Saturday, August 31, 2013

PPT ON WORLD WIDE WEB

Presentation On WORLD WIDE WEB
Download

WORLD WIDE WEB Presentation Transcript:
1.WORLD WIDE WEB 
(WWW)

2.WORLD WIDE WEB 
(WWW)

3.CONTENTS OF WWW
HYPERTEXT&HYPERLINK
HTML
WEB PAGES
WEBSITE
TYPES OF WEBSITE
WEB BROWSER

4.Hypertext&hyperlink
 HYPERTEXT CONTAINING WORDS THAT CONNECT TO OTHER DOCUMENTS

 CONTAINING WORDS ARE CALLED HYPERLINKS
PRODUCING HYPERTEXT FOR THE WEB IS ACCOMPLISHED BY CREATING DOCUMENTS WITH A LANGUAGE HTML(HYPER TEXT MARK UP LANGUAGE)

5.HYPER TEXT MARK UP LANGUAGE
HTML CODE EDITORS AND WYSIWG EDITORS BUILT YOUR HTML PAGES.
IT REQUIRES ONLY SIMPLE TEXT EDITOR TO START CODING
AN HTML FILE CONTAIN “MARK UP TAGS” THAT FILL THE WEB BROWSERTHAT HOW  TO FOLLOW THE,INSTRUCTIONS ENCLOSED WITHIN THE TAGS

6.FOLLOWING ARE THE TAGS OF HTML:-





7.WEB PAGES
IT IS A RESOURCE OF INFORMATION THAT IS SUITABLE FOR THE WORLD WIDE WEB
 IT CAN BE ACCESSED THROUGH A WEB BROWSER
 CONSISTS  OF FILES OF STATIC TEXT STORED WITHIN THE WEB SERVER’S FILE SYSTEM

8.WEBSITE
 COLLECTION OF WEBPAGES KNOWN AS WEBSITE
2.THE PAGES OF WEBSITE CAN USUALLY BE ACCESSED FROM A COMMON ROOT CALLLED THE HOME PAGEE
3.IT HAVE TWO PARTS
1.BOOKMARK
2.WEB DIRECTORY

9.BOOKMARK
1.IT CAN STORED WEB PAGE LOCATION(URLs)
2.BOOKMARKS ARE SAVED LINKS AND ALSO CALLED FAVORITES
3.WEB DIRECTORY
1.IT SPECILALIZES IN LINKING TO OTHER WEB SITES.

10.TYPES OF WEBSITE:-
1.STATIC WEBSITE :-
IN THIS WEB PAGES ARE STORED ON THE WEB SERVERIN THE SAME FORM AS THE USER WILL VIEW THEM
2.DYNAMIC WEBSITE:-
IT DOES NOT HAVE WEB PAGES STORED ON THE WEB SERVER IN THE SAME FORM AS THE USER WILL VIEW THEM.

11.FOLLOWING ARE THE WEBSITE MOST USABLE:-
1.CORPORATE WEBSITE
2.PERSONAL WEBSITE
3.E-COMMERCE WEBSITE
4.AFFILIATE WEBSITES
5.BLOG WEBSITES
6. GAMES WEBSITES

12.UNIFORM RESOURCE LOACTOR
IT SPECIFIES THE INTERNET ADDRESS OF A FILE STORED ON A HOST COMPUTER CONNECTED TO THE INTENET.
WEB BROWSER USE THE URL TO RETRIEVE THE FILE FROM THE HOST COMPUTER AND THE SPECIFIC DIRECTORY IN WHICH IT RESIDES

13.FACTS ABOUT URL
URLs ARE TRANSLATED INTO NUMERIC ADDRESSES USING THE DOMAIN NAME SYSTEM(DNS)
THE NUMERIC ADDRESS CALLED THE IP(INTERNET PROTOCOL) ADDRESS, IS ACTUALLY THE”REAL URL”.
E.G. OF DNS(198.123.213.100)

14.WEB BROWSER
IT IS SOFTWARE APPLICATION WHICH ENABLES A USER TO DISPLAY AND ITERACT WITH INFORMATION LOCATED ON THE WEB PAGES OR AT WEBSITE
WEB BROWSERS ALLOW A USER TO QUIKLY AND EASILY ACCESS INFORMATION PROVIDED ON MANy WEB PAGES AT MANY WEBSITES BY TRVERSING THESE LINKS.
WEB BROWSERS FORMAT HTML INFORMATION FOR DISPLAY.

