Post on 27-Mar-2016
description
Editorial board
Starting from left side of the 1st row:
Mrs. Gayathri Kamath, Dr. K.G. Mohan, Mr. Suresh Patel.
Starting from left side of the 2nd row:
Girish, Nagaraj, Megha, Pruthvi, Shreyas, Shreedhar, Varun, Anil, Arun, Swastik, Hari.
Magnum opus in Latin means “great work.” A magnum opus is
a work on a large scale which is widely regarded as an artist’s pinnacle of
achievement, often reflecting a lifetime of work. It provides an opportunity to
pay tribute in the field of engineering by its power and imagination. It sets to
build a platform of techniques, skills and thoughts to discover new horizons
in the field named innovation. This is not just a platform, but A TEST OF
CHARACTER & TEST OF WILL!! It helps us to prove our mettle with FINESSE &
SUBTLETY amidst exhilarating performances.
OBJECTIVES:
To encourage young people to bring about positive change in their local
and global communities.
To provide young people of today who care about their future carrier,
community and culture for the generations of the future.
To create awareness among faculty & students to
1. Know about the recent trends in the field of Computer Science.
2. Know about the various activities conducted in the department of
Computer Science and Engineering.
3. Know about the calendar of events.
A key and continuing feature of the magazine is its preparation by young
people themselves, providing faculty and students with a national and
international forum for the exchange of ideas and a resource base.
Apart from being the contributors of articles and other content, the
students form a youth editorial board, and are part of the production
team.
ABOUT MAGNUM OPUS
Motto
Vision
Mission
ACHARYA INSTITUTES
PREFACE
The Department of Computer Science and Engineering was started in the year 2000 with an
intake of 60 students. Subsequently, in 2001, the intake was raised to 120 students.
The has been by NBA New Delhi, having 28 highly qualified and experi-
enced faculty. The department has around 200 systems on local area network with Wi-Fi facili-
ties and licensed software required as per the VTU curriculum.
The internet facility of 20Mbps is provided for all the students.
Computer Lab facility is available even after college hours up to 6 pm.
The department has library facility with more than 172 titles.
A proctorial system is introduced effectively and practiced in the department. Each proctor
will take care of a group of 20 students, send progress report of the students to their
parents and also monitor them.
Training on advanced topics is conducted by the staff members to help student in the
campus placements.
The department also has a Student Forum “LAKSHYA” in which the students organize and
participate in the various events.
The department organizes workshops, seminars and invited talks from experts from
both academia and industry.
PROGRAM EDUCATIONAL
OBJECTIVES
The educational objectives of a program are the statements that describe
the expected achievements of graduates within first few years of their gradu-
ation from the program.
The program educational objectives of Bachelor of Engineering in Com-
puter Science and Engineering can be broadly defined on four counts:
EMPLOYABLE: Computer Science graduates will be capable to apply their
knowledge and skills to succeed in solving computational engineering
problems.
PROFESSIONALISM: Our graduates will exhibit the ability to function ethi-
cally and responsibly in their profession with active participation to uplift
the societal status.
INTER-DISCIPLINARY: Computer Science graduate will function success-
fully as team member/leader in multi-disciplinary teams.
CONTINUOUS LEARNING: Our graduates attain the ability to learn to up-
date him/her self with state-of-the-art technological innovations and apply
the same for the successful completion of IT related engineering problems.
PROGRAM OUTCOMES
The Program Outcomes of Computer Science & Engineering shall acquire completeness to
practice at appropriate level and shall demonstrate/capable to:
I. Apply knowledge of mathematics, science and computing skills to solve IT related
engineering problems.
II. Identify, formulate and analyze complex engineering problems related to computer science
engineering.
III. Design software/hardware solutions for complex IT problems to uplift the societal status
of common man.
IV. Function effectively as an individual and as a member or leader in homogeneous/
heterogeneous teams.
V. Apply ethical principles in responsible way to follow the IT norms and cyber ethics.
VI. Communicate effectively on complex engineering activities with the engineering
community and the society for the effective presentation and/or report generation.
VII. Use and methods including design of experiments, analysis and
of data, and synthesis of the to provide valid conclusions.
VIII. Create/select an appropriate IT tool to model, implement and automate the complex
computational system.
IX. Apply reasoning informed by the contextual knowledge to assess societal, cultural,
environmental issues and the consequent responsibilities relevant to the IT practice.
X. Understand the impact of the IT solutions to demonstrate the knowledge of, and need
for sustainable IT development.
XI. Recognize the need for, and have the preparation and ability to engage in independent and
life-long learning in the broadest context of technological change.
XII. Demonstrate the knowledge of computing / managerial principles to solve and manage IT
projects.
CHAIRMAN’S MESSAGE
At the very outset please accept my
on your efforts to bring out the
fourth edition of “MAGNUM OPUS-Spirit of
Innovation” of the department of Computer
Science & Engineering which will provide
for students to express their views
and inculcate enthusiasm for creativity in writing.
My be in
the department wishes to take
up for the benefit of the student community.
The students should bear in mind
the motto of JMJ Education Society-“Truth,
Joy & Service” and direct their sincere and
true efforts in providing service, which would
benefit their fellow students, institution where
they learn and for the development and progress
of their country.
With best wishes for the success of the magazine.
Shri. B. Premnath
Chairman, Acharya Institutes
PRINCIPAL’S MESSAGE
I feel a great pleasure to know that department of comput-
er science and engineering is bringing out its fourth issue of
departmental magazine “Magnum Opus-Spirit of Innovation”.
Technical education is the largest human development sys-
tem in the country and so is the area of science and has pro-
gressed as a tool for development. It has evolved as the driv-
ing force for the economic growth and an agent for cultural
and social change.
We are in the pursuit of global standards of
excellence in all our endeavors and we aim at creating all
rounded personality in our students professionally and so-
cially. I congratulate the editorial team for their efforts in
bringing out the magazine.
I hope that everyone enjoy going through this volume.
Dr. H. D. Maheshappa
Principal, Acharya Institute of Technology
HOD’S MESSAGE
It gives me immense pleasure to note that the department of
Computer Science is bringing out
“Magnum Opus” the departmental annual
magazine.
“Lakshya” is the student forum of
Computer Science department. These
two provide excellent platform for the
students as well as faculty and experts
to share their ideas and aspirations.
I congratulate the editorial team
and the efforts made b all the staff and
students in making this academic year
more colorful!!
Dr. K.G Mohan
Prof. & Dean (R&D), Dept. of CS&E
ADVISORY BOARD
Dr. H.D. Maheshappa, Principal,
Acharya Institute of Technology Chief Advisor
Dr. K.G. Mohan,
Professor, Dean of R&D & Head, Department
of Computer Science & Engineering, Acharya
Institute of Technology
Chairman
Dr. B.H. Shekar
Chairman
Department of Computer Science,
Mangalore University,
Mangalore- 574 199, Karnataka, India
Dr. C.B. Akki
Senior Consultant-Talent Transformation,
Wipro Technologies,
Bangalore-560 100, Karnataka, India
Dr. Basavaraj S. Anami
Principal, KLE Institute of Technology,
Airport Road.
Hubli-580030, Karnataka, India
Dr. Dinesh Ramegowda
Technical Manager, HCL Technologies,
No. 8 & 9, G.B Palya, Off. Hosur Road,
Bangalore-560068, Karnataka, India
Dr. Krishna Mohan C.
Head of the Department of Computer Sci-
ence, Indian Institute of Technology,
Hyderabad
Dr. Dinesh M.S.
Senior Member, Technical Staff,
Siemens Technology and Solutions,
Bangalore
Dr. P.V. Kumar
Professor, Department of Computer Science
& Engineering, Acharya Institute of
Technology
ACKNOWLEDGEMENT
and it is the only beginning that opens an era of technological innovation
and spirit. It gives us an immense pleasure to bring out the FOURTH issue of
the departmental magazine “Magnum Opus - Spirit of Innovation” before you.
We are very much indebted for the constant help extended
by our honorable Chairman, Shri. B. Premnath Reddy, Smt. Shalini Red-
dy, Director - Admissions, Mrs. Madhavi Srinivas, Director, HR & IA-
Acharya Institutes, Dr. H.D. Maheshappa, Principal, Acharya Institute of
Technology and Dr. K.G. Mohan, Dean of R&D, in bringing out this maga-
zine.
We would also like to warmly acknowledge Dr. K.G. Mohan, Head of
CSE for his guidance and input in the making of the magazine. Of
the many people who have been enormously helpful in the preparation of this
magazine, we are especially thankful to Associate Professor, Prof. Gayathri
Kamath, Assistant Pr Pr Patel, Professor & Forum
Coordinator, and the entire CSE faculty for their help and support in
guiding us through to its success full completion.
We are obliged to faculty, for the valuable information
provided by them in their respective fields. We are grateful for their co-
operation during the period of the production of the magazine.
We would also like to thank Mr. Swastik Biswas (4th semes ter) CSE department for being the critic and designing this magazine.
-Team Compass 2k14
STAFF AT DEPARTMENT
OF CS&E
Starting from left side of the 1st row:
Mrs. Surekha K.B., Mrs. Varalakshmi B.D., H.O.D. Sir, Dr. Mohan K.G., Principal Sir, Dr.
H.D. Maheshappa, Dr. P.V. Kumar, Mr. Nagesh A.G., Mr. Deepak S. Sakkari.
Starting from left side of the 2nd row:
Mrs. Latharani T.R., Mrs. Nagaveni V., Mrs. Gayathri Kamath, Mrs. Manujakshi B.C., Mrs.
Deepa T.P., Mrs. Vani K.S., Mrs. Naidila Sadashiv, Mrs. Nagashree N.
Starting from left side of the 3rd row:
Mr. Suresh Patel, Mr. Madhu N., Mr. Srivinay, Mr. Praveen Naik, Mr. Sunil G.L., Mr.
Vaishak Sundaresh, Mr. Dayananda Lal N., Mr. Manjunath G.S., Mr. Raghunandan V., Mr.
Narasimha Murthy M.S., Mr. M.D. Ziaur Rahman.
STAFF AT DEPARTMENT
OF CS&E
FACULTY ACHIEVEMENTS
Mrs. Varalakshmi B.D. has been awarded 6 Lakhs by VTU-VGST
(2013-14) for her project on the Design and Implementation of Haptic devices
for Physically Challenged People.
Mrs. Latharani T.R. has completed her research on Digital Image
Processing under the guidance of Dr. Thippeswamy G. of BMSIT in the R&D
Centre of Acharya Institute of Technology affiliated to VTU.
Mrs. Vani K.S. has been awarded the Best Paper Award for her pa-
per on FEC Techniques for Reliable Data transmission at the International
Conference on CSE held on 28th April, 2013 in Bangalore.
