hai!! if you your data is deleted from your Mobile memory card and you want to get it back , you should not worry about your data , we have a solution for it to recover it back , for this you have to install Memory card recovery software and install it in your Laptop. to download it follow the link and download it from my drop box, you can also make your own drop box and can store imported data in it, if you want to make account in drop box, text me over my blog , or mention in a comment i will help you out in making your account , to download free memory card recovery click on the link https://www.dropbox.com/s/pmrp9cw8lvr420h/Memory%20Card%20Recovery%203.60.1012%2Bkey.zip?dl=0
Monday, 12 January 2015
Free download memory card recovery software
Sunday, 11 January 2015
free download idm from mobilezonex
click on the link below to download idm free from my dropboxhttps://www.dropbox.com/s/dth5d276oj9e1hv/Idm612.rar?dl=0
How to find out your account password
Hello!! if you forget your account id and password ,that you have created in yahoo, facebook, tagged, gmail, or any other account , you can find it easily in your browser ,
follow these steps to find out your id and password.
if you are using google chrome,
follow these steps to find out your id and password.
if you are using google chrome,
- Go to setting
- then go to advance setting and click on manage password
- after clicking on manage password a window will be appear as shown in the image below
- these are the links of the account where you make your ids and password.now to find out the specific id and password read the links carefully and click on it ,once you click on it a separate window will appear as shown in the image.
- Now in the above separate window user name indicate your compute name and type your computer password that you use for log in.
- press enter or click OK now a separate window will appear that will contain your id and password , as shown in the image .
- in the above window i give you an example that is actually my university id number and password at university of engineering and technology peshawar.
- NOTE.. the above image are not clear to view it click on each image and save it to your computer you can view it and read it clearly . If you are using firefox or other browser apply the same method ,
- thanks for using my blog if u like it ,share it with your friend and follow my blog
Saturday, 10 January 2015
how to trace your friend using simple technique
hello !! if you want to located your friend any where in pakistan , and you want to trace them here i have a simple method to share with you
- Take cell phone from your friend and dial *#06# , you will get a number that will contain 15 digits and is called IMEI NUMBER.
- Now save this number in your cell phone.
- When ever you want to trace your friend using that cell phone, send that IMEI code to imei@pta.gov.pk
- you will get a complete information about their location , and will also tell you that which sim is now using on this mobile phone .
- thanks for visiting
Wednesday, 7 January 2015
Wonder of the Nature and wonderful grapes...
Some time you will surprise when you saw amazing things in the Nature, and nature at self is a wonderful creation of the creator,
- Today i would like to share with you a grapes which is neither yellow or back and . nor red and green , but is colorful and it get its color by a special process called veraison , during this process they start making sugar and is very delicious in nature , this is very delicious in flavour , and famous all over the world , such kind of grapes is also called RAINBOW grapes , for further detail visit these sites here is the link attached with 1 http://en.wikipedia.org/wiki/Annual_growth_cycle_of_grapevines
- http://en.wikipedia.org/wiki/International_Grape_Genome_Program
Sunday, 28 December 2014
Application of Auction Based Algorithm to Wireless Sensor Networks
Algorithm:
The algorithm initializes the price of each good to be unit, computes the worth of the initial endowment of each agent, and gives this money to each agent. All goods are initially fully unsold.
We will denote by p=(p1,p2,...,pn) the vector of prices of goods at any point in the algorithm. As p changes, the algorithm recomputes the value of each agent’s initial endowment and updates her money accordingly. Clearly, at the start of the algorithm, the total surplus (unspent) money of all agents is n.
At any point in the algorithm, a part of good j is sold at price pj and part of it is sold at (1+€)pj. The run of the algorithm is partitioned into iterations. Each iteration terminates when the price of some good is raised by a factor of (1+€). Each iteration is further partitioned into rounds. In a round, the algorithm considers agents one by one in some arbitrary but fixed order, say 1,2,...,m. If the agent being considered, i, has no surplus money, the algorithm moves to the next agent. Otherwise, it finds i’s optimal good, in terms of bang per buck, at current prices; say, it is good j. It then proceeds to execute the operation of outbid. This entails buying back good j from agents who have it at price pj and selling it to i at price pj(1+€). This process can end in one of two ways:
Agent i’s surplus money is exhausted. If so, the algorithm moves on to the next agent.
