Saturday, July 22, 2017

Marriage, Religion, Politics

My questions -
  • What is the definition of Religion as per the Constitution?
  • Why are polygamy and polyandry illegal (talking specifically of Hinduism via Hindu Marriage Act) inspite of mutual consent of the people involved. Isn't marriage supposed to be a way to solemnize and give a legal framework to the love and union of souls? How does involvement of multiple people change that fundamental basis of marriage?
  • If I would like to legally marry two women with mutual consent of each other, what is the right and legal way to go ahead in India?
  • Why is marriage linked to religion? In Islam, the concept of polygamy is legal but not in Hinduism. Does that mean the human beings are fundamentally different from each other and the law isn't the same for everyone? If the origin of such traditions lie in the will of the persons involved in the marriage, then why is it still illegal for Hindus? I followed this topic discussion in the below link and found that most people simply say what is the law but do not have the insight/ understanding of the reasons behind framing such a law. Link: http://www.lawyersclubindia.com/forum/second-marriage-with-first-wife-consent-6661.asp#.U7EO2u9EHeQ
  • Being a student of Science, my own analysis says that if I have to be right, just and legal (all at the same time), I would have to create a completely new religion which allows the above concept.
  • Will it be legal to create a new religion in India with the before said base idea? What is the process to create a religion in India? How is a social group of people defined to be a minority? If people start following this new religion, it can become a majority. In that case, what defines the majority limit- does current census report come into picture? Will the followers of the ideology get the same benefits and recognition from govt as followers of other ideologies?
  • Why can't the government record a person's following of two or more religions at the same time? Isn't it about faith in the ideologies? Why are government policies linked to religion/classes (eg- minorities, reservation)? Why do classes exist at all? The persons solving the social issues themselves create a divide as soon as they utter the word category/class.

     

Tuesday, January 28, 2014

deviceless communication

thoughts - pulses - d2a - wave, distance, noise? antenna? sensitivity - hair? frequency - circulation? -  p2p? evolution - centralised/distributed - organ systems

storage?

Sunday, December 16, 2012

Scheme brief of a new system of Intellectual Property Management

1/ Establishment of a universal agency which "owns" all the IP
produced till date. Existing IP rights granted to
individuals/companies should be taken back (or allowed till a finite
time use and then taken back) and handed over to this agency. This
agency should promote research and fund them from the finance received
from the license fees received as stated below. Country wide offices
(in each state and UT) of the same.

2/ The inventors/discoverers/researchers should be identified under
the inventor/discoverer category. Promoters/ Funders should be listed
under a promoter category.

3/ Identification of all dependent IP and maintenance of a hierarchy
to identify what all IP (at the lowest level onwards) the existing IP
is based on.

4/ For granting licenses to use any IP, license fee slabs should be
created based on the volume of commercial activity. a free slab too
should be incorporated for promoting innovation and not inhibiting for
the fear of infringements.

5/ Time based usage of license should be eliminated where applicable.

6/ Transfer of patents and patent portfolio selling should be
prohibited. (The above system will automatically remove this from the
system)

Tuesday, December 11, 2012

Time : 12-12-12 12:12:12


I witnessed this "moment" consciously. And finally it came up. I captured it.


Sunday, December 9, 2012

Letting go my obsession

Note:  Dont waste time reading this post. Anyone reading and trying to make sense of this post will not understand one bit of it. It is only meant to be a vomit post and a way for me to remember this thought and state of mind later


Today I had an experience which has forced me rethink on one of my work obsessions which might not be appreciated by many ppl.

I have decided to let go of it and though it gives me a great amount of satisfaction and actualization, I have to let it go. I have realized the bad effects it can cause. I feel stupid to be not able to think of them when I started on them. May be the realization comes with time and experience with it. But there are pros too to this way and if used judiciously, it can change lives.

Right now I feel like I am abandoning a ship which I have built myself. I would have loved not to. But I cannot think of another choice. Maybe I can come back to it later.

The carrot is in front of my eyes but cannot eat it. The quantity over quality has taken over. There is really no point to create and synthesize anything in this world.

Wednesday, October 31, 2012

Surge of emotions

Watching movies has always interested me. Even in a generally considered crappy movie, I somehow can find something good about it. But today was very much different.

I watched Chak De (A movie - Indian (Hindi)) today and a sudden gush of emotions surged in my mind that I am unable to think of anything else now. Team building has always interested me and I realized the reason of this thought constantly lingering in my mind - an event that took place around 4-5 years back. I somehow feel guilty of breaking a team and though it was totally unintentional, the fact still remains that I became a part of it. I should think on the lines of the freedom of thoughts and action for a man. These thoughts are binding me to that event where my actions were just the repercussions of a bigger act, in which I had no say.

Nonetheless, to fix this up I will try, in future, to mend up the things. If I could not, I will have to bear the grunt of a guilty conscience throughout my life. Though it is not that painful, but it still bugs and diverts the mainline thoughts.

Writing this is very much essential to temporarily ease my mind. I am not disclosing any details about the event purposefully. Now, the thought that someone might actually read this at any point of time during or post my death, gives a kind of comforting feeling that the thoughts did not die with me.


Monday, August 20, 2012

India's bottleneck - Bangladesh

    [Base image source : www.mapsofindia.com. Many thanks.]

Haven't you ever wondered what is immensely wrong with the shape of Indian Sub-Continent ? It is the "neck" connecting the northeast states with the rest of India. Can be viewed as the weakest point  to control the North East states.

The above idea in the image answers the following questions instantly-

1/ Why are north east states difficult to approach via road, trains?
2/ What happens if Bangladesh merges in India?
3/ Similarly, what happens if Bhutan,Nepal too join in?

What do you think?

Friday, May 4, 2012

Friends Vs Subscription/Subscriber Model in Facebook

Date: 08-Oct-2011 / RYP

Friends Vs Subscription/Subscriber Model in Facebook


Difference between the two:
A friend request is bidirectional and has to be approved at both ends to create a link between two ppl (nodes in a graph)

Subscription/Subscribers are unidirectional and don’t require explicit permissions (every time)

Now before we proceed ahead the following points must be kept in mind and the discussion to be seen in their perspective-
1/ One is not the center of the facebook universe.

2/ One is a tiny node in the huge network. Imagine a small dendrite in the huge nervous system.

3/ FB is interested to know your interests to target ads based on the digital content you consume. Think of it as a smart salesman trying to know your interest to offer products which you will like. (Salesmen aren't bad!)

4/ Applications are the same and can be visualized as extensions of FB.. In others words, brother salesmen who sell other products (specialized ones though).

5/ As soon as your interests and inclinations are revealed, your whole information environment around you starts to move and evolve in those areas only. This creates an information bubble which serves your request. But also hides other POTENTIALLY useful information which you might be interested in at that TIME (its very important to note the timings)

6/ Once ANY data is uploaded on the web, it can be safely assumed that its going to reside somewhere forever.

Friend Model Analysis:
When ppl friend each other, they BOTH create links in the huge social graph (ppl, pages, images, videos, etc) and as a result every node connected to them is affected. This effect is not immediately realized as its not in the first degree of freedom, this causes increased complexity and a continuous feedback of the same on BOTH  their nodes. With increase in the no of friends, this becomes a hierarchical graph with 4 distinct set of classes in which every node can be classified -
1/ Consumer
2/ Producer
3/ Pseudo Consumer
4/ pseudo Producer

The highly sophisticated proprietary network analysis tools of FB, imo,  do nothing different than to identify the links and the different routes to access nodes in the link.. if the strength of a link is high, its a very high probability to sell a product through that chain through recommendation and "SOCIAL PEER PRESSURE/FORCE - This works silently and isn’t in the picture." or it is easy to target and control the leaf node as the person is hopelessly dependent on the social system to survive. (Hashable is such a network which determines the strength of the links between the nodes). This is the reality and fact which however hard anyone tries to cover with beautiful wrappers, still cannot remove its existence. FB ensures this exists by its most powerful tool.. using the friends of friends option. (this is a recursive condition which seems silly at the first glance, actually is the whole power behind the FB system) while suggesting friends and sending requests. This works exactly like a virus, once you infect one user with it, it is a high probability the other linked user will be.