15.TYPES OF WEB BROWSER
GRAPHICAL:-
E.G. OF GRAPHICAL WEB BROWSERS ARE AS FOLLOWS INTENET EXPLORER,MOZILA FIREFOX,GOOGLE CHROME
2. TEXT:-
ACCESS TOTHE WEB IN TEXT ONLY MODE SUCH AS LYNX

Source: Power Point Presentations

PPT ON WATER AND MINERALS

Presentation On Water And Minerals
Download

Water And Minerals Presentation Transcript:
1.Water And Minerals

2.Calcium and Phosphorus
Used to build bones and teeth.
99% of total body calcium is found in bones and teeth.
Calcium and Phosphate crystals bond together to form HYDROXYAPATITE. 

3.Hydroxyapatite is what gives bones strength.
Bones are being rebuilt each day, therefore the calcium in the bones is constantly changing.
Now calcium in teeth has a similar role.
However the mineral turnover is not as rapid as that in bones

4.Calcium also circulates in the blood
There is a constant level maintained so that it is always available when needed.
Helps: muscles contract, nerves transmit impulses and blood to clot
Can also help lower blood pressure

5.Phosphorus also circulates in the blood
Involved in metabolism
Part of DNA and needed to grow
Buffers both acids and bases in all the body’s cells.
Milk and milk products are excellent sources of calcium and phosphorus. 

6.Magnesium
Found in all body tissues
60% of it is found in bones
The other 40% is distributed between the soft tissues such as muscles and blood.
The body works hard to keep blood levels of magnesium constant.

7.Magnesium is essential for  systems responsible for energy metabolism.
Building bones and maintaining teeth
Muscle relaxation and nerve transmission.
Keeps the immune system working.

8.These are some of the different foods that contain magnesium.
Buckwheat Flour and Bulghur, dry contain the highest amount of magnesium in this 

9.Sodium
Part of the electrolytes group(sodium, potassium, &chloride)
 Sodium is a positively charged ion that is found mostly in the fluid outside the cells.
The major source of sodium in the diet is salt
Many processed foods are high in sodium
High Blood pressure also known as hypertension is the most important health issue caused by overconsumption of sodium
Do not consume more than 1500mg per day

10.Potassium
Also an electrolyte
Found in the fluid inside individual body cells
Helps maintain water balance and acid base balance
Helps muscles contract
Helps maintain a healthy heartbeat
Helps send nerve impulses.

11.Chloride
Also an electrolyte
Helps maintain water balance and acid base balance
Part of hydrochloric acid which is highly concentrated in stomach juices.
Aids in protein digestion, destroys harmful bacteria, and increases the absorption of calcium and iron.

12.Iron
One of the most abundant metals
Most important in the body
Key component of hemoglobin
Also part of  myoglobin 
Works with enzymes in energy metabolism
Necessary for the body to produce energy

13.15% of the body’s iron is stored in  the bone marrow, spleen and liver for future use
Meat, Poultry, and Fish are great sources of iron

14.15% of the body’s iron is stored in  the bone marrow, spleen and liver for future use
Meat, Poultry, and Fish are great sources of iron

15.Required in extremely small amounts
Once in the body, iodine is chemically changed to iodide.
Most in the world is found in seawater.

Source: Power Point Presentations

PPT ON VIRTUAL ONLINE TUTORING

Presentation On Virtual Online Tutoring
Download

Virtual Online Tutoring Presentation Transcript: 
 1.Virtual online tutoring 

2.Purpose of Online tutoring
Online tutoring gives students around the clock access direct and live assistance from qualified teachers
Access to qualified and monitored tutors in required courses and skills from any Internet connection
An Online Writing Lab for all courses including computer courses
Easy access to Academic resources 

3.Create a simple website
The website gives a complete information about you with your picture, subjects you tutor, phone number and free phone consultation offer.

