Dec 15, 2008

trying to incorpoate my scattered fragments of thoughts..

The sun of the first day
Put the question
To the new manifestation of life-
Who are you?
There was no answer.
Years passed by.

The last sun of the last day
Uttered the question
on the shore of the western sea
In the hush of evening-
Who are you?
No answer came again."

--Rabindranath Tagore


The Italians have made thier way into people's heart by this very food ! ya, I am talking about PIZZA. People from all over the world, Asian or European, American or Africa, just love it.
Now we have several renouned pizza corners in Bangladesh too. Pizza hut, Domino's , Shwarma house serve world class pizzas at world class rates ! So, if the price does not seem resonable, you can make your own pizza at home, with your favorite toppings.
The first step is to making the dough: mix all these items : flour, water, yeast, sugar, salt, egg , milk. Keep 2 to 4 hours in a warm place.

Then prepare the topping: onion, garlic, pepper, tomatoes, meat, olives, mushrooms, capsicum and certainly cheese are the key ingredients for toppings. And oregano creates a nice flavor to this.
After shaping the dough into a roundish shape, add tomato sauce to it, decorate with the topiing and lots of cheese, bake it and voila! your pizza is ready to serve !

Dec 10, 2008

Download ebooks of Wilbur Smith: Cry Wolf , Seventh Scroll

Cry Wolf : "The three of them, Jake, Gareth and Vicky, find themselves swept irresistibly from a daring adventure Into a violent confrontation with death among the high mountains of Ethiopia."

The Seventh Scroll

One novel from Smith's Egyptian series. "Duraid Al Simmu and his beautiful half-English, half-Egyptian wife, Royan, were the first to discover the tomb of Queen Lostris. And with it the scrolls in which the wily Taita recorded the burial of Pharaoh Mamose with all his vast treasure.When Duraid is brutally murdered and their research notes stolen, Royan is forced to seek refuge in England."

For more ebook download links, visit here.

Dec 8, 2008

Guns n' Roses: new album Chinese Democracy , download songs

Download and enjoy !
After 15 years Axl Rose comes up with his new gang and the new album Chinese Democracy ! certainly a great news for Guns N' Roses fans , specially after so long a wait and so huge expectation! They started to record this album on 1994 and and at last it has seen the daylight.

The 14 tracks of this albums are: ( click the song title to download ..)

1) Madagascar (live) 5:38 minute
2) Chinese democracy 4:43
3) Better 4:58
4) Scraped 3:30
5) Shackler's Revenge 3:36
6) If the World 4:54
7) There was a Time 6:41
8) Catcher in the Rye 5:53
9) Street of Dreams 4:46
10) Riad n' the Bedouins 4:10
11) Sorry 6:14
12) I.R.S 4:28
13) This I Love 5:34
14) Pro-sti-tu-te 6:15

More download links will be available soon :)

The album title is a bit controversial, but it's after all Guns N Roses..and controversy is so natural here.. later I found that Chinese media also was not very happy with that title.. one of the news came to my notice... "China state media blast new Guns N' Roses album".
I love this song Madagascar.. Axl recorded this song 83 times to make it a perfect one !

More about this album can be found here.

Eid-ul-azha: kurbaani eid

Another Eid day has come, it's Kurbani eid tomorrow. My mom is going to prepare all the nice meals: kabab, firni, polaw, meat-balls and other usual items for Eid. So far I don't have any task for Eid day, so I am going to decorate my hands with henna and if possible, will try to help mom( though most of the times, all my attempts to help her turns out as a mess and creates further problem ! )

We are going to sacrifice a cow this year. A very nice black cow , when I tried to feed it , it came to me quietly and I took a picture of the cow. had it realized that it is going to be sacrificed the next day ? When we enjoy the delicious meat curries, we never think of the source of the flesh.. but at the Eid day, it just happens before the eyes.. I don't know what happens to other children, but when I was younger, it just created so much pressure in my brain and I generally do not prefer to go out on Eid-ul-Azha. Sacrificing cows and goats in roads and streets of the city not only pollutes the environment, it may cause stress to children minds. These things should be done outside the main city and be strictly prohibited in residential area.

According to Wikipedia, Eid ul Azha is a religious festival celebrated by Muslims worldwide in commemoration of the willingness of Ibrahim to sacrifice his son Ishmael as an act of obedience to Allah. The devil tempted Ibrahim by saying he should disobey God and spare his son. As Ibrahim was about to sacrifice his son, God intervened and instead provided a lamb as the sacrifice. This is why today all over the world Muslims who have the means to, sacrifice an animal (usually a goat or a sheep), as a reminder of Ibrahim's obedience to God. The meat is then shared out with family, friends (Muslims or non-Muslims), as well as the poor members of the community.This tradition of sacrifice is great , sacrificing is a must for the people whose earning is higher than a given threshold and this earning has to be honest and legal.But sometimes it becomes a way of displaying wealth and power; like this year, as the national parliament election is approaching, the political leaders are going to sacrifice many animals to uplift their image in their locality.This is sarcastic indeed ! How they steal our money and "sacrifice" for Allah in the name of religion !
Whatever ! I am happy that I got a long vaccation.. this is the most plesearable thing that Eid brings with it. We don't haveto go to office and can stay home with our family. My friends and relatives living abroad always say that they miss the Eid day .. in a foreign land it's not the same fun and sometimes they don't even get a holiday in Eid . It's pathetic to work in the biggest festivals of the year. I just hope this year they will be able to have a happier Eid day. Eid mubarak to all.

