55
Knowledge Digest for IT Community www.csi-india.org ISSN 0970-647X Operating Systems SECURITY CORNER Cyber Threat Analysis with Memory Forensics 17 ARTICLE Top Ten Alternative Operating Systems You Should Try Out 20 COVER STORY Computer Operating Systems: From every palm to the entire cosmos in the 21st Century Lifestyle 5 TECHNICAL TRENDS Blockchain : A Disruptive Innovation 9 RESEARCH FRONT Customized Linux Distributions for Bioinformatics Applications 14 Volume No. 40 | Issue No. 11 | February 2017 ` 50/- 55 pages including cover

ISSN 0970-647X Operating Systems - CSI INDIAcsi-india.org/Communications/CSIC_feb_2017.pdf · 2019-01-15 · Knowledge Digest for IT Community ISSN 0970-647X Operating Systems SECURITY

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: ISSN 0970-647X Operating Systems - CSI INDIAcsi-india.org/Communications/CSIC_feb_2017.pdf · 2019-01-15 · Knowledge Digest for IT Community ISSN 0970-647X Operating Systems SECURITY

Knowledge Digest for IT Community

ww

w.c

si-in

dia.

org

ISSN

097

0-64

7X

Operating Systems

SECURITY CORNERCyber Threat Analysis with Memory Forensics 17

ARTIClETop Ten Alternative Operating Systems You Should Try Out 20

COvER STORYComputer Operating Systems: From every palm to the entire cosmos in the 21st Century Lifestyle 5

TECHNICAl TRENDSBlockchain : A Disruptive Innovation 9

RESEARCH fRONTCustomized Linux Distributions for Bioinformatics Applications 14

Volume No. 40 | Issue No. 11 | February 2017 ` 50/-

55 pages including cover

Page 2: ISSN 0970-647X Operating Systems - CSI INDIAcsi-india.org/Communications/CSIC_feb_2017.pdf · 2019-01-15 · Knowledge Digest for IT Community ISSN 0970-647X Operating Systems SECURITY

• CoverStory• TechnicalTrends• ResearchFront• Articles• InnovationsinIT• SecurityCorner• PractitionerWorkbench• BrainTeaser• ChapterReports• Studentbranchreports

www.csi-india.org 2

C S I C o m m u n I C a t I o n S | F E B R u a R Y 2 0 1 7

CSI AdhyayanA tri-monthly publication for students

Articles are invited for Oct-Dec. 2016 issue of CSI Adhyayan from student members authored as original text. Plagiarism is strictly prohibited. Besides, the other contents of the magazine shall be Cross word, Brain Teaser, Programming Tips, News Items related to IT etc.Please note that CSI Adhyayan is a magazine for student members at large and not a research journal for publishing full-fledged research papers. Therefore, we expect articles should be written for the Bachelor and Master level students of Computer Science and IT and other related areas. Include a brief biography of Four to Five lines, indicating CSI Membership no., and for each author a high resolution photograph.Please send your article to [email protected] behalf of CSI Publication Committee

Prof. A. K. NayakChief Editor

Sanjay Mohapatra, Vice President, CSI & Chairman, Conf. Committee, Email: [email protected]

Date Event Details & Contact Information

MARCH01-03, 2017

INDIACOM 2017, Organized by Bharati Vidyapeeth’s Institute of Computer Applications and Management (BVICAM), New Delhi http://bvicam.ac.in/indiacom/Contact : Prof. M. N. Hoda, [email protected], [email protected], Tel.: 011-25275055

0 3-04, 2017 I International Conference on Smart Computing and Informatics (SCI -2017), venue : Anil Neerukonda Institute of Technology & Sciences Sangivalasa, Bheemunipatnam (Mandal), Visakhapatnam, Andhra Pradesh, http://anits.edu.in/sci2017/, Contact: Prof. Suresh Chandra Satapathy. Mob.: 9000249712

04, 2017 Trends & Innovations for Next Generation ICT (TINICT) - International Summit-2017Website digit organized by Hyderabad Chapter http://csihyderabad.org/Contact 040-24306345, 9490751639 Email id [email protected] ; [email protected]

24-25, 2017 First International Conference on “Computational Intelligence, Communications, and Business Analytics (CICBA - 2017)” at Calcutta Business School, Kolkata, India. Contact: [email protected]; (M) 94754 13463 / (O) 033 24205209

International Conference on Computational Intelligence, Communications, and Business Analytics (CICBA - 2017) at Calcutta Business School, Kolkata, India. Contact (M) 9475413463 / (O) 03324205209, Email id : [email protected]; www.cicba-2017.in

APRIL15-16, 2017

1st International Conference on Smart Systems, Innovations & Computing (SSIC-2017) at Manipal University Jaipur, Jaipur, Rajasthan. http://www.ssic2017.comContact : Mr. Ankit Mundra, Mob.: 9667604115, [email protected]

MAY08-10, 2017

ICSE 2017 - International Conference on Soft Computing in Engineering, Organized by : JECRC, Jaipur, www.icsc2017.com Contact : Prof. K. S. Raghuwanshi, [email protected], Mobile : 9166016670

JUNE05-30, 2017

Workshop on LAMP (Linux, Apache, My SQL, Perl/Python) , Jaypee University of Engineering and Technology, Raghogarh, Guna - MP, www.juet.ac.in Dr. Shishir Kumar ([email protected]) 9479772915

OCTOBER28-29, 2017

International conference on Data Engineering and Applications-2017 (IDEA-17) at Bhopal (M.P.),http://www.ideaconference.in Contact : [email protected]

DECEMBER21-23, 2017

Fourth International Conference on Image Information Processing (ICIIP-2017), at Jaypee University of Information Technology (JUIT), Solan, India, (http://www.juit.ac.in/iciip_2017/) Contact : Dr. P. K. Gupta ([email protected]) (O) +91-1792-239341 Prof. Vipin Tyagi ([email protected])

C S I C A L E N D A R 2 0 1 6 - 1 7

Page 3: ISSN 0970-647X Operating Systems - CSI INDIAcsi-india.org/Communications/CSIC_feb_2017.pdf · 2019-01-15 · Knowledge Digest for IT Community ISSN 0970-647X Operating Systems SECURITY

3 C S I C o m m u n I C a t I o n S | F E B R u a R Y 2 0 1 7

CSI CommunICatIonS

Please note:CSI Communications is published by Computer Society of India, a non-profit organization. Views and opinions expressed in the CSI Communications are those of individual authors, contributors and advertisers and they may differ from policies and official statements of CSI. These should not be construed as legal or professional advice. The CSI, the publisher, the editors and the contributors are not responsible for any decisions taken by readers on the basis of these views and opinions.Although every care is being taken to ensure genuineness of the writings in this publication, CSI Communications does not attest to the originality of the respective authors’ content. © 2012 CSI. All rights reserved.Instructors are permitted to photocopy isolated articles for non-commercial classroom use without fee. For any other copying, reprint or republication, permission must be obtained in writing from the Society. Copying for other than personal use or internal reference, or of articles or columns not owned by the Society without explicit permission of the Society or the copyright owner is strictly prohibited.

P l U SCall for Papers for April Issue of the CSI Journal of Computing 21CSI Nihilent eGovernance Awards 2015-16 – A Report 30CSI 2016 – A Report 31CSI-IEEE Computer Society Joint Education Award 2016 – A Report 33CSI Meeting with Myanmar Delegates 34Citation of Life Time Achievement, Honorary Fellowship & Fellowship Award 35Brain Teaser 46CSI Reports 48Student Branches News 50

ContentsCover StoryComputer Operating Systems:From every palm to the entire cosmos in the 21st Century LifestyleSubrata Ganguli

5

Technical TrendsBlockchain : A Disruptive InnovationKVN Rajesh & KVN Ramesh

9

Research FrontCustomized Linux Distributions for Bioinformatics ApplicationsKhalid Raza & Sahar Qazi

14

Security CornerCyber Threat Analysis with Memory ForensicsHardik Gohel & Himanshu Upadhyay

17

ArticlesTop Ten Alternative Operating Systems You Should Try OutDeepu Benson

20

Operating SystemsSimran

22

The battle for the Best Smartphone OSS. N. Kakarwal

24

Operating Systems : Mass transit for the futureR. Gobi

26

RSOS: Reliable and Secure Operating SystemAshutosh Saxena

27

Printed and Published by Mr. Sanjay Mohapatra on Behalf of Computer Society of India, Printed at G.P. Offset Pvt. Ltd. Unit-81, Plot-14, Marol Co-Op. Industrial Estate, off Andheri Kurla Road, Andheri (East), Mumbai 400059 and Published from Computer Society of India, Samruddhi Venture Park, Unit-3, 4th Floor, Marol Industrial Area, Andheri (East), Mumbai 400 093. Tel. : 022-2926 1700 • Fax : 022-2830 2133 • Email : [email protected] Chief Editor: Prof. A. K. Nayak

Chief EditorPROF. A. K. NAYAK

EditorDR. DURGESH MISHRA

Associate EditorPROF. PRASHANT NAIR

Published byMR. SANJAY MOHAPATRAFor Computer Society of India

Design, Print and Dispatch byGP OFFSET PvT. LTD.

Volume No. 40 • Issue No. 11 • FeBRuARY 2017

Page 4: ISSN 0970-647X Operating Systems - CSI INDIAcsi-india.org/Communications/CSIC_feb_2017.pdf · 2019-01-15 · Knowledge Digest for IT Community ISSN 0970-647X Operating Systems SECURITY

• CoverStory• TechnicalTrends• ResearchFront• Articles• InnovationsinIT• SecurityCorner• PractitionerWorkbench• BrainTeaser• ChapterReports• Studentbranchreports

www.csi-india.org 4

C S I C o m m u n I C a t I o n S | F E B R u a R Y 2 0 1 7

Dear Fellow CSI Members,“One of my big regrets is that Facebook hasn’t had a major chance to shape the mobile operating system ecosystem.”

– Mark Zuckerberg

The theme for the Computer Society of India (CSI) Communications (The Knowledge Digest for IT Community) February, 2017 issue is Operating Systems, a technology that each one of use either in our computer, smart phone or intelligent device. In this issue, Cover Story article is “Computer Operating Systems (OS): From every palm to the entire cosmos in the 21st century lifestyle” by Subrata Ganguli. The author has provided an overview as also shed light on the global market share of various popular OS. The Research front is titled, “Customized Linux Distributions for Bioinformatics Applications” by Khalid Raza & Sahar Qazi. Here, most popular customized Linux tailored for bioinformatics and computational biology applications have been highlighted. KVN Rajesh and KVN Ramesh have contributed to Technical Trends through the article, “Blockchain: A Disruptive Innovation”, which focuses on how Blockchain, the technology behind bitcoin is of great relevance in the context of demonetization. The Security Corner has Hardik Gohel and Himanshu Upadhyay giving us new insights on on Cyber Threat Analysis with Memory Forensics.We have several articles which provide us information on various OS available in the market; “Top Ten Alternative Operating Systems You Should Try Out” by Deepu Benson; OS by Simran Saini and Understanding OS by Mahek Golchha. Ashutosh Saxena in his article highlights, “RSOS: Reliable and Secure Operating System”. Also S. N. Kakarwal has give insights on the battle for the best smartphone OS. R. Gobi in the article, “Operating Systems: Mass transit for the future” provides a futuristic view of the technology. This issue also contains Crossword, CSI activity reports from chapters, student branches and Calendar of events.This issue covers the historic CSI 2016 Convention at Coimbatore on 23, 24 and 25 January, 2017 with special focus on other activities held in conjunction like the e-governance awards, MoU signed and CSI-IEEE award. The inspirtational citations of the honorary fellowship, fellowship and lifetime achievement awardees of CSI 2016 are also reproduced here We are thankful to Chair-Publication Committee and entire ExecCom for their continuous support in bringing this issue successfully.We wish to express our sincere gratitude to all authors and reviewers for their contributions and support to this issue.The next issue of CSI Communications will be on the theme “Software Engineering”. We invite the contributions from all CSI members and researchers on this theme. We also look forward to receive constructive feedback and suggestions from our esteemed members and readers at [email protected].

With kind regards,Editorial Team, CSI Communications

Editorial

Kind AttentionProspective Contributors of CSI CommunicationsPlease note that Cover Theme for March 2017 issue is Software Engineering. Articles may be submitted in the categories such as: Cover Story, Research Front, Technical Trends and Article. Please send your contributions by 1st March, 2017.

The articles should be authored in as original text. Plagiarism is strictly prohibited.

Please note that CSI Communications is a magazine for members at large and not a research journal for publishing full-fledged research papers. Therefore, we expect articles written at the level of general audience of varied member

categories. Equations and mathematical expressions within articles are not recommended and, if absolutely necessary, should be minimum. Include a brief biography of four to six lines, indicating CSI Membership no., for each author with high resolution author photograph.

Please send your article in MS-Word format to Associate Editor, Prof. Prashant R. Nair in the email ids [email protected] with cc to [email protected](Issued on the behalf of Editorial Board CSI Communications)

Prof. A. K. NayakChief Editor

Page 5: ISSN 0970-647X Operating Systems - CSI INDIAcsi-india.org/Communications/CSIC_feb_2017.pdf · 2019-01-15 · Knowledge Digest for IT Community ISSN 0970-647X Operating Systems SECURITY

Computer Operating Systems: From every palm to the entire cosmos in the 21st Century Lifestyle

Subrata Ganguli Formerly Asst. Prof., Department of Biotechnology, MVJ College of Engineering, Channasandra, Bangaluru, Karnataka

The operating system software is ubiquitous as the part and parcel of every computer in the age of information technology. One needs the operating systems far out in the cosmos inside the communication equipments used by the NASA and the ISRO in their shuttles and spacecraft, as well as in the palmed mobile sets so near to us that had changed everyday life in this 21st Century. Operating systems are required in the department of defense in their submarines operating outside the territory of the home government, as well as in the department of atomic energy in their nuclear projects secured in a safe location. Whether present inside the computers required for meteorological forecast and computations or in the computers associated with the World Wide Web and the Human Genome projects or inside the cheapest possible tablets in each backpack, they are the master software required for the running of the computers, however large or small. The niche and the operating conditions of the operating system software are thus as diverse as the computers themselves. This article describes and refers to the well known operating systems running the desk top computers and mobile cellular phones, their market shares and some projections for the future directions, hinting that the non-US economies such as Russia, China and India would assume a more domineering role in the global market for information technology beyond the year 2020.

Key Words: Operating systems, mobile operating systems, market share of operating systems, future projections.

Introduction:Advent of high speed computation

and the associated phenomenal growth in mobile technologies had impacted our daily living enhancing our ability to communicate with another object or individual in unthought-of ways. Mobile platforms are also being encouraged in research to avail the benefits of Digital India projects. The authors group had explored possible use of distributed systems and mobile technologies in learning and research that could possibly reduce the load on hard copy printing and in- built memory storage(1), an amateurish approach that had been validated as ‘cloud computing’ by computer professionals . Goal of this article is to draw attention to the various mobile, desktop and other computer operating systems available and their respective market share, that being considered an indirect measure of changes in life style.

All computer programs and the computational environment depend on a functional operating system (OS) that

manages hardware, other software, services and the users. It is the software when loaded onto the hardware that runs the environment of the machine, without which both the computer and the users are rendered useless. The operating system (OS) also can be directly accessed by the user through a command line or a graphical user interface (GUI) whereas the other programs, called  applications or application programs, can make use of the OS through an application program interface (API) designed for specific applications

Silberschatz, Galvin and Peter (2) had described the computers being made up of four components – namely the hardware, the operating system, the application software and the users. The authors defined the operating system as “A program that acts as an intermediary between a user of a computer and the computer hardware”. The goals of the operating systems, according to these authors in the year 2008, are to execute

user programs, to make solving user problems easier, thirdly, to make the computer system more convenient to use and finally, to use the computer hardware in an efficient manner. The vast majority of the OS programs are usually written in C and C++ languages by experienced system programmers. Some of the OS source codes are open access and free, others are proprietary information of the companies that market them.

Degree level courses on computer science and information technology require familiarity in handling the OS programs. One can look into the curriculum of the established foreign institutions for example, the University of Illinois (https://www.cs . u i c . e d u / ~ j b e l l / C o u rs e N o te s /OperatingSystems/), the MIT (https://ocw.mit .edu/courses/electr ical-engineering-and-computer-science/6-828-operating-system-engineering-fall-2012/), the Imperial College (http://www.imperial.ac.uk/computing/

COvER STORY

5 C S I C o m m u n I C a t I o n S | F E B R u a R Y 2 0 1 7

Page 6: ISSN 0970-647X Operating Systems - CSI INDIAcsi-india.org/Communications/CSIC_feb_2017.pdf · 2019-01-15 · Knowledge Digest for IT Community ISSN 0970-647X Operating Systems SECURITY

• CoverStory• TechnicalTrends• ResearchFront• Articles• InnovationsinIT• SecurityCorner• PractitionerWorkbench• BrainTeaser• ChapterReports• Studentbranchreports

current-students/courses/211/), and the Stanford University (http://www.scs.stanford.edu/09wi-cs140/).Types of OS Currently Popular:

The various operating systems had been popularly named by the companies that developed them (e.g. Windows, Android etc.) During technical discussion, OS’s are also referred to pointing out the functional features, or the size, structure and architecture of the computers they are housed in. Windows are maintaining the lion’s share in the field of desk top operating systems, whereas majority of mobile handsets use Android as the OS. The details of various operating systems are discussed in this issue of the Computer Society of India Communications, and elsewhere (https://en.wikipedia.org/wiki/Operating_system). A succinct and comparative discussion on various types is available from the Wikipedia (https://en.wikipedia.org/wiki/Comparison_of_operating_systems).

There are several ways of classifying the OS. They had been traditionally described as batch, time sharing, distributed, network and real time OS depending on the type of the computers and the tasks they perform. Services performed by an operating system include: multitasking, internal memory sharing, handling input and output devices, reporting system status and error messages, scheduling to offload batch jobs and also parallel processing when the programs run on more than one processors. The name of the OS may also reflect the size of the computer e.g. main frame, handheld mobiles, personal computers, mini and microcomputers etc.. The three major desk top computer operating systems are Windows, Mac Os and Linux; with the Windows taking about 85% of the market share in August 2016, Mac taking little over 6% and Linux about 2%. The popularity of handheld systems that changed our lives are referred to as mobile operating systems (MOS) running in smart phones, tablets and other similar devices. The familiar brand names are Android, iOS, Blackberry, Windows phone etc. The day-to-day life in the digital age abounds with examples of embedded systems present in the ATM’s, cars,

PoS, digital cameras etc. Interest in web-based computing environments also had developed the field of cloud computation (https://en.wikipedia.org/wiki/Cloud_(operating_system)). The Table 1 shows a summary of the usage of various operating systems in terms of global market share.

There had also been discussions on alternate or future OS programs like business operating systems, AMOGAO, HAIKU, SKYOS, MORPHOS, DEXOS etc. that have not been commercially as competitive as the few main brand names (http://royal.pingdom.co m / 2 0 0 8 / 0 9 / 2 6 / 1 0 - a m a z i n g ly-alternative-operating-systems-and-what-they-could-mean-for-the-future/)Non-Us Operating Systems:

Currently Windows for PC is overwhelming the market for OS. However several countries with large domestic markets (e.g. India, Russia, China etc.) had followed the approach to replace Windows software, and even hardware, to indigenize the computer industry and information technology. A few of the relevant examples are described below. The summary is presented in Table 2.Russian OS:

The Moscow Times (https://themoscowtimes.com/articles/russian-operating-system-to-launch-in-next-decade-50052 accessed on Dec 16, 2016) quoted Russian Government sources informing the decision of the government to replace the Windows based software and even computer hardware with domestic Russian products, the target remaining to substitute Windows software at all government agencies and strategic enterprises by the period 2025--2030. Currently the Windows enjoy virtual monopoly in the PC systems; and among the mobiles 35% Apple iOS and 27% Android OS software are in use. The Russian plan also aims at building its own hardware by that time replacing Microsoft and Apple products and the associated application software.

Currently Astra-linux and Phantom OS are being developed as the Russian substitute. The former is Linux- like that intends to meet the needs of the Russian defense industries (www.astra-

linux.com). It’s developed by RusBitTech available in English and Russian. The latter, the Phantom, is developed by the Russian programmers. It’s object-oriented and not Unix-like; it is available through Digital Zone (www.dz.ru/en).

Amidst the indigenization drive for the mobile platforms, Russian company Open Mobile Platform is hiring developers to use Android and iOS compatible applications to adapt to the non-US MOS platforms. The Sailfish OS had been an independent alternative. The open source software is developed by the Finish mobile company Jolla Ltd. and Sailfish OS community (https://sailfishos.org).Chinese, German and Indian OS:

China had also made efforts to develop non-US operating systems. Its product Kylin (later versions named neo-kylin and Ubuntu kylin) is Unix-like and available in about 60 languages (www.kylinos.com.cn). The product had been developed in the National Univ. Of Defence Technology.

Germany had developed the RTOS embedded system for the German Aerospace Center for applications that require high dependability. It is named Rodos Operating System (Real time On board Dependable Operating System) written in C, C++ and assembly languages. (www.Dlr.de/rodos)

India had reported, originally on Jan 10, 2007, the Bharat Operating System Solutions (BOSS) as an alternative operating system developed by the National Resource Centre for Free Open Source Software (NRCFOSS/CDAC, India). It is Linux-like and with multilingual ability to work with at least 18 languages and is boasting to replace Windows in India (www.bosslinux.in)Japanese OS:

The home grown computer operating system from Japan, TRON, (http://web-japan.org/trends/science/sci030522.html) is credited to the work by Professor Ken Sakamura of the University of Tokyo in 1984, who had advocated the idea of “ubiquitous computing,” in which tiny semiconductor chips are invariably embedded in every product. TRON stands for ‘The Real-Time Operating System Nucleus’.  The features like free open access to the

COvER STORY

www.csi-india.org 6

C S I C o m m u n I C a t I o n S | F E B R u a R Y 2 0 1 7

Page 7: ISSN 0970-647X Operating Systems - CSI INDIAcsi-india.org/Communications/CSIC_feb_2017.pdf · 2019-01-15 · Knowledge Digest for IT Community ISSN 0970-647X Operating Systems SECURITY

source code and very high speed of data processing had made TRON an attractive choice in cellular phones and a large number of domestic electronic goods. The Japanese business organizations mean to utilize TRON or Linux in all devices connected to internet (info-appliances). It had been once estimated that about half of all the embedded chips run on TRON.Mobile Operating Systems (MOS):

In the rest of this article that follows, the author emphasizes more details on the mobile technology operating systems that have become part of daily routine in the past decade revolutionizing the way common people think of action at a distance and globalization. This topic is also timely when the emphasis is being laid on the Digital India projects.

The mobile systems were primarily meant for use in the telephonic conversations. Then they eventually started competing in the internet technology claiming its share in e-commerce, e-banking and e-learning. The trend became deciding after 2010.

The major mobile operating systems include:(i) Android based on Linux kernel,

is free open source introduced by Google. It had been popular in the smart phones and also in some desktops,

(ii) iOS is proprietary software from the Apple Inc. and is based on MacOS;

(iii) Windows Phone is a Windows 10 (and earlier versions) based platform and is closed source proprietary software;

(iv) Blackberry is a product of BlackBerry Limited (formerly Research in Motion Limited) and is a closed source proprietary product.

Other MOS known to the consumers, but not so popular now, include Bada from Samsung Electronics, Symbian from Nokia, Palm OS from Access Company Ltd. etc.. In Q1 of 2016 the total sale for smart phones was more than 1 billion world over; and the global market share was 84.1% for Android, 14.8% for iOS, 0.7% for Windows phone and 0.2% for Blackberry.

