You are on page 1of 44

CSE Snaps

Articles
Mobile Dreams 1

Wear the World(6th 5


sense)

Microsoft Sql Server 8

Better Safe Than Sorry 11

Cloud Computing 13

Wireless LAN Security 16

Google’s Web Browser 17 Messages


Computer Security 18 Chancellor’s Message

Vice Chancellor’s Message


Virtuality 20
Registrar Message

Puzzles 24 COE’s Message

Director’s Message
Microsoft 24

Simplifier 24

Secret of maths 25

Tips & Tricks 27

Comp-Confusion 28

Student’s Activities 29

Staff Activities 34
October 2010

CHANCELLOR’S MESSAGE

I am very much delighted to hear that Computer Science Engineer-


ing Department is starting an association. I am sure the activities of
the association will help improving the organizational skills and leader-
ship qualities of student which are essential for their career develop-
ment. I am very confident that the association of Computer Science
will reach greater heights in the years to come. I wish them to have a
grand success in all their moves and I wish that these steps shall bring
them a drastic change in their career growth.

Dr. Ishari K.Ganesh

I
October 2010

VICE-CHANCELLOR’S MESSAGE

I am very much delighted to learn that the department of computer science


and Engineering is inaugurating their Association. The IT education has trans-
formed our country and economy and the benefits of IT revolution has
reached the common man. Vels University strives hard to impart quality edu-
cation to the students so that, they have the required competencies to meet the
changing needs of this nation.

The activities of the association must facilitate the students to acquire organi-
zational skills and bring change in their perception and attitudes. The e-
Magazine to be published to mark this occasion should reflect the student’s
talents and their abilities.

I would like to congratulate and appreciate the students and the faculty of
CSE for their efforts and I wish them all the best

II
October 2010

REGISTRAR’S MESSAGE

I am much pleased to note that the department of Computer Science


Engineering is inaugurating the Department Association on 14-10-
2010.
The usage of computers has increased drastical-
ly in these days, computers playing a role in almost every industrial
sector and also in various branches of society. They are presently
the backbone of every industry that currently exists. Computers
have transformed the lives of billions around the world in every
possible way. No field is left out without computers, whether it is
medicine, e-governance, managing laws of department activities,
computers have become essential.
I wish all the very best for the inau-
guration of the department’s association and success in implement-
ing innovative ideas for the development of the world.

Dr. P. Govindarajan

III
October 2010

CONTROLLER OF EXAM’S MESSAGE

I am very glad to see that the Department of Computer Science is Inaugurating


the Department Association on 14.10.2010.

The present human generation is associated mostly with the computer usages
which makes easy in day life like banking, accounting, ticketing, E-mailing,
chatting, conduct of online Examination and E-governance etc., Most of the
peoples relied on the computers for various matter and considered to be a very
essential for the human being.

In this connection, I wish all the very best for the inauguration of Department
Association and success in implementing the new invents in the Computer Ed-
ucation.

IV
October 2010

DIRECTOR’S MESSAGE
“A GOOD START MEANS HALF DONE”

I am very much pleased to note that the students of Computer Science Engineering, Vels
University are coming out with an e-journal. The knowledge one acquires in college has to be
harnessed in real life for the betterment of self and humanity. In other words, the students
should acquire the skill of presenting & utilizing their knowledge, they get during their stay in
VELS UNIVERSITY fully & properly. In that way, this journal that they intend to publish on
regular basis will definitely give them an opportunity to sharpen their deliverance skills.

At this juncture, I request each and every student to utilize this forum fully.

I wish the students and staff of Department of Computer Science Engineering all the
very Best in their endeavor.

God Bless You All.

Prof. P. Thiagarajan

V
October 2010

Mobile -DREAMs......
By V.vinoth, D.Ashokkumar, NitinGoswami, K.Gautam(3rd yr, CSE)

Windows phone 7 is the latest version of windows mobile in development by Microsoft,


scheduled for release by October 2010.

Microsoft’s idea of the Smartphone is very different from their competitors, traditionally
smart phones were devices that did not have touch screens and were intended to be used
by one hand ,but today’s smart phones push the boundaries of technology , Microsoft
plans to push it even further .
The minimum requirements for phone 7 was revealed recently

 Capacitive Touch: 4 or more contact points

 Sensors: A-GPS, Accelerometer, Compass, Light, Proximity

 Camera: 5 megapixels or more, Camera with a flash and dedicated camera button

But Microsoft has their work cut out


 Multimedia: Common detailed specs, Codec acceleration
for them to address copy-paste and
multi-tasking while also spreading  Memory: 256 MB, 8 GB Flash or more
the word about their new mobile OS,
which is something they have not  GPU: DirectX 9 acceleration
been able to do in the past with Zune
HD, Windows Mobile, and other tech-  Processor: ARMv7 Cortex/Scorpion or better
nology. They seem to be doing pretty
well with the Xbox, so maybe Phone7  2 screen sizes: 480×800 WVGA, 480×320 HVGA
teams should probably be looking at
that team for help.  Keyboard: Optional

Five specific hardware buttons required: Start, back, search (a dedicated Bing button), camera
button, and power -- no more, no less
From the minimum requirements we can clearly understand that Microsoft is clearly targeting
only the high end market for Phone 7.

The basic facts

Windows Phone 7 Series is the suc- are supposed to be released by branded and expansive Zune and
Xbox components, and extremely
cessor to Microsoft's line of Windows the end of this year.
strict hardware requirements for
Mobile phone operating systems. It's The visual and underlying differ-
partners. A couple familiar touch-
based on the Windows CE 6 kernel, ences in the operating system are stones from the past include plans
like the Zune HD, while current ver- almost too numerous to mention,
for Outlook and Office support, as
sions of Windows Mobile are based including a completely (and we do
well as licensing to a wide variety
mean completely) upended user of third party hardware vendors --
on Windows CE 5. Microsoft an-
interface, an emphasis on finger-
nounced the new OS at Mobile World despite the name change; Mi-
based touch screen input, deep
crosoft still isn't building any
Congress 2010 in Barcelona, and
social networking integration, fully phones itself
says that the first handsets to run it

1
October 2010

MOBILE -DREAMS......

TILES Hub Strategy Apps, Lots of Apps


None of the applications designed for Win-
dows mobile will work on WP7. Sorry Win-
The Hub strategy is the core for Win-
The tile function of the screen dows Mobile developers, it's for the best.
replaces the icon displays seen dows Phone 7 and it makes a lot of Deep down, we all knew a clean break was
on the iPhone and the Android sense. So, I will have a music hub in the the only way Windows Phone wasn't going to
get stuck in the same loop.
with living breathing tiles. Just shape of the Zune app. But this app is
picking up the phone you can see Apps will have some standardized interface
not restricted to content I have upload-
what is going on in your world elements, like the app bar on the bottom for
ed to, or bought in Zune, but all the common commands..
without opening any app.
music content on my ‘phone. On my
I know we can have push notifi- It’s all about the apps. Some of the biggest
iPhone I have many music apps, each
cations on the iPhone and alerts names in Apps. Seismic, Four
on the Android but they both with different content. I have to remem-
square, Shazam, the Associated Press –are
require some element of effort. ber where my music is before I can play
all bringing apps to the 7. So, we don’t need
The push notifications don’t al- it. With the 7 I can access my music in
ways hang around on your iPh- to worry about not having the big names you
the various apps, or I can have a cen-
one and on the Nexus I have to are used to. It looks like they are already
tralized hub of music.
slide the thing down and then lining up to come on board.
“To catch the reader's attention, place
read through the various bits. Take the hub strategy across to other an interesting sentence or quote from
the story here.”

This delivery of information is just content, like business documents and


one example of how Microsoft Office becomes the business hub. This
are looking to fully innovate with
strategy gives me the best of both
this phone, not just deliver a Quality Apps
worlds, I can use my preferred app or I
version of what the market is
used to. can find it in the main hub. Smart. The demonstrations all looked awesome
with plenty of depth, functionality and
interaction. These apps were developed in
3 weeks running the new Silverlight plat-
form announced yesterday.

Try before you buy


Forget this lite/pro app business. You get
to download the app as a trial. The func-
tionality for the trial is core to the new
Silverlight toolbox, so it is down to the app
developers to decide the best way for the

The Zune Phone! trial. Some apps may be fully functional


but on a limited trial time. Other apps may
have limited functionality or the first few
Microsoft's vision of Zune is finally clear with Windows Phone 7. It's an app, just levels of a game .
like iPod is on the iPhone, though the Zune Marketplace is integrated with it into

the music + video hub, not separated into its own little application. It's just like

the Zune HD,. But you get third-party stuff like Pandora, too, built-in here., there

will be an FM radio in every phone

2
October 2010

MOBILE -DREAMS......

Email

The 7 will have full capability to support not just Exchange accounts but all other major email providers as well. So, you don’t

need to have an Exchange account to be using this for email. However, if you do have exchange, this will be a boon.

Remember, the iPhone has Exchange support but the Android does not offer Active Sync. The 7 will offer multiple exchange

account sync which will also be good for business users. Let us not forget there are still a lot more people running Exchange

emails than Gmail or Apple Mail. Blackberry, are you paying attention?