Dr. G.K. Ravi Kumar has been awarded the 2nd Prize for his paper
on Analysis of Big Data at Advances in Information Technology Conference
held on 4th April, 2013 at SJBIT college.
Dr. K.G. Mohan was felicitated with the title of Young Investigator
Award for his work on A Low Cost Barcode Reader Health Application at the
International Conference on CSE held on 28th April,2013 in Bangalore.
A very successful four day VTU-VGST FDP workshop was organized
on Distributed computing from 10th-13th July 2013 Acharya Institute of
Technology under the sponsorship of VTU-VGST Acharya Institute of Technol-
ogy.
Workshop on Intellectual property rights was held on 16th
April,2013 at Acharya Institute of Technology sponsored by AIT and KSCST.
PUBLICATIONS BY FACULTY
DURING 2013-14
Sl. No. Name of the
Teacher Title of the Paper
Publication
citation
National or
International
Journal
1 Dr. K.G. Mohan Barcode Scanner for
Health Applications -
IrNet
International Jour-
nal
2 Vani K.S.
FEC Techniques for
Reliable Data
transmission
-
IrNet
International Jour-
nal
An Efficient Method
To Feed High
Resolution Images
To Facial Analysis
Systems
GRET
Graduate
Research in
Engineering and
Technology (GRET)
An International
Journal (JUNE 2013)
ISSN 2320 â “ 6632
3
Multintenacny and
Scalability issues in
Cloud Computing
Recent Trend in
Computer Science &
Engg. [NCRTCSE-13],
4TH MAY 2013
National
Narasimha Murthy
M.S.
Cloud Vision
Using MOCHA
Architecture on
Jelastic Cloud
International Jour-
nal on Engineering
and Innovative
Technology, Vol.2,
Issue.11, May 2013
National
E-Health care billing
and record
Management system
using Android with
Cloud
IOSR Journal of
Computer Engineer-
ing, Vol.11, Issue-4,
May-Jun-2013
International
Sl.. No. Name of the
Teacher Title of the Paper
Publication
citation
National or
International
Journal
4
An on demand
routing technique for
cognitive radio
ADHOC network and
its performance
analysis
International Journal
on Engineering and
Innovative
Technology, Vol.2,
Issue.11, May 2013
International Suresh Patel
5
Secure data
aggregation for Peer
to peer node
IRNet, May 2013 International Nagesh A.G.
6 Nagaveni V.
An Efficient
Method To Feed High
Resolution Images
To Facial Analysis
Systems
GRET
Graduate
Research in
Engineering and
Technology (GRET)
An International
Journal (JUNE 2013)
ISSN 2320 â “ 6632
7 Sunil G.L.
Data sharing in the
cloud with
distributed
accountability
IJERT 2013 International
8 Surekha K.B.
Improved AODV
Based on
energy strength and
dropping ratio
IRNet, May 2013 National
9 Varalakshmi B.D.
Ensuring Security in
Multi Clouds using
Secret Sharing
Scheme
IRNet, May 2013 International
Sl.. No. Name of the
Teacher Title of the Paper
Publication
citation
National or
International
Journal
10 Deepak S. Sakkari
Frame work for
enhanced joint
connectivity and cov-
erage using random
based distribution in
WSN
IEEE international
Optimized coverage
and connectivity for
randomly
deployed WSN for
lifetime
optimization
Vol4, Issue6,
PP247-255 International (IJCET)
11 Praveen Naik
Protection of Control
Frames in Wireless
Network
IJARCSSE
JOURNAL International
12 Deepa T.P.
EEG based sleep sig-
nal detection Vol3, number 1 International (IJETT)
A routing protocol to
evade congestion in
ADHOC
Vol3, number 1 International (IJETT)
13
Protection of frames
in Wireless sensor
Networks
Volume 3 issue 12 IJARCSSE
Manujakshi B.C. Under Water Acous-
tic (UW-A)
Communication
Architecture and the
Key Notions of UW-A
Propagation
Volume 3, issue 12 International
Sl.. No. Name of the
Teacher Title of the Paper
Publication
citation
National or
International
Journal
Vandana Reddy
EEG SLEEP SIGNAL
PROCESSING TO ALERT
DRIVER IN INTELLI-
GENT VEHICULAR
SYSTEM USING
MOBILE DEVICE
Volume 3,
Number 1 International
14
A Routing
Protocol to Evade
Congestion in Time
Critical Events in Wire-
less Sensor Networks
(ECTCE)
Volume 3,
Number 1 International
STUDENT ACHIEVEMENTS
Bachelor of Engineering
Prachi Sharma student of Department of CS&E secured 9th rank in
VTU Examinations for the academic year 2012-13.
Gajender Pandey and Stuti Joshi of 8th semester have secured a
rank of 97 percentile and 92 percentile in GATE 2014.
Hema Bindu qualified for GRE 2013.
Gaurav Divedi has qualified for CAT 2013.
Manasa P., Prathima C., Manjushu H.P., Mamatha G. have been
awarded Rs. 5000 by KSCST for their project on Pedestrian Detection System
using SHADELET & Haar Detection System.
Abhishek Kumar Singh, Hari Ashwath, and Swastik Biswas had
qualified for the final/state level Aspirations2020 where they secured the 6th
place. It was organized by Infosys Campus Connect.
Raja Joseph of 4th semester has been awarded the Silver Medal in
Best Physique of 85Kg category held under VTU.
Swetha has presented her paper on Emotion Recognition using
Brain Waves at the IrNet held on 28 April, 2013 in Bangalore.
Roopa R. has presented her paper on An Efficient Method To Feed
High Resolution Images To Facial Analysis Systems at the Graduate Research
in Engineering and Technology (GRET) An International Journal (JUNE 2013)
ISSN 2320 held in June in Bangalore.
Sirisha G.N. has presented her paper on the topic Ensur-
ing Security in Multi Clouds using Secret Sharing Scheme at ICICE-2013 on
28th June, 2013 in IRD-India, Bangalore.
Jangaseshalekhya has presented her paper on Data sharing in the
cloud with distributed accountability at ICICE-2013 on 28th June, 2013 in IRD-
India, Bangalore.
Punith Kumar has presented his paper, An on-demand routing
technique for cognitive radio ADHOC network and its performance analysis at
ICICE-2013 on 28th June, 2013 in IRD-India, Bangalore.
LAKSHYA
The Student Forum was started in the year 2005, which marked the beginning
of a new era for the Department of Computer Science & Engineering. Being ed-
ucational and scientific, it endeavors to encourage and assist students in vari-
ous fields to meet the future competence, by involving them in various activi-
ties such as talent search, industry-academic interactions etc.
Every semester Lakshya conducts various activities which includes
technical training & tests on C & C++, Aptitude test, Group discussion, Paper
Presentation, Quiz etc.., which helps students to participate in various tech-
nical events, campus interviews and for their future enhancements. At the end
of every academic year, Lakshya organizes COMPASS – technical symposium,
which is an inter/intra collegiate event.
“To motivate the students intellectually, professionally and socially
to lead productive and satisfying lives in the global and competitive society of
the 21st century.”
Forum- A room of people brought together to discuss upon the interests of different do-
mains.
What is Lakshya Forum?
Lakshya Forum is a room provided to the aspiring engineers of the college to step out of
their classrooms, their mandatory course books and their daily prescribed curriculum, giv-
ing them an opportunity to identify their strengths and work as an individual in a group
discussion towards the achievement of the intended target-“The Lakshya”.
There always have been many conversations and questions about why actually
are forums conducted when every individual is successful enough in working for his self
by himself.
What are its objectives?
Objectives are generally framed on the basis of the requirements and expectations of the
group involved. Here, in Lakshya Forum as well the similar tradition is followed, involving
both students and faculty. It gives them a platform to share their ideas , putting on the
billboard some of the most entertaining events.
One of the objectives of our forum is to enhance the skills and practices of
working as a team among students. Along with the above, socializing with a different
crowd outside the classroom and of course reducing the gap between seniors and juniors
also has been seen as a much needful context to be given a thought towards the framing of
the forum’s objectives.
Forums always are based on some goals and motives to be achieved, hence,
faces some real time achievements categorized as outcomes.
What are its outcomes?
Lakshya is a student’s forum which makes students take up responsibilities and simultane-
ously help them in brushing up their skills to put up the best events.
In this process of planning and bringing up events, catering to diverse interests, stu-
dents get to experience the duty of being an organizer and a manager, in turn enhancing
their confidence which is known to be an essential requirement of a professional degree
holder.
To conclude with something which has kept Lakshya alive as a forum in the years
gone and what makes it awaited in the years to come is the success which brings along the
satisfaction of a good work and the call for enjoyment which truly should be an unmissed
element in a meaningful and happy life.
