Skip to main content

Posts

Showing posts from May, 2013

Download WECHAT for Symbian V5,V6,Apple,Blackberry,windows.

Download WECHAT for Symbian V5,V6,Apple,Blackberry,windows. WECHAT is AVAILABLE for Nokia Symbian(.sis,.SISX),Windows Phones,Blackberry(OS5,OS6) --> Select your device and click go to Download For Apple Devices. Google Play. Windows Mobiles. Symbian-Keybord Symbian-Touch OS 5.0 OS 6.0 and above. S60v3[offline] S60v3[offline]

Download WECHAT.JAR(wechat for java platform mobile device.)offline.

wechat java v 2 chat messangers for JAVA wechat java version not available yet you can check its official website if it is now available.                     Download WECHAT.Jar

Wechat-solution for free chat online.

We chat -free download                                                             Available for all platform. click here to download...... Compiteble with following devices. Alcatel,Alcatel OT-708 One Touch MINI -wechat,Alcatel OT-800 One Touch Tribe -wechat Apple,Apple iPhone -wechat,Apple iPhone 3G -wechat,Apple iPhone 3GS -wechat,Apple iPhone 4   -wechat,BlackBerry,BlackBerry 8800 -wechat,blackBerry 8830 World Edition -wechat,BlackBerry Bold 9000 -wechat BlackBerry Bold 9700 -wechat,BlackBerry Curve 3G 9300 -wechat,BlackBerry Curve 8300 -wechat,BlackBerry Curve 8310   -wechat,BlackBerry Curve 8320 -wechat,BlackBerry Curve 8520 -wechat,BlackBerry Curve 8900 -wechat,BlackBerry   Pearl 8100 -wechat,BlackBerry Pearl 8110 -wechat,BlackBerry Pearl 8120 -wechat,BlackBerry Pearl Flip 8220   -wechat,BlackBerry Storm 9500 -wechat,BlackBerry Storm 9530 -wechat,BlackBerry Torch 9800 -wechat,Dopod,Dopod   818 Pro -wechat,HTC,HTC Desire -wechat,HTC HD2 -wechat,HTC Legen

build your own robot? you must know this little thing of Robotic Technology.

Public fascination with robots goes back a long way, and it was only a matter of time before people decided it would be a fun hobby to build them at home. Take this quiz to learn a bit about the parts involved in building your own robot! Which components are used in a home-brewed robot? 1.frame 2.motors. 3.electronics. All of those components will be found in a home-built robot. The frame is the base of the design, to which everything else will be attached; motors will run things like wheels and arms; and electronics will provide the brains and juice to keep the robot working. How much does it cost to build your own robot? If it's your first robot, you should anticipate spending about $100 to $400. While experienced robot builders could build one for very little money, that's only because they are experienced and also have likely built up a supply of parts over the years. What is the simplest control method for a robot? Differential drive is a way that a robot can

Electric power transmission.

Electric power transmission is one process in the delivery of electricity to consumers.The term refers to the bulk transfer of electrical power from place to place. Typically, power transmission is between the power plant and a substation near a populated area. Power station . A power station or power plant is a facility for the generation of electric power.At the centre of nearly all power stations is a generator, a rotating machine that converts mechanical energy into electrical energy by creating relative motion between a magnetic field and a conductor.

Three-phase electric power.

Three-phase is a common method of electric power transmission.It is a type of polyphase system used to power motors and many other devices. Three phase has properties that make it very desirable in electric power systems. Firstly the phase currents tend to cancel one another (summing to zero in the case of a linear balanced load). This makes it possible to eliminate the neutral conductor on some lines. Secondly power transfer into a linear balanced load is constant, which helps to reduce generator and motor vibrations. Finally, three-phase systems can produce a magnetic field that rotates in a specified direction, which simplifies the design of electric motors. Three is the lowest phase order to exhibit all of these properties.

Integrated circuit.

A monolithic integrated circuit (IC) or often referred to as a microchip or simply chip is a miniaturized electronic circuit (consisting mainly of semiconductor devices, as well as passive components) which has been manufactured in the surface of a thin substrate of semiconductor material. Circuit design. The process of circuit design can cover systems ranging from national power grids all the way down to the individual transistors within an integrated circuit.For simple circuits the design process can often be done by one person without needing a planed or structured design process, but for more complex designs, teams of designers following a systematic approach with intelligently guided computer simulation are becoming increasingly common. As circuit design is the process of working out the physical form that an electronic circuit will take, the result of the circuit design process is the instructions on how to construct the physical electronic circuit. This will normally take the f

Seismometer.

Seismometer are used by seismologists to measure and record seismic waves. By studying seismic waves, geologists can map the interior of the Earth, and measure and locate earthquakes and other ground motions. The term seismograph is usually interchangeable, but seismometer seems to be a more common usage. Seismic wave. A seismic wave is a wave that travels through the Earth, most often as the result of a tectonic earthquake, sometimes from an explosion.There are two types of seismic wave, namely, 'body wave' and 'surface wave'. There are two kinds of body waves: primary (P-waves) and secondary (S-waves). Surface waves are analogous to water waves and travel just under the Earth's surface. They travel more slowly than body waves.

Circuit design.