TOP 10 FEATURES Games

If Microsoft's got an ace-in-hole with Win- ber of levels. Not only will you be able
1. Smooth transitional user interface
dows Phone 7, it's Xbox Live. Gamers have to continue playing your XBOX games
2. Informative lock screen and auto- hidden talked about a portable Xbox for years—this on the phone (we don’t know right now
top status bar is the most logical way to do it. The N-Gage if you can play all of them) but also
was ahead of its time. The DS and PSP are that it remembers you across plat-
3. Good Office integration and support the past. The iPhone showed us that the forms so you can pick up where you
4. Bing search page and functionality
future of mobile gaming was going to be on left off when at home in front of your
your phone, and now that just got a lot XBOX. In a sense, this is what Sony
5. Easy setup for Google, Windows Live, more interesting. The potential's there, and has been trying to achieve with the
Yahoo! Mail, and others hopefully the games will be plentiful and PSP/PS3 hook up, but with all the oth-
awesome enough to meet it. er mobile bits added.
6. Functional QWERTY keyboard
Forget Flight Control, how about full on If the 7 can be an awesome entertain-
7. Cool camera software
XBOX action on your phone? The graphics ment platform as well as the business
8. Tell me voice search look up to it and the game levels, credits platform of Microsoft’s heritage, this
and achievements will be recorded against could be amazing.
9. Powerful Outlook email, calendar, and
your live profile.
contacts client
This cross performance works on a num-
10. Zune HD functionality

3
October 2010

Over the air Sync : Mesh

A piece of interface that's shockingly not there: A together. The iPhone gets better but doesn’t perfectly inte-
desktop syncing app. If anyone would be expected to grate my Google life. Nor does Android completely – Gmail,
tie their phone to a desktop, you'd think it'd be Mi- Google apps yes but other accounts like Google Finance
crosoft, but they're actually moving forward here. All of still don’t hook up.
your contacts and info sync over the air. The only
Microsoft is the sleeping giant. Historically not as good
thing you'll be syncing through your computer is music looking as Apple, and not as fast as Google. The phone 7 is
and videos, which is mercifully done via the Zune
the show piece if not the Centre piece of their empire which
desktop client's
will help them back on the path to greatness.
Microsoft’s plans to sync your life across channels Of course we assume that Microsoft can get the hardware
and platforms seems a little ahead of its time but
right. We have seen some great things, beautiful graphics,
with the 7, finally everything comes into place. Music,
great games but will the hardware be up to it? Multi tasking
work, games, contacts all come of age in one place. is not coming which is probably a smart reason to manage
What we forget is that Microsoft has all the compo- the hardware drain. No doubt they will be working hard to
nent parts to serve my digital life. Email, Search, Gam- find the right partners to deliver the best handset possible.
ing, Music. Until now some of those have been a bit A glitch in the hardware could be the undoing of such great
crap, the Zune didn’t really inspire, don’t get me start- potential.
ed on Vista and pre Bing, search wasn’t too hot either.
Until we start to see handsets in the wild, I will remain with
Roll forward a year and Windows plans are coming my view that this is the iPhone Killer.
together. With the phone the potential Centre of my
digital universe I tend to gravitate to the platform that
gives me the greatest experience to hook them all

FINAL COMMENTS WHAT IS STILL MISSING?

We have assumed here that Microsoft can get the hardware right.
The two most obvious glaring issues are the lack of
We have seen some great things, beautiful graphics, and great copy-paste and the limited multi-tasking. You can al-
games but will the hardware be up to it? Multi tasking is not com- ready select a word and use the cursor so it shouldn’t be
ing which is probably a smart reason to manage the hardware that much effort for Microsoft to get some developers
drain. No doubt they will be working hard to find the right partners locked into a room to figure out copy-paste on WP7
to deliver the best handset possible. A glitch in the hardware
Just like the previous versions of the iPhone, you can
could be the undoing of such great potential.
have native apps running in the background so you
Until we start to see handsets in the wild, we can safely assume could listen to Zune HD streaming content while surfing
that this is the iPhone Killer. the web and receiving emails on the go.

There are several other areas that need work, such as


REFERENCE the games in Xbox Live, Twitter support, 3rd party apps,
HTTP://W W W .MIC R OSOF T.C OM/W INDOW SMOB ILE/ E N -US/
and more. However, the OS is quite refined and con-
C MPNW INDOW SPHONE7/DEFA UL T.MSPX
sistent and I think people are going to be quite happy
H TTP :/ / TH EN EX TW EB .C O M/ MO B ILE/ 20 10/ 03/ 16/ 7 -R EA S O N S -W IN D O W S
-7-PHONE-IPHONE-KILLER/ with it when it rolls out later this year.
HTTP://D EVELOP ER .W INDOW SPHONE.C OM/W INDOW S - PHONE-7/

4
October 2010

WEAR UR WORLD (6 SENSE) th

By C.Saravanan, N.Veeramani(3rd yr,CSE)

 Sixth Sense is a wearable gestural interface that augments the physical world
around us with digital information and lets us use natural hand gestures to
interact with that information.
 It was developed by Pranav Mistry, a PhD student in the Fluid Interfaces
Group at the MIT Media Lab.
 Sixth Sense bridges the gap by bringing intangible, digital information out into
the tangible world, and allowing us to interact with this information via natu-
ral hand
 Sixth Sense comprises a pocket projector, a mirror and a camera. The hard-
ware components are coupled in a pendant like mobile wearable device

COMPONENTS
The hardware components are coupled in a pendant like mobile wearable
device.

 Camera
 Projector
 Mirror
 Mobile Component
 Colored Markers

CAMERA PROJECTOR
 The projector pro-
 Captures an object in view
jects visual infor-
and tracks the user’s hand
mation enabling sur-
gestures
faces and physical
 It sends the data to smart
objects to be used as
phone
interfaces  A tiny LED projector
 It acts as a digital eye, con-
 The project itself displays data sent
necting you to the world of contains a battery from the smart
digital information inside, with 3 hours
phone on any sur-
of battery life.
face in view–object,
wall, or person.

5
October 2010

W E A R U R W O R L D ( 6 th S E N S E )

MIRROR

The usage of the mirror is significant as the projector dangles pointing


downwards from the neck.

SMART PHONE
A Web-enabled smart phone in the user’s pocket processes the video data Oth-
er software searches the Web and interprets the hand gestures

COLOR MARKERS
 It is at the tip of the user’s fingers .
 Marking the user’s fingers with red, yellow, green, and blue tape helps the webcam recognize gestures.
 The movements and arrangements of these makers are interpreted into gestures that act as interaction
instructions for the projected application interfaces.

HOW IT WORKS

 The hardware that makes Sixth Sense work is a pendant like mobile wearable interface
 It has a camera, a mirror and a projector and is connected wirelessly to a Bluetooth smart phone that can slip com-
fortably into one’s pocket

6
October 2010

 The camera recognizes individuals, images, pictures, gestures one makes with their hands
Information is sent to the Smartphone for processing
 The downward-facing projector projects the output image on to the mirror
 Mirror reflects image on to the desired surface
 Thus, digital information is freed from its confines and placed in the physical world.

SOME EXAMPLE APPLICATIONS

ADVANTAGES
 Portable
 Supports multi-touch and multi-user interaction
 Cost effective
 It is an open source

Reference:
http://www.freshcreation.com/entry/sixth_sense_technology/
http://theviewspaper.net/sixth-sense-technology-will-revolutionize-the-world/
http://www.ted.com/talks/pattie_maes_demos_the_sixth_sense.html
http://gizmodo.com/5167790/sixth-sense-technology-may-change-how-we-look-at-the-world-forever
http://boingboing.net/2009/11/12/sixth-sense-technolo.html

7
October 2010

MICROSOFT SQL SERVER 2008


By Mallica(3rd yr., CSE)

Microsoft SQL Server is a relational model database server produced by


Microsoft. Its primary query languages are T-SQL and ANSI SQL.

The current version of file, document, spatial, etc. gration of the data visuali-
SQL Server, SQL Server 2008 as well as perform search, zation products from Dun-
was released (RTM) on Au- query, analysis, sharing, and das Data Visualization Inc.,
gust 6, 2008 and aims to synchronization across all which was acquired by Mi-
make data management data types. crosoft. On the manage-
self-tuning, self organizing, ment side, SQL Server 2008
and self maintaining with SQL Server includes includes the Declarative
the development of SQL better compression fea- Management Framework
Server Always On technolo- tures, which also helps in which allows configuring
gies, to provide near-zero improving scalability. It en- policies and constraints, on
downtime. SQL Server 2008 hanced the indexing algo- the entire database or cer-
also includes support for rithms and introduced the tain tables. The version of
str uc tur ed a nd se mi- notion of filtered indexes. It SQL Server Management
structured data, including also includes Resource Gov- Studio included with SQL
digital media formats for ernor that allows reserving Server 2008 supports Intel-
pictures, audio, video and resources for certain users or liSense for SQL queries
other multimedia data. In workflows. It also includes against a SQL Server 2008
current versions, such multi- capabilities for transparent Database Engine. SQL Serv-
media data can be stored encryption of data (TDE) as er 2008 also makes the da-
as BLOBs (binary large ob- well as compression of tabases available via Win-
jects), but they are generic backups SQL Server 2008 dows PowerShell providers
bit streams. Intrinsic aware- supports the ADO.NET Entity and management function-
ness of multimedia data will Framework and the report- ality available as Cmdlets,
allow specialized functions ing tools, replication, and so that the server and all
to be performed on them. data definition will be built the running instances can
SQL Server 2008 can be a around the Entity Data be managed from Windows
data storage backend for Model. SQL Server Reporting PowerShell.
different varieties of data: Services will gain charting
XML, email, time/calendar, capabilities from the inte-

Performance Data Collector


Performance Data Collector time consuming one. To Overcome By using this feature you are getting
is one of the new features that’s this MS has added Performance data the data in standard format and stor-
accompanied from SQL Server collector feature in SQL 2008. In a ing it in relational format, so it will be
2008. It’s very hard to get perfor- Nutshell performance data collector
easy to correlate the data. Moreover
mance data from necessary in- will collect performance data
puts. We will get the data from (integrating all your data from your it will allow the data to be stored in
Perfmon (system monitor), profil- server), upload it in centralized man- centralized server so you can query
er, DMV etc and correlating this agement data warehouse (MDW) in the single server to see reports of all
data is very hard, implementing relational format and finally allows your server in single location
the same process or scripts you to see reports in graphical for-
across your environment is also mat.