The Wikipedia article lists the links that guide the reader to the major literature related to the mobile operating systems (https://en.wikipedia.org/wiki/Mobile_operating_system)Changes in Lifestyle and Emerging Trends:

The competition for capturing the market for internet technology on the mobile systems had been well studied by many marketing research agencies (see Table 3.). Appearance of the World Wide Web really turned the globe into a village within the reach of common people from the privacy of one’s own home. Though the World Wide Web is only about a quarter of a century old, its growth and impact in human life is undeniable. According to a survey about half a billion new users got connected to the web in 2014 alone, bringing the total number of surfers to 3 billion world wide. In a review in January 2015 (http://www.mobileindustryreview.com/2015/01/3-b i l l ion- internet-users-2015.html; accessed Dec 20, 2016) more than 80% of the population in Western Europe and the USA had access to the internet compared to about 19% in South Asian population. According to one survey people were spending on an average almost 4.5 hours daily in 2015 in comparison with the 2 hours they used to spend about 10 years ago in this world that typified the change on lifestyle adjusting to the age of information technology. The number of mobile broadband (3G and 4G) in UK is 89% of population while the same figure for India is merely 8% in the year 2015. These figures only speak of the potential for the market of broad band internet (mobile) technology when India adjusts to the modern lifestyle after digital penetration, especially in the business sector. Average world wide speed of the internet was 3.8 Mbps in 2013, whereas it had enhanced to 4.5 Mbps in 2015 world over. In UK 27% of the web pages served to mobile devices. Smart phones accounted for 38% of mobile connections worldwide, and 40% of the world mobiles are broadband enabled. New research from leading analysts finds that over 1 billion mobile phone users will have used their devices for banking purposes by the end of this year. This global user

base is forecast to reach 2 billion by 2020, by which time it will represent 37% of the global adult population. (https://www.juniperresearch.com/press/press-releases/mobile-banking-users-to-exceed-1-bn-this-year). The mobile technology scenario in UK is comparable to the USA in relative terms, but India is falling behind China. In essence the expansion in India is likely to be faster beyond the year 2016.

The American lifestyle is taken as a typical pattern of the rich and advanced country that had adjusted to the mobile and internet technology over a short period of time, utilizing its existing infrastructure of the PC, the main frame computers and the e-mail presence. According to a survey conducted during 2014, 90% of American adults own a cell phone; 42% of American adults own a tablet computer; 32% of American adults own an e-reader. The utilization of the mobile time pattern had been described as follows: 81% of the cell owners send and receive text, 60% access internet, 52% receive e-mail, 50% download Apps as part of their daily use (http://www.pewinternet.org/fact-sheets/mobile-technology-fact-sheet/)).

Another survey cites that the number of smart phone users worldwide will surpass 2 billion in 2016, (world population 7.4 billion in Aug 2016) representing over a quarter of the global population and that number is expected to grow to more than 2.56 billion people, or a third of the world’s population, in 2018. The vast amount of growth in the use of smart phones will come from China, the global leader in the market for smart phone users. India is to become the second largest, surpassing the USA, in registered users of smart phone. Alongside Russia is likely to surpass Japan to become the fourth largest smart phone user population. The projected number of smart phone users in the UK is 46 millions in 2018, and one should compare this number with the US population of about 325 millions in December 2016 and the UK population of about 65 millions in December 2016. In conclusion the three countries, China, India and Russia, are going to dominate in the market capitalization of smart phones by 2018 and beyond. (http://

COvER STORY

7 C S I C o m m u n I C a t I o n S | F E B R u a R Y 2 0 1 7

Page 8: ISSN 0970-647X Operating Systems - CSI INDIAcsi-india.org/Communications/CSIC_feb_2017.pdf · 2019-01-15 · Knowledge Digest for IT Community ISSN 0970-647X Operating Systems SECURITY

• CoverStory• TechnicalTrends• ResearchFront• Articles• InnovationsinIT• SecurityCorner• PractitionerWorkbench• BrainTeaser• ChapterReports• Studentbranchreports

www.telegraph.co.uk/technology/mobile-phones/11287659/Quarter-of-the-world-will-be-using-smartphones-in-2016.html).Conclusion:

The general discussion had been on the hundreds of handsets available from commercial vendors and the salient features of their in-built operating systems [for example see Wikipedia page] The private communication in the 21st century information technology had opened up myriads of opportunities in day-to-day dealing of data including images and voice. The upcoming technology with its various applications software running on the handsets has changed the financial budgetary patterns in many families and offices. Emphasis on online and e-governance and availability of such services on mobile systems can appropriately be called m-commerce, m-government and m-learning. In addition to the routine use of mobile platform to every customer, the author’s group had used such opportunities for furthering knowledge and research as described earlier. This particular article reviews the salient features of

the software behind that charming looks of ‘consumable’ handsets rightly called the ‘mobile operating system’, and the changes in the ‘mobile’ lifestyle. In addition the article distinguishes the emerging markets for the computer and mobile technology outside the USA to point out the fact that the Indian economy is likely to become a global decision maker beyond 2018.

No instruction is required to introduce the reader to the computer and the world; such habits are included and inculcated in every one of us in our daily routine. The purpose of this article is to make ordinary public and the corporate executives aware of the various systems commercially available and their trends so that the reader can form a well-informed opinion. Moreover the vast literature cited through the website links would be an added benefit to the students and teachers alike for the classroom exercises.References:[1] Ganguli, S.(2015) “Bioinformatic

Analysis of Medicinal Plants” presented to the 2nd International Congress of the Society for Ethnopharmacology, India (SFEC2015) held at Nagpur during

February 20-22, 2015.

[2] Silberschatz, Abraham; Galvin, Peter; Gagne, Greg (2008). “Operating Systems Concepts”. John Wiley and Sons . ISBN 0-470-12872-0.

Table 1 : Global Market Share of Operating Systems (as on June 2016)Operating System PercentageWin 7 38.21Win 10 19.92MacOSX 9.05Win8.1 7.89Win XP 5.92iOS 5.79Android 3.71Win 8 3.19Linux 2.95Win Vista 1.25Others 1.35

In Jan 2014 Win 7 held a global market share of 50.27% The Apple is more popular in the USA where the US market is about 20%.

Source: Accessed from http://www.global.market-share on Dec. 20, 2016.

Table 2 : Non-Us Operating Systems

Country Product Name Primary Source of InformtionRussia Astra-Linux www.astra-linux.comRussia Phantom www.dz.ru/enRussia Sailfish https://sailfishos.orgChina kylin www.kylinos.com.cnGermany Rodos www.Dlr.de/rodosIndia BOSS www.bosslinux.inJapan TRON http://tronweb.super-nova.co.jp/

homepage.htmlNote: The sites were last accessed on Dec 22, 2016.

Table 3 : Market Share For Internet Technology:Operating System Market ShareWindows 7 47.17%Windows 10 23.72%Windows XP 8.63%Windows 8.1 8.01%Linux >2.31%MacOS (many versions) >6%

The table was compiled from the site that reports statistics for internet technology online. The search was made for desktop systems only for the current month. Windows accounted for over 90%, Linux about 2.3% and Mac OS about 6% in December 2016.Source: https://www.netmarketshare.com/operating-system-

market-share.aspx?qprid=10&qpcustomd=0&qptimeframe=M&qpct=5 (last accessed on Dec 20, 2016)

About the AuthorDr. Subrata Ganguli, a Life Member of the Computer Society of India, was a faculty member in the Departments of Biotechnology, at the Shridevi Institute of Engineering and Technology, Tumkuru, Karnataka; the MVJ College of Engineering, Bangaluru,

Karnataka; and the Calcutta Institute of Pharmaceutical Technology, Howrah, West Bengal . He was educated at the IIT Kharagpur, IIT Delhi, and the University of Illinois at Chicago. He was the top ranker in his B.Tech. (Hons.) class in Chemical Engineering. He has more than ten years of teaching experience to his credit.

COvER STORY

www.csi-india.org 8

C S I C o m m u n I C a t I o n S | F E B R u a R Y 2 0 1 7

Page 9: ISSN 0970-647X Operating Systems - CSI INDIAcsi-india.org/Communications/CSIC_feb_2017.pdf · 2019-01-15 · Knowledge Digest for IT Community ISSN 0970-647X Operating Systems SECURITY

Blockchain : A Disruptive Innovation KVN Rajesh KVN Ramesh

M.Tech in Computer Science and Technology from Andhra University M.E in Structural Engg. from Andhra University

Demonetisation in India in November-2016 has been the greatest disrupter to Status quo in terms of economy and finance in the history of Post Independent India. Taking queue from India, Venezuela too announced on 11-Dec-2016 that its 100-bolivar big note would cease to be legal tender within 72 hours of the announcement. There has been great discourse and debate between Government, Opposition and common public in India about the merits and de-merits of cash economy and the advantages of move to a cashless digital economy. Black money, fake currency, terrorism, tackling money laundering and move to cashless digital economy have been projected by the Government as the reasons for Demonetisation. The Indian Government in no uncertain terms has conveyed its intention that cashless or less cash Digital economy is the way forward and has announced a number of incentives to promote cashless digital transactions. The literacy rate in India is around 75% and digital literacy rate would be definitely much lower than that. With lower digital literacy among the population, the increase in digital financial transactions is likely to lead to increase in number of cyber financial crimes. Even large financial institutions with powerful and secure technical infrastructure are not immune to the attacks by hackers and cyber criminals. When financial infrastructure is concentrated and centralized in the hands of few institutions, they are always prone to attack from both inside and outside of the respective organizations. In this context, a technology which is immune to tampering is bound to be successful and find widespread application. Blockchain is precisely that kind of technology. The Blockchain is a big buzzword now-a-days and is being promoted as the next big thing after the Internet. The Blockchain is usually heard in conjunction with the cryptocurrency named Bitcoin, since

Blockchain is the technology behind Bitcoin. The author of this article, K.V.N.Rajesh, had also written an article titled “BITCOIN - An Overview of the Popular Digital Cryptocurrency” back in March 2014 in the same CSI Communications. He commented in the conclusion of that article that whether Bitcoin will succeed or not, only time can tell, but the concept behind Bitcoin is here to stay. That has come exactly true and Blockchain technology is finding application at every place where transactions between two or more parties are involved. The terms like Internet of Transactions, Internet of Value and Internet of Trust are being used in the context of Blockchain. The objective of this article is to explain the Blockchain technology and its various applications. Since Bitcoin and Blockchain are tightly intertwined, we are at many times referring to Bitcoin in this article to explain about Blockchain.Origin of Blockchain

A Blockchain is a shared, distributed, immutable, public ledger of continuously growing and updated list of transactions. A group of validated transactions are aggregated into a block and each block contains data about the previous block thus creating a chain of blocks in chronological order. The origin of Blockchain and Bitcoin is linked together. It all started with a post titled “Bitocin P2P e-cash paper” by an anonymous developer named Satoshi Nakamoto on 01-Nov-2008 on a cryptography mailing list at http://www.metzdowd.com/mailman/listinfo/cryptography. The original post is still available at http://www.mail-archive.com/[email protected]/msg09959.html. The post contained summary details of Bitcoin and a link (https://bitcoin.org/bitcoin.pdf) to the nine-page technical paper titled “Bitcoin: A Peer-to-Peer Electronic Cash System” authored by Satoshi Nakamoto. The announcement of the first release of the Bitcoin (v0.1)

happened on 09-Jan-2009 on the same cryptography mailing list. The post is still available at http://www.mail-archive.com/[email protected] o m / m s g 1 0 1 4 2 . h t m l . S a t o s h i Nakamoto also made a post titled “Bitcoin open source implementation of P2P currency” at http://p2pfoundation.ning.com/forum/topics/bitcoin-open-source on 11-Feb-2009 about the release of Bitcoin v0.1 at http://www.bitcoin.org. The first transaction on the Bitcoin Blockchain happened on 12-Jan-2009 when Satoshi Nakamoto sent 10 bitcoins as a test to another computer cryptographic programmer named Hal Finney. The record of this first Blockchain transaction in the Block #170 of the Bitcoin Blockchain can be seen at https://blockchain.info/block-index/15019.

At the time of its release, Bitcoin consisted of thirty-one thousand lines of code. The latest executable version of Bitcoin Core is available for download at https://bitcoin.org/en/download and it is available as a free software project released under MIT License. The Bitcoin source code is available at https://github.com/bitcoin/bitcoin. It can be seen in the source code that the programming language predominantly used is C++.Understanding the concept of Blockchain

The world financial crisis in the late 2000s and systematic banking collapses such as that of Lehman Brothers, seems to be the motivation behind Satoshi Nakamoto’s coming up with the Bitcoin. The value of money in the existing financial system is based on the trust created by a third party and intermediaries like Governments, Central Banks and Financial systems. Satoshi Nakamoto created a system where the trust is based on non-human entity which is the code and cryptography designed in such a way that it is almost impossible to tamper and manipulate. The design itself is

TECHNICAL TRENDS

9 C S I C o m m u n I C a t I o n S | F E B R u a R Y 2 0 1 7

Page 10: ISSN 0970-647X Operating Systems - CSI INDIAcsi-india.org/Communications/CSIC_feb_2017.pdf · 2019-01-15 · Knowledge Digest for IT Community ISSN 0970-647X Operating Systems SECURITY

• CoverStory• TechnicalTrends• ResearchFront• Articles• InnovationsinIT• SecurityCorner• PractitionerWorkbench• BrainTeaser• ChapterReports• Studentbranchreports

such that it is more profitable to be honest and play by the rules rather than be dishonest and try to manipulate the system. Any effort to beat the system by the use of large scale computing power is bound to be detected by the other honest participants since Blockchain is not centralized and is a global distributed ledger. The attempt is bound to fail and hence would lead to a loss of investment in the dishonest efforts. The same efforts when spent to play by the rules of the system may lead to the incentives and rewards given the system. Thus the motivation would be to play by the rules and be honest. The subsequent part of this section describes how the Blockchain has been designed to establish trust.

Everybody must have heard of a ledger. Ledger is a book or software for record keeping of transactions of companies, organizations, banks and any other institution. Institutions use many kinds of ledgers like Sales Ledger, Purchase Ledger and General Ledger.

Blockchain is a software implementation of a distributed and shared ledger based on cryptographic concepts. A highly simplified explanation of the Blockchain is as follows. A diagrammatic representation of Blockchain is available in Fig 1 and Fig 2. Whenever a transaction happens between two parties, the transaction is broadcast to the entire Blockchain network. At intervals of time, the group of transactions that happened after the creation of last block are validated. Once the validation is complete, a new block is generated. The average interval of time between creation of two blocks is 10 minutes. The new block is timestamped and made immutable to tampering by cryptographic and hashing algorithms. The validation of the block is carried out by people known as miners. Each of the miner competes to complete the validation faster than the others. In case of Bitcoin Blockchain, the miner who completes the validation first and leads to the generation of a new block receives the rewards in terms of Bitcoin. Each of the blocks is connected to its previous block by storing the hash of the header of previous block. This connection of one block to another forms a virtual chain similar to a linked

list and thus the name Blockchain. This Blockchain is distributed and stored on all nodes of the Blockchain network. The header of the Block also contains something called a Merkle Tree which is the summary of all the transactions in the block. The Merkle Tree also called a Binary Hash Tree, acts as a digital fingerprint of all the transactions in the block. Merkle Trees in Blockchain use a cryptographic algorithm named double-SHA256. SHA256 is the secure hash algorithm designed by National Security Agency. SHA256 is a set of cryptographic hash functions whose key characteristic is that no two different inputs can produce the same hash output. Even a slightly different input will produce a vastly different hash output. To illustrate this point, an online SHA256 generator at http://www.timestampgenerator.com/tools/sha256-generator/ is used.

The SHA256 hash output for the string “I am Rajesh” is 751d34e6ade738e0e60e063b3dfa1b76a 83f90af4e123b2c3e903c19e9c58fdd

Let us change the string a little bit by adding a period at the end of the string as “I am Rajesh.”. The SHA256 output for the same is vastly different and is f55ac225cc2442877d0fa51163c142c471 f870531edd802b60deb85752e4ce18

Any attempt to hack the Blockchain would involve not just tampering the current block but the history of transactions in all the previous blocks. Also, since this distributed ledger is stored on all the nodes of network, the tampering needs to be done on all the nodes at the same time else there will be disagreement between the nodes and the tampering would get detected and the block would not be validated and included in the Blockchain. With the day by day growth of the Blockchain and the number of nodes in the network, the level of difficulty of tampering would keep on increasing exponentially. This extreme resistance to tampering of Blockchain by the virtue of its design and code is the characteristic which brings trust in the system. That is the reason why Blockchain is finding many applications in various systems wherever transactions between various parties are involved.

One of the main problems associated with cryptocurrencies is

the problem of Double-Spending. In normal cash transaction, when you give a note or a coin to another person, there is no way that you can give the same note or coin to another person since cash is a physical entity and cannot have multiple presence by the laws of physics as we know now. But Double-Spending is a real problem for the cryptocurrencies since there is no physical entity involved. If you are able to spend the same currency even after giving it to another person, the currency system is bound to collapse within short time. The success of the Blockchain technology is largely due to it having solved this Double-Spending problem. Every transaction added to the block chain is verified to ensure that the inputs to the transaction have not already been spent. In other systems, a trusted third party validates the rules and confirms each transaction, but the whole premise on which Bitcoin and Blockchain is based, is not having a third party. In Bitcoin, the need for various nodes of the Blockchain network to be in consensus prevents the Double-Spending problem.

Genesis Block

Transaction Blocks 1 to “N-1”

Transactions in Block N

Transactions in Block “N+1”

Transactions in Block “N+2”

Header of Block N

Merkle Root

Timestamp

Previous Block Hash

Header of Block “N+1”

Merkle Root

Timestamp

Previous Block Hash

Header of Block “N+2”

Merkle Root

Timestamp

Previous Block Hash

Fig. 1 : Simplified Representation of Blocks in Blockchain

variants of BlockchainThe two variants of Blockchain are

Public Chain and Private Blockchain. Public Blockchains are the Blockchains in which anyone in the world can read, transact and participate in the consensus process. Permissionless Blockchains is another term frequently used with regards to Public Blockchains since anybody can use it and anybody can become a miner in it without any permission from any authority. Bitcoin Blockchain is an example of Public Blockchain. Private Blockchains are

TECHNICAL TRENDS

www.csi-india.org 10

C S I C o m m u n I C a t I o n S | F E B R u a R Y 2 0 1 7

Page 11: ISSN 0970-647X Operating Systems - CSI INDIAcsi-india.org/Communications/CSIC_feb_2017.pdf · 2019-01-15 · Knowledge Digest for IT Community ISSN 0970-647X Operating Systems SECURITY

the Blockchains where the users who can read, transact and participate are restricted. Private Blockchains are the Blockchains which are of more interest to the Businesses since they get all the advantages of the Blockchain while retaining a tight control on who does what in the system. There are again variants like Consortium Blockchains and Fully Private Blockchains here. Private Blockchains are also known as Permissioned Blockchains since users need permission to access the Blockchain. One example of the Private Blockchain is the distributed consensus ledger system by a company named Ripple for the banking and Financial industry.

Hyperledger is another open source collaborative project to advance cross-industry Blockchain technologies for various industries like Finance, Banking, Internet of Things and Supply Chain. Advantages and Applications of Blockchain

More than the Bitcoin, it is the other possible applications of Blockchain that is causing such hype and excitement about this technology. Lesser costs and unprecedented speed of transactions due to absence of intermediaries is being seen as one of the main advantages of

usage of Blockchain; Technology. Other advantages that are being seen are the ease of conducting transactions, security, efficiency, transparency, neutrality and traceability.

Any common man who has dealt in real estate or is buying land or plot knows how hard it is to trust about whether he is buying from the correct legal owner of the property and if the property has not already been sold to somebody else. Blockchain technology will bring great transparency when applied to Land Registry Systems. Sweden is conducting tests to implement Blockchain in its Land Registry and real estate transactions. Central American country named Honduras is taking help of a U.S. Blockchain technology company named Factom to apply Blockchain technology in building a permanent and secure land title record system.

Smart and self-executing contracts are another area where Businesses are evincing great interest to apply and use Blockchain technology. Smart contracts are contracts where the contractual terms are written in special computer programming languages. In the current scenario, the contract funds are deposited with a third party escrow account. The third party does verification and then releases funds to the concerned party on completion

of contractual agreements. The third party charges certain percentage of the contractual amount for its services. The Smart Contracts with Blockchain as the underlying technology can discard the Intermediary. The funds could be deposited to a virtual account and the Smart Contract Code can automatically release the funds to the concerned party on fulfillment of the contractual agreements listed in the computer language code. This would be more transparent and can save the money spent on the third party services. The decentralized platform named Ethereum developed by Ethereum Foundation is one of the solutions which runs smart contracts.

It is not uncommon to see the political parties raising the issue of vote tampering after elections. The application of Blockchain in voting in democracies is being visualized to prevent the possibility of vote tampering. This is to prevent rigging and to secure the votes by recording them in Blockchain database which is highly immune to tampering. In December 2016, a Block chain voting project named Votebook by three New York University Students won the $10,000 prize in a challenge from Kaspersky Lab.Blockchain – Indian Perspective

Being at the forefront of Information technology industry, India and Indians are not the ones to be left behind on something as path-breaking and as disruptive as Blockchain. India’s top Business group Mahindra is partnering with IBM on applying Blockchain in the supply chain finance business. They are also working on integrating Blockchain and Internet of Things solutions for tracking truck movements and delivery times of goods.

In June 2016, Reserve Bank of India expressed its intention to setup a committee to study usage of Blockchain to reduce use of Paper currency. The Sunrise State of Andhra Pradesh has introduced the Blockchain technologies to prevent cybercrimes. It introduced Blockchain in some of its departments to prevent its databases from being hacked. Andhra Pradesh is also planning to setup a Blockchain Technology Institute in the port city of

Blockchain Ledger

Blockchain Ledger

Blockchain Ledger

Blockchain Ledger

Blockchain Ledger

Node N+1

Node 1

Node N

Node 3

Node 2

Fig. 2 : Simplified Representation of Blockchain

TECHNICAL TRENDS

11 C S I C o m m u n I C a t I o n S | F E B R u a R Y 2 0 1 7

Page 12: ISSN 0970-647X Operating Systems - CSI INDIAcsi-india.org/Communications/CSIC_feb_2017.pdf · 2019-01-15 · Knowledge Digest for IT Community ISSN 0970-647X Operating Systems SECURITY

• CoverStory• TechnicalTrends• ResearchFront• Articles• InnovationsinIT• SecurityCorner• PractitionerWorkbench• BrainTeaser• ChapterReports• Studentbranchreports

Visakhapatnam in collaboration with University of California, Berkeley.

In October-2016, ICICI bank announced that it carried out India’s first Blockchain transactions for fund remittance between its Mumbai branch and Dubai branch of Emirates NBD Bank. ICICI bank also carried out a Blockchain network based pilot transaction involving a Mumbai firm and a supplier from Dubai for import of steel scrap. Two other Indian Banks named Kotak Mahindra and Axis Bank are conducting pilot transactions using Blockchain and are experimenting it in various Business segments.

Kratos Innovation Labs, a Singapore based startup founded by two Indians named Satheesh Kumar Paddolker and Rajiv Kaushik, has developed two blockchain products named x-DeFraud and Smart Contracts as a Service (SCaaS). These products are related to detecting fraud in trade finance and customized Smart Contract solutions for financial institutions.

An Infosys subsidiary named EdgeVerve has released a Blockchain Framework for Financial Services, which is a shared distributed ledger solution for payments, trade finance, smart contracts and other transactions. TCS is also investing in Blockchain technology and is getting ready to launch a core banking software based on Blockchain. Cognizant entered into an agreement with Japan based Mizuho Financial Group to develop Blockchain solutions for its customers and group companies.Learning Resources for Blockchain

As already mentioned, Bitcoin was the first purpose for which Blockchain technology was developed by Satoshi Nakamoto, so learning about Blockchain invariably involves understanding the implementation of Bitcoin Blockchain.

