Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

Topics - mnsalim

Pages: [1] 2 3
Videos / TV series to watch next
« on: March 09, 2020, 07:38:42 PM »
These are the TV series I have listed to watch next when I will have time. Your suggestions are welcome.

  • Band of Brothers (2001): “The story of Easy Company of the U.S. Army 101st Airborne Division, and their mission in World War II Europe, from Operation Overlord, through V-J Day.”
    IMDB Rating: 9.5
    Genre: Action, Drama, History
    Seasons: 1 (10 * 1hr = 10 hr)
    Stars: Scott Grimes, Damian Lewis, Ron Livingston
  • The Wire (2002-2008): “Baltimore drug scene, seen through the eyes of drug dealers and law enforcement.”
    IMDB Rating: 9.3
    Genre: Crime, Drama, Thriller
    Seasons: 5   4   3   2   1  (13 + 12 + 12 + 13 + 10 = 60 * 1hr = 60 hour)
    Creator: David Simon
    Stars: Dominic West, Lance Reddick, Sonja Sohn
  • Firefly (2002): “Five hundred years in the future, a renegade crew aboard a small spacecraft tries to survive as they travel the unknown parts of the galaxy and evade warring factions as well as authority agents out to get them.”
    IMDB Rating: 9.1
    Genre: Adventure, Drama, Sci-Fi
    Seasons: 1 (14* 50 min = 12 hour)
    Creator: Joss Whedon
    Stars: Nathan Fillion, Gina Torres, Alan Tudyk
  • Fullmetal Alchemist: Brotherhood (2009); ‘Two brothers search for a Philosopher’s Stone after an attempt to revive their deceased mother goes awry and leaves them in damaged physical forms.”
    IMDB Rating: 9.1
    Genre:  Animation, Action, Adventure
    Seasons: 1 (64* 30 min = 32 hour)
  • Stranger Things (2016– )
    IMDB Rating: 8.9
    Genre: Drama, Fantasy, Horror
    Seasons: 3   2   1 (8+ 9+ = 17
    Creators: Matt Duffer, Ross Duffer
    Stars: Millie Bobby Brown, Finn Wolfhard, Winona Ryder
  • Westworld (2016)
    IMDB Rating: 8.9
    Genre: Drama, Mystery, Sci-Fi
    Seasons: 2 1 (10*1HR = 10 HR)
  • The X-Files (1993): “Two FBI agents, Fox Mulder the believer and Dana Scully the skeptic, investigate the strange and unexplained, while hidden forces work to impede their efforts.”
    IMDB Rating: 8.7
    Genre: Drama, Mystery, Sci-Fi
    Seasons: 11   10   9   8   7   6   5   4   3 2 1 ( = 217* 50 MIN = 217 hour)
    Creator: Chris Carter
    Stars: David Duchovny, Gillian Anderson, Mitch Pileggi
  • Arrested Development (2003): “Level-headed son Michael Bluth takes over family affairs after his father is imprisoned. But the rest of his spoiled, dysfunctional family are making his job unbearable.”
    IMDB Rating: 8.9
    Seasons: 5   4   3   2   1  ( 85 * 25 min = 42 hour)
    Creator: Mitchell Hurwitz
    Stars: Jason Bateman, Michael Cera, Portia de Rossi
  • Silicon Valley (2014– )
    IMDB Rating: 8.6
    Seasons: 5   4   3   2   1 (48 * 30 min = 24 hour)
    Creators: John Altschuler, Mike Judge, Dave Krinsky
    Stars: Thomas Middleditch, T.J. Miller, Josh Brener
  • The Office (2005–2013): “A mockumentary on a group of typical office workers, where the workday consists of ego clashes, inappropriate behavior, and tedium”
    IMDB Rating: 8.8
    Genre: Comedy
    Seasons: 9   8   7   6   5   4   3   2   1 (188 * 0.5hr = 94 hr)
    Creators: Greg Daniels, Ricky Gervais, Stephen Merchant
    Stars: Steve Carell, Jenna Fischer, John Krasinski
  • Spaced (1999–2001): “Friends Tim and Daisy, 20-something North Londoners with uncertain futures, must pretend to be a couple to live in the only apartment they can afford.”
    IMDB Rating: 8.6
    Genre:Action, Comedy
    Seasons: 2   1  (7+7 = 14* 25 min = 7  hour)
  • Seinfeld (1989–1998) :”The continuing misadventures of neurotic New York City stand-up comedian Jerry Seinfeld and his equally neurotic New York City friends.”
    IMDB Rating: 8.9
    Genre: Comedy
    Seasons: 9   8   7   6   5   4   3   2   1  (173 * 22 min = 86 hour)
  • Lost (2004–2010): “The survivors of a plane crash are forced to work together in order to survive on a seemingly deserted tropical island”
    IMDB Rating: 9.5
    Genre: Adventure, Drama, Fantasy
    Seasons: 6   5   4   3   2   1  (118* 50 min = 118 hour)
    Creators: J.J. Abrams, Jeffrey Lieber, Damon Lindelof
    Stars: Jorge Garcia, Josh Holloway, Yunjin Kim

Videos / Documentary to watch
« on: March 09, 2020, 07:33:56 PM »
If you are a documentary lover you should watch the following documentary.