This kind of supply chain searching is not very friendly to ppl (who act as pseudo advertisers for the product on sale. selling converts them to consumers and it is not good for them personally.), the environment as it increases the ppl towards consumer side of the classes and consumers act nothing differently than slaves (more like guinea pigs). Thus it can be seen that the whole game plan is to get more control on ppl. This is favorable to politicians and they encourage it. This keeps away useful time of ppl and reduces efficiency. Thus making them even more dependable on resources. "We donot have to use all the parts of a system. We have the choice of using only those parts which are symbiotically useful to both"

Why the subscription/subscriber model is better :
This model is similar to the twitter model. It gives more freedom. It is healthy on the network. Also encourages precise communications. The complete graph of friends  model is hierarchical (like tree) and once the node path(s) links are known one can be easily targeted for ads/surveillance/activities. This kills freedom. Subscription model gives one the freedom to add random noise...(at your will). Also  one gets refined 'public' posts of your choice on the feed which keeps you away from invading privacy of others. (Respect privacy of others and they respect yours, hopefully)

What happens if you do this:
The various graph links established in the graph breakdown (but this could be only theoretical as companies dont part with data. Their survival depend on it. assume safely that your data which is on the web, once uploaded, will never be deleted) and if done in cascade by all nodes, this will lead to the complete failure to the path chain finding system of FB.. This is how FB turns into Twitter, but ofc with longer tweets.
Finally, getting things done automatically is fine and convenient, but at what cost? At the end of the day you dont want to be spoonfed.. Think over it again with different perspectives.


PS : I am not delusional. Nor I drink/smoke/do drugs or was drinking/smoking while writing this.Thanks

Wednesday, March 14, 2012

A better system of election

Date: 14-Mar-2012


Background:

"It is a well known creature we all know in India, which comes out of hibernation every 5 years and can show properties of a water leech and a beggar with a high probability on its appearance. This creature is popularly known as a Politician. It is a powerful creature which constantly needs the support of others to thrive (basically displays the properties of a parasite).

I have been pondering what is enormously wrong with our current system of electing and nominating these creatures (We usually settle down for the lesser evil ones. Nonetheless they are evil.) With a lot of thought involved, I concluded that these creatures are basically social hackers who come out with a strategy to break the basic intention for a good system and executive body in one way or the other.

How can they be prohibited from doing this? To answer this, the sources of their power needs to be found out - money from industries and assimiliation of similar parasitic creatures forming a group.

Now why do they need money and support? - For campaigns and and votes. Now if we carefully analyse the real reasons, the whole system of election is flawed. We donot want to elect parties for running the country. We want to elect efficient persons (individuals) with world class skills in the respective fields of works.We donot want to get involved in the dirty political campaigns. We want to genuinely figure out the right individuals for right work.

The current election system finds a large group (called a political party) of such parasitic leeches by means of public voting. We need an immediate change in this system. I am proposing a system below:

The System:

1/ Each official post required for efficient running should be enlisted and publically displayed by the election commission. It differs from a govt job post as it is an elected post.

2/ Individuals and not parties should register themselves as candidates for voting. The elections must be held throughout the year. (monthly frequency). this way we get rid of the similar groups and power display. The whole concept of a political party is flawed. It will ultimately result in our country's current internal state inevitably.

3/ A candidate can register for any number of available posts but can hold only one position at a time.

4/ No age restrictions. No language restrictions. No Caste/Creed restrictions. The minorities can be represented by their nominated persons.

.. coming up with more points as I think on it. Suggestions and CONSTRUCTIVE criticism invited.

Saturday, February 25, 2012

Suggestion to improve gmail labels and organize the email better

Background:
---------------------
I have figured out that emails of majority of people are from two kinds of sources -
1/ individuals (friends, family, colleagues)
2/ websites (registrations, newsletters etc).

The whole issue of organization of email is based on the separation of important/preferred emails (which for the most people(normal) are the mails sent by individuals) from the websites. For this same reason several people (including me!) create multiple email accounts to maintain the separation.

Suggestion:
--------------------
1/ To provide an option in settings/plugin (labs) to automatically sub-label the incoming email from the source and forwarding naked domains under the main  label of websites. (this will include emails from both individuals as well as websites and spam senders too!!) now as the mails arrive people can additionally label them according to their convenient labels too before archiving.

2/ Option to automatically direct the selected public newsletters to Google Reader from Gmail.

Advantages:
---------------------
1/ Proper tracking of what all sending domains have the recipients email address.
2/ A working spam filtration based on domains (though spoofing may occur but then the actual sender domain can be blacklisted).
3/ The perfect way of organizing the emails without ambiguity (and a way to add ambiguity by allowing users to add labels).
4/ The inbox remains clean.

Sunday, September 11, 2011

Sites visted by a typical guy in his lifetime


0-5 - how2speak.com
5-10 - rapid learning.com / how2giveheadaches.com
10-15 - iamoldenough.com / wtfIsHappening2me.com
15-20 - ineedmyspace.com / bestflirtinglines.com / beepsites.com / killexams.com
20-25 - coolpickuplines.com / highereducation.com / naukri.com
25-30 - shaadi.com / goodparenting.com / promotion.com
30-35 - thatnicegirl.com / howtosecuremyring.com
35-40 - revitalizing.com/millionaire.com
40-45 - icandoitagain.com/freedomisbliss.com
45-50 - forgettingit.com / securingurdaughter.com
50-55 - tired.com/ itsallair.com
55-60 - God!!.com
60-65 - back2childhood.com
65-70 - bucketlist.com / tatabirla.com

Friday, July 29, 2011

Linux Kernel (2.6.36) Map


Linux kernal map with relationships.
Nice visualizer
(Click image to enlarge. You can save the image by :
Right click on image > Save image as )

Wednesday, July 13, 2011

Mumbai Blasts

It happened yesterday around 7 pm within 10 minutes at 3 different places in Mumbai.
In my view, the blasts are the results of internal gang war between the two mumbai underworld gangs, for the control of the city. the govt keeps on changing but the criminal elements exist and have a strong group. the blasts were low intensity.. the terrorists will never do that (the places were crowded places. The blasts happened on a wednesday. If they wanted to kill ppl, they would have made bigger blasts. Clearly the intentions arent for terrorism. It could be a signal to the govt about their parallel power, it could be a black mail,  it could be some 'biz'men behind) . The immediate ppl who come to the mind are the underworld guys.. The no of deaths = 21... Not a number any terrorist org would aim for...

update (9.56am) : Is it the entire responsibility of the politicians? Putting my foot in their shoe,the first question that comes to my  mind is how do i identify the culprits? - They are the citizens of india too.. (coz these guys grew from mumbai slums )

Sunday, July 10, 2011

Reformation

a recent chat with a friend resulted in my following instant analysis

people - (any individual/corporate/bizman/politician/anyone) have different profiles - social/personal/professional etc and the biggest problem is these profiles don't go in tandem with each other

any initiative's core effect is to bring all those profiles together to work for the person and in tandem with each other.. so that the need for all these profiles is not needed.. a single profile suffices.. this is the smallest building block of constructive progress. to eradicate the nuisances in society, our initiative should be to integrate these different faces of ourselves into one seamless personality.

conflicts arise when any of the profiles dont go well with others - thus resulting in creation of things like corruption, dishonesty, lies etc to please that particular personality facet.(thought though unconsciously the person is still going in a state of self conflict)

there will be no effect of any revolutions unless we do the seamless integration of our personality facets

update for those who were unable to comprehend: (12:12 pm) :  The meaning is clear - be integrated rather than having multiple personalities.