8
October 2010

Availability

This feature is available in the following editions of SQL 2008 and SQL 2008 R2
 Datacentres (only for R2)
 Enterprise
 Standard
 Web
 Workgroup

Data Collector

Before we stepping into configuring Data collector service, we need to configure a centralized
server to store these data. Let’s configure the centralized server no Connect to the server, Ex-
pand Management folder and right click on “Data Collection” and click on “Configure Manage-
ment Data Warehouse Configuring Centralized
Server for Data Collector
Initialization Process

Click next on the welcome screen In this window you have the option for config-
uring the centralized server. Select “ Create or
upgrade a management data warehouse “ op-
tion and click “next”

In this window it will choose your local server as cen- In this window you will be providing necessary
tralized server and you have the option to select the data- permissions to the logins to view or modify data.
base. Either you can use the existing database or you can You can click on individual login and select the role
create a new one. To create new database click on new for that login and click ok. It’s not mandatory to set
button, a new database creation window will be popped the permissions now you can also set it later.
up.

9
October 2010

Role Name Role Description

mdw_admin Has both reader and writer permissions


mdw_reader Provides read access only to view reports
mdw_writer Provides permission to modify and upload data to MDW

At last it will show the summary descrip- Configuring Data collector in instance
tion , if you find everything correct then
Connect to the server, expand management folder and
click on finish to configure the centralized
right click on “Data Warehouse” as shown above.
data warehouse server.
Now it’s time to configure data collector at instance
Version Details Captured level since centralized server is configured and ready to
accept data. Pass the welcome screen.
 Disk Usage
 Query Statistics Select "Set up data collection” in this window to config-
SQL Server 2008
 Server Activity ure data collector. It will capture the following details
into the DB
 Disk Usage
SQL Server 2008 R2  Query Statistics
 Server Activity
 Utility Information

Once information is provided you will be


shown with the summary details of the config-
uration you have chosen. If you found it’s cor-
rect just click on Finish button
In this window select the centralized server and
the data warehouse db. In this case it’s SAGAR-
LAPTOP and Data Collection database. You can
Reference
find one more option here and it’s cache directo-
ry, this will allow the data to be cached to the SQL SERVER 2005 students guide—NIIT
folder and uploading it later. Data collector works
in two modes as follows

10
BETTER SAFE THAN SORRY
(WIFI NETWORK SECURITY)!

-By K.Gautam(3rd yr,CSE)

So you have finally worked your way past all the Network jargons of Ip addresses, SSIDs, access points…etc.
and got your Wi-Fi network up and running, now you may think you are in the clear but you are far from it
unless you have set up some sort of security on your wireless network.
So here is a list of a few techniques that hackers use to get into your wireless network, and how to safeguard
yourself.

1. Sniffing

This is the most simple of all the attacks, simply put an unsecured wireless network can be easily intercepted
and the attacker can easily obtain almost all of your information. This is mainly caused by people with “This
won’t happen to me” attitude.

The solution: The simplest attack has the simplest solution; just make sure you secure your network with
some sort of encryption and a password.

11
2. SPOOFING
network with a stronger wireless
signal and a copied SSID (Access
So you’ve setup your Wi-Fi net-
point name) in the same area as a
work you may notice that the
legitimate network. This causes
computer no longer asks which
unsuspecting computers to auto-
network to connect to , it just
matically connect to the spoofed
automatically connects .This very network instead of the real one.
convenient feature is the basis of
the spoofing attack .

Hackers often attack a wireless


network by simply creating a new

3. Encryption Cracking

This the most difficult attack , hackers try to crack your wireless net-
Conclusion work password by a combination of different techniques ,and as en-
cryption keys become more advanced, hackers also increase their skills
and develop new tools for penetrating even well protected wireless net-
works.
There are numerous ways to crack a wireless network’s encryption, but
even simplistic methods can work. The website WPA Cracker, for exam-
ple, can be used to hit a network
with a brute force dictionary attack
that simply throws random words
These are the most common
methods for hacking into a
at a secured wireless network to try
wireless network, but there and crack it. This method can take
are other methods too, a long time, and sometimes re-
quires luck on the hacker’s part, but
And new methods are being
found everyday so it’s very it is often effective
difficult to be a 100% safe.

That is the bad news; the The first step in protecting yourself from this kind of attack is to use
good news is that unless you WPA encryption or a combination of WPA & AES. WEP, the older en-
happen to be the CEO of a cryption technology, has been completely de-constructed by hackers
multi-billion dollar Company
and is now considered quite easy to crack.
or the Chief Minister of a state
you are very unlikely to be the
target of such a sophisticated The second step is to use a long and completely random password /
attempt to hack into your encryption key , these are really hard to remember but are very hard
system. But still it’s better to
and take a long time to crack.
be safe than sorry, so simple
steps like using a long encryp-
References :
tion key can solve most secu-
rity situations. Makeuseof.com

Lifehacker.com

Wikipedia.org

engadget.com

12
October 2010

CLOUD COMPUTING
By Nitin Goswami (3rd yr., CSE)

the internet. Cloud computing pro-

C loud computing is a model


for enabling convenient ,on demand
viders delivers a common online
application which are accessed by
other web services.
The major cloud service provider -
network access to a shared pool of Microsoft, Google, sales force ,IBM
resources, such as networks, storage, etc.
Applications and services that can be
rapidly provisioned and released
with minimal management effort or
service provider. Cloud computing
provides a new supplement , con-
sumption and delivery model for it
services based on internet. The
term cloud is used as a metaphor for

Architecture
Cloud architecture, the systems architecture of the software systems involved in the delivery of cloud computing, typically
involves multiple cloud components communicating with each other over application programming interfaces, usually web
services.

Need for cloud computing


Key features
To gain a competitive business Agility improves with users' ability to rapidly and inexpensively re-
edge ,small and medium scale provision technological infrastructure resources.
enterprises ,which have a work
force of 10 to 15 employees or
Cost is claimed to be greatly reduced and capital expenditure is convert-
more need to have an it infra-
ed to operational expenditure. This ostensibly lowers barriers to entry, as
structure that is scala-
infrastructure is typically provided by a third-party and does not need to
ble ,reliable and efficient as
be purchased for one-time or infrequent intensive computing tasks. Pric-
that of large scale enterprises.
ing on a utility computing basis is fine-grained with usage-based options
Smes face various issues in and fewer IT skills are required for implementation (in-house).
terms of cost and knowledge
for setting up such a large en-
terprise network. There- Device and location independence enable users to access systems
fore ,both smes and large en-
using a web browser regardless of their location or what device they are
terprises came up with the
using (e.g., PC, mobile). As infrastructure is off-site (typically provided
solution of new concept of
by a third-party) and accessed via the Internet, users can connect from
cloud computing.in cloud com-
puting the customer need not
anywhere .
have to invest in the physical
infrastructure instead they can
consume the resources as a Multi-tenancy enables sharing of resources and costs across a large
service on demand. They can pool of users thus allowing for:
pay only on the usage basis.  Centralization of infrastructure in locations with lower costs (such
as real estate, electricity, etc.)
 Peak-load capacity increases (users need not engineer for highest
possible load-levels)
Utilization and efficiency improvements for systems that are often
only 10–20% utilized.
13
October 2010

Service providers

Google

It offers various cloud


computing services that
come in form of Google
app, which is a saas cloud
computing service.
Google app provides a
fully integrated applica-
tion environment that
enables a user to host
their own web applica-
tion. Google provides fol-
lowing web applications
like-
Gmail for messaging
Caption describing picture or graphic
Gtalk for instant mes-
saging and voice over in-
ternet
Google docs for docu-
ment sharing
Reliability is improved if multiple redundant sites are used, which
makes well designed cloud computing suitable for business continuity
and disaster recovery. Nonetheless, many major cloud computing ser-
vices have suffered outages, and IT and business managers can at times
do little when they are affected.

Scalability via dynamic ("on-demand") provisioning of resources on a


fine-grained, self-service basis near real-time, without users having to
engineer for peak loads. Performance is monitored, and consistent and
loosely coupled architectures are constructed using web services as the
system interface. One of the most important new methods for overcom-
ing performance bottlenecks for a large class of applications is data par-
allel programming on a distributed data grid.
Maintenance cloud computing applications are easier to maintain,
since they don't have to be installed on each user's computer. They are
easier to support and to improve since the changes reach the clients
instantly.
Metering cloud computing resources usage should be measurable and
should be metered per client and application on daily, weekly, monthly,
and annual basis. This will enable clients on choosing the vendor cloud
on cost and reliability (QoS)

14
October 2010

Microsoft
complexity of security is greatly
MS has developed win- Security could improve due to increased when data is distribut-
dows azure platform centralization of data, increased ed over a wider area and / or
(azure) which is an inter- security-focused resources, etc., number of devices.
net-scale cloud services but concerns can persist about
platform. Subscribing to loss of control over certain sensi-
tive data, and the lack of security
azure ,a user need not
for stored kernels. Security is of-
buy the software /
ten as good as or better than un-
applications for develop-
der traditional systems, in part
ing the customized appli-
because providers are able to de-
cations for its customers,
vote resources to solving security
thereby reduces the cost. issues that many customers can-
Microsoft also offers not afford. Providers typically log
cloud applications ready accesses, but accessing the audit Cloud Computing Models
for use by customers logs themselves can be difficult or
such as windows live, Mi- impossible. Furthermore, the
crosoft dynamics, other
online services. Software as Service Infrastructure as a service

The iaas model enables a user to


The saas model enables a user use it infrastructure such as hard-
to use the software or applica- ware, storage, networking as a ser-
tion as a service on demand by vice. The various service that are
using the internet. provided by iaas are amazon
ec2,gogrid etc.
Growth of cloud computing Platform as a service
The paas model enables a Thus ,cloud computing is an
user to use a hosting envi- emerging technology which is
ronment for their applica- increasing in present scenario
tions. The various services that will enable user ,small
that are provided by the scale enterprises as well as
paas model are Ap- large scale enterprise to attain
pExchange, Facebook, ama- a huge profit in terms of cost
zon web services ,windows and infrastructure. Hats why
azure platform and Google cloud computing is being
app engine. called as

Next generation computing

Reference:

Cloud computing – next generation computing environment student guide.


