WORLD WIDE WEB Presentation Transcript:1.WORLD WIDE WEB (WWW)
2.WORLD WIDE WEB (WWW)
3.CONTENTS OF WWWHYPERTEXT&HYPERLINKHTMLWEB PAGESWEBSITETYPES OF WEBSITEWEB BROWSER
4.Hypertext&hyperlink HYPERTEXT CONTAINING WORDS THAT CONNECT TO OTHER DOCUMENTS
CONTAINING WORDS ARE CALLED HYPERLINKSPRODUCING HYPERTEXT FOR THE WEB IS ACCOMPLISHED BY CREATING DOCUMENTS WITH A LANGUAGE HTML(HYPER TEXT MARK UP LANGUAGE)
5.HYPER TEXT MARK UP LANGUAGEHTML CODE EDITORS AND WYSIWG EDITORS BUILT YOUR HTML PAGES.IT REQUIRES ONLY SIMPLE TEXT EDITOR TO START CODINGAN HTML FILE CONTAIN “MARK UP TAGS” THAT FILL THE WEB BROWSERTHAT HOW TO FOLLOW THE,INSTRUCTIONS ENCLOSED WITHIN THE TAGS
6.FOLLOWING ARE THE TAGS OF HTML:-
7.WEB PAGESIT IS A RESOURCE OF INFORMATION THAT IS SUITABLE FOR THE WORLD WIDE WEB IT CAN BE ACCESSED THROUGH A WEB BROWSER CONSISTS OF FILES OF STATIC TEXT STORED WITHIN THE WEB SERVER’S FILE SYSTEM
8.WEBSITE COLLECTION OF WEBPAGES KNOWN AS WEBSITE2.THE PAGES OF WEBSITE CAN USUALLY BE ACCESSED FROM A COMMON ROOT CALLLED THE HOME PAGEE3.IT HAVE TWO PARTS1.BOOKMARK2.WEB DIRECTORY
9.BOOKMARK1.IT CAN STORED WEB PAGE LOCATION(URLs)2.BOOKMARKS ARE SAVED LINKS AND ALSO CALLED FAVORITES3.WEB DIRECTORY1.IT SPECILALIZES IN LINKING TO OTHER WEB SITES.
10.TYPES OF WEBSITE:-1.STATIC WEBSITE :-IN THIS WEB PAGES ARE STORED ON THE WEB SERVERIN THE SAME FORM AS THE USER WILL VIEW THEM2.DYNAMIC WEBSITE:-IT DOES NOT HAVE WEB PAGES STORED ON THE WEB SERVER IN THE SAME FORM AS THE USER WILL VIEW THEM.
11.FOLLOWING ARE THE WEBSITE MOST USABLE:-1.CORPORATE WEBSITE2.PERSONAL WEBSITE3.E-COMMERCE WEBSITE4.AFFILIATE WEBSITES5.BLOG WEBSITES6. GAMES WEBSITES
12.UNIFORM RESOURCE LOACTORIT SPECIFIES THE INTERNET ADDRESS OF A FILE STORED ON A HOST COMPUTER CONNECTED TO THE INTENET.WEB BROWSER USE THE URL TO RETRIEVE THE FILE FROM THE HOST COMPUTER AND THE SPECIFIC DIRECTORY IN WHICH IT RESIDES
13.FACTS ABOUT URLURLs ARE TRANSLATED INTO NUMERIC ADDRESSES USING THE DOMAIN NAME SYSTEM(DNS)THE NUMERIC ADDRESS CALLED THE IP(INTERNET PROTOCOL) ADDRESS, IS ACTUALLY THE”REAL URL”.E.G. OF DNS(198.123.213.100)
14.WEB BROWSERIT IS SOFTWARE APPLICATION WHICH ENABLES A USER TO DISPLAY AND ITERACT WITH INFORMATION LOCATED ON THE WEB PAGES OR AT WEBSITEWEB BROWSERS ALLOW A USER TO QUIKLY AND EASILY ACCESS INFORMATION PROVIDED ON MANy WEB PAGES AT MANY WEBSITES BY TRVERSING THESE LINKS.WEB BROWSERS FORMAT HTML INFORMATION FOR DISPLAY.
