Professional Documents
Culture Documents
Articles
Mobile Dreams 1
Cloud Computing 13
Director’s Message
Microsoft 24
Simplifier 24
Secret of maths 25
Comp-Confusion 28
Student’s Activities 29
Staff Activities 34
October 2010
CHANCELLOR’S MESSAGE
I
October 2010
VICE-CHANCELLOR’S MESSAGE
The activities of the association must facilitate the students to acquire organi-
zational skills and bring change in their perception and attitudes. The e-
Magazine to be published to mark this occasion should reflect the student’s
talents and their abilities.
I would like to congratulate and appreciate the students and the faculty of
CSE for their efforts and I wish them all the best
II
October 2010
REGISTRAR’S MESSAGE
Dr. P. Govindarajan
III
October 2010
The present human generation is associated mostly with the computer usages
which makes easy in day life like banking, accounting, ticketing, E-mailing,
chatting, conduct of online Examination and E-governance etc., Most of the
peoples relied on the computers for various matter and considered to be a very
essential for the human being.
In this connection, I wish all the very best for the inauguration of Department
Association and success in implementing the new invents in the Computer Ed-
ucation.
IV
October 2010
DIRECTOR’S MESSAGE
“A GOOD START MEANS HALF DONE”
I am very much pleased to note that the students of Computer Science Engineering, Vels
University are coming out with an e-journal. The knowledge one acquires in college has to be
harnessed in real life for the betterment of self and humanity. In other words, the students
should acquire the skill of presenting & utilizing their knowledge, they get during their stay in
VELS UNIVERSITY fully & properly. In that way, this journal that they intend to publish on
regular basis will definitely give them an opportunity to sharpen their deliverance skills.
At this juncture, I request each and every student to utilize this forum fully.
I wish the students and staff of Department of Computer Science Engineering all the
very Best in their endeavor.
Prof. P. Thiagarajan
V
October 2010
Mobile -DREAMs......
By V.vinoth, D.Ashokkumar, NitinGoswami, K.Gautam(3rd yr, CSE)
Microsoft’s idea of the Smartphone is very different from their competitors, traditionally
smart phones were devices that did not have touch screens and were intended to be used
by one hand ,but today’s smart phones push the boundaries of technology , Microsoft
plans to push it even further .
The minimum requirements for phone 7 was revealed recently
Camera: 5 megapixels or more, Camera with a flash and dedicated camera button
Five specific hardware buttons required: Start, back, search (a dedicated Bing button), camera
button, and power -- no more, no less
From the minimum requirements we can clearly understand that Microsoft is clearly targeting
only the high end market for Phone 7.
Windows Phone 7 Series is the suc- are supposed to be released by branded and expansive Zune and
Xbox components, and extremely
cessor to Microsoft's line of Windows the end of this year.
strict hardware requirements for
Mobile phone operating systems. It's The visual and underlying differ-
partners. A couple familiar touch-
based on the Windows CE 6 kernel, ences in the operating system are stones from the past include plans
like the Zune HD, while current ver- almost too numerous to mention,
for Outlook and Office support, as
sions of Windows Mobile are based including a completely (and we do
well as licensing to a wide variety
mean completely) upended user of third party hardware vendors --
on Windows CE 5. Microsoft an-
interface, an emphasis on finger-
nounced the new OS at Mobile World despite the name change; Mi-
based touch screen input, deep
crosoft still isn't building any
Congress 2010 in Barcelona, and
social networking integration, fully phones itself
says that the first handsets to run it
1
October 2010
MOBILE -DREAMS......
the music + video hub, not separated into its own little application. It's just like
the Zune HD,. But you get third-party stuff like Pandora, too, built-in here., there
2
October 2010
MOBILE -DREAMS......
The 7 will have full capability to support not just Exchange accounts but all other major email providers as well. So, you don’t
need to have an Exchange account to be using this for email. However, if you do have exchange, this will be a boon.
Remember, the iPhone has Exchange support but the Android does not offer Active Sync. The 7 will offer multiple exchange
account sync which will also be good for business users. Let us not forget there are still a lot more people running Exchange
emails than Gmail or Apple Mail. Blackberry, are you paying attention?