4.Decide the Age group you will tutor
Elementary and middle school subjects are much easier to teach, but tutoring higher classes, college students and adults as well may make it easier to meet your business goals.

5.Online tutoring software
There are different options to decide your tutoring software
Check your online classroom for active tutoring devices . Test your microphone to make sure it works properly.

6.Online tutoring software
Skype with Idroo (http://www.idroo.com/home)
Gchat
Google Docs
Wikispaces
Scribblar
WizIQ

7.Advertise your business
Advertise your business locally and online. Use free business cards to a spread your words. 
freebusinesscardoffer.com  offer free business cards to initiate a business
Advertise your business through craigslist 
Participate in different learning forums and advertise.

8.Set the prices for your Tutoring
Answering parents first call, be sure to offer an introductory price or free first hour tutoring. 
Package offer for different subject is also a charming offer. 

9.Process payments from your client
Allow virtual payments through paypal (www. paypal.com) from your clients. It is comfortable and will save time. 

10.Manage your first online session
Engage your student in an exciting way to catch particular attention. Try to establish a competent first impression to acquire good and  long term clients.

11.Regular meeting with parents
After the first introductory session contact the parents to discuss about the system. Offer packages and good payment methods. 

12.Advantage of Online tutoring
You can easily tutor from home and can save time and expenses 
You can reach students outside of your immediate geographic area
You can conduct tutoring sessions for multiple students at one time and multiply your hourly rate 

13.Disadvantages
Initial setup fees, plus investment time to set up a infrastructure
It may take some time to build up your business 

14.One –On-one drop in online tutoring 
24/7 live tutoring for  computer
Drop in tutoring for other subjects in different timings
          - Maths
          - Biology
          - English 

15.Tutoring Options Available For Computer Science Student 
The whole spectrum of online tutoring options is available for students who seek computer science help at your website.

Source: Power Point Presentations

PPT ON TRANSISTOR AGING

Presentation On TRANSISTOR AGING
Download

TRANSISTOR AGING Presentation Transcript:
1.TRANSISTOR AGING 

2.INTRODUCTION
Transistors do age ….like         Humans!!
Time by time degradation of performance of a transistor is called Transistor Aging.
The degradation of  transistors occurs over time  and  can  result in  circuit failure!!!
Several different phenomena can degrade the transistors.

3.WHAT WE ALREADY KNOW
A transistor is a three terminal semiconductor device used to  amplify and switch electronic signals.
It is the fundamental building block of modern electronic devices.
ADVANTAGES:
 Smaller, less expensive, requires
 less electricity  etc.
APPLICATIONS:
 Hearing aids,Watches,Cameras, TV etc.

4.AGING MECHANISMS
OXIDE BREAKDOWN.
HOT CARRIER INJECTION.
NEGATIVE BIAS TEMPERATURE INSTABILITY(NBTI).

5.OXIDE BREAKDOWN:
Refers to the destruction of an oxide layer.
       Defects within the gate oxide are usually
       called traps.
They are called traps because the degraded  Oxide can trap charges. Traps are usually neutral. Once these traps form a conduction path from the gate to the channel, breakdown occurs.

6.NEGATIVE BIAS TEMPERATURE INSTABILITY(NBTI): 
Occur due to the application of negative bias to gate at elevated temperature.
Traps charge within the dielectric.
Whenever you apply gate voltage, charge buildup in the dielectric.

7.HOT CARRIER INJECTION: 
A carrier is injected from the conducting   channel in the silicon substrate to the SiO2 layer.
 Since the charge carriers becomes trapped in the SiO2 layer of a MOS transistor, the voltage needed to turn on the transistor increases .
As a result transistor switches more and more slowly.

8.OXIDE BREAKDOWN
Gate-oxide breakdown begins when traps form in the gate-oxide.
more and more traps are created in the gate-oxide.
traps start to overlap creating a conduction path-breakdown occurs-SOFT BREAKDOWN(SBD).
Once there is conduction, new traps are created by thermal damage, which in turn allows for increased conductance.