To learn about Blockchain straight from the horse’s mouth, we can refer to Blockchain section of the bitcoin developer guide at https://bitcoin.org/en/developer-guide#block-chain. This website https://bitcoin.org was originally registered by Satoshi Nakamoto and another developer named Martti Malmi. A host of other documentation

is available at https://bitcoin.org/en/developer-documentation.

The Bitcoin wiki at https://en.bitcoin.it/wiki/Main_Page is another one-stop shop for all things related to Bitcoin and Blockchain. The main interest now in Blockchain is due to the various purposes other than Bitcoin for which it can be applied to. The following link https://en.bitcoin.it/wiki/Alternative_chain at Bitcoin wiki explains the same in detail.

One another accessible way to learn about Blockchain is by enrolling and attending the Free Massive Open Online Course on Bitcoin at https://www.coursera.org. There is a course named “Bitcoin and Cryptocurrency Technologies” created by Princeton University and taught by Arvind Narayanan, Assistant Professor in Computer Science. It is available at the following link:

https://www.coursera.org/learn/cryptocurrency

There is a free self-paced online course titled “IBM Blockchain for developers” available at the following l ink: https://developer. ibm.com/courses/all-courses/blockchain-for-developers/ Conclusion

In these times when the Government has declared war on corruption and people are demanding increasingly fast, efficient and transparent services from the Government and Businesses, the Block chain technology is bound to come into picture sooner than later. Blockchain based identity management and financial solutions can be used to accelerate the move towards cashless economy which the Government is aiming for. Blockchain technology can reduce the cost of cross-border remittances which is fueling the economies of many developing countries. More and more applications of Blockchain to various systems involving transactions are bound to be developed and implemented across the world. This is definitely going to have positive impact on the Global Economy and also going to provide a lot of opportunities to people and organizations skilled in the Blockchain technologies.

References [1] http://www.coindesk.com/ibm-

blockchain-mahindra-supply-chain/

[2] http://economictimes.indiatimes.com/small-biz/security-tech/technology/mahindra-drops-the-coin-on-blockchain-to-manage-books/articleshow/55718325.cms

[3] http://indiatoday.intoday.in/story/andhra-pradesh-asia-blockchain-t e c h n o l o g y - c y b e r - c r i m e -cashless/1/835037.html

[4] http://timesofindia.indiatimes.com/city/visakhapatnam/AP-govt-plans-blockchain-tech-institute-in-port-city/articleshow/55298937.cms

[5] h t t p : / / w w w . t h e h i n d u . c o m /business/ICICI-Bank-executes-I n d i a % E 2 % 8 0 % 9 9 s - f i r s t -t ra n s a c t i o n - o n - b lo c kc h a i n /article15894311.ece

[6] http://www.livemint.com/Industry/l o z t j 0 R 9 8 E a 6 m 5 8 N g 8 j U z M /Blockchain-technology-catches-Axis-Kotak-Mahindras-fancy.html

[7] h t t p : / / w w w . l i v e m i n t .c o m / C o m p a n i e s /bXjPtlHZRK46FQVb2hxhyN/TCS-throws-weight-behind-blockchain.html

[8] https://www.washingtonpost.com/news/the-switch/wp/2014/01/03/hal-finney-received-the-first-bitcoin-transaction-heres-how-he-describes-it/

[9] h t t p : / / e c o n o m i c t i m e s .i n d i a t i m e s . c o m / s m a l l - b i z /startups/fraud-proof-kratos-innovations-blockchain-tech-can-save-mill ions-for-banks/articleshow/55888342.cms

[10] h t tps : //www.edgeverve .com/finacle/solutions/Documents/edgeverve-blockchain-financial-services.pdf

[11] h t t p : / / w w w. n e w y o r ke r. co m /magazine/2011/10/10/the-crypto-currency

[12] https://en.bitcoin.it/wiki/Double-spending

[13] http://chimera.labs.oreilly.com/books/1234000001802/ch07 .html#merkle_trees

[14] h t t p : / / w w w . r e u t e r s . c o m /

TECHNICAL TRENDS

www.csi-india.org 12

C S I C o m m u n I C a t I o n S | F E B R u a R Y 2 0 1 7

Page 13: ISSN 0970-647X Operating Systems - CSI INDIAcsi-india.org/Communications/CSIC_feb_2017.pdf · 2019-01-15 · Knowledge Digest for IT Community ISSN 0970-647X Operating Systems SECURITY

article/us-sweden-blockchain-idUSKCN0Z22KV

[15] http:// in.reuters.com/article/u s a - h o n d u r a s - t e c h n o l o g y -idINKBN0O01V720150515

[16] http://www.itworldcanada.com/article/how-blockchain-based-smart-contracts-can-help-grow-your-business/382611

[17] h t t p : / / g s n m a g a z i n e . c o m /

art ic le/47589/nyu_students_win_award_solution_safeguard_electron

[18] https://www.ethereum.org/[19] h t t p s : / / b l o g . e t h e r e u m .

org/2015/08/07/on-public-and-private-blockchains/

[20] https://www.smithandcrown.com/permission-blockchains/

[21] https://en.wikipedia.org/wiki/

Ripple_(payment_protocol)[22] https://www.hyperledger.org/[23] http://timesofindia.indiatimes.

com/business/india-business/RBI-to-study-Blockchain-technology-t o - c u r t a i l - p a p e r- c u r re n c y /articleshow/52906383.cms

[24] https://shocard.com/ n

TECHNICAL TRENDS

About the AuthorsMr. K.v.N.Rajesh [CSI-I1503325] is M.Tech in Computer Science and Technology from Andhra University in 2010. He is the Head of the Department and Senior Assistant Professor in Department of information technology at Vignan’s Institute of Information Technology, Visakhapatnam since 2005. He is a member of Computer Society of India. His research interests include Business Intelligence, Location Intelligence and Big Data and he has published papers in the respective areas. He can be reached at [email protected].

Mr. K.v.N.Ramesh is M.E in Structural Engineering from Andhra University. He has 15 years of experience in IT industry with expertise in the area of Data Warehousing and Business Intelligence. He has worked on UNIX, Oracle, Sybase, Business Objects, OBIEE and Tableau during these years. He is an Oracle certified professional in Oracle DW and OBIEE. He is currently working as Project Manager at Tech Mahindra, Visakhapatnam. He can be reached at [email protected].

13 C S I C o m m u n I C a t I o n S | F E B R u a R Y 2 0 1 7

(ADvERTISING TARIFF)Rates effective from April, 2014

CSI CommunicationsCOLOUR

Colour Artwork (Soft copy format) or positives are required for colour advertisement

MECHANICAL DATA

Back Cover ` 50,000/- Full page with Bleed 28.6 cms x 22.1 cmsInside Covers ` 40,000/- Full Page 24.5 cms x 18.5 cmsFull Page ` 35,000/- Double Spread with Bleed 28.6 cms x 43.6 cmsDouble Spread ` 65,000/- Double Spread 24.5 cms x 40.0 cmsCentre Spread(Additional 10% for bleed advertisement)

` 70,000/-

Special Incentive to any Individual/Organisation for getting sponsorship 15% of the advertisement value. Special Discount for any confirmed advertisement for 6 months 10%.Special Discount for any confirmed advertisement for 12 months 15%.All incentive payments will be made by cheque within 30 days of receipt of payment for advertisement.All advertisements are subject to acceptance by the editorial team.Material in the form of Artwork or Positive should reach latest by 20th of the month for insertion in the following month.All bookings should be addressed to :

Computer Society of IndiaTM

Unit No. 3, 4th Floor, Samruddhi Venture Park, MIDC, Andheri (E), Mumbai-400 093. Tel. 91-22-2926 1700 • Fax: 91-22-2830 2133 | Email: [email protected]

Page 14: ISSN 0970-647X Operating Systems - CSI INDIAcsi-india.org/Communications/CSIC_feb_2017.pdf · 2019-01-15 · Knowledge Digest for IT Community ISSN 0970-647X Operating Systems SECURITY

• CoverStory• TechnicalTrends• ResearchFront• Articles• InnovationsinIT• SecurityCorner• PractitionerWorkbench• BrainTeaser• ChapterReports• Studentbranchreports

www.csi-india.org 14

C S I C o m m u n I C a t I o n S | F E B R u a R Y 2 0 1 7

Customized Linux Distributions for Bioinformatics Applications

Khalid Raza & Sahar Qazi Department of Computer Science, Jamia Millia Islamia (Central University), New Delhi-110025. Email: [email protected]

IntroductionThe creation of this beautiful

universe is the witness of the systemization of everything. To better understand this concept, we can have a look at our ‘Genome’. The genome is said to be the “Blueprint” of an organism since it is composed of the whole set of genes and gene products. It is the genome which is known to control and regulate the framework of an individual. Complex systems are defined as large numbers of interactions among various constituents. The genome is the janitor of the living organisms managing everything; very similarly, we have the operating system which is the most essential part of any computer system (Yan et al., 2010). The main purpose of an operating system is to provide a milieu where the user can interact and execute the programs in a very easy yet efficient manner. Due to rapid advancement and applications of computational biology and bioinformatics in biomedical and pharmaceutical industries, there has been a need for the creation of operating system which suites the requirements of computational biologists and medical scientists. This article focuses on operating system customized for computational biology and bioinformatics applications.Advent of open source operating systems and Linux distributions

With the advent of free and open source software (FOSS), this movement has overtaken operating systems causing many of them to be made available. Since the source code is available freely under FOSS movement, the detailed study of operating systems became quite easy. Some of the examples of open source operating systems are Linux (1991), FreeBSD (1993), Ubuntu (2011), etc. The initial effort for the movement was started by Richard Stallman in 1983 under GNU

Project and later in 1985 GNU Manifesto was published to outline the purpose and importance of free and open source software. The biggest breakthrough of open source operating system began with the development and release of Linux by a Finnish student Linux Torvalds in 1991; who developed a free kernel of the operating system and released it under GNU General Public Licence. Since then, there have been a large number of Linux distribution, a list of top 10 distributions is shown in Fig. 1.

UbuntuPuppy Linux

Arch Linux

Sabayon/ Gentoo

Mandriva

Debian

PCLinux OS

open SUSE

Linux Mint

Fedora

Top 10 Linux

distributions

Fig. 1 : Top 10 Linux distributions

Customized Linux for Bioinformatics & Computational Biology Applications

The advent of open source operating systems leads to the development of customized operating systems for various purposes including computational biology and bioinformatics applications (Årdal et al., 2011). Pharmaceuticals are an often mentioned application area for customized operating system for drug discovery. Open source utilization in the field of pharmaceuticals paving, or rather has already paved a way for the development of this prominent field known as Chemoinformatics. The WHO’s

Consultative Expert Working Group for Research and Development Financing and Coordination has evaluated open source drug discovery (Årdal et al., 2011). Pharmaceutical companies have contributed a lot to the discovery of drugs for many diseases. Few research based pharmaceutical industries have also made commendable efforts to discovery drugs for T.B. Some of the customized Linux for bioinformatics and computational biology applications are described as follows and depicted in Fig. 2.

Fig. 2 : Five popular customized Linux tailored for bioinformatics applications

BioLinux: It is a free bioinformatics platform built on Ubuntu Linux LTS based, providing more than 250 bioinformatics packages, 50 graphical applications, and hundreds of command line utilities. The recent Bio-Linux version 8.0 also incorporates Galaxy environment for browser-based data analysis. The Bio-Linux is created and maintained by NERC Environmental Bioinformatics Centre (NEBC). It is not only available for workstation but also on cloud architecture such as Amazon EC2 by using CloudBioLinux. It can also run directly from a DVD/USB without installing analysis (Field et al., 2006).

BioSLAX: It is also a customized operating system for bioinformatics build on SLACKWARE flavour of the

R E S E A R C H F RO N T

Page 15: ISSN 0970-647X Operating Systems - CSI INDIAcsi-india.org/Communications/CSIC_feb_2017.pdf · 2019-01-15 · Knowledge Digest for IT Community ISSN 0970-647X Operating Systems SECURITY

15 C S I C o m m u n I C a t I o n S | F E B R u a R Y 2 0 1 7

Linux, comprises of more than 300 bioinformatics tools. It directly runs from the DVD/USB without the need of installation, and let the user modularize applications and plug it into the system on the fly. It was first released by Life Sciences Institute (LSI), National University of Singapore in 2006.

DNALinux: It is also a virtual machine based on SLAX having lots of bioinformatics tools including AutodockSuite, Biopython, BLAST, ClustalX, EMBOSS, NCBI Toolkit, and so on. Since its first release in 2007, there is subsequence releases (Bassi & Gonzalez, 2007).

OSDDLinux: The main objective of Open Source Drug Discovery (OSSD) Linux is to create a novel open source computational and experimental

platform for drug discovery. It allows universities, researchers, students, organizations and pharmaceutical industries world-wide on scientific projects to contribute for drug design and discovery. The OSDDLinux operating systems capability is not just restricted to drug designing, but encompasses various fields of bioinformatics analysis and computational biology as well.

LXtoo: It is another customized Linux distribution for bioinformatics research community, where “LX” stands for LiangXian and “too” indicates that it is based on Gentoo. It is distributed as LiveCD/LiveUSB and run within VMware too for parallel execution with host operating system (Yu et al., 2012). Summary

The field of Bioinformatics has

made commendable contributions in understanding the modern biology. Bioinformatics software and tools packaged with Linux Operating system to offer a better and cheaper way to set up an influential workbench for computational biologists. Today, Linux operating system comes with attractive desktop environments, which are easier to use without much training. Also, Linux is virtually resistant to Trojans and viruses, it is definitely a better choice for any life science researcher willing to perform biological computations. Today’s research is open to computer technology irrespective of the fact of what scientific background it belongs to. Bioinformatics tools are available freely for all scientific backgrounds. Many operating systems mentioned above

Table 1 : A summed up table presenting few most popular customized Linux tailored for bioinformatics and computational biology applications.

Name Developer/Distribution

Year of first release

Current version Important bioinformatics tools available

BioLinux NERC Environmental Bioinformatics Centre

2006 BioLinux 8.0 ABYSS, Assembly-conversion-tools, axiome, BAMTools, Beam2, BedTools, Big-BLAST, BitSeq, BLAST2, Bowtie Tools, BWA, ClustalW/X, Cufflinks, Cytoscape, DiAlign, EMBOSS, FastQC, FastTree, Galaxy-Server, Geneious, GNX-Tools, HMMER, Jalview, Jellyfish, , BioJava Library, Muscle, MView, NRDB, Phylip, Pymol, R with several packages, Rasmol, SamTools, T-coffee, many more.

BioSlax National University of Singapore

2006 BioSLAX 8.0 BLAST, BioGrep, ClustalW, EMBOSS, Genesplicer, HMMER, GlimmerHMM, Modeller, PamL, Phylip, Primer3, R & Bioconductor, T-Coffee, JAligner, Jalview, jEMBOSS, Jmol, NJPlot, Pymol, ReadSEQ, TreeView, Weka, etc.

OSDDLinux CSIR - Institute of Microbial Technology, India

— No subsequent release

Tools for Genome and Proteome Annotation, Vaccine and Drug Informatics, Biotherapeutics, NGS data analysis, GPSR basic scripts & several third party software

DNALinux Genes Digitales and Quilmes National University, Argentina

2007 No subsequent release

AutodockSuite, Biopython, BLAST, ClustalX, EMBOSS, EMNU, ESIM, FinchTV, HMMER, IPRSCAN, Kalign, MIRA, NCBI Toolkit, Phylip, Primer, Pymol, Rasmol, Readseq, Sigma Align, TreeView, Vienna RNA, and many more.

LXtoo Jinan University, China 2012 No subsequent release

NCBI tools, EMBOSS and SMS2 for sequence analysis, Sequence alignment tools - ClustalW/X, Gene finder tools - qRNA, Glimmer; miRNA target prediction tool PITA; Vienna for RNA secondary structure prediction and comparison; Network analytical tools like Cytoscape and igraph library; GOSemSim for GO and DO semantic study; TM4 and bioconductor packages for Microarray analysis and many more.

R E S E A R C H F RO N T

Page 16: ISSN 0970-647X Operating Systems - CSI INDIAcsi-india.org/Communications/CSIC_feb_2017.pdf · 2019-01-15 · Knowledge Digest for IT Community ISSN 0970-647X Operating Systems SECURITY

• CoverStory• TechnicalTrends• ResearchFront• Articles• InnovationsinIT• SecurityCorner• PractitionerWorkbench• BrainTeaser• ChapterReports• Studentbranchreports

www.csi-india.org 16

C S I C o m m u n I C a t I o n S | F E B R u a R Y 2 0 1 7

contain bioinformatics tools, and thus, come under the ocean of FOSS (Free and Open Source Software), making it very easy for students & researchers to practice and to study biological phenomenon in a new light. There is an open choice for researchers to choose from several fully loaded operating systems, and this choice is increasing day-by-day, with new technologies coming in. The open-source operating systems is very easy to work with and without any doubts, has been proven to yield successful results, thus, making it a part-n-parcel of the modern biological laboratories.References [1] Årdal, C., Alstadsæter, A., &

Røttingen, J. A. (2011). Common characteristics of open source software development and applicability for drug discovery: a systematic review. Health Research Policy and Systems, 9(1), 1.

[2] Bassi, S. and Gonzalez, V. (2007). DNALinux Virtual Desktop Edition. Available from Nature Precedings h t t p : / / d x . d o i . o r g / 1 0 . 1 0 3 8 /npre.2007.670.1

[3] Field, D., Tiwari, B., Booth, T., Houten, S., Swan, D., Bertrand, N. and Thurston, M.( 2006). Open Software for biologists: from famine to feast. Nature Biotechnology 24, 801 - 803.

[4] OSDDLinux: a custom operating

systems for drug design, http://osddlinux.osdd.net/ Accessed on January 1, 2017.

[5] Yan, K. K., Fang, G., Bhardwaj, N., Alexander, R. P., & Gerstein, M. (2010). Comparing genomes to computer operating systems in terms of the topology and evolution of their regulatory control networks.  Proceedings of the National Academy of Sciences, 107(20), 9186-9191.

[6] Yu, G., Wang, L. G., Meng, X. H., & He, Q. Y. (2012). LXtoo: an integrated live Linux distribution for the bioinformatics community. BMC Research Notes, 5(1), 360.

n

an individual.2 are friends.

3 is company.

more than 3 makes a society. The arrangement of these elements makes the letter ‘C’ connoting ‘Computer Society of India’.the space inside the letter ‘C’ connotes an arrow - the feeding-in of information or receiving information from a computer.

CSI Headquarter :Samruddhi Venture Park, Unit No. 3, 4th Floor, MIDC, Andheri (E), Mumbai-400093, Maharashtra, IndiaPhone : 91-22-29261700Fax : 91-22-28302133Email : [email protected]

CSI Education Directorate : CSI Registered Office :CIT Campus, 4th Cross Road, Taramani, 302, Archana Arcade, 10-3-190,Chennai-600 113, Tamilnadu, India St. Johns Road, Phone : 91-44-22541102 Secunderabad-500025,Fax : 91-44-22541103 : 91-44-22542874 Telengana, IndiaEmail : [email protected] Phone : 91-40-27821998

About the AuthorsDr. Khalid Raza (CSI Member ID 01060359) is an active researcher and working as an Assistant Professor at the Department of Computer Science, Jamia Millia Islamia, New Delhi. He has contributed one book, two book chapters, and over 25 research articles in refereed international journals and conference proceedings. His research interests lies in computational biology, Biological Data Analytics and Soft Computing.

Ms. Sahar Qazi is doing her Master of Science in Bioinformatics from Jamia Millia Islamia. Her research interest lies in Biological Big Data Analytics and Bioinformatics.

R E S E A R C H F RO N T

Page 17: ISSN 0970-647X Operating Systems - CSI INDIAcsi-india.org/Communications/CSIC_feb_2017.pdf · 2019-01-15 · Knowledge Digest for IT Community ISSN 0970-647X Operating Systems SECURITY

Cyber Threat Analysis with Memory Forensics

Hardik Gohel Himanshu Upadhyay Working in Cyber Security Research Project Management Professional

IntroductionIn today’s world, the dependency

on computers is growing extensively. Government agencies and private companies are attempting to protect themselves from cyberattacks with digital defense techniques like encryption, firewalls and heuristic or signature scanning, etc. Meanwhile, the number of attacks that include infiltrating military data centers, targeting power grids and stealing trade secrets from both private and public organizations continues to increase. The detection, response and reporting of these kinds of intrusions as well as other incidents involving computer systems, are crucial for cyber security professionals.

As these attacks continue to expand and the sophistication of the adversaries grow, defenders must adapt in order to survive. If proof-of-damage is never written to secondary storage, there is no way to rely on disk forensics. On the other hand, memory has a high potential to carry malicious code from an infection, partially or completely, even though it’s never written to secondary storage (e.g., a hard drive). This is because the malicious code is loaded into the memory to execute. The random access memory of the victimized system also contains the proof of the system resources allocated by malicious code.

Just like that, if the data taken from the organizationis encrypted across the network,to determine which sensitive files were stolen and that won’t be recognized by traditional packet capture techniques. However, passwords and encrypted keys can often be recovered by memory forensics, or even the file’s plain-text contents before they were encrypted, providing information to understand the scope of an attack.

CPU Cache Ram Virtual Memory

Disk Storage

Fig. 1 : Flow of Memory Storage

Memory ForensicsIn the world of digital forensics,

memory forensics is arguably the most interesting and fruitful realm. Memory forensics involves analyzing the data stored in the physical memory at operating system runtime. Its primary application is in the investigation of advanced computer attacks which are stealthy enough to avoid leaving data on the computer hard drive. Consequently, the memory (RAM) must be analyzed for forensic information. Each and every function performed by an application or operating system results in a special kind of change to the random access memory. These changes often stay for a long time after completion of the operation, crucially storing them. Furthermore, memory forensics provides unprecedented visibility into the runtime state of the system, such as which processes were running, open network connections, and recently executed commands. Individuals can perform an extraction of these artifacts that is totally independent of the machine being investigated. It also reduces the chance of rootkits or malware preventing the investigation process. Crucial data may exist exclusively in memory, such as unencrypted e-mail messages, disk encryption keys, non-cacheable internet history records, off-the-record chat messages and memory-resident injected code fragments.

Acquire � Capture Raw

Memory � Hibernation

File

Context � Establish

Context � Find Key

Memory Offsets

Analyze � Analyze Data

for Significant Elements

� Recover Evidence

Fig. 2 : Process of Memory Forensics

Memory forensics is about capturing the profile as well as the memory contents and can add an invaluable resource to incident response, malware analysis, and digital forensics capabilities. Even though inspection of network packet captures and hard disks can yield compelling verification, it is often the contents of the computer memory that enables the full reconstruction of events, allowing an individual to determine what has already happened, what is presently happening,and what would happen with further infection through malware or an intrusion by advanced threat actors. For example, a piece of evidence found in RAM could help to associate typical forensic artifacts that may appear different and allow for an integration which could otherwise remain unnoticed.

There are three reasons for gathering and analyzing the data contained in the physical memory. First, the physical memory contains real-time data related to the operating system environment, such as the currently-mounted file system and the list of processes being operated. Second, even the encrypted data is generally decrypted when it is stored in the physical memory. Third, this method adapts well to the characteristics of embedded systems. Since an embedded system is rarely turned off, the data contained in the physical memory is mostly persistent. Therefore, significant information can be obtained if analysis is performed effectively on the physical memory.

The different types of information that can be extracted from memory include processes, dynamic link libraries (dll), process memory, image identification, kernel memory and objects, networking, registry, malware and rootkits.

S E C U R I T Y C O R N E R

17 C S I C o m m u n I C a t I o n S | F E B R u a R Y 2 0 1 7

Page 18: ISSN 0970-647X Operating Systems - CSI INDIAcsi-india.org/Communications/CSIC_feb_2017.pdf · 2019-01-15 · Knowledge Digest for IT Community ISSN 0970-647X Operating Systems SECURITY

• CoverStory• TechnicalTrends• ResearchFront• Articles• InnovationsinIT• SecurityCorner• PractitionerWorkbench• BrainTeaser• ChapterReports• Studentbranchreports

Why Memory Forensics?Everything in any type of operating

system traverses random access memory, including processes and threads, rootkits and malware, IP addresses, network sockets, URLs, open files, passwords, catches, clipboards and other user generated content, encrypted keys, configurations of hardware and software and windows registry keys and event logs.