COORDINATORS OF
COMPASS 2k14
AISHWARYA N. 1AY12CS007 4-A
HULSI KUMARI 1AY12CS042 4-A
HARI ASHWATH 1AY12CS041 4-A
MD. NAWAID ALI 1AY12CS053 4-A
ABHISHEK CHANDRA SINGH
1AY12CS003 4-A
ABHISHEK UPADHYAY 1AY12CS005 4-A
ANKIT POUDEL 1AY12CS013 4-A
ANKITA DIVYA 1AY12CS014 4-A
MD. ILIYAS HASSAN 1AY12CS056 4-A
KOMAR KANTHI 1AY12CS045 4-A
ABHIJEET SASI-DHARAN
1AY12CS001 4-A
RICHA MEHTA 1AY12CS080 4-B
NEHA KUMARI 1AY12CS060 4-B
SHILPI SINHA 1AY12CS091 4-B
SRISHAILA K.R. 1AY12CS105 4-B
SHASHWATHI K.N. 1AY12CS090 4-B
SANDHYA D. BIRAJ-DAR
1AY12CS088 4-B
SHREEDHAR BHAT 1AY12CS095 4-B
NIKHITHA P. 1AY12CS061 4-B
PRERNA SHARMA 1AY12CS070 4-B
RASHMI G. 1AY12CS076 4-B
UJJWAL JAIN 1AY12CS122 4-B
NISCHITHA S. 1AY12CS063 4-B
RASHMI C.S. 1AY12CS075 4-B
SULEKHA KUMARI 1AY12CS112 4-B
RUPAN ROY 1AY12CS083 4-B
SRUSHITI K. 1AY12CS107 4-B
MANJINDER SINGH DIP 4-C
TILAK KUMAR DIP 4-C
NAVYA G. DIP 4-C
HARSHITHA P.S. DIP 4-C
JAGADISH H.S. DIP 4-C
ROHIT PAWAR DIP 4-C
SWASTIK BISWAS 1AY12CS119 4-C
SUSHMITA KUMARI 1AY12CS118 4-C
ASHWINI B.N. 1AY11CS023 6-A
AMRIT KISHORE 1AY11CS013 6-A
PRIYA AGARWAL 1AY11CS085 6-A
MAAAZ MAJA 1AY11CS061 6-A
M. SRI PADMA SUDHA 1AY11CS060 6-A
MEGHA V. 1AY11CS064 6-A
PRUTHVI P V. 1AY11CS086 6-A
COORDINATORS OF
COMPASS 2k14
GAGANA P. 1AY11CS040 6-A
K. MANASA SARALAYA 1AY11CS053 6-A
AISHWARYA S.P. 1AY11CS006 6-A
AKASH KARIWAL 1AY11CS008 6-A
SAFI AADIL ANSARI 1AY11CS100 6-B
SHIVAM SINGHAL 1AY11CS108 6-B
SUMIT KUMAR 1AY11CS123 6-B
VISHAL KUMAR 1AY11CS135 6-B
UMESH KUMAR 1AY11CS131 6-B
SHIVIKA PANDEY 1AY11CS110 6-B
SHALINI SRIVASTAVA 1AY11CS103 6-B
ANILKUMAR A. 1AY10CS006 8-A
ARUN S. 1AY10CS009 8-A
CHARITH KUMAR JAIN 1AY10CS014 8-A
MAHESH KOTI 1AY09CS042 8-A
NAGARAJ G.B. 1AY10CS037 8-A
NARESH KUMAR 1AY10CS039 8-A
IRFAN KHAN 1AY10CS025 8-A
ANIMESH PROSAD 1AY10CS007 8-A
ASIF PASHA 1AY10CS010 8-A
HIMABINDU P. 1AY10CS024 8-A
MAMATHA G. 1AY10CS031 8-A
MANJUSHREE M.P. 1AY10CS034 8-A
MANASA P. 1AY10CS032 8-A
NANDALAKSHMI D.M. 1AY10CS038 8-A
PRATHIMA C. 1AY10CS050 8-A
NEHA 1AY10CS042 8-A
AAYUSHI BHATTACHARYA
1AY10CS001 8-A
NAYANA METHRE 1AY10CS040 8-A
MOUSHUMI MAHATO 1AY10CS035 8-A
NEETIKA SINGH 1AY10CS041 8-A
GIRISH PRASAD K.S. 1AY10CS021 8-A
DHRUVA M. 1AY10CS017 8-A
HEENA A. 1AY10CS023 8-A
RAJIB BISWAS 1AY10CS057 8-B
SACHIN 1AY10CS060 8-B
SAUVIK DAS 1AY10CS069 8-B
SHASHIDA NAHID 1AY10CS073 8-B
SHUBAM 1AY10CS074 8-B
SAMEE ALAM 1AY10CS061 8-B
RISHAB SACHAN 1AY10CS059 8-B
SUKRITI KALYANI 1AY10CS081 8-B
THASNEEMA V. 1AY10CS085 8-B
RAJESHWARI A. 1AY10CS056 8-B
RESHMA R. 1AY10CS058 8-B
SHWETHA S. 1AY10CS075 8-B
MAHANKALI PRI-YANKA
1AY09CS041 8-B
SAVITA KARABASANAVAR
1AY10CS070 8-B
SRIVIDYA R. 1AY10CS079 8-B
SAMEERA ALLURI 1AY10CS063 8-B
SANJANA R. 1AY10CS064 8-B
SHABNAM BANDYOPADHYAY
1AY10CS072 8-B
SANJU SHWETABH 1AY10CS066 8-B
LAUNCHING OF COMPASS
2k14
The Annual techno fest of the Computer Science department - Compass 2k14
was launched with great applause on 2nd May, 2014. Principal of AIT, Dr. H. D. Maheshap-
pa declared the Technical Symposium open by rolling down the banner amidst thunder-
ous cheers from the crowd signaling the launch of the biggest technical spectacle which
takes place every year.
Compass celebrates the spirit of participation as student from various
branches and colleges come together and take part in various technical and non-technical
events. This year the much awaited techno fest is happening on 7th May, 2014.
N o matter how fast our connection speed is,
it could always stand to be faster. And the peo-
ple who make it their business to see that tele-
communications networks do get faster are also
keenly aware, and they're apparently already at
work on the next big thing. Till now we all were
astonished by the speed of 3G and yet it was
slower when we knew about 4G. It was way fast-
er than 3g technology. the prices of 3G were
slashed and brought close to that of 2G and
just then 4G was about the corner.it could
download a file as large as 800mb in 40 sec-
onds only and that meant a film can be down-
loaded in only a couple of minutes.
4G is yet to reach parts in India and the
world started to think about something faster
as people don’t have even those couple of
minutes. Imagine if someone told us that a
movie can be downloaded in a single blink 5
years earlier we could have laughed on it, but as
we all are aware of the recent developments in
technology we raise our brows to these ques-
tions and the answer was 5G.
A new mobile generation has ap-
peared approximately every 10th year since the
first 1g system, Nordic Mobile Telephone, was
introduced in 1981. The first 2G system started
to roll out in 1992, the first 3G system first ap-
peared in 2001 and 4G systems fully compliant
with IMT Advanced were standardized in 2012.
The development of the 2G (GSM) and 3G (IMT-
2000 and UMTS) standards took about 10 years
from the official start of the R&D projects, and
development of 4G systems started in 2001 or
2002. Predecessor technologies have occurred
on the market a few years before the new mo-
bile generation, for example the pre-3G system
CDMA-One/IS95 in the US in 1995, and the pre-
4G systems Mobile Wi-MAX in South-Korea
2006, and first release-LTE in Scandinavia 2009.
5G (fifth generation communication tech-
nology) is way faster than its predecessors and
is claimed to give a speed up to 800mb/s which
means….yes we CAN actually download a full
movie in a single blink. but we will have to wait
for some time to experience that as develop-
ments are still ongoing for the technology and
many countries are into this project and we are
seeing so many claims of getting this technolo-
gy first among all. India is also not far behind in
this scenario and is developing it quickly.
India and Israel have agreed to
work jointly on development of fifth generation
(5G) telecom technologies, sources said. The
matter was discussed during the visit of tele-
com and IT minister Kapil Sibal to Israel. Sibal
and his Israeli counterpart Gilad Erdan in a
meeting agreed that both the countries can co-
operate on exploring the possibilities of stand-
ard formulation, development and manufactur-
ing in the area of 4G and 5G telecom technolo-
gies.
"Israel has technology and innovation,
India has the capital and market. The two areas
which emerge out of discussion related to tele-
com were: reducing roaming charges between
India and Israel and exploring the possibilities
of standard formulation, research and develop-
ment, and manufacturing in the area of 4G and
5G," a DoT official said. At present, Indian tele-
com operators are providing 2G, 3G and some
4G services. No country in the world has 5G
technology FULLY WORKING while some com-
panies AROUND THE WORLD claim to have test-
ed 5G technology. There have been claims by
companies that 5G technology will be in place
by 2020.
3g vs. 4g vs. 5g
Global semiconductor services provider,
Broadcom has introduced the industry's first 5G
Wi-Fi (802.11ac) system-on-chip (SoC) to deliver
pinpoint indoor positioning technology. The
BCM43462 SOC, featuring Broadcom's new Accu
-Locate technology, provides sub-meter accura-
cy on physical locations enabling retailers and
public venue operators to deliver more person-
alized experiences to consumers. Broadcom will
demonstrate its Accu-Locate technology at In-
terop, Las Vegas, 1-3 April.
Key features of the Broadcom
BCM43462 SoC include: dual band (2.4 GHz and
5 GHz) complete 5G Wi-Fi (11ac) SoC with inte-
grated MAC, PHY and radio, three-stream spa-
tial multiplexing up to 1.3Gbps, standardized
security, embedded hardware acceleration, full
IEEE 802.11a/b/g/n legacy compatibility and
support for Fast-Path UAP, Broadcom's enter-
prise class access point software. Broadcom's
BCM43462 SoC with integrated Accu-Locate
technology is now sampling.
So we will still have to wait for 4-5 years
to use this 5g technology with eye-blinking
speeds. but wait always give the right result.so
wait and only until then keep using 4g.
Speed comparisons of all
generations…….
D ata center is a large group of networked
computer servers typically used by organiza-
tions for the remote storage, processing, or dis-
tribution of large amounts of data. As men-
tioned in Wikibon’s “The Data Center: Past, Pre-
sent and Future” post, “Data centers are at the
center of modern software technology, serving
a critical role in the expanding capabilities for
enterprises.” The concept of “data centers” has
been around since the late 1950s when Ameri-
can Airlines and IBM partnered to create a pas-
senger reservations system offered by Sabre,
automating one of its key business areas. The
idea of a data processing system that could cre-
ate and manage airline seat reservations and
instantly make that data available electronically
to any agent at any location became a reality in
1960, opening the door to enterprise-scale data
centers.
Since then, physical and technological
changes in computing and data storage have
led us down a winding road to where we are
today. Let’s take a brief look at the evolution of
the data center, from the mainframe of yester-
day, to today’s cloud-centric evolution, and
some impacts they’ve had on IT decision-
making. In an effort to support application de-
mands, especially through the cloud, today’s
data center capabilities need to match those of
the cloud. The entire data center industry is
now changing thanks to consolidation, cost
control, and cloud support. Cloud computing
paired with today’s data centers allow IT deci-
sions to be made on a “call by call” basis about
how resources are accessed, but the data cen-
ters themselves remain completely their own
entity.
There are 4 main drawbacks of data centers-
Proximity challenges
In many cases, outdoor facility modules
supply power and cooling to data centers locat-
ed indoors. When the indoor data center is
housed along the perimeter of a building, facili-
ty module connection costs are small.
But some data centers are located in the
middle of large, sprawling buildings. In such
instances, connecting the data center to an out-
side facility module would quickly transform
what should be a “site integration” project into
a construction project. Cable and piping must
be run through walls and/or ceilings, which
means time, expense and disruption along the
connection route.
Elements of risk
Facility modules located outside are sus-
ceptible to damage from a variety of sources,
including rain, wind, vandals, animals and in-
sects and, if located in a parking lot, traffic.
Data Furnaces
Form factor restrictions
The functional advantages of a
“modular” design are flexibility, mobility and
adaptability. But facility modules are what they
are – pre-assembled power and cooling sys-
tems, typically housed in 20 foot by 40 foot
shipping containers.
Which means, for one thing, a facility
module may be too heavy to place on a build-
ing’s roof. And because facility modules are
built as limited, self-contained units, they
aren’t able to accommodate further data center
expansion. An enterprise seeking to add to its
data center infrastructure would have to buy
more facility modules.
Squeeze box
Facility modules were built to provide
power and cooling for data centers, not to pro-
vide a secret recreation room for data center
staff. The limited space inside may mean minor
contortions for maintenance personnel drop-
ping in to do repairs. In addition, facility mod-
ules that provide service personnel access
through an outside door are exposed to corro-
sive elements – heat, moisture, dust, cold –
when these doors are opened.