Nov 28, 2008

terrorist attack in Mumbai

After the violent terrorist attack on Mumbai people from all over the world have cast their eyes on India. Live telecast on news channels are broadcast. Frightening faces of horror are published in newspapers and websites .. people have been killed mercilessly.. but would the situation be same if the attack had been on distressed poor people ? instead of the luxurious hotel Taj the attacks could be on slums and more people might get killed.. but then there won't be so much concerns about security ans we son't see such commando operations to save the lives of normal working class people..

Nov 20, 2008

tea, coffee, coke !!!

I read this post and those who visit my blog may find it interesting, so I am quoting some of the interesting parts..

The original Coca-Cola was a late-nineteenth-century concoction known as Pemberton's French Wine Coca, a mixture of alcohol, the caffeine-richkola nut, and coca, the raw ingred ient of cocaine. In the face of social pressure, first the wine and then the coca were removed, leaving the more banal modern beverage in its place: carbonated, caffeinated sugar water with less kick to it than a cup of coffee. But is that the way we think of Coke?Not at all. In the nineteen-thirties, a commercial artist named Haddon Sundblom had the bright idea of posing a portly retired friend of his in a red Santa Claus suit with a Coke in his hand, and plastering the image  on billboards and advertisements across the  country. Coke, magically, was reborn as caffeine for children, caffeine without any of the weightyadult connotations of coffee and tea.

Today, of course, the chief cultural distinction is between coffee and tea,
which, according to a list drawn up by Weinberg and Bealer, have come to represent almost entirely opposite sensibilities:
Coffee Aspect
Tea Aspect

Nov 1, 2008

Security Holes in Wireless Sensor Network

It's now a major challenge in the development of wireless network ans yes, I am talking about security. May be the industry is not paying much attention as they are paying for cost effectiveness and energy efficiency, but we cannot deny its affect.I found a good explanatory article about it on IEEE computer society magazine:

Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses

If the network follows cluster head based routing protocol, then it will be sufficient to break the network simply by breaking the cluster heads by broadcasting jamming signals with same frequency but with more power.The opponent can find the cluster heads by determining the Voronoi Diagram of the network node topology and then make any possible attack on those nodes. But if the nodes can identify which packets are sent from its own network and which are not , then the opponent might disable the nodes, but not make them receive wrong information ans the nodes will not respond to the malicious packets.

Oct 27, 2008

Euclid's Elements

Today I found a very nice link on Euclid's elements.

Computational Geometry: Software Implementation

Computational geometry investigates algorithms for geometric problems. Motivated by the need for geometric computing in science and engineering applications that deal with the physical
world, about twenty years ago a community of researchers started forming around the study of algorithms for geometric problems. A new discipline, ‘computational geometry’, was soon
chartered with the dual mission of investigating the combinatorial structure of geometric objects and providing practical tools and techniques for the analysis and solution of fundamental
geometric problems. The inward research orientation freed computational geometers from the unpleasantness of modeling the complexity and imperfections of the physical world and of coping with the limitations of realistic computing devices. It allowed them to focus on the analysis of a simple, well-behaved, geometric objects that can be manipulated by idealized computing machines with unbounded memory space and real number arithmetic. However, at the same time as the accomplishments of computational geometers were celebrated within the general field of theory of computing, they also became less understood in applied circles. The simplifying models that enabled theoretical research to flourish turned out to be major impediments to technology transfer, and hindered computational geometry from accomplishing its mission. In particular, some apparently innocent assumptions seem to be the main problems:

• The reliance on asymptotic analysis as the ultimate gauge for estimating the performance of geometric algorithms, disregarding more practical aspects of efficiency;
• The adoption of real arithmetic, disregarding numerical finite-precision issues;
• The neglect of degenerate configurations, disregarding the difficulty of taking them into account in implementations;
•The model of uniform access to data in memory, disregarding the huge gap between the speed of main memory and disks.

Application Fields of Computational Geometry
Computational geometry enjoys two unique assets: diversity & potential to affect most forms of computing and mature algorithmic foundations. So its application field covers a multifarious area. Here I would like to mention some of them:
• Design and manufacturing: • Information systems: • Medicine and biology: • Physical sciences• Robotics: • Graphics and visualization and many more.
For this vast area of implementation, we need robust software with standardized algorithms. More on this here at Geometry in Action.

Available Software Resources

Recognizing the need for reusable and standard software, dedicated people and organizations are now working for development and collection libraries for computational geometry software,
tools and libraries.

The LEDA Library is a C++ class library that abstracts computational geometric data structures, and includes many algorithms that act on them.Computational Geometry Algorithms Library:CGAL has an initial release of its C++ class library.The contribution of CGAL and LEDA deserve a descriptive elaboration:

LEDA: Library of Efficient Data Types and Algorithms: a C++ library of the data types and algorithms of combinatorial computing. It provides a large collection of data types and algorithms in a form that can be used by non-experts. Several geometric algorithms including convex hulls and line segment intersection are included here.

CGAL: Computational Geometry Algorithm Library: It provides easy access to its resources. It offers data structures and algorithms like Voronoi diagrams, Boolean operations on polygons
and polyhedra, arrangements of curves and their applications, mesh generation, geometry processing, convex hull algorithms, operations on polygons, search structures, shape analysis,
fitting, and distances, kinetic data structures etc. All these data structures and algorithms operate on geometric objects like points and segments. These objects and predicates are regrouped in CGAL Kernels. The codes are basically written in C++.