15
October 2010

Wireless LAN Security By Monika(3rd yr,CSE)

MAC Filtering One issue with corporate wireless networks in general,


and WLANs in particular, involves the need for security. Many ear-
In computer network-
ing, MAC Filtering (or ly access points could not discern whether or not a particular user
EUI filtering, or layer had authorization to access the network. Although this problem re-
2 address filtering) re- flects issues that have long troubled many types of wired networks (it
fers to a security access
control methodology has been possible in the past for individuals to plug computers into
whereby the 48-bit ad- randomly available Ethernet jacks and get access to a local network),
dress assigned to this did not usually pose a significant problem, since many organiza-
each network card is
used to determine access tions had reasonably good physical security. However, the fact that
to the network. radio signals bleed outside of buildings and across property lines
MAC addresses are makes physical security largely irrelevant to Piggy backers. Such cor-
uniquely assigned to
each card, so using MAC porate issues are covered in wireless security.
filtering on a network
permits and denies net-
work access to specific Security Options
devices through the use
of blacklists and white
lists. While the re- There are three principal ways to secure a wireless network.
striction of network ac-
cess through the use of For closed networks (like home users and organizations)
lists is straightforward, the most common way is to configure access restrictions in the access
an individual person is
not identified by a MAC
points. Those restrictions may include encryption and checks
address, rather a device on MAC address. Another option is to disable ESSID broadcasting,
only, so an authorized making the access point difficult for outsiders to detect. Wireless In-
person will need to have trusion Prevention Systems can be used to provide wireless LAN se-
a white list entry for curity in this network model.
each device that he or
she would use to access
the network. For commercial providers, hotspots, and large organiza-
While giving a wireless tions, the preferred solution is often to an open and unencrypted, but
network some additional completely isolated wireless network. The users will at first have no
protection, MAC Filter- access to the Internet nor to any local network resources. Commercial
ing can be circumvented
by scanning a valid MAC
providers usually forward all web traffic to a captive portal which
(via airodump-ng) and provides for payment and/or authorization. Another solution is to
then changing the own require the users to connect securely to a privileged network us-
MAC into a validated ing VPN.
one. This can be done in
the Windows Registry or
by using command line Wireless networks are less secure than wired ones; in
tools on a Linux plat- many offices intruders can easily visit and hook up their own com-
form. puter to the wired network without problems, gaining access to the
network, and it's also often possible for remote intruders to gain ac-
cess to the network through backdoors like Back Orifice. One general
solution may be end-to-end encryption, with independent authenti-
cation on all resources that shouldn't be available to the public.

Reference
www.wardrive.net

www.sans.org/reading_room/../wireless-lan-security-issues-solutions_1009

16
October 2010

Google’s Web Browser


By V.Vinoth, D.Ashok kumar(3rd yr,CSE)

Chrome the web browser from Google is touted to be the fastest web
browser . It is based on the open source Chromium project . It uses the Web
kit Layout engine and the V8 JavaScript engine . The first public stable
release was on 11 December 2008. Today chrome is the third most widely
used web browser after Firefox.

Development
Chrome was assembled from 25 different code libraries from Google and third
parties such as Mozilla's Netscape Portable Runtime, Network Security
Services, NPAPI, as well as SQLite and a number of other open-source
projects. The JavaScript virtual machine was considered a sufficiently
important project to be split off. Chrome was one of the first browsers to
include support for HTML 5.

Features
Tabs and Stability Incognito Mode:
Chrome is a process based web browser, i.e. each tab open as an individual process, Chrome is one of the few brows-
so if one of the tabs crash the whole widow does not crash and the other tabs can ers in which the private browsing
remain working mode is totally separate from the
normal mode operation. Both
Security:
windows can be simultaneously
Chrome will show you a warning message when visiting a site that is suspected of used and they operate separately.
containing malware or phishing.
Incognito is the private browsing
A phishing attack takes place when someone masquerades as someone else to trick mode, where all records like his-
you into sharing personal or other sensitive information with them, usually through tory, downloads , etc. are not
a fake website. Malware, on the other hand, is software installed on your machine saved not beyond the current
often without your knowledge, and is designed to harm your computer or session.
potentially steal information from your computer.

Sandboxing helps prevent malware from installing itself on the computer or using
what happens in one browser tab to affect what happens in another. The sandbox
adds an additional layer of protection to your browser by protecting against
malicious web pages that try to leave programs on your computer, monitor your
web activities, or steal private information from your hard drive

Automatic web page translation


Starting with Google Chrome 4.1 the application added a built-in translation bar
Reference :
using Google Translate. Translation is currently available for 52 languages http://www.google.com/chrome .

Omni bar http://chrome.blogspot.com/

http://en.wikipedia.org/wiki/
This is one of the best features if chrome , instead of having a separate box for
Google_Chrome
searching and for the URL , chrome combines both for usability and speed.

17
October 2010

Computer Security
By Akash Goswami(3rd yr,CSE)

It is a dangerous world, even for the computers that sit in our offices. Bad
things can happen.

Some bad things happen because computers are pieces of machinery. Parts
can break, wear out, choke on dust and dirt, or simply quit working for mysteri-
ous reasons. That’s why the smart computer user frequently backs up all the
critical data on the hard drives. Programs can be reinstalled, but membership
lists, financial records, congregation council minutes, and other data have to be
saved in several places to avoid disaster. Computers are pieces of machinery,
and they will fail.

Viruses Spam BX316.dll. Fatal opera- the past month and


tion error.” leaves the computer
and More A virus has wormed its on. Someone else
way from the council sec- walks by and finds the
But there are other retary’s disk to the giving records of
threats to church com- church’s computer. members displayed on
puters. Here’s another problem the screen. The temp-
Consider this. Your scenario. This time the tation is strong to
church council secretary disk inserted by the scroll through and see
rushes in one hour before council secretary isn’t just whether Mrs. Hob-
the monthly meeting. “I infected. But after saving son is as generous as
didn’t have time to print the minutes, he decides she says she is.
out the minutes,” he says, to do a little web surfing Casual use of church
pulling a floppy disk out of while waiting for the computers can destroy
his pocket. “And I need to printout. He checks the information, get the
make one final correc- trash pickup days at the church on spammers’
tion.” He inserts the disk town’s Web site, then lists, and create pasto-
into the church’s comput- follows a link about recy- ral problems.
er and finishes the work cling. This leads him to a
so that the council can couple of additional sites.
have the corrected Then he signs off, after
minutes. sending a quick e-mail to
The next morning the of- a colleague at work
fice secretary turns on the about tomorrow’s lunch-
computer. The disk drives eon meeting.
whirr and whirr, but noth- Before long, the church’s
ing comes up on the e-mail inbox is crammed
screen. Or she boots the with spam; strange, of-
computer, calls up the fensive, and unwanted
monthly income report missives from places with
and the computer shuts weird names.
down, displaying the One more horror story.
dreaded “blue screen of The financial secretary
death” with the message checks the spread sheet
“unable to retrieve showing the income for

18
October 2010

COMPUTER SECURITY

How to Protect
It is not hard to protect an anti-virus program server from unauthorized
church computers first to make sure it is not use.
from most of these infected. There is a dark side to
problems. Everyone who uses computer security, for it
Access to the computers church computers means that we have to
must be restricted. Sec- should be instructed to think about whether
retaries and others au- avoid casual Web surf- church computer users
thorized to use the ing. Build a list of neces- will do unacceptable or
church computers sary sites — the ELCA dangerous things. We
should be required to and synod Web sites, don’t like to operate on
sign on with passwords local agencies, and oth- the basis of suspicion.
and instructed not to let er places useful to the But the goal of computer
anyone else use their congregation’s work and security is to protect the
password. known to be safe to visit. church’s equipment and
“Drop-in” use by church Enforce the no-surfing data and preserve the
officers or members policy. There are numer- confidentiality of neces-
should be prohibited, ous stories about occa- sary records. Churches
unless the church has a sions when people em- should develop a poli-
separate computer for barrassed themselves, cy on who uses their
that purpose, not linked their employers, and computers and for
with any critical office their churches by inap- what reasons. This can
machine. propriate use of the protect data from vi-
Computers that are computer. ruses and other en-
online should be protect- You might want to install croachments and
ed with a “firewall” that a filter or program that avoid the serious prob-
offers some protection monitors online usage to lems that can occur if
against known viruses spot potential problems. someone uses the
and “worms” that hide in Access to critical and church computer for
e-mail and on internet confidential data should unauthorized purposes
sites. Norton Utilities® be protected by a double
and similar programs password, and all au-
can keep out many vi- thorized users should be
ruses; but the programs instructed on how to ac-
must be purchased, in- cess the data without
stalled, and maintained inadvertently leaving it
to keep the list of virus open to others.
infections updated. This If churches use “servers”
usually requires an an- to store data and make it
nual subscription. accessible from several
If it is necessary to insert sites, you might need
a “foreign” disk in a the advice of a computer
church computer, it specialist to protect the
should be scanned by