Saturday, April 23, 2011

Choose Food Carefully

Before consuming any kind of food, one must know the metabolism of one's body. It determines the qty and ingredients of food intake. For the infants, the same must be judiciously decided by the parents. As soon as any kind of foreign substance enters the body , the body has either a susceptibility or a kind of repulsiveness for it and it can be very spontaneous. Food intake is the single most important activity which is neglected by most of us. Taste is secondary to the chemical composition of the food ingredients. Your body is made of bio-chemical and organic substance and is in a state of chemical equilibrium. Every food intake tends to unbalance that and the body's inherent trait of coming to a chemical equilibrium is triggered. Since the intake food qty is small with respect to the chemical qty in the body, it is little affected by a single meal. But in case it has some chemical, which causes a chain reaction, the body equilibrium will start to degenerate and the person will be in a state of disease.

Basic necessities of life

Most of us throughout our lives, keep fighting for the basics of life wasting the human potential for usable work. This needs to be eliminated to make a constructive world.

Teeth

With the evolution of the humans, the trait of hard and strong teeth is reducing as most humans now cook food eat it soft. As a consequence, the teeth are becoming weak with each generation.

Tuesday, April 19, 2011

Value of Pi

#from SDG
गोपी भाग्य मधुव्रता श्ऋङ्गीशो दधिसन्धिग/ खलजीवति खाताव गलहालारसन्धर
If you consider the values of consonants as
क 1 ख 2 ग 3 घ 4 ङ 5
च 6 छ 7 ज 8 झ 9 ञ 0
ट 1 ठ 2 ड 3 ढ 4 ण 5
त 6 थ 7 द 8 ध 9 न 0
प 1 फ 2 ब 3 भ 4 म 5
य 1 र 2 ल 3 व 4
श 5 ष 6 स 7 ह 8,
then,
pi = 3.1415926535897932384626433832792
(31 decimal places)

Value of pi
Praise to krushn
Praise to Shiv

Saturday, April 16, 2011

History of computers

1973 AD to 1981 AD
The First Personal Computers (PCs)

As is true of many facets in computing, the phrase "Personal Computer" can be something of a slippery customer. For example, the IBM 610 Auto-Point Computer (1957) was described as being "IBM's first personal computer" on the premise that it was intended for use by a single operator, but this machine was not based on the stored program concept and it cost $55,000! Other contenders include MIT's LINC (1963), CTC's Datapoint 2200 (1971), the Kenbak-1 (1971), and the Xerox Alto (1973), but all of these machines were either cripplingly expensive, relatively unusable, or only intended as experimental projects. So, for our purposes here, we will understand "Personal Computer" to refer to an affordable, general-purpose, microprocessor- based computer intended for the consumer market. Given that the 8008 microprocessor was not introduced until November 1972, the resulting flurry of activity was quite impressive. Only six months later, in May 1973, the first computer based on a microprocessor was designed and built in France. Unfortunately the 8008-based Micral, as this device was known, did not prove tremendously successful in America. However, in June of that year, the term "microcomputer" first appeared in print in reference to the Micral.

In the same mid-1973 time-frame, the Scelbi Computer Consulting Company presented the 8008-based Scelbi-8H microcomputer, which was the first microprocessor-based computer kit to hit the market (the Micral wasn't a kit -- it was only available in fully assembled form). The Scelbi-8H was advertised at $565 and came equipped with 1 K-byte of RAM.

In June 1974, Radio Electronics magazine published an article by Jonathan Titus on building a microcomputer called the Mark-8, which, like the Micral and the Scelbi-8H, was based on the 8008 microprocessor. The Mark-8 received a lot of attention from hobbyists, and a number of user groups sprang up around the US to share hints and tips and disseminate information.

Around the same time that Jonathan Titus was penning his article on the Mark-8, a man called Ed Roberts was pondering the future of his failing calculator company known as MITS (which was located next to a laundromat in Albuquerque, New Mexico). Roberts decided to take a gamble with what little funds remained available to him, and he started to design a computer called the Altair 8800 (the name "Altair" originated in one of the early episodes of Star Trek). (The authors don't have the faintest clue why the Altair 8800 wasn't named the Altair 8080, but we would be delighted to learn the answer to this conundrum if anyone out there knows -- feel free to email us at info@maxmon.com.) Roberts based his Altair 8800 system on the newly-released 8080 microprocessor, and the resulting do-it-yourself kit was advertised in Popular Electronics magazine in January 1975 for the then unheard-of price of $439. In fact, when the first unit shipped in April of that year, the price had fallen to an amazingly low $375. Even though it only contained a miserly 256 bytes of RAM and the only way to program it was by means of a switch panel, the Altair 8800 proved to be a tremendous success. (These kits were supplied with a steel cabinet sufficient to withstand most natural disasters, which is why a remarkable number of them continue to lurk in their owner's garages to this day).

Also in April 1975, Bill Gates and Paul Allen founded Microsoft (which was to achieve a certain notoriety over the coming years), and in July of that year, MITS announced the availability of BASIC 2.0 on the Altair 8800. This BASIC interpreter, which was written by Gates and Allen, was the first reasonably high-level computer language program to be made available on a home computer. MITS sold 2,000 systems that year, which certainly made Ed Roberts a happy camper, while Microsoft had taken its first tentative step on the path toward world domination.

In June 1975, MOS Technology introduced their 6502 microprocessor for only $25 (an Intel 8080 would deplete your bank account by about $150 at that time). A short time later, MOS Technology announced their 6502-based KIM-1 microcomputer, which boasted 2 K-bytes of ROM (for the monitor program), 1 K-byte of RAM, an octal keypad, a flashing LED display, and a cassette recorder for storing programs. This unit, which was only available in fully-assembled form, was initially priced at $245, but this soon fell to an astoundingly $170. The introduction of new microcomputers proceeded apace. Sometime after the KIM-1 became available, the Sphere Corporation introduced its Sphere 1 kit, which comprised a 6800 microprocessor, 4 K-bytes of RAM, a QWERTY keyboard, and a video interface (but no monitor) for $650.

In March 1976, two guys called Steve Wozniak and Steve Jobs (who had been fired with enthusiasm by the Altair 8800) finished work on a home-grown 6502-based computer which they called the Apple 1 (a few weeks later they formed the Apple Computer Company on April Fools day).

Although it was not tremendously sophisticated, the Apple 1 attracted sufficient interest for them to create the Apple II, which many believe to be the first personal computer that was both affordable and usable. The Apple II, which became available in April 1977 for $1,300, comprised 16 K-bytes of ROM, 4 K-bytes of RAM, a keyboard, and a color display. Apple was one of the great early success stories. In 1977 they had an income of $700,000 (which was quite a lot of money in those days), and just one year later this had soared tenfold to $7 million! (which was a great deal of money in those days).

Also in April 1977, Commodore Business Machines presented their 6502-based Commodore PET, which contained 14 K-bytes of ROM, 4 K-bytes of RAM, a keyboard, a display, and a cassette tape drive for only $600. Similarly, in August of that year, Tandy/Radio Shack announced their Z80-based TRS-80, comprising 4 K-bytes of ROM, 4 K-bytes of RAM, a keyboard, and a cassette tape drive for $600. One point that may seem strange today is that there were practically no programs available for the early microcomputers (apart from the programs written by the users themselves). In fact it wasn't until late in 1978 that commercial software began to appear. Possibly the most significant tool of that time was the VisiCalc spreadsheet program, which was written for the Apple II by a student at the Harvard Business School and which appeared in 1979.

It is difficult to overstate the impact of this VisiCalc, but it is estimated that over a quarter of the Apple machines sold in 1979 were purchased by businesses solely for the purpose of running this program. In addition to making Apple very happy, the success of VisiCalc spurred the development of other applications such as wordprocessors.

When home computers first began to appear, existing manufacturers of large computers tended to regard them with disdain ("It's just a fad ..... it will never catch on"). However, it wasn't too long before the sound of money changing hands began to awaken their interest. In 1981, IBM launched their first PC for $1,365, which, if nothing else, sent a very powerful signal to the world that personal computers were here to stay. Unfortunately, we've only been able to touch on a few systems here, but hopefully we've managed to illustrate both the public's interest in, and the incredible pace of development of, the personal computer. The advent of the general-purpose microprocessor heralded a new era in computing -- microcomputer systems small enough to fit on a desk could be endowed with more processing power than monsters weighing tens of tons only a decade before.