Some notable people engaged in this mission are:
• Nina Amenta: Has collected a large number of free computational geometry programs arranged by subject.
Seth Teller: He has a collection of C code and SGI executables for linear programming, voronoi diagrams, and manipulation of NURBS surfaces.
Joe O’Rourke: He made C code corresponding to the material in his textbook, ‘Computational Geometry in C’.

Application Challenges

To build an effective pipeline connecting theory to practice Computational Geometer must start thinking not only in terms of asymptotic complexity, but also about:
• Code robustness • CPU times • Standard and Benchmark
• Precisions • Distribution
More on this can be found in this report.
In geometric computing, software libraries consisting of reliable components are particularly useful, since implementers of geometric algorithms are faced with notoriously difficult problems, especially the problems of robustness and degeneracies. Therefore, we need programs that run efficiently and robustly so that it can generate same output on different platforms. Reusable and maintainable data structures are also necessary.

Some other nice links:

Oct 23, 2008

Voronoi Diagram

Voronoi diagrams are wonderful geometric shapes , the more I learn about them, the more fascinated I become. These shapes are inherent in nature, we can see examples of Voronoi regions around us. But first let me explain in my own words about Voronoi diagrams.

Let us take some point sites in a plane. Now our task is to divide the total space into convex polygons or regions surrounding the sites in such a way that , all the points inside the polygon surrounding a site will be closer to that site than any other site of the plane. The diagram we get this way is our desired Voronoi diagram.

Seems a simple one to think. If we restrict the problem in a way that instead of polygon we have to draw circles, then we just take point circles centering the sites and increase their radii until they intersect any other circle. This way each circle contains points that are closer to their centre than any other circle in the plain. But there will be many point that will not be included in any of the circles, so now we have to think about polygon so that all the points will belong to a polygon, no points left aside.

Suppose, we have a set of stars and planets. Now we have to find out which planet belong to which star. If we draw the Voronoi diagram considering the stars as the pint sites then we get the space partitioned with polygons.

If a planet falls inside a polygon P that contains star S, then certainly the planet revolves around S as it is closer to this star than any other star of the constellation. The gravitic field of S is stronger onto the planet than any other star.

Voronoi diagrams have widespread applications in areas such as computer graphics, epidemiology, geophysics, and meteorology. A particularly notable use of a Voronoi diagram was the analysis of the 1854 cholera epidemic in London, in which physician John Snow determined a strong correlation of deaths with proximity to a particular (and infected) water pump on Broad Street.-mathworld

Voronoi diagram in Dragon fly wing
Voronoi Diagram in modern art

Differentiated Surveillance with Wireless Sensor Network

In computer science and telecommunications, wireless sensor networks are an active research area with numerous workshops and conferences arranged each year. And a bigger part of this
research is focused on how the energy consumption can be reduced further. Networks where nodes are heterogeneous and the coverage requirements are also different for nodes, we can exploit this feature to obtain a lower energy usage there. A wireless sensor network (WSN) is a wireless network consisting of spatially distributed autonomous devices using sensors to
cooperatively monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants, at different locations. The development of wireless sensor networks was originally motivated by military applications such as battlefield surveillance. However, wireless sensor networks are now used in many civilian application areas, including environment and habitat monitoring, health care applications, home automation, and traffic control.

Sensor Network:
A sensor is a device the produces a measurable response to a change in physical condition such as temperature or chemical condition such as concentration, like temperature sensor, humidity
sensor etc.

Specialty and Difference of Sensor Network:
Network topology is not fixed in sensor networks. Power is an expensive resource in these networks Nodes are connected by wireless links and a large number of sensors are deployed.
Addressing scheme for sensor nodes are also different from ad-hoc networks. Sensor network is used for data aggregation where data flow from multiple sources to a single destination. There
can generally be huge amount of redundancy in data traffic. The bigger problem is sensor nodes are prone to failure very often.

Energy Aware Routing:
Energy saving is crucial for sensornets. Network lifetime depends on energy management policy. Communication is the most expensive activity. To maintain an energy aware routing schedule, possible goals include:
• Lowest energy route
• Route via highest available energy
• Distribute energy burden evenly
• Lowest routing overhead.
To reduce energy consumption, Destination Initiated Routing is performed. A directional flooding is followed that determine various routes (based on location).The energy metrics are
collected along the way where every route has a probability of being chosen which is inversely proportional to its energy cost. The choice of path is made locally at every node for every packet.

Differentiated Surveillance:
Sensornets are used for surveillance in many areas. Environmental hazard exploration, Military tracking, Battle fields, Earthquake response, Biomedicine 2etc are some of them. Human presence is risky in these cases, so wireless sensor is used instead. Different areas or situation may need different degree of coverage, for example: Security sensitive area, areas susceptible to environmental hazards, in case of biomedicine, more risk prone areas etc. By differentiated surveillance, we indicate providing different degrees of sensing coverage for different nodes.