If Microsoft's got an ace-in-hole with Win- ber of levels. Not only will you be able
1. Smooth transitional user interface
dows Phone 7, it's Xbox Live. Gamers have to continue playing your XBOX games
2. Informative lock screen and auto- hidden talked about a portable Xbox for years—this on the phone (we don’t know right now
top status bar is the most logical way to do it. The N-Gage if you can play all of them) but also
was ahead of its time. The DS and PSP are that it remembers you across plat-
3. Good Office integration and support the past. The iPhone showed us that the forms so you can pick up where you
4. Bing search page and functionality
future of mobile gaming was going to be on left off when at home in front of your
your phone, and now that just got a lot XBOX. In a sense, this is what Sony
5. Easy setup for Google, Windows Live, more interesting. The potential's there, and has been trying to achieve with the
Yahoo! Mail, and others hopefully the games will be plentiful and PSP/PS3 hook up, but with all the oth-
awesome enough to meet it. er mobile bits added.
6. Functional QWERTY keyboard
Forget Flight Control, how about full on If the 7 can be an awesome entertain-
7. Cool camera software
XBOX action on your phone? The graphics ment platform as well as the business
8. Tell me voice search look up to it and the game levels, credits platform of Microsoft’s heritage, this
and achievements will be recorded against could be amazing.
9. Powerful Outlook email, calendar, and
your live profile.
contacts client
This cross performance works on a num-
10. Zune HD functionality
3
October 2010
A piece of interface that's shockingly not there: A together. The iPhone gets better but doesn’t perfectly inte-
desktop syncing app. If anyone would be expected to grate my Google life. Nor does Android completely – Gmail,
tie their phone to a desktop, you'd think it'd be Mi- Google apps yes but other accounts like Google Finance
crosoft, but they're actually moving forward here. All of still don’t hook up.
your contacts and info sync over the air. The only
Microsoft is the sleeping giant. Historically not as good
thing you'll be syncing through your computer is music looking as Apple, and not as fast as Google. The phone 7 is
and videos, which is mercifully done via the Zune
the show piece if not the Centre piece of their empire which
desktop client's
will help them back on the path to greatness.
Microsoft’s plans to sync your life across channels Of course we assume that Microsoft can get the hardware
and platforms seems a little ahead of its time but
right. We have seen some great things, beautiful graphics,
with the 7, finally everything comes into place. Music,
great games but will the hardware be up to it? Multi tasking
work, games, contacts all come of age in one place. is not coming which is probably a smart reason to manage
What we forget is that Microsoft has all the compo- the hardware drain. No doubt they will be working hard to
nent parts to serve my digital life. Email, Search, Gam- find the right partners to deliver the best handset possible.
ing, Music. Until now some of those have been a bit A glitch in the hardware could be the undoing of such great
crap, the Zune didn’t really inspire, don’t get me start- potential.
ed on Vista and pre Bing, search wasn’t too hot either.
Until we start to see handsets in the wild, I will remain with
Roll forward a year and Windows plans are coming my view that this is the iPhone Killer.
together. With the phone the potential Centre of my
digital universe I tend to gravitate to the platform that
gives me the greatest experience to hook them all
We have assumed here that Microsoft can get the hardware right.
The two most obvious glaring issues are the lack of
We have seen some great things, beautiful graphics, and great copy-paste and the limited multi-tasking. You can al-
games but will the hardware be up to it? Multi tasking is not com- ready select a word and use the cursor so it shouldn’t be
ing which is probably a smart reason to manage the hardware that much effort for Microsoft to get some developers
drain. No doubt they will be working hard to find the right partners locked into a room to figure out copy-paste on WP7
to deliver the best handset possible. A glitch in the hardware
Just like the previous versions of the iPhone, you can
could be the undoing of such great potential.
have native apps running in the background so you
Until we start to see handsets in the wild, we can safely assume could listen to Zune HD streaming content while surfing
that this is the iPhone Killer. the web and receiving emails on the go.
4
October 2010
Sixth Sense is a wearable gestural interface that augments the physical world
around us with digital information and lets us use natural hand gestures to
interact with that information.
It was developed by Pranav Mistry, a PhD student in the Fluid Interfaces
Group at the MIT Media Lab.
Sixth Sense bridges the gap by bringing intangible, digital information out into
the tangible world, and allowing us to interact with this information via natu-
ral hand
Sixth Sense comprises a pocket projector, a mirror and a camera. The hard-
ware components are coupled in a pendant like mobile wearable device
COMPONENTS
The hardware components are coupled in a pendant like mobile wearable
device.
Camera
Projector
Mirror
Mobile Component
Colored Markers
CAMERA PROJECTOR
The projector pro-
Captures an object in view
jects visual infor-
and tracks the user’s hand
mation enabling sur-
gestures
faces and physical
It sends the data to smart
objects to be used as
phone
interfaces A tiny LED projector
It acts as a digital eye, con-
The project itself displays data sent
necting you to the world of contains a battery from the smart
digital information inside, with 3 hours
phone on any sur-
of battery life.
face in view–object,
wall, or person.
