Last Post (tutorial 01) was on Android Software Stack and Terminology[1]. This post will for beginner on Android applications, This post will teach you fast mobile application development from Android Developer Tools (ADT) are based on the Eclipse IDE. 1. Start ADT and then go file—> new –> Android Applications Project 2. Follow the wizard with give project name (other ...
Android system software full stack Android system software stack is typically divided into the four areas as following graphic Terminology Android Software Development Kit (Android SDK) contains the necessary tools to create, compile and package Android applications Android debug bridge (adb), which is a tool that allows you to connect to a virtual or real Android device Google provides two ...
This post is summary of the “Anomaly Detection : A Survey”. Anomaly detection refers to the problem of finding patterns in data that do not conform to expected behavior. These non-conforming patterns are often referred to as anomalies, outliers, discordant observations, exceptions, aberrations, surprises, peculiarities or contaminants in different application domains. Anomalies are patterns in data that do not conform ...
Post describes how to set up your development environment and Android-powered device for testing and debugging on the device. I am using windows 8 for this post and device is GT-S7582 1. Enable USB debugging on your device.On Android 3.2 or older, you can find the option under Settings > Applications > DevelopmentOn Android 4.0 and newer, it's in Settings ...
This post look on how applications components typically interact. Event-based programming, also called event-driven architecture (EDA) is an architectural style in which one or more components in a software system execute in response to receiving one or more event notifications. 1. Request-response interactions Client formulate a request, It is sent across the internet to a web server. Client wait while ...
Today we can find number of styles of event processing languages in used. Rule-oriented languages that use production rules Rule-oriented languages that use active rules Rule-oriented languages that use logic rules Imperative programming languages Stream-oriented languages that are extensions of SQL Other stream-oriented languages Now we will categorized existing CEP products or engines in to above list Language style Language ...
1. Open data file (supermarket) 2. In our data we can find 217 attribute and 4,627 Instance means transactions. 3. Here I am investigate data with Weka view There is no much mean of department attribute since we looking items that is purchased. As you can see, it is big data set; 4627 * 217 = It is big data ...
Last week post was on 'Major Areas of Event Processing' and this post will continue which was there. This post describe the concepts be hide event processing and it can be consider as entry point for event processing concepts. Event What is event? An event is an occurrence within a particular system or domain; it is something that has happened, ...
Download wso2 CEP version that you need to try out. http://wso2.com/more-downloads/complex-event-processor/Here I will be using wso2cep-3.1.0 CEP sample one 0001 This sample demonstrates how to filter incoming event attributes and add them to another stream using simple pass-through with WSO2Event adaptor. There is no Siddhi query. It is simple pass through. 1. Start CEP with sample by command of ‘wso2cep-samples.bat ...
In this post will give introduction to Markov models and Hidden Markov models as mathematical abstractions, with some examples. In probability theory, a Markov model is a stochastic model that assumes the Markov property. A stochastic model models a process where the state depends on previous states in a non-deterministic way. A stochastic process has the Markov property if the ...
This post will look on how event processing was changing over the time. In there we can find four major areas of event processing. 'Event' concepts can be found in old operating systems of the late 1950’s. But not the event processing Here is four major area[4] Discrete event simulation Computer networks Active databases Middleware Discrete event Event Processing began ...
The Hype Cycle is a branded graphical representation tool [1] developed and used by IT research and advisory firm Gartner for representing the maturity, adoption and social application of specific technologies and how they are potentially relevant to solving real business problems and exploiting new opportunities. It gives a view of how a technology or application will evolve over time. ...
City of Babel is recorded in Genesis[1], Everyone on earth spoke the same language. As people migrated from the east, they settled in the land of Shinar(Mesopotamia). People there attempt to make bricks and build a city and a tower with its top in the sky, so that they not be scattered over the world. God came down to ...
Machine learning is sub set of artificial intelligence and it is study of systems that can learn from data. A machine learning system could be trained. Core of machine learning deals with representation and generalization. Machine learning is a "Field of study that gives computers the ability to learn without being explicitly programmed". A core objective of a learner is ...
Here I am connecting IBM DB2 database Looking our privileges. Filtering user/group level Via our client [NOTE] Following statement retrieves all authorization names with privileges.SELECT DISTINCT GRANTEE, GRANTEETYPE, 'DATABASE' FROM SYSCAT.DBAUTH UNION SELECT DISTINCT GRANTEE, GRANTEETYPE, 'TABLE ' FROM SYSCAT.TABAUTH UNION SELECT DISTINCT GRANTEE, GRANTEETYPE, 'PACKAGE ' FROM SYSCAT.PACKAGEAUTH UNION SELECT DISTINCT GRANTEE, GRANTEETYPE, 'INDEX ' FROM SYSCAT.INDEXAUTH UNION SELECT ...
IBM DB2 is a family of database server products developed by IBM. Here I was connecting DB2 and WSO2 products. Here I am show creating user and granting privilages for DB2 user. Here I have two user one is 'madhuka' and and second user is 'db2test1'. Madhuka have all the right (admin). db2test1 is standard user. I have db2 database ...
This really powerful feature and it work properly and nicely in Gmail As some one try to access my gamil account and gmail event track notice it as unusual activity and block it. And it send me sms same time It is realy time event monitor and it have block that use by accessing my my gmail Then I login ...
1. Build mutual-ssl-authenticator soruce code on here. https://svn.wso2.org/repos/wso2/carbon/platform/branches/turing/components/authenticators/mutual-ssl-authenticator/4.2.0/ 2. Build jar put it ‘wso2is-4.7.0\repository\components\dropins’ 3. Open ‘wso2is-4.7.0\repository\conf\tomcat\catelina-server.xml’ file and set clientAuth=”true” to make server to (always) expect two-way SSL authentication. 4. Extract WSO2 public certificate from <IS_Home>/repository/resources/security/wso2carbon.jks and add it
Identity Server can be configured to lock a user when configurable number of login attempts are exceeded or via unlockUserAccount service. UnlockUserAccount service in https://localhost:9443/services/UserIdentityManagementAdminService?wsdl. Configuring lock time in the identity-mgt.properties file (this can be specified using the Authentication.Policy.Account.Lock.Time parameter). Now we can try this Out. 1. Update below parameters wso2is-4.6.0\repository\conf\security\identity-mgt.properties 2. Identity.Li
What is Helix? It used for the automatic management of partitioned, replicated and distributed resources hosted on a cluster of nodes. Helix automates reassignment of resources in the face of node failure and recovery, cluster expansion, and reconfiguration. Modeling a distributed system as a state machine with constraints on states and transitions. Terminologies Node : A single machine Cluster: Set ...