Oct 19, 2008

Download Books by Isaac Asimov: Foundation and Robot Series

The Robot series:

The complete robot
The Caves of Steel
The Robots of Dawn
Robots and Empire

The Foundation series:

Prelude to Foundation
Forward the Foundation
The Foundation Trilogy [
Foundation - Foundation and Empire - Second Foundation]
Foundation's Edge
Foundation and Earth

Eid 2008

The Eid day was boring as usual , but the get together party after a day after Eid was awesome..a wonderful reunion of old friends. After reaching Shefali's home i took the place from where i van see the door well whenever a person came I declared her presence...'now comes Shumi...!!!'...and another splash of laughter , sometimes fake and sometimes least we could laugh loud.

Oct 6, 2008

flaw in the Internet's Domain Name System

How a recently discovered flaw in the Internet's Domain Name System makes it easy for scammers to lure you to fake Web sites.
The Domain Name System is essentially the Internet's phone book. It's a huge database containing the 32‑bit numeric codes that identify every single site on the Internet. These are known as Internet Protocol addresses, or IP addresses for short. Amazingly, this database is distributed over some 12 million computers worldwide, known as DNS name servers.

read more

DNS checker: To find out if the DNS server you use is vulnerable :

The United States Computer Emergency Readiness Team (US-CERT) logs this problem in their vulnerability note : Multiple DNS implementations vulnerable to cache poisoning. They say about the impact of this flaw: 'An attacker with the ability to conduct a successful cache poisoning attack can cause a nameserver's clients to contact the incorrect, and possibly malicious, hosts for particular services. Consequently, web traffic, email, and other important network data can be redirected to systems under the attacker's control. '

Sep 22, 2008

Install Oracle Application Server with Portal Container

Install Infrastructure:

The infrastructure includes Oracle Internet Directory (LDAP for Oracle) and Metadata Repository. This should be installed prior to the installation of the Oracle Application Server.

1) Run CD one.
2) Choose Infrastructure and metadata repository as installation type.
3) Give administrator privilege.
4) Provide a username , for example , dc=mycompany, dc=com.
5) Provide password.
6) Provide database schema name for metadata repository, for example: oracle.mydatabase.
7) Eventually the installation will be completed.
8) Save the port information appears on the screen after installation, this can also be found in the {oracle_home|}/installation/setupinfo.txt file.

Install Application Server:

1) Run the CD one.
2) Choose Application Server as installation type.
3) Next choose Portal and Wireless, it will also install HTTP Server and Webcache by default.
4) Provide required privilege.
5) Provide the OID server name and port.
6) As you have already installed Infrastructure instance, then you now have a OID installed. Let, the infrastructure instance is installed in the server named infraserver and
OID is running at port, 389, then,

Internet Directory Host: infraserver
Internet Directory Port: 389

7) Eventually the installation will be completed.
8) Remember that it is highly recommended that the installation of infrastructure instance and application server instance will belong to two different physical machines. If this is not possible, then they must have different Oracle Home.
9) Disable the firewall of the infrastructure machine, otherwise the AS will not be able to connect to it and the OID service will not instantiate.
10) Create a new OC4J instance from the AS console. Give it a descriptive name. For example : OC4J_FIRSRT.
11) Start that instance.
Deploy War Files:

1) Go to the created OC4J instance.
2) Choose Application tab.
3) Go to Deploy War file.
4) Browse and show the appropriate war file.
5) Give it a suitable Application Name, say MyApplication.
6) Map to url: /MyApplication.
7) Click Deploy.
8) Now this new webapplication will be deployed under the directory :
{Oraclehome}/j2ee/ OC4J_FIRSRT/applications.
9) You will also need to add the information about the webapps in the files:
- $OC4J_HOME/j2ee/home/config/application.xml
- $OC4J_HOME/j2ee/home/config/http-web-site.xml.
Follow the example given in these files for deployed webapps.
10) Restart the server.

Create Portal:

Let the url of Http server and the welcome page is : http://my.server:7777/

Now hit this url on browser and you will get the welcome page from where you can log on to Oracle Application Server Portal.

You will need to provide the username ias_admin and the password you have provided during installation to view this page.
The portal builder welcome page will appear, you will need to login via Single Sign on to build or register for a portal. The username is orcladmin and the password is what you have provided, now you can create new user and give them required administrator privilege. Afterwards you can log in to portal server using those accounts.
  • Register a portlet provider:
Go to Portlets tab, then Register a Provider.

In provider information page, give a provider name (no space allowed) and display name, implementation style: web. Specify the URL of the provider:
http:// my.server:7777/MyApplication /providers/myportlets

where the provier.xml must reside under the directory:

This provider.xml file contains information about the portlets of the application.

You can also test if the provider service is available by giving this url on your browser address bar, if everything is alright, you will see the information page about the portlets.

But remember, even if you can see the information via browser, it may not be accessible for the provider registration process if firewall is enabled on the Application server machine, otherwise you will get the error message that : The provider URL specified may be wrong or the provider is not be running: (WWC-43176) . This can happen for several reasons, but the firewall problem is the most common one.

After successful registration, the new portlets will appear on the Portlet Repository, they will be listed under category : Portlet staging Area .

  • Build a portelet page:
  • Go to Build tab.
  • Choose create page group.
  • Give a page group name (no space ) and display name. Click create button.
  • You will now see this page group preview. Add portlet to any suitable region. Select your portlet provider, then choose all the portlets you want to display on your page. These will be listed under Selected Portlets. Click OK and you are done.

Creating portlets is not an easy task and many things can go wrong, so make sure all the required jar files are in right places, and turn off firewalls if necessary.