5
October 2010
W E A R U R W O R L D ( 6 th S E N S E )
MIRROR
SMART PHONE
A Web-enabled smart phone in the user’s pocket processes the video data Oth-
er software searches the Web and interprets the hand gestures
COLOR MARKERS
It is at the tip of the user’s fingers .
Marking the user’s fingers with red, yellow, green, and blue tape helps the webcam recognize gestures.
The movements and arrangements of these makers are interpreted into gestures that act as interaction
instructions for the projected application interfaces.
HOW IT WORKS
The hardware that makes Sixth Sense work is a pendant like mobile wearable interface
It has a camera, a mirror and a projector and is connected wirelessly to a Bluetooth smart phone that can slip com-
fortably into one’s pocket
6
October 2010
The camera recognizes individuals, images, pictures, gestures one makes with their hands
Information is sent to the Smartphone for processing
The downward-facing projector projects the output image on to the mirror
Mirror reflects image on to the desired surface
Thus, digital information is freed from its confines and placed in the physical world.
ADVANTAGES
Portable
Supports multi-touch and multi-user interaction
Cost effective
It is an open source
Reference:
http://www.freshcreation.com/entry/sixth_sense_technology/
http://theviewspaper.net/sixth-sense-technology-will-revolutionize-the-world/
http://www.ted.com/talks/pattie_maes_demos_the_sixth_sense.html
http://gizmodo.com/5167790/sixth-sense-technology-may-change-how-we-look-at-the-world-forever
http://boingboing.net/2009/11/12/sixth-sense-technolo.html
7
October 2010
The current version of file, document, spatial, etc. gration of the data visuali-
SQL Server, SQL Server 2008 as well as perform search, zation products from Dun-
was released (RTM) on Au- query, analysis, sharing, and das Data Visualization Inc.,
gust 6, 2008 and aims to synchronization across all which was acquired by Mi-
make data management data types. crosoft. On the manage-
self-tuning, self organizing, ment side, SQL Server 2008
and self maintaining with SQL Server includes includes the Declarative
the development of SQL better compression fea- Management Framework
Server Always On technolo- tures, which also helps in which allows configuring
gies, to provide near-zero improving scalability. It en- policies and constraints, on
downtime. SQL Server 2008 hanced the indexing algo- the entire database or cer-
also includes support for rithms and introduced the tain tables. The version of
str uc tur ed a nd se mi- notion of filtered indexes. It SQL Server Management
structured data, including also includes Resource Gov- Studio included with SQL
digital media formats for ernor that allows reserving Server 2008 supports Intel-
pictures, audio, video and resources for certain users or liSense for SQL queries
other multimedia data. In workflows. It also includes against a SQL Server 2008
current versions, such multi- capabilities for transparent Database Engine. SQL Serv-
media data can be stored encryption of data (TDE) as er 2008 also makes the da-
as BLOBs (binary large ob- well as compression of tabases available via Win-
jects), but they are generic backups SQL Server 2008 dows PowerShell providers
bit streams. Intrinsic aware- supports the ADO.NET Entity and management function-
ness of multimedia data will Framework and the report- ality available as Cmdlets,
allow specialized functions ing tools, replication, and so that the server and all
to be performed on them. data definition will be built the running instances can
SQL Server 2008 can be a around the Entity Data be managed from Windows
data storage backend for Model. SQL Server Reporting PowerShell.
different varieties of data: Services will gain charting
XML, email, time/calendar, capabilities from the inte-
8
October 2010
Availability
This feature is available in the following editions of SQL 2008 and SQL 2008 R2
Datacentres (only for R2)
Enterprise
Standard
Web
Workgroup
Data Collector
Before we stepping into configuring Data collector service, we need to configure a centralized
server to store these data. Let’s configure the centralized server no Connect to the server, Ex-
pand Management folder and right click on “Data Collection” and click on “Configure Manage-
ment Data Warehouse Configuring Centralized
Server for Data Collector
Initialization Process
Click next on the welcome screen In this window you have the option for config-
uring the centralized server. Select “ Create or
upgrade a management data warehouse “ op-
tion and click “next”
In this window it will choose your local server as cen- In this window you will be providing necessary
tralized server and you have the option to select the data- permissions to the logins to view or modify data.
base. Either you can use the existing database or you can You can click on individual login and select the role
create a new one. To create new database click on new for that login and click ok. It’s not mandatory to set
button, a new database creation window will be popped the permissions now you can also set it later.
up.