Data centers are large facilities filled
with servers and other equipment. In the Unit-
ed States, data centers are responsible for more
than 2% of the country's electricity usage, ac-
cording to researchers at Villanova University.
If the global cloud computing industry were
considered to be a single country, it would be
the fifth-largest in the world in terms of energy
consumption, according to Ed Turkel of
Hewlett-Packard's (HPQ, Fortune 500) Hyper
scale Business Unit.
Nearly half of the energy data centers
consume goes to cooling the equipment using
fans and other methods. That's "just wasteful,"
said Jill Simmons, director of Seattle's Office of
Sustainability and Environment.
That's why the city of Seattle is working
on a project to make use of the heat data cen-
ters produce. The city plans to route heat from
two local data centers to help warm 10 million
square feet of building space in the surround-
ing area. The project is still in the conceptual
phase, but Simmons said the city hopes to have
it in motion "within the next year."
Recently, Google pulled back the curtain
on how it manages the heat at some of the larg-
est data centers in the world. The company’s
techniques involve stripping almost every un-
necessary component and scrap of metal away
from the processors inside their data centers.
The computers in the racks at Google centers
are little more than pallets holding mother-
boards.
Even the internal walls of the data center
are constructed of fabric — enough to direct air
flow in the proper direction, but not enough to
add to the complex problems associated with
heat management. They are also cheap, and
easy to reconfigure on the fly. Then Google
runs a lot of cool water into the facility, some-
times having the liquid-carrying pipes within
inches of the processors themselves.
That’s a pretty efficient model of doing things, but Microsoft is now going one
further, literally setting their servers outside in roofless data centers. According to Data Center
Knowledge, the idea behind Microsoft’s new billion-dollar roofless data center facility in Boydton,
Va., came from Christian Belady, general manager of Microsoft Data Center Services. He thought
that computers should be able to brave the outdoor elements, and set up a server rack in a pup
tent back in 2008. It ran for eight months with 100 percent up time. That demonstrated that out-
door computer cooling and housing was theoretically possible.
But Microsoft has been designing smaller and smaller containers to hold its servers for
years, Data Center Knowledge reports. Called IT-PACs, for pre-assembled components, the shipping
-crate-like boxes can each hold hundreds of servers. Cool air from the outside is brought into the
unit through vents on the side, where it passes through a wet membrane that cools the air down
before being used to ultimately cool the servers. This method reportedly uses just 10 percent of
the water needed to cool most data centers of the same size. Future Microsoft data centers may be
little more than concrete slabs on the ground, with the IT-PACs sitting on top.
Year Data centers
1946
The Electronic Numerical Integrator and Computer (ENIAC) was built in 1946 for the U.S. Army to store artillery firing codes and was dubbed as the first general-purpose
electronic digital computer.
Early
1960s
The first transistorized computer (TRADIC) was introduced in 1954 and was the first machine to use all transistors and diodes and no vacuum tubes. Serious commercial
systems did not arrive until the 1960s, leading to mainframes like the IBM System se-ries to develop a substantial jump in compute abilities.
1971
Intel introduced its 4004 processor, becoming the first general-purpose programmable processor on the market. It served as a “building block” that engineers could purchase and then customize with software to perform different functions in a wide variety of
1973
The Xerox Alto becomes the first desktop computer to use a graphical UI and included a bit-mapped high-resolution screen, large internal memory storage, and special soft-
ware.
1977
ARCnet is introduced as the first LAN, being put into service at Chase Manhattan Bank.
It supported data rates of 2.5 Mbps, and connected up to 255 computers across the
network.
1978 SunGard develops and establishes the business of commercial disaster recovery.
1980s
Personal computers (PCs) were introduced in 1981, leading to a boom in the microcom-puter industry. Sun Microsystems developed the network file system protocol, allowing a user on a client computer to access files over a network in a manner similar to how
local storage is accessed.
Early
1990s
Microcomputers began filling old mainframe computer rooms as “servers,” and the rooms became known as data centers. Companies then began assembling these banks
of servers within their own walls.
Mid
1990s
The “.com” surge caused companies to desire fast internet connectivity and nonstop
operation. This resulted in enterprise construction of server rooms, leading to much
larger facilities (hundreds and thousands of servers). The data center as a service mod-
el became popular at this time.
1997
Apple created a program called Virtual PC and sold it through a company called Con-nectix. Virtual PC, like SoftPC allowed users to run a copy of windows on the Mac com-
puter, in order to work around software incompatibilities.
1999
VMware began selling VMware Workstation, which was similar to Virtual PC. Initial ver-sions only ran on Windows, but later added support for other operating systems.
2001
VMware ESX is launched – bare-metal hypervisors that run directly on server hardware without requiring an additional underlying operating system.
2002
Amazon Web Services begins development of a suite of cloud-based services, which in-cluded storage, computation and some human intelligence through “Amazon Mechani-
cal Turk.”
2006
Amazon Web Services begins offering IT infrastructure services to businesses in the form of web services, now commonly known as cloud computing.
2007
Sun Microsystems introduces the modular data center, transforming the fundamental economics of corporate computing.
2011
Facebook launches Open Compute Project, an industry-wide initiative to share specifi-cations and best practices for creating the most energy efficient and economical data
centers.
2012
Surveys indicated that 38 percent of businesses were already using the cloud, and 28 percent had plans to either initiate or expand their use of the cloud.
2013
Telcordia introduces generic requirements for telecommunications data center equip-ment and spaces. The document presents minimal spatial and environmental require-
ments for data center equipment and spaces. Google invested a massive $7.35 billion in capital expenditures in its Internet infrastructure during 2013. The spending was driv-en by a massive expansion of Google’s global data center network, which represented
perhaps the largest construction effort in the history of the data center industry
Today /
Beyond
Today’s datacenters are shifting from an infrastructure, hardware and software owner-
ship model, toward a subscription and capacity on demand model.
By Mrs. Deepa T.P.
Assistant Professor
(CSE Faculty)
T he "Tongue Drive" is a wireless, noncon-tact tongue-operated assistive technology de-veloped for people with severe disability for Computer Access and to control their environ-ment such as wheel chairs and other devices simply by using their tongue. The tongue is considered an excellent appendage in severely disabled people for operating an assistive de-vice. Tongue Drive consists of an array of Hall-effect magnetic sensors magnet secured on the tongue. The sensor movements of a cursor on a computer screen or to operate a powered wheelchair, a phone, or other equipments. sig-nals are transmitted across a wireless link and processed to control the mounted on a dental retainer on the outer side of the teeth to meas-ure the magnetic field generated by a small permanent tiny magnet, size of a grain of rice, is attached to an individual's tongue using im-plantation, piercing or adhesive. This technology allows a disabled person to use tongue when moving a computer mouse or a powered wheel chair. The principal advantage of this technology is the possibility of capturing a large variety of tongue move-ments by processing a combination of sensor outputs. This would provide the user with a smooth proportional control as opposed to a switch based on/off control that is the basis of most existing technologies. A large group of assistive technology devices are available that are controlled by switches. The switch integrat-ed hand splint, blow-n-suck (sip-n-puff) device, chin control system and electromyography
(EMG) switch are all switch based systems and provide the user with limited degrees of free-dom. A group of head-mounted assistive devic-es has been developed that emulate a computer mouse with head movements. Cursor move-ments in these devices are controlled by track-ing an infrared beam emitted or reflected from a transmitter or reflector attached to the user's glasses, cap, or headband. Tilt sensors and vid-eo based computer interfaces that can track a facial feature have also been implemented. One limitation of these devices is that only those people whose head movement is not inhibited may avail of the technology. Another limitation is that the user's head should always be in positions within the range of the device sensors. For example the control-ler may not be accessible when the user is lying or not sitting in front of a computer. The needs of persons with severs motor disabilities who cannot benefit from mechanical movements of any body organs are addressed by utilizing electric signals originated from brain waves or muscle twitches. Such brain computer interfac-es, either invasive, or non-invasive, have been the subject of major research activities. Brain-Gate is an example of an invasive technology using intra-cortical electrodes, while Cyberlink is a non invasive interface using electrodes at-tached to the forehead.
OPERATING WITH
TONGUE DRIVES
ADVANTAGES (1). The signals from the magnetic sensors are linear functions the magnetic field, which is a continuous position dependent property. Thus a few sensors are able to capture a wide variety of tongue movements. (2). This would provide a tremendous ad-vantage over switch based devices in that the user has the options of proportional, fuzzy, or adaptive control over the environment. (3). These would offer smoother, faster, and more natural controls as the user is saved the trouble of multiple on/off switch operations. (4). Alternative assistive technologies that emu-late a computer mouse use an additional input device such as a switch for the mouse button clicks besides the primary method for moving the pointer. (5). In Tongue Drive system on the other hand, the additional switches are unnecessary since a specific tongue movement can be assigned to the button press. (6). The permanent magnet which generates the magnetic field is a small, passive, and inherent-ly wireless component leading to user conven-
ience and additional power saving. The mouth-piece electronics can be integrated circuit (AISC). The AISC along with the transmitter antenna can be incorporated into a miniaturized package that may be fitted under the tongue as part of the dental retainer. (7). Due to the proximity of the magnet and Hall-effect sensors in the oral cavity, the Tongue Drive system is expected to be more robust against noise, interference, and involuntary movements compared to alternative technolo-gies. Therefore, the Tongue Drive system can serve as a platform to address a variety of needs of different individuals. The results of the trials showed 100 percent of commands were accurate with the response time less than one second, which equals to an information transfer rate of ap-proximately 150 bits per minute.
LIMITATIONS (1). Implementation is slightly harder. (2). Slightly Expensive
T here has been a significant development
in the financial sector over the last 40 years be-
cause of the improvement in information com-
munication technology. According to Consoli
(2003), until the early 1980s and 1990s there
were many regulatory restrictions which pre-
vented banks to adopt new technology. As a
result there was heavy reliance on customary
branch based delivery of financial services and
little pressure to change. This changed gradual-
ly with the deregulation of industry during the
1990s.This time the increasing importance of
Information Communication Technology (ICT)
brought stiffer competition and pressure for
faster change.
Customers today are demanding much
more from banking services. They want new
levels of convenience and flexibility on top of
powerful and easy to use financial management
tools, products and services that traditional
banks could not offer.
Internet banking services enables banks
to perform transactions such as transferring
funds, payments of bills, access of latest bal-
ances, statement viewing, and account detail
viewing, printing and downloading of state-
ments just to mention but a few. This in its self
has been a fundamental shift in the banking
delivery channels towards self service chan-
nels.
What is electronic banking?
