I made this widget at MyFlashFetish.com.

Khamis, 14 April 2011

Biometric Hand Scanning

What is  HAND SCANNING??
Hand scanning involves the measurement and analysis of the shape of one's hand. It is a fairly straight forward procedure and is surprisingly accurate. Though it requires special hardware to use, it can be easily integrated into other devices or systems.



In the process of hand scanning, 
------->>  User will places the palm of hand on a metal surface which has guidance pegs on it. 
------>>  Hand will be aligned properly by the pegs so that the device can read the hand attributes.
-------->> The devie then checks its database to verify the user.
-------->>> This will take less than 5 seconds
NOTE: current bometric palm scanners or hand scanners do not have any way to detect whether a hand is living or not and therefore can be fooled by a fake hand if pressure is applied to the plate correctly.

HISTORY of HAND SCANNING

Hand scanning can be termed as a forefather of modern biometrics by virtue of a 20 yr history of live applications. There have been six different hand scanning products developed over this span, including some of the most commercially successful biometrics to date.


USE of BIOMETRIC HAND SCANNERS SYSTEM

Biometric hand scanning systems are employed at over 8,000 locations including the Colombian legislatures, San Francisco International Airport, day care centers, a sperm bank, welfare agencies, hospitals, and immigration facilities for the INSPASS frequent international traveler system.


EVALUATION OF BIOMETRIC HAND SCANNING

Hand geometry has several advantages. It is very easy for users to work the system - requiring nothing more than placing one's hand on the device. It has no public attitude problems as it is associated most commonly with authorized access. The amount of data required to uniquely identify a user in a system is the smallest by far allowing it to be used with SmartCards easily. It is also quite resistant to attempt to fool the system. The time and energy required to sufficiently emulate a person's hand is generally too much to be worth the effort, especially since it is generally used for verification purposes only.

Some disadvantages to biometric hand readers, including it's proprietary hardware cost and required size. Also, while injuries to hands can cause difficulty in using the reader effectively, the lack of accuracy in general requires that it be used for verification alone. In fact, because of the small amount of information measured, it is possible to have duplicate readings if enough people are put into the system, therefore elilminating its use as an identification system.



Computer and Information System Manager


In the modern workplace, it is imperative that Information Technology (IT) works both effectively and reliably. Computer and information systems managers play a vital role in the implementation and administration of technology within their organizations. They plan, coordinate, and direct research on the computer-related activities of firms. In consultation with other managers, they help determine the goals of an organization and then implement technology to meet those goals. They oversee all technical aspect of an organization, such as software development, network security, and Internet operations.
Computer and information systems managers direct the work of other IT professionals, such as computer software engineer and computer programmers, computer system analysts, and computer support specialist. They plan and coordinate activities such as installing and upgrading hardware and software, programming and systems design, the implementation of computer networks, and the development of Internet and intranet sites. They are increasingly involved with the upkeep, maintenance, and security of networks. They analyze the computer and information needs of their organizations from an operational and strategic perspective and determine immediate and long-range personnel and equipment requirements. They assign and review the work of their subordinates and stay abreast of the latest technology to ensure that the organization remains competitive.
Computer and information systems managers can have additional duties, depending on their role within an organization. Chief technology officers (CTOs), for example, evaluate the newest and most innovative technologies and determine how these can help their organizations. They develop technical standards, deploy technology, and supervise workers who deal with the daily information technology issues of the firm. When a useful new tool has been identified, the CTO determines one or more possible implementation strategies, including cost-benefit and return on investment analyses, and presents those strategies to top management, such as the chief information officer (CIO)