Reference:
http://en.wikipedia.org/wiki/Computer_security

http://www.unixtools.com/security.html

http://communications-solutions.com/security/computer-security-guide

19
October 2010

VIRTUALITY
By sumit banerjee (be.cse.3rd yr)

The word virtual refers to not being real


Application of VR it’s the presentation of reality or imagina-
The range of possible VR tion. Previously it was only the part of peo-
application is vast and var- ple’s thinking but as the development of
ied. Here are just a few the technology virtuality took the wide
example of projects carried
part in creation & development of what
out recently in development
at the CRVM that really exist in world or only in imagi-
nation.
Industrial application

-Design studies VIRTUAL REALITY


-computer Aided design

-Ergonomic validation
Virtual reality (VR) it’s a term or technology that basically defined as computerized
Research application simulated environment that can simulate places in the real as well as imaginary
-Behavioral sciences: mod- worlds. Two major aspects of VR are:
eling human behavior by
manipulating sensory infor- 1) Visualization is immersive, since the goal is to give the User the sensation
mation. of being really in virtual world.
-psycho-pharmacological 2) The user is able to interact in “real-time” with this environment.
research
User can interact with a virtual environment either through the use of standard in-
Teaching Applications
put devices such as a keyboard and mouse or through multimodal devices such as
-Teaching and learning
aids: visualization and vir-
tual explo- Terms supporting virtual reality
ration of our solar system,
virtual reconstruction and There are many devices that are use for virtual sensation like 3D visualization,
visits of ancient architec-
holography, virtual caves, etc.
tural sites.

-scientific visualization
3D visualization
Therapeutic application

-Cyber-therapy: treatment The 3D visualization can be more easily understand by taking 3D films in ac-
of phobias, depression, count.
anxiety where patient are
kept in virtual environ- A 3D film or S3D (stereoscopic 3D) film is a motion picture that enhances the illu-
ment to relax there brain. sion of depth perception. Derived from stereoscopic photography, a special mo-
-Motor-therapy through tion picture camera system is used to record the images as seen from two per-
sport: Virtual squash where spectives and special projection hardware and/or eyewear are use to provide the
the ball speed is matched to illusion of depth when viewing.
the patient’s disability.

20
October 2010

Virtuality

Technique used in 3D view New system without glasses


There is increasing
Anaglyph images were ing filters oriented differ-
emergence of new 3D
the earliest method of ently. As each filter pass-
viewing systems which
presenting theatrical 3D. es only that light which is
do not require the use of
similarly polarized and
Now polarization system special viewing glasses.
blocks the light polarized
is used to present a stere- They are referred to
differently each eye sees
oscopic motion picture,
a different image. Since As Auto stereoscopic
here two images are pro-
no head tracking is in- LCD displays.
jected superimposed onto
volved, the entire audi-
the same screen through
different polarizing fil-
ence can view the stereo- Technology
scopic images at the same
ters. The viewer wears
time
eyeglasses which also A lifelike visual display is
contain a pair of polariz- created by projectors
VR caves positioned outside the
Holography It is an immersive vir-
cave and controlled by
physical movements
tual reality environ-
It is a technique that from a seer inside the
ment where the projec-
allows the light scat- cave. Stereoscopic LCD
tors are directed to
tered from an object to shutter glasses convey a
three, four, five or six
be recorded and later 3D image. The comput-
of the walls of a room-
reconstructed so that it ers rapidly generate a
sized cube where a
appears as if the object pair of images, one for
viewer contemplates
is in the same position each of the user’s eye.
relative to recording perception, reality and
The glasses are synchro-
illusion.
medium as it was when nized with the projectors
recorded. The image so that each eye only sees
changes as the position Application the correct image.
and orientation of the
viewing system chang-
The caves are currently being used in a
es in exactly the same
variety of fields.
way as if the object
were still present, thus -many engineering companies use CAVEs Visual effect
making the recorded to enhance product development.
image appears three Visual effects (commonly shortened to
-prototype of parts can be created and
dimensional. Visual F/X or VFX) are the various
tested
processes by which imagery is created
It has a wide range of and/or manipulated outside the context
-Factory layout can be simulated
application. of a live action shoot. Visual effects often
-In gaming involve the integration of live-action foot-
age and computer generated imagery
(CGI) in order to create environments
which look realistic, but would be dan-
gerous, costly, or simply impossible to
capture on film. They have become in-
creasingly common in big-budget films,
and have also recently become accessible
to the amateur filmmaker with the intro-
duction of affordable animation and
compositing software.

21
October 2010

Virtuality

Chroma key compositing


Chroma key compositing (or weather forecast broadcasts, video. This also works for green
Chroma keying) is a technique wherein the presenter appears to screens, since blue and green are
for compositing two images or be standing in front of a large considered the colors least like skin
frames together in which a color map, but in the studio it is actu- tone. This technique is also used in
(or a small color range) from one ally a large blue or green back- the entertainment industry, the
image is removed (or made ground. The meteorologist stands iconic theatre shots in Mystery Sci-
transparent), revealing another in front of a blue screen, and ence Theater 3000, for example
image behind it. This technique then different weather maps are
is also referred to as color key- added on those parts in the im-
ing, color-separation over- age where the color is blue. If the
lay (CSO; primarily by the meteorologist himself wears blue
BBC), green screen, and blue clothes, his clothes will become
screen. It is commonly used for replaced with the background

Virtual world
manipulate elements of sure activities. Commu-
A virtual world is a nication is usually textu-
genre of online commu- the modeled world and
thus experien ces al, with real-time voice
nity that often takes the communication using
form of a computer- telepresence to a cer-
tain degree. Such mod- VOIP also possible.
based simulated envi- Virtual worlds are not
ro nment , t h ro u gh eled worlds may appear
similar to the real world limited to games but,
which users can inter-
act with one another or instead depict fanta- depending on the degree
and use and create ob- sy worlds. The model of immediacy presented,
jects .Virtual worlds are world may simulate can encompass computer
intended for its users to rules based on the real
conferencing and text
inhabit and interact, world or some hybrid
fantasy world. Example based chat rooms. Some-
and the term today has
become largely synony- rules are gravity, topog- times, emoticons or
mous with interactive raphy, locomotion, real 'smiles' are available, to
3D virtual environ- -time actions, and com- show feeling or facial ex-
ments, where the users munication. Communi-
pression. Emoticons of-
take the form of avatars cation between users
has ranged from text, ten have a keyboard
visible to others graph-
graphical icons, visual shortcut. Edward Castro cave. Stereoscopic LCD
ically. These avatars are
usually depicted as tex- gesture, sound, and nova is an economist who shutter glasses convey a
tual, two-dimensional, rarely, forms using has argued that 3D image. The comput-
or three-dimensional touch, voice command, ers rapidly generate a
"synthetic worlds" is a
graphical representa- and balance senses.
better term for these cy- pair of images, one for
tions, although other Massively multiplayer
online games common- berspaces, but this term each of the user’s eye.
forms are possible
(auditory and touch ly depict a world very has not been widely The glasses are synchro-
sensations for exam- similar to the real adopted. nized with the projectors
ple). Some, but not all, world, with real world so that each eye only sees
virtual worlds allow for rules and real-time ac- A lifelike visual display is
the correct image.
multiple users. tions, and communica- created by projectors
The computer accesses tion. Players create a positioned outside the
a computer-simulated character to travel be-
cave and controlled by
world and presents per- tween buildings, towns,
and even worlds to car- physical movements
ceptual stimuli to the
user, who in turn can ry out business or lei- from a seer inside the

22
October 2010

Virtuality

Virtual world concepts


One perception of virtual As virtual world is a fairly example).
worlds requires an online persis- vague and inclusive term, the
tent world, active and available Massively multiplayer online
24 hours a day and seven days a real-life games or MMORLGs,
week, to qualify as a true virtual the user can edit and alter their
world. Although this is possible avatar at will, allowing them to
with smaller virtual worlds, es- play a more dynamic role, or
pecially those that are not actu- multiple roles.
ally online, no massively multi-
player game runs all day, every
day. All the online games listed Virtual worlds are well-known
above include downtime for
as being fantasy spaces sealed
maintenance that is not included
as time passing in the virtual off from the real world, but
world. While the interaction more careful analysis reveals
with other participants is done that the boundaries between the
in real-time, time consistency is above can generally be divided real and virtual worlds are quite
not always maintained in online along a spectrum ranging from: porous.
virtual worlds. For example, Ev- Massively multiplayer online role
-playing games or MMORPGs Reference :
er Quest time passes faster than
real-time despite using the same where the user playing a specific http://virtualityconference.it/
calendar and time units to pre- character is a main feature of the
game (World Of War craft for http://en.wikipedia.org/wiki/Virtual_reality
sent game time.