The effects of these developments are still unfolding, but it is not excessive to say that digital computing and the personal computer have changed the world more significantly than almost any other human invention, and many observers believe that we've only just begun our journey into the unknown!

For your interest ...... In 1975, an IBM mainframe computer that could perform 10,000,000 instructions per second cost around $10,000,000. In 1995 (only twenty years later), a computer video game capable of performing 500,000,000 million instructions per second was available for approximately $500!

Greed



Confidence

ज़िंदगी की असली उड़ान अभी बाकी है,

हमारे इरादो की इम्तिहान अभी बाकी है,

अभी तो नापी है मुट्ठी भर ज़मीन,

आगे सारा आसमान बाकी है |

Monday, January 10, 2011

My solution to a FEASIBLE and PRACTICAL plan to curb corruption

My solution to a FEASIBLE and PRACTICAL plan to curb corruption:

If they(i dont know who can do this) eliminate the cash component from the finance system, this can be curbed to a very large extent as then all transactions will be routed thru the banking channels and trakable. it is feasible too as banks have a deeper... penetration in both urban and rural areas. if the govt enforces this to create a bank account for every person with credit and debit machines spread all over, it will be much cheaper than the costs of public schemes. there are a lot of other variables too coming in the picture, but then this is the core idea.

(Paper money is just a printed paper with a promise. If they stop it, imagine the number of trees saved each year. Electronic money is just a number. ) 

Add to that the removal of material inheritance to the nominees from the system. This is not only one of the causes of corruption but also a big reason of fights and disparity. If this is removed every person will be forced to work to one's full potential right after one becomes an adult.

चुटकुले

  ''पिताजी, शादी में कितना खर्चा होता है ?''
''पता नहीं बेटा, मैं तो आज तक चुका ही रहा हूं।''



पत्नी : सुनते हो, इस बार हम अपनी शादी की वर्षगांठ कैसे मनाएं ?
पति : मेरा विचार है वर्षगांठ के दिन इस बार हम पांच मिनट का मौन रख लेंगे।

पहली : मैंने फैसला कर लिया है कि जब तक 25 वर्ष की नहीं हो जाऊंगी, शादी नहीं करूंगी।
दूसरी : और मैंने फैसला कर लिया है कि जब तक शादी न कर लूं, 25 वर्ष की होऊंगी ही नहीं।

चिकित्सक : इस दुनिया में चिकित्सको के दुश्मन बहुत कम हैं।
रोगी : मगर उस दुनिया में बहुत हैं।

एक आलसी से मित्र ने कहा : सुना है, तुम फौज में भरती हो रहे हो ?
आलसी : अरे नहीं, मुझे तो यह भी पता नहीं कि बंदूक का मुंह किधर रखकर चलाते हैं।
मित्र : इसमें क्या है ? तुम बंदूक का मुंह किधर भी रखकर चलाओ, देश का भला ही करोगे। 

''आज शाम तक अगर पचास हजार रूपयो का इन्तजाम नहीं हुआ तो बेइज्जती से बचने के लिये मुझे जहर पी लेना पड़ेगा! क्या तू मेरी मदद कर सकता है दोस्त ?''
''क्या करूं ? मेरे पास तो एक बूंद भी नहीं है!''

संता : यार मेरे 5 साल के बेटे ने मेरी सारी किवताएं फाड़ डाली।
बंता : बधाई हो, इतनी कम उम्र में तुम्हारा बेटा साहित्य का पारखी बन गया है।

संता बंता के किस्से

संता और बंता एक होटल में खाना खाने गये। संता ने आर्डर दिया और बैरे ने उन्हें खाना लाकर दिया।जैसे ही बैरे ने बंता को देखा वह आश्चर्य से बोला - अरे बंताजी आप । फिर वह होटल में मौजूद अन्य लोगो से बोला - अरे देखो आज हमारे होटल में बंताजी खाना खाने आये हैं।होटल का मैनेजर भी बंता को देखकर बहुत खुश हुआ और उसने बंता से हाथ मिलाया।

"तुम तो काफी मशहूर हो" - संता ने खाना खाते खाते बंता के कान में फुसफुसाया।
"मैं दुनिया का सबसे प्रसिद्ध आदमी हूँ" - बंता ने बताया ।
"नहीं यार-अब इतने भी मत बनो । ये कुछ लोग तुम्हें जानते हैं इसका मतलब यह नहीं कि तुम दुनिया के सबसे प्रिसद्ध व्यक्ति हो " संता ने कहा ।
"हाँ.. ये सच है। तुम सिर्फ नाम बताओ । ऐसा कौन है जो मुझे नहीं जानता हो " - बंता ने जवाब दिया।
"अच्छा - मैं दस हजार की शर्त लगाता हूँ  कि मुख्यमंत्री तुम्हें नहीं जानता होगा" - संता ने कहा ।
"ठीक है चलो" - बंता ने कहा और अगले ही दिन वे राजधानी पहुंच गये। वहाँ पहुंचने पर संता ने देखा कि मुख्यमंत्री ने बंता को देखते ही पहचान लिया और गले लगाया। फिर दो दिन मुख्यमंत्री के घर मेहमाननवाजी कराने के बाद वे घर लौट आये।

"मैंने कहा था न कि मैं दुनिया का सबसे प्रसिद्ध आदमी हूं। अब तो मानते हो ?
"नहीं" । हिन्दुस्तान का प्रधानमंत्री तुम्हें बिलकुल नहीं जानता होगा । अगर वह जानता हो तो मैं दुगने पैसे दूंगा।"
अगले ही दिन वे दिल्ली में थे। प्रधानमंत्री बड़ी बेतकल्लुफी से बंता से मिले । बोले - - "कहाँ रहते हो बंता यार । तुम्हें देखे हुये तो जमाना बीत गया।"
फिर तीन दिनो तक प्रधानमंत्री के साथ गोल्फ खेलकर वे घर लौट आये।संता हैरान था पर हार मानने को तैयार नहीं था।
- "मैं एक एक लाख रूपये देने को तैयार हूं अगर अमिताभ बच्चन तुम्हें पहचान ले तो।"
- "ठीक है । जैसी तुम्हारी मर्जी ।"
 अगले दिन वे मुम्बई में अमिताभ बच्चन के घर पहुंचे। बंता ने संता से बाहर लॉन में खड़े रहने को कहा और खुद अंदर चला गया। थोड़ी देर बाद संता ने देखा कि अमिताभ बच्चन और बंता बाहो में बाहें डाले बालकनी में आ रहे हैं। बंता ने संता की ओर देखा और हाथ हिलाया। इसके बाद संता बेहोश होकर गिर पड़ा। बंता दौड़कर नीचे आया और पानी के छींटे देकर संता को होश में लाने की कोशिश करने लगा।
-" संता, संता तुम्हें क्या हुआ ? उठो।"
संता ने धीरे से आंखें खोलीं और कहा - बंता तुम सचमुच दुनिया के सबसे प्रसिद्ध आदमी हो।
-" मैंने तुमसे कहा था न पर तुम ही नहीं मानते थे। खैर ये बताओ कि जब मैं तुम्हें मुख्यमंत्री के घर ले गया तब तुम बेहोश नहीं हुये, प्रधानमंत्री के घर ले गया तब तुम्हें कुछ नहीं हुआ फिर अब ऐसा क्या हुआ  कि तुम गिर पड़े ?"
संता ने धीरे से बताया - "जब तुम ऊपर अमिताभ बच्चन के साथ बालकनी में खड़े थे, तो एक आदमी जो मेरे बगल में खड़ा था उसने मुझसे क्या कहा जानते हो ? " "क्या कहा ?" - बंता ने पूछा
"उसने कहा" - संता ने बताया - "वह कौन है जो बंता जी के साथ ऊपर बालकनी में खड़ा है।"

Monday, December 27, 2010

Equations of Life

Equation 1
Human = eat + sleep + work + enjoy
Donkey = eat + sleep
Therefore:
Human = Donkey + Work + enjoy
...Therefore:
Human-enjoy = Donkey + Work
In other words,
A Human that doesn't know how to enjoy = Donkey that works.


