand because every person want to save the information about other person like number e-mail, address, mobile number and so many other thing.

Software Features :
Name :
          In this program or software we can add the names of that person’s.

Address :
          In this section of program or software we can add or enter the address of any person which we want to enter.
Mobile Number :
          As we know that in now days mobile number are very important so we add this feature of adding mobile number or lane line number of that person and we can save it and after this we can see that number every time.
E-mail :
          E-mail now a days are very important means of communication we also add the features of e-mail address of a person.
Scope :
          It is very important for the persons to save this contacts, address, e-mail and mobile numbers of other persons.
Uses :
          It can be used as diary because it meet the requirements of many people like business and high profile person because it help then to save the number and e-mail address of different companies and different peoples. Diary is essential part of ours life or business man’s life because it help them in so many ways.



 

Email Policies

Email Policies


E-mail Policy:

Email is a valid mechanism for official communication with students at Northwestern University. The University has the right to send official communications to students by e-mail and expect that students will receive and read e-mail in a timely fashion.

Use of E-mail:

All students will be assigned an official University e-mail address. All official University communications will be sent to this official University -mail address. This official University e-mail address will be maintained in the official University e-mail directory for each student.

Course-related use of e-mail:
Faculty may assume that a student's official University e-mail is a valid mechanism for communicating with a student, and faculty may use e-mail for communicating with students registered in their classes. This policy will ensure that all students will be able to comply with course requirements communicated to them by e-mail from their course instructors.

Forwarding e-mail:
The University will provide a convenient mechanism so that a student may have e-mail forwarded from the official University e-mail address to another e-mail address of the student's choice. Students who choose to have e-mail forwarded to another e-mail address do so at their own risk. The University is not responsible for e-mail forwarded to any other e-mail address. Students must know and comply with all official communication sent to their official e-mail address. The University will not excuse any student who does not read or receive official e-mails in a timely manner.

Email Policies

Email Policies

University of Colorado Boulder


Student E-mail Policy

1.      University use of e-mail
E-mail is an official means for communication within CU-Boulder. Therefore, the University has the right to send communications to students via e-mail and the right to expect that those communications will be received and read in a timely fashion.

2.      Assignment of student e-mail addresses
Information Technology Services (ITS) will assign all students an official University e-mail address. It is to this official address that the University will send e-mail communications; this official address will be the address listed in the University's Enterprise Directory for that student.

3.      Redirecting of e-mail
A student may have e-mail electronically redirected to another e-mail address. If a student wishes to have e-mail redirected from his or her official address to another e-mail address (e.g., @aol.com, @hotmail.com, or an address on a departmental server), they may do so, but at his or her own risk. The University will not be responsible for the handling of e-mail by outside vendors or by departmental servers. Having e-mail redirected does not absolve a student from the responsibilities associated with communication sent to his or her official e-mail address.

4.      Expectations regarding student use of e-mail
Students are expected to check their official e-mail address on a frequent and consistent basis in order to stay current with University communications. The campus recommends checking e-mail once a week at a minimum, in recognition that certain communications may be time-critical.

5.      Educational uses of e-mail
Faculty may determine how e-mail will be used in their classes. It is highly recommended that if faculty have e-mail requirements and expectations they specify these requirements in their course syllabus. Faculty may expect that students' official e-mail addresses are being accessed, and faculty may use e-mail for their courses accordingly.


6.      Appropriate use of student e-mail 
In general, e-mail is not appropriate for transmitting sensitive or confidential information unless its use for such purposes is matched by an appropriate level of security.

Library Management System

**Library Management System**
Overview :
Library is regarded as the brain of any institute; many institutes understand the importance of the library to the growth of the institute and their esteem users (students).  LMS support the general requirement of the library like acquisition, cataloguing, circulation.
Library project system that offers many flexible and convenient features, allowing librarians and library users to maximize time and efficiency. Library System gives the all detailed information about students, staff and books. It will track on the how many books available in library and books issued to the students. It shows popular book among the students. It will provide book lost in library. It keeps the record of the suppliers and book binders. It generates MIS reports for management. Our software is customizable for any library requirement.
Features of library management system:
  • Only basic knowledge of computers is required for operation of Library Management System. As it has user-friendly application interface.
  • Library Management System is Customizable and User Configurable.
  • An inbuilt Settings module makes Library Management System flexibility to cater to diverse organizational needs.
  • Library Management System has pre-defined reports. These are used for normal reporting as well as Administration & Staff development purpose. Additionally, Library Management System can be easily customized for their own customized reports.
  • Staff as well as student record is maintained
  • Newspapers attendance is maintained
  • Automatic fine fees calculation
  • Keeps record of supplier’s and binder’s
  • Customized Report designing
  • Configurable as per user’s requirements
Why you need it :
  • Improved customer service through greater access to accurate information.
  • Increased productivity and job satisfaction among staff members as it eliminates duplication of effort.
  • More economical and safer means of storing and keeping track of information.
  • Easier access to Information like management reports and stock etc, as well as more accurate and faster results from statistical analyses.
  • Reduces errors and eliminating the ennui of long and repetitive manual processing.
  • Greater accountability and transparency in operations.
  • Improved efficiency and effectiveness in administration and management as it has unprecedented access to real-time information.
  • More reliable security for sensitive and confidential information.
  • Appropriate knowledge-based action and intervention can now take place in a timelier manner.
Entities :
1.   Library Management system.
2.   Book.
3.   Faculty.
4.   Student.
5.   Reception.
6.   Category of Books.
7.   Reservation Book.