The types of artifacts found in memory dumps share a common origin. They all starts out as an allocation. Why, when and how the regions of memory were allocated sets them apart, in addition to the actual data stored within and around them. As a part of memory forensics, the study of these behaviors could be helpful to make inferences about the allocation of the content, leading to the ability to find and label specific types of data throughout a large memory dump. Additionally, the knowledge of allocation and de-allocation of memory and their algorithms (i.e., First Fit, Best Fit, Next Fit and Buddy System) could aid in understanding the context of the data. For example, which block of memory is free or which one is allocated.

Fig. 3 : Different OSs with Memory Forensics

Windows ForensicsMemory forensics for Windows

involves finding and analyzing executive objects. Windows is written in C and the data as well as the attributes organization heavily use C structures. Out of those, several of structures are called executive objects. They are created, deleted and protected by the object manager of Windows. The object manager is a component of the kernel implemented by the NT module.

The major executive objects of Windows for memory forensics include file, process, symbolic link, token, window station, thread, desktop, mutant, types and keys. These executive objects are available with the corresponding name of the structure(e.g., file with _FILE_OBJECT structure). There is at least one Volatility plugin that analyzes each of the executive objects listed above.Linux Forensics

In Linux memory forensics, the fundamental approach is to begin analyzing memory dumps of Linux. Specifically, one must be aware of traditional and modern memory acquisition techniques on Linux with their benefits and drawbacks. To perform Linux memory forensics, it is required to create Linux profiles, which are archives and contain useful information that Volatility needs to adequately find and intercept the data in memory dumps of Linux. Furthermore, one should be aware of the challenges to deploy Linux memory forensics in an enterprise environment, where critical servers may not even have compilers in C with other libraries which are found on workstations and desktops of standard Linux.Mobile OS Memory Forensics

Various mobile operating system are currently in use,including Android, iOS, Windows 10 mobile, Tizen, Sailfish and Ubuntu touch. The most popular mobile OSs are Android and iOS. The rapid increase of systems running Android and Mac OS in both home and corporate environments has resulted in Android and Mac systems being a focus of targeted attacks. Because of these factors, cybersecurity experts have worked to develop tools for Android and iOS for robust investigative capabilities for Linux and Windows systems. To perform Android and Mac OS memory forensics, one has to create a Volatility profile for Android and Mac systems and can use one of the tools for acquisition of memory. Furthermore, some of the unique facets such as 64 bit addressing on 32 bit kernels, the typical userland and lay out of kernel address space, and the use of microkernel components are also major considerations.

Tools of Memory ForensicsWhile there are multiple types

of tools available to perform memory forensics, the Volatility framework and Linux Memory Extractor (LiME) are the most popular.

LiME is one of the best memory dump tools. It is a Linux kernel module (LKM) released by ShmooCon, which performs memory dumps for the Linux system. It is the first tool that can perform entire memory dumps from Linux-based devices and from Android. LiME is a powerful device that can perform memory dumps by loading modules immediately after compiling without any other operations, such as a change in kernel settings. Particularly in the case of Android, one can dump a file directly into external memory after inputting a pre-compiled module file into the external memory and loading the module through the command line. LiME features provide full memory acquisition and acquisition over the network interface with a minimal process footprint.

The second popular memory forensic tool is the Volatility framework. It is a single, cohesive framework that analyzes RAM dumps from Linux, 32- and 64-bit windows, Mac, and Android systems. The modular design of Volatility allows it to easily support new operating systems and architectures as they are released. So, all devices are targets. It doesn’t limit the forensic capabilities to just Windows computers. Furthermore, it is an open source written in Python and has extensible and scriptable API with unparalleled feature sets and comprehensive coverage of file formats.Benefits of Memory Forensics

The benefits of memory forensics include, but are not limited to: � Memory forensics is an ideal

analysis that includes physical memory data (from RAM) as well as Page File (or SWAP space) data

� Analysis of memory is the best place to identify malicious software activity

� Memory forensics helps to analyze and track recent activities of the system in context with the user’s profile and activities of attackers.

S E C U R I T Y C O R N E R

www.csi-india.org 18

C S I C o m m u n I C a t I o n S | F E B R u a R Y 2 0 1 7

Page 19: ISSN 0970-647X Operating Systems - CSI INDIAcsi-india.org/Communications/CSIC_feb_2017.pdf · 2019-01-15 · Knowledge Digest for IT Community ISSN 0970-647X Operating Systems SECURITY

� Malicious code is not yet conducting anti-forensics within random access memory.

� Memory forensics is the only way to collect evidence that cannotbe found anywhere else, such as chat threats, Internet activities, memory-only malware, etc.

� Every bit of data being created, viewed, or destroyed goes through RAM. This includes all web-browsing activity, document edits, images, sending and receiving of network data, execution of applications, and essentially anything that appears on the monitor.

� RAM is effectively a “disk,” hence it is necessaryto preserve and investigate the memory in addition to the hard disk.

Challenges in Memory ForensicsThere are many challenges to

performing memory forensics, including the following. � Evaluating the diverse memory

acquisition tools available, which perform differently depending on the operating system version, installed hardware and the configurations.

� If the termination character cannot be found. Consider the situation in which, analyzing the physical address space of a system that leverages paged virtual memory, a string is encountered that crosses a page boundary to a page that is no longer memory resident, which would require special processing or heuristics to determine the actual size of the string.

� The challenges faced during linked list analysis also apply with the analysis of memory trees.

� Memory evidence is often found on non-volatile media and comes in various shapes and sizes. As a cyber security expert, one must be aware of the different formats and the procedure of converting one format into another.

� When the system is powered off,

the whole disk, individual partition, or virtual file-based containers are encrypted. This protection results in serious challenges for investigators, even if they gain access to the media

Research Directions & ConclusionThe major thrust area of operating

system memory forensic is to perform Linux memory forensics. Government offices and business organizations are major Linux adopters. There are many security issues with the Linux operating system. The research direction should focus on applied operations of memory forensics in Linux machines and advanced data analysis using machine learning which will be very useful to the Linux cyber society. This will allow government agencies, business organizations and also small-scale industries to secure their system operations. Antiviruses, which are one of the alternatives, can prevent malware from entering the system; however, what if an antivirus becomes disabled by admin access through the rootkit? So, there is a need of research to provide models and algorithms to increase the security of the operating system resulting in the cyber protection of the users. Research focused on memory forensics using machine learning could be one of the key factor as it is rarely addressed by anti-virus products available in the market. In the cyber community, such research may provide the solution for many of the challenges. References[1] Hardik Gohel. “Introduction to Network

& Cyber Security”, 2015[2] M H Ligh, A Case, J Levy, A Walters.

“The Art of Memory Forensics”, 2014[3] Mark Wade, “Memory Forensics: Where

to Start” at http://www.forensicmag.com/ article/2011/06/ memory-forensics-where-start, 2011

[4] Gohel, Hardik. “Looking Back at the Evolution of the Internet.” CSI Communications - Knowledge Digest for IT Community 38.6 (2014): 23-26

[5] Blackbag Team,”WINDOWS MEMORY FORENSICS”, at https://www.blackbagtech.com/ blog/ 2016 /03/07/ windows-memory-forensics/2016

[6] Baliga, A., Ganapathy, V. and Iftode, L., 2011. Detecting kernel-level rootkits using data structure invariants. IEEE Transactions on Dependable and Secure Computing, 8(5), pp.670-684.

[7] Hardik, Gohel. “Data Science - Data, Tools & Technologies.” CSI Communications Knowledge Digest for IT Community 39.3(2015): 8-10

[8] Korkin, I. and Nesterov, I., 2015. Applying memory forensics to rootkit detection. arXiv preprint arXiv:1506.04129.

[9] Hal Pomeranz, “Detecting Malware with Memory Forensics”, at http://www.deer-run.com/~hal/ Detect_Malware_w_Memory_Forensics.pdf, 2015

[10] H Gohel, P Sharma. “Study of Quantum Computing with Significance of Machine Learning.” CSI Communications - Knowledge Digest for IT Community 38.11 (2015): 21-23

[11] Joe Sylve https://github.com/504ensicsLabs/LiME

[12] Lime Forensics, https://code.google.com/p/lime-forensics/

[13] Volatility framework, https://github.com/volatilityfoundation/volatility/wiki

n

S E C U R I T Y C O R N E R

19 C S I C o m m u n I C a t I o n S | F E B R u a R Y 2 0 1 7

About the Authors:Dr. Hardik Gohel [CSI-I1500336] is working on cyber security research. He has 8 years of experience in teaching and research in the field of computer science and technology.

Dr. Himanshu Upadhyay is a Project Management Professional and having over 25 years of experience in information technology, management and engineering at USA. Dr. Upadhyay’s areas of applied research include knowledge management, enterprise systems for web and mobile platforms, penetration testing, digital forensics and malware analysis.

Page 20: ISSN 0970-647X Operating Systems - CSI INDIAcsi-india.org/Communications/CSIC_feb_2017.pdf · 2019-01-15 · Knowledge Digest for IT Community ISSN 0970-647X Operating Systems SECURITY

• CoverStory• TechnicalTrends• ResearchFront• Articles• InnovationsinIT• SecurityCorner• PractitionerWorkbench• BrainTeaser• ChapterReports• Studentbranchreports

www.csi-india.org 20

C S I C o m m u n I C a t I o n S | F E B R u a R Y 2 0 1 7

Top Ten Alternative Operating Systems You Should Try Out

Deepu Benson Amal Jyothi College of Engineering

There are hundreds of operating systems available in the market but sadly our quest for operating systems mostly end with Windows, Linux, macOS or a mobile operating system like Android. I am sure 99 percentage of the people who read this article have only used one or more of these operating systems. If you are rich enough to pay a substantial amount for an operating system you mightbe having some version of Windows from Microsoft or macOS from Apple with you, if you are geek enough to work with Linux then some distribution of Linux like Ubuntu, Fedora, Mint, Debian etc. might be with you or if you have a smart phone then a mobile operating system like Android OS, iPhone OS, etc., might be familiar to you. And by now you might be wondering what else is remaining to try out other than these popular operating systems. In this article, I am discussing about ten operating systems you may not have used nevertheless very important. The final list is prepared after going through a lot of desktop, mobile operating systems and single board computer operating systems. Since the ultimate aim of this article is to persuade the readers to try out some of these operating systems I haven’t considered server operating systems like macOS Server or super computer operating systemslike CNK Operating System requiring costly hardware. UNIX

The very first operating system we have to try out is UNIX. Before discussing any further about UNIX I want to clarify one popular misconception. UNIX is not Linux. Linux distributions can be called Unix-like but there are many differences between UNIX and Linux. Linux is an open source software meaning you can freely get a copy, view the source code, and modify Linux the way you like. Unlike Linux, UNIX is not an open source software and is owned by a consortium called The Open Group. Only those operating systems licensed

by The Open Group can be trade marked as UNIX. AIX from IBM, HP-UX from Hewlett Packard, Solaris from Sun Micro Systems etc. are examples for pure UNIX operating systems. Raspbian

Raspbian is a Debian Linux based operating system. If so why Raspbian operating system is included in this list? The first reason is that Raspbian is an operating system for Raspberry Pi, a single board computer provided by the Raspberry Pi Foundation. This single board computer is heavily used in Internet of Things (IoT) based applications. So, in the near future you definitely will come across a lot of systems working with Raspbian operating system. Raspberry Pi has an ARM processor which uses Reduced Instruction Set Computing (RISC) architecture. So, the instruction set implemented by Raspbian is RISC rather than CISC (Complex Instruction Set Computing),the instruction set implemented by operating systems like Windows, macOS etc. Thus, Raspbian being a RISC based operating system is the second reason for its inclusion in this list. Raspbian is an open source software freely available for installation. eComStation

eComStation is an operating system based on the OS/2 operating system. OS/2 is a very popular operating system developed and maintained by IBM. When IBM made the decision not to develop OS/2 any further the user community of OS/2 interfered with the development of OS/2. A community of users started developing this operating system with the brand name eComStation. eComStation is very important because it is the last functioning operating system belonging to the OS/2 family of operating systems. eComStation is a proprietary operating system with open source components. Chrome OS

Chrome OS is derived from the Linux Kernel developed by Google. The

importance of Chrome OS lies in the fact that the principle user interface of the operating system is the Chrome web browser. So, in simple terms Chrome OS is a browser based operating system distinct from all the other operating systems included in this list. Chrome OS primarily supports web applications. Unlike the other web browser based operating system Firefox OS, Chrome OS is still operational and continually produces newer versions with the latest version released in 15th of December 2016. Chrome OS itself is not an open source software but it has an open source equivalent called Chromium OS. ReactOS

We have heard the term Unix-like a number of times in this article, now it is time for us to discuss the term Windows-like. ReactOS is an open source software freely available for installation which imitates Microsoft Windows, just like Linux imitating UNIX. ReactOS is binary-compatible with computer programs and device drivers made for Windows. In simple terms, an executable file say program.exe produced for Windows can be executed in ReactOS. Remember the fact that you cannot execute a Windows executable file in Linux. The development started as the Windows 95 clone project and the latest clone available is for Windows 2003 Server. Yes, currently ReactOS is far behind in development with Microsoft Windows 10 in the markets. But let us hope one day ReactOS will catch up with Windows. Tizen

Tizen is an operating system based on the Linux kernel and the Gnu C Library implementing the Linux API. If Tizen is yet another free and open source Linux clone what is so important about it? Well, Tizen is not a desktop operating system like most other operating systems included in this list. It is an operating system that works on a wide range of devices like smartphones, tablets, smart TVs, smart Cameras etc.

A R T I C L E

Page 21: ISSN 0970-647X Operating Systems - CSI INDIAcsi-india.org/Communications/CSIC_feb_2017.pdf · 2019-01-15 · Knowledge Digest for IT Community ISSN 0970-647X Operating Systems SECURITY

About the AuthorMr. Deepu Benson has over 15 years of programming experience. He currently works as assistant professor in Amal Jyothi College of Engineering, Kerala. He maintains a technical blog at www.computingforbeginners.blogspot.in. He can be reached at [email protected].

Call for Paper for April Issue of the CSI Journal of Computing (e-ISSN: 2277-7091)

Original Research Papers are invited for the CSI Journal of Computing, published on line quarterly (e-ISSN: 2277-7091) by the Computer Society of India (CSI). The Journal of Computing, offers good visibility of online research content on computer science theory, Languages & Systems, Databases, Internet Computing, Software Engineering and Applications. The journal also covers all aspects of Computational intelligence, Communications and Analytics in computer science and engineering. Journal of Computing intended for publication of truly original papers of interest to a wide audience in Computer Science, Information Technology and boundary areas between these and other fields. The articles must be written using

APA style in two columns format. The article should be typed, double-spaced on standard-sized (8.5” x 11”) with 1” margins on all sides using 12 pt. Times New Roman font and 8-12 pages in length. The standard international policy regarding similarity with existing articles will be followed prior to publication of articles. The paper is to be sent to Prof. (Dr.) J. K. Mandal, Editor-in-Chief, CSI Journal of Computing ([email protected]) within 20th March 2017.

Prof. A. K. NayakHon. Secretary, CSI

21 C S I C o m m u n I C a t I o n S | F E B R u a R Y 2 0 1 7

A R T I C L E

Tizen operating system is developed by the Tizen Association comprising of companies like Fujitsu, Huawei, Panasonic, Samsung, Vodafone etc. JNode

JNode is a simple operating system just like countless other operating systems available in the market. What makes it so special? Well, operating system development is a world dominated by C programming language and Assembly languages. But here is an operating system developed using Java. Yes, fully developed using Java. JNode is a simple to use and easy to install Java operating system for personal computers. JNode is an open source software freely available for installation. KolibriOS

Have you ever tried to download an operating system from the Internet? You might have waited for a long time to download the whole operating system. A typical operating system will have size in the range of a few Giga Bytes.But here we have an operating system called KolibriOS of size around 1.44 MB. Yes, the whole operating system can be stored inside a floppy disc, if floppy discs were still available. KolibriOS has a Graphical User Interface (GUI) also. So, it’s safe to assume that KolibriOS is the smallest GUI operating system available in the world unless someone somewhere came up with an even

smaller operating system, the chances of which looks very slim. KolibriOS is written entirely in Assembly language and this feature makes it extremely fast. Moreover, KolibriOS is an open source software freely available for installation. AmigaOS

Of all the operating systems discussed in this article AmigaOS is the one with the least probability of being used by a reader. There are many reasons for making such an assumption. AmigaOS being a proprietary software itself is a very good reason for many people to overlook it. The support and development of AmigaOS is about to finish in the near future and that is another reason for its relative obscurity. If so why is it included in this list? It is the native operating system of the Amiga and AmigaOne personal computers. And what is so special about these computers? Well, these computers support the PowerPC architecture and that makes AmigaOS one of the last surviving operating system that supports PowerPC architecture. visopsys

Finally, it is time to discuss Visopsys or Visual Operating System. It is a simple and fast operating system. But we have already seen KolibriOS one of the fastest available in the market. So, what makes Visopsys so special? When compared with most of the

modern standard operating systems Visopsys don’t have many necessary features. But what makes Visopsys unique is the fact that it is developed by a single person. Yes, a hobbyist operating system developer called Andy McLaughlin developed the whole operating system all by himself. The development started in 1997 and though the operating system is functional by now even supported with a GUI Andy McLaughlin is still continuing with the development of Visopsys by adding more and more features. Frankly, it took me some time to believe that a single person can develop an operating system. It is like a single person building the whole of Taj Mahal all by himself. Yet, Andy McLaughlin did it and more over he was gracious enough to make Visopsys an open source software so that future generations will benefit from it.

Now it is time to wind up this article. But before we part ways I request you to take the extra effort to download and use one of these operating systems mentioned in this article. I am sure the effort taken will not go in vain. By working with an operating system not related to Windows, Linux, or macOS your knowledge of computer science will grow exponentially and who knows who all are going to get benefitted by it.

n

Top Ten Alternative Operating Systems You Should Try Out

Deepu Benson Amal Jyothi College of Engineering

Page 22: ISSN 0970-647X Operating Systems - CSI INDIAcsi-india.org/Communications/CSIC_feb_2017.pdf · 2019-01-15 · Knowledge Digest for IT Community ISSN 0970-647X Operating Systems SECURITY

• CoverStory• TechnicalTrends• ResearchFront• Articles• InnovationsinIT• SecurityCorner• PractitionerWorkbench• BrainTeaser• ChapterReports• Studentbranchreports

Operating Systems SimranChandigarh Group of Colleges, Landran, Mohali

An Operating system is the heart of computer. From IBM’s IBM System/360 Operating System to Microsoft’s Windows 10 to Linux’s Fedora, there are lots of changes emerging in all the generations’ Operating Systems. There is always need of upgrading operating system from time to time so as to meet user requirements and trends growing in the technology. Using an Operating system, it is easy to use hardware resources, gaming, business applications, application programs and other development IDEs. Whether it is open-source or closed-source operating system, all have their own features and pros as well as some cons. It is necessary to use an operating system in an efficient and convenient way for proper utilization of computing resources and hardware. With latest technology trends, there is need to add some features like customizability, cloud services on one platform, ease of installation, cost-effective, security, reliable anti-viruses, 24*7 technical support for customers etc.

IntroductionAn Operating system is an interface

between the computer user, applications and computer hardware. An operating system provides the necessary platform to users for using different application programs, executable programs, system software and utilizing computer hardware efficiently. Operating systems change the way to use application softwares, networking, file sharing, user control, authorization and many more. An operating system in a computer manages all the softwares installed, applications, processes, memory and hardware.

The most widely used operating systems are Microsoft Windows, Linux, Mac OS X and iOS, Android. As Windows, Linux and Mac OS X are desktop based operating systems, while iOS and android are smartphone operating systems. For desktop application more than 85% users use Windows as major operating system for running their applications, games etc. After windows, iOS and Mac OS X have large market share among all these. The open-source operating system, Linux is now widely being used by developers, programmers and individuals.

Each operating system come with their pros and cons. The widely and most spread operating systems like Windows, MacOS X and Linux are quite comparable to each other.

The features that separate Windows from other operating systems include compatibility for every software-all kinds of applications, games, drivers, IDEs can run on Windows, One product for all, technical support for its users, various networking functions, better GUI interface, file sharing, flexibility to use, more available software products, anti-viruses etc. Apart from all these huge number of advantages, it has some cons also. For example more hardware requirements due to installation of anti-viruses and malware, Lacking security system, expensive, less portability- cannot be used from one platform to another. Windows is a closed-source operating system, which means one cannot modify or add any tools or features to the operating system by their own. Windows based operating systems are less secure than open-source operating systems due to the reason that later ones do not have default administrator access or root access, whereas Windows provide Administration access to all the applications and programs downloaded. That’s why, windows is more unsafe or vulnerable to viruses, worms etc. Security features are also lacking somewhere. Windows is more vulnerable to cyber attacks, hacking also. Therefore, anti-viruses need to be installed and update from time to time. On the same point, installing

antiviruses or malware takes computer memory, disk space, CPU. Windows is designed for general hardware such that you can purchase it for either 32-bit processor or 64-bit processor. Also, one demerit is that windows is totally non-customizable. Almost every program designed, can be installed and run on windows. It does not use any ‘live’ boot system unlike Linux. You have to purchase the licensed product and install it with only technical knowledge for installation. Coming on Cost-windows is quite expensive than Linux. For large deployments, business uses, industry work and for desktop computing, Microsoft windows is best one to be chosen.

The different versions of Windows that are use, are- Windows 9x family, Windows 2000 family, Windows XP, Windows 7, Windows 8, Windows 8.1 and current version Windows 10. Each version incorporates with distinguishable features.

Adding Mac OS X as the desktop computing operating system, Mac OS X is going with the latest trends and other technologies. It was the first successful Graphical User Interface (GUI) before Windows. Putting light on some features of Mac OS X, we have no viruses unlike windows, better look than windows, extensions. Macintosh OS X is simple, powerful, advance and more secure than windows. Mac OS

www.csi-india.org 22

C S I C o m m u n I C a t I o n S | F E B R u a R Y 2 0 1 7

A R T I C L E

Page 23: ISSN 0970-647X Operating Systems - CSI INDIAcsi-india.org/Communications/CSIC_feb_2017.pdf · 2019-01-15 · Knowledge Digest for IT Community ISSN 0970-647X Operating Systems SECURITY

X provides its hardware platform for users. It is more user friendly but not flexible. Being enough powerful, Mac OS X command line tools seems to be helpful in administrative tasks. As Mac OS X is based on Linux, that’s why Mac OS X is more secure than Windows.

Mac OS X doesn’t provide portability. It is connected with the machine which it was using. Mac OS X is the most expensive Operating Systems, including hardware cost too. A normal user can easily get to know that there is no functioning delete key in it. Mac OS X’s Lion, home network, voiceover, video chat services, Airdrop are nowadays popular among users.

Linux is an Open-source operating system which means the source code of the operating system (kernel) can be downloaded, installed, analyzed, modify and used for creating applications by developers. They make changes in each new version of Linux operating system and update this version as a new version. Each version in Linux is called ‘Distribution’. Many new and different distributions can be operated at no cost. About hundreds of Linux versions have been developed and thousands of developers work upon it. Linux is more secure than any other operating systems. It provides security by providing enough ‘privileges’ or ‘root’ access to the users. Another merit is that being open-source Linux is customizable and has full control under user. Apart from its less cost, another feature is ‘live boot system’, so no technical knowledge or more time is required for installation. Any new user will surely find Linux

more interesting and customizable in his own way. There is less numbers of softwares which are available for Linux desktop. While the standard programs like searching the web, mail services, editing, printing of documents can also be easily done using Linux.