9
October 2010
At last it will show the summary descrip- Configuring Data collector in instance
tion , if you find everything correct then
Connect to the server, expand management folder and
click on finish to configure the centralized
right click on “Data Warehouse” as shown above.
data warehouse server.
Now it’s time to configure data collector at instance
Version Details Captured level since centralized server is configured and ready to
accept data. Pass the welcome screen.
Disk Usage
Query Statistics Select "Set up data collection” in this window to config-
SQL Server 2008
Server Activity ure data collector. It will capture the following details
into the DB
Disk Usage
SQL Server 2008 R2 Query Statistics
Server Activity
Utility Information
10
BETTER SAFE THAN SORRY
(WIFI NETWORK SECURITY)!
So you have finally worked your way past all the Network jargons of Ip addresses, SSIDs, access points…etc.
and got your Wi-Fi network up and running, now you may think you are in the clear but you are far from it
unless you have set up some sort of security on your wireless network.
So here is a list of a few techniques that hackers use to get into your wireless network, and how to safeguard
yourself.
1. Sniffing
This is the most simple of all the attacks, simply put an unsecured wireless network can be easily intercepted
and the attacker can easily obtain almost all of your information. This is mainly caused by people with “This
won’t happen to me” attitude.
The solution: The simplest attack has the simplest solution; just make sure you secure your network with
some sort of encryption and a password.
11
2. SPOOFING
network with a stronger wireless
signal and a copied SSID (Access
So you’ve setup your Wi-Fi net-
point name) in the same area as a
work you may notice that the
legitimate network. This causes
computer no longer asks which
unsuspecting computers to auto-
network to connect to , it just
matically connect to the spoofed
automatically connects .This very network instead of the real one.
convenient feature is the basis of
the spoofing attack .
3. Encryption Cracking
This the most difficult attack , hackers try to crack your wireless net-
Conclusion work password by a combination of different techniques ,and as en-
cryption keys become more advanced, hackers also increase their skills
and develop new tools for penetrating even well protected wireless net-
works.
There are numerous ways to crack a wireless network’s encryption, but
even simplistic methods can work. The website WPA Cracker, for exam-
ple, can be used to hit a network
with a brute force dictionary attack
that simply throws random words
These are the most common
methods for hacking into a
at a secured wireless network to try
wireless network, but there and crack it. This method can take
are other methods too, a long time, and sometimes re-
quires luck on the hacker’s part, but
And new methods are being
found everyday so it’s very it is often effective
difficult to be a 100% safe.
That is the bad news; the The first step in protecting yourself from this kind of attack is to use
good news is that unless you WPA encryption or a combination of WPA & AES. WEP, the older en-
happen to be the CEO of a cryption technology, has been completely de-constructed by hackers
multi-billion dollar Company
and is now considered quite easy to crack.
or the Chief Minister of a state
you are very unlikely to be the
target of such a sophisticated The second step is to use a long and completely random password /
attempt to hack into your encryption key , these are really hard to remember but are very hard
system. But still it’s better to
and take a long time to crack.
be safe than sorry, so simple
steps like using a long encryp-
References :
tion key can solve most secu-
rity situations. Makeuseof.com
Lifehacker.com
Wikipedia.org
engadget.com
12
October 2010
CLOUD COMPUTING
By Nitin Goswami (3rd yr., CSE)
Architecture
Cloud architecture, the systems architecture of the software systems involved in the delivery of cloud computing, typically
involves multiple cloud components communicating with each other over application programming interfaces, usually web
services.
Service providers
14
October 2010
Microsoft
complexity of security is greatly
MS has developed win- Security could improve due to increased when data is distribut-
dows azure platform centralization of data, increased ed over a wider area and / or
(azure) which is an inter- security-focused resources, etc., number of devices.
net-scale cloud services but concerns can persist about
platform. Subscribing to loss of control over certain sensi-
tive data, and the lack of security
azure ,a user need not
for stored kernels. Security is of-
buy the software /
ten as good as or better than un-
applications for develop-
der traditional systems, in part
ing the customized appli-
because providers are able to de-
cations for its customers,
vote resources to solving security
thereby reduces the cost. issues that many customers can-
Microsoft also offers not afford. Providers typically log
cloud applications ready accesses, but accessing the audit Cloud Computing Models
for use by customers logs themselves can be difficult or
such as windows live, Mi- impossible. Furthermore, the
crosoft dynamics, other
online services. Software as Service Infrastructure as a service
Reference:
Reference
www.wardrive.net
www.sans.org/reading_room/../wireless-lan-security-issues-solutions_1009
16
October 2010
Chrome the web browser from Google is touted to be the fastest web
browser . It is based on the open source Chromium project . It uses the Web
kit Layout engine and the V8 JavaScript engine . The first public stable
release was on 11 December 2008. Today chrome is the third most widely
used web browser after Firefox.