Aug 31, 2008

kate nash - the nicest thing

After a long time i got to hear such a true song with wonderful lyrics. Feels like Kate has just started the song and anyone who is listening to it will feel that she also has something more to add.

All I know is that, you’re so nice, you’re the nicest thing I’ve seen

I wish that we could give it a go ,See if we could be something

I wish I was your favourite girl

I wish you thought I was the reason you were in the world

I wish my smile was your favourite kind of smile

I wish the way that I dressed was your favourite kind of style

I wish you couldn’t figure me out

But you’d always wanna know, what I was about

I wish you’d hold my hand, when I was upset

I wish you’d never forget the look on my face,

When we first met

I wish you had a favourite beauty spot that you loved secretly,

cause it was on a hidden bit that nobody else could see

Basically I wish that you loved me

I wish that you needed me

I wish that you knew when I said two sugars, actually I meant three

I wish that without me, your heart would break

Yeah I wish that without me,

you’d be spending the rest of your night awake

I wish that without me you couldn’t eat

I wish I was the last thing on your mind

before you went to sleep

Look, all I know is that, you’re the nicest thing, I’ve ever seen

And I wish we could see if we could be something

Yeah I wish we could see if we could be something

Aug 30, 2008

Friends, my favourite series ever

it's the hilarious show ever, and not only on TV. actually the first time I watches it on tv, I was not that amazed, but when I got the DVDs I just became a fan at once.
may be the timing acted as a catalyst, as my final exam was going on and everything except study seems the most precious at that moment- after finishing every episode I told myself, okey, this is the last one, I will start preparing my lessons after that..and this way the whole night passed by.

but even now, when I have almost memorized all the dialogues, and the jokes became stale, I still like it. sometimes I get nostalgic remembering my friends while watching the episodes. the emotions and the ineractions between the characters depict something beyond humor and may be that's why it won hearts of people round the globe and still winning.

Aug 5, 2008

A Natural Log: Our Innate Sense of Numbers is Logarithmic, Not linear

To investigate which number-line concept is innate, neuroscientist Stanislas Dehaene of the College of France in Paris worked with the Mundurukú, an Amazonian culture with little exposure to modern math or measuring devices. The Mundurukú were immediately able to place numbers on a line when asked, but they grouped them logarithmically.

read more

Jul 23, 2008

Too poor, sick for pilgrimage? Email a prayer ...

Now you can pray via email...Greece's holiest pilgrimage site on the Aegean island of Tinos has launched an email service allowing those too poor or sick to visit in person to have their prayers read to its icon of the Virgin Mary."Those of you who are not in a position to visit the holy island of Tinos and pray to the icon, can write to us via email and we are happy to send you (free of charge) a blessing (an icon of the Virgin Mary, holy water etc)," the church said on its Web site

read more | digg story

Jul 17, 2008

Display RSS with CSS styling and XSL transformation

Modern browsers display RSS feed with their own styling and so far it is not possible to override the display format they use , but yet some browsers like internet explorer 6, does not use any custom style for displaying RSS feed, rather you will see the bunch of raw xml data on your page which is not at the least reader friendly.

So , to show feeds from our websites in a nice way with a better look and feel and surely with some branding ( like a logo with the feed list ), what we can do is to add CSS over it. But the problem is , if only CSS is used , the links are then not clickable, so you cannot go to the original news or article by clicking its title. Here comes the need for using XSL transformation. By using xslt, you can convert the raw xml file with feedlist to a nice looking page with custom design - this is how actually the browsers like firefox and IE7 do it.

Foe beginners , to learn about xslt:

Jul 11, 2008

Never give all the heart, for love will hardly seem worth thinking of...

For everything that's lovely is
But a brief, dreamy, kind of delight.
O never give the heart outright,
For they, for all the smooth lips can say,
Have given their hearts up to the play.
And who could play it well enough
If deaf and dumb and blind with love?
He that made this knows all the cost
For he gave all his heart and lost.

-- W. B. Yeats

Jul 8, 2008

Firefox 3 about:robots

Downloaded the new Firefox 3, type "about:robots" into the address bar and press Enter.
SURPRISE !!!!!!! :)

Jun 23, 2008

Does Time Run Backward in Other Universes ?

One of the most basic facts of life is that the future looks different from the past. But on a grand cosmological scale, they may look the same !

read more | digg story

Jun 20, 2008

Tutorial for Java3D

The Java 3D API enables the creation of three-dimensional graphics applications very easily. It also provides methods for manipulating 3D geometry and building the structures used in rendering that geometry. I found this tutorial( very helpful as I had previous experience with OpenGL , but I also think this can be a nice beginners' guide.

Jun 4, 2008

Nothing New About Singularity Fantasies

"In The Future of Man, a collection of essays published posthumously in 1959, the Jesuit philosopher Pierre Teilhard de Chardin speculates that our minds are becoming increasingly interconnected and will eventually fuse into a collective consciousness. This process will culminate in an “omega point,” when we shed our physical selves and converge with the divine consciousness."
Find out more on..

What "consciousness" actually is !