Equation 2
Man = eat + sleep + earn money
Donkey = eat + sleep
Therefore:
Man = Donkey + earn money
Therefore:
Man-earn money = Donkey
In other words
Man who doesn't earn money = Donkey
Equation 3
Woman= eat + sleep + spend
Donkey = eat + sleep
Therefore:
Woman = Donkey + spend
Woman - spend = Donkey
...In other words,
Woman who doesn't spend = Donkey
To Conclude:
From Equation 2 and Equation 3
Man who doesn't earn money = Woman who doesn't spend
So Man earns money not to let woman become a donkey!
And a woman spends not to let the man become a donkey!
...So, We have:
Man + Woman = Donkey + earn money + Donkey + Spend money
Therefore from postulates 1 and 2, we can conclude
Man + Woman = 2 Donkeys that live happily together!
BOTTOMLINE :  ARE YOU A DONKEY ? :D

Wednesday, December 22, 2010

Greatness in Thoughts

#CRPCC 

Keep your thoughts positive, because your thoughts become your words.
Keep your words positive, because your words become your actions.
Keep your actions positive, because your actions become your habits.
Keep your habits positive, because your habits become your lifestyle.
Keep your lifestyle positive, because your lifestyle becomes your destiny

~ Swami Vivekanand

Sunday, December 19, 2010

Facebook Privacy and Application Access

#proofread

Today an acquaintance asked a basic question which I have been wanting to post for quite sometime.

Question:

When they ask you to visit a site on FB why do they also ask you to .......
#
Access my basic information
Includes name, profile picture, gender, networks, user ID, list of friends, and any other information I've shared with everyone.
#
...Post to my Wall
WEBCAM may post status messages, notes, photos, and videos to my Wall
#
Access my data any time
WEBCAM may access my data when I'm not using the application

****
 
1/ These are apps which require YOUR data to operate on without which their existence is null and void.. Hence your permission is very essential.

2/ With time one posts a potential amount of useful data to identify his/her tastes and inclinations -> More ad revenue for facebook or any social network.

3/ Since you own the data, sometimes badly written apps try to forcefully impose these permission acceptance on you in exchange for the what the apps do.. Also they access your wall => you become the silent ad spammers in your network for that app....

4/ They access your friends network and list -> potentially targeting ads on your network... may also be used for social engineering. (facebook have privacy controls to stop this.. but those privacy rules dont apply to them ;-) and since, they pacts with third party providers..... u can now complete the picture yourself...)


In the end its all about money.. There is nothing called as free lunch on the web..Its always an exchange..

Social networks are best utilized to exchange generic ideas and thoughts rather than personal. A kind of  balance has to be maintained with the amount and kind of info shared and authenticity of the owner posting... you WILL have to expose some of the private data associated to yourself to be locatable and identified on the web...As one article in India Today long time ago had said - there are 36 leak sources of ones private data.


You may view lectures on privacy by Steven Rambam titled - "Privacy is dead - Get over it"

Sunday, July 11, 2010

Yeast alternative for bread?

http://answers.yahoo.com/question/index?qid=20080120202506AAOKexl

Yeast is a microorganism which is used for fermenting the dough for bread (खमीर). It is classified as an animal and not a plant. I was searching for an alternative for yeast where i came across this lifesaver recipe for yeastless bread.
 

Question:
Is there something that I can use besides baking powder, baking soda, and yeast, sugar, or salt to help bread rise? Please, no sarcasm, and I don't want to hear "You can't make bread without these things."

Answer:
I have a perfect recipe that I just love! You use buttermilk instead of yeast.

Whole Wheat Loaf
Freezes well. Quick to prepare

2 cups whole wheat flour
1 cup all purpose flour
1/3 cup granulated sugar
1 tsp. baking soda
1 tsp. salt
2 cups buttemilk, fresh or reconstituted from powder

Preheat oven to 375 F.
Measure first 5 ingredients into bowl. Mix.

Add buttermilk. Stir just to moisten. Turn into greased 9 x 5 x 3 inch (22 x 12.5 x 7.5 cm) loaf pan. Bake in 375 F oven for 55-65 minutes until wooden pick inserted in center comes out clean. Let stand for 2 to 3 minutes.
Remove from pan to rack to cool. Cuts into 16 slices.

This tastes so amazing, especially warm.
Hope you like!

**************
Here are a couple more you might find interesting to try:

Simple Yeast Free Bread

1 cup cornmeal
1 egg
1 teaspoon baking powder
Salt
1 tablespoon shortening

First, preheat the oven to 375 degrees. Mix cornmeal, salt and shortening in a bowl and a small amount of boiling water and keep adding it until it creates a paste. Add egg and baking powder and continue mixing. Place entire mixture in a in a greased pan and bake for 20 minutes. Allow the bread to cool and serve.

*****************************
Yeast Free Bread Recipe

Ingredients:
2 cups stoneground wholemeal flour
1/2 teaspoon salt
1/4 cup of Grainfields Liquid
3/4 cup of lukewarm water

Directions:
Combine all ingredients and mix into a smooth dough. Place dough into a small bread tin or on a baking tray, cover with a tea towel and allow to rise for 4 to 6 hours in a warm draught-free place. Lightly brush with water and bake at 230°C for 35 to 40 minutes.

************************************
Yeast Free Bread Recipe
(Loaf Style)

A yeast & dairy free recipe especially for sufferers
of Candida albicans yeast, gas, heartburn,
digestive upsets, nausea, indigestion, food allergies

No Yeast and No Dairy Ingredients

3 cups whole grain flour - preferably organic (i.e. whole wheat, barley, rye, oat, spelt, kamut, and etc.).

Note1: If using non-glutenous flours such as rice, millet, buckwheat, amaranth, corn, potato and etc., they will not hold together well unless mixed with glutenous flour(s) or a binding agent such as egg.

2 1/2 cups (~ 600 ml) distilled/purified water
1 TBS. (non-aluminum) baking powder
(Featherweight or Rumford)
1 TBS. Olive Oil
1/4 - 1/2 tsp. sea salt

Batter Preparation and Cooking:

Mix liquids and dry ingredients separately; then combine and mix well.
Place in greased and floured 9" x 5" loaf pan or 9" x 9" cake pan or completely line pan with unbleached parchment paper.
Bake at 375 F (middle rack of pre-heated oven) for 50 - 55 minutes.
When bakers pick comes out clean and top is light to medium brown, bread is ready to cool on rack. Let cool in pan for at least 1/2 hour. Do not cut until bread has completely cooled.

Note2: For a lighter weight bread, use 3 cups unbleached white VitaSpeltÒ flour or use 1 1/2 cups unbleached white VitaSpeltÒ flour mixed with 1 1/2 cups whole grain flour.

Friday, July 9, 2010

अहसास

ज़िंदगी इस बहाने जी ली,
शराब इस बहाने पी ली,
कि तुम आओगे,
तुमने बेवफ़ाई कर ली,
अरमानो से जुदाई कर ली,
दिल को समझा लिया आख़िर मैने
कि तुम आओगे|

Wednesday, June 30, 2010

Aadhar - Towards a more corrupt system ?

http://timesofindia.indiatimes.com/india/Rs-1cr-fine-for-UID-data-theft/articleshow/6108500.cms

The cost of privacy of people = INR10000 (if the breach is by an individual) and INR300000 if by a company..

Saturday, April 3, 2010

History of computers

1973 AD to 1981 AD
The First Personal Computers (PCs)

Click here to visit the DIY Calculator website
As is true of many facets in computing, the phrase "Personal Computer" can be something of a slippery customer. For example, the IBM 610 Auto-Point Computer (1957) was described as being "IBM's first personal computer" on the premise that it was intended for use by a single operator, but this machine was not based on the stored program concept and it cost $55,000! Other contenders include MIT's LINC (1963), CTC's Datapoint 2200 (1971), the Kenbak-1 (1971), and the Xerox Alto (1973), but all of these machines were either cripplingly expensive, relatively unusable, or only intended as experimental projects. So, for our purposes here, we will understand "Personal Computer" to refer to an affordable, general-purpose, microprocessor- based computer intended for the consumer market. Given that the 8008 microprocessor was not introduced until November 1972, the resulting flurry of activity was quite impressive. Only six months later, in May 1973, the first computer based on a microprocessor was designed and built in France. Unfortunately the 8008-based Micral, as this device was known, did not prove tremendously successful in America. However, in June of that year, the term "microcomputer" first appeared in print in reference to the Micral.