No agent has good j at price pj anymore. If so, it raises the price of good j to pj(1+€) by setting pj to pj(1+€). The current iteration terminates and agents’ moneys are updated because of this price rise.
When the current round comes to an end, the algorithm checks if the total surplus money with the buyers is at most €a min. If so, the algorithm terminates. Otherwise, it goes to the next round.
At termination, the algorithm gives the unsold goods to an arbitrary agent to ensure that the market clears. It outputs the allocations received by all agents and the terminating prices p. Observe, however, that some of good j may have been sold at price (1+€) pj even though the equilibrium price of good j is pj. Because of this descrepancy, agents will only get approximately optimal bundles.
Process Model:
The process model has three states:
Initialization state [init]
Idle state [wait]
Checking request state [chec_rqst_typ]
Initialization state [init]:
This is a forced state. This state initializes the process. Executes the enter executives as under
total_bw = 1024; //total bandwidth that can be allocated
bw_req_value =0; //initialize req value to zero
self_ID = op_id_self ();
op_ima_obj_attr_get (self_ID,"bw_variable", &bw_variable); //obtain attributes of the packets.
Idle state [wait]:
This is an unforced state. When the command comes to this state, it waits for an interrupt [PKT_ARRIVAL]. When the interrupt [PKT_ARRIVAL] comes it sends the command to the next state [ pkt_rqst_typ ], otherwise it waits.
Checking request state [chec_rqst_typ]:
This is a forced state. Command is send to this state if the interrupt [PKT_ARRIVAL] comes. It executes the following enter executives,
pkt_pointer = op_pk_get(0);
op_pk_nfd_get (pkt_pointer, "bw_req", &bw_req_value);
request_array[i] = bw_req_value;
++i;
if (i==49)
{
op_sim_end("","","","") ;
}
This assigns the packet pointer and obtain desired packet attributes, assigns the attributes to the request array and if the requests exceeds the total bandwidth then end the simulation.
Then it executes the following exit executives,
total_bw=total_bw-bw_req_value; //allocate bandwidth
send_pkt = op_pk_create_fmt("out_pkt");
op_pk_nfd_set (send_pkt, "pk_nmbr",i );
op_pk_send (send_pkt, OUT_STRM);
This assigns bandwidth as requested and send the packet through OUT_STRM, and send the command back to the idle state.
Node Model:
The node model has the following components
Packet generator
Processor [Auction Algorithm]
Transmitter
Receiver
Packet generator:
Packet generator generate packets of the type ” bw_req_packet”.
The following enter executives are executed as the process runs
new_pkt = op_pk_create_fmt("bw_req_packet");
op_pk_nfd_set (new_pkt, "bw_req",4 );
op_pk_send (new_pkt,0);
It creates a packet formate "bw_req_packet" and sets the "bw_req" field to the desired value as this will request for the bandwidth when the packet is received by the receiver.
Packet format:
The packet format has the following 4 fields
Source address
Destination address
Cyclic redundancy check
Bandwidth request value
Processor [Auction Algorithm]:
The initializing state:
This is a forced state and it execute the following enter executives
total_bw = 1024; //total bandwidth that can be allocated
bw_req_value =0; //initialize req value to zero
self_ID = op_id_self ();
op_ima_obj_attr_get (self_ID,"bw_variable", &bw_variable);
It initializes the total bandwidth variable, and sets the bandwidth request value to 0. Then it sends command to the idle state.
Idle state:
This is an unforced state and it waits for an interrupt of the type PKT_ARRIVAL then it sends the command to the next state.