9.This cycle of conduction leading to increased heat leads to thermal runaway.
The Silicon within the breakdown spot starts to melt, and Oxygen is released
Silicon filament is formed in the breakdown spot.

10.CROSS SECTION OF GATE OXIDE AFTER HARD BREAKDOWN THROUGH EMISSION- MICROSCOPY.

11.TRAP GENERATION
There are different theories on how defects are generated in the gate-oxide.
The two main models are :
The Thermo chemical model .
The Anode Hole Injection (AHI)model.

12.AHI MODEL
The AHI model is based on the process of electron injection into the oxide and holes are generated at the anode which then gets trapped into the oxide.
At high electric fields, the electrons arriving at the gate have a high kinetic energy
 (> 8MV/cm).

13.When these hot electrons reach the gate electrode they transfer their entire energy to a deep-valence band electron, and
this electron is promoted to the lowest available electron energy state, which is the conduction band edge .
Once the electron reaches the conduction band, it creates a hot hole, which tunnels into the oxide.

14.The holes which enter the oxide, allow for increased current density.
Due to increased current density, more electrons  tunnel in to the gate and more holes  are created.
These holes creates traps within the oxide.

15.How to limit  degradation?
Prevention cannot be done, as for most of the electronic devices, they will loose their properties over time.
To limit transistor aging effect in a circuit, various  method can be used.
Lets discuss some of them.

Source: Power Point Presentations

PPT ON THE EFFECTS OF SOCIAL NETWORKS AMONG STUDENTS

THE EFFECTS OF SOCIAL NETWORKS AMONG STUDENTS PPT
Download

THE EFFECTS OF SOCIAL NETWORKS AMONG STUDENTS Presentation Transcript: 
1.THE EFFECTS OF SOCIAL NETWORKS AMONG STUDENTS

2.INTRODUCTION
This section will explain the:
Background of the study 
Research question
Research objectives

3.BACKGROUND OF STUDY
Social Networks is defined as ‘social space’ for people
who want to expose themselves among others and
staying connection with each others.

4.RESEARCH QUESTION
RQ1: How do social networks affect students positively?
RQ2: What types of social networks students usually use?
RQ3: Why social networks important in students life?

5.RESEARCH OBJECTIVE
To identify the positive effects of social network among students.
To determine the types of social networks students most preferred.
To examine the important of social networks among students.

6.METHODOLOGY

7.THE QUESTION AND THE FINDING THAT RELATED TO RQ.1:- Q:What are the positive effect of social networking sites towards students?

8.FINDINGS
THE QUESTION AND THE FINDINGS THAT RELATED TO RQ.2:- Q: Please rank the following choice of social networks that you prefer.

9.FINDINGS

10.THE QUESTION AND THE FINDING THAT RELATED TO RQ.3:- Q: Why the social networks are important to students? 

11.CONCLUSION
There exist the positive effects of social network among students instead of the negative effects such as improve their communication skills, can get many friends from other countries and improve their technology skills.
The types of social networks that students most prefer are facebook and youtube.
The important of social network among student are easy to communicate with friends and lecturer, faster way to get latest information, feeling more connected to campus, lead students to share ideas and notes for their study and also can always keep in touch with family.

12.REFERENCE
http://ro.uow.edu.au/etc08/9
www.ncbi.nlm.nih.gov/pmc/articles/pmc2254235/
http://www.nst.com.my/opinion/letters-to-the-editor/social-media-it-s-here-to-stay-so-use-it-wisely-1.29304
http://www.nst.com.my/top-news/khaled-use-facebook-in-varsities-1.50763

Source: Power Point Presentations

PPT ON CODE LOCK

Presentation On CODE LOCK


Download

CODE LOCK Presentation Transcript:
1.INTRODUCTION
 Digital Code Lock using AT89C2051 is a basic control system with an ability that allows any user having valid user password or Master password to use the system with simple password protection
    This code can be changed by the user. This circuit is eminently suitable as a digital lock with security option.
 Digital     
 code lock  
 is a type   
  of lock 
  in which any combination of 5 digits  is used to open the lock.
    This type of  
  lock use  
 numerical code for authentication where the correct code must be entered in order for the lock to deactivate.
 The lock can be used with an outdoor gate or a normal door. The functionality of this lock is implemented in software
    When the correct code is entered it will open the door. The significant of this project is to  eliminate the need for a key.