In the same mid-1973 time-frame, the Scelbi Computer Consulting Company presented the 8008-based Scelbi-8H microcomputer, which was the first microprocessor-based computer kit to hit the market (the Micral wasn't a kit -- it was only available in fully assembled form). The Scelbi-8H was advertised at $565 and came equipped with 1 K-byte of RAM.
a
In June 1974, Radio Electronics magazine published an article by Jonathan Titus on building a microcomputer called the Mark-8, which, like the Micral and the Scelbi-8H, was based on the 8008 microprocessor. The Mark-8 received a lot of attention from hobbyists, and a number of user groups sprang up around the US to share hints and tips and disseminate information.
a
Around the same time that Jonathan Titus was penning his article on the Mark-8, a man called Ed Roberts was pondering the future of his failing calculator company known as MITS (which was located next to a laundromat in Albuquerque, New Mexico). Roberts decided to take a gamble with what little funds remained available to him, and he started to design a computer called the Altair 8800 (the name "Altair" originated in one of the early episodes of Star Trek). (The authors don't have the faintest clue why the Altair 8800 wasn't named the Altair 8080, but we would be delighted to learn the answer to this conundrum if anyone out there knows -- feel free to email us at info@maxmon.com.) Roberts based his Altair 8800 system on the newly-released 8080 microprocessor, and the resulting do-it-yourself kit was advertised in Popular Electronics magazine in January 1975 for the then unheard-of price of $439. In fact, when the first unit shipped in April of that year, the price had fallen to an amazingly low $375. Even though it only contained a miserly 256 bytes of RAM and the only way to program it was by means of a switch panel, the Altair 8800 proved to be a tremendous success. (These kits were supplied with a steel cabinet sufficient to withstand most natural disasters, which is why a remarkable number of them continue to lurk in their owner's garages to this day).
a
Also in April 1975, Bill Gates and Paul Allen founded Microsoft (which was to achieve a certain notoriety over the coming years), and in July of that year, MITS announced the availability of BASIC 2.0 on the Altair 8800. This BASIC interpreter, which was written by Gates and Allen, was the first reasonably high-level computer language program to be made available on a home computer. MITS sold 2,000 systems that year, which certainly made Ed Roberts a happy camper, while Microsoft had taken its first tentative step on the path toward world domination.
a
In June 1975, MOS Technology introduced their 6502 microprocessor for only $25 (an Intel 8080 would deplete your bank account by about $150 at that time). A short time later, MOS Technology announced their 6502-based KIM-1 microcomputer, which boasted 2 K-bytes of ROM (for the monitor program), 1 K-byte of RAM, an octal keypad, a flashing LED display, and a cassette recorder for storing programs. This unit, which was only available in fully-assembled form, was initially priced at $245, but this soon fell to an astoundingly $170. The introduction of new microcomputers proceeded apace. Sometime after the KIM-1 became available, the Sphere Corporation introduced its Sphere 1 kit, which comprised a 6800 microprocessor, 4 K-bytes of RAM, a QWERTY keyboard, and a video interface (but no monitor) for $650.

In March 1976, two guys called Steve Wozniak and Steve Jobs (who had been fired with enthusiasm by the Altair 8800) finished work on a home-grown 6502-based computer which they called the Apple 1 (a few weeks later they formed the Apple Computer Company on April Fools day).
a
Although it was not tremendously sophisticated, the Apple 1 attracted sufficient interest for them to create the Apple II, which many believe to be the first personal computer that was both affordable and usable. The Apple II, which became available in April 1977 for $1,300, comprised 16 K-bytes of ROM, 4 K-bytes of RAM, a keyboard, and a color display. Apple was one of the great early success stories. In 1977 they had an income of $700,000 (which was quite a lot of money in those days), and just one year later this had soared tenfold to $7 million! (which was a great deal of money in those days).
a
Also in April 1977, Commodore Business Machines presented their 6502-based Commodore PET, which contained 14 K-bytes of ROM, 4 K-bytes of RAM, a keyboard, a display, and a cassette tape drive for only $600. Similarly, in August of that year, Tandy/Radio Shack announced their Z80-based TRS-80, comprising 4 K-bytes of ROM, 4 K-bytes of RAM, a keyboard, and a cassette tape drive for $600. One point that may seem strange today is that there were practically no programs available for the early microcomputers (apart from the programs written by the users themselves). In fact it wasn't until late in 1978 that commercial software began to appear. Possibly the most significant tool of that time was the VisiCalc spreadsheet program, which was written for the Apple II by a student at the Harvard Business School and which appeared in 1979.
a
It is difficult to overstate the impact of this VisiCalc, but it is estimated that over a quarter of the Apple machines sold in 1979 were purchased by businesses solely for the purpose of running this program. In addition to making Apple very happy, the success of VisiCalc spurred the development of other applications such as wordprocessors.
a
When home computers first began to appear, existing manufacturers of large computers tended to regard them with disdain ("It's just a fad ..... it will never catch on"). However, it wasn't too long before the sound of money changing hands began to awaken their interest. In 1981, IBM launched their first PC for $1,365, which, if nothing else, sent a very powerful signal to the world that personal computers were here to stay. Unfortunately, we've only been able to touch on a few systems here, but hopefully we've managed to illustrate both the public's interest in, and the incredible pace of development of, the personal computer. The advent of the general-purpose microprocessor heralded a new era in computing -- microcomputer systems small enough to fit on a desk could be endowed with more processing power than monsters weighing tens of tons only a decade before.
a
The effects of these developments are still unfolding, but it is not excessive to say that digital computing and the personal computer have changed the world more significantly than almost any other human invention, and many observers believe that we've only just begun our journey into the unknown!

See also Further Reading.
For your interest ...... In 1975, an IBM mainframe computer that could perform 10,000,000 instructions per second cost around $10,000,000. In 1995 (only twenty years later), a computer video game capable of performing 500,000,000 million instructions per second was available for approximately $500!
a

Click here to see the last pageClick here to see the indexClick here to see the next page

Possibility theory

Possibility theory is a mathematical theory for dealing with certain types of uncertainty and is an alternative to probability theory. Professor Lotfi Zadeh first introduced possibility theory in 1978 as an extension of his theory of fuzzy sets and fuzzy logic. Whereas fuzzy logic describes imprecision, possibility theory describes uncertainty. The idea was not entirely new: early in the 50s economist G.L.S. Shackle proposed the min/max algebra to describe the degree of potential surprise.
Contents
[hide]

* 1 Mathematical elements
o 1.1 Independent fuzzy events
* 2 Conditional possibility and necessity
o 2.1 Properties of conditionals
o 2.2 Set-theoretic operations with conditionals
* 3 Relationship with other imprecise probability theories and fuzzy logic
* 4 See also
* 5 References
* 6 External links

[edit]

Mathematical elements

Whereas probability theory uses a single number, the probability, to describe how likely an event is to occur possibility theory uses two numbers, the possibility of the event and the necessity of the event. Like probabilities, possibilities and necessities are set measures. Formally, a distribution of possibility is a function π from Ω to [0, 1] normalized such that at least one element has possibility 1. We start with a finite universe of discourse Ω. This is the set of all possible true states of affairs. By analogy with probability,

\Pi(\empty)=0, \Pi(\Omega)=1

For any collection of subsets

\omega_1 \in \mathcal{P}(\Omega),\ldots,\omega_n \in \mathcal{P},
\Pi\left(\cup_{i=1}^{n}\omega_i\right)=\sup_{i=1,\ldots,n}\left(\omega_i\right)

(\mathcal{P}(\Omega) denotes the powerset of Ω, i.e, the set of all subsets). For any set S, the necessity measure is defined by:

\Nu(S) = 1 - \Pi(\overline S) = \inf_{\omega \in S} (1 - \pi(\omega))\,

Note that contrary to probability theory it is generally not true that \Pi(S) + \Pi(\overline S) = 1. Possibility is not self dual. However, the following duality rule holds: for any event S, either the possibility is 1, or the necessity is 0.