Online banking can simply be de-
fined as the process of entering into transac-
tions by a particular client and the bank using
modern technology. With the various capabili-
ties of the computer and other technological
developments, online banking is one of the
many businesses that benefited from it. Since
banking plays a very important role in the
economy of a nation, then there is truly a need
to maximize and improve its features to be cli-
ent friendly and easy to access. There are of
course the advantages and disadvantages of
online banking.
Among the advantages of online banking in-
clude the following:-
Very convenient: Online banking is a totally
easy thing to do. In the comfort of your
home or offices, you can do whatever mon-
etary transactions you wish to do with your
bank.
Unlimited service day and night: The services
and various features of your bank are al-
ways available seven days a week and 24
hours daily. The most interesting thing here
is that, everything can happen at just one
click of your mouse.
No time constraint: Online banking is also
stress free because it never closes unlike
the traditional banking that has cut-off
time.
E-Banking
Easy to access via PC: Using your personal
computer, you can easily do various trans-
actions with your bank in view of your busi-
ness or any other personal or financial mat-
ters.
Easy way of payment: Bill payments can also
be handled properly and smartly. Instead
of waiting for certain due dates, you can
easily pay all your transactions using your
computer and in coordination with your
bank.
Smart: Online banking is also ubiquitous or
simply put smart. This enables you to do
troubleshooting regarding any problem that
may arise from your business.
Higher interest rate: Another great advantage
of online banking is the interest rates which
basically range between 5% to 3.40% annual-
ly. Unlike the traditional banking, online
banking can earn you a better interest or
return of investment both in your savings
and checking account.
Easy transaction: Another advantage is the
speed of every transaction. Online transac-
tions, compared to ATM or traditional bank-
ing, works faster. Thus business matters
could benefit so much from this speed fea-
ture.
Banking online is both efficient and effec-
tive. With just one secure site, all your fi-
nancial transactions can be managed order-
ly.
On the other hand, the following are the dis-
advantages of online banking:-
Banking relationship – Customary banking al-
lows creation of a personal touch between a
bank and its clients. A personal touch with a
bank manager for example can enable the man-
ager to change terms in your account since he/
she has some discretion in case of any personal
circumstantial change. It can include reversal
of an undeserved service charge.
Security matters – Direct banks are governed
by laws and regulations similar to those of cus-
tomary banks. Accounts are protected by Fed-
eral Deposit Insurance Corporation (FDIC).
Complex encryption software is used to protect
account information. However, there are no
perfect systems. Accounts are prone to hacking
attacks, phishing, malware and illegal activities.
Learning – Banks with complicated sites can
be cumbersome to navigate and may require
one to read through tutorials to navigate them.
Transaction problems – face to face meeting
is better in handling complex transactions and
problems. Customary banks may call for meet-
ings and seek expert advice to solve issues.
Though internet banking has its own ad-
vantages and disadvantages, it is indeed a nec-
essary in this global world. Further develop-
ment of software can overcome the drawbacks
and make e-banking more easy and effective.
By Nikhitha P.
(B.E. 4th semester)
I n 2009, compared to physical theft fraudu-
lent money transfers has exceeded in bank
branches of United States. Crimes have gone up
by 60% every year, in 2012, 3500 cases and
2070 in 2011 reported in India. As per report
from National Crime records Bureau (NCRS),
Maharashtra reports 561 cases, Andhra 454
cases, Karnataka 437 cases in the year 2012
crimes which are done by age group of 18 to 30
[18].Haryana registered 3 cases in 2011 but 116
in the year 2012 which is a drastic raise. Com-
pared to other crimes, this cyber crime doesn’t
require much investment and can be done in
various locations. These crimes originate from
various sources and exhibits socio-educational/
economic and technological factors including
addiction which also includes counterfeiting,
economic crimes, money laundering, child por-
nography, sexual exploitation, drug trafficking,
human trafficking, terrorism, fraud etc.
Why Cyber Crime is more nowadays?
There are 5 common trends which give
chances to cyber crime: More online transac-
tions and digital data. Transaction and custom-
er information, results of product launches,
and other market information are easily availa-
ble. Creating valuable intellectual property
online is an attractive target. Comparatively
Corporations and companies are expected to be
more transparent than before. Majority of peo-
ple want to access to corporate networks
through their mobile devices for day to day ac-
tivities. Though smarter technology devices in-
creases connectivity and but present latest
types of security threats. Hackers can crack
these securities and get an easy entry into cor-
porate networks. Malicious Software like virus-
es and spyware are strong enough to take the
partial control of main applications. In busi-
ness, customer and vendors are joined to the
networks to increase their business profits. In
December 2010, a famous E-business website
was attacked by dozens of people claiming to
be part of the unnamed group. They attempted
to perpetrate a denial of service attack in retali-
ation for website to shut dMore than a dozen
hackers were arrested in that crime. There is
more technology advanced hackers, profession-
al cyber crime organization. For example, hack-
er receives payment to infect end user device
with malware. Today’s Malwares are difficult to
trace and they steal data for financial gain.
Some people think that they get more money if
they become hackers compared to securers.
Cyber security
What is cyber Security?
The dictionary meaning says that Cyber
Security is state of being protected against the
criminal or unauthorized use of electronic data,
or the measures taken to achieve this. It is the
collection of tools, policies, security concepts,
security safeguards, guidelines, risk manage-
ment approaches, actions, training, best prac-
tices, assurance and technologies that can be
used to protect the cyber environment and or-
ganization and user’s assets. Organization and
user’s assets include connected computing de-
vices, personnel, infrastructure, applications,
services, telecommunications systems, and the
totality of transmitted and/or stored infor-
mation in the cyber environment.
Cyber security ensures the maintenance
of the security properties of the organization
and user’s assets against security risks in the
networked environments. It is the body of tech-
nologies, processes and practices designed to
protect networks, computers, programs and
data from attack, damage or unauthorized ac-
cess. Elements of cyber security include:
Application security which is the use of
software, hardware, and procedural
methods to protect applications from
external threats.
Information security is the practice of
avoiding information from unauthorized
access, use, disclosure, disruption, modi-
fication, perusal, inspection, recording
or destruction. IT Security and Infor-
mation assurance are two major aspects
of information security.
Network security which consists of the
provisions and policies adopted by a net-
work administrator. They prevent and moni-
tor unauthorized access, misuse, modifica-
tion, or denial of a computer network and
network-accessible resources. Network se-
curity involves the authorization of access
to data in a network, which is controlled by
the network administrator. Users choose or
are assigned an ID and password or other
authenticating information that allows them
access to information and programs within
their authority. Network security covers a
variety of computer networks, both public
and private, that are used in everyday jobs
conducting transactions and communica-
tions among businesses, government agen-
cies and individuals.
Disaster recovery / business continuity plan-
ning - need to encompass how employees will
communicate, where they will go and how they
will keep doing their jobs. The details can vary
greatly, depending on the size and scope of a
company and the way it does business. For
some businesses, issues such as supply chain
logistics are most crucial and are the focus on
the plan. For others, information technology
may play a more pivotal role, and the BC/DR
plan may have more of a focus on systems re-
covery. For example, the plan at one global
manufacturing company would restore critical
mainframes with vital data at a backup
Challenges in Cyber Security
Cyber security has been considered as
one of the most urgent national security prob-
lems. A report says, in a speech during his
presidential campaign, President Obama prom-
ised to “make cyber security the top priority
that it should be in the 21st century . . . and
appoint a National Cyber Advisor who will re-
port directly” to the President.
Cyber security must address not only
deliberate attacks, such as from disgruntled
employees, industrial espionage, and terrorists,
but inadvertent compromises of the infor-
mation infrastructure due to user errors, equip-
ment failures, and natural disasters. Vulnerabil-
ities might allow an attacker to penetrate a net-
work, gain access to control software, and alter
load conditions to destabilize a network in un-
predictable ways.
The defense of cyberspace necessarily
involves the forging of effective partnerships
between the public organizations charged with
ensuring the security of cyberspace and those
who manage the use of this space by myriad
users like government departments, banks, in-
frastructure, manufacturing and service enter-
prises and individual citizens. The defense of
cyberspace has a special feature. The national
territory or space that is being defended by the
land, sea and air forces is well defined. Outer
space and cyberspace are different. They are
inherently international even from the perspec-
tive of national interest.
Methods of Attacks and avoidance
The most popular weapon in cyber terrorism is
the use of computer viruses and worms. That is
why in some cases of cyber terrorism is also
called 'computer terrorism'[1]. The attacks or
methods on the computer infrastructure can be
classified into three different categories.
(a) Physical Attack. The computer infrastruc-
ture is damaged by using conventional meth-
ods like bombs, fire etc.
(b) Syntactic Attack. The computer infra-
structure is damaged by modifying the logic
of the system in order to introduce delay or
make the system unpredictable. Computer
viruses and Trojans are used in this type of
attack.
(c) Semantic Attack. This is more treacherous
as it exploits the confidence of the user in the
system. During the attack the information
keyed in the system during entering and exit-
ing the system is modified without the user’s
knowledge in order to induce errors.
The first step in protecting yourself is to recog-
nize the risks and become familiar with some
of the terminology associated with them.
Viruses - This type of malicious code re-
quires you to actually do something before it
infects your computer. This action could be
opening an email attachment or going to a
particular web page..
Worms - Worms propagate without user inter-
vention. They typically start by exploiting a
software vulnerability (a flaw that allows the
software's intended security policy to be vio-
lated), then once the victim computer has been
infected the worm will attempt to find and in-
fect other computers. Similar to viruses,
worms can propagate via email, web sites, or
network-based software. The automated self-
propagation of worms distinguishes them
from viruses.
Trojan horses - A Trojan horse program is
software that claims to be one thing while in
fact doing something different behind the
scenes. For example, a program that claims it
will speed up your computer may actually be
sending confidential information to a remote
intruder.
Hacker, attacker, or intruder - people who ex-
ploit weaknesses in software and computer
systems for their own gain. Though they do it
for curiosity, their actions are typically in vio-
lation of the intended use of the systems. The
results can range from creating a virus with no
intentionally negative impact to stealing or al-
tering information.
Malicious code - This category includes code
such as viruses, worms, and Trojan horses.
Although some people use these terms inter-
changeably, they have unique characteristics.
E-Mail Related Crime- Certain emails are used
as host by viruses and worms. E-mails are also
used for spreading disinformation, threats and
defamatory stuff.
Denial of Service -These attacks are aimed at
denying authorized persons access to a com-
puter or computer network.
Cryptology-Terrorists have started using en-
cryption, high frequency encrypted voice/data
links etc. It would be a Herculean task to de-
crypt the information terrorist is sending by
using a 512 bit symmetric encryption.