2.NEED OF CODE LOCK
This kind of lock can avoiding the problems caused by the copying of keys. 
On the premise that it’s safety is high, it’s another feature without key is getting more and more favour of people
There are great varieties of digital code locks. Generally speaking, they can be classified into scores of type, such as electronic lock, fingerprint lock, card lock biological lock, etc.

3.OBJECTIVES
To free users from the worry of remembering keys
To design a keyless door entry by using electronic digital lock code
To avoid any crimes especially stealing activities

4.WIRING CIRCUIT

5.ADVANTAGES
WHEN SYSTEM IS BLOCKED AFTER UNSUCCESFUL  ATTEMPTS THEN JUST ENTER THE MASTERCODE ,THE SYSTEM WILL BE UNBLOCKED.SO THERE IS NO NEED TO ‘POWER OFF’ THE SYSTEM FOR RESETTING.
THERE IS NO NEED TO ENTER THE SECURITY CODE TO LOCK THE SYSTEM  AGAIN, JUST PRESS THE ‘#’ KEY TO LOCK AGAIN.
EVERYTIME THE SECURITY CODE CHANGES IT IS NOT SAME FOR ALL THE CASES , AND THE PERSON WHO KNOW ABOUT THE SYSTEM THOROUGHLY ONLY HE CAN CHANGE THE CODE.SO THIS THING PREVENTS THE SYSTEM FROM HACKING.

6.This digital code lock is therefore particularly useful in applications such as hotel room door locks, residential housing and even office buildings.
We feel that this digital code lock is very marketable because it is easy to use, comparatively inexpensive due to low power consumption and highly reliable
Lock which contained hardware and software development. We also know and understand the microcontroller AT89C2051 and how to implement it on my project

Source: Power Point Presentations

PPT ON DMAIC

Presentation On DMAIC

Download


DMAIC Presentation Transcript:
1.Executive Summary
Define Phase
D1. Project Charter
D2. Customer Requirements
D3. High-level process map
Measure phase
Analyze Phase
Improve Phase
Control phase
Tools
Works Cited

2.Executive Summary 
The IT industry is one of the fastest growing industries in the world today. The industry is populous with IT service companies, one of the services offered is customer care support services either online or via telephone calls. The high competition leads to lowered prices that often they equally range across all the companies in a given market. For a company to remain in the market and profitably run its activities as usual, it has to offer the best services than its competitors. This case study applies the Six Sigma techniques like DMAIC .Benchmarking and just setting a project team to work on the basis on a simple six sigma may not fully solve a problem. DMAIC defines the issues affecting the company to a large span making it easier to distill more clues and real figures from the top performers in the industry thus acquiring facts and reliable data to promote the project.
If data from an unbiased source is used, say the company studied has customer care satisfaction ratings of seventy-three out of a hundred; the ‘average’ company in the industry has a rating of seventy-six out of a hundred and the best performer in the industry at eighty seven percent. This data alone shows that efforts have to be made in order for the company to survive the competition. In the IT service industry customer satisfaction is a major contributor to a company’s growth (Hallowell).
Support costs per call are not related to satisfaction, best companies’ support call cost $26, ‘average’ companies at $30 per call while the case study company’ call cost about $36 which is the highest of all (Hallowell).On focusing  the DMAIC project the ‘Y’ being new account growth and the ‘Xs’ being number of transfers, wait time and service. Wait time is associated with customer satisfaction thus improvement on the time is essential. After discovery of the points of weakness: the company managers then set project goals, scope and the study case using DMAIC (Define, Measure, Analyze, Improve, Control) teams.

