Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Computer Engineering

How To Build An Rss Feed Using Asp, Umakant Mishra Jun 2013

How To Build An Rss Feed Using Asp, Umakant Mishra

Umakant Mishra

RSS is a XML based format. The Current popular version of RSS is RSS version 2.0. The purpose of adding an RSS feed to your site is to show if anything new is added to the site. For example, if a new article or blog or news item is added to your site that should automatically appear in the RSS feed so that the visitors/ RSS readers will automatically get updated about this new addition. The RSS feed is also called RSS channel.

There are two main elements of the RSS XML file, one is the header or channel element …


Solving Problems Of Virus Definition Files - A Triz Perspective, Umakant Mishra Dec 2011

Solving Problems Of Virus Definition Files - A Triz Perspective, Umakant Mishra

Umakant Mishra

Signature scanning is the most popular method of virus scanning and is adopted by all anti-virus programs. Signature scanning is capable of detecting more than 80% of viruses. It uses a simple logic and uses less memory and system resources. Although it has a lot of advantages, it has one big disadvantage. It requires the virus signature to be extracted by the experts and stored in a database called “virus signature database”. This virus signature database has to be updated by the anti-virus developers and the end users periodically in order to deal with the latest viruses.

A typical virus …


Inventions On Ldap Data Storage- A Study Based On Us Patents, Umakant Mishra Aug 2006

Inventions On Ldap Data Storage- A Study Based On Us Patents, Umakant Mishra

Umakant Mishra

Lightweight Directory Access Protocol (LDAP) is an IETF open standard to provide directory services in the network. LDAP was initially developed at the University of Michigan with an objective to include most of the features of X.500 directory structure, while eliminating the burdens and difficulties of the same.

As LDAP does not provide any specification on the data storage, different venders can implement different mechanism for data storage as found suitable to the specific vender or environment. Although underlying data storage system between different LDAP servers can differ, this disparity does not affect the functionality or interaction of LDAP clients. …


Inventions On Ldap Security- A Triz Based Analysis, Umakant Mishra Jul 2006

Inventions On Ldap Security- A Triz Based Analysis, Umakant Mishra

Umakant Mishra

The specifications of LDAP v.3 provide facilities for simple authentication using a cleartext password as well as any SASL mechanism.SASL allows for integrity and privacy services to be negotiated (RFC 2251, www.ietf.org/rfc/rfc2251.txt). Use of cleartext password is strongly discouraged where the underlying transport service cannot guarantee confidentiality and may result in disclosure of the password to unauthorized parties. The protocol allows other security mechanisms like SASL to be implemented in LDAP. The protocol also permits that the server can return its credentials to the client, if it chooses to do so. This article is a TRIZ based study on patents …


Inventions On Ldap- A Study Based On Us Patents, Umakant Mishra Jun 2006

Inventions On Ldap- A Study Based On Us Patents, Umakant Mishra

Umakant Mishra

Lightweight Directory Access Protocol (LDAP) is an IETF open standard to provide directory services in the network. LDAP is based on X.500 directory architecture, intended to provide directory services in Internet compatible environments. LDAP is used to provide directory services to applications ranging from e-mail systems to distributed system management tools. LDAP is becoming more and more popular with its wider usage in the Internet.

This report on LDAP is based on a study of 60 selected patents on LDAP from US patent database. The objective of this article is to present the distribution of patents according to different features …


Using Triz To Design The Future Keyboard, Umakant Mishra Feb 2006

Using Triz To Design The Future Keyboard, Umakant Mishra

Umakant Mishra

A keyboard is the most common and widely used input device for a computer. Using the keyboard is often vital to interact with a computer. There are several aspects of a keyboard such as size, key layout, convenience and ergonomic features etc., which are continuously under improvement by keyboard designers and manufacturers. TRIZ is an efficient methodology in product designing. Using IFR and Trends we can well predict the directions of the future keyboards and using Contradictions and Principles we can overcome the current limitations. This article analyses the critical features of a keyboard, does a functional analysis, derives the …