The current distribution of Linux operating system is ‘fedora’ which takes fewer amounts of disk space and memory as compared to Windows and Mac OS X. The open-source nature of any operating systems makes it user-friendly, customizable and more secure from viruses. Linux is FREE to use that means we can download and alter it without paying any kind of charges. Except all these, Linux is still not a complete operating system, it is just kernel, so additional software are needed to be installed. This corresponds to very few market shares among laptop and desktop PCs. Leaving all its advantages back, Linux is much better in performance. There are many other operating systems that are used at low level among users.Conclusion/Future Work

Among all these, which operating system has to be chosen? This decision solely depends on particular user’s choice. All operating systems are loaded with variety of features. For gaming, we can use Windows, for programmers and developers Linux and Mac OS X for graphics/video producers. But still, there are some requirements which need to be noted. For example, dealing with bugs in operating system and application softwares, to deal with

viruses, worms etc. We could have extensions like one point access for applications and their tracking, checking apps performance, portability of applications on different environments. Maintaining backup for all applications is also necessary. Interchanging of data among different applications needs to facilitate. Moreover, an operating system distinguishes different platforms and focuses on bright future for innovation. Every operating system has some advantages and disadvantages, but using which one, this depends on user’s convenience. There is still innovative technology coming in the field of operating systems.References• http://www.itpro.co.uk/operating-

systems• https://www.conversation.com/

what-to-expect-from-the-next-generation-of-windows-28763

• https://www.quora.com/Whats-the-difference-between-Mac-OS-Windows-and-Linux

• erence.com/technology/computer-n e e d - o p e r a t i n g - s y s t e m -3c7b0b66db6f2754

• https://www.linkedin.com/pulse/comparison-between-windows-vs-linux-macintosh-os-dinesh-bhadane

• h t t p s : / / w w w . r e f e r e n c e .c o m / t e c h n o l o g y / c o m p u t e r-n e e d - o p e r a t i n g - s y s t e m -3c7b0b66db6f2754

n

23 C S I C o m m u n I C a t I o n S | F E B R u a R Y 2 0 1 7

A R T I C L E

About the AuthorMs. Simran third year Engineering student and Pursuing Bachelors of Technology degree from Chandigarh Group of Colleges, Landran, Mohali. I am interested in publishing papers and articles. My research interest goes in cloud computing, networking, social-work, education for girls and more. In academics also, I am going with good achievements in every field.

Page 24: ISSN 0970-647X Operating Systems - CSI INDIAcsi-india.org/Communications/CSIC_feb_2017.pdf · 2019-01-15 · Knowledge Digest for IT Community ISSN 0970-647X Operating Systems SECURITY

• CoverStory• TechnicalTrends• ResearchFront• Articles• InnovationsinIT• SecurityCorner• PractitionerWorkbench• BrainTeaser• ChapterReports• Studentbranchreports

The battle for the Best Smartphone OS S. N. Kakarwal

Professor in Department of Computer Science & Engineering of P.E.S. College of Engineering, Aurangabad

Now a day’s rapidly emerging technology is wireless mobile phone technology in telecommunication zone. This mobile device has great impact on everyone’s life. Consequently, when we wanted to purchase a mobile device we consider two criteria before selecting a mobile device. Firstly, we study is the details of devices such as the appealing look of the device, its performance, hardware details such as camera type, its pixel resolution, etc. Secondarily, we study the type of  mobile operating system used by the device.

A mobile operating system is software stack used by mobile devices  such as smartphones, tablets, laptops to manage their resources and to run applications and programs. Mobile operating systems example includes Apple iOS, Google Android, BlackBerry OS, Nokia’s Symbian and Microsoft’s Windows Phone OS.

In this article, we make assessment of emerging mobile OS, Android OS and iPhone OS and finally compares the recent versions of them, viz., Android 7.0 Nougat with Apple iOS 10.Android OS

Android is open source OS which isgrounded on Linux kernel designed for mobile devices such as smart phones and tablet PCs. Android OS is owned by Google, Inc. in July 2005 and becomes a key for Google to jump into the wireless technology. Latest version of Android is Android 7 released in October 16.Structural design of Android OS

Four layers of Android OS are Linux Kernel, System libraries, Application framework and user interface layer (as in figure 1). At the bottom most layer of Android OS Architecture is the Linux kernel copes with virtual memory management, power management and networking management and basic communication management. System libraries integrated with SQLite framework which provides storage of

data. System libraries include 2D and 3Dgraphics API. SGL is 2D graphics engine and open GL/ES provides 3D graphics API. System libraries packaged with Webkit engine for rendering web pages in mobile browser. Android run time is rooted with Dalvik Virtual Machine (DVM), which gives power to the applications. The application framework includes android SDK which provides libraries for building applications. At top most layer of Android OS architecture is the User interface layer which provides contacts. Also Widgets are included to truly customize your home screen to your needs, by presenting live, continually updating information.

User Interface

Application Framework

Libraries

Linux Kernel

Fig. 1 : Android OS Architecture

Advantages of Android OS: � Easy access for latest public

standard like social media sites, Google search engines, etc.

� Enables the programmers to make changes in Linux kernel to modify original applications.

� Availability of More than 2.6 million Apps in play store.

� Easy access to best apps from play store.

� Supports execution of multiple applications concurrently.

� Supports reliable and enhanced storage of data (using SQLite framework).

� Supports Bluetooth connectivity.

Disadvantages of Android OS: � Battery backup is poor since large

number of daemon processes increases the usage of RAM.

� While updating applications some of applications might have bugs which can be misused by hackers.

iPhone OSiOS is Apple’s closed (with open

source components) operating system developed for iPhone, but later extended to support for iPad and Apple TV.  It is Unix based OS as iOS root comes from Mac OS. Latest version of iPhone is iPhone 10 released in June 16.Structural design of iPhone OS

Cocoa Touch

Media

Core Services

Core OS

Fig. 2 : iPhone OS Architecture

At the bottom most layer of iPhone OS architecture, there is Core OS layer. The Core OS layer copes with the file handling, low level networking, memory management, inter process communication and security management. Core services layer includes fundamental system services for apps as well as framework for networking. Media layer incorporates several frameworks to deal with 2D and 3D graphics, audio, video functionality, and animations. At the top most is the Cocoa Touch layer based on Cocoa API to develop graphical applications and used by application developer.Advantages of iOS: � Easy access for latest public

A R T I C L E

www.csi-india.org 24

C S I C o m m u n I C a t I o n S | F E B R u a R Y 2 0 1 7

Page 25: ISSN 0970-647X Operating Systems - CSI INDIAcsi-india.org/Communications/CSIC_feb_2017.pdf · 2019-01-15 · Knowledge Digest for IT Community ISSN 0970-647X Operating Systems SECURITY

standard like social media sites, Google search engines, etc.

� Supports for cloud storage.

� Availability of More than 2.2 millionApps in App Store.

� Easy access to best apps from App store.

� Reduces the risk of infection from malicious software since Apple does not allow people to load third-party programs on the device.

� Beautifully designed desktop and app icons with the fabulous looks of Apple devices.

Disadvantages of iOS: � Supports only Apple Hardware.

� Not an open source OS.

� Very costly Apps.

Comparative Study of Android OS and iOS

The table1 depicts the comparison table of Android OS and iOS

Apple and Google just released iOS

10 and Android 7.0 Nougat, respectively. This is major news since most of the smartphones today either run on Android or iOS. Some notable features of  iOS 10 and Android 7.0 Nougat  Notifications � In iOS 10, 3D Touch is immersed,

permitting to expand notifications and initiate quick responses and other actions.

� Android Nougat’s notifications now take up more of the screen which, combined with a change of font, provides more information as standard.

Messaging � In iOS 10, your messages threads

can be plastered with icons and animations. More ever, iMessage can implement its own type of third-party apps into it.

� Android Nougat came with WhatsApp-like messaging app known as Allo to incorporate search and machine learning technology.

Personal Assistants � In iOS 10, Siri has greatly enhanced.

Apart from getting, the personal assistant enhanced features, it is opened up to third-party developers so they can link into Siri—making her usefulness grows exponentially.

� Siri’s big competitor on Android is Google Now.

Though, Apple and Google have started with different ways to design their effective and efficient mobile OS, iOS 10 and Android Nougat have shown they are gradually uniting. Apple is attempting to close the gap on Google in terms of widgets and third-party app, while Google is attempting to implement app icon shortcuts and app notification groupings like Apple.In the battle of the OS, the winner will depend on your preference. Android is more customizable but Apple is more refined in terms of security and system. 

n

About the Author

Dr. S. N. Kakarwal [CSI-F8000602] is presently working as Professor in Department of Computer Science & Engineering of P.E.S. College of Engineering, Aurangabad, MS-India. Her research interests include Image Processing, Pattern Recognition. She has published 13 papers in International Journals, 25 papers in International Conference and 11 papers in National Conferences. She has published two articles in CSI magazine. She can be reached at [email protected]

Table 1 : Comparison of Android OS and iOS

Feature Android OS iPhone OSDeveloper Google Apple Inc.

Model Open Source OS Closed (with open source components) OS

File Transfer Easier than iOS. More difficult.

Video Chat Google Hangouts and third party apps. FaceTime(Apple devices only) and other third part apps.

Widgets Available. Noavailability, except in Notification Center.

Internet Browser By default Google Chrome browser. Mobile Safari browser.

Voice Commands Google Now. Siri.

Maps Google Maps. Apple Maps.

File Manager By default one available Unavailable.

Cloud Services Naive Integration with Google cloud. Naive Integration with icloud.

Videos and Photos backup Unlimited back up for video and photos backups

Restricted back up of 5 GB for video and photos backups.

A R T I C L E

25 C S I C o m m u n I C a t I o n S | F E B R u a R Y 2 0 1 7

Page 26: ISSN 0970-647X Operating Systems - CSI INDIAcsi-india.org/Communications/CSIC_feb_2017.pdf · 2019-01-15 · Knowledge Digest for IT Community ISSN 0970-647X Operating Systems SECURITY

• CoverStory• TechnicalTrends• ResearchFront• Articles• InnovationsinIT• SecurityCorner• PractitionerWorkbench• BrainTeaser• ChapterReports• Studentbranchreports

A R T I C L E

Operating Systems : Mass transit for the future

R. Gobi Faculty in Computer Applications, National Institute of Technology, Trichy

Operating system has been changing since every generation or era that we have had so far, and we can expect it to change even more in the near future to come. Mobile operating systems especially have never failed to surprise techies with the incredible features they provide. In the future, approximately in 10 years from now, we can expect a mobile or a smartphone capable of doing the unexpected. A mobile phone is now considered a part of every human being; every individual is observed owning a smartphone, and some even own more than one. The day begins with one checking out the notifications early in the morning, even before they get off their beds, and it ends with the same thing in the night, just before they go to sleep. In the future, this mobile phone is going to be more of a personal assistant to a particular owner. We are going to see significant innovation from developers in this space.

The operating system of the future would connect every device the user wants to connect to from their mobile phones– starting from personal computers at homes or offices, cameras, cars and even the home security systems. Everything can be controlled from any location just by one click on the mobile device. This is something that the current technology is already leading us to. In the years to come, we can expect the concept of Internet of Things to be a reality more

than an idea or an experiment. The mobile OS of the future is going to be an implementation of the same.

In the future, we would not require a personal computer or a desktop as much as we do today; with the mobile operating system to arrive. Every task that can be done on a computer will be done on the mobile phone. It is going to be an integration of Artificial intelligence, networking and connecting to the society. The hand held devices will consist of an interface with the user in which, the smartphone can detect body temperature of the user holding the device, and from previously acquired data, it would recommend a doctor’s appointment if it found the temperature was not within the normal limits.

The operating system of the mobile device will identify if it is in the wrong hands, and this it will find out from usage statistics, pattern, and an in-built polygraph that would detect the user’s authenticity. If in any case it identifies any suspicious or abnormal use of the smart device, it will lock itself which could then only be unlocked externally by the original user, through a bio metric key.

The trend of the future is going to be of a wearable device. The mobile operating system would also consist of a system which connects to a wearable device like a watch, so one need not constantly remove their mobile phones to check for updates. The possibilities with devices that you wear on your body

are endless. There will be a time in which people can receive calls on something known as a fingertip technology. A person would make and receive calls without touching the mobile phone. This can be done by a click on the wearable device and the voice signals will be transmitted through the person’s body, so one can listen to the other person, by just keeping the forefinger near his or her ear. A microphone fitted to the wearable device would complete the communication so that the person on the other side of the phone can hear you well. It would offer these and many other features keeping in mind, low battery consumption and efficient usage of the memory.

The mobile operating system of the future is going to be a wonderland in itself. It would offer a plethora of features. But, simultaneously, it would detect over use of the device. With the increasing amounts of complaints from the traditional Luddites and other rational thinkers who believe that technology is deteriorating people’s health, it would be taken care of in the operating system. The system would lock itself out for a particular amount of time or keep popping up a notification, where the user of the smartphone is expected to do some physical activity, or any other activity which does not involve use of the mobile phones. Every technology ages; the only thing that doesn’t get old is connecting with people.

n

About the Author

Dr. R Gobi [CSI-1161613] is currently working as Faculty in the Department of Computer Applications, National Institute of Technology, Trichy. His area of specializations are Mobile Computing, Mobile Governance and Internet of Things. He can be reached at [email protected] and [email protected]

www.csi-india.org 26

C S I C o m m u n I C a t I o n S | F E B R u a R Y 2 0 1 7

Page 27: ISSN 0970-647X Operating Systems - CSI INDIAcsi-india.org/Communications/CSIC_feb_2017.pdf · 2019-01-15 · Knowledge Digest for IT Community ISSN 0970-647X Operating Systems SECURITY

A R T I C L E

RSOS: Reliable and Secure Operating System Ashutosh Saxena

Adjunct Professor CS, Email: [email protected]

Did you recollect when your landline phone got hanged, probably you do not remember either it really did not happened or you are using smart mobile phone for a long time. Then, did you remember when your elegant smart phone got hanged while you were running few applications? Probably last month!!. Let me extend the query: when was your TV stuck while you were watching favourate show or movie, in contrast, how many times your laptop got hanged while you were playing the DVD? All are electronics devices with processors, several interfaces, I/O ports and an operating system (OS) running for you to provide the desired functionality. It is the OS on computers/smart phones that provides flexibility, where you can load, install and execute external software, whereas on the TV you may not enjoy that level of freedom, reason being a very small with focussed functionality OS is being embedded in TV sets which does not fall in prey hands.

The popular operating systems have two characteristics which makes them unreliable and insecure 1) they are very large in size and 2) they have very poor fault isolation. The Linux kernel has over 2.5 million lines of code and Windows XP is twice more than Linux. A study [1] of software reliability conveys it contains 6-16 bugs per 1000 lines of executable code while a different one [2] states that the fault density at 2-75 bugs per 1000 lines of executable code. To be on a conservative end one can estimate of 6 bugs per 1000 lines of code the Linux kernel probably has something like 15,000 bugs, Windows has as at least double, not sure mobile OS for smart phones!! Further, to make matters worse, typically about 70% of the operating system consists of device drivers, and they have error rates 3 to 7 times higher than ordinary code [3]. It is also true that finding and correcting all these bugs is simply not always feasible, and bug fixes frequently

introduce new bugs. Any modern operating system contains hundreds or thousands of procedures linked together as a single binary program running in kernel mode. Any one line from the millions of lines of kernel code can overwrite key data structures used by an unrelated component and crash the system which is difficult to detect. In addition, if a virus or worm manages to infect one kernel procedure, there is no way to keep it away from rapidly spreading to others and taking control of the whole machine. The challenge in developing operating systems security is to design security mechanisms that protect process execution and their generated data in an environment with such complex interactions. However, these mechanisms do not account or only partially account for the complexity of practical systems. The current state of operating systems security takes two forms: (1) constrained systems that can enforce security goals with a high degree of assurance and (2) general-purpose systems that can enforce limited security goals with a low to medium degree of assurance. An ideal secure operating system provides security mechanisms that ensure that the system’s security goals are enforced despite the threats faced by the system. Thus the basic security mechanism improves the reliability of system software by protecting it from the most obvious source of unreliability; namely, user programming errors.Reliability

Reliable software provides services that are adequate for the intended application with respect to being: usable, correct, and trustworthy.

Usable means that the user receives services that are effective for his application. Correct means that the software meets its functional specifications. If the specifications are incomplete, then correct software may not be usable. Trustworthy means that there is a minimum level of services

that is provided correctly, and there is an effective way to evaluate or measure the performance of the software with respect to the minimum level of service. Software may be correct even if there is no effective way to demonstrate its correctness; however, trustworthy software must be structured so that testing, auditing, and/or proofs of correctness can be used to achieve a reasonable level of confidence in the software.Security

Security goals describe how the system implements accesses to system resources that satisfy the following: secrecy, integrity, and availability. A system access is traditionally stated in terms of which subjects (e.g., processes and users) can perform which operations (e.g., read and write) on which objects (e.g., files and sockets). Secrecy requirements limit the objects that individual subjects can read because objects may contain secrets that not all subjects are permitted to know. Integrity requirements limit the objects that subjects can write because objects may contain information that other subjects depend on for their correct operation. Some subjects may not be trusted to modify those objects. Availability requirements limit the system resources (e.g., storage and CPU) that subjects may consume because they may exhaust these resources. Much of the focus in secure operating systems is on secrecy and integrity requirements, although availability may indirectly impact these goals as well.

In general, security provisions must be as simple and rigid as possible in order to minimize the danger of oversights and of human error. Nevertheless, for security in a computer operating system, the flexibility is desirable for the following reasons:(1) System security will be attacked

at its weakest point. It makes little sense to build extremely rigorous

27 C S I C o m m u n I C a t I o n S | F E B R u a R Y 2 0 1 7

Page 28: ISSN 0970-647X Operating Systems - CSI INDIAcsi-india.org/Communications/CSIC_feb_2017.pdf · 2019-01-15 · Knowledge Digest for IT Community ISSN 0970-647X Operating Systems SECURITY

• CoverStory• TechnicalTrends• ResearchFront• Articles• InnovationsinIT• SecurityCorner• PractitionerWorkbench• BrainTeaser• ChapterReports• Studentbranchreports

A R T I C L E

security barriers if there is a back door into the system that is left open.

(2) A serious danger to security arises whenever the need for flexible protection is underestimated. If protection mechanisms are so rigid that they prevent efficient processing of information, then the protection is usually circumvented. A single general protection mechanism that is used without exception is better than a rigid one that has many exceptions.

(3) Flexible and efficient switching between protection domains makes it more feasible to build redundant security controls. As long as the basic protection mechanism itself is extremely reliable, redundant security checks incorporated in software can provide very rigorous security control. While security and reliability

requirements vary greatly from one application to another, the protection mechanisms that are built into the hardware and basic software of the computer operating system cannot be redesigned to meet the needs of each application. Thus it is desirable to have a basic set of protection mechanisms that are versatile enough to meet the requirements of many diverse computer applications. Small protection domains are one of the most promising ways to achieve the goal of reliable and secure operating system in reducing the complexity of large system. As it is quite clear that it is far more difficult to build a 50,000 line program than it is to write 1,000 programs that are each 50 lines long. This phenomenon leads to rapidly escalating costs for the development and maintenance of large software systems, and it leads to serious reliability problems due to the difficulty of adequately debugging and testing a large program. Both the reliability and the cost of software could be greatly improved if the complexity of large programs could be kept more in line with the size of the program. However, when a large system is decomposed into interacting subsystems, it is important to have limits on the interaction of the subsystems. These limits should not be dependent on the proper functioning

of all of the subsystems. Othen, the subsystem interactions may change precisely when one of the subsystems fails, thus causing the whole system to crash. It is not feasible to eliminate all malfunctions from software subsystems. On a case-by-case basis, careful defensive programming can limit the effects of potential malfunctions. A more general solution is possible by introducing a protection mechanism which is distinct from the proper design and functionality of the subsystems. The role of the protection mechanism is precisely to prevent malfunctions from spreading beyond the subsystem where they occurred. To achieve the desired protection, almost every procedure should be run in protection domain that gives it access to exactly what it needs to accomplish its function and nothing more, on the principle of least privilege. A protection mechanism will not prevent every error from propagating outside of the erroneous module. Many erroneous results of a module will appear to be normal results, and the protection mechanism will have no way of distinguishing these from correct results. However, with good system design, erroneous results that look like expected results should not cause other modules to behave in unpredictable ways. As long as other modules continue to behave in predictable ways, there is a much better chance of finding the origin of the error. The protection mechanism will guard mostly against the errors that result from unexpected interactions of the modules and are usually the hardest to trace.Trojan Horse Problem

Most access controls only guarantee that one user’s information is protected from access by other users. Unfortunately, it is often not realistic for a user to trust all the programs that execute as part of his own processing. Most users make calls to a large number of service routines and other programs that the user has not written· himself. On most systems, all these routines and programs execute with the full access privileges of the user. It is possible for these programs to perform completely unrelated actions e.g. they may access any file accessible, by the user, and on one or many systems and they can even

give away access rights to these files. Daniel Edwards has given it the very descriptive name “Trojan Horse” as it involves a foreign or gift program that is brought within the walls of a protection domain. The gift program can then subvert the security of everything accessible from that protection domain. Programmers and systems personnel routinely try out new programs that play games, print pictures, or aid in the development of better programs. The most acute danger from the Trojan Horse problem occurs when someone executing with system privileges runs a program given to him by “a friend”. This includes support programs such as editors, compilers, and library routines. A user may choose to believe that programs supplied with the system are unlikely to act like a Trojan Horse--but this should be recognized as a calculated risk.

It might seem that the Trojan Horse problem should be solved by administrative controls. Systems personnel and anyone who has very sensitive data should never run a program in their protection environment unless they trust it. Unfortunately, this administrative solution is often not practical unless the system makes it easy to run untrusted programs in a restricted protection environment where they can do little harm. Finding a reasonable solution to the Trojan Horse problem is probably the most challenging aspect of developing an adequate set of system security controls.

Three distinct aspects of the Trojan Horse problem must be distinguished when a foreign or untrusted program is to be run on a system:(1) The foreign program is expected

to modify sensitive data. In this case the foreign program must be thoroughly examined so that it can be trusted. If the program is to alter data, then it must be trusted with respect to that data.

(2) The foreign program is expected to read sensitive data but not disclose its contents except to the calling program. This is called the confinement problem. It is difficult enough to prevent a program from hiding the information in a file or other form of storage;

www.csi-india.org 28

C S I C o m m u n I C a t I o n S | F E B R u a R Y 2 0 1 7

Page 29: ISSN 0970-647X Operating Systems - CSI INDIAcsi-india.org/Communications/CSIC_feb_2017.pdf · 2019-01-15 · Knowledge Digest for IT Community ISSN 0970-647X Operating Systems SECURITY

A R T I C L E

however, it is even more difficult to prevent it from communicating the information via a covert channel. Covert communications channels can be created by encoding the information in the program’s resource utilization. For example, a program might communicate one bit to another program by using 10 minutes of CPU time if the bit is 1, and only using a fraction of a second if the bit is 0. The other program has to be able to detect or estimate the execution time of the first program, possibly by simply observing the performance of the system. Much higher data rates can be achieved by encoding the information in paging rates, disk utilization, or in the locking and unlocking of files.

(3) The foreign program is run on behalf of a user who has access to sensitive data, but the untrusted program is not expected to access any sensitive data. This problem should be easy to solve; however, the solution is difficult to enforce with the protection mechanisms available on most existing computer systems.