Possibility measures obey the following composition rule, which holds for any two subsets S and T even if they are not disjoint (compare with the additivity axiom in probabilities): \Pi(S \cup T) = \max (\Pi(S), \Pi(T))\,

The possibility is a non-additive set measure (mathematics) when it is applied to the membership function of a set.
[edit]

Independent fuzzy events

Two fuzzy events S and T are independent iff:

\Pi(S \cap T) = \min(\Pi(S),\Pi(T))\,

[edit]

Conditional possibility and necessity

Conditional possibility and necessity play similar role as conditional probabilities in probability theory do. For any two, possibly fuzzy, subsets A and B of the same universal set Ω, with the membership functions \mu_A, \mu_B:\Omega\rightarrow[0,1] the conditional possibility is defined as:

\operatorname{pos}(A|B) = \sup_{\omega \in \Omega} \min (\mu_A(\omega), \mu_B(\omega)) = \sup_{\omega \in \Omega} \mu_{A \cap B}\,

The conditional possibility tells how possible is A given the set B. When B is normal, i.e. its membership function reaches 1, then \operatorname{pos}(\cdot|B) becomes a possibility measure. The conditional necessity:

\operatorname{nec}(A|B) = \inf_{\omega \in \Omega} \max (\mu_A(\omega), 1 - \mu_B(\omega)) = \inf_{\omega \in \Omega} \mu_{A \cup \overline{B}}\,

[edit]

Properties of conditionals

\operatorname{nec}(A|B) \equiv 1 - \operatorname{pos}(\overline{A}|B)\,

The next two results are the possibilistic equivalent of Bayes' theorem:

\operatorname{pos}(A|B) \equiv \operatorname{pos}(B|A)\,
\operatorname{nec}(A|B) \equiv \operatorname{nec}(\overline{B}|\overline{A})\,

If B is normal, then

\operatorname{nec}(A|B) \le \operatorname{pos}(A|B)\,

The pair of conditionals

\{\operatorname{pos}(A|B), \operatorname{nec}(A|B)\}\,

characterize B as a subset of A, i.e. B \subseteq A. For A and B crisp sets, if B is a subset of A then pos(A | B) = nec(A | B) = 1. If B intersects A then pos(A|B) = 1 and nec(A|B) = 0. If B is outside A then pos(A|B) = nec(A|B) = 0.

Let {ω} be a singleton subset of Ω. Then

\operatorname{pos}(A|\{\omega\})\equiv \operatorname{nec}(A|\{\omega\})\equiv \mu_A(\omega)\,

[edit]

Set-theoretic operations with conditionals

\operatorname{pos}(A\cup B|S) \equiv \max (\operatorname{pos}(A|S), \operatorname{pos}(B|S))\,
\operatorname{pos}(A\cap B|S) \le \min (\operatorname{pos}(A|S), \operatorname{pos}(B|S))\,

\operatorname{pos}(T|A\cup B) \equiv \max (\operatorname{pos}(T|A), \operatorname{pos}(T|B))\,
\operatorname{pos}(T|A\cap B) \le \min (\operatorname{pos}(T|A), \operatorname{pos}(T|B))\,

\operatorname{nec}(A\cup B|S) \ge \max (\operatorname{nec}(A|S), \operatorname{nec}(B|S))\,
\operatorname{nec}(A\cap B|S) \equiv \min (\operatorname{nec}(A|S), \operatorname{nec}(B|S))\,

\operatorname{nec}(T|A\cup B) \equiv \min (\operatorname{nec}(T|A), \operatorname{nec}(T|B))\,
\operatorname{nec}(T|A\cap B) \ge \max (\operatorname{nec}(T|A), \operatorname{nec}(T|B))\,

[edit]

Relationship with other imprecise probability theories and fuzzy logic

* There are many formal correspondences between probability and possibility theories. For example, just like probability measures, possibility measures (on subsets) can be represented by distributions (on singletons).

* Necessity can be seen as an upper probability: any necessity distribution defines a unique set of admissible probability distributions by

\left\{\, p: \forall S, p(S)\leq \operatorname{nec}(S)\,\right\}.

* Possibility measure can be seen as a consonant plausibility measure in Dempster-Shafer theory of evidence (when the focal sets are nested like Russian dolls). Possibility theory as an hyper-cautious transferable belief model.

The relationship with fuzzy theory can be explained with the following classical example.

* Fuzzy logic: When a bottle is half full, it can be said that the level of truth of the proposition "The bottle is full" is 0.5. The word "full" is seen as a fuzzy predicate describing the amount of liquid in the bottle.
* Possibility theory: There is one bottle, either completely full or totally empty. The proposition "the possibility level that the bottle is full is 0.5" describes a degree of belief. One way to interpret 0.5 in that proposition is to define its meaning as: I am ready to bet that it's empty as long as the odds are even (1:1) or better, and I would not bet at any rate that it's full.

[edit]

See also

* logical possibility
* probability theory
* Fuzzy measure theory

[edit]

References

* Dubois, Didier, and Prade, Henri, Possibility Theory, Plenum Press, New York, 1988.

* Joslyn, Cliff, "Possibilistic Measurement and Set Statistics", in Proceedings of the 1992 NAFIPS Conference 2:458-467, NASA, 1992.

* Joslyn, Cliff, "Possibilistic Semantics and Measurement Methods in Complex Systems", in Proceedings of the 2nd International Symposium on Uncertainty Modeling and Analysis, Bilal Ayyub (editor), IEEE Computer Society 1993.

* Dubois, Didier and Prade, Henri, Possibility theory, probability theory and multiple-valued logics: A clarification, Annals of Mathematics and Artificial Intelligence 32:35-66, 2001.

* Zadeh, Lotfi, "Fuzzy Sets as the Basis for a Theory of Possibility", Fuzzy Sets and Systems 1:3-28, 1978.

[edit]

External links

* http://lrb.cs.uni-dortmund.de/fd7/dubois.pdf
* http://www.dmitry-kazakov.de/ada/fuzzy.htm

Retrieved from "http://en.wikipedia.org/wiki/Possibility_theory"

CONTROL SYSTEM OF DATA TRANSFER BETWEEN MOBILES OR LAPTOPS OR BETWEEN MOBILE AND LAPTOP USING BLUETOOTH TECHNOLOGY

BLUETOOTH is a by now well-established communications standard for short-distance wireless connections. It replaces the many proprietary cables that connect one device to another with one universal short-range radio link. For instance, Bluetooth radio technology built into both the cellular telephone and the laptop would replace the cable used today to connect a laptop to a cellular telephone. Printers, desktops, fax machines, keyboards, joysticks and virtually any other digital device can be part of the Bluetooth system.
The Bluetooth radio technology also provides a universal bridge to existing data networks, a peripheral interface, and a mechanism to form small private ad hoc groupings of connected devices away from fixed network infrastructures
BRIEF HISTORY::
In 1995, the telecommunications and information technology industries recognized that a low-cost, low-power radio based cable replacement, or wireless link, would be feasible, thus eliminating the need for communication cables for short distances. Such a ubiquitous link would provide the basis for small portable devices to communicate together in an ad-hoc fashion.
Bluetooth technology has been designed to operate in noisy radio frequency environments, and uses a fast acknowledgement and frequency-hopping scheme to make the link robust, communication-wise. Bluetooth radio modules avoid interference from other signals by hopping to a new frequency after transmitting or receiving a packet. Compared with other systems operating in the same frequency band, the Bluetooth radio typically hops faster and uses shorter packets. This is because short packages and fast hopping limit the impact of microwave ovens and other sources of disturbances..