  • Planet Earth (2006) + Planet Earth II (2016): “Emmy Award-winning, 11 episodes, five years in the making, the most expensive nature documentary series ever commissioned by the BBC, and the first to be filmed in high definition. Each 50 minute episode features a global overview of a different biome or habitat on Earth (Polar, Mountain, Cave, Desert, Plains, Fresh Water, Seas, Ocean, Forest), followed by a ten-minute featurette which takes a behind-the-scenes look at the challenges of filming the episode”
    IMDB Rating: 9.5
    Genre: Documentary
    Seasons: 1  +  1  (11 + 6 = 17 * 1 hour = 17 hour)
  • Blue Planet II (2017) + The Blue Planet (2001) + Frozen Planet (2011): “David Attenborough returns to the world’s oceans in this sequel to the acclaimed documentary filming rare and unusual creatures of the deep, as well as documenting the problems our oceans face”
    IMDB Rating: 9.5
    Genre: Documentary
    Seasons: 1 (8 +10* 1hr = 18 hr  + 8* 0.5hr =  5 hour)
    Stars: David Attenborough, Peter Drost, Roger Munns
  • Life (2009): “David Attenborough’s legendary BBC crew explains and shows wildlife all over planet earth in 10 episodes”
    IMDB Rating: 9.5
    Genre: Documentary
    Seasons:1 (10* 1hr = 10 hr)
    Stars: David Attenborough, Oprah Winfrey, Doug Allan
  • Human Planet (2011)
    IMDB Rating: 9.5
    Genre: Documentary
    Seasons: 1 (8 * 1hr = 8 hr)
    Stars: John Hurt, Roger Munns
    Cosmos: A Spacetime Odyssey (2014 – ): “An exploration of our discovery of the laws of nature and coordinates in space and time”
    IMDB Rating: 9.3
    Genre: Documentary
    Seasons: 2   1 (13 * 50 min = 10 hour)
    Stars:Neil deGrasse Tyson, Stoney Emshwiller, Piotr Michael

Videos / About Breaking Bad (2008): a tv series
« on: March 09, 2020, 07:29:39 PM »
Breaking Bad (2008): “A high school chemistry teacher diagnosed with inoperable lung cancer turns to manufacturing and selling methamphetamine in order to secure his family’s future.” Details of Breaking bad are:

  • IMDB Rating: 9.5
  • Genere:Crime, Drama, Thriller
  • Seasons: 5   4   3   2   1  (16+13+13+13+7 = 62 * 50 min = 52 hours)
  • Creator: Vince Gilligan
  • Stars: Bryan Cranston, Aaron Paul, Anna Gunn

Videos / About Big Bang Theory
« on: March 09, 2020, 07:28:10 PM »
The Big Bang Theory (2007–): “A woman who moves into an apartment across the hall from two brilliant but socially awkward physicists shows them how little they know about life outside of the laboratory.”

  • IMDB Rating: 8.3
  • Genere: Comedy, Romance
  • Seasons: 12   11   10   9   8   7   6   5   4  3  2  1
  • Creators: Chuck Lorre, Bill Prady
  • Stars: Johnny Galecki, Jim Parsons, Kaley Cuoco

Any comments on the BBT are welcome.

Videos / Sherlock: detective TV series
« on: March 09, 2020, 07:26:23 PM »
Sherlock (2010) (9.1) is the most amazing detective show. ” A modern update finds the famous sleuth and his doctor partner solving crime in 21st century London”. Information about sherlock are:
  • IMDB rating: 9.1
  • Genre: Crime, Drama, Mystery
  • Seasons: 4   3   2   1
  • Creators: Mark Gatiss, Steven Moffat
  • Stars: Benedict Cumberbatch, Martin Freeman, Una Stubbs

Videos / Information about Friends: a sitcom
« on: March 09, 2020, 07:24:58 PM »
Friends (1994) is a SITCOM with an IMDB rating of 8.9. Amazing sitcom ( “situation comedy”) I have ever seen. “Follows the personal and professional lives of six 20 to 30-something-year-old friends living in Manhattan.”Information about Friends:
  • IMDB Rating: 8.9
  • Genre: Comedy, Romance
  • Seasons: 10   9   8   7   6   5   4   3   2   1
  • Creators: David Crane, Marta Kauffman
  • Stars: Jennifer Aniston, Courteney Cox, Lisa Kudrow