Need for Cyber Security in India 9.4% houses in India have computer (any
of Laptop or Desktop). Chandigarh (U/T), Goa
and NCT of Delhi are top three stats/union ter-
ritories with highest computer usage. Accord-
ing to 2011 Census, Only 3.1 percent of total
houses have Internet access in India. The cen-
sus covered 24,66,92,667(246.7 million) houses
in India and found only 76,47,473 (3.1%) of this
houses use Internet. The Internet includes both
broadband and low-speed connections. Accord-
ing to Internet World Stats on June 30 2012,
there were 2.4 billion internet users
(2,405,510,175) worldwide. China was the larg-
est countries in terms of internet users with
over 538 million users [19]. The following graph
(figure 1) shows top 20 internet countries
worldwide at mid-year 2012:
Internet Users in million
Cyber security initiatives in India
ISO 27001 (ISO27001) is the international Cyber security Standard that provides a model for
establishing, implementing, operating, monitoring, reviewing, maintaining, and improving an Infor-
mation Security Management System.
India’s legal framework for cyber security.
Indian IT Act, 2000
Section 65 - Tampering with computer source code,
Section 66 - Hacking & computer offences,
Section 43 – Tampering of electronic records
Indian Copyright Act
States any person who knowingly makes use of an illegal copy of computer program shall be
punishable. Computer programs have copy right protection, but no patent protection.
Indian Penal Code
Section 406 - Punishment for criminal breach of trust and Section 420 - Cheating and dishonest-
ly inducing delivery of property.
Indian Contract Act, 1872
Offers following remedies in case of breach of contract, Damages and Specific performance of
the contract.
Increasing usage of E-commerce in India Percentage of usage of different online payment methods in India
By Mrs. Deepa T.P.
Assistant Professor
(CSE Faculty)
Haptic technology
H aptic technology, or haptics, is a tactile feedback technology which takes advantage of a user's sense of touch by applying forces, vi-brations, and/or motions upon the user. This mechanical stimulation may be used to assist in the creation of virtual objects (objects exist-ing only in a computer simulation), for control of such virtual objects, and for the enhance-ment of the remote control of machines and devices. It has been described as “for the sense of touch what computer graphics does for vi-sion". Although haptic devices are capable of measuring bulk or reactive forces that are ap-plied by the user, it should not be confused with touch or tactile sensors that measure the pressure or force ex-
erted by the user to the interface.
“Haptic”, is the term derived from the Greek word, “haptesthai”, which means ‘sense of touch’. Haptic is defined as the “science of applying tactile sensation to human interaction with computers”. Haptic permits users to sense (“feel”) and manipulate three dimensional virtu-al objects with respect to such features as shape, weight, surface textures, and tempera-ture. By using Haptic devices, the user can not only feed information to the computer but can receive information from the computer in the form of a felt sensation on some part of the body. This is referred to as a Haptic interface . HAPTIC TECHNOLOGIES:
Tactile cues include textures, vibrations, and bumps, while kinesthetic cues include weight, impact, etc. In the following section, we present some crucial concepts and terminology related to haptics. Haptic: the science of applying tactile, kines-thetic, or both sensations to human computer interactions. It refers to the ability of sensing and/or manipulating objects in a
natural or synthetic environment using a haptic interface.
Cutaneous: relating to or involving the skin. It includes sensations of pressure, temperature, and pain. Tactile: pertaining to the cutaneous sense, but more specifically the sensation of pressure ra-ther than temperature or pain. Kinesthetic: re-lating to the feeling of motion. It is related to sensations originating in muscles, tendons, and joints. Force Feedback: relating to the mechanical production of information that can be sensed by the human kinesthetic system. Haptic communication: the means by which humans and machines communicate via touch. It mostly concerns networking is-sues. Haptic device: is a manipulator with sensors, actuators, or both. A variety of haptic devices have been developed for their own purposes. The most popular are tactile based, pen-based, and 3 degree-of-freedom (DOF) force feedback devices. Haptic interface: consists of a haptic device and software-based computer control mecha-nisms. It enables human–machine communica-tion through the sense of touch. By using a haptic interface, someone can not only feed the information to the computer but can also re-ceive information or feedback from the com-puter in the form of a physical sensation on some parts of the body. Applications of Haptic Technology: Surgical simulation & Medical training, Physi-cal rehabilitation, Training and education, Mu-seum display, Painting, sculpting and CAD, Sci-entific Visualization, Military application and Entertainment
By Vishwanth Koli (M. Tech 2nd semester)
Sixth sense
Technology
W e‘ve evolved over millions of years to
sense the world around us. When we encounter
something, someone or some place, we use our
five natural senses which includes eye, ear,
nose, tongue mind and body to perceive infor-
mation about it; that information helps us
make decisions and chose the right actions to
take. But arguably the most useful information
that can help us make the right decision is not
naturally perceivable with our five senses,
namely the data, information and knowledge
that mankind has accumulated about every-
thing and which is increasingly all available
online. Although the miniaturization of compu-
ting devices allows us to carry computers in
our pockets, keeping us continually connected
to the digital world, there is no link between
our digital devices and our interactions with
the physical world. Information is confined tra-
ditionally on paper or digitally on a screen.
Sixth Sense bridges this gap, bringing intangi-
ble, digital information out into the tangible
world, and allowing us to interact with this in-
formation via natural hand gestures.
Sixth Sense‘ frees information from its
confines by seamlessly integrating it with reali-
ty, and thus making the entire world your com-
puter. Sixth Sense Technology, it is the newest
jargon that has proclaimed its presence in the
technical arena. This technology has emerged,
which has its relation to the power of these six
senses. Our ordinary computers will soon be
able to sense the different feelings accumulat-
ed in the surroundings and it is all a gift of the
Sixth Sense Technology newly introduced. Sixth
Sense is a wearable gesture based device that
augments the physical world with digital infor-
mation and lets people use natural hand ges-
tures to interact with that information. It was
developed by Pranav Mistry, a PhD student in
the Fluid Interfaces Group at the MIT Media
Lab. A grad student with the Fluid Interfaces
Group at MIT, he caused a storm with his crea-
tion of Sixth Sense. He says that the movies Ro-
bocop and Minority Report gave him the inspi-
ration to create his view of a world not domi-
nated by computers, digital information and
human robots, but one where computers and
other digital devices enhance people‘s enjoy-
ment of the physical world. Right now, we use
our devices (computers, mobile phones, tablets,
etc.) to go into the internet and get information
that we want. With Sixth Sense we will use a
device no bigger than current cell phones and
probably eventually as small as a button on our
shirts to bring the internet to us in order to in-
teract with our world!
Sixth Sense will allow us to interact with our
world like never before. We can get information
on anything we want from anywhere within a
few moments! We will not only be able to inter-
act with things on a whole new level but also
with people! One great part of the device is its
ability to scan objects or even people and pro-
ject out information regarding what you are
looking at.
Sixth Sense in scientific (or non-scientific)
terms is defined as Extra Sensory Perception or
in short ESP. It involves the reception of infor-
mation not gained through any of the five sens-
es. Nor is it taken from any experiences from
the past or known. Sixth Sense aims to more
seamlessly integrate online information and
tech into everyday life. By making available in-
formation needed for decision-making beyond
what we have access to with our five senses, it
effective Maes‘ MIT group, which includes sev-
en graduate students, were thinking about how
a person could be more integrated into the
world around them and access information
without having to do something like take out a
phone. They initially produced a wristband that
would read an Radio Frequency Identification
tag to know, for example, which book a user is
holding in a store. They also had a ring that
used infrared to communicate by beacon to su-
permarket smart shelves to give you infor-
mation about products. As we grab a package
of macaroni, the ring would glow red or green
to tell us if the product was organic or free of
peanut traces —whatever criteria we program
into the system. They wanted to make infor-
mation more useful to people in real time with
minimal effort in a way that doesn‘t require
any behavior changes. The wristband was get-
ting close, but we still had to take out our cell
phone to look at the information. That‘s when
they struck on the idea of accessing infor-
mation from the internet and projecting it. So
someone wearing the wristband could pick up
a paperback in the bookstore and immediately
call up reviews about the book, projecting them
onto a surface in the store or doing a keyword
search through the book by accessing digitized
pages on Amazon or Google books. They start-
ed with a larger projector that was mounted on
a helmet. But that proved cumbersome if some-
one was projecting data onto a wall then
turned to speak to friend — the data would
project on the friend‘s face.
Recent Prototype
Now they have switched to a smaller projector
and created the pendant prototype to be worn
around the neck. The Sixth Sense prototype is
composed of a pocket projector, a mirror and a
camera. The hardware components are coupled
in a pendant-like mobile wearable device. Both
the projector and the camera are connected to
the mobile computing device in the user‘s
pocket. We can very well consider the Sixth
Sense Technology as a blend of the computer
and the cell phone. It works as the device asso-
ciated to it is hanged around the neck of a per-
son and thus the projection starts by means of
the micro projector attached to the device.
Therefore, in course, you turn out to be a mov-
ing computer in yourself and the fingers act
like a mouse and a keyboard. The prototype
was built from an ordinary webcam and a bat-
tery-powered 3M projector, with an attached
mirror — all connected to an internet-enabled
mobile phone. The setup, which costs less than
$350, allows the user to project information
from the phone onto any surface — walls, the
body of another person or even your hand. Mis-
try wore the device on a lanyard around his
neck, and colored Magic Marker caps on four
fingers (red, blue, green and yellow) helped the
camera distinguish the four fingers and recog-
nize his hand gestures with software that Mis-
try created.
COMPONENT OF SIXTH SENSE
TECHNOLOGY
The hardware components are coupled in a
pendant like mobile wearable device.
Camera: A webcam captures and recognizes an
object in view and tracks the user‘s hand ges-
tures using computer-vision based techniques.
It sends the data to the smart phone. The cam-
era, in a sense, acts as a digital eye, seeing what
the user sees. It also tracks the movements of
the thumbs and index fingers of both of the
user's hands. The camera recognizes objects
around you instantly, with the micro projector
overlaying the information on any surface, in-
cluding the object itself or your hand.
Mirror: The usage of the mirror is significant as
the projector dangles pointing downwards
from the neck.
Projector: Also, a projector opens up interac-
tion and sharing. The project itself contains a
battery inside, with 3 hours of battery life. The
projector projects visual information enabling
surfaces, walls and physical objects around us
to be used as interfaces. We want this thing to
merge with the physical world in a real physical
sense. You are touching that object and pro-
jecting info onto that object. The information
will look like it is part of the object. A tiny LED
projector displays data sent from the smart
phone on any surface in view–object, wall, or
person.
Mobile Component: The mobile devices like
Smartphone in our pockets transmit and re-
ceive voice and data anywhere and to anyone
via the mobile internet. An accompanying
Smartphone runs the Sixth Sense software, and
handles the connection to the internet. A Web-
enabled smart phone in the user‘s pocket pro-
cesses the video data. Other software searches
the Web and interprets the hand gestures.