Development
Chrome was assembled from 25 different code libraries from Google and third
parties such as Mozilla's Netscape Portable Runtime, Network Security
Services, NPAPI, as well as SQLite and a number of other open-source
projects. The JavaScript virtual machine was considered a sufficiently
important project to be split off. Chrome was one of the first browsers to
include support for HTML 5.
Features
Tabs and Stability Incognito Mode:
Chrome is a process based web browser, i.e. each tab open as an individual process, Chrome is one of the few brows-
so if one of the tabs crash the whole widow does not crash and the other tabs can ers in which the private browsing
remain working mode is totally separate from the
normal mode operation. Both
Security:
windows can be simultaneously
Chrome will show you a warning message when visiting a site that is suspected of used and they operate separately.
containing malware or phishing.
Incognito is the private browsing
A phishing attack takes place when someone masquerades as someone else to trick mode, where all records like his-
you into sharing personal or other sensitive information with them, usually through tory, downloads , etc. are not
a fake website. Malware, on the other hand, is software installed on your machine saved not beyond the current
often without your knowledge, and is designed to harm your computer or session.
potentially steal information from your computer.
Sandboxing helps prevent malware from installing itself on the computer or using
what happens in one browser tab to affect what happens in another. The sandbox
adds an additional layer of protection to your browser by protecting against
malicious web pages that try to leave programs on your computer, monitor your
web activities, or steal private information from your hard drive
http://en.wikipedia.org/wiki/
This is one of the best features if chrome , instead of having a separate box for
Google_Chrome
searching and for the URL , chrome combines both for usability and speed.
17
October 2010
Computer Security
By Akash Goswami(3rd yr,CSE)
It is a dangerous world, even for the computers that sit in our offices. Bad
things can happen.
Some bad things happen because computers are pieces of machinery. Parts
can break, wear out, choke on dust and dirt, or simply quit working for mysteri-
ous reasons. That’s why the smart computer user frequently backs up all the
critical data on the hard drives. Programs can be reinstalled, but membership
lists, financial records, congregation council minutes, and other data have to be
saved in several places to avoid disaster. Computers are pieces of machinery,
and they will fail.
18
October 2010
COMPUTER SECURITY
How to Protect
It is not hard to protect an anti-virus program server from unauthorized
church computers first to make sure it is not use.
from most of these infected. There is a dark side to
problems. Everyone who uses computer security, for it
Access to the computers church computers means that we have to
must be restricted. Sec- should be instructed to think about whether
retaries and others au- avoid casual Web surf- church computer users
thorized to use the ing. Build a list of neces- will do unacceptable or
church computers sary sites — the ELCA dangerous things. We
should be required to and synod Web sites, don’t like to operate on
sign on with passwords local agencies, and oth- the basis of suspicion.
and instructed not to let er places useful to the But the goal of computer
anyone else use their congregation’s work and security is to protect the
password. known to be safe to visit. church’s equipment and
“Drop-in” use by church Enforce the no-surfing data and preserve the
officers or members policy. There are numer- confidentiality of neces-
should be prohibited, ous stories about occa- sary records. Churches
unless the church has a sions when people em- should develop a poli-
separate computer for barrassed themselves, cy on who uses their
that purpose, not linked their employers, and computers and for
with any critical office their churches by inap- what reasons. This can
machine. propriate use of the protect data from vi-
Computers that are computer. ruses and other en-
online should be protect- You might want to install croachments and
ed with a “firewall” that a filter or program that avoid the serious prob-
offers some protection monitors online usage to lems that can occur if
against known viruses spot potential problems. someone uses the
and “worms” that hide in Access to critical and church computer for
e-mail and on internet confidential data should unauthorized purposes
sites. Norton Utilities® be protected by a double
and similar programs password, and all au-
can keep out many vi- thorized users should be
ruses; but the programs instructed on how to ac-
must be purchased, in- cess the data without
stalled, and maintained inadvertently leaving it
to keep the list of virus open to others.