15.TYPES OF WEB BROWSERGRAPHICAL:-E.G. OF GRAPHICAL WEB BROWSERS ARE AS FOLLOWS INTENET EXPLORER,MOZILA FIREFOX,GOOGLE CHROME2. TEXT:-ACCESS TOTHE WEB IN TEXT ONLY MODE SUCH AS LYNX
Source: Power Point Presentations
Presentation On Water And MineralsDownload
Water And Minerals Presentation Transcript:1.Water And Minerals
2.Calcium and PhosphorusUsed to build bones and teeth.99% of total body calcium is found in bones and teeth.Calcium and Phosphate crystals bond together to form HYDROXYAPATITE.
3.Hydroxyapatite is what gives bones strength.Bones are being rebuilt each day, therefore the calcium in the bones is constantly changing.Now calcium in teeth has a similar role.However the mineral turnover is not as rapid as that in bones
4.Calcium also circulates in the bloodThere is a constant level maintained so that it is always available when needed.Helps: muscles contract, nerves transmit impulses and blood to clotCan also help lower blood pressure
5.Phosphorus also circulates in the bloodInvolved in metabolismPart of DNA and needed to growBuffers both acids and bases in all the body’s cells.Milk and milk products are excellent sources of calcium and phosphorus.
6.MagnesiumFound in all body tissues60% of it is found in bonesThe other 40% is distributed between the soft tissues such as muscles and blood.The body works hard to keep blood levels of magnesium constant.
7.Magnesium is essential for systems responsible for energy metabolism.Building bones and maintaining teethMuscle relaxation and nerve transmission.Keeps the immune system working.
8.These are some of the different foods that contain magnesium.Buckwheat Flour and Bulghur, dry contain the highest amount of magnesium in this
9.SodiumPart of the electrolytes group(sodium, potassium, &chloride) Sodium is a positively charged ion that is found mostly in the fluid outside the cells.The major source of sodium in the diet is saltMany processed foods are high in sodiumHigh Blood pressure also known as hypertension is the most important health issue caused by overconsumption of sodiumDo not consume more than 1500mg per day
10.PotassiumAlso an electrolyteFound in the fluid inside individual body cellsHelps maintain water balance and acid base balanceHelps muscles contractHelps maintain a healthy heartbeatHelps send nerve impulses.
11.ChlorideAlso an electrolyteHelps maintain water balance and acid base balancePart of hydrochloric acid which is highly concentrated in stomach juices.Aids in protein digestion, destroys harmful bacteria, and increases the absorption of calcium and iron.
12.IronOne of the most abundant metalsMost important in the bodyKey component of hemoglobinAlso part of myoglobin Works with enzymes in energy metabolismNecessary for the body to produce energy
13.15% of the body’s iron is stored in the bone marrow, spleen and liver for future useMeat, Poultry, and Fish are great sources of iron
14.15% of the body’s iron is stored in the bone marrow, spleen and liver for future useMeat, Poultry, and Fish are great sources of iron
15.Required in extremely small amountsOnce in the body, iodine is chemically changed to iodide.Most in the world is found in seawater.
Source: Power Point Presentations
Presentation On Virtual Online Tutoring Download
Virtual Online Tutoring Presentation Transcript: 1.Virtual online tutoring
2.Purpose of Online tutoringOnline tutoring gives students around the clock access direct and live assistance from qualified teachersAccess to qualified and monitored tutors in required courses and skills from any Internet connectionAn Online Writing Lab for all courses including computer coursesEasy access to Academic resources
3.Create a simple websiteThe website gives a complete information about you with your picture, subjects you tutor, phone number and free phone consultation offer.