Management information systems (MIS) directors or information technology (IT) directors manage computing resources for their organizations. They often work under the chief information officer and plan and direct the work of subordinate information technology employees. These managers ensure the availability, continuity, and security of data and information technology services in their organizations. In this capacity, they oversee a variety of technical departments, develop and monitor performance standards, and implement new projects.
IT project managers develop requirements, budgets, and schedules for their firm’s information technology projects. They coordinate such projects from development through implementation, working with their organization’s IT workers, as well as clients, vendors, and consultants. These managers are increasingly involved in projects that upgrade the information security of an organization.
Work environment
Computer and information systems managers generally work in clean, comfortable offices. Long hours are common, and some may have to work evenings and weekends to meet deadlines or solve unexpected problems; in 2008, about 25 percent worked more than 50 hours per week. Some computer and information systems managers may experience considerable pressure in meeting technical goals with short deadlines or tight budgets. As networks continue to expand and more work is done remotely, computer and information systems managers have to communicate with and oversee offsite employees using laptops, e-mail, and the Internet.
Injuries in this occupation are uncommon, but like other workers who spend considerable time using computers, computer and information systems managers are susceptible to eyestrain, back discomfort, and hand and wrist problems such as carpal tunnel syndrome.

Tools Used in Programming

Programming is the process of scheduling, planning and writing a computer program. With the help of programming, a computer programmer can create a sequence of commands that tells that computer processor what to do. Programmers use a variety of tools that help prevent the occurrence of mistakes, commonly known as computer bugs. These tools also convert the language used by the computer programmer into a language that the computer can understand.

Code Editor 

The code editor is a tool designed for code writing and editing. All programming software programs usually come with a code editor. The editor adapts to the language the programmer uses. It allows the user to insert body of codes using the keyboard or mouse. The code editor comes with a feature called code colors that allow the programmer to differentiate sections of the code.

Compiler 

The compiler defines the instructions that are acceptable in a program. It converts a high-level language into machine code, the only set of syntax understood by the computer processor. The compiler allows a programmer to make programs using high-level languages. It uses the output, called source code, to generate a series of commands written in binary bits. The compiler looks at the source code to collect, reorganize and generate a new set of instructions to make the program run faster on the computer.

Interpreter 

The interpreter executes a source code written in high-level language without going through compilation stage. The interpreter allows the programmer to test the program quickly, allowing him to see the results before adding new sections to the code. Programmers prefer to use the interpreter during the development stages of the programs they are writing. An interpreter immediately translates the source code and then executes it. With the use of an interpreter, there is a significant reduction in the amount of time a programmer has to devote into programming.

Decompiler 

The decompiler reverses the process done by the compiler. It translates the machine code into a high-level language to create a presentation of the program. A programmer uses a decompiler to detect vulnerabilities and malicious codes, verify code matches, revise binary code bits and learn algorithm. Programmers use the decompiler as a form of maintenance and security whenever they write programs.

Parser 

The parser analyzes the structure of statements in the source code written by the programmer. The parser compares the string to a rule in English grammar in order to define potential code structures. During the parsing process, the computer looks for a particular constituent and consults the rules governing English grammar in order to look for alternatives. Parsing also applies to other languages such as French and German. However, the results are not as seamless as the ones generated in the English language.


Ahad, 10 April 2011

What is DO WHILE and DO UNTIL?

Basic types of loops consist of DO WHILE and DO UNTIL

What can be said about DO WHILE loop is a continues executing the body of the loop as long as the comparison test is true but for the DO UNTIL loop is executes the loop as long as the comparison test is false. In other words, doing something until a condition is TRUE is the same as doing something while a condition is FALSE.
Do While X <= 10 is the same as Do Until X > 10.

PROGRAMING LANGUAGE



WHAT IS FIFTH-GENERATION PROGRAMMING LANGUAGE (5GL)
5GL is a programming language based around solving problems using constraints given to the program, rather than using an algorithm written by a programmer. Most constraint-based and logic programming languages and some declarative languages are fifth-generation languages. Fifth-generation languages are used mainly in artificial intelligence research. Prolog, OPS5, and Mercury are the best known fifth-generation languages.

BENEFIT OF 5GL
  • Most logic and constraint based programming languages fall under the 5 GL umbrella
  • Allows the computer to independently work on a given program without the assistance of a separate set of code, created specifically for the purpose.
  • Accomplish more with less effort than in other languages of earlier generations; most efficient way to program for reasons of platform architecture limitations, OS dependencies and compiler availability
  • It also may have other drawbacks that mean it can't be reliably used in some mission critical software.
  • Appropriate to the project being coded. For example, assembly language; a second generation language, is appropriate in embedded applications where data storage and timing are in need of exact control. C is a "no-brainer" if you intend to use the Win32 API since it is its native language, so to speak. 


You should also know the other programing language called Mercury. CLICK the link below : http://www.knowledgerush.com/kr/encyclopedia/Mercury_programming_language/

Sabtu, 9 April 2011

DATA ORGANIZATION


KEY FIELD

WHAT IS KEY FIELD
  • A Key Field or Primary Key is the field in a record that uniquely identifies each record
EXAMPLE OF KEY SECURITY
          1. Social Security Number
          2. Student Identification Numbers
          3. Employee Identification Numbers
          4. National Identification Numbers


How Social Security Numbers Work

  • As each SSN is unique, the number's initial record-keeping role for the worker and the government to track Social Security entitlements, broadened.
  • The nine-digits of the SSN are divided into three parts, each separated by a hyphen. 
  • The first three digits, the area numbers, are based upon the zip code in the applicant's mailing address on the original application form. 
  • The second two numbers are the group numbers, ranging from 01 to 99, which serve to break the SSNs with the same area numbers into more manageable blocks. 
  • The final four digits of the SSN, the serial numbers, run consecutively from 0001 to 9999 within each group designation.

SOICIAL SECURITY IN MALAYSIA

The Social Security Organization (SOCSO) provides social security protection by social insurance including medical and cash benefits, provision of artificial aids and rehabilitation to employees to reduce the sufferings and to provide financial guarantees and protection to the family.


 STUDENT IDENTIFICATION NUMBERS 


                A student number is the number assigned to a student upon first entering or registering with an educational institution and is used to identify the student in lieu of a name for grades, essays, projects, exams and official documents.

               For Universiti Teknologi Malaysia (UTM)students their Matrix Card start with 'A' for undergraduate intake student but for direct intake student start with 'B'. H for Degree student. Master student's matrix card number start with 'M'. For UTMKL student their matrix number starte with AD, D for Diploma student.


              For example, BH100063; B for direct intake student; H for Degree; 10  for Academic Year when the number was issued, it refer to 2010; last 4 digit is refer to individual number issued in the order of enrollment.

EMPLOYEE IDENTIFICATION NUMBERS

An Employer Identification Number (EIN) is a nine-digit number that IRS assigns in the following format:
XX-XXXXXXX. It is used to identify the tax accounts of employers and certain others who have no employees. However, for employee plans, an alpha (for example, P) or the plan number (e.g., 003) may follow the EIN. 

The IRS uses the number to identify taxpayers that are required to file various business tax returns. EINs are used by employers, sole proprietors, corporations, partnerships, non-profit associations, trusts, estates of decedents, government agencies, certain individuals, and other business entities. 


NATIONAL IDENTIFICATION NUMBER


            In Malaysia, a 12-digit number (format: YYMMDD-SS-###G, since 1991) known as the National Registration Identification Card Number (NRIC No.) is issued to citizens and permanent residents on a MyKad. Prior to January 1, 2004, a separate social security (SOCSO) number (also the old IC number in format 'S#########', S denotes state of birth or country of origin (alphabet or number), # is a 9-digit serial number) was used for social security-related affairs.

           The first group of numbers (YYMMDD) are the date of birth. The second group of numbers (SS) represents the place of birth of the holder - the states (01-13), the federal territories (14-16) or the country of origin (60-85) . The last group of numbers (###G) is a serial number in an unidentified pattern which is randomly generated. The last digit (G) is an odd number for a male, while an even number is given for a female. For example 890123-03-7889; indicate that he born in 23 January 1989, in Kelantan, last digit represent that he is male.