Videos / About Game of Thrones
« on: March 09, 2020, 07:23:16 PM »
Game of Thrones (2011) is a TV series that has an IMBDB ranking of 9.5. You will fall in love with this series if you love suspense, romance, and politics. The politics & behind the scene of a THRONE is depicted in this series. “Nine noble families fight for control over the mythical lands of Westeros, while an ancient enemy returns after being dormant for thousands of years.”Information about GOT are:
  • Most number of ratings in IMDB
  • IMDB rating: 9.5
  • Genre: Action, Adventure, Drama
  • Seasons: 8   7   6   5   4   3   2   1
  • Also Known As “A Song of Ice and Fire”
  • Creators: David Benioff, D.B. Weiss
  • Stars: Emilia Clarke, Peter Dinklage, Kit Harington

Internet / How to manipulate Image in Python Programming Language
« on: April 13, 2019, 02:34:11 AM »
To manipulate Image in Python you need to have OpenCV. Using openCV for python you can read an image, display an image and change that. You will find the tutorials on how to install OpenCV in the below links:

After installing openCV. You have to run the following command to read and display an image using python:

Run command promt using windows+r
write cmd there and command promt will start
then type the followings:
import cv2
img = cv2.imread('image name with full path')
cv2.imshow('name', img)

That's all to display an image in a window named name :D


Latex is a powerful tool to write professional looking documents especially your research article. It is based on the WYSIWYM (what you see is what you mean) idea, meaning you only have focused on the contents of your document and the computer will take care of the formatting.



Teaching & Research Forum / Section/Group Creation in Moodle
« on: September 18, 2018, 06:43:21 PM »
Here is how you can create sections under a course:
From the left side panel on your dashboard go to

Menu-> My Courses -> Select your course->
Then go to

Participants -> Click on right side settings icon -> Groups -> In the bottom create groups.

You can create groups in two way: manually or automatic

If you face any problem then let me know.

Hal Burch conducted an analysis over spring break of 1999 and made an amazing discovery: there are only 16 types of programming contest problems! Furthermore, the top several comprise almost 80% of the problems seen at the IOI. Here they are:
Dynamic Programming
Complete Search
Flood Fill
Shortest Path
Recursive Search Techniques
Minimum Spanning Tree
Computational Geometry
Network Flow
Eulerian Path
Two-Dimensional Convex Hull
Heuristic Search
Approximate Search
Ad Hoc Problems
The most challenging problems are Combination Problems which involve a loop (combinations, subsets, etc.) around one of the above algorithms - or even a loop of one algorithm with another inside it. These seem extraordinarily tricky to get right, even though conceptually they are ``obvious''.

« on: April 20, 2017, 05:39:04 PM »
Competitive programming is similar to quiz contests. Here a team or individual is given a number of mathematical and logical problems to solve using any programming language allowed by the host. The competition can span from just a few hours to even months. The categories of problems cover many mathematical concepts like data structures, graphs, number theory, dynamic programming, string processing, algebra, geometry and much more. The competitions take place online – on both local and global networks. The team that solves the most problems earliest with the least erroneous submissions wins. There can also be other criteria of point distribution such as the efficiency of the algorithm, size of the code and many more.

Use of email / Email Security
« on: April 20, 2017, 03:59:01 PM »
The most important point in Email Security is protecting your email login details and messages. This is very important because of the security risks during data transmission, especially on mobile and wireless networks. For this purpose it is recommended to use encryption when checking / sending emails. This can be accomplished by using:

Secure IMAP (IMAPs) - It is used for encrypting the incoming communication from the remote mail server. Check these instructions on how to enable it on Outlook, Outlook Express, Thunderbird and Mac Mail.

Secure POP3 (POP3s) - It is also used for encrypting the incoming communication from the remote mail server. Check these instructions on how to enable it on Outlook, Outlook Express, Thunderbird and Mac Mail.

Note: The difference between IMAPs and POP3s is the same as for the standard IMAP and POP3 protocols. IMAPs leaves the messages on the server. It is faster because it does not download the whole message but only its headers. Furthermore, it is preferred in terms of reliability. When your local computer crashes your mails will not be lost if you have used IMAPs. On the other hand, POP3s downloads the whole message and stores it locally. That's why it is slower and less reliable.

Secure SMTP (SMTPs) - It encrypts the outgoing communication to the remote mail server. Check these instructions on how to enable it on Outlook, Outlook Express, Thunderbird and Mac Mail.