4.Decide the Age group you will tutorElementary and middle school subjects are much easier to teach, but tutoring higher classes, college students and adults as well may make it easier to meet your business goals.
5.Online tutoring softwareThere are different options to decide your tutoring softwareCheck your online classroom for active tutoring devices . Test your microphone to make sure it works properly.
6.Online tutoring softwareSkype with Idroo (http://www.idroo.com/home)GchatGoogle DocsWikispacesScribblarWizIQ
7.Advertise your businessAdvertise your business locally and online. Use free business cards to a spread your words. freebusinesscardoffer.com offer free business cards to initiate a businessAdvertise your business through craigslist Participate in different learning forums and advertise.
8.Set the prices for your TutoringAnswering parents first call, be sure to offer an introductory price or free first hour tutoring. Package offer for different subject is also a charming offer.
9.Process payments from your clientAllow virtual payments through paypal (www. paypal.com) from your clients. It is comfortable and will save time.
10.Manage your first online sessionEngage your student in an exciting way to catch particular attention. Try to establish a competent first impression to acquire good and long term clients.
11.Regular meeting with parentsAfter the first introductory session contact the parents to discuss about the system. Offer packages and good payment methods.
12.Advantage of Online tutoringYou can easily tutor from home and can save time and expenses You can reach students outside of your immediate geographic areaYou can conduct tutoring sessions for multiple students at one time and multiply your hourly rate
13.DisadvantagesInitial setup fees, plus investment time to set up a infrastructureIt may take some time to build up your business
14.One –On-one drop in online tutoring 24/7 live tutoring for computerDrop in tutoring for other subjects in different timings - Maths - Biology - English
15.Tutoring Options Available For Computer Science Student The whole spectrum of online tutoring options is available for students who seek computer science help at your website.
Source: Power Point Presentations
Presentation On TRANSISTOR AGING Download
TRANSISTOR AGING Presentation Transcript:1.TRANSISTOR AGING
2.INTRODUCTIONTransistors do age ….like Humans!!Time by time degradation of performance of a transistor is called Transistor Aging.The degradation of transistors occurs over time and can result in circuit failure!!!Several different phenomena can degrade the transistors.
3.WHAT WE ALREADY KNOWA transistor is a three terminal semiconductor device used to amplify and switch electronic signals.It is the fundamental building block of modern electronic devices.ADVANTAGES: Smaller, less expensive, requires less electricity etc.APPLICATIONS: Hearing aids,Watches,Cameras, TV etc.
4.AGING MECHANISMSOXIDE BREAKDOWN.HOT CARRIER INJECTION.NEGATIVE BIAS TEMPERATURE INSTABILITY(NBTI).
5.OXIDE BREAKDOWN:Refers to the destruction of an oxide layer. Defects within the gate oxide are usually called traps.They are called traps because the degraded Oxide can trap charges. Traps are usually neutral. Once these traps form a conduction path from the gate to the channel, breakdown occurs.
6.NEGATIVE BIAS TEMPERATURE INSTABILITY(NBTI): Occur due to the application of negative bias to gate at elevated temperature.Traps charge within the dielectric.Whenever you apply gate voltage, charge buildup in the dielectric.
7.HOT CARRIER INJECTION: A carrier is injected from the conducting channel in the silicon substrate to the SiO2 layer. Since the charge carriers becomes trapped in the SiO2 layer of a MOS transistor, the voltage needed to turn on the transistor increases .As a result transistor switches more and more slowly.
8.OXIDE BREAKDOWNGate-oxide breakdown begins when traps form in the gate-oxide.more and more traps are created in the gate-oxide.traps start to overlap creating a conduction path-breakdown occurs-SOFT BREAKDOWN(SBD).Once there is conduction, new traps are created by thermal damage, which in turn allows for increased conductance.