THE BASIC CONTROL SYSTEM BLOCK OF THIS SYSTEM




















Functional parts of the Bluetooth system:


  • a radio unit


  • a link control unit


  • link management


  • software functions


  • SCO(synchronous, connection-oriented links)

How network connections are established?
Bluetooth supports both point-to-point and point-to-multi-point connections.
Several piconets (Piconet: a collection of devices connected via Bluetooth technology in an ad hoc fashion. A piconet starts with two connected devices, such as a portable PC and cellular phone, and may grow to eight connected devices All Bluetooth devices are peer units and have identical implementations. However, when establishing a piconet, one unit will act as a master for synchonization purposes, and the other(s) as slave(s) for the duration of the piconet connection.) can be established and linked together ad hoc, where each piconet is identified by a different frequency hopping sequence. All users participating on the same piconet are synchronized to this hopping sequence.
Before any connections in a piconet are created, all devices are in STANDBY mode. In this mode, an unconnected unit periodically "listens" for messages every 1.28 seconds. Each time a device wakes up, it listens on a set of 32 hop frequencies defined for that unit.
Once the signal is down-converted to the first IF, it can be filtered, amplified, sampled by an ADC, and subsequently digitally processed. Some designs rely here on analog IF filtering and much simpler analog FM-discriminator-based demodulator designs. After demodulation, there is a slicer, converting the FM-demodulated signal to a binary sequence


The connection procedure for a non-existent piconet is initiated by any of the devices, which then becomes master of the piconet thus created. (The one sending the data is the master)
INQUIRING AND PAGING
A connection is made by a PAGE message being sent if the address is already known, or by an INQUIRY message followed by a subsequent PAGE message, if the address is unknown.
In the initial PAGE state, the master unit will send a train of 16 identical page messages on 16 different hop frequencies defined for the device to be paged (slave unit). If no response, the master transmits a train on the remaining 16 hop frequencies in the wake-up sequence.
The maximum delay before the master reaches the slave is twice the wakeup period (2.56 seconds) while the average delay is half the wakeup period (0.64 seconds).
The INQUIRY message is typically used for finding Bluetooth devices, including public printers, fax machines and similar devices with an unknown address. The INQUIRY message is very similar to the page message, but may require one additional train period to collect all the responses.
A power saving mode can be used for connected units in a piconet if no data needs to be transmitted. The master unit can put slave units into HOLD mode, where only an internal timer is running. Slave units can also demand to be put into HOLD mode. Data transfer restarts instantly when units transition out of HOLD mode. The HOLD is used when connecting several piconets or managing a low power device such as a temperature sensor.







2-MODES OF OPERATION
1>STANDBY MODE, an unconnected unit periodically "listens" for messages every 1.28 seconds. Each time a device wakes up, it listens on a set of 32 hop frequencies defined for that unit.
2> SNIFF mode, a slave device listens to the piconet at reduced rate, thus reducing its duty cycle. The SNIFF interval is programmable and depends on the application.
3> PARK mode, a device is still synchronized to the piconet but does not participate in the traffic. Parked devices have given up their MAC address and only occasionally listen to the traffic of the master to re-synchronize and check on broadcast messages. It can thus receive broadcasts, but not addressed messages while parked.

THE FEEDBACK FROM RECEIVERING END
The SCO link is symmetric and typically supports time-bounded voice traffic. SCO packets are transmitted over reserved intervals. Once the connection is established, both master and slave units may send SCO packets without being polled. One SCO packet type allows both voice and data transmission - with only the data portion being retransmitted when corrupted. The ACL link is packet oriented and supports both symmetric and asymmetric traffic. The master unit controls the link bandwidth and decides how much piconet bandwidth is given to each slave, and the symmetry of the traffic. Slaves must be polled before they can transmit data. The ACL link also supports broadcast messages from the master to all slaves in the piconet.
Networking requires a complete integration of:


  • RF processing, including:


    • antenna subsystem


    • modulation, up-conversion and power amplification, RF power control


    • RX signal amplification, down-conversion, filtering, and demodulation


  • Baseband processing


    • coding (encryption, scrambling, FEC/channel coding)


    • decoding (decryption, scrambling, FEC decoding/correction)


  • Resource (bandwidth) allocation mechanisms


  • Channel assignment


  • Quality-of-service (QoS) management, in other words, traffic prioritization


  • Interference management (suppression/avoidance)


  • Authentication.(Security management)

Block diagram contents
Services provided:


  • Sending and receiving of data (of course!)


  • Name request. The Link Manager has an efficient means to inquire and report a name or device identity up to 16 characters in length.


  • Link address inquiries.


  • Connection set-up.


  • Authentication.


  • Link mode negotiation and set-up, e.g. data or data/voice. This may be altered during the connection.
    The Link Manager decides the actual frame type on a packet-by-packet basis.

CONDITONS REQUIRED FOR GOOD RESPONSE


  • Based upon a small, high performance integrated radio transceiver, each of which is allocated a unique 48-bit address derived from the IEEE 802 standard.


  • Operate in the unrestricted 2.45GHz ISM "free band", which is available globally although slight variation of location and width of band apply.


  • Range set at 10m to optimize for target of mobile and LAPTOP user.


  • Gross data rate 1 Mbit/s


  • One-to-one connections allow maximum data transfer rate of 721 kbits/s (3 voice channels).


  • Uses packet switching protocol based on frequency hop scheme with 1600 hops/s to enable high performance in noisy radio environments. The entire available frequency spectrum is used with 79 hops of 1 Mhz bandwidth, analogous to the IEEE 802.11 standard.


  • Low power consumption drawing only 0.3 mA in standby mode enables maximum performance longevity for battery powered devices. During data transfer the maximum current drain is 30 mA. However, during pauses or at lower data rates the drain will be lower.
If the above conditions are satisfied we can say that the response of the system is CRITICAL. In some cases the system may me OVERDAMPED.



STABILITY OF THE SYSTEM
The main factors which will affect the stability of the network are:


  • AUTHENTICATION
Connections may require a one-way, two-way, or no authentication. Authentication is based on a challenge-response algorithm. Authentication is a key component of any Bluetooth system, allowing the user to develop a domain of trust between a personal Bluetooth device, such as allowing only the owner's notebook computer to communicate through the owner's cellular telephone. Encryption is used to protect the privacy of the connection. Bluetooth uses a stream cipher well suited for a silicon implementation with secret key lengths of 0, 40, or 64 bits. Key management is left to higher layer software.


  • BLUETOOTH BANDWIDTH
Bluetooth is not primarily meant for transferring great amounts of data.(WLAN, which also uses the IEEE 802.11 standard, is better in that respect). The Bluetooth is about 720 kbit/sec. between the master and any one slave unit, after discounting the overhead. As, this is sufficient for telephony, but not quite enough for video conferences and public radio. Such services, along with video and TV, would have to be provided by other means.


  • Performing frequent pages does not result in a positive user experience.
One of the main reasons an application would want to perform device paging is to simulate a device-proximity detector: When the desired device comes into range, it responds to the application’s page and triggers some specific task in the application. The paging process is a lengthy one, however, and like the inquiry process, results in degraded Bluetooth communication for its duration. In the worst case (when the desired device is not present), the timeout for the page could be as much as 15 seconds


  • For a device to be visible to an inquiry, it must be in discoverable mode.
The vast majority of devices are not in discoverable mode by default. The user must actively choose to make a device discoverable. In addition, a device that is always in discoverable mode is using more power. Since most Bluetooth-enabled devices are wireless, this means a greater drain on the battery. Finally, a perpetually discoverable device is more vulnerable to unwanted connections.

EXTRA INFORMATION
Wi-Fi requires that users be within the proximity of a transmitter, it offers faster speeds and easy adaptation for programs because it so closely resembles traditional networking. In contrast, Bluetooth would allow devices to communicate directly with one another instead of going through a transmitter.
The Bluetooth baseband protocol is a combination of circuit and packet switching. Time slots can be reserved for synchronous packets. A frequency hop is done for each packet that is transmitted. A packet nominally covers a single time slot, but can be extended to cover up to five slots. Bluetooth can support an asynchronous data channel, up to three simultaneous synchronous voice channels, or a channel which simultaneously supports asynchronous data and synchronous
. The number of hop frequencies varies in different geographic regions; 32 is the number for most countries.