infections updated. This If churches use “servers”
usually requires an an- to store data and make it
nual subscription. accessible from several
If it is necessary to insert sites, you might need
a “foreign” disk in a the advice of a computer
church computer, it specialist to protect the
should be scanned by
Reference:
http://en.wikipedia.org/wiki/Computer_security
http://www.unixtools.com/security.html
http://communications-solutions.com/security/computer-security-guide
19
October 2010
VIRTUALITY
By sumit banerjee (be.cse.3rd yr)
-Ergonomic validation
Virtual reality (VR) it’s a term or technology that basically defined as computerized
Research application simulated environment that can simulate places in the real as well as imaginary
-Behavioral sciences: mod- worlds. Two major aspects of VR are:
eling human behavior by
manipulating sensory infor- 1) Visualization is immersive, since the goal is to give the User the sensation
mation. of being really in virtual world.
-psycho-pharmacological 2) The user is able to interact in “real-time” with this environment.
research
User can interact with a virtual environment either through the use of standard in-
Teaching Applications
put devices such as a keyboard and mouse or through multimodal devices such as
-Teaching and learning
aids: visualization and vir-
tual explo- Terms supporting virtual reality
ration of our solar system,
virtual reconstruction and There are many devices that are use for virtual sensation like 3D visualization,
visits of ancient architec-
holography, virtual caves, etc.
tural sites.
-scientific visualization
3D visualization
Therapeutic application
-Cyber-therapy: treatment The 3D visualization can be more easily understand by taking 3D films in ac-
of phobias, depression, count.
anxiety where patient are
kept in virtual environ- A 3D film or S3D (stereoscopic 3D) film is a motion picture that enhances the illu-
ment to relax there brain. sion of depth perception. Derived from stereoscopic photography, a special mo-
-Motor-therapy through tion picture camera system is used to record the images as seen from two per-
sport: Virtual squash where spectives and special projection hardware and/or eyewear are use to provide the
the ball speed is matched to illusion of depth when viewing.
the patient’s disability.
20
October 2010
Virtuality
21
October 2010
Virtuality
Virtual world
manipulate elements of sure activities. Commu-
A virtual world is a nication is usually textu-
genre of online commu- the modeled world and
thus experien ces al, with real-time voice
nity that often takes the communication using
form of a computer- telepresence to a cer-
tain degree. Such mod- VOIP also possible.
based simulated envi- Virtual worlds are not
ro nment , t h ro u gh eled worlds may appear
similar to the real world limited to games but,
which users can inter-
act with one another or instead depict fanta- depending on the degree
and use and create ob- sy worlds. The model of immediacy presented,
jects .Virtual worlds are world may simulate can encompass computer
intended for its users to rules based on the real
conferencing and text
inhabit and interact, world or some hybrid
fantasy world. Example based chat rooms. Some-
and the term today has
become largely synony- rules are gravity, topog- times, emoticons or
mous with interactive raphy, locomotion, real 'smiles' are available, to
3D virtual environ- -time actions, and com- show feeling or facial ex-
ments, where the users munication. Communi-
pression. Emoticons of-
take the form of avatars cation between users
has ranged from text, ten have a keyboard
visible to others graph-
graphical icons, visual shortcut. Edward Castro cave. Stereoscopic LCD
ically. These avatars are
usually depicted as tex- gesture, sound, and nova is an economist who shutter glasses convey a
tual, two-dimensional, rarely, forms using has argued that 3D image. The comput-
or three-dimensional touch, voice command, ers rapidly generate a
"synthetic worlds" is a
graphical representa- and balance senses.
better term for these cy- pair of images, one for
tions, although other Massively multiplayer
online games common- berspaces, but this term each of the user’s eye.
forms are possible
(auditory and touch ly depict a world very has not been widely The glasses are synchro-
sensations for exam- similar to the real adopted. nized with the projectors
ple). Some, but not all, world, with real world so that each eye only sees
virtual worlds allow for rules and real-time ac- A lifelike visual display is
the correct image.
multiple users. tions, and communica- created by projectors
The computer accesses tion. Players create a positioned outside the
a computer-simulated character to travel be-
cave and controlled by
world and presents per- tween buildings, towns,
and even worlds to car- physical movements
ceptual stimuli to the
user, who in turn can ry out business or lei- from a seer inside the
22
October 2010
Virtuality
Do You Know?
1. The human heart creates enough pressure while 15. The ant can lift 50 times its own weight, can pull
pumping to squirt blood 30 feet. 30 times its own weight and always falls over on its
2. On average people fear spiders more than they do right side when intoxicated.
death. 16. Polar bears are left handed.