 Description: asd.bmp

fetch decode and execute cycle

Explian the fetch decode and execute cycle?

A standard process which describes the steps needed  for the processing. This cycle is called the fetch decode and execute cyle which have three parts which include fetching the data then decode it and at last execute that data .First of all both data and the program that acts upon that data are loaded into main memory(RAM) by the operating system.The CPU is now ready to work.
First Step;
1;Fetch the instruction .To start the cycle,The BIU places a memory read request on the control bus and the address of the instruction on the address bus.Memory responds by sending  the contents of the location specified -namely  the instruction code just given-over  the data bus, because the instruction code is of four byte and the 8086 can only read a word at a time this involves  two read operation .The CPU assepts the data and adds  four  to the IP will contain the address of the next instruction.
Second  Step;
2; The next  step  is for the CPU to make sense of the instruction it has just  fetched. This is called decode. On receiving  the  instruction,a decoder circuit in the EU decodes the instruction and determine that it is an ADD operation involving the word at address 0. The CPU is designed to understand a specific set of commands.
Third Step;
3;This is the part of cycle when data processing actually take place. This instruction is carried out upon the data. This result of processing is stored in yet another register. Once the execute stage is complete.The Cpu sets  itself up to begin another cycle once more.


Principles Of Object Oriented Design

Principles Of Object Oriented Design:
There are five principles of class design:
Ø  (SRP) The Single Responsibility Principle.
Ø  (OCP) The Open Closed Principle.
Ø  (LSP) The Liskov Substitution Principle.
Ø  (ISP) The Interface Segregation Principle.
Ø  (DIP) The Dependency Inversion Principle.
There are three principles of package cohesion:
Ø  (REP) The Reuse Release Equivalence Principle.
Ø  (CCP) The Common Closure Principle.
Ø  (CRP) The Common Reuse Principle.
There are three principles of package coupling:
Ø  (ADP) The Acyclic Dependencies Principle.
Ø  (SDP) The Stable Dependencies Principle.

Ø  (SAP) The Stable Abstractions Principle.

Cloud Computing

Cloud Computing :
“Cloud computing is a type of computing that relies on sharing computing resources rather than having local servers or personal devices to handle applications.”( By Vangie Beal)
In cloud computing, the word cloud (also phrased as "the cloud") is used as a metaphor for "the Internet," so the phrase cloud computing means "a type of Internet-based computing," where different services — such as servers, storage and applications — are delivered to an organization's computers and devices through the Internet.
·         The storing and accessing of applications and computer data often through a Web browser rather than running installed software on your personal computer or office server
·         Internet-based computing whereby information, IT resources, and software applications are provided to computers and mobile devices on-demand
·         Using the Internet to access web-based applications, web services, and IT infrastructure as a service.
Essential Characteristics:
Ø  On-demand self-service -- A consumer can independently and unilaterally provision computing capabilities, such as compute time, network connectivity and storage, as needed automatically without requiring human interaction with each service’s provider.
Ø  Broad network access -- Capabilities are available over the network and accessed through standard mechanisms that promote use by heterogeneous thin or thick client platforms.
Ø  Resource pooling -- The provider’s computing resources are pooled to serve multiple consumers using a multi-tenant model, with different physical and virtual resources dynamically assigned and reassigned according to consumer demand. There is a sense of location independence in that the customer generally has no control or knowledge over the exact location of the provided resources, but may be able to specify location at a higher level of abstraction (e.g., country, state, region or datacenter). Examples of computing resources include storage, processing (compute), memory, network bandwidth, and virtual machines.
Ø  Rapid elasticity -- Capabilities can be rapidly and elastically provisioned, in some cases automatically, to quickly scale out, and rapidly released to quickly scale in. To the consumer, the capabilities available for provisioning often appear to be unlimited and can be purchased in any quantity at any time.
Ø  Measured Service -- Cloud systems automatically control and optimize resource use by leveraging a metering capability at some level of abstraction appropriate to the type of service (e.g., storage, compute, bandwidth, active user accounts, etc.). Resource usage can be monitored, controlled, and reported, providing transparency for both the provider and consumer of the utilized service.

The diagram below depicts the Cloud Computing stack – it shows three distinct categories within Cloud Computing: Software as a Service, Platform as a Service and Infrastructure as a Service.