If security depends in part on the compilers, then the compilers would also have to be validated for security. While it may be easier to validate a compiler than to validate an operating system, the validation of several compilers in addition to the validation of parts of the operating system would make security validation more difficult. If the operating system is written in a high

level language, then the correctness of the compiler for that language is a security concern. Conclusion

In an attempt to design OS that is reliable and support rigorous security, narrow and short term focus is not advisable. Many security controls might not be cost-effective if they were not needed to improve the reliability and the overall performance, in particular : 1) the complexity of most existing OS make it very difficult to achieve security. To guarantee security OS must be structured so that interactions between system modules are more clearly defined and closely controlled which will also ensure the reliability and may improve the performance. 2) the protection mechanisms needed for security can also be used to enforce s/w modularity. Such modularity would improve the reliability and correctness of the s/w. In particular, debugging and testing would be easier to the extent that the effects of an error can be confined within the module where the error occurs. Since the debugging and testing of the account for half of the project cost these protection mechanisms amy help in reducing the overall cost. It is an ambitious goal to design an OS that satisfies rigorous security requirements, supports reliable software and at the same time meets the performance, flexibility, sharing, and compatibility requirements that are needed to make a computer competitive in the marketplace. Decreasing hardware costs are making these goals much more feasible. The recent demonitarization in the country

along with ever-growing connectivity and e-commerce over the Internet, application security is an ultimate goal for millions of merchants and consumers who turn their business and service electronic and to the public world of cyberspace. On the other hand, efforts to achieve total security of such systems continue to be based on the flawed promise that adequate security can be achieved in applications with the current security mechanisms of mainstream operating system [4]. The reality is that secure applications demand secure operating systems, and tackling application compromises at the OS level by kernel-enforced controls should probably be considered as an attractive and effective approach.References:[1] V.R. Basili and B.T. Perricone, ‘‘Software

Errors and Complexity: an Empirical Investigation,’’ Commun. of the ACM, vol. 27, Jan. 1984, pp. 42-52.

[2] T. J. Ostrand and E. J. Weyuker, ‘‘The distribution of faults in a large industrial software system,’’ Proc. Int’l Symp. on Software Testing and Analysis, ACM, 2002, pp. 55-64.

[3] A. Chou, J. Yang, B. Chelf, S. Hallem, and D. Engler, ‘‘An Empirical Study of Operating System Errors,’’ Proc. 18th ACM Symp. On Operating Syst. Prin., ACM, pp. 73-88, 2001.

[4] P. A. Loscocco, S. D. Smalley, P. A. Muckelbauer, R. C. Taylor, S. J. Turner, and J. F. Farrell, “The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments”, Proceedings of the 21st National Information Systems Security Conference, pp. 303-314, Oct. 1998, http://www.nsa.gov/selinux/doc/inevitability.pdf. n

About the AuthorAshutosh Saxena is an industry expert and academician with over two decades of experience, 100+ international publications, 30+ filled patents out of which 16 are USPTO granted patents, and a book on PKI: Concept, Design and Deployment (Tata McGraw Hill 2003) to his credit. Has served as a member of the review board for many international journals, conferences and committees. Research interest is in the areas of information security and privacy.Began career as a lecturer and computer engineer in the university and IUC-DAE facilities at Indore Centre. Also worked as faculty at the Institute for Development and Research in Banking Technology (established by RBI), Hyderabad, for eight years, supervised TWO PhD. Worked at Infosys from 2006 – 2016 as AVP, Principal Research Scientist, Infosys Labs, Hyderabad where he lead security research as part of the Security Center of Excellence. Membership of Professional Associations: • Life Member of Computer Society of India (membership # 00075062 )• Life Member of Cryptology Research Society of India • Senior Member of IEEE Computer Society.

29 C S I C o m m u n I C a t I o n S | F E B R u a R Y 2 0 1 7

Page 30: ISSN 0970-647X Operating Systems - CSI INDIAcsi-india.org/Communications/CSIC_feb_2017.pdf · 2019-01-15 · Knowledge Digest for IT Community ISSN 0970-647X Operating Systems SECURITY

• CoverStory• TechnicalTrends• ResearchFront• Articles• InnovationsinIT• SecurityCorner• PractitionerWorkbench• BrainTeaser• ChapterReports• Studentbranchreports

A R E P O R T

CSI Nihilent eGovernance Awards 2015-16 GSN Prabhu & K S Vijaya Sekhar

Convener’s Team CNEA 2015-16

The Special Interest Group on eGovernance of Computer Society of India (CSI-SIGeGov), successfully conducted the 14th edition of CSI Nihilent eGovernance Awards (CNEA) ceremony on 24th Jan 2017 in Coimbatore. The awards ceremony is a culmination of an elaborate awards process spread over 9 months starting with nominations and ending with awards presentation to the successful entries. Sponsored by Nihilent Technologies Ltd, since the year 2002, the awards ceremony has become integral part of the CSI Annual Convention. This year’s event took place at Hotel Le Meridien, Coimbatore.

To make the event rewarding, an eGovernance track has been included as part of the CSI 2016 program. This session was inaugurated by Shri. Sanjay Mohaptra, VP CSI, in the presence of Shri. Rangaswami, OC Chair CSI 2016, Prof. M N Hoda, Chairman Division I-CSI, Shri. Lalit Sawhney, Ex President-CSI and Shri. Surendra Kapoor, Convener, CSI-SIGeGov. The first panel discussion was on ‘Digital Transformation– Issues and Challenges’ and the second session was on ‘eGovernance Initiatives – Emerging Drivers’. The panel sessions were well attended by the award winners and accompanying teams. Shri. Lalit Sawhney and Shri. Satish Babu, past Presidents of CSI chaired the sessions. Panelists for both the sessions were Award winners from State and Projects category.

The much awaited, Awards ceremony took place in the convention hall. Well attended with over 100 participants consisting of 40+ awardees teams and other invitees, the entire program has been well received and appreciated for the ambience and the professional way it got conducted. The highlight of this year’s ceremony was the august presence of Dr. Ajay Kumar, Additional Secretary, Ministry of Electronics and Information Technology (MeitY), Govt. of India, as Chief Guest, who distributed the awards.

While presenting ‘Convener Report’ Shri. GSN Prabhu, Convener CNEA 2016 stated that the Selection Committee has received over 180 nominations and that identifying the best from the list has been very tough task but for the able support and participation of the Selection Committee.

The Chief Guest, Dr. Ajay Kumar, IAS illustrated the importance of Digital India-Skill India-Make in India-Clean India (Di-Si-Mi-Ci) and dwelled on the important role the e-Governance practitioners need to play in sustaining and bringing innovation in whatever they are doing which will drive and

bring success to the eGovernance initiatives. He even recalled his association with the CSI Nihilent eGovernance Awards as one of the recipients of the award earlier and complimented the CSI-Nihilent team for ably sustaining the recognition efforts for 14 long years.

Shri. Surendra Kapoor, Convener, CSI-SIGeGov welcomed the Chief Guest, awardees and the invitees and thanked the CSI 2016 Organization team for excellent support, He also thanked all the nominees for continued patronage and participation in the CSI Nihilent eGovernance awards process and complemented the award winners.

Shri. Shohel Noor, General Manager at Nihilent Technologies had this to say, “In its 14th year since inception, the Awards assume more significance than ever before, with the intensive focus by the Government on Digital India, we anticipate a manifold increase in these initiatives in the country in the days to come, which makes the CSI Nihilent eGovernance Awards, all the more relevant to our growth story. We are indeed proud to be associated with the awards program”. Mr. Anoop Bharadwaj who is coordinating CNEA from Nihilent for the past four years also attended the event.

Dr. Anirban Basu, President-CSI opined that the foot print of participation is from all the States and Central Government departments. He hoped that CSI would be able to play constructive and complimentary role in bringing ‘Digital Transformation’ in the country.

A compendium in the form of a book titled “Leveraging Technology Towards Digital Transformation - Selected eGovernance Initiatives” was released along with a ‘Souvenir’ by the Chief Guest on the occasion. The book edited by Prof. G P Sahu of MNNIT, Alllahabad; Dr. K S Vijaya Sekhar of IIIT Hyderabad and Shri. Prabhu Gollamudi of CSI-SIGeGov and it consists of 500 pages of selected nominations showcasing projects across the country.

The awards were presented by the Chief Guest, assisted by Dr. Anirban Basu, Shri. P R Rangaswami, Chair OC, CSI-2016 and others on the dais.

Dr. K S Vijaya Sekhar, presented vote

of thanks and profusely thanked the award winners for their participation and also thanked the CSI-2016 OC team for immense assistance to make the event memorable. Prof. Harish P Iyer played an important role in the awards ceremony and added a special touch as an anchor.

Chief Guest of the Awards Ceremony - Dr. Ajay Kumar, IAS, Additional Secretary, MeitY, GoI.

Dr. Anirban Basu, President – CSI

Releasing Book ‘Leveraging Technology Towards Digital Transformation’ by Chief Guest.

CSI-SIGeGov team with Chief Guest and OC Chair, CSI-2016.

CSI Nihilent eGovernance Awardees 2015-16 and their teams

State Category Award Winners Project Category Award winnersAward of Excellence: Rajasthan and TelanganaAward of Recognition [Progressive State]: Odisha Award of Recognition (NE States): Nagaland

Award of Excellence 13 Projects Award of Appreciation 11 ProjectsAward of Recognition 10 ProjectsAward of Recognition 2 Projects(Sustenance)

More Details are available at www.csinihilent-egovernanceawards.org

www.csi-india.org 30

C S I C o m m u n I C a t I o n S | F E B R u a R Y 2 0 1 7

Page 31: ISSN 0970-647X Operating Systems - CSI INDIAcsi-india.org/Communications/CSIC_feb_2017.pdf · 2019-01-15 · Knowledge Digest for IT Community ISSN 0970-647X Operating Systems SECURITY

A R E P O R T

CSI 2016The 51st Annual Convention of CSI

was hosted by Coimbatore Chapter and was held on 23rd – 25th January 2017 at Hotel Le Meriden on the theme “DIGITAL CONNECTIVITY - SOCIAL IMPACT”. The theme was chosen keeping in mind the thrust of the Government of India in ushering a Digital India and ensuring technology is an enabler in improving the life of every citizen of the country. The convention had the main aim of drawing the attention of academicians, professionals, corporate, research scholars, Government and all stake holders to the hugely anticipated expansion of Digital Connectivity that could viably impact the economy, touch the lives of citizens and enable in building societies that are Happy Societies to live in.

The curtain raiser to the event was a well attended Pre Convention Tutorial conducted at PSG College of Technology on the 22nd Jan 2017. This had close to 300 participants and was inaugurated by Dr. R. Rudramoorthy, Principal, PSG College of Technology who highlighted the role played by bodies like CSI in nation building The tutorial was organized in two tracks keeping in mind current trends in both industry and academia., one handling Deep Learning & Game Theory while the other was dedicated to Data Science. Experts from IIT Hyderabad, IIT Madras, Hike Messenger handled the highly interesting sessions through the day.

The convention was off to a colourful start on the 23rd morning with a lecture by Mr. Anand Ramamoorthy, Intel Security Inc. The Inaugural which followed had a galaxy of delegates including CSI Fellows, Past Presidents, leading Industrialists from Coimbatore among others. Mr. P R Rangaswami, Chair Organizing Committee welcomed, Dr. Anirban Basu, President CSI delivered the Presidential address and Dr. S Subramanian, Chair Program Committee elaborated the proceedings planned. In his inaugural speech the Chief Guest, Dr. B. K. Krishnaraj Vanavarayar, Chairman, Bharatiya Vidhya Bhavan, Coimbatore Kendra, applauded CSI Coimbatore chapter for

having put up such a stellar show and highlighted the importance of culture in the Indian context and the need for integrating technology and culture. The theme talk that followed by the Guest of Honour, Mr. S. Premkumar, Vice Chairman and Managing Director, HCL Infosystems Ltd, was well received. He spoke at length about how technology is an enabler in bringing about social good. He cited the example of the recent success of youth in Tamil Nadu using technology to bring about unprecedented public support for their cause of “Jallikattu” in a highly democratically manner. Mr. Sanjay Mohapatra, Conference Chair/Vice President CSI and Prof. A K. Nayak Hon. Secretary CSI also participated in the proceedings. Thereafter Life Time Achievement Awards and Fellowship Awards of CSI were presented to eminent persons for their noteworthy contribution. The “Springer Ccis Series Proceedings” and the Conference Souvenir were also released.

The post lunch session witnessed keynote talks by Mr. Sanjay Podder, Accenture Labs and Dr. Anupam Basu from IIT, Kharagpur. This was followed by an interesting Panel Discussion on the Theme of the Convention moderated by Mr. S. Mahalingam, Former CFO, TCS with Dr. K. Ganapathy, Apollo Hospitals, Dr. D. B. Phatak, IIT, Mumbai and Ms. Nancy Anabel, MSSRF as the panelists. The day ended with a Think Tank meeting which was well attended by Fellows and Execom members.

The sessions on the second day were held in 6 halls which included lectures, paper presentations and panel discussions. In Three Parallel Tracks, speakers from leading organizations including Deloitte Consulting, Amazon, Nokia, TCS, IBM, Adobe, IISc, Vodafone, Tech Mahindra, NICE delivered impactful lectures. Apart from this, interesting PANEL DISCUSSIONS were held on “How to Leverage the Latest IT Solutions to thrive in the Digital Economy” and “Innovation and Startups” having panelists from Adobe, Thoughtworks, HCL, Flipkart, Microsoft, Mobichip, Infibeam among others.

The e-Governance Track had two panel discussions on “Digital transformation: issues and challenges” and “e-Governance initiatives-emerging drivers”. The e-Governance awards ceremony was graced by Dr. Ajay Kumar, I.A.S, Additional Secretary, IT, Govt. of India and had close to 85 participants from State Government departments from across the country. He spoke about the thrust of the Government on driving the digital economy and appreciated the efforts of CSI-SIG e-Governance in identifying and recognizing the best projects Pan India.

While 23 high quality peer reviewed Springer Paper publications were presented in one track, a parallel “Research’s Track” was organized to provide budding researchers an opportunity to present their work which was published in the conference souvenir. Other statutory meetings including the National Council meeting, Regional/Divisional meeting, Membership committee meeting and Auditor’s meeting chaired by Hon Treasurer Mr. R K Vyas were held. The evening saw the delegates being entertained to a cultural program which showcased the traditional music, dance and folk art forms of Tamil Nadu. This was followed by the convention dinner.

On the concluding day, speakers from Micosoft, Cisco Systems, Fortinet shared their technical expertise with the audience. A Panel Discussion showcasing few “Successful Startups From Coimbatore” was conducted to showcase local talent. A well attended “Research Conclave” provided researchers an opportunity to listen to experts on contemporary trends in Computer Sciences Research.

The Annual General Meeting (AGM) was also held with good participation by all members. In the post lunch session, an interactive session was held with all Student coordinators and Student branch counselors to seek their inputs and suggestions. The CSI Annual awards to recognize the contribution of chapters, individuals and institutions was a well attended affair with over 250 awards presented in various categories.

31 C S I C o m m u n I C a t I o n S | F E B R u a R Y 2 0 1 7

Page 32: ISSN 0970-647X Operating Systems - CSI INDIAcsi-india.org/Communications/CSIC_feb_2017.pdf · 2019-01-15 · Knowledge Digest for IT Community ISSN 0970-647X Operating Systems SECURITY

• CoverStory• TechnicalTrends• ResearchFront• Articles• InnovationsinIT• SecurityCorner• PractitionerWorkbench• BrainTeaser• ChapterReports• Studentbranchreports

The entire event was attended by close to 1000 delegates who had travelled from all parts of the country. The proceedings of all three days were WEBCAST to 12 Colleges who were academic partners thereby reaching out to a large audience of faculty and

students. Another highlight of the event was that close to 50 students selected based on a National Online Programming Contest were provided complementary registration and hospitality by the organizers, a first by any CSI chapter. CSI 2016 concluded

on a very promising and satisfying note demonstrating to all the technically rich content that CSI conventions are known for and went on to set new standards and benchmarks for forthcoming conventions.

A R E P O R T

www.csi-india.org 32

C S I C o m m u n I C a t I o n S | F E B R u a R Y 2 0 1 7

Page 33: ISSN 0970-647X Operating Systems - CSI INDIAcsi-india.org/Communications/CSIC_feb_2017.pdf · 2019-01-15 · Knowledge Digest for IT Community ISSN 0970-647X Operating Systems SECURITY

A R E P O R T

CSI-IEEE Computer Society Joint Education Award 2016

The 51st CSI Annual Convention 2016 at Coimbatore presented for the first time the CSI – IEEE CS Joint Education Award 2016 under the Awards category. This award is a co-ordinated effort between the IEEE, the IEEE Computer Society and the Computer Society of India. The objective of this award is to recognize educators who have made significant contributions to computer science and engineering education. The award will increase the visibility and knowledge of both CSI and IEEE CS to the technical community and public of India and further promote additional co-operative initiatives and better understanding among the members of

the CSI and the IEEE CS. The Award Jury Panel consisted

of Mr. Satish Babu (Fellow - CSI & Past President) as Chair, and Prof. M N Hoda as Vice Chair, supported by Dr. S S Sane, Dr. Narendra Chaudhari, Prof. GRC Reddy and Prof. A K Nayak (Hony. Secretary & Fellow-CSI). Support from the notable academicians is appreciated.

A total of 44 entries were received from all over India, out of which the panel finalized 8 entries after the initial screening. In the final round, the Jury ranked all participants on a set of criteria such as Contributions to Course Materials, Contributions to

Papers on Education, Industry linkages, Contributions to Inspirational Teaching, Contributions to Writing Influential Texts, Contributions to Innovative Development of Curriculum or Methodology, and Overall Significance of Contributions to Computer Science & Engineering Education.

We honour the eminent academic, Dr. S Thamarai Selvi, as the first recipient—and indeed the first woman recipient—of this award. She is also the First Woman Dean of the prestigious institute the Madras Institute of Technology, the Alma Mater of His Excellency the Late Dr A. P. J Abdul Kalam, the Former President of India. She also received an award from the Chief Minister of Tamil Nadu for Social Work in Rescue Operation in Moulivakkam (Chennai) building collapse using UAV and Thermal Imaging Technology during July 2014.

CSI is grateful to Dr. Anirban Basu, President, CSI, and Mr. Roger U Fujii, President, IEEE Computer Society, for their joint effort between IEEE, the IEEE Computer Society and the CSI, for making this award a grand success. We look forward to recognizing more eminent educationists with this award in the coming years.

MoU with iB Hubs for the benefit of CSI Student BranchesIn line with the Start-up India initiative of the Government of India, during the CSI National Convention inaugural at Coimbatore on 23rd January, 2017, CSI has signed an MoU with iB Hubs, a pan-India Start-up and innovation hub for the benefit of the CSI Student branches and students. The MoU exchange was by CSI National President, Dr. Anirban Basu and CEO, iB Hubs, Ms. Radha Alekhya K in the presence of the CSI National Office Bearers, Mr. Sanjay Mahapatra, CSI Vice-President; Prof. A. K. Nayak, CSI Secretary and Mr. R. K. Vyas, Treasurer, CSI. iB Hubs assists young entrepreneurs by providing support in incubation, mentoring, funding and skill development. This collaboration initiated by CSI National Student Coordinator, Prof. Prashant R. Nair will focus on Entrepreneurship & Skill Development for CSI student

members. iB Hubs which has start-up hubs in 5 cities plans to expand to 500 centres by 2020. Recently, the CEO of NITI Aayog, Mr. Amitabh Kant launched their hub in New Delhi.

33 C S I C o m m u n I C a t I o n S | F E B R u a R Y 2 0 1 7

Page 34: ISSN 0970-647X Operating Systems - CSI INDIAcsi-india.org/Communications/CSIC_feb_2017.pdf · 2019-01-15 · Knowledge Digest for IT Community ISSN 0970-647X Operating Systems SECURITY

• CoverStory• TechnicalTrends• ResearchFront• Articles• InnovationsinIT• SecurityCorner• PractitionerWorkbench• BrainTeaser• ChapterReports• Studentbranchreports

A R E P O R T

CSI Meeting with Myanmar Delegates

The CSI Meeting with Myanmar Delegates was a gathering of all principal stakeholders of CSI Hyderabad chapter, Members of various SIGs of CSI and Members from Computer Federation of Myanmar to brainstorm and seek solutions that would benefit the Computer and IT related societies in South Asia. The meeting was organized by Dr. Gautam Mahapatra, Scientist-G, RCI, DRDO, Former Chairman of CSI Hyderabad and Chairman, TINICT-Organizing Committee at DAC centre, RCI Campus, DRDO.

CSI President Dr. Anirban Basu chaired the meeting which began at about 12.30 PM and ended by 2.30 PM same

day. Office bearers of CSI Hyderabad Chapter, former chair persons of CSI Hyderabad Chapter and members of various SIGs of CSI were gathered to address issues, generate new ideas and approaches as well as chart a road map for India and Myanmar’s ICT space.

The Welcome Address & Introduction was given by Dr. Gautam Mahapatra and CSI President Prof. Anirban Basu gave a presentation about CSI and its future directions. Myanmar Delegation Leader also shared his organization’s ideas about ICT development in their country. Then Curtain Raiser for International Summit on Trends & Innovations for Next Generation ICT (TINICT)-2017 was held with a grand success and finally Expression of Gratitude was given by Mr. K Mohan Raidu, Vice Chairman, CSI Hyderabad.

The leaders and attendees discussed common ICT policy related issues, affirm shared values and commit to concerted actions at the national and international level to address continuing and new challenges faced in the field of ICT.

CSI deliberated on various avenues for collaboration with Myanmar Computer federation. It was agreed that both the stake holders will form sub-committees leading to signing of MoU between two societies.

www.csi-india.org 34

C S I C o m m u n I C a t I o n S | F E B R u a R Y 2 0 1 7

Book Title : The class of JAVAAuthor : Pravin M. JainISBN : 978-81-317-5544-0Price : Not AvailablePublisher : Pearson

As its title implies, this book teaches class in Java Programming. By now, nearly everyone in the computing field knows what Java is: an object-oriented, Internetaware language with the potential to revolutionize programming.

The book is divided into 23 chapters starting with OOPS introductory to class,

exceptions, multithreading, networking, GUI – swing and MVC, Applets, JDBC, interaction with database, annotations and many more. The Indic characters in Unicode are one of unique quality in the book. It has a good emphasis on object orientated design; class diagrams are used extensively throughout the book to make it easy to understand how examples work. Working through the book will teach you how to program - not just how to write simple applets.

Examples in the book teach a wide range of topics, from simple concepts to high level. The approach taken by the book introduces topics gradually, and makes it easy to pick up the skills needed to program in Java.

The book is easy to read and understand by the student community. The book will serve as useful textbook for students in computer science, information technology, computer applications and students who wish to learn object oriented programming using Java.

Review by: Dr. Kanhaiya LalHODDepartment of Computer Science & EngineeringBirla Institute of Technology Mesra, Patna Campus

Page 35: ISSN 0970-647X Operating Systems - CSI INDIAcsi-india.org/Communications/CSIC_feb_2017.pdf · 2019-01-15 · Knowledge Digest for IT Community ISSN 0970-647X Operating Systems SECURITY

www.csi-india.org 35

C S I C o m m u n I C a t I o n S | F E B R u a R Y 2 0 1 7

Life Time Achievement AwardDr. M. L. Goyal

Dr. M. L. Goyal did his B.E. (Hons.) in Electrical Engg. from MREC, Jaipur; M.E. (Distinction) in Electrical Engg. from BITS, Pilani; M.A.Sc. in Computer Science from University of Toronto, Canada; and Ph. D. in Computer Science from Jawaharlal Nehru University, New Delhi.

He Worked in CMC Limited in different Regions, SBUs and functions for more than 31 years (1977-2008). He was associated with the management of software development & implementation, systems support; consultancy, quality & excellence processes, marketing, education & training and General Management. During 1991-93, on deputation from CMC limited, he worked as an Adviser to the Govt. of Mauritius and Head, Central Informatics Bureau at Port Louis. He superannuated from CMC Limited after serving as General Manager at Chennai and New Delhi. While working in CMC Limited, he received several appreciation and special contribution awards. In October 1998, he was given the Outstanding Recognition Award for his significant contribution for the growth of IT Education and Applications & for achieving professional excellence.

