Execution Cycle

New Day, New Ideas, Old Cycles

We all lives in our own cycles, everybody likes to live away from there cycles but only few can, We go on trips, hikes, we wear differently, make new friends, look for new projects, finally get in to some cycle most probably the old one. Just try to live in long cycles so your live won’t be boring. It doesn’t mean that small cycles are boring, ant cycle is great If you love what you are doing. But surely there is no of cycles that we can go through our loved thing without getting bored. So long cycles will help you in find your self interested in what your are doing for long time.
I personally stick in to a small cycle which is all about computer science and Engineering. In my personal blog you may see what I am going through, in my words “My Execution Cycle

Leave a comment

Posted by on July 15, 2011 in Life


Basic logic functions

Common functions

  • Comparison
  • Arithmetic
  • Code
  • Encored/decode
  • Data selection
  • Storage
  • Counting

When we are using these components, which are big (bigger than flip-flop) there is less flexibility.

However, using these components provide a quality assurance, where as when we are building with basic components all depend on the ability of the creator.





There are three kinds of counters

  1. Up Counters [counting from 0 to MAX again 0 to MAX]
  2. Down counters [counting from MAX to 0  again MAX to 0]
  3. Up-Down counters [counting 0 to MAX to 0 to MAX …]

These counters again divided in to two categories

  1. Sync
  2. A-sync

With the propagation delay output, do not change at once, as a example

0011 to 0100 happens in three steps

0011 -> 0010 -> 0000 -> 0100 two highlighted parts are not needed here. With these intermediate steps, we cannot use a-sync counters for high-speed operations (have to use sync). Nevertheless, these a-sync ones are easy to build.

Counters as frequency dividers

Data selection function


We can use a multiplexer with a counter to make a programmable frequency divider.



Leave a comment

Posted by on July 7, 2011 in Acadamic


3 Awesome Addons To Preview Image Thumbnails In FireFox

This post will hopefully make your web image searching and browsing even more fun: the three addons listed will let you easily zoom the image thumbnails in to quicker choose one from search results.

Let’s see how we can quickly preview thumbnails in search results, download any image in its original size and preview your contacts’ Facebook photos right from your dashboard:

Read the rest of this entry »

Leave a comment

Posted by on April 28, 2011 in Software, Technology


පිංතූර මායාව!

ඔයලා මේ පිංතූරෙ තියෙන කළු තිත දිහා බලගෙනම ඉන්න…
Progress bar එක ලෝඩ් වෙලා ඉවරවෙනවත් එක්කම ඔයලට බිත්තිවල පාට පෙනේවි.
හැබැයි කළු තිතෙන් ඇහැ ඉවත් කරල බැලුවොත් තේරෙයි මේක කළු-සුදු පිංතූරයක් කියලා!!! 

මට මුලින්ම හිතුනෙ මේක බොරුවක් කියලා. මම මෙක Flash වලින් open කලා . බලුවම වැඩෙ සිරා. Try it you self

1 Comment

Posted by on April 25, 2011 in Funny, Life


Happy Easter To Everyone

This slideshow requires JavaScript.

1 Comment

Posted by on April 24, 2011 in Entertainment


Reduce The Size Of A PDF File

reduce pdf file size

In my desperate search for ways to optimize PDF files, I’ve found that there aren’t many free options. Although there are a lot of shareware programs, there are also, thankfully, a few free programs can help you reduce a PDF file size.

Irfanview & GhostScript [Windows & Possibly Linux]

If you don’t have Irfanview, you should really consider downloading it. It’s a much better and lightning fast alternative to the default image viewer in Windows, supports countless plugins that allow it to be extremely versatile, and converts images to different file types. You can use it to add borders and watermarks to your photos, and batch process many images at a time. You can also view PDF files, provided you download GhostScript first.

Read the rest of this entry »

Leave a comment

Posted by on April 19, 2011 in How to..., tips


10 easy Tips – Be secure in Windows

1: Reduce the attack surface whenever possible

One of the first steps you should take when hardening a machine is to reduce its attack surface. The more code that’s running on a machine, the greater the chance that the code will be exploitable. You should therefore uninstall any unnecessary operating system components and applications.

2: Use only reputable applications

Given the current economic climate, it might be tempting to use freeware, deeply discounted, or open source applications. While I will be the first to admit that I use a handful of such applications in my own organization, it is critically important to do a little bit of research before adopting such an application. Some free or low cost applications are designed to serve ads to users; others are designed to steal personal information from users or track their Internet browsing habits.


3: Use a normal user account when you can

As a best practice, administrators should use normal user accounts when they can. If a malware infection occurs, the malware generally has the same rights as the person who is logged in. So of course that malware could be far more damaging if the person who is logged in has administrative permissions.

4: Create multiple Administrator accounts

In the previous section, I discussed the importance of using a regular user account whenever possible and using an Administrative account only when you need to perform an action that requires administrative permissions. However, this does not mean that you should be using the domain Administrator account.

If you have multiple administrators in your organization, you should create a personalized administrator account for each of them. That way, when an administrative action is performed, it is possible to tell who did it. For example, if you have an Administrator named John Doe, you should create two accounts for that user. One will be the normal account for day-to-day use, and the other will be an administrative account to be used only when necessary. The accounts might be named JohnDoe and Admin-JohnDoe.

5: Don’t go overboard with audit logging

Although it may be tempting to create audit policies that track every possible event, there is such a thing as too much of a good thing. When you perform excessive auditing, the audit logs grow to massive sizes. It can be nearly impossible to find the log entries you’re looking for. Rather than audit every possible event, it is better to focus on auditing only the events that matter the most.

6: Make use of local security policies

Using Active Directory based group policy settings does not nullify the need for local security policy settings. Remember that group policy settings are enforced only if someone logs in using a domain account. They do nothing if someone logs into a machine using a local account. Local security policies can help to protect your machines against local account usage.

7: Review your firewall configuration

You should use a firewall at the network perimeter and on each machine on your network, but that alone isn’t enough. You should also review your firewall’s port exceptions list to ensure that only the essential ports are open.

A lot of emphasis is typically placed on the ports that are used by the Windows operating system, but you should also be on the lookout for any firewall rules that open ports 1433 and 1434. These ports are used for monitoring and remotely connecting to SQL server and have become a favorite target for hackers.

8: Practice isolation of services

Whenever possible, you should configure your servers so that they perform one specific task. That way, if a server is compromised, the hacker will gain access to only a specific set of services. I realize that financial constraints often force organizations to run multiple roles on their servers. In these types of situations, you may be able to improve security without increasing costs by using virtualization. In certain virtualized environments, Microsoft allows you to deploy multiple virtual machines running Windows Server 2008 R2 for the cost of a single server license.

9: Apply security patches in a timely manner

You should always test patches before applying them to your production servers. However, some organizations really go overboard with the testing process. While I certainly do not deny the importance of ensuring server stability, you have to balance the need for adequate testing with the need for adequate security.

When Microsoft releases a security patch, the patch is designed to address a well-documented vulnerability. This means that hackers already know about the vulnerability and will be specifically looking for deployments in which the patch that corrects that vulnerability has not yet been applied.

10: Make use of the Security Configuration Wizard

The Security Configuration Wizard allows you to create XML-based security policies, which can then be applied to your servers. These policies can be used to enable services, configure settings, and set firewall rules. Keep in mind that the policies created by the Security Configuration Wizard are different from security templates (which use .INF files) Furthermore, you can’t use group policies to deploy Security Configuration Wizard policies.

Leave a comment

Posted by on April 12, 2011 in Entertainment