3. The strongest muscle in the body is the TONGUE. 17. The catfish has over 27,000 taste buds, that
4. it’s impossible to sneeze with your eyes open. makes the catfish rank #1 for animal having the
most taste buds.
5. Americans on the average eat 18 acres of pizza every
day. 18. The flea can jump 350 times its body length, that
is like a human jumping the length of a football
6. Did you know that you are more likely to be killed field.
by a champagne cork than by a poisonous spider?
19. Butterflies taste with their feet.
7. Right-handed people live, on average, nine years
longer than left-handed people do. 20. It is impossible to sneeze and keep ones eye's
open at the same time.
8. In ancient Egypt, Priests plucked EVERY hair from
their bodies, including their eyebrows and eyelashes. 21. Elephants are the only animals that can't jump.
9. The dot on top of the letter 'i' is called a tittle. 22. A cat's urine glows under a black light.
10. A "hairbreadth away" is 1/48 of an inch. 23. An ostrich's eye is bigger than it's brain.
11. The word four has four letters. In the English lan- 24. Cockroaches can change course as many as 25
guage there is no other number whose number of let- times in one second, making them the most nimble
ters is equal to its value. animals known.
12. The king of hearts is the only king without a mous- 25. Mosquitoes do not bite. They stab. A mosquito
tache. has no jaws, hence when attacking a victim; it pierc-
es it with its long proboscis and sucks the blood up
13. No piece of square dry paper can be folded more through its nasal tube.
than 7 times in half.
26. Starfishes haven't got brains.
14. A crocodile cannot stick its tongue out.
By Monika (1st yr,CSE)
23
October 2010
1. Can you find four numbers such that the sum of every two and sum of all four may be
perfect squares?
2. A cubic object 3"*3"*3" is painted blue on all the outside cubic surfaces ,including the top
and bottom .if the cube is cut into 27 cubes of 1"*1"*1".how many 1" cubes do have any
painted surfaces?
3. How can you make a total of 1,000 by using sixteen 4's?
4. The shape shown in sketch below is a square attached to half of
another similar square ,divided diagonally:
24
October 2010
(Lea rn how to ca lcu lat e f ast er tha n t he spe edin g c alc ula tor )
It's a well known fact that the Human Brain i s v ery similar to a com-
puter.
B ra i n =Hardware of computer. Comparable to CPU.
Mind =Software. Comparable to an Operatin g System (like windows
XP, Linux or whichever you find best)
Our mind needs various drivers ( programs ) to run its various facul-
ties. Those are stored in our memory. Some brains come right out of
the pack with correct p rograms in stalled. Thus they can crunch the
numbers at optimum speed.
Now you must be getting eager to ask " What about the brain that did-
n't come with the right program installed ? " Relax !! The solution is
very easy. You just have to update the brain once . That's it.
25
October 2010
26
October 2010
27
October 2010
a+b+c+d=10430+3970+2114+386=16900=1302
28
October 2010
Vels University
School of Engineering
Department of computer science Engineering
Student’s participation in symposium/workshop/seminar (2010-2011)
Nitin Goswami III Year Microsoft Student Cleared Two levels, Con-
Mallica Partner ducted by Microsoft
Chennai
29
October 2010
30
October 2010
Vels University
School of Engineering
Department of computer science Engineering
Student’s participation in symposium/Conference/Workshop/Seminar (July 2009-April 2010)
31
October 2010
Vels University
School of Engineering
Department of computer science Engineering
Student’s participation in symposium/Conference/Workshop/Seminar ( July 2010-Till Date )
Nitin Goswami III Year Microsoft Student Partner Cleared Two levels, Con-
Mallica ducted by Mi-
crosoft ,Chennai
Gautam III CSE Black hole Seventh Sense 23.09.10 I prize
SRM University
Weblogic Seventh Sense 23.09.10
SRM University
32
October 2010
Vels University
School of Engineering
Department of computer science Engineering