In spite of all advances, neuroscientists still do not understand at all how a brain (the squishy agglomeration of tissue and neurons) makes a conscious mind (the intangible entity that enables you to fall in love, find irony in a novel, and appreciate the elegance of a circuit design).
Even when we dream, we are virtually disconnected from the environment—we acknowledge almost nothing of what happens around us, and our muscles are largely paralyzed. Nevertheless, we are conscious.
Indeed, the more you learn about brains, the more you may wonder how the damn things work. And in fact, sometimes they don't. They succumb to schizophrenia, bipolar disorder, depression, Alzheimer's disease, and many other disorders that resist explanation and treatment.
Many neuroscientists do assume that, just as computers operate according to a machine code, the brain's performance must depend on a “neural code,” a set of rules or algorithms that transforms those spikes into perceptions, memories, meanings, sensations, and intentions. If such a neural code exists, however, neuroscientists still have no idea what that code is as our brains are extremely adaptive and can accumulate every single bit of possible information.

One type of such codes might be a temporal code, in which information is represented not just in a cell's rate of firing but also in the precise timing between spikes. For example, the spike sequences 010101 and 100011 have the same number of 0 and 1 bits. But a may have different meanings because the bit sequences are different. Such temporal coding would boost the brain's information-processing capacity close to the Shannon limit( the theoretical maximum that information theory allows for a given physical system).
Sometimes they involve the correlated firing of many neurons. In which our recognition of, say, an animal emerges from competition between large populations of neurons representing different memories: Dog? Cat? Rat? The brain quickly settles on the population that most closely matches the incoming stimulus.
In humans and animals, we know that the specific content of any conscious experience—the deep blue of an alpine sky, say, or the fragrance of jasmine redolent in the night air—is furnished by parts of the cerebral cortex, the outer layer of gray matter associated with thought, action, and other higher brain functions.
So can we now say that someday we will get the codes of consciousness and will make conscious machine by reverse engineering the brain ! Some scientists say that our level of consciousness has to do with how much integrated information we can generate. That's why we have a higher level of consciousness than a tree frog or a supercomputer.
Some of the most brilliant minds in human history have pondered consciousness, and after a few thousand years we still can't say for sure if it is an intangible phenomenon or maybe even a kind of substance different from matter. We know it arises in the brain, but we don't know how or where in the brain.

May 4, 2008

How we always see the past ...

This very idea freaked me out when I realized for the first time that we always see the past !
Like when I am looking at a star in the sky, it is totally possible that this star no longer exists.. the sky is displaying a snapshot taken in th past. If it's a star five lightyears away from earth, then I certainly am looking at a picture taken five years ago. Light travels at the rate of 30 million metres per second, so even if I am talking to the person sitting right before me, it takes more or less three nanoseconds for light to reach my eyes from that I cannot see his instant reaction untill I wait for more 3 nanosecs :)

Apr 22, 2008

Death of Digital Media

A storage device can become obsolete in less than two years
The media may survive, but will anyone be able to read them?
read more

Standardizing the Brain-Machine Interface

Earlier this year in a lab at Duke University, in Durham, N.C., a clever, raisin-gobbling ­monkey named Idoya made a robot move in Japan—just by thinking. And she wasn’t alone. She joined ranks with, among others, a ­paraplegic man who recently used his brain to move a cursor around a computer screen.

more on this...

Apr 6, 2008

To use SUN Certification Logo on your site

To use Sun Certification logo on your website legally, you need to accept the licence agreement: SUN MICROSYSTEMS, INC. SUN CERTIFIED PROFESSIONAL FOR JAVA TECHNOLOGY LOGO LICENSE CONTRACT. For this visit the page for logo request.
After reading and accepting the licence contract, you need to fill a form where you have to give your candidate ID number, which is actually the ID of your certification exam.
Then after one or two days you will get a mail from Sun as a reply to your request.If your request is approaved, then you will get a password and a link to download the logo.This link expires after 60 days.

Apr 4, 2008

Chronicles of Narnia:Prince Caspian

I was only four or five when Narnia-the TV series was being broadcasted on television, at that time we had only one tv channel in Bangladesh, but it was more than enough. What more a kid need from tv when Narnia or Thundercats is going on ! I still remember the day I missed an episode because of power failure and how long I cried ! My mom tried to make me sleep and I used to close my eyes pretending to be asleep and waiting for 3:30 every Friday.
After a long long time , the movie I am grown up enough and yet I believe I will stuck before the tv set if I see that series is going on. wish I can watch it again, but the DVD is not available here,my bad luck .The movie was good enough, but not geat as the tv show, but it's true that I am not that four-year-kid now, so taste can vary !
I am eagerly waiting for the second part Prince Caspian. It is to be released on May 15. I hope it will be more successful than the first episode. I still remember some scene from the tv series of Prince Caspian..the four siblings were waiting on a railway station,.., a gragon,..a ship..something like that. I am greatly excited to recap that memory twenty years !! What a great summer treat.
The four Pevensie children return to Narnia, only to discover that hundreds of years have passed since they ruled there, and the evil King Miraz has taken charge. With the help of a heroic mouse called Reepicheep, and the exiled heir to the throne, Prince Caspian, they set out to overthrow the King, once again with Aslan's help...I hope someday Silver Chair-the third part will also be released in the silver screen.

Mar 29, 2008

Lines Written in Early Spring

I heard a thousand blended notes,
While in a grove I sate reclined,
In that sweet mood when pleasant thoughts
Bring sad thoughts to the mind.

To her fair works did Nature link
The human soul that through me ran;
And much it grieved my heart to think
What man has made of man.