Do You Know?
1. The human heart creates enough pressure while 15. The ant can lift 50 times its own weight, can pull
pumping to squirt blood 30 feet. 30 times its own weight and always falls over on its
2. On average people fear spiders more than they do right side when intoxicated.
death. 16. Polar bears are left handed.
3. The strongest muscle in the body is the TONGUE. 17. The catfish has over 27,000 taste buds, that
4. it’s impossible to sneeze with your eyes open. makes the catfish rank #1 for animal having the
most taste buds.
5. Americans on the average eat 18 acres of pizza every
day. 18. The flea can jump 350 times its body length, that
is like a human jumping the length of a football
6. Did you know that you are more likely to be killed field.
by a champagne cork than by a poisonous spider?
19. Butterflies taste with their feet.
7. Right-handed people live, on average, nine years
longer than left-handed people do. 20. It is impossible to sneeze and keep ones eye's
open at the same time.
8. In ancient Egypt, Priests plucked EVERY hair from
their bodies, including their eyebrows and eyelashes. 21. Elephants are the only animals that can't jump.
9. The dot on top of the letter 'i' is called a tittle. 22. A cat's urine glows under a black light.
10. A "hairbreadth away" is 1/48 of an inch. 23. An ostrich's eye is bigger than it's brain.
11. The word four has four letters. In the English lan- 24. Cockroaches can change course as many as 25
guage there is no other number whose number of let- times in one second, making them the most nimble
ters is equal to its value. animals known.
12. The king of hearts is the only king without a mous- 25. Mosquitoes do not bite. They stab. A mosquito
tache. has no jaws, hence when attacking a victim; it pierc-
es it with its long proboscis and sucks the blood up
13. No piece of square dry paper can be folded more through its nasal tube.
than 7 times in half.
26. Starfishes haven't got brains.
14. A crocodile cannot stick its tongue out.
By Monika (1st yr,CSE)
23
October 2010

PUZZLES -by Mallica(3rd yr,CSE)

1. Can you find four numbers such that the sum of every two and sum of all four may be
perfect squares?
2. A cubic object 3"*3"*3" is painted blue on all the outside cubic surfaces ,including the top
and bottom .if the cube is cut into 27 cubes of 1"*1"*1".how many 1" cubes do have any
painted surfaces?
3. How can you make a total of 1,000 by using sixteen 4's?
4. The shape shown in sketch below is a square attached to half of
another similar square ,divided diagonally:

5. How will you write 31 using only digit 3 five times?


6. A man decided to drive through the city and on the first day he did only 7 miles. On the last
day he did 51 miles ,increasing his journey 4 miles each day. How many days did he travel
and how far?
7. Which would you say is heavier, a pound of cotton or a pound of gold?
8. There is a number which is very peculiar, this number is three times the sum of its digits .Can
you find the number?
9. There is a number ,the second digit of which is smaller than its first digit by 4,and if the
number was divided by the digit's sum ,the quotient would be 7. What will be the number?
10. There is a number which is greater than the aggregate of its third, tenth and twelth parts by
58.Find the number?

MICROSOFT The Simplifier


Chorus:-
Nine-tenths of a gig, Am happy that you came into my life,
Biggest ever seen, You made my world very bright;
God, this program is big-- I don’t think I can ever live with out you,
MS Word 15! Because you’re the backbone of my life;
Comes on ten CDs, Stanza 1:-
And requires--damn! You may not be the greatest by looks,
Word is fine, but jeez-- But you are the most stunning creation;
60 megs of RAM?! You may not be as strong as the Hercules,
Oh! Microsoft, Microsoft, But you can solve the Herculean problems;
Bloat ware all the way! Stanza 2:-
I'm installing Word You are the Centre point of my work;
Since breakfast yesterday! You are a citizen of the world;
Oh! Microsoft, Microsoft, Every one loves you very much,
Moderation, please. As you simplify the problems of their world;
Guess you hadn't noticed: Stanza 3:-
Four-gig drives don't grow on trees! These days you’ve even started to think by yourself,
-by NitinGoswami(3rd yr, CSE) Scaling new heights every now and then;
I know it’s not hard to compete with you,
But now I am in love with you;
- Venkateshwar.R (3rd yr, CSE)

24
October 2010

Secret of Fast Maths By NitinGoswami(3rd yr,CSE)

(Lea rn how to ca lcu lat e f ast er tha n t he spe edin g c alc ula tor )

"Is there an easy way to calculate ? "


I am sure you must have asked this question at least once in your life .
Have you ever wondered why some people are so good at number
crunching while others find it difficult to add even single di gits cor-
rect ly or without straining their mind.
Just Relax and Cheer Up !!
Today I am about to tell you the Secret of Fast er Maths. I will teach
you some of the Easy Calculation Tricks of fast er Math.

It's a well known fact that the Human Brain i s v ery similar to a com-
puter.
B ra i n =Hardware of computer. Comparable to CPU.
Mind =Software. Comparable to an Operatin g System (like windows
XP, Linux or whichever you find best)
Our mind needs various drivers ( programs ) to run its various facul-
ties. Those are stored in our memory. Some brains come right out of
the pack with correct p rograms in stalled. Thus they can crunch the
numbers at optimum speed.
Now you must be getting eager to ask " What about the brain that did-
n't come with the right program installed ? " Relax !! The solution is
very easy. You just have to update the brain once . That's it.

Tips for fast Mathematics


Multiply up to 19x19 in you head
Quick Square
If you need to square a 2 digit number ending in 5, you can do so This is a useful bit of mental arithmetic that is worth re-
very easily with this trick. Multiply the first digit by itself + 1, and membering, it allows you multiply up to 19 x 19 without
put 25 on the end. That is all! the use of a calculator or paper and pencil.
252 = (2x(2+1)) & 25
2x3=6 For example consider 19 x 17. Imagine the larger number
625 on the top row and take the last digit of the lower number
Multiply by 9 ie. 7 and add it to 19. 19 + 7 =26.
This one is simple – to multiple any number between 1 and 9 by 9
hold both hands in front of your face – drop the finger that corre-
sponds to the number you are multiplying (for example 9×3 – drop Multiply the 26 x 10 = 260.Take the unit digits (9 x 7) = 63
your third finger) – count the fingers before the dropped finger (in and add them to the 260
the case of 9×3 it is 2) then count the numbers after (in this case 7)
– the answer is 27. 260 + 63 = 323.
Multiplication of Larger Numbers
This trick allows you to multiply large numbers together by using simple multiplication and addi-
tions. To take a simple example, if we want to multiply 26 by 72. We write the numbers down in
the normal way.
26
72
Each of the numbers can be thought of being in one of four cells arranged in a square.
2 6
7 2
The first step is to multiply the digits in the first column. (6 x 2 = 12)
If there it is greater than 9 remember the value of the tens digits. In this case write down the 2 and
remember the 1.
Multiply the two diagonals and add them together. So from the top left to the bottom right and the
bottom left and top right. (2 x 2) + (6 x 7) = 4 + 42 = 46. Add the from the last stage = 47. So we
write the 7 and remember the 4.
Finally we multiply the right hand column. (2 x 7) = 14 and add the 4 from the last step. = 18.
Our answer is then 1872.

25
October 2010

Assorted Multiplication Rules


Multiply by 5: Multiply by 10 and divide by 2.
Multiply by 6: Sometimes multiplying by 3 and then 2 is easy.
Multiply by 9: Multiply by 10 and subtract the original number.
Multiply by 12: Multiply by 10 and add twice the original number.
Multiply by 13: Multiply by 3 and add 10 times original number.
Multiply by 14: Multiply by 7 and then multiply by 2
Multiply by 15: Multiply by 10 and add 5 times the original number, as above.
Multiply by 16: You can double four times, if you want to. Or you can multiply by 8 and then by 2.
Multiply by 17: Multiply by 7 and add 10 times original number.
Multiply by 18: Multiply by 20 and subtract twice the original number (which is obvious from the
first step).
Multiply by 19: Multiply by 20 and subtract the original number.
Multiply by 24: Multiply by 8 and then multiply by 3.
Multiply by 27: Multiply by 30 and subtract 3 times the original number (which is obvious from the
first step).
Multiply by 45: Multiply by 50 and subtract 5 times the original number (which is obvious from the
first step).
Multiply by 90: Multiply by 9 (as above) and put a zero on the right.
Multiply by 98: Multiply by 100 and subtract twice the original number.
Multiply by 99: Multiply by 100 and subtract the original number.
Number magic:
Trick 5: 2 Single Digit Numbers
Trick 1: Number below 10
Step1: Think of 2 single digit numbers.
Step1: Think of a number below 10.
Step2: Take any one of the number among them
Step2: Double the number you have thought.
and double it.
Step3: Add 6 with the getting result.
Step3: Add 5 with the result.
Step4: Half the answer, that is divide it by 2.
Step4: Multiply the result with 5.
Step5: Take away the number you have thought from
Step5: Add the second number to the answer.
the answer, that is, subtract the answer from the
Step6: Subtract the answer with 4.
number you have thought.
Step7: Subtract the answer again with 21.
Answer: 3
Answer: 2 Single Digit Numbers.
Trick 2: Any Number
Step1: Think of any number. Trick 6: 1, 2, 4, 5, 7, 8
Step2: Subtract the number you have thought with 1. Step1: Choose a number from 1 to 6.
Step3: Multiply the result with 3. Step2: Multiply the number with 9.
Step4: Add 12 with the result. Step3: Multiply the result with 111.
Step5: Divide the answer by 3. Step4: Multiply the result by 1001.
Step6: Add 5 with the answer. Step5: Divide the answer by 7.
Step7: Take away the number you have thought from Answer: All the above numbers will be present.
the answer, that is, subtract the answer from the
number you have thought. Trick 7: 1089
Answer: 8 Step1: Think of a 3 digit number.
Step2: Arrange the number in descending order.
Trick 3: Any Number Step3: Reverse the number and subtract it with the
Step1: Think of any number. result.
Step2: Multiply the number you have thought with 3. Step4: Remember it and reverse the answer men-
Step3: Add 45 with the result. tally.
Step4: Double the result. Step5: Add it with the result, you have got.
Step5: Divide the answer by 6. Answer: 1089
Step6: Take away the number you have thought from
the answer, that is, subtract the answer from the Trick 8: x7x11x13
number you have thought. Step1: Think of a 3 digit number.
Answer: 15 Step2: Multiply it with x7x11x13.
Ex: Number: 456, Answer: 456456
Trick 4: Same 3 Digit Number
Step1: Think of any 3 digit number, but each of the Trick 9: x3x7x13x37
digits must be the same as. Ex: 333, 666. Step1: Think of a 2 digit number.
Step2: Add up the digits. Step2: Multiply it with x3x7x13x37.
Step3: Divide the 3 digit number with the digits add- Ex: Number: 45, Answer: 454545
ed up.
Answer: 37

