Handoff in Mobile Connections

George John
Updated on 30-Jul-2019 22:30:23

45K+ Views

Definition In cellular communications, the handoff is the process of transferring an active call or data session from one cell in a cellular network or from one channel to another. In satellite communications, it is the process of transferring control from one earth station to another. Handoff is necessary for preventing loss of interruption of service to a caller or a data session user. Handoff is also called handover. Situations for triggering Handoff Handoffs are triggered in any of the following situations − If a subscriber who is in a call or a data session moves out of ... Read More

OrderedDict in Python

karthikeya Boyini
Updated on 30-Jul-2019 22:30:23

3K+ Views

The OrderedDict is a subclass of dict object in Python. The only difference between OrderedDict and dict is that, in OrderedDict, it maintains the orders of keys as inserted. In the dict, the ordering may or may not be happen. The OrderedDict is a standard library class, which is located in the collections module. To use it at first we need to import it the collections standard library module. import collections In this section we will see some operations on OrderedDictand difference between OrderedDict and Dict. We can put some keys and values in the Dict and OrderedDict. ... Read More

Using cx_Freeze in Python

karthikeya Boyini
Updated on 30-Jul-2019 22:30:23

1K+ Views

Sometimes we feel to create something different which is very exciting, and according to human nature, we always love to share it. Python also fulfills those wishes. Using Python, if we want to share our Python program with our friends we can do that, only need to have the same version of Python installed with all the modules those are used in program of their machine. First we need to install CX_Freeze module using pip install CX_Frezze command in command prompt. First step is to solve this assignment, a python program conversion. We need standard library modules, here we ... Read More

Is the Primary Key Automatically Indexed in MySQL

Ankith Reddy
Updated on 30-Jul-2019 22:30:23

2K+ Views

Yes, primary key is automatically indexed in MySQL because primary key, index, etc gets stored into B-trees. All engines including InnoDB as well as MyISAM automatically supports the primary key to be indexed. The primary key is implicitly indexed in InnoDB, MyISAM, and other engines. Let us create a table with primary key − mysql> create table DemoIndex -> ( -> Id int not null, -> primary key(Id) -> ); Query OK, 0 rows affected (1.21 sec) In the above table, Id is implicitly indexed.

Advantages of Using MySQLi Over MySQL

Ankith Reddy
Updated on 30-Jul-2019 22:30:23

3K+ Views

MySQLi is also known as MySQL improved Extension. It is a relational SQL database management system. It is often used inside PHP to provide an interface with the MySQL databases. Some of the reasons why MySQLi is famous are given below − MySQLi uses the standard form of the SQL language. MySQLi is free as it is released under an open source license. MySQLi can be easily used with PHP which is the most famous language for web development. MySQLi is a very powerful language and it can handle the functionality of powerful database packages. MySQLi can work with ... Read More

Create a Website Alarm Using Python

Samual Sam
Updated on 30-Jul-2019 22:30:23

490 Views

In this section we will see how to create the website alarm system using Python. Problem Statement Open a website URL on the browser by taking a website URL and time. When the system time reaches the specified time, the webpage will be opened. We can store different web pages in our bookmark sections. Sometimes we need to open some web pages every day on a specific time to do some work. For that purpose, we can set this type of website alarm to do the work. In this case we are using some standard library modules like sys, web ... Read More

Use Function for Default Value in MySQL

Chandu yadav
Updated on 30-Jul-2019 22:30:23

1K+ Views

We cannot use a function for default value in MySQL, but we can use triggers. Let us see an example. First, we will create a table. The CREATE command is used to create a table. mysql> CREATE table TbLFunctionTrigger - > ( - > id int, - > username varchar(100) - > ); Query OK, 0 rows affected (0.55 sec) The following is the syntax to create a trigger and include a default value. CREATE TRIGGER anyName BEFORE INSERT ON yourTableName FOR EACH ROW ... Read More

Fiber to the Home

Ankith Reddy
Updated on 30-Jul-2019 22:30:23

501 Views

Definition Fiber to the home (FTTH) is a technology to deploy optical fibers in the local loop of the telephone networks to the users’ home for providing high-speed data connectivity. It replaces the existing copper wires as telephone lines to the customer premises by optical fibers that allow much greater bandwidth and less noisy connectivity. FTTH Council The FTTH Council is a non-profit organization to provide advanced FTTH solutions. Its members comprise of manufacturers, organizations and municipalities who build and install equipments for FTTH systems. The purpose of the Council is to share knowledge and build industry consensus on FTTH. ... Read More

Decimal Functions in Python

karthikeya Boyini
Updated on 30-Jul-2019 22:30:23

13K+ Views

In Python, there is a module called Decimal, which is used to do some decimal floating point related tasks. This module provides correctly-rounded floating point arithmetic. To use it at first we need to import it the Decimal standard library module. import decimal In this section we will see some important functions of the Decimal module. The square root function sqrt() and Exponent function exp() The sqrt() method is used to calculate the square root of a given decimal type object. And the exp() method returns the e^x value for the given x as Decimal number. Example Code ... Read More

Morse Code Translator in Python

Samual Sam
Updated on 30-Jul-2019 22:30:23

3K+ Views

Morse Code Translator is used in Cryptography. It is named by Samuel F. B. Morse. By this technique we convert a message to a series of dots, commas, "-", "/". This technique is very simple. Every alphabet in English signifies a series of ".", ", ", "/", "-". We just encrypt the message from message to symbols and decrypt from symbols to English. The dictionary is given below 'A':'.-', 'B':'-...', 'C':'-.-.', 'D':'-..', 'E':'.', 'F':'..-.', 'G':'--.', 'H':'....', 'I':'..', 'J':'.---', 'K':'-.-', 'L':'.-..', 'M':'--', 'N':'-.', 'O':'---', 'P':'.--.', 'Q':'--.-', 'R':'.-.', 'S':'...', 'T':'-', 'U':'..-', 'V':'...-', 'W':'.--', 'X':'-..-', 'Y':'-.--', 'Z':'--..', '1':'.----', '2':'..---', '3':'...--', '4':'....-', '5':'.....', ... Read More

Advertisements