Inventions On Drag And Drop In Gui, Umakant Mishra Nov 2005

Inventions On Drag And Drop In Gui, Umakant Mishra

Umakant Mishra

Drag and drop operation is one of the key capabilities of any Graphical User Interface. The user can do quite complex operations simply by visually dragging and dropping objects from one location to another. It saves user from remembering and typing a lot of commands. The result of a drag and drop operation may vary depending the type of source object and type of destination object. For example dragging a file and dropping on a folder may copy or move the file to the destination folder, dropping that file to a remote ftp location may upload that file using internet, …


Inventions On Using Sound And Speech In Gui, Umakant Mishra Oct 2005

Inventions On Using Sound And Speech In Gui, Umakant Mishra

Umakant Mishra

Voice recognition facilitates a human interaction with the machine. VR may be used to replace the manual task of pushing buttons on a wireless telephone keypad. This is particularly useful when the hands of the user are busy with other activities like driving a car.

However, the VRS system has several limitations. The VRS requires lot of training and customization in order to be effectively used by individual users as each individual falls into different voice patterns. Besides the voice interface is complex and is not as reliable as the keyboard or mouse. This article illustrates some interesting inventions on …


Inventions On Gui For Eye Cursor Controls Systems, Umakant Mishra Sep 2005

Inventions On Gui For Eye Cursor Controls Systems, Umakant Mishra

Umakant Mishra

Operating a GUI through eyeball is a complex mechanism and not used as often as mouse or trackball. But there are situations where eye-mouse devices can play a tremendous role especially where the hands of the user are not available or busy to perform other activities. The difficulties of implementing an eye-cursor control system are many. The article illustrates some inventions on eye-cursor control system, which attempt to eliminate the difficulties of the prior art mechanisms.


Keyboards For Inputting Japanese Language: A Study Based On Us Patents, Umakant Mishra Mar 2005

Keyboards For Inputting Japanese Language: A Study Based On Us Patents, Umakant Mishra

Umakant Mishra

The most commonly used Japanese alphabets are Kanji, Hiragana and Katakana. The Kanji alphabet includes pictographs or ideographic characters that were adopted from the Chinese alphabet. Hiragana is used to spell words of Japanese origin, while Katakana is used to spell words of western or other foreign origin.

Two methods are commonly used to input Japanese to the computer. One, the “kana input method” that uses a keyboard having 46 Japanese iroha (or kana) letter keys. The other method is “Roma-ji input method”, where the Japanese letters are composed of English input from a standard QWERTY keyboard. Both the methods …


10 Inventions On Reducing Keyboard Size, Umakant Mishra Feb 2005

10 Inventions On Reducing Keyboard Size, Umakant Mishra

Umakant Mishra

A conventional computer keyboard consists of as many as 101 keys. The keyboard has several sections, such as text entry section, navigation section, and numeric keypad etc. and each having several keys on the keyboard. The size of the keyboard is a major inconvenience for portable computers, as they cannot be carried easily. Thus there are certain circumstances which compels to reduce the size of a keyboard. Reducing the size of a keyboard leads to several problems. A reduced size keyboard may not contain all the keys available on a full size keyboard; a reduced size keyboard may not be …


10 Inventions On Keyboard Attachments: A Triz Based Analysis, Umakant Mishra Dec 2004

10 Inventions On Keyboard Attachments: A Triz Based Analysis, Umakant Mishra

Umakant Mishra

Although the primary objective of the keyboard to input data into the computer, the advanced keyboards keep various other things in mind, such as, how to use the same keyboard for various other purposes, or how to use the same keyboard efficiently by using various other attachments to the keyboard. This objective led to various inventions on keyboard attachments, some of which are illustrated below in this article. This article illustrates 10 inventions on various keyboard attachments from US patent database. Each different attachment improves the usability of the keyboard in some way or other. Some attachments illustrated are template …