26
October 2010

-By v.vignesh pandian (2nd yr, CSE)


Boot Winxp Fast
Follow the following steps:
1. Open notepad.exe, type "del c:\windows\prefetch\ntosboot-*.* /q" (without the quotes) & save as "ntosboot.bat" in c:\
2. From the Start menu, select "Run..." & type "gpedit.msc".
3. Double click "Windows Settings" under "Computer Configuration" and double click again on "Shutdown" in the right window.
4. In the new window, click "add", "Browse", locate your "ntosboot.bat" file & click "Open".
5. Click "OK", "Apply" & "OK" once again to exit.
6. From the Start menu, select "Run..." & type "devmgmt.msc".
7. Double click on "IDE ATA/ATAPI controllers"
8. Right click on "Primary IDE Channel" and select "Properties".
9. Select the "Advanced Settings" tab then on the device or 1 that doesn't have 'device type' greyed out select 'none' instead of
'autodetect' & click "OK".
10. Right click on "Secondary IDE channel", select "Properties" and repeat step 9.
11. Reboot your computer.

How to see hidden files ,using dos? How to backup registry?


solution: solution:
at command prompt just type Before you edit the registry, export the keys in the registry
dir /ah that you plan to edit, or back up the whole registry. If a prob-
lem occurs, you can then follow the steps how-to restore the
if the list is too long u can use
registry to its previous state.
dir /ah/p/w
How to Export Registry Keys?
How to kill microsoft instant messenger? Click Start, and then click Run.
solution:
In the Open box, type regedit, and then click OK.
This will remove Microstufts Instant Messenger (MSN). This
On the File menu, click Export.
wotked in WinXP Pro, but may work on others....
In the Save in box, select the boxs at the bottom the bottom
So, go to START-->RUN copy and paste the following:
according to weather you want to export all or only selected
QUOTE branches of the registry.
RunDll32 advpack.dll,LaunchINFSection %windir% Next select a location in which to save the backup .reg file. In
\INF\msmsgs.inf,BLC.Remove the File name box, type a file name, and then click Save.
Clink ok. No more msn process lwink.gif.

How to fix corrupted files in xp?


solution:
+ Place the xp cd in your cd/dvd drive
+ Go to start
+ run
+ type in 'sfc /scannow' (without the ')
Now it should all load, and fix all your corrupted file on windows XP :)==

27
October 2010

Comp-Confusion SOLUTIONS For PUZZLE

1..The smallest nos are:


a=10430,b=3970,c=2114,d=386
a+b=10430+3970=14400=1202
a+c=10430+2114=12544=1122
a+d=10430+386=10816=1042
b+c=3970+2114=6084=782
b+d=3970+386=4356=662
c+d=2114+386=2500=502

a+b+c+d=10430+3970+2114+386=16900=1302

2. Only one box in the very centre of the stack


will not suffer the strokes of paintbrush,
where as all the other 26 boxes will have atleast
painted one side of the boxes.

3. This can be solved as-


Across Down 444+444+44+44+4+4+4+4+4+4
1 for example: http://
3 the most widely accessed network
www.hwdsb.on.ca/
5 a tasty snack
2 the ettiquette that is followed
7 used to collect data about a user
on
when using a network 4. Divide the fig in 12 equal triangles as shown
4 the terms of service that state
a web page
the safety of your personal in-
below-
8 a service that allows individuals
fo.
with accounts to send messages to
6 the transmitting and receiving of
each other
data
9 a service that lets you up-
10 a service that allows you
load and download files from
to log on to another serv-
one computer to another us-
er
ing the internet
11 a service which handles the
12 a security system which
passing of pages between
keeps out unwanted users
the web
and viruses
13 a person in which goes into other
14 a network that is used by an
organization and can only be ac-
files and accounts without the 5. 33+33+3/3
permission of the user
cessed by certain people
16 a bug in the computer that
15 an elarged form on the intra-
can destroy files and data
net that gives more levels of 6 . 384 miles in 12 days.
access to authorized peoples
17 a service which collects 7. A pound of cotton is heavier than a pound of
data about consumers for gold. Because cotton is 16 ounces and gold is
marketing purposes
-By V.K.Preeti(3rd yr,CSE) 12 ounce
18 illegally copying/ 8. The number is 27. 2+7=9,9*3=27
distributing programs
9. The number is 84
10. The number is 120.

28
October 2010

Vels University
School of Engineering
Department of computer science Engineering
Student’s participation in symposium/workshop/seminar (2010-2011)

Name Year & Events participat- venue Date Prizes won


Section ed
Preeti V.K III Contraption Deus Ex Machina 04.09.10
Year (Velammal Engineering
College) Ist

Junkyard Orbitce 2K10(SSN Col- 01.09.10


wars,Adzap,Dumb lege)
c,Treasure hunt.

Contraption Drestein(Saveetha Engi- 08.09.10 Ist


neering College)

v.vignesh pandi- Code Obfuscation, Dresteing(Saveetha Engi- 08.09.10 --


an Reconstromania neering College)
II
vignesh pandian, Year Treasure hunt
Ajay Benny Adzab A.M.S College of Engi- 16.09.10 --
neering

K.Gautham III Photoshop Drestein(Saveetha Engi- 09.09.10 Ist


year neering College)
V.Vinoth III Answer the sphinx, Drestein(Saveetha Engi- 08.09.10 --
Year d-bug, photoshop neering College)
D.Ashok Kumar
D.Ashok Kumar,
V.Vinoth,
K.Devarajan III Microsoft(Summer Camp)
K.Gautham, Year .Net Live Organised by Microsoft
S.Mallica, Chennai
Nitin Goswami

Nitin Goswami III Year Microsoft Student Cleared Two levels, Con-
Mallica Partner ducted by Microsoft
Chennai

29
October 2010

Name Year & Events participat- Date venue Prizes


section ed won
S.Barath kumar II year Coding , debugging 10-08-09 Technocracy -09 ----
M.Jothi bash cse Coding & (National level
D.Dinesh Coding 11-08-09 symposium)
P.Chandru Coding Satyabama univer-
N.Veeramani Coding ,Gaming sity, Chennai
G.Praveen kumar Coding ,Gaming

S.Santosh kumar II year Coding , debugging 10-08-09 Technocracy -09 -----


CSE & (National level
11-08-09 symposium)
Satyabama univer-
sity, Chennai
K.Gautam II Year Debugging, 03-03-10 Meenakshi
Vinod CSE Adzap, Sundararajan
Ashok Gaming Engineering Col-
Venkateswar lege
Preethi
K.Gautam II year Real-time Engineer- Anand institute of II
V.Vinoth CSE ing higher Technology
Gautam kumar II CSE Microsoft Dreams 12-03-10 Saveetha Dental
S.Mallica Park Yathra College
Nitin Goswami
Devarajan
Ashok kumar
Vinoth vetrivel
Preethi
Monika Sinha
Akash Goswami

K.Gautam II CSE ICT Science City Chen-


V.Vinodh Awareness Camp nai
Nitin Goswami
Vijayakumar I CSE B Gaming Anna university I
Symposium
Nitesh Ranjan I CSE B Paper Presentation 09-04-10 Pravesha 20x III
Vijay I CSE B Treasure Hunt 09-04-10 Pravesha 20x
Vignesh
Jageerthan I CSE A Computer skills 09-04-10 Pravesha 20x
NiginRaj
Harshit dubey I CSE A Paper Presentation 09-04-10 Pravesha 20x III
Lokesh I CSE A Sakthi mariamman
Engg

30
October 2010

Vels University
School of Engineering
Department of computer science Engineering
Student’s participation in symposium/Conference/Workshop/Seminar (July 2009-April 2010)

Name Year & Events participated Date venue Prizes won


section
K.Gautam II CSE ICT 17.03.10 Science City Seminar
V.Vinoth Awareness Camp to Chennai
19.03.10
Nitin Goswami
Vijayakumar I CSE B Gaming Anna university I
Symposium
Nitesh Ranjan I CSE B Paper Presentation 09-04-10 Pravesha 20x III
Vijay I CSE B Treasure Hunt 09-04-10 Pravesha 20x ---
Vignesh
Jageerthan I CSE A Computer skills 09-04-10 Pravesha 20x ---
NiginRaj
Harshit dubey I CSE A Paper Presentation 09-04-10 Pravesha 20x III
Lokesh I CSE A Paper Presenation 10-04-10 Sakthi mari- ---
amman Engg

31
October 2010

Vels University
School of Engineering
Department of computer science Engineering
Student’s participation in symposium/Conference/Workshop/Seminar ( July 2010-Till Date )