3.D1. Project Charter:
     It expands on the business case clarifying the focus, measures of the project’s performance, and completed by a six sigma Black Belts who are the team leaders. They respond by implementing the improvement projects using skills of six sigma tools and lead increase of customer satisfaction. The key stakeholders are the customers, staff members and the business. The problem statement is one of the project charter elements; it gives the progress of the competitors as compared to the stagnated case study company. Goal statement element is that the customer satisfaction rating is at 90th percentile=75% targeting 85% in the same percentile by end of fourth quarter without changing support costs. The last element is process output such as milestones, roles, communication procedure (Hallowell)

4.Continuation of define phase
D2. Customer Requirements: using SIPOC (Suppliers, Inputs, processes, outputs and customers) identify the important customers for instance, customers, staff and business. Voice –of –customer inter views can be used to know what influences their level of satisfaction with the services offered. A summary outcome of the customer requirements is as follows;

5.Measure phase
Define how data is to be gathered. For example; satisfaction-by standard survey per month in the industry, one by one customer satisfaction data.
Performance standards; satisfaction- 90th percentile (70-80%) satisfied, performance -90th percentile (85% satisfied)
Factors for data acquisition plan; collection efforts, cause-and-effect tools in use, nature of segmentation of Y-call center and product, factors driving Ys- the important X (call type or customer type).
Measurement system; its accuracy, stability over time, repeatability of the same value, reproducibility when used by different people. Collection of data can be automated, manual and by use of any other metrics. Display data in a simple format to enable the team to look for clues in charts and graphs (Hallowell).

6.Analyze Phase
Analysis is performed to check the capability of the process as compared to the present standards. Adjustment is done if the goal is not meeting the expectations. Data is partitioned in order to find the causes of the variations. Identify the possible X and verify to narrow down to see the important causes of variation. Update the prediction on how improvement can be achieves in the process. It can be found that satisfaction and support costs are affected by wait time and interruptions during call service.

7.Continuation of Analyze phase
A1: Define Performance of the process
        Measurement  of the current process capabilities to enable proper definition of the projects’ objectives. Here the root causes and drivers of the problems are critically analyzed. 

A2: Suggest the improvement Objectives
        If the analysis in A1 shows that the is variation from the expected results then proper measures should be taken to improve the outcome of the overall process.

8.Identify Value/Non-Value Added Process Steps 

        By dividing the Y values based on the main factors (X's) as identified during the Measure phase – the team looks for patterns that shed light on what may be causing or driving the observed Y variations. 

9.Determine Root Cause(s)
Collecting the findings that came out of A3, the team posed strongest in the form of "why" questions:
Why do transfer rates differ by call type? (higher on Problems and Changes, lower on others)
Why do Problems and Changes cost more than other call types? 
Why are calls processed on Mondays and Fridays more expensive?
 Why are wait times higher on Mondays and Fridays and on Week 13 of each quarter?

10.Determine Vital Few X's, Y=f(x) Relationship 
        This is achieved when the main causes are sorted from the least effective drivers . This enable graphical data to be converted to  statistical data that is easier to calculate the general outcome.

11.Improve Phase
Here are some of the solutions that can be made within the processes to improve growth of the case study company.
Staffing; More staff on weekdays and reduce their number in the weekends especially on Sundays. 
Use of web service; services that can be done best online should be done on the web, it reaches many people over a limited time and give incentives to gain web traffic.
Transfers and callbacks; reduce them by improving the processes using newer technologies. Improvement can be achieved by verifying relationships between Xs and Ys by use of solution selection matrix and regression analysis

12.Control phase
Control plans should be done by use of dashboards-Ys and operational control indicators. Improved capabilities of the process should be determined using the following factors. 
Business growth
Satisfaction
Reduced wait time
Transfers and service time
Less support cost per call.
     Continuous data collection should be implemented. Closing the project is done and training starts for project post mortem.Tools Used; ANOVA, Cause and Effect Diagram, Control chart, Kano Analysis, X-Bar and R Charts

13.Works Cited
Hallowell, David L. "A Six Sigma Case Study – Tutorial for IT Call Center." 26 February 2010. iSixSigma. Article. 29 November 2012. .

Source: Power Point Presentations