9.This cycle of conduction leading to increased heat leads to thermal runaway.The Silicon within the breakdown spot starts to melt, and Oxygen is releasedSilicon filament is formed in the breakdown spot.
10.CROSS SECTION OF GATE OXIDE AFTER HARD BREAKDOWN THROUGH EMISSION- MICROSCOPY.
11.TRAP GENERATIONThere are different theories on how defects are generated in the gate-oxide.The two main models are :The Thermo chemical model .The Anode Hole Injection (AHI)model.
12.AHI MODELThe AHI model is based on the process of electron injection into the oxide and holes are generated at the anode which then gets trapped into the oxide.At high electric fields, the electrons arriving at the gate have a high kinetic energy (> 8MV/cm).
13.When these hot electrons reach the gate electrode they transfer their entire energy to a deep-valence band electron, andthis electron is promoted to the lowest available electron energy state, which is the conduction band edge .Once the electron reaches the conduction band, it creates a hot hole, which tunnels into the oxide.
14.The holes which enter the oxide, allow for increased current density.Due to increased current density, more electrons tunnel in to the gate and more holes are created.These holes creates traps within the oxide.
15.How to limit degradation?Prevention cannot be done, as for most of the electronic devices, they will loose their properties over time.To limit transistor aging effect in a circuit, various method can be used.Lets discuss some of them.
Source: Power Point Presentations
THE EFFECTS OF SOCIAL NETWORKS AMONG STUDENTS PPT Download
THE EFFECTS OF SOCIAL NETWORKS AMONG STUDENTS Presentation Transcript: 1.THE EFFECTS OF SOCIAL NETWORKS AMONG STUDENTS
2.INTRODUCTIONThis section will explain the:Background of the study Research questionResearch objectives
3.BACKGROUND OF STUDYSocial Networks is defined as ‘social space’ for peoplewho want to expose themselves among others andstaying connection with each others.
4.RESEARCH QUESTIONRQ1: How do social networks affect students positively?RQ2: What types of social networks students usually use?RQ3: Why social networks important in students life?
5.RESEARCH OBJECTIVETo identify the positive effects of social network among students.To determine the types of social networks students most preferred.To examine the important of social networks among students.
6.METHODOLOGY
7.THE QUESTION AND THE FINDING THAT RELATED TO RQ.1:- Q:What are the positive effect of social networking sites towards students?
8.FINDINGSTHE QUESTION AND THE FINDINGS THAT RELATED TO RQ.2:- Q: Please rank the following choice of social networks that you prefer.
9.FINDINGS
10.THE QUESTION AND THE FINDING THAT RELATED TO RQ.3:- Q: Why the social networks are important to students?
11.CONCLUSIONThere exist the positive effects of social network among students instead of the negative effects such as improve their communication skills, can get many friends from other countries and improve their technology skills.The types of social networks that students most prefer are facebook and youtube.The important of social network among student are easy to communicate with friends and lecturer, faster way to get latest information, feeling more connected to campus, lead students to share ideas and notes for their study and also can always keep in touch with family.
12.REFERENCEhttp://ro.uow.edu.au/etc08/9www.ncbi.nlm.nih.gov/pmc/articles/pmc2254235/http://www.nst.com.my/opinion/letters-to-the-editor/social-media-it-s-here-to-stay-so-use-it-wisely-1.29304http://www.nst.com.my/top-news/khaled-use-facebook-in-varsities-1.50763
Source: Power Point Presentations
CODE LOCK Presentation Transcript:1.INTRODUCTION Digital Code Lock using AT89C2051 is a basic control system with an ability that allows any user having valid user password or Master password to use the system with simple password protection This code can be changed by the user. This circuit is eminently suitable as a digital lock with security option. Digital code lock is a type of lock in which any combination of 5 digits is used to open the lock. This type of lock use numerical code for authentication where the correct code must be entered in order for the lock to deactivate. The lock can be used with an outdoor gate or a normal door. The functionality of this lock is implemented in software When the correct code is entered it will open the door. The significant of this project is to eliminate the need for a key.