Name Year & Events participated venue Date Prizes


Section won
Preeti V.K III Contraption Deus Ex Machina(Velammal 04.09.10
Year Engineering College)
Ist
Orbitce 2K10(SSN College)
Junkyard 01.09.10
wars,Adzap,Dumb
c,Treasure hunt. Drestein(Saveetha Engi-
neering College)
Contraption 08.09.10 Ist

v.vignesh pandi- Code Obfuscation, Recon- Dresteing(Saveetha Engi- 08.09.10 --


an stromania neering College)
II
vignesh pandian, Year Treasure hunt
Ajay Benny Adzab A.M.S College of Engineer- 16.09.10 --
ing
K.Gautham III Photoshop Drestein(Saveetha Engi- 09.09.10 Ist
year neering College)
V.Vinoth III Answer the sphinx, Drestein(Saveetha Engi- 08.09.10 --
Year d-bug, photoshop neering College)
D.Ashok Kumar
D.Ashok Kumar,
V.Vinoth,
K.Devarajan III Microsoft(Summer Camp)
K.Gautham, Year .Net Live Organised by Microsoft
S.Mallica, Chennai
Nitin Goswami

Nitin Goswami III Year Microsoft Student Partner Cleared Two levels, Con-
Mallica ducted by Mi-
crosoft ,Chennai
Gautam III CSE Black hole Seventh Sense 23.09.10 I prize
SRM University
Weblogic Seventh Sense 23.09.10
SRM University

Nitin,mallica, III CSE Treasure Hunt Seventh Sense 23.09.10 I prize


vinoth,Monika SRM University
Seventh Sense 23.09.10 III Prize
Vels CSE Team III CSE Overall winners SRM University (Have won
more than
Rs.10,000)

32
October 2010

Vels University
School of Engineering
Department of computer science Engineering
Student’s participation in symposium/Conference/Workshop/Seminar (July 2009-April 2010)

Students Participation in Sports related Activities

NAME EVENT VENUE


Shalini Throwball Vels university
Sowmya Throwball Vels university
Nisha Throwball Vels university
Sreevidhya Throwball Vels university
Khusboo Throwball Vels university
Ravishankar Basket ball Vels university
Naresh Basket ball Vels university
Prasanth Basketball,Volleyball Vels University
Divyan Basketball,Volley ball Vels University

33
October 2010

Vels University
School of Engineering
Department of Computer Science Engineering
Journal and conference Publications

International journals – Referred


 N.Bhalaji, P.Gurunathan, Dr.A.Shanmugam, “Study of unicast Manet Routing Protocols under Variable bit rate scenario”
to appear in International journal of Recent Trends in Engineering, Volume 3, May 2010. ISSN 1797-9617. (INSPEC,
EBSCO, DBLP, ULRICH, EI Compendex, Google)

 N.Bhalaji, Dr.A.Shanmugam “Reliable Routing against selective packet drop attack in DSR based MANET” in Journal of
Software, Vol. 4, No. 6, August 2009. pp 536-543. ISSN 1796-217X.(INSPEC,EBSCO,DBLP,ULRICH,EI Compendex, Google
Scholar)

 N.Bhalaji.et.al “Trust Enhanced Dynamic source routing protocol for Adhoc networks” in Proceedings of WASET, Volume 37,
January 2009, pp 1074-1079. ISSN 2070-3740. (ISI, Scirus, EBSCO,ULRICH,EI Compendex, DOAJ, Google)

 N.Bhalaji, Sinchan, Dr.A.Shanmugam “A novel routing technique against Packet dropping attack in Adhoc networks” in
Journal of Computer science, USA Volume 4(7), 2008. pp 538-544. ISSN 1549-3636. (IET-
ISI,EBSCO,Scopus,Ulrich,Cabell,DOAJ)

 N.Bhalaji.et.al “Extended Dynamic Source Routing Protocol for the Non Co-operating nodes in Mobile Adhoc Networks”,
in proceedings of WASET, November 2006, Venice, Italy. pp 249-254. ISSN 1307-6884. (Later was published in Interna-
tional Journal of Applied Mathematics and Computer Sciences, Volume 3, 2006. pp 12-17. ISSN 1307-6906. (ISI, Scirus,
EBSCO,ULRICH,EI Compendex, DOAJ, Google)

 N.Bhalaji.et.al “Direct Trust Estimated on demand Protocol for secure routing in Mobile Adhoc Networks”, in International
Journal of Computer science and security, Volume 1(5)2008. pp 6-12. ISSN 1985-1553. (DOAJ, Google)

 N.Bhalaji, Dr.A.Shanmugam “Improved DSR Protocol for the Malicious Nodes in Mobile Adhoc Networks”, In Asian Journal
of Information Technology, Volume 7(8), 2008. pp 350-355. ISSN 1682-3915. (ASCI,DOAJ,Google)

Book Series- Springer (LNCS-CCIS)


 N. Bhalaji, Dr.A.Shanmugam “A Trust Based Technique To Isolate Non-forwarding Nodes In DSR Based Mobile Adhoc Net-
works” CNSA-2010), July 23-25, Chennai, Communications in Computer and information science, Springer-Verilag,
Volume (90),pp.123-131, ISSN: 1865-0929(Print), 1865-0937(Online), DOI: 10.1007/978-3-642-14478-3,
ISBN:978-3-642-14477-6 (Print) 978-3-642-14478-3 (Online) (ISI Proceedings, SCOPUS)

 N. Bhalaji, P.Gurunathan Dr.A.Shanmugam “Performance comparison of Multicast Routing Protocols under Variable Bit Rate
Scenario for mobile Adhoc Networks” CNSA-2010), July 23-25, Chennai, Communications in Computer and information
science, Springer-Verilag, Volume (90),pp 114-122, ISSN: 1865-0929(Print), 1865-0937(Online), DOI: 10.1007/978-
3-642-14478-3,ISBN: 978-3-642-14477-6 (Print) 978-3-642-14478-3 (Online) (ISI Proceedings, SCO-
PUS)

 N. Bhalaji.et.al “Trust based approach to combat cooperative blackhole attack in Manet” BAIP-2010, March26-27, Tri-
vandrum, Communications In Computer and Information Science, Springer-Verilag, Berlin Heidelberg Volume (70),

34
October 2010

 pp 468-474. ISSN: 1865-0929(Print), 1865-0937(Online), DOI: 10.1007/978-3-642-12214-9, (ISI Proceedings,


SCOPUS)

 N.Bhalaji, Nandini SundaraRaman, “Natural Disaster Impact Assessment Using Genetic Algorithm” BAIP-2010,
March26-27, Trivandrum, Communications In Computer and Information Science, Volume (70) Springer-Verilag, Berlin
Heidelberg, pp 521-526. ISSN: 1865-0929(Print), 1865-0937(Online), DOI: 10.1007/978-3-642-12214-9 (ISI Pro-
ceedings, SCOPUS)

International conferences - IEEE/ACM


 N.Bhalaji, A.Shanmugam “Association between nodes to Combat Blackhole attack in DSR based MANET” in Proceedings
of the Sixth IFIP-IEEE WOCN, April 28-30, 2009, Cairo, pp.403-407,ISBN:978-1-4244-4704-,DOI:10.1109/
wocn.2009.5010 579. (indexed in ACM)

 N.Bhalaji and A.Shanmugam “Trust Enhanced Extended Dynamic source routing protocol for Adhoc networks” in Proceed-
ings of IEEE-International conference on Emerging trends in computer science, Kamaraj College of engineering and technolo-
gy, Virudhunagar. , January’09 pp 87-90.(sponsored by IEEE )

International conference- Google


 T. Peer Meera Labbai, N. Bhalaji and V. Rajamani, “Secured on Demand Routing Protocol Against the Critical Nodes in
Manet”, International Conference on Global Computing and Communications (ICOGCAC'09), Hindustan Institute of
Technology and Science, Chennai. Dec. 09-11, 2009. Pp.10-12.

 Arun Raaza, N. Bhalaji, AlokV.Kanakeri and P. KrishnaChaitanya “Applications of Beam Steering Antenna in Maritime
Communication”, International Conference on Global Computing and Communications (ICOGCAC'09), Hindustan Insti-
tute of Technology and Science, Chennai.Dec. 09-11, 2009.Pp.1-3.

 V.Narasimha Raghavan, N.Bhalaji “ Decentralized Model for Dynamic Creation of Replicas in an Unreliable Peer to Peer
System” in Proceedings of 4th International Conference on Computer Science and its Application June 27-30,2006, Califor-
nia,USA.

National Conferences

 N.Bhalaji, Satish babu, Saravanakumar “An Approach towards Resisting Cooperative Blackhole attack in DSR based MA-
NET” in NCCAIT, St.Joseph’s College of Engineering. March 11, 2009. Pp 7-12.

 N.Bhalaji, S.Karthick, T.Peer meera labbai, “New reliable routing mechanisms by using trust estimation in mobile adhoc
network” in NCRTIT’09, Kamaraj College of Engg. And Technology, March 27, 2009. Pp 47 – 52.

35
October 2010

Vels University

School of Engineering

Department of Computer science Engineering

Staff participation in symposium/Conference/Workshop/Seminar (2009-2010)

Name Name of the Organized By Date venue


Program
N.Bhalaji Contemporary Mi- ICTACT Academy April 2’2010 Perungudi
crosoft Technolo-
gies

N.Bhalaji Chair ACEEE March 25,26- Trivandrum


International Con- 2010
ference
BAIP 2010

Kathiravan Oracle Training ICTACT July 23’2010 Chennai

N.Bhalaji International con- AIRCC July 25-27’2010 Chennai


ference
CNSA 2010

I.Balaji Academia Meeting NIIT August 14’2010 Chennai


A.Saritha
C.Rajesh Kannan

36

You might also like