Through primrose tufts, in that green bower,
The periwinkle trailed its wreaths;
And ’tis my faith that every flower
Enjoys the air it breathes.

The birds around me hopped and played,
Their thoughts I cannot measure:--
But the least motion which they made
It seemed a thrill of pleasure.

The budding twigs spread out their fan,
To catch the breezy air;
And I must think, do all I can,
That there was pleasure there.

If this belief from heaven be sent,
If such be Nature’s holy plan,
Have I not reason to lament
What man has made of man?

William Wordsworth

Mar 28, 2008

SCJP : sun certified java programmer

who can be more reliable to give Java certification than Sun itself ! To become an SCJP : Sun Certified Java Programmer one need to appear on an exam and get at least 59% to pass it. The current exam format contains 72 questions, so at least 43 of them have to be answered correctly.
The exam code for Sun Certified Programmer for the Java Platform, Standard Edition 5.0 is 310-055.

This certification program tests the basic skill and concept of a Java programmer with tricky questions ! Maximum questions have multiple choice answers , 20-25% of are drag-n-drop format, that means one has to drag the options to the correct place.
To prepare for the exam , first we have to make up our mind ! Yes, if you are determined, half the work is done.
And for registration, have to purchase the exam voucher( price varies from 200 to 300 $) that contains a unique id for each examinee. This voucher expires within one year, so once you have bought the voucher, you should sit for the exam within this period unless you don't want to waste your money.
For preparation, the best reference book will be
SCJP Sun Certified Programmer for Java 5 Study Guide (Exam 310-055) by Kathy Sierra and Bert Bates.

There are loads of other helpful materials in the web and many forums who discuss about SCJP.
The certification tests on some special criteria, these are listed as the exam objectives. They are as follows:

  • Collections / Generics
  • Fundamentals
  • Declarations, Initialization and Scoping
  • Flow Control
  • API Contents
  • Concurrency: thread
  • OO Concepts
Question come from each of these objectives. I think if
someone is in short
of time preparing, he can have perfect
conception about at least 5 of the topics and seem through the others.
Total time of the exam is 3 and half an hour, so time is not a problem at all. But it won't be intelligent to make any rush. Take your time and prepare in relax mood :) This is the way I've done it. First I thought it would be very difficult because I was extremely busy with other stuff and had no time to practice !

You can go back and forth while answering, can also change the answer of any previously answered question. So this is quite flexible in comparison with other computer aided test.
After becoming a sun certified java programmer, anyone can use the certification
logo on his/her website or blog with the permission of Sun. Isn't it nice?
As this is an international certification and given none other than Sun itself, one can easily realize that it can be a boost into one's carrier and a nice thing to add on the CV.

Mar 23, 2008

Arthur C Clarke: science fiction turns to fact

Raymond Whitaker writes in THE INDEPENDENT on 23 March 2008 about visionary sci-fi author Arthur C. Clarke, "The futurologist, engineer and writer, who died last week aged 91, showed an uncanny ability to predict technological advances."

Five he got right:

1. Clarke was the first to suggest that satellites which remain at a fixed point relative to Earth could be used for worldwide communications. The geostationary orbit is now known as the "Clarke orbit".

2. The father of the internet, Sir Tim Berners-Lee credits Clarke's short story, Dial F for Frankenstein, as an inspiration.

3. In his novel Rendezvous With Rama, Clarke created "Project Spaceguard", a system to track asteroids that might collide with Earth. When such a system was set up in 1996, it was called "Spaceguard", in homage.

4. The space station, now under construction, was put on screen in 1968 by Clarke and Stanley Kubrick in 2001: A Space Odyssey.

5. In 1951 Clarke envisaged nuclear-powered spacecraft, a prediction that came true with several satellites, launched by the Soviet Union, which had small reactors on board.

read more | digg story

Bird Flu in Bangladesh

The avian influenza is generally known as bird flu and now this is a very familiar term in Bangladesh.Bangladesh has about 220 million chickens and 37 million ducks. Five million people are directly employed by the poultry industry, millions of households rely on poultry production for income generation and nutrition.After bird flu broke out in several farms in Bangladesh thousands of birds were culled and army troops called out to assist police in carrying out an “intensive” monitoring . But the confusion about the prevention still remains. Should we or should we not eat bird flesh now ? And also about eating eggs.
Most often, signs and symptoms of bird flu resemble those of conventional influenza, including:
  • Cough
  • Fever
  • Sore throat
  • Muscle aches
Three or four times every century, a flu pandemic sweeps the globe, claiming millions of lives. That the flu can cause so much misery is a result of its ability to change quickly and unexpectedly, to outwit "best guess" vaccines, and to take the immune system by storm.Young children seem especially vulnerable to the virus, although some experts note that children are more likely to have contact with sick birds or to play on ground contaminated with droppings.

Some suggestion from experts about preventing bird flu:
  • Steer clear of raw eggs. Because eggshells are often contaminated with bird droppings, avoid mayonnaise, hollandaise sauce, ice cream, and any other foods containing raw or undercooked eggs.
  • Wash well. While preparing poultry for cooking, carefully wash cutting boards and all surfaces that have come into contact with raw poultry in hot, soapy water. Wash your hands thoroughly before and after handling poultry and dry them with a disposable towel.
  • Cook thoroughly. Cook chicken until the juices run clear, and it reaches a minimum internal temperature of 165 F (74 C).
As our meals depend a great deal on poultry and the government just can't abandone the poultry industry of Bangladesh to stop spreading bird flu, we all have to be careful to prevent it from attacking our near and dear ones.