Student’s participation in symposium/Conference/Workshop/Seminar (July 2009-April 2010)
33
October 2010
Vels University
School of Engineering
Department of Computer Science Engineering
Journal and conference Publications
N.Bhalaji, Dr.A.Shanmugam “Reliable Routing against selective packet drop attack in DSR based MANET” in Journal of
Software, Vol. 4, No. 6, August 2009. pp 536-543. ISSN 1796-217X.(INSPEC,EBSCO,DBLP,ULRICH,EI Compendex, Google
Scholar)
N.Bhalaji.et.al “Trust Enhanced Dynamic source routing protocol for Adhoc networks” in Proceedings of WASET, Volume 37,
January 2009, pp 1074-1079. ISSN 2070-3740. (ISI, Scirus, EBSCO,ULRICH,EI Compendex, DOAJ, Google)
N.Bhalaji, Sinchan, Dr.A.Shanmugam “A novel routing technique against Packet dropping attack in Adhoc networks” in
Journal of Computer science, USA Volume 4(7), 2008. pp 538-544. ISSN 1549-3636. (IET-
ISI,EBSCO,Scopus,Ulrich,Cabell,DOAJ)
N.Bhalaji.et.al “Extended Dynamic Source Routing Protocol for the Non Co-operating nodes in Mobile Adhoc Networks”,
in proceedings of WASET, November 2006, Venice, Italy. pp 249-254. ISSN 1307-6884. (Later was published in Interna-
tional Journal of Applied Mathematics and Computer Sciences, Volume 3, 2006. pp 12-17. ISSN 1307-6906. (ISI, Scirus,
EBSCO,ULRICH,EI Compendex, DOAJ, Google)
N.Bhalaji.et.al “Direct Trust Estimated on demand Protocol for secure routing in Mobile Adhoc Networks”, in International
Journal of Computer science and security, Volume 1(5)2008. pp 6-12. ISSN 1985-1553. (DOAJ, Google)
N.Bhalaji, Dr.A.Shanmugam “Improved DSR Protocol for the Malicious Nodes in Mobile Adhoc Networks”, In Asian Journal
of Information Technology, Volume 7(8), 2008. pp 350-355. ISSN 1682-3915. (ASCI,DOAJ,Google)
N. Bhalaji, P.Gurunathan Dr.A.Shanmugam “Performance comparison of Multicast Routing Protocols under Variable Bit Rate
Scenario for mobile Adhoc Networks” CNSA-2010), July 23-25, Chennai, Communications in Computer and information
science, Springer-Verilag, Volume (90),pp 114-122, ISSN: 1865-0929(Print), 1865-0937(Online), DOI: 10.1007/978-
3-642-14478-3,ISBN: 978-3-642-14477-6 (Print) 978-3-642-14478-3 (Online) (ISI Proceedings, SCO-
PUS)
N. Bhalaji.et.al “Trust based approach to combat cooperative blackhole attack in Manet” BAIP-2010, March26-27, Tri-
vandrum, Communications In Computer and Information Science, Springer-Verilag, Berlin Heidelberg Volume (70),
34
October 2010
N.Bhalaji, Nandini SundaraRaman, “Natural Disaster Impact Assessment Using Genetic Algorithm” BAIP-2010,
March26-27, Trivandrum, Communications In Computer and Information Science, Volume (70) Springer-Verilag, Berlin
Heidelberg, pp 521-526. ISSN: 1865-0929(Print), 1865-0937(Online), DOI: 10.1007/978-3-642-12214-9 (ISI Pro-
ceedings, SCOPUS)
N.Bhalaji and A.Shanmugam “Trust Enhanced Extended Dynamic source routing protocol for Adhoc networks” in Proceed-
ings of IEEE-International conference on Emerging trends in computer science, Kamaraj College of engineering and technolo-
gy, Virudhunagar. , January’09 pp 87-90.(sponsored by IEEE )
Arun Raaza, N. Bhalaji, AlokV.Kanakeri and P. KrishnaChaitanya “Applications of Beam Steering Antenna in Maritime
Communication”, International Conference on Global Computing and Communications (ICOGCAC'09), Hindustan Insti-
tute of Technology and Science, Chennai.Dec. 09-11, 2009.Pp.1-3.
V.Narasimha Raghavan, N.Bhalaji “ Decentralized Model for Dynamic Creation of Replicas in an Unreliable Peer to Peer
System” in Proceedings of 4th International Conference on Computer Science and its Application June 27-30,2006, Califor-
nia,USA.
National Conferences
N.Bhalaji, Satish babu, Saravanakumar “An Approach towards Resisting Cooperative Blackhole attack in DSR based MA-
NET” in NCCAIT, St.Joseph’s College of Engineering. March 11, 2009. Pp 7-12.
N.Bhalaji, S.Karthick, T.Peer meera labbai, “New reliable routing mechanisms by using trust estimation in mobile adhoc
network” in NCRTIT’09, Kamaraj College of Engg. And Technology, March 27, 2009. Pp 47 – 52.
35
October 2010
Vels University
School of Engineering
36