After superannuation from CMC Limited, in September 2008, he joined Maharaja Agrasen Institute of Technology, Delhi as its Director and continued up to May 2016. Many innovations were introduced in the working of the institute and the institute grew at a rapid pace during this period. Since, May 2016, he is working as Director General at this institute.

He served the Computer Society of India as its Divisional Chairmen, Honorary Secretary, Vice President, & President. He was a Member of the Executive Council of the South East Asia Regional Computer Confederation (SEARCC) during 1994-96 and the Indian Representative to the International Federation of Information Processing (IFIP) during 1996-98. His contribution to CSI has been very significant. During his CSI President-ship, a Committee was set up to prepare a draft national IT Policy. The Committee brought out a document “INTENT – Information Technology for National Transformation” and the same was released to the press in October, 1995 and presented to the Planning Commission and various Govt. Departments. First time in CSI, 2 National IT Application Awards of Rs. 50,000/- each were instituted in the year 1996. The original CSI logo was expanded by adding to it, the Society’s name, year of its registration and CSI’s motto “Sarve Bhavantu Sukinah”. His association with CSI started in 1973 when he presented a technical paper based on his M.E. thesis at the CSI-73 Annual Convention at Delhi. In September 1998, CSI conferred on him its Fellowship Award.

He was the President – Computer Science Section of the Indian Science Congress Association during 1999 – 2000 and Hon. Treasurer; Chairman, Board of Examination and Council Member of the Institution of Electronics and Telecommunication Engineers (IETE) during 2006-09. He has been the Chairman, Institution of Engineers, Delhi State Centre, during 2013-14.

He served as a member in various Committees formed by the Department of Information Technology, Ministry of Communication and Information Technology, Govt. of India; All India Council of Technical Education, Confederation of Indian Industry, Technology Information and Assessment Council of Department of Science & Technology, National Board of Accreditation and Bureau of Indian Standards. He was also a member of the Governing Council of DOEACC Society during 1994-96.

He is a Fellow of the Institution of Engineers (India) and the Institution of Electronics & Telecommunication Engineers. On the occasion of the 46th Engineers’ Day on September 15, 2013, The Institution of Engineers (India) Delhi State Centre conferred on him the Eminent Engineer Award for his significant contribution to the advancement and application of practice of Engineering in India.

In grateful recognition of his services to the Computer Society of India and his outstanding contribution as an IT professional to IT Industry and Education, CSI has decided to confer on him the Life Time Achievement Award. The Society takes pride and pleasure in presenting him this citation on the occasion of its 51st Annual Convention held at Coimbatore on 23rd January 2017.

Page 36: ISSN 0970-647X Operating Systems - CSI INDIAcsi-india.org/Communications/CSIC_feb_2017.pdf · 2019-01-15 · Knowledge Digest for IT Community ISSN 0970-647X Operating Systems SECURITY

Life Time Achievement Award

36 C S I C o m m u n I C a t I o n S | F E B R u a R Y 2 0 1 7

Dr. R. Srinivasan

Dr. R. Srinivasan had contributed extensively for promotion of High quality Research, Computer Education, IT Industry, Resesearch and Computer Society of India.

Dr. Srnivasan is one of the co-founders of the CSI Bangalore Chapter- inaugurated in 1973/74. Seved CSI-BC as Vice Chairman and Chairman. He has been the Regional vice-President for the South, Vice President and President of CSI.

His flagship initiative has been the CSI Karnataka Student Convention in 1987 which is still continuing every year for the last 29 years!!

His lectures on “Success story of Indian Software Industry and the Lesson for Developing Nations”, Beijing, China, in the year 2000 and “ Computer Society of India, its Structure and Activities”, Milan, Italy, in the year 1999 had helped CSI to reach new destinations

Dr. Srinivasan has been a member of the Committee on IT Task Force constituted by the then Prime Minister of India, Shri Atal Bihari Vajpayee and contributed for developing new strategies

He has introduced Video lecture programs in CSI from eminent personalities including Sir Arthur C. Clark.

Dr. Srinivasan served as a Scientist in National Aerospace laboratories for 35 years. He played a major role in the accession and establishment of NAL Computer Centre housing a mainframe UNIVAC 1100-H1 Computer.

Dr. Srinivasan has been in the Committee Chaired by Dr. Abdul Kalam for the design and development of parallel computer in DRDO. He has been a member of the Expert Committee to procure computers for ADA, Bangalore and SERC, Ghaziabad.

Dr. Srinivasan has worked in IT Industry for about 8 years; as CTO in Tata Elxsi, in BFL Software, and as CTO in iCMG, Bangalore.

Dr. Srinivasan has been a very good teacher and a researcher. He at the age of 78 now, he is working as Emeritus Professor in M. S. Ramiah Institute of Technology, Banglaore. He has produced 8 Ph.D’s and published 27 papers in the last four years - has guided more than 100 BE and M.Tech projects.

In grateful recognition of his services to the Computer Society of India and his outstanding contribution as an IT professional to IT Industry and Education, CSI has decided to confer on him the Life Time Achievement Award. The Society takes pride and pleasure in presenting him this citation on the occasion of its 51st Annual Convention held at Coimbatore on 23rd January 2017.

Dr. D. D. Sarma

Dr. Dhavala Dattatreya Sarma, born to Venkataratmma and Jagannadha Sastry earned his Graduation, Masters level Degrees in Arts and Sciences and Ph.D from Andhra University

Dr. Sarma was Chief Scientist (Scientist G) at National Geophysical Research Institute (Council of Scientific and Industrial Research, India) and extensively worked on Stochastic and Computer Modeling. Dr. Sarma

Page 37: ISSN 0970-647X Operating Systems - CSI INDIAcsi-india.org/Communications/CSIC_feb_2017.pdf · 2019-01-15 · Knowledge Digest for IT Community ISSN 0970-647X Operating Systems SECURITY

37 C S I C o m m u n I C a t I o n S | F E B R u a R Y 2 0 1 7

Life Time Achievement Awardwas a Post Doctoral Research Associate at the University of Georgia (USA). He had received intensive training in Computer Methods and signal processing at IIT-K and University of Roorkee, Roorkee (U.P-India). He had received intensive training in Computer Methods and Operations Research at the Imperial College of Science & Technology (London) and the University of Leeds, Leeds, U.K. He was a visiting Scientist at the world famous Centre de Geostatique, Fontainebleau, France. Presently, he is working as Professor and Director, Guru Nanak Institutions Technical Campus, Hyderabad,

Dr. Sarma has promoted research and produced several Ph.D. Holderrs. He had published over seventy five research papers and Three books He has organized a number of national and international conferences on various aspects of computers, e-learning and entrepreneurship education. Over the years, he has held leadership positions in various high profile scientific/educational institutions. . Among others, Dr. Sarma is a Fellow, Computer Society of India, Fellow, A.P. Akademi of Sciences, Fellow, Telangana Academy of Sciences, Indian Society for Probability and Statistics, Fellow Geological Society of India. He was Regional Respresentative for Asia of the International Geostatistics Association (France) from 1992 - 2000. He is presently the Chairman IT & CSE Section of A.P. Akademi of Sciences.

Dr. Sarma became member of CSI in 1968 and was associated with the Regd. Office of CSI, Hyderabad since its formation He was Regional Representative of CSI during 1979- 83 and organized Four regional conferences. He was member, Publication Committee of CSI from 1996 -1998 and during 2004. Dr. Sarma had served as Chairman, CSI Hyderabad Chapter from 1986-88, Chairman, Finance Committee of CSI- 95 held at Hyderabad (1995), Chairman Div. VIII (Micro Computers), during 1994-1998. He was member, awards committee of CSI during 1998 and 2004 and member, Publication Committee of CSI from 1996 -1998 and during 2004. As Divisional Chairman he organized a number of workshops and conferences on various aspects of computer methods and modeling.

He was Regional Academic Auditor for Aptech for their NCC-Aptech Educational Programme for a number of years. Dr. Sarma is the Editor, International Journal of Computer Science and Engineering being brought by Guru Nanak Institutions.

In grateful recognition of his services to the Computer Society of India and his outstanding contribution as an IT professional to IT Industry and Education, CSI has decided to confer on him the Life Time Achievement Award. The Society takes pride and pleasure in presenting him this citation on the occasion of its 51st Annual Convention held at Coimbatore on 23rd January 2017.

Mr. G. Ramachandran

Mr. G. Ramachandran obtained M.Sc degree in Mathematics from Madras University and M.Stat from Indian Statistical Institute, Kolkata. He is a member of Computer Society of India from 1965 and currently a Fellow life member.

Mr. G. Ramachandran has made outstanding contribution in the field of Information Technology for Indian Industry for more than five decades. He has developed and implemented more than 150 Information Technology Projects, covering many domains. He has developed Strategic Plan for computerisation for many enterprises. He was a member of the group constituted to have an appraisal of EDP facilities available in Public Sector Undertakings under the ministry of Heavy Engineering Industries. He was a pioneer in introducing bar codes for retail stores billing. He has worked with both Public and Private enterprises. As an entrepreneur he has set up two companies, one on software development and the other on software training. He has represented our country and presented

www.csi-india.org

Page 38: ISSN 0970-647X Operating Systems - CSI INDIAcsi-india.org/Communications/CSIC_feb_2017.pdf · 2019-01-15 · Knowledge Digest for IT Community ISSN 0970-647X Operating Systems SECURITY

38 C S I C o m m u n I C a t I o n S | F E B R u a R Y 2 0 1 7

Life Time Achievement Awardcountry paper in Asian Productivity Council, Tokyo and Computer Conferences at Singapore, Hong Kong and Tokyo. He has trained more than 400 Information Technology professionals, who are now contributing for the advancement of Indian Information Technology Industries. He was a member of the first MCA Syllabus committee of the Madras University.

Mr. G. Ramachandran was committed and his contribution to Computer Society of India is outstanding. He played a major role in acquiring own premises for many chapters. He has organised many national and international conferences on behalf of Computer Society of India. He was the convener of the first National Students Convention of Computer Society of India and the first DOEACC Chairman. He was a member of the group constituted to start the Education Directorate at Chennai. He started the Visakhapatnam Chapter and held various positions in CSI Executive Committee as Regional Vice President (South), Honorary Secretary, Past Secretary and Vice President.

Mr. G. Ramachandran excelled in the sports field also. He was a member of the Madras University, Madras State, West Bengal State Basket Ball team. He captained West Bengal State Basket Ball team and was selected to represent Indian Basket Ball team.

In grateful recognition of his services to Computer Society of India, Information Technology Industry and Society, Computer Society of India is pleased to confer on Mr. G. Ramachandran Life Time Achievement Award. The Society takes pride and pleasure in recognising him with this citation on the occasion of the 51st Annual Convention held at Coimbatore on 23rd January 2017.

Prof. U. K. SinghProf. Uttam Kumar Singh, Founder Director General of Indian Institute of Business Management & Dr. Zakir Husain Institute, Patna completed B.Sc. and MBA (MIS) from Bihar University, Muzaffarpur in 1972 & 1974 and further obtained PhD, Master of Public Administration (MPA) and BNYS Degree. After completion of academic pursuits, Prof. Singh entered into Institution Building and established several technical and vocational Institutes of national repute at Patna, Ranchi, New Delhi, Kolkata, Pune, Bhubaneswar including two universities in Nagaland and Arunachal Pradesh. Since the Year 1979, Prof. U. K. Singh, initiated Computers & IT Education in the State of Bihar & Jharkhand. He is the first academician to start P. G. Diploma in Computer Applications, BIT, MIT, BCA & MCA in undivided Bihar and Jharkhand. As a pioneer personality in the areas of Computers & IT Education in India. Prof. Singh was instrumental in initiating computer science for Women, School Teachers and Govt. officials in 1984 with financial support from Department of Electronics, Govt. of India under IT Awareness Programme (ITAP). Under his guidance, Govt. of India established the National Centre for IT Instructional Materials Development, National Centre for Research and Training for Professionals and Administrators with funding from Govt. of India, Department of Electronics, Prof. Singh introduced Computer Aided Education in Non-formal Education in the Year 1985.

Prof. U. K. Singh is Fellow of Computer Society of India and was Founder Vice Chairman of CSI, Patna Chapter. Later, he served CSI as Chairman, CSI Patna Chapter, Divisional Chairman (Data Communication), Regional Vice President (East), twice member of Nominations Committee at National Level. He was nominated as TC Member (Education) to the International Federation of Information Processing (IFIP) Vienna, Austria. He activity organized various Regional, Divisional and National Conferences at various locations in India. CSI conferred Fellowship on Prof. U. K. Singh during 2011 for his contributions on the objectives of CSI.

Prof. Singh was also elected President of Computer & IT section of 100th Indian Science Congress. As prolific writer on Computers & IT, Prof. Singh has published several Books and Articles. Prof. Singh is also associated with Institution of Electronics & Tele-Communication Engineers, All India Management Association, Indian Society for

Page 39: ISSN 0970-647X Operating Systems - CSI INDIAcsi-india.org/Communications/CSIC_feb_2017.pdf · 2019-01-15 · Knowledge Digest for IT Community ISSN 0970-647X Operating Systems SECURITY

Technical Education, Indian Commerce Association and also Executive Member of All India Council for Technical Education (AICTE) for five years. Presently, Prof. Singh has been nominated TC Member (Education) to IFIP, Austria by CSI.

In grateful recognition of his services to the Computer Society of India and his outstanding contribution as an IT professional to IT Industry and Education, CSI has decided to confer on him the Life Time Achievement Award. The Society takes pride and pleasure in presenting him this citation on the occasion of its 51st Annual Convention held at Coimbatore on 23rd January 2017

Honorary Fellowship AwardDr. Thangam MeganathanDr. Thangam Meganathan is the Chairperson of the Rajalakshmi Educational Trust based out of Chennai. She has close to 20 years of experience in the field of Educational Administration.

Dr. Thangam Meganathan completed her Graduate and Post Graduate degrees in Public Administration from the Madras Christian College, Chennai. She obtained her Doctorate from Madras University for her research work on Technical Education in Tamil Nadu. She also holds an International Diploma for Teachers and Trainers offered by Cambridge.

As Chairperson of the Rajalakshmi Group of Institutions, she is primarily responsible for providing vision and strategy for all the educational Institutions run by the Trust. Under her transformational leadership, the Institutions have emerged as some of the best Institutions in the country offering high quality Technical Education.

Dr. Thangam Meganathan has provided an inspirational vision to the group which has put the Institutions on a high growth trajectory. She has also set herself as a role model for high performance and encourages the same from all the faculty members and staff. As a strong believer in Quality, she has ensured that Quality is a culture inside the Institutions run by the Trust.

Dr. Thangam Meganathan strongly believes that Innovation is a key change agent that can bring about transformation in the lives of young students. She has also been responsible for the implementation of several path breaking innovative practices.

She has worked closely with the Computer Society of India to help CSI improve the programming & problem solving skills of young students. Through her erudite inputs and sponsorship, CSI had organized programming contests for school children at the regional, National and International levels.

Dr. Thangam Meganathan has also been serving as a Member of the CII Tamil Nadu Education Panel for the past four years and headed the CII Tamil Nadu Education Panel for 2 continuous terms. She is presently a member in the CII- Southern Region Education Subcommittee. She is also a part of the national initiative of CII in Primary Education responsible for policy advocacy. Besides these, she has served in several other committees of CII and ASSOCHAM and was instrumental in organizing several high impact conferences.

She also serves as a Member of the Bouncing Board Initiative of the CII Panel on ‘Women Empowerment and Leadership’ through the Indian Women Network (IWN). She has been the Vice Chairperson of this initiative in the

Life Time Achievement Award

39 C S I C o m m u n I C a t I o n S | F E B R u a R Y 2 0 1 7

www.csi-india.org

Page 40: ISSN 0970-647X Operating Systems - CSI INDIAcsi-india.org/Communications/CSIC_feb_2017.pdf · 2019-01-15 · Knowledge Digest for IT Community ISSN 0970-647X Operating Systems SECURITY

Honorary Fellowship Awardyear 2014-15 and spearheaded several initiatives for women welfare. She is also actively involved in initiatives to bring awareness about the Indian tradition and culture among the youth pursuing school and higher education.

In a nutshell, Dr. Thangam through her thoughtfulness and actions has left an indelible impact on students and the youth at large.

In recognition of her outstanding accomplishments and memorable services to the Computer Society of India and academia, CSI is pleased to confer upon Dr. Thangam Meganathan the HONORARY FELLOW of the society award. The Computer Society of India takes pride and pleasure in presenting this citation to Dr. Thangam Meganthan on the occasion of its 51st Annual Convention held at Coimbatore on 23rd January 2017.

Mr. Koneru SatyanarayanaEr Koneru Satyanarayana, President of Koneru Lakshmaiah Education Foundation is an educationist of eminence, philanthropist and an industrialist of great repute. He co-founded Koneru Lakshmaiah College of Engineering (KLCE) in 1980. KLCE was the first private engineering college in AP to introduce Computer Science and Engineering (CSE) and Information Science & Technology (IST) courses foreseeing its requirement for the nation immense potential of providing challenging and lucrative jobs. KLCE has the unique distinction of becoming the No. 1 private engineering institution as evidenced by the NAAC rating of 3.76 in 4.0 scale in all India basis under his leadership.He was instrumental in transforming the institution to attain Deemed to be University status in 2009, which is now academic heaven for 12000 UG/PG students and 1400 Phd scholars supported by 800 teaching faculty out of which 300 are doctorates. The University is offering 42 academic programs as on date with an intake of 3500. The intrinsic strength of both KLCE and KLU is excellent human resource generation reflecting in 100% placement during the past one decade. So far KLCE and KLU have provided employment to about 36000 students in reputed Industries. Number of students has become entrepreneurs.Born on 20th October 1954 to Sri Koneru Lakshmaiah and Smt. Chittemma, he graduated in Electronics and Communication Engineering from BMS College of Engineering, Bangalore in 1977. He has distinctive prestigious fellowships & memberships like FIE, FIETE, MIEEE and CII.Mr.Satyanarayana put his heart and soul to make KLU as gem of institutions by encouraging and implementing many innovations and best practices in learning. He ensured that the institution develops research environment to enable the teaching faculty to strive and secure doctorates and transfer the technology to the society. He is the positive influence behind the University in accomplishing an enviable feat of being ranked 59th in the country and No.1 in Andhra Pradesh State as certified by NIRF, MHRD. His discipline, honesty and integrity in managing the institution made KLU become the most sought after technical institution in the State of Andhra Pradesh.He is not only a champion of education but also nurtures education by granting substantial sums towards scholarships for the underprivileged students. Some of the beneficiaries of his generous donations include the UNICEF, Leper patients at leprosy home at Pudukottai, Tamil Nadu, Aadarana, an NGO based in the backward region of Mangalagiri helping the poor people in health and education.Computer Society of India (CSI) has been inextricably entwined with K L University with his passion to meet the objectives of CSI. Sri Koneru Satyanarayana became the founder chairman of the Koneru Chapter of CSI (2003) and initiated several programs for the society at large. Promoted CSI Student branches in Andhra Pradesh and to carry out the professional development of students and teachers by sponsoring and arranging related CSI events. Encouraged School Children with CSI-FUN Quiz programs by sponsoring them in the combined Andhra Pradesh since 2011 on wards through CSI-K L University Student Branch.Mr. Satyanarayana established 15 different companies, which are spread across different sectors that include Aqua, Transport, IT, Real Estate, Hospitality, Estate Management and Film Industry. As a strong practitioner and advocate of human values and professional ethics, Mr. Satyanarayana ensured that Human Values is included on KLU’s undergraduate curriculum as a compulsory course for all students to help them imbibe and reflect values in everything they do. Today, human values are the

40 C S I C o m m u n I C a t I o n S | F E B R u a R Y 2 0 1 7

Page 41: ISSN 0970-647X Operating Systems - CSI INDIAcsi-india.org/Communications/CSIC_feb_2017.pdf · 2019-01-15 · Knowledge Digest for IT Community ISSN 0970-647X Operating Systems SECURITY

Honorary Fellowship Awardhallmark of both KLU’s education and work culture.Mr. Satyanarayana is an ardent champion of social service and rural uplift. He has been serving the society by adopting neighboring villages. Recently, he initiated the program of converting 8 villages as smart villages. He ensured that the roads of the surrounding village are improved by granting copious donations. Many surrounding villages were adopted for improving their sanitation hygiene. Hon’ble Prime Minister Narendra Modi’s Swacha Bharat campaign was taken up by Er. Koneru Satyanarayana in rural Andhra Pradesh.He sponsored and arranged regular DIGITAL literacy programs for the society at large and initiated Skill Development Programs for establishing different professions and sectors. Under his stewardship in recently concluded Krishna Pushkaralu, KLU gave technology support to Government of AP. KLU has sponsored and conducted several training programs on e-governance for AP Government Officials, Ministers and Policy makers.In grateful recognition for his outstanding services to engineering education, IT Industry and society at large CSI has great pleasure to confer him the HONORARY FELLOW of the society. The Computer Society of India takes pride and pleasure in presenting this citation to Er. Koneru Satyanarayana on the occasion of its 51st Annual Convention held at Coimbatore on 23rd January 2017.

Fellowship AwardDr. R NadarajanDr. R Nadarajan, an accomplished teacher with great vision and hard work earned recognition from students, parents, academicians and IT industry executives for introducing Three FIVE YEAR integrated Masters programme in Software Engineering, Theoretical Computer Science and Data Science. Right from the inception of the Software Engineering programme in 1997 at PSG College of Technology, where he is a Professor in the Department of Applied Mathematics and Computational Sciences, the value of these programmes with the industry has only grown in geometric proportions and his students have been placed in enviable positions. “Teaching is Reaching” is the DNA of Professor Nadarajan and he is widely esteemed by students for his inspirational teaching which led students to understand the inter-connectedness of ideas, facts and skills from areas of knowledge perceived as independent.Dr. R Nadarajan has guided 25 Ph.D scholars and has published around 60 research papers in International journals. Besides receiving research funding from several Government funding agencies, he has set up a Centre for Excellence in Software Engineering funded by TCS. He has organized 6 International conferences on Mathematical and Computational models by bringing distinguished speakers from top notch institutions and industries.He has contributed significantly for the automation of the entire administration functions of PSG College of Technology.His association with CSI spans more than three decades since BIG 86. He has held several positions in the Coimbatore chapter and as National ExecCom member. He has given many lectures in many CSI chapters and student branches about research and innovation for students and faculty.In grateful recognition of his services to Computer Society of India, and his outstanding accomplishment as an IT professional, the CSI has decided to name him FELLOW of the society. The society takes pride and pleasure in presenting him with citation on the occasion of its 51st Annual Convention held at Coimbatore on 23rd January 2017.

41 C S I C o m m u n I C a t I o n S | F E B R u a R Y 2 0 1 7

www.csi-india.org

Page 42: ISSN 0970-647X Operating Systems - CSI INDIAcsi-india.org/Communications/CSIC_feb_2017.pdf · 2019-01-15 · Knowledge Digest for IT Community ISSN 0970-647X Operating Systems SECURITY

Prof. P. S. Grover

Professor P. S. Grover had obtained his Masters and Doctorate from Delhi University and started his teaching & research career in the same university. Dr. Grover was In-charge of the first IBM 1620 Computer System and later became Director of IBM 360 Computer Centre, at Delhi University. He has been among the founding members of Computer Science Department at Delhi University and for starting MCA & Ph.D. Programmes in C.Sc.. He has been Adviser, Consultant and member of academic bodies and research boards for several institutes in North India. Prof. Grover has been associated with UGC, AICTE, MICT, DOEACC, NIELIT, CBSE, National Board of Accreditation, National Assessment and Accreditation (NAAC) and contributing to the advancement and spread of computer science and engineering education.He had won Nehru Memorial Award and was Post-doctoral Fellow at Bristol University, England, Research Associate at National Research Council, Canada and ICTP, Italy. He has been a Visiting Scientist at many prestigious institutes/universities in UK, Canada, USA, Singapore, Malaysia, Nepal, Iraq, and Kuwait and delivered invited talks/seminars. Prof. Grover served Computer Society of India as Chairman of Delhi Chapter, Divisional Chairman (twice), National Vice President (twice), Member – Nomination and Awards Committee, and represented CSI in IFIP and SEARCC Forums. He was invited to be Editor of Special Edition of CSI Journal on ‘Software Engineering’. He is on the Editorial Boards of International Journals and Reviewer of prestigious Conferences. He was Chairman – Computer Science and Communications, Indian Science Congress. He has been a consultant and associated with IT Industries which include TCS, IIS Infotech, DCM Technologies.