Color Markers
It is at the tip of the user‘s fingers. Marking the
user‘s fingers with red, yellow, green, and blue
tape helps the webcam recognize gestures. The
movements and arrangements of these makers
are interpreted into gestures that act as inter-
action instructions for the projected applica-
tion interfaces.
APPLICATIONS
The Sixth Sense prototype implements several
applications that demonstrate the usefulness,
viability and flexibility of the system. The Sixth
Sense device has a huge number of applica-
tions. The following are few of the applications
of Sixth Sense Technology.
This is the thrilling power of Sixth sense technology...
By Swastik Biswas
(B.E. 4th semester)
Making Calls Multimedia reading experience
Calling up Maps Checking Time
Drawing/Designing
Zooming applications
Technology of Google
A s a Google user, you're familiar with the speed and accuracy of a Google search. How exactly does Google manage to find the right results for every query as quickly as it does? The heart of Google's search technology is PigeonRank™, a system for ranking web pages developed by Google founders Larry Page and Sergey Brin at Stanford University.
Building upon the breakthrough work of B. F. Skinner, Page and Brin reasoned that low cost pigeon clusters (PCs) could be used to compute the relative value of web pages faster than human editors or machine-based algorithms. And while Google has dozens of engineers working to improve every aspect of our service on a daily basis, Pigeon Rank continues to provide the basis for all of our web search tools. Why Google's patented Pigeon Rank™ works so well Pigeon Rank's success relies primarily on the superior trainability of the domestic pi-geon (Columba livia) and its unique capacity to recognize objects regardless of spatial orientation. The common gray pigeon can easily distinguish among items displaying only the minutest differ-ences, an ability that enables it to select relevant web sites from among thousands of similar pages. By collecting flocks of pigeons in dense clusters, Google is able to process search queries at speeds superior to traditional search engines, which typically rely on birds of prey, brooding hens or slow-moving waterfowl to do their relevance rankings. When a search query is submitted to Google, it is routed to a data coop where moni-tors flash result pages at blazing speeds. When a relevant result is observed by one of the pigeons in the cluster, it strikes a rubber-coated steel bar with its beak, which assigns the page a Pigeon Rank value of one. For each peck, the Pigeon Rank increases. Those pages receiving the most pecks, are returned at the top of the user's results page with the other results displayed in pecking order.
Integrity Google's pigeon-driven methods make tampering with our results extremely difficult. While some unscrupulous websites have tried to boost their ranking by including images on their pages of bread crumbs, bird seed and parrots posing seductively in resplendent plumage, Google's PigeonRank technology cannot be deceived by these techniques. A Google search is an easy, honest and objective way to find high-quality websites with information relevant to your search.
Pi-
geon Rank Frequently Asked Questions How was Pigeon Rank developed? The ease of training pigeons was documented early in the annals of science and fully explored by noted psychologist B.F. Skinner, who demonstrated that with only minor incentives, pigeons could be trained to execute complex tasks such as playing ping pong, piloting bombs or revising the Abatements, Credits and Refunds section of the national tax code. Brin and Page were the first to recognize that this adaptability could be harnessed through massively parallel pecking to solve complex problems, such as ordering large datasets or ordering pizza for large groups of engineers. Page and Brin experimented with numerous avian mo-tivators before settling on a combination of linseed and flax (lin/ax) that not only offered superior performance, but could be gathered at no cost from nearby open space preserves. This open space lin/ax powers Google's operations to this day, and a visit to the data coop reveals pigeons happily pecking away at lin/ax kernels and seeds. What are the challenges of operating so many pigeon clusters (PCs)? Pigeons naturally operate in dense populations, as anyone holding a pack of peanuts in an urban plaza is aware. This compatibility enables Google to pack enormous numbers of pro-cessors into small spaces, with rack after rack stacked up in our data coops. While this is optimal from the standpoint of space conservation and pigeon contentment, it does create issues during molting season, when large fans must be brought in to blow feathers out of the data coop. Removal of other pigeon byproducts was a greater challenge, until Page and Brin developed groundbreaking technology for converting poop to pixels, the tiny dots that make up a monitor's display. The clean white background of Google's home page is powered by this renewable process.
Aren't pigeons really stupid? How do they do this? While no pigeon has actually been confirmed for a seat on the Supreme Court, pigeons are surprisingly adept at making instant judgments when confronted with difficult choices. This makes them suitable for any job requiring accurate and authoritative decision-making under pressure. Among the positions in which pigeons have served capably are replacement air traffic controllers, butterfly ballot counters and pro football referees during the "no-instant replay" years. Where does Google get its pigeons? Some special breeding lab? Google uses only low-cost, off-the-street pigeons for its clusters. Gathered from city parks and plazas by Google's pack of more than 50 Phd’s (Pigeon-harvesting dogs), the pigeons are given a quick orientation on web site relevance and assigned to an appropriate data coop. Isn't it cruel to keep pigeons penned up in tiny data coops? Google exceeds all international standards for the ethical treatment of its pigeon personnel. Not only are they given free range of the coop and its window ledges, special break rooms have been set up for their convenience. These rooms are stocked with an assortment of delectable seeds and grains and feature the finest in European statuary for roosting. What's the future of pigeon computing? Google continues to explore new applications for Pigeon Rank and affiliated technologies. One of the most promising projects in development involves harnessing millions of pigeons world-wide to work on complex scientific challenges. For the latest developments on Google's distributed cooing initiative, please consider signing up for our Google Friends newsletter.
By Anil Kumar A
(B.E. 8th semester)
BRIGHTNING, THE DARK LANE
All the way in smudgy lane
Unkind air, water, the atmosphere blue.
This is my country we say in vain
The dark lane remains unseen and unheard too.
The child cries, in pain of hunger
What does the mother feed, with her empty hand?
Consoling the weak heart in hope of tomorrow
For nothing more than a piece of bread.
Time when the kid has to go out and play,
His hands are on the task tough.
Standing at the distant in a construction site
With the dream of school in bright time ahead
Deprived of love, nurture and care
Old man walks alone in the frigid world
Counting the days and moment left to unfold
Holding back the pain, praying for departure
Bridging the gap in the biased world,
Open the hands and hearts for the people unloved;
Spend a little time in sharing the knowledge,
Bring the brightness in the dark lane.
- Kanthi Komar
(B.E. 4th semester)
"¯ÁAzÀæ...¤Ã£ÀÄ...ZÀA¢gÀ.."
¯ÁAzÀæªÀ »rzÀÄ ZÀA¢gÀ §AzÀ
¨Á¤£À JzÉAiÀÄ° ¨É¼ÀPÀ£ÀÄ vÀAzÀ
¸ÀªÉ¹zÀ ºÁ¢AiÀÄ £É£À¦£À vÀÄA§
eÉÆvÉAiÀįÉà CAnzÉ PÁtzÀ ©A§..
£À¸ÀÄvÀĸÀÄ ZÉzÀÄjzÀ ªÀÄÄV°£À M¼ÀUÉ
ºÉ¥ÀÄàUÀnÖzÁ ºÀ¤UÀ¼À ¨É¸ÀÄUÉ..
M¼ÀUÀÆ ºÉÆgÀUÀÆ §tÚzÀ ¨ÉgÀUÀÄ
£ÉjUÉð £ÁazÉ CAa£À ¸ÉgÀUÀÄ..
ZÀAzÀæ£À G¹j£À «ÄrvÀzÀ ®AiÀÄPÉ
PÀqÀ°£À C¯ÉAiÀÄ° ºÉaÑzÀ ¸É¼ÀªÀÅ..
ºÀgÀrzÀ ªÀļÀ®° §gÉzÀgÉ §AiÀÄPÉ
¨ÉgɪÀÅzÉà CzÀgÉƼÀÄ ¨ÉgÀ½£À M®ªÀÅ..
IÄvÀĪÀ° ¤Ã£ÀÄ ¥À¸Àj¸É ªÀÄzsÀĪÀ
vÉÆzÀ°zÀ ZÀA¢gÀ ¤£ÁßUÀªÀÄPÉ..
PÀ£À¸À° ¤£Àß PÀ°à¹ £ÉÆÃqÀĪÀ
ªÀÄ£ÀzÀ° vÀÄA©zÉ ¤Ã ZÀqÀ¥ÀrPÉ..
¤£ÀßAiÀÄ ¸À¤ºÀ¢ ¥ÀætAiÀĪÀ £É£ÉzÀÄ
¯ÁAzÀæªÀ «ÄtÄQ¹ ZÀA¢gÀ ºÀ®Ä©zÀ£ÀÄ..
¤£ÀßAiÀÄ £ÉgÀ¼À¯Éà ZɮĪÀ£ÀÄ ªÉÆUÉzÀÄ
£É£À¦£À ¨É¼ÀPÀ¯Éà ZÀA¢gÀ PÀgÀVzÀ£ÀÄ...
~`²æÃ'
vÀ®UÉÃj
“EXAMS A DISGUISED CRUELTY”
In a deep sleep after a long tiring day,
He finds himself struggling for answers not falling the right way,
Few problems of math in his dreams, which are lying on the desk,
Is making him fight in his sleep to find the value of ‘x’ .
His peace of mind is at stake,
Even in his sleep he is so awake.
The element working as an alarm for him these days is called tension,
The thickness of the syllabus book is apparently gaining all his attention.
He wakes up unplanned and starts learning his lessons,
The fast moving hands of the clock is leaving him in aggression.
This is not the condition pointing out to one or two,
Everyone has gone through it and exceptions may be only few.
Relaxation is the requirement of the time being,
Please tell the acquirers of rights to treat students as human beings.
Exams are not the way to judge someone’s capabilities,
It is a harsh punishment doubting one’s ability.
If that is how it still has to identify an individual,
So be it, but at least change the culture of marks to something a little trivial.
Why change the entire life of someone just on the basis of few papers?
Isn’t it so demotivating for all the destiny believers?
The system of examination and the consequential atmosphere,
is leaving the most beautiful creations in despair.
It’s not about studies although as a whole,
It’s about the cruelty of judgements which unfairly decides one’s role.
But there’s nothing worthy in craving for any change in this so called modern
system,
This culture is going to prevail years after years like a custom.
And as of now, I can just make an attempt to voice the thoughts, with which
most of us are cribbing,
Rest is for later, because now even I have to go and get eligibility after beauti-
fully scribbling.
- Priya Agarwal
(B.E. 6th semester)
"ºÀ¹ªÀÅ.."
SÁ° ºÁ¼ÉAiÀÄ ªÉÄÃ¯É ªÀÄÆrzÉ
§gɪÀ ¨ÉgÀ½£À ªÉÆÃlÄ £ÉgÀ¼ÀÄ..