Writer Arthur C Clarke dies at 90

Legendary British science fiction writer Sir Arthur C Clarke has died in Sri Lanka at the age of 90.'British science fiction writer Sir Arthur C Clarke has died in his adopted home of Sri Lanka at the age of 90.The Somerset-born author achieved his greatest fame in 1968 when his short story The Sentinel was turned into the film 2001: A Space Odyssey.His visions of space travel and computing sparked the imagination of readers and scientists alike. Sir Arthur's detailed descriptions of space shuttles, super-computers and rapid communications systems inspired millions of readers.When asked why he never patented his idea for communication satellites, he said: "I did not get a patent because I never thought it will happen in my lifetime."

read more | digg story

Diseases spreading on season change

It's glorious spring, but it's also a transition of climate. Winter is passing by and summer is creeping in. This time of year is more vulnerable to diseases like jaundice and chicken pox. And students who are preparing for their SSC examination should be vary careful in this time.

Mar 13, 2008

My first Jamdani Sharee !!

This Friday I went to a river cruise on Sheetalakhya river with my colleagues to celebrate the successful completion of project "Template-kit" and "Simple publishing". We started from Demra ghat and after one hour we landed at Murapara where we got to visit a jamidar bari which is now converted to a college. It was the "palace" of jamidar ( lord ) Jogodish Banarjee and now called Rupgonj college. We also visited the nearby nursery and took a lot of pictures.
Then returned to the boat and headed towards the Jamdani Village. Many weaver-family live in this village and their family business is to make jamdani shari.

The Mughal emperors were patrons for jamdani industry . The earliest mention of jamdani and its development as an industry is found in Kautikaya (about 3rd century BC), where it is stated that this fine cloth was used in Bangla and Pundra. Dhaka, Sonargaon, Dhamrai, Titabari, Jangalbari and Bajitpur were famous for making superior quality jamdani and muslin at that time. Traders from Europe, Iran, Armenia, as well as Mughal-Pathan traders used to deal in these fabrics (source:banglapedia) . These villages are the ruins of that time bearing the heritage of that era. As we proceeded farther we could hear the sound of shuttle of jamdani making machine right from the time we stepped there.
After a while we visited one of such jamdani mill. I got to see the jamdani making process and one of the weavers told me that it takes several weeks to make one jamdani shari and no two sharis are of the same pattern.Each and every piece of shari is different from each other. Actually there are similarities , but I noticed that there is a subtle difference in the geometric pattern( Jamdani saris mainly contains floral or geometric motifs , the expert weavers work from memory, they do not draw the design on paper). Jamdani is the most expensive product of Dhaka looms since it requires the most lengthy and dedicated work. When I wanted to buy one, they asked for a very high price, more than twice the actual price . After a few minutes of bargaining I bought two sharis from there for half the price they asked and it was the first time I bought any sari myself . Actually it was the first time I bought any clothing material myself. Generally my mom buys these stuffs. I just make my choices and then the rest of the job is upon her. So I felt a bit " grown up " at that moment.

Feb 21, 2008

Russian novel

As a book-freak I always admire Russian literature, specially novel. One of my all time favorites is "How the steel was tempered", I can't pronounce its original Russian name though. I first read the Bangla translation which is titled as "Eeshpaat" that means 'steel ' in Bangla, published from Raduga publishers . I was searching for the english translation for long and at last I found it on this web site.

I was so mesmorized by this story that I almost fell in love with Pavel Korchagin (the central character of the novel ). The story is a fictionalized autobiography of the author Nikolai Ostrovsky.
As it depicts the period of Bolshevik movement, we can clearly understand that this book is not much available nowadays, not even in !

I also found many other books which I liked during my school days.
Now I am being a bit nostalgic finding them after such a long time !!

Feb 18, 2008

Escenic sponsors WALCOM 2008

Workshop on Algorithms and Computation - 2008.. held in BUET on February 7-8 was sponsored by three major software companies of Bangladesh and Escenic is one of them. We feel proud to be a part of the workshop and serve the professors from home and abroad.
The closing ceremony was held on Efes restaurant,Gulshan. Masud Hassan sir anchored the whole program . We got the opportunity to meet with his adviser Dr Alejandro Lopez who came from university of waterloo..he told us that he liked Bangladesh and going to buy a 'saree' as souvenir for his wife!
Although we had the fear to be attacked by bird flu virus it could not hold our boys back from eating a lot of chicken fries !!! The buffet dinner was not bad at all...and above all we got to meet our friends and teachers all under the same roof after a long time .

IEEE Women in Engineering Magazine

the first issue of ieee women in engineering magazine has been launched. though we cannot read it online yet, but we can download the pdf version free of cost through this link WIE.

as it says on its home page "The new WIE Magazine will disseminate information to help recruit, retain and foster the growth of women in engineering at all stages of their careers. We are seeking to profile exciting engineering careers and the people in these positions to show young engineers the unimaginable possibilities that engineering can bring."

hope it will be able to become a fine platform for women engineers to express their views and ideas.

Math on Display

Visualizations of mathematics create remarkable artwork

Julie J. Rehmeyer

"The Science News article covers selections from a recent exhibit, where over 40 artists gathered to show their work and the math behind it...."