He has been an active researcher, guide, teacher and author – written 9 books in the field of computer science and published over 150 research papers. He has promoted in developing new institutions and has contributed to the setting-up of new universities/engineering institutes and entrepreneurial campuses. Prof. Grover is deeply involved in improving the quality of higher education by implementing and spreading modern teaching/learning processes/practices.

In grateful recognition of his services to Computer Society of India, and his outstanding accomplishment as an IT professional, the CSI has decided to name him FELLOW of the society. The society takes pride and pleasure in presenting him with citation on the occasion of its 51st Annual Convention held at Coimbatore on 23rd January 2017.

Dr. P. K. Sinha

Dr. Pradeep Kumar Sinha, an engineer turned academician, is the Vice Chancellor & Director of International Institute of Information Technology (IIIT), Naya Raipur. Earlier he was with the Centre for Development of Advanced Computing (C-DAC).

Technical contributions of Dr. Sinha include national projects, supercomputing systems and facilities, healthcare products and solutions, international patents, a number of technical papers and six books in the area of Computer Science & Engineering. On public demand, books authored by him have been translated in local languages like Japanese and Hindi.

Fellowship Award

42 C S I C o m m u n I C a t I o n S | F E B R u a R Y 2 0 1 7

Page 43: ISSN 0970-647X Operating Systems - CSI INDIAcsi-india.org/Communications/CSIC_feb_2017.pdf · 2019-01-15 · Knowledge Digest for IT Community ISSN 0970-647X Operating Systems SECURITY

Fellowship AwardDr. Sinha was instrumental in commissioning the first national super computing facility at C-DAC in 1998 and led C-DAC team to design and engineer the facility. Under his leadership, his team developed models, mechanisms and policies for usage, remote access, security, and round-the-clock operation of such facilities to enable offering of super computing services to the users. With the capabilities developed, his team also commissioned many such facilities in several academic and research institutions. Super computing systems being a powerful tool for high-end R&D in all domains of science and engineering, these initiatives helped several researchers from various disciplines to carry out their research more efficiently and effectively.

Dr. Sinha also led C-DAC’s team in designing and commissioning the PARAM Yuva II supercomputer in 2013, which ranked 69th among the world’s Top 500 Supercomputers in June 2013 list. The system ranked 44th in the world, 9th in Asia Pacific and Number One in India as per the November 2013 list of world’s Green 500 supercomputers.

Recognizing Dr. Sinha’s expertise in supercomputing, Government of India selected him in 2013 as a member of a committee of four scientists from the Department of Science & Technology (DST) and the Department of Electronics and information Technology (DeitY) to prepare a project proposal for the Next Generation Supercomputing activities of India. The National Supercomputing Mission (NSM) proposal finalized by the committee was subsequently approved by the Cabinet Committee on Economic Affairs in 2014. The proposal, having an outlay of 4500/- Crores, forms the basis of uplifting Indian Science & Engineering research to a much higher level than now.

He is bestowed with ACM Distinguished Engineer for his significant accomplishments in the field of computing and its impact thereon. The Institute of Electrical and Electronics Engineers (IEEE), USA named him IEEE Fellow, for his demonstrated leadership in Distributed and Parallel Processing systems.

In grateful recognition of Dr. Pradeep Kumar Sinha’s significant contributions to the area of Computer Science and Engineering at National and International levels, the Computer Society of India is proud to name him a FELLOW of the Society. The Society is pleased to present him with this citation on the occasion of its 51st Annual Convention held at Coimbatore on 23rd January 2017.

Prof. P. S. Avadhani

Prof. P. S. Avadhani, obtained his M.Tech (Computer Science), Ph.D from IIT, Kanpur and F.I.E. from the Institute of Engineers (India) in 2014. He has more than 30 years of teaching and research experience.

Prof. P. S. Avadhani presently serving as the Principal, AU College of Engineering (Autonomous), Andhra University, held number of Offices in various capacities viz., honorary member and Life Member in several National and International Bodies, Vice-Chairman, Computer Society of India (2014-15), Chairman, Computer Society of India (2015-16) Chairman Board of Studies of number of Institutions, Convener, APEPDCL Test-2014 -2015 etc. to name a few. His extensive relations with Industry and entrepreneurs helped the Institution in placing number of young Techies into jobs.

43 C S I C o m m u n I C a t I o n S | F E B R u a R Y 2 0 1 7

www.csi-india.org

Page 44: ISSN 0970-647X Operating Systems - CSI INDIAcsi-india.org/Communications/CSIC_feb_2017.pdf · 2019-01-15 · Knowledge Digest for IT Community ISSN 0970-647X Operating Systems SECURITY

He has commendable knowledge in Sanskrit, Hindi, English and Telugu and a notable poet and orator. Prof. Avadhani has been honored with Best Researcher Award from Andhra University in 2005-06 and State Best Teacher from the government of Andhra Pradesh in 2015, Chapter Patron Award from Computer Society of India and distinguished Academician Award-2011 from Pentagan Research Centre, Hyderabad.

Prof. P. S. Avadhani authored Books on Data Structures, Data Management Systems, Discrete Mathematical Structures and Computer Graphics etc., Prof. Avadhani authored and co-authored more than 200 research papers/Articles.

In grateful recognition of his services to Computer Society of India, and his outstanding accomplishment as an IT professional, the CSI has decided to name him FELLOW of the society. The society takes pride and pleasure in presenting him with citation on the occasion of its 51st Annual Convention held at Coimbatore on 23rd January 2017.

Prof. C. T. Bhunia

Professor Chandan Tilak Bhunia is immediate past Director of National Institute of Technology (An institute of National Importance), Arunachal Pradesh. He completed his five years tenure on 31st October, 2016. Prof. Bhunia has about 31 years teaching and research experience at UG and PG level. He published more than 150 peer reviewed research papers in journals and guided 12 Ph D scholars. He authored 6 books including books on Information Technology and Quantum Computing. He widely visited foreign countries including USA, UK, Italy, Bhutan, Bangladesh, Singapore, China, Jordan on several academic assignments. He has been BOYSCAST FELLOW of DST, Govt of India at Durham University, UK; Senior Associate at ICTP, Italy and Visiting Consultant Professor at CST, Royal University of Bhutan.

Professor Bhunia has been a member of CSI since 1987. He established for the first time in whole of North Eastern Regional a Students chapter of CSI in North Eastern Regional Institute of Science and Technology, Arunachal Pradesh. This student branch was awarded twice the best eastern regional award in 1995 and 1996. He further established such chapters in many institute like Haldia Institute of Technology, Heritage Institute of Technology, Bengal Institute of Technology & Management etc. He enriched CSI communication by publishing more than 50 articles for which he was awarded twice best article awards in 1996. He also published several research papers in Informatics. He delivered several invited talks at CSI sponsored conferences and also organized several such conferences.

In grateful recognition of his services to the Computer Society of India, and his outstanding accomplishment as an IT professional, the CSI has decided to name him FELLOW of the society. The society takes pride and pleasure in presenting him with citation on the occasion of its 51st Annual Convention held at Coimbatore on 23rd January 2017.

Fellowship Award

44 C S I C o m m u n I C a t I o n S | F E B R u a R Y 2 0 1 7

Page 45: ISSN 0970-647X Operating Systems - CSI INDIAcsi-india.org/Communications/CSIC_feb_2017.pdf · 2019-01-15 · Knowledge Digest for IT Community ISSN 0970-647X Operating Systems SECURITY

Fellowship Award

Mr. M. L. Ravi

An innovative leader and the youngest president of CSI, Mr. M L Ravi holds a Bachelor of Engineering degree in Electronics and Communication from the University of Mysore and a Diploma in Management from the All India Management Association (AIMA), New Delhi. He has over three decades of experience in the computer and allied industry.

Mr. Ravi has been a member of the CSI since 1983 and is currently a life member. He has served as Treasurer, Secretary and Chairman of CSI Bangalore chapter during the years 1990-91, 1996-98 and 1998-00 respectively. He has contributed as an active core member of the organising committee in ‘CSI-1996’ and event manager of “CSI-2002” held in Bangalore. During his tenure in the management committee at the Bangalore Chapter, he organised a Top Management workshop on ERP, which was the first of its kind in India.

He played a stellar role in helping the CSI form new chapters in various parts of the country and focussed on improving its governance at the strategic level. As Vice-President in 2003-04 and President in 2004-05, he was instrumental in driving new initiatives by conducting workshops, seminars and conferences on rural development, faculty standards and student development programmes, resource mobilisation and sprucing up the Educational Directorate at Chennai. He galvanised the student community by actively engaging with engineering colleges and technical institutions across the country. He positioned CSI positively as a pro-active interface between academia, industry and Government.

Mr. Ravi was the Key Note Speaker at SEARCC, 2004 held at Kuala lumpur, Malaysia. He served on the consultative committee of CICC, Ministry of Export, Trade and Industry, Govt. of Japan on Human Resources and RFID technology from 2005 to 2007. He was an invited speaker at their conferences held in Cebu, Phillipines in 2005 and at Tokyo, Japan in 2006.

After having worked in the IT industry with Wipro Information Technology Ltd., Digitron Computers and Sunray Computers, he founded the Innovative Consulting Group (a division of Innovative Homes Pvt. Ltd.) in 1990, which was a true-blue ‘Startup’ of the pre-liberalisation era. The company showcased how IT can be leveraged in the fields of town planning, architecture, 3D animation and imaging. He was also actively involved in the project of preparing the photo-identity cards for the Election Commission of India.

Currently he mentors young entrepreneurs in areas of corporate planning and management and has keen interest in sports, travel and spirituality.

In grateful recognition of his services to Computer Society of India, and his outstanding accomplishment as an IT professional, the CSI has decided to name him FELLOW of the society. The society takes pride and pleasure in presenting him with citation on the occasion of its 51st Annual Convention held at Coimbatore on 23rd January 2017.

www.csi-india.org 45

C S I C o m m u n I C a t I o n S | F E B R u a R Y 2 0 1 7

Page 46: ISSN 0970-647X Operating Systems - CSI INDIAcsi-india.org/Communications/CSIC_feb_2017.pdf · 2019-01-15 · Knowledge Digest for IT Community ISSN 0970-647X Operating Systems SECURITY

• CoverStory• TechnicalTrends• ResearchFront• Articles• InnovationsinIT• SecurityCorner• PractitionerWorkbench• BrainTeaser• ChapterReports• Studentbranchreports

www.csi-india.org 46

C S I C o m m u n I C a t I o n S | F E B R u a R Y 2 0 1 7

Clues

CrossWord Durgesh Kumar Mishra Chairman CSI Division IV Communications Professor (CSE) and Director Microsoft Innovation Center, Sri Aurobindo Institute of Technology, Indore. Email – [email protected]

Test your knowledge on Operating SystemSolution to the crossword with name of first all correct solution provider(s) will appear in the next issue. Send your answer to CSI Communications at email address [email protected] and cc to [email protected] with subject: Crossword Solution – CSIC February 2017 Issue.

ACROSS4. A small program for a particular device6. An active program7. Part of OS to manage resources8. The process of loading OS10. An OS for mobile

DOWN1. A command line interface2. The main circuit board of the computer3. A variant of UNIX operating system4. An automatically running program in the

background5. Basic unit of communication on the

network8. A program installed on the computer to

start OS9. A state when the system does not respond

to keyboard commands

We are overwhelmed by the response and solutions received from our enthusiastic readers

Congratulations!All nearby Correct answers to January 2017 month’s crossword received from the following reader:• Ms. Priyanshu Jadon, M.Tech., Sri Vishnav Vidhya Peeth, Indore• Mr. Alok Tiwari, DAVV, Indore

1

2 3

4

5

6

7

8

9

10

Solution for January 2017 Crossword

BRAIN TEASER

1A

2P

3P R O T O C O L 4

S5

L I S P R N

T 6G I

7H A A F

8A P P L E T F

D E E9

B10

I T C O I N 11W A F E R

N O A

T 12S P A M Y

R13

A C T I V E X

N

E

T

Page 47: ISSN 0970-647X Operating Systems - CSI INDIAcsi-india.org/Communications/CSIC_feb_2017.pdf · 2019-01-15 · Knowledge Digest for IT Community ISSN 0970-647X Operating Systems SECURITY

47 C S I C o m m u n I C a t I o n S | F E B R u a R Y 2 0 1 7

Contact Details:302, Archana Arcade, 10-3-190, St. Johns Road, Opposite Railway Reservation Complex, Secunderabad,Telangana; Pin code No: 500025Phone: +91-040-24306644, +91-040-24306345, 9490751639E-Mail: [email protected]; [email protected]

Chief Guest Sri K.T. Rama Rao Minister of Information Technology, Government of Telangana

Guest of Honour: Dr. G. Satheesh Reddy DistinguishedScientist, Scientific Adviser to Raksha Mantri (SA to RM) and Director General, Missiles and Strategic system.

Trends and Innovations for Next Gen ICT (TINICT)-

International Summit 2017Saturday March 4th, 2017 Hotel Novotel Airport ,

Hyderabad

http://csihyderabad.org/ Be in touch with us

Organized by CSI Hyderabad in collaboration with RCI(DRDO)

Welcome to TINICT-2017 ! This International Summit "Trends and Innovations for Next Gen ICT (TINICT)" intends to provide a forum to exchange ideas among interested researchers, scientists, developers and practitioners in the areas of computing, communications and informatics.

The role of Information and Communication Technologies (ICT) as a tool for development and transparency has attracted the sustained attention of the entire world over recent years. ICT comprises a complex and heterogeneous set of goods, applications and services used to produce, process, distribute and transform information.

The potential of ICT for stimulating economic growth, socioeconomic development and effective governance is well recognized. But the benefits of ICT have been unevenly distributed within and between countries. India has now gradually emerged as able participant in the workforce and have even advanced to hold important roles and positions. So there are strong needs to identify and recognize the trends and innovations of ICT for empowering our Nation.

This initiative will mobilize all the stakeholders to focus on frontiers of ICT for the benefit of the entire society to bring the digital revolution leading to IT enablement of our Country. In this summit we are bringing subject experts from all spheres of ICT and related technologies namely- Cloud, Big Data, IoT, Cyber Space Defence, Disaster Recovery etc., who will work as a catalyst to initiate innovations in the entire ecosystem.

This International Summit is being organized to celebrate the foundation day of Computer Society of India (CSI) which took birth on 6th March, 1965 at DRDO campus Hyderabad. As part of this celebration, Inspirational Speech by a famous and magnetic personality is also organized to ignite the minds of ICT Professionals.

Participants : Delegates including IT heads of Govt organizations, Private sector Industries , Public Sector Undertakings, Legal Authorities, Defence Research Organizations, Faculties of Universities in India and the IT users of our country.

Registration Fees and DeadlinesRegistration Includes: Keynotes, Plenaries and Technical Sessions, Industry Forum and Exhibition(IF&E).

Registration Fees: For CSI Members Rs.10,000/- and For Non CSI Members Rs. 12000/-All payment to be made on: State Bank Of India, A/C No: 34200480145, IFSC Code: SBIN0007074

Registration will be done via online through http://csihyderabad.org/ Web site.

Conference Sponsor

From:Shri. Gautam Mahapartra, Scientist -G, RCI(DRDO)Chairman, Organizing Committee TINICT-2017

R.S.V.P: Mr. T. Satyanarayana, Mob: 9441242829TINICT-2017

Page 48: ISSN 0970-647X Operating Systems - CSI INDIAcsi-india.org/Communications/CSIC_feb_2017.pdf · 2019-01-15 · Knowledge Digest for IT Community ISSN 0970-647X Operating Systems SECURITY

www.csi-india.org 48

C S I C o m m u n I C a t I o n S | F E B R u a R Y 2 0 1 7

F R O M C H A P T E R S & D I v I S I O N S

AHMEDABAD CHAPTER

Inter College Quiz Competition - 2016 was organized by Computer Society of India – Ahmedabad Chapter on September 18, 2016 at UGC Conference Hall, HK College Campus, Ahmedabad. Event was divided in three different levels. Two levels were for Under Graduate students and third level was for the students of Post Graduate. Total of 38 teams participated. Each team contains 3 members. Mr Sujoy Pal, Managing Committee member, CSI-AC gave the presentation about CSI. Total two rounds were conducted; one was preliminary round and second was the final round. Three teams with highest score in preliminary round were selected for the final round. In the final round of first UG Level team from Swaminarayan Arts college was the winner. The winner team in the second UG was from the Navgujarat College of Computer Applications. Third and final round of for PG level was conducted between the teams from Chimanbhai Patel Institute, L. J. Institute of Computer Applications and L. D. Engineering College. Winner team was from the L J Institute of Computer Applications. All winner participants get the trophy along with certificate of achievement. CSI Ahmedabad Chapter is heartily thankful to the management of H K College for providing infrastructure.

ALLAHABAD CHAPTER

Allahabad chapter organized Annual General Meeting-2016 at Hotel Milam Palace on 30th December, 2016. Prof M M Gore, Chapter Chairman started the meeting by welcoming note. Annual meeting is started by presenting balance sheet and annual report by Mr Rajiv Gupta. Er. Mithlesh Mishra (Vice-chairman) presented a report of the activities held during the year. The senior members discussed the future agenda regarding CSI activities and all the other CSI members participated in the open discussion on the topic-cashless and Digital payment. Dr. Shashank Srivastava, Chapter Secretary gave the votes of thanks.

Allahabad chapter along with Centre of computer Sciences, Ewing Christian College Allahabad organized one week workshop on Android Application Development from 7th January, 2017. About 65 students were participated in the event.

AMRAvATI CHAPTER

A National Level 3 days workshop on “MACHINE LEARNING AND HANDS ON TRAINING USING MATLAB PROGRAMMING” was conducted by Shri Sant Gajanan Maharaj College of Engineering, Shegaon Dist Buldhana , Maharashtra from 28th to 30th December 2016 with the technical sponsorship of CSI Amravati Chapter. Dr. R.K.Agrawal , JNU New Delhi was the main resourse person for the workshop. Prof N M Kandoi was the convenor, Prof D.R.Dhotre and Prof Vijay Mahalle were the coordinators.

CHENNAI CHAPTER

One Day Workshop on Vedic Self-Management was held on 14th Dec 2016 by Dr. S Kannan. The presentation covered various aspects of Vedic management, specially relating to relationship between Body, Mind and Intellect. There was

Page 49: ISSN 0970-647X Operating Systems - CSI INDIAcsi-india.org/Communications/CSIC_feb_2017.pdf · 2019-01-15 · Knowledge Digest for IT Community ISSN 0970-647X Operating Systems SECURITY

49 C S I C o m m u n I C a t I o n S | F E B R u a R Y 2 0 1 7

F R O M C H A P T E R S & D I v I S I O N S

a detailed reference to mapping of individual’s personality based on Trigunas, Pancha Kosas and Chakras. The emphasis was always on achieving managerial excellence imbibing and adapting oneself to various principles of Management, as enunciated in our Vedas; Dr. Kannan interspersed his presentation with quotes from our Vedas. At the end of his presentation, the audience was divided into six teams of 2 persons per team; Dr. Kannan gave six sets of cases involving various managerial aspects and situations; the teams were asked to workout their solutions and their interpretations based on the principles covered in the Vedic Management sessions; the teams then presented the case studies with solutions and interpretations. The entire program of the day concluded with a 15 mins. of meditation. Mr. T R Vasudeva Rao proposed the vote of thanks. Chennai Chapter organized presentation on Cyber Crimes in India : Emerging Trends & Computer security in India on 20th December 2016 by Mr. V Rajendran. He cited many cases of cyber crimes from real time instances. He differentiated the normal crimes vs cyber crimes in view of modus operandi, investigation process, process of trial and production of E-evidence. The protection of information asset is basically dependent on the three aspects namely owner, custodian and the user. The speaker cited many real time scenarios where these three aspects could be or not to be at variance. The speaker finally touched the importance of IT-Act especially some of the Sections related to cyber crimes. Dr. P. Sakthivel thanked the speaker and the gathering.

NOIDA CHAPTER

One Week FDP Program on Research Techniques in Information Communication Technologies Jointly organized by CSI Noida Chapter & Gautam Budh University greater

Noida on 30th Jan. to 4th Feb. 2017. The Introduction & objective of the workshop was addressed by Prof. M K Rai, Registrar Gautam Budh University Greater Noida. Prof. M K Rai Registrar, Gautam Budh University has given welcome speech and elaborated about the aims & objective of the FDP. Prof. A K Gautam, Dean, GBU Greater Noida has talked about the FDP and its importance in the research field in the country. Prof. K K Aggrawal, Founder VC, GGSIPU Delhi, Former President CSI & Chancellor K R Mangalam Univ, Gurgaon was the Chief Guest in the inaugural session. In his inaugural address he mentioned growth of Internet is very rapid in the country in comparison to aviation sector. Internet of things (IOT) has made peoples life easy and it has applications in all the fields of life, including, medical, physics, research and academia. He has also said that after 2020 mobile phones will no longer require charger for charging but will be self charged by using radiations. He has also said that IOT will enable all house hold electronic devices to communicate with other through networking. More than 300 participants from Delhi NCR & rest part of the country attended.

UJJAIN CHAPTER

A seminar on Image compression was held on 19-11-2016 under CSI Ujjain chapter in MIT for all the technical professionals in ujjain. The Eminent speaker Dr. Vipin Tyagi, Regional Vice President, Region-III talked about the research areas in length. Prof. A K Nayak, Hon Secretary, Mr. R K Vyas, Hon Treasurer, Prof. P Thrimurthy, Past President were grace the occasion. Prof. Y Kelkar, Coordinated and conducted the complete program. Prof Gangame presented the vote of thanks.

vELLORE CHAPTER

School of Information Technology & Engineering hosted

Page 50: ISSN 0970-647X Operating Systems - CSI INDIAcsi-india.org/Communications/CSIC_feb_2017.pdf · 2019-01-15 · Knowledge Digest for IT Community ISSN 0970-647X Operating Systems SECURITY

two international conferences in VIT in association with CSI Vellore Chapter. 8th International conference on Soft Computing & Pattern Recognition and 8th International conference on computational aspects of social networks from 19th to 21st Dec 2016. Dr. Gerardo Rubino, INRIA, FRANCE was the chief guest for the conference and graced his presence for this occasion. He also delivered the keynote address on the topic “perceptual quality estimation: Machine learning and Big data problems”. Dr. Ajith Abraham, Director of MIR Labs, USA served as the guest of honor for

the conference, around 120 members participated.CSI Vellore Chapter in association with SCOPE organized a one day Guest Lecturer on “Big Data and Machine Learning” on 05/01/2010 at VIT University. Dr. M Viswanathan, Carnegie Mellon University, Australia explained introduction to big data, characterstics of big data and different issues of big data is discussed followed by how machine learning techniques can be applied to big data context, explained the research directions in big data, around 50 life members and students participated in the seminar.

F R O M C H A P T E R S & D I v I S I O N S

F R O M S T U D E N T B R A N C H E S

www.csi-india.org 50

C S I C o m m u n I C a t I o n S | F E B R u a R Y 2 0 1 7

REGION-IThe NorthCap University, Gurgaon SRM University, Ghaziabad

17-12-2016 - Workshops on Game development and Internet of Things (IoT)

15-12-2016 - One day workshop on Android Application Development

REGION-I REGION-IIIManav Rachna International University, Faridabad Manipal University, Jaipur

v31-1-2