©¢gÀ vÀÆvÀ° UÁ½ ¸ÁVzÉ
±ÀÄæwAiÀÄ »rAiÀÄ®Ä ¤gÀvÀ PÉƼÀ®Ä..
PÀvÀÛ¯ÉAiÀÄ ¤©qÀ KPÁAvÀ
§AiÀĸÀĪÀÅzÀÄ ¨É¼ÀQ£Á ¸ÀAVÃvÀ..
ºÀ©âgÀĪÀ ®vÉAiÀÄ ¸É¼ÉvÀ
ªÀÄgÀzÉƼÀUÉ ¨É¼É¸ÀĪÀÅzÀÄ ©VvÀ..
PÀuÉÚªÉAiÀÄ vÀÄ¢AiÀÄ §tÚPÀÆ
PÀ£À¹£ÉÆA¢UÉ vÁ ¨ÉgɪÀ vÀªÀPÀ
ªÀÄuÉÚzÉAiÀÄ ¥Àæ¸ÀªÀ UÀAzsÀPÀÆ
¤ÃgÀºÀ¤UÀ¼À £ÁdÆPÀÄ ¥ÀļÀPÀ
eÁjgÀĪÀ ¸ÉgÀUÀ PÀA¥À£À
ªÀÄzÀ£À ªÀļÉAiÀÄ ªÉÆzÀ® UÀÄgÀÄvÀÄ
EA¢æAiÀÄzÀ C¢gÀ GvÀÍ£À£À
©¹AiÀÄĹgÀ ¸ÀĽAiÉƼÀUÉ ¨ÉgÉvÀÄ..
ºÀ¹zÀ GzÀgÀzÀ MAn PÀÆUÀÄ
ºÁqÁVzÉ eÉÆÃVAiÀiÁ vÀA§Æj vÀAwAiÀÄ°..
ªÀÄ£ÀzÀ §AiÀÄPÉUÉ £ÀÆgÀÄ ¸ÉÆÃUÀÄ
vÀAVºÀÄzÀÄ ºÀ¹ªÀÅ F §zÀÄPÀ ¹Ã¸ÉAiÀÄ°..
~`²æÃ'
vÀ®UÉÃj
INNOCENSE SMILES
She feels her hand, coins her mother gave
For the candy she loved and longed for days
Amused by the glossy store, for which she crave
She hops into the place where all her merriness lies
Her wavering eyes wandering everywhere
Sticks on a big colourful candy stick
She sees the grinning shopkeeper there,
She decides on a few toffies to pick
Counting the handful of coins twice
Wishing if she had few more
Sharing toffies with kid bother wherein happiness lies
More or less in her, the innocence smiles
She races down the muddy lane
Pebbles don’t seem to hurt her barefoot
Her joyful true laugh masks the pain
To the dusk, bright colour it brings
- Kanthi Komar
(B.E. 4th semester)
Why this examveri examveri examveri di …
Distancile friends friends, friends mind sharp
Exam teacher strict, strict, My future dark
Why this examveri examveri examveri di …
White colour paper, paper paper print blake
time waste …
Why this examveri examveri examveri di …
pe pe pa pan pe pe pan
Seriya vasi
Ready 1 2 3 4 …
Tune changes …
Kayila paper … only English …
Handla paper, paper question eyes fulla tear …
Empty brain, exam come, life reverse gear …
Friend u friend u oh my friend please
Show me answers now u
God I’m dying now
Please make pass now …..
Examveri
IN THE REALM OF
PAINTING...
I ts usual Sunday morning time, Vikram had
his own work to complete assessment given to
him. He had started to complete it and put
brush into colors, revolved it round and round
likewise his rounded mind with rounded
thoughts. He just kept brush on drawing paper
and glanced towards garden where he used to
seat as usual. It’s the daily work he had. Again
he turned his moody face and suddenly meet
to a shock. He shouted “Oh! What a natural
beauty she has got” His gaze becomes fixed
and now it’s hard to pull it away from her deli-
cious beauty. She was a charming girl wonder-
ing in garden just like a butterfly. A shiny glow-
ing face with long curly hears. She was smiling
from the heart and her laughter made flowers
to open there petals. Fragrance of beauty
turned the garden into the heaven. She was so
pretty than the flowers on which her hands
were fluttering. Oh! What a lucky flower. For a
movement if I may be that flower! Still Vikram
was in her thoughts even if she had left the
garden. His eyes were looking wonders of sky
created in his mind that comes out through the
painting.
Now Vikram was waiting for next Sun-
day awaiting her thoughts On Sunday Vikram
went into the garden. His eyes were thirsty of
her look. God’s grace She comes as sun was ris-
ing. Same charming face same smiling chicks.
Her hairs were talking with air and making it
too cool. Vikram handled his painting papers
and colors. She nodded. She had understood,
there was something wrong with that guy who
was trembling with his hands. Now Vikram was
totally buried in the painting. She was looking
towards him with doubtful gaze. Vikram had
completed his sketch and turned up his face.
She puzzled and turned back. Vikram had not
understood what to do. He just smiled but she
was not there to look after him. Now it was my
passion to aspire her on the paper.
AT THE EXHIBITION: She came there as
I was looking for her ! My paintings were only
for her. She went at my painting and smiled
looking towards me. She wrote there a com-
ment “It’s impossible to understand what’s go-
ing through a guy’s heart” She smiled again and
went off the center. It was my prestige to have
her comment. It was the realm of painting for
someone’s smile. To see someone happy all the
time.
One day she was unable to come into the
garden and I was waiting for still midday. In
the next exhibition I posted a blank paper. She
came as usual. She might have understood
what I mean to say! She smiled and wrote there
a comment “Don’t keep me in your heart just
take out and put me on the paper” My brain
had understood what she wants to say but my
heart was getting too much eccentric to my
brain. Heart was thinking different and my
brain didn’t want to make any clearance. It was
the relation between mind, connection between
soul, understanding without talk, and truest
contact of two hearts flirting in the garden.
One day I paint the painting having
many colorful ways but there was only two
guys finding the ways for life… She wrote a
comment “Though it was precious to choose
colorful ways of life but these were pseudo
ways having no destination”. Best effort but for
what ..?? Today I have my best effort with col-
ors. Colors are my life but now I lost all sense
to determine the favorite. My love is not the
color it is she the gorgeous s beauty..! For
whom I kept my soul on paper. This color
blindness of mind made me to paint her ear
ring with wrong color i.e. pink. She wrote there
a comment “Watch the nature Catch the
truth” (See me as natures don’t ever try to
change it, it’s dangerous.) Vikram had under-
stood what the girl wants to say..! But she did-
n’t understand his color of heart that it was
PINK..! She had tried to know the language of
painting but failed to understand expressions
of color.
VIKRAM BROKEN UP Next Sunday morn-
ing Vikram was waiting for her with wet brush
and wet heart..!! She did not came. Vikram saw
her on next exhibition but this time with
friends having fun. Today she didn’t glanced at
me and my colors my life my painting..! She
went without commenting a single word. She
had gone with nothing in her hand but every-
thing in her soul.
NEXT TRACK: May she felt guilty some-
thing wrong may she felt something missing,
She came back to comment…! But Vikram was
not there…! There was some ash and wounded
brushes in it…! “What happened to Vikram” her
mind was asking this question again and again.
She lean forward two steps ahead and get
stroked. Vikram had burned that painting. He
made color with ash and wrote something….
“NEVER AGAIN” She screamed out and heard a
soft voice “I felt it was my mistake. If my
painting is not making someone to feel happy
then what is the use of this god’s gift…..! I can’t
make her to understand the language of colors.
But there is only one way to get rid of this mis-
cellaneous And it was my last painting.
“Although I say I hate you now, I’ll be missing
you” …
- Vishwanth Koli
M. Tech 2nd semester
Om Ganesha!
by Mrs. Deepa T.P.
Assistant Professor
(CS Faculty)
by Mrs. Deepa
T.P., Assistant
Professor
(CSE Faculty)
by Shreedhar Bhat
(B.E. 4th semester)
The colourful
Peacock
It is more than what meets the eye
by Navya G.
(B.E. 4th semester)
by Rohit
(B.E. 4th semester)
Art is Life!
Love is Immortal…
TOPPERS LIST
Sl. No. Name USN 1st & 2nd Semester Percentage
(%)
1 UJJWAL JAIN 1AY12CS122 1377 88.83%
2 SHREEDHAR BHAT 1AY12CS095 1370 88.38%
3 JOHNSON 1AY12CS044 1327 85.6%
Sl. No. Name USN 3rd & 4th Semester Percentage
(%)
1
PADMA SUDHA 1AY11CS060 1497 83.16%
POOJA BHATIA 1AY11CS080
2 TANUSHREE Y 1AY11CS129 1462 81.22%
3 GRISH .N 1AY11CS043 1439 79.94%
Sl. No. Name USN 5th & 6th Semester
Marks
Percentage (%)
1 MOUSHUMI MAHATO 1AY10CS035 1424 79.11%
2 SHWETHA S 1AY10CS075 1397 77.61%
3 SWAPNEEL A.
KULKARNI 1AY10CS083 1387 77.0%
Sl. No. Name USN 1st & 2nd Semester
Marks
Percentage (%)
1 CHANNABASAMMA 1AY12SCS07 1049 80.6%
2 NALINA S. 1AY12SCS16 1015 78.07.%
3
SHRUTHI
CHANDRASHEKHAR
KAMOJI
1AY12SCS23 994 76.46%
PLACEMENTS
NITIN GUPTA GLOBAL STEP GAMING,
PUNE
ARUN S. IGATE
CHARITH KUMAR JAIN TCS, IGATE
DHRUVA M. IGATE
GAURAV DWIVEDI IGATE
AAYUSHI
BHATTACHARYA IGATE
AVINASH NISHANT S. IGATE
MOUSHUMI MAHATO IGATE
NEETIKA SINGH IGATE
ANKITA KUKRETI IGATE
RESHMA R. IGATE, MPHASIS Ltd
SOURAV AGARWAL IGATE
SWAPNEL KULKARNI IGATE
MANAV SHARMA MPHASIS Ltd
GIRISH PRASAD K.S. HP
SWATHIKIRAN S. HP
SOME ADITHYA MAN-
DAL CSC
GAJENDER PANDEY CSC
VINOD S. BHISTE CSC
SAMEE ALAM CSC
NIKITHA N. CSC
MANASA P. CSC
NAGARAJ
BOMMASHETTI G. CSC
M.S. NAVEEN KUMAR CSC
PRAMOD M.A. CSC
MANJUSHREE M.P. CSC
NEHA FARYA CSC
ANILKUMAR A. SONATA SOFTWARE
RISHABH SACHAN
SONATA SOFTWARE
SHABNAM
BANDYOPADHYAY SONATA SOFTWARE
If you think you know your teachers…. Well think again!!! ;)