2.NEED OF CODE LOCKThis kind of lock can avoiding the problems caused by the copying of keys. On the premise that it’s safety is high, it’s another feature without key is getting more and more favour of peopleThere are great varieties of digital code locks. Generally speaking, they can be classified into scores of type, such as electronic lock, fingerprint lock, card lock biological lock, etc.
3.OBJECTIVESTo free users from the worry of remembering keysTo design a keyless door entry by using electronic digital lock codeTo avoid any crimes especially stealing activities
4.WIRING CIRCUIT
5.ADVANTAGESWHEN SYSTEM IS BLOCKED AFTER UNSUCCESFUL ATTEMPTS THEN JUST ENTER THE MASTERCODE ,THE SYSTEM WILL BE UNBLOCKED.SO THERE IS NO NEED TO ‘POWER OFF’ THE SYSTEM FOR RESETTING.THERE IS NO NEED TO ENTER THE SECURITY CODE TO LOCK THE SYSTEM AGAIN, JUST PRESS THE ‘#’ KEY TO LOCK AGAIN.EVERYTIME THE SECURITY CODE CHANGES IT IS NOT SAME FOR ALL THE CASES , AND THE PERSON WHO KNOW ABOUT THE SYSTEM THOROUGHLY ONLY HE CAN CHANGE THE CODE.SO THIS THING PREVENTS THE SYSTEM FROM HACKING.
6.This digital code lock is therefore particularly useful in applications such as hotel room door locks, residential housing and even office buildings.We feel that this digital code lock is very marketable because it is easy to use, comparatively inexpensive due to low power consumption and highly reliableLock which contained hardware and software development. We also know and understand the microcontroller AT89C2051 and how to implement it on my project
Source: Power Point Presentations
DMAIC Presentation Transcript:1.Executive SummaryDefine PhaseD1. Project CharterD2. Customer RequirementsD3. High-level process mapMeasure phaseAnalyze PhaseImprove PhaseControl phaseToolsWorks Cited
2.Executive Summary The IT industry is one of the fastest growing industries in the world today. The industry is populous with IT service companies, one of the services offered is customer care support services either online or via telephone calls. The high competition leads to lowered prices that often they equally range across all the companies in a given market. For a company to remain in the market and profitably run its activities as usual, it has to offer the best services than its competitors. This case study applies the Six Sigma techniques like DMAIC .Benchmarking and just setting a project team to work on the basis on a simple six sigma may not fully solve a problem. DMAIC defines the issues affecting the company to a large span making it easier to distill more clues and real figures from the top performers in the industry thus acquiring facts and reliable data to promote the project.If data from an unbiased source is used, say the company studied has customer care satisfaction ratings of seventy-three out of a hundred; the ‘average’ company in the industry has a rating of seventy-six out of a hundred and the best performer in the industry at eighty seven percent. This data alone shows that efforts have to be made in order for the company to survive the competition. In the IT service industry customer satisfaction is a major contributor to a company’s growth (Hallowell).Support costs per call are not related to satisfaction, best companies’ support call cost $26, ‘average’ companies at $30 per call while the case study company’ call cost about $36 which is the highest of all (Hallowell).On focusing the DMAIC project the ‘Y’ being new account growth and the ‘Xs’ being number of transfers, wait time and service. Wait time is associated with customer satisfaction thus improvement on the time is essential. After discovery of the points of weakness: the company managers then set project goals, scope and the study case using DMAIC (Define, Measure, Analyze, Improve, Control) teams.