Service:
Services are divided into three categories:
q  SaaS (Cloud Software as a Service)
q  PaaS (Cloud Platform as a Service)
q  IaaS (Cloud Infrastructure as a Service)
·         Cloud Software as a Service (SaaS)--The capability provided to the consumer is to use the provider’s applications running on a cloud infrastructure. The applications are accessible from various client devices through a thin client interface such as a web browser (e.g., web-based email). The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of provider-defined user-specific application configuration settings
·         Cloud Platform as a Service (PaaS)--The capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages and tools supported by the provider. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, or storage, but has control over the deployed applications and possibly application hosting environment configurations
·         Cloud Infrastructure as a Service (IaaS)--The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. The consumer does not manage or control the underlying cloud physical infrastructure but has control over operating systems, storage, deployed applications, and possibly limited control of select networking components.

process management between Linux VS Windows 8

Q) Write Differentiating points on process management between Linux and Windows 8……??
Process management Linux
1.         Entering Kernel Mode
2.         Location of User-mode Stack
3.         Switching to Kernel Stack
4.         What’s on the User Stack
5.         What’s on the Kernel Stack
6.         Process State
7.         Identifying a Process
8.         Relationships among Processes
9.         Processes are Organized
10.       The Run queue
11.       Wait Queues
12.       Process Termination
 Process management in windows 8
           The processes a dynamic and, contain a number of instructions, the program counter, register and stack collection that contains the memory address. Process can be said to be a program in execution (Program Application / Operating System) process can also be regarded as the smallest unit of work that individuals have the resources-resources and scheduled by the operating system. Thus the operating system has a very complex activity in manage all resources and provide the operating system requires a management process.

1.         Multi Programing
2.         Distributed Processing / Computing
3.         Multiprocessing



Process management in Windows 8

Process management in Windows 8

  Windows 8 operating system services allows creation of new processes in response to a system call.
v  It allows users to create multiple numbers of processes with default attributes and identifiers
v  the creation of a new process , process control block is taken from the main memory that provides the parameter about the running process like process name, process priority, process state, CPU registers etc.
v  You can also destroy and remove the specified process from the computer system by responding to a system call.
v  Windows 8 operating system services allows creation of new processes in response to a system call. It allows users to create multiple numbers of processes with default attributes and identifiers. Any process cannot be started by its own but require system calling. With the creation of a new process , process control block is taken from the main memory that provides the parameter about the running process like process name, process priority, process state, CPU registers etc
v  Any newly created process can be removed from Windows 8 environment by using deleting system call from operating system. When any delete command is executed then the operating system de-allocate all resources allocated to the specified process and finally return the process control block back to the free main memory from which it is accessed.
v  Sometimes, due to lack of resources the situation might occurs in which forceful termination of currently running processes are required which is fulfilled by abort command which is as same as delete command. When abort command is called then the memory registers and dump memory information is transferred to the main memory and then all processes with dump memory locations are terminated.
v  Some processes are suspended from main memory because of less memory space. These all suspended processes are put under the suspended list and later operating system resume command provides resuming of suspended processes. Even we can also delay the execution of processes by changing the priority state of currently running processes.

Process management in Linux

Process management in Linux

There are generally two types of processes that run on Linux. Interactive processes are those processes that are invoked by a user and can interact with the user. Interactive processes can be classified into foreground and background processes. The foreground process is the process that you are currently interacting with, and is using the terminal as its stdin (standard input) and stdout (standard output).
There are two kinds of execution contexts in Linux. Process and lightweight processes. However, Linux makes no distinction among these forms from scheduling point of view. Linux uses lightweight processes to provide the features of a multithreaded application. The Linux kernel use to store information about each process in the process descriptor.
v Linux Processes
Linux can manage the processes in the system, each process is represented by a task_struct data structure (task and process are terms that Linux uses interchangeably).
This means that the maximum number of processes in the system is limited by the size of the task vector, by default it has 512 entries. As processes are created, a new task_struct is allocated from system memory and added into the task vector. To make it easy to find, the current, running, process is pointed to by the current pointer.
Linux supports real time processes. These processes have to react very quickly to external events (hence the term ``real time'') and they are treated differently from normal user processes by the scheduler. Although the task_struct data structure is quite large and complex, but its fields can be divided into a number of functional areas
v State
As a process executes it changes state according to its circumstances. Linux processes have the following states.
v Running
The process is either running (it is the current process in the system) or it is ready to run (it is waiting to be assigned to one the system CPU.
v Waiting
The process is waiting for an event or for a resource. Linux differentiates between two types of waiting process; interruptible and uninterruptible. Interruptible waiting processes can be interrupted by signals whereas uninterruptible waiting processes are waiting directly on hardware conditions and cannot be interrupted under any circumstances.
v Stopped
The process has been stopped, usually by receiving a signal. A process that is being debugged can be in a stopped state.
v Scheduling Information
The scheduler needs this information in order to fairly decide which process in the system most deserves to run,
v Identifiers
Every process in the system has a process identifier. The process identifier is not an index into the task vector, it is simply a number.
v Times and Timers
The kernel keeps track of a processes creation time as well as the CPU time that it consumes during its lifetime. Each clock tick, the kernel updates the amount of time in jiffies that the current process has spent in system and in user mode.
v Processor Specific Context

A process could be thought of as the sum total of the system's current state. Whenever a process is running it is using the processor's registers, stacks and so on. This is the processes context and, when a process is suspended, all of that CPU specific context must be saved in the task_struct for the process. When a process is restarted by the scheduler its context is restored from here.