The process of circuit design can cover systems ranging from national power grids all the way down to the individual transistors within an integrated circuit.For simple circuits the design process can often be done by one person without needing a planed or structured design process, but for more complex designs, teams of designers following a systematic approach with intelligently guided computer simulation are becoming increasingly common. As circuit design is the process of working out the physical form that an electronic circuit will take, the result of the circuit design process is the instructions on how to construct the physical electronic circuit. This will normally take the form of blueprints describing the size, shape, connectors, etc in use, and artwork or CAM file for manufacturing a printed circuit board or Integrated circuit.

Aspect-oriented programming.

In software engineering, the programming paradigm of aspect-oriented programming (AOP), also called aspect-oriented software development (AOSD), attempts to aid programmers in the separation of concerns, or the breaking down of a program into distinct parts that overlap in functionality as little as possible. Hash function. A hash function or hash algorithm is a function for examining the input data and producing an output hash value.The process of computing such a value is known as hashing. Object-oriented programming. In computer science, object-oriented programming, OOP for short, is a computer programming paradigm.The idea behind object-oriented programming is that a computer program may be seen as composed of a collection of individual units, or objects, that act on each other, as opposed to a traditional view in which a program may be seen as a collection of functions or procedures, or simply as a list of instructions to the computer. Computational genomics Computationa

Best of Both Worlds: Towards a Quantum Internet With Combined Optical and Electrical Technique.

An Australian team led by researchers at the University of New South Wales has achieved a breakthrough in quantum science that brings the prospect of a network of ultra-powerful quantum computers -- connected via a quantum internet -closer to reality.The team is the first in the world to have detected the spin, or quantum state, of a single atom using a combined optical and electrical approach. The study is a collaboration between researchers from the ARC Centre of Excellence for Quantum Computation and Communication Technology based at UNSW, the Australian National University and the University of Melbourne. It is published in the journal Nature. UNSW's Professor Sven Rogge said the technical feat was achieved with a single atom of erbium -- a rare earth element commonly used in communications -- embedded in silicon. "We have the best of both worlds with our combination of an electrical and optical system. This is a revolutionary new technique, and people had doubts it w

Computer Algorithms Help Find Cancer Connections.

Powerful data-sifting algorithms developed by computer scientists at Brown University are helping to untangle the profoundly complex genetics of cancer.In a study reported today in the New England Journal of Medicine, researchers from Washington University in St. Louis used two algorithms developed at Brown to assemble the most complete genetic profile yet of acute myeloid leukemia (AML), an aggressive form of blood cancer. The researchers hope the work will lead to new AML treatments based on the genetics of each patient's disease. The algorithms, developed by Ben Raphael, Eli Upfal, and Fabio Vandin from the Department of Computer Science and the Center for Computational Molecular Biology (CCMB), played a key role in making sense of the giant datasets required for the study. The work was part of The Cancer Genome Atlas project, which aims to catalog the genetic mutations that cause cells to become cancerous. Doing that requires sequencing the entire genome of cancer cells and

More Than a Good Eye: Robot Uses Arms, Location and More to Discover Objects.

A robot can struggle to discover objects in its surroundings when it relies on computer vision alone. But by taking advantage of all of the information available to it -- an object's location, size, shape and even whether it can be lifted -- a robot can continually discover and refine its understanding of objects, say researchers at Carnegie Mellon University's Robotics Institute. The Lifelong Robotic Object Discovery (LROD) process developed by the research team enabled a two-armed, mobile robot to use color video, a Kinect depth camera and non-visual information to discover more than 100 objects in a home-like laboratory, including items such as computer monitors, plants and food items. Normally, the CMU researchers build digital models and images of objects and load them into the memory of HERB -- the Home-Exploring Robot Butler -- so the robot can recognize objects that it needs to manipulate. Virtually all roboticists do something similar to help their robots recognize

Technique Finds Software Bugs in Surgical Robots and Helps Developers Fix Flaws, Ensure Safety.

Surgical robots could make some types of surgery safer and more effective, but proving that the software controlling these machines works as intended is problematic. Researchers at Carnegie Mellon University and the Johns Hopkins University Applied Physics Laboratory have demonstrated that methods for reliably detecting software bugs and ultimately verifying software safety can be applied successfully to this breed of robot. They used theorem-proving techniques to analyze a control algorithm for a research robot that would help a surgeon perform surgery at the base of the skull. Their method identified a safety flaw that could enable a scalpel or other surgical tool to go dangerously astray in this area, where the eye orbits, ear canals and major arteries and nerves are closely spaced and vulnerable to injury. It also guided development of a new algorithm and verified that the new controller was safe and reliable. "These techniques are going to change how people build robotic

Computer virus

A computer virus is a self-replicating computer program written to alter the way a computer operates, without the permission or knowledge of the user. Though the term is commonly used to refer to a range of malware, a true virus must replicate itself, and must execute itself. The latter criteria are often met by a virus which replaces existing executable files with a virus-infected copy. While viruses can be intentionally destructive—destroying data, for example—some viruses are benign or merely annoying. For more information about the topic Computer virus, read the full article at Wikipedia.org.

Computer insecurity.

Many current computer systems have only limited security precautions in place. Serious financial damage has been caused by computer security breaches, but reliably estimating costs is quite difficult. Figures in the billions of dollars have been quoted in relation to the damage caused by malware such as computer worms like the Code Red worm, but such estimates may be exaggerated. However, other losses, such as those caused by the compromise of credit card information, can be more easily determined, and they have been substantial, as measured by millions of individual victims of identity theft each year in each of several nations, and the severe hardship imposed on each victim.