Secure HTTP (secure HTTPs) - It is suitable for checking your webmail. Usually it is available at an URL similar to

The next thing to know about Email Security is how to fight SPAM (unsolicited email) and viruses. Below are some tips on this matter:

Make sure to have an updated antivirus program. We recommend Norton Internet Security which has built-in Spam and Anti-Virus protection.
Update your email client to the latest version. If you have troubles updating your current email client, try the freely available Thunderbird. Many viruses are targeted against outdated mail clients.
Do not open suspicious attachments even if the sender might look familiar.
Avoid subscribing to free newsletters, lotteries or other similar activities. This usually results in an increased number of spam messages in your inbox.
Protect your domain from being spoofed by spammers using an SPF record. Email spoofing will make you receive bounced back messages you have not sent.
Use the SiteGround SpamExperts solution which will protect your e-mail accounts against Spam.

Use of email / Using An Email Alias to Receive Student Work
« on: April 20, 2017, 03:57:56 PM »
Have you ever asked students to email their work to you and all it does is create a big mess in your inbox?  If you don't use a Learning Management System, then one way to organize incoming assignments is to use an email alias.  Both Gmail and Hotmail have this capability.

Gmail Users
Here's a synopsis from the Gmail help page:  "Gmail doesn't offer traditional aliases, but you can receive messages sent to You can set up filters to automatically direct these messages to Trash, apply a label or star, skip the inbox, or forward to another email account."

For teachers, this means you can filter student emails by period.  For example, your Period 1 students can send their work to while your Period 2 students can send their work to msjosiebruin+period

You can use up to 30 Gmail aliases, so use them wisely.

If you don't know how to create a filter, visit this Gmail Help Page.

Hotmail Users
One nice feature of using a Hotmail alias is that your alias can be vastly different from your username.  Maybe your email address is, but your alias is ""  You can send out email using your alias without ever giving away your real email address.  You also can't log into Hotmail with your alias, so that can be an additional layer of security for some.

Hotmail allows a total of 15 email aliases, but you are limited to creating only 5 per year.  To get started on creating a Hotmail alias, click

Control Cyber security Risks / Category of Technical Cyber Crime
« on: April 20, 2017, 03:54:11 PM »
Unauthorized access:
 Some body can do access in to the computer systems or Networks activity for which he is not authorized to do so. This  is commonly known  as hack
Theft of information contained in electronic form:
 By this crime, some body gets access in to the  computer  systems or Networks activity  of another person. Then he collects information stored in computer hard disks and removes the information. This is called Theft of information contained in electronic form.

E-mail bombing:
E-mail bombing occurs when a large number of emails sent to the victim’s computer. As a consequence the victim’s email account or mail servers might crash.

Data diddling:
This kind of  attack involves altering the raw data just before it is processed by a computer and then changing it back after the processing is completed

Salami attacks:
 Salami attack is one kind of financial crime. Here the computer program is altered. The alteration is so insignificant  that in a single case it remains completely unnoticed e.g. A bank employee inserts a program into bank’s servers that deducts a small amount from the account of every customer.

Denial of service Attack :
The computer resource receives so many requests which it can not handle . This crashes the computer resource. As a result the computer resource denies giving proper service to the authorized users. Another kind of denial of service  attack is known as Distributed
Denial of  Service(DDOS) attack. Here the perpetrators are many. They are geographically widespread.

Virus attack: v
iruses are one kind of  programs that attach themselves to a computer or a computer  file and then they  circulate themselves to other files and to other computers on a network . They usually affect the data on a computer either by altering or deleting it.

Worms attack:
Worms are  unlike viruses. It  does not need the host to attach them. They make functional  copies of themselves. They do this repeatedly  till they eat up all the available space on a computer’s memory.

Logic bombs:
These are event dependent programs. These programs are created to do something only when a certain event occurs. Some viruses may be termed logic bombs because they lie dormant all through the year and become active only on a particular date(Like Chernobyl virus).

Trojan attack :
It is an unauthorized program which functions from inside of a computer. It  conceals what  it is actually doing .There are many simple ways of installing a Trojan in someone’s  computer.

Internet Time Theft:
 It is a kind of cyber crime. Here an unauthorized person uses internet hours but payment made by another person. It is a theft of internet hours by using log in name & password from various places causing wrongful loss of internet hour of other users.

Web jacking :
It  occurs when someone forcefully takes control of a website by cracking the password. After that he changes it. The actual owner of the website does not have any more control over  his website. He does not know what appears on that website.

Theft of computer system: It is a kind of offence which involves the theft of a computer, some parts of computer or a peripheral attachment  to the computer.

Physically  damaging a computer system: It is a crime that  is committed by physically damaging a computer or its peripherals.

Pages: [1] 2 3