3.D1. Project Charter: It expands on the business case clarifying the focus, measures of the project’s performance, and completed by a six sigma Black Belts who are the team leaders. They respond by implementing the improvement projects using skills of six sigma tools and lead increase of customer satisfaction. The key stakeholders are the customers, staff members and the business. The problem statement is one of the project charter elements; it gives the progress of the competitors as compared to the stagnated case study company. Goal statement element is that the customer satisfaction rating is at 90th percentile=75% targeting 85% in the same percentile by end of fourth quarter without changing support costs. The last element is process output such as milestones, roles, communication procedure (Hallowell)
4.Continuation of define phaseD2. Customer Requirements: using SIPOC (Suppliers, Inputs, processes, outputs and customers) identify the important customers for instance, customers, staff and business. Voice –of –customer inter views can be used to know what influences their level of satisfaction with the services offered. A summary outcome of the customer requirements is as follows;
5.Measure phaseDefine how data is to be gathered. For example; satisfaction-by standard survey per month in the industry, one by one customer satisfaction data.Performance standards; satisfaction- 90th percentile (70-80%) satisfied, performance -90th percentile (85% satisfied)Factors for data acquisition plan; collection efforts, cause-and-effect tools in use, nature of segmentation of Y-call center and product, factors driving Ys- the important X (call type or customer type).Measurement system; its accuracy, stability over time, repeatability of the same value, reproducibility when used by different people. Collection of data can be automated, manual and by use of any other metrics. Display data in a simple format to enable the team to look for clues in charts and graphs (Hallowell).
6.Analyze PhaseAnalysis is performed to check the capability of the process as compared to the present standards. Adjustment is done if the goal is not meeting the expectations. Data is partitioned in order to find the causes of the variations. Identify the possible X and verify to narrow down to see the important causes of variation. Update the prediction on how improvement can be achieves in the process. It can be found that satisfaction and support costs are affected by wait time and interruptions during call service.
7.Continuation of Analyze phaseA1: Define Performance of the process Measurement of the current process capabilities to enable proper definition of the projects’ objectives. Here the root causes and drivers of the problems are critically analyzed.
A2: Suggest the improvement Objectives If the analysis in A1 shows that the is variation from the expected results then proper measures should be taken to improve the outcome of the overall process.
8.Identify Value/Non-Value Added Process Steps
By dividing the Y values based on the main factors (X's) as identified during the Measure phase – the team looks for patterns that shed light on what may be causing or driving the observed Y variations.
9.Determine Root Cause(s)Collecting the findings that came out of A3, the team posed strongest in the form of "why" questions:Why do transfer rates differ by call type? (higher on Problems and Changes, lower on others)Why do Problems and Changes cost more than other call types? Why are calls processed on Mondays and Fridays more expensive? Why are wait times higher on Mondays and Fridays and on Week 13 of each quarter?
10.Determine Vital Few X's, Y=f(x) Relationship This is achieved when the main causes are sorted from the least effective drivers . This enable graphical data to be converted to statistical data that is easier to calculate the general outcome.
11.Improve PhaseHere are some of the solutions that can be made within the processes to improve growth of the case study company.Staffing; More staff on weekdays and reduce their number in the weekends especially on Sundays. Use of web service; services that can be done best online should be done on the web, it reaches many people over a limited time and give incentives to gain web traffic.Transfers and callbacks; reduce them by improving the processes using newer technologies. Improvement can be achieved by verifying relationships between Xs and Ys by use of solution selection matrix and regression analysis
12.Control phaseControl plans should be done by use of dashboards-Ys and operational control indicators. Improved capabilities of the process should be determined using the following factors. Business growthSatisfactionReduced wait timeTransfers and service timeLess support cost per call. Continuous data collection should be implemented. Closing the project is done and training starts for project post mortem.Tools Used; ANOVA, Cause and Effect Diagram, Control chart, Kano Analysis, X-Bar and R Charts
13.Works CitedHallowell, David L. "A Six Sigma Case Study – Tutorial for IT Call Center." 26 February 2010. iSixSigma. Article. 29 November 2012. .
Source: Power Point Presentations