Checking request state [chk_rqst_typ]:
This is a forced state. This process model is stated in the start. This assigns the packet pointer and obtain desired packet attributes, assigns the attributes to the request array and if the requests exceeds the total bandwidth then end the simulation.
Then it assigns bandwidth as requested and send the packet through OUT_STRM, and send the command back to the idle state.
Transmitter:
It sends the packet which is requested to send through OUT_STRM.
Receiver:
It receives packets form the IN_STRM and forward it to the next process.
Node interfaces:
The following are the node statistics
Project:
The first run of the project was empty scenarios.
GSM BASED MONITORING AND CONTROLLING OF WIRING SYSTEM
GSM BASED MONITORING AND CONTROLLING OF WIRING SYSTEM
Abstract:
The aimed objective of this project is to design a microcontroller based protection of wiring system. The protection includes temperature of the conductors and the limitations of current. In this project all the information about the current and temperature will be sent to the main unit by using user cell phone. The user has the capability to control the system, but if the user didn’t response to the alerts then system selects the automatic mode, and takes the safety precautions. This will turn of the main switch for the sake of better protection.
Aim of The Project
The main core of this project is to design such a system which protects the wiring system automatically. The second objective of the project is to control and monitor the limitation of current and temperature, where user will a be informed by using GSM module.
Introduction:
Electrical wiring in general refers to insulated conductors used to carry electricity, and associated devices. This article describes general aspects of electrical wiring as used to provide power in buildings and structures, commonly referred to as building wiring. This article is intended to describe common features of electrical wiring that may apply worldwide. For information regarding specific national electrical codes, refer to the articles mentioned in the next section. Separate articles cover long-distance electric power transmission and electric power distribution.
With the evolution and proliferation of electrical systems usage throughout all of today’s cutting edge business sectors and industries, the need to protect these applications has never been more important, and it’s a tidal wave of progress that shows no sign of abating. More and more, functions and processes throughout a diverse range of industries are reliant on sophisticated and sensitive electronics and electrical communications, whether it be on (or under) land, on (and below) the sea, up in the air, or even high above the earth.
One such area this applies to, is the Marine sector. Like all modes of transportation, nautical vessel technology has not just evolved but been revolutionized through the advent and subsequent advances in electronics and electrical engineering. Our ancestors – even from as recently as the nineteenth century – would be dumbstruck by the revolution that has taken place.
Problem Statement:
Controlling the temperature and current limit.
Sending all the information to the user on cell phone for the sake of controlling purpose.
Displaying all the information on LCD.
Methodology:
The best solution to tackle these problems is by using GSM Based Monitoring And Controlling Of Wiring System Because this scheme have the ability to control and monitor the wiring system remotely.
For measuring the current we will use C.T (current transformer), which is interfaced with ADC, the ADC convert the analog signal to digital and transfer it to the microcontroller, microcontroller also measure the temperature through thermistor, here the controller sends all the data to user cell phone and main unit by using GSM module for the sake of monitoring. Here controller display the results on LCD and after some time it starts to give buzzer. Where on the user cell phone this information will be send through SMS (short message service). User can control the load remotely by replying on the same number. The GSM receive the signal and transfer it to the controller, which turn off the load through relay, the relay will be connected with relay drive unit which control the relay.
So the methodology we are using is quite simple and reliable and it needs the following components.
Voltage regulator
LED
Diodes
Transformer
Bridge
temperature sensor
GSM module
Microcontroller
Op-amp
Buzzer
Relay driver
Relay
ADC
LCD
Block Diagram Representation:
APPLICATION
“Through proper implementation of this project, governments can improve program and infrastructure quality, increase information accessibility and use, with improved decision making application makes more interesting and decreases overall cost of the application, so this project can be used to improve the wiring system in military organizations, local police organizations, home/offices, security organization etc.
REFERENCES:
[1] 8051 microcontroller BY Muhammad Ali Mazidi ISBN: 978-81-317-5899-1
[2] Electronic devices and circuit theory BY Thomas C. Schelling
[3]Electrical and electronic technology books.
Subscribe to:
Posts (Atom)