Followers

Tuesday, 5 February 2013

TESTING

TESTING is a process or method in which quality of the product or services under test and provide information to the customer.
* Testing also provide the objective, independent view,and risk of the software impementation.
* Testing also a process of verifying and validating the computer program:
1. it meets the requirement of the customer that are guided.
2. it works properly.
3. it can implemented the same properties.
4. and fulfill the need of the customer.
BASIC PURPOSE OF TESTING:
to detect the software failure so that problem may be find and corrected.

LEVELS OF TESTING:

* UNIT TESTING
* INTEGRATION  TESTING
* SYSTEM TESTING
* ACCEPTANCE TESTING

UNIT  TESTING :  it is the smallest unit of testing in this small modules are tested with different modules. The benifit of unit testing is to individual each part of the program and show that it each part is correct. 

INTEGRATION TESTING: when all modules combined and then check or tested is called integration testing. we also say that after unit testing we done integration testing and before validation testing.after doing integration testing it prepares for SYSTEM testing.

SYSTEM TESTING: System testing may be for hardware or software. In this testing complete system is tested. This step is done after integration and all integrated program code are combined and form a large program and then tested.

ACCEPTANCE TESTING: In this step, after tested all above mention testing it sends to the user for acceptance testing.

Monday, 5 November 2012

IMAGE EDITING

Image editing is a process of altering or changes the images it ay be digital, analog photographs.
it is also known as image/ photo retouching.
graphic software may be divided into two parts:
  1. vector graphic editor
  2. raster graphic editor
RASTER IMAGES are stored in the form of grid of elements or pixels.
VECTOR IMAGES are stored in the form of lines,beizer spline, and text.

AUTOMATIC IMAGE ENCHANCEMENT:

computer image editing program offer some basic program that often making changes in the image enchancement feature that correct the color and brightness of the image. such as red eye removal, cropping of image...

DIGITAL DATA COMPRESSION:

many images use data compression technique to reduce the size and space of storing the image.
when image are stored in JPEG format the compression is automatically done.
some compression algorithm are used such as those used PNG format they donot lose and imformation when file is saved. 
while when the JPEG format are used having more compression and more information is lost.
while when the JPG format uses the knowledge way the human eye percieve color to make this loss of detail less noticiable.

IMAGE EDITOR FEATURE:

IMAGE SIZE ALTERATION:

In this can resize the image in a process called IMAGE SCALING making them larger or smaller. it is used a mathematical process called resampling to calculate the pixels.

 CROPPING AN IMAGE:

In this the unwanted part of the image is removed, the resolution of the area cropped is not reduced.
the main reson for cropping is to improve the image composition in the new image.

NOISE REDUCTION:

it is a feature of adding or removing noise from an image.when extra image noise is removed from the image it increases the quality of the image.and exessive noise reduction loss the detail of the application.

SELECTIVE COLOR CHANGE:

In this editor having color swapping technique for changing the color of a particular image in many time and sowing many different color.

IMAGE ORIENTION:

image editor are capable of altering and rotating the image in any direction at any degree. In this mirror images is also created and images can be flipped horizontally or vertically.

SHARPING AND SOFTEN THE IMAGE:

graphic programs can be used to sharpen and blur the images.in this EDGE ENHANCEMENT is mainly used to sharpen the images.



Wednesday, 26 September 2012

WIRELESS SENSOR NETWORK


A wireless Sensor network can be effectively used as a tool for gathering data in various situations provided it works with a large number of sensor nodes. It is desirable to make these nodes as cheap and energy-efficient as possible and rely on their large numbers to obtain high quality results. Network protocols must be designed to achieve fault tolerance in the presence of individual node failure while minimizing energy consumption. In addition, since the limited wireless channel bandwidth should be shared among all the sensors in the network, the protocols hired for these networks should be able to perform all the functions well and reduce the bandwidth requirements. One of the major issues in wireless sensor networks is developing an energy efficient routing protocol which has a significant impact on the overall lifetime of the sensor network. Therefore a communication protocol named LEACH (Low-Energy Adaptive Clustering Hierarchy) is proposed that partitions the networks into clusters and cluster nodes. LEACH is the first hierarchical cluster-based routing protocol for wireless sensor network which partitions the nodes into clusters, in each cluster a dedicated node with extra privileges called Cluster Head (CH) is responsible for creating and manipulating a TDMA (Time division multiple access) schedule and sending aggregated data from nodes to the BS where these data is needed using CDMA (Code division multiple access). Thus extends the lifetime. It is experimentally proven that this protocol works well in power minimization.

WIRELESS TECHNOLOGY


The widespread congestion in networking and security systems that works on wired cable
transmission has showed a great demand for the development of a technology that works on
removing these wanes. . So wireless technology was invented by which the advancement in the field of networking and communication arena took place.Wireless technology creates a network by sending 
radio-frequency signals between your computers to share information. It does not use any
wire and all the computers broadcast their information to one another using radio signals. Wireless solutions provide benefits by allowing users to access shared information, e-mail, and applications without the constraints of a wired connection. Further, wireless technology allows network managers to set up or augments networks without installing or moving wires. The major drawback is that wireless is a public frequency network therefore its interface is highly risky to be used for private information. These signals are even prone to disrupt by the infrared and radio signals. One of the major concerns surrounding wireless solutions is security. 
wireless security may be separted into two components:
  1. authenticating wireless network users which ensure that only authorized users are on the network.
  2. by encrypting data as it transfers between users and devices.                                                                            

     ADVANTAGES OF WIRELESS TECHNOLOGY:

    1. It is convient to use by user.It is used for radio programes, mobile phones i.e. BLUETOOTH  and computer network.

    2. No doubt wireless network is an amazing wireless technology which has totally changed the means of communication.

    3. It has become the significant option of any business because of its salient features like speed, security and mobility. The future of wireless technology is indeed bright. FIG 1.shows the example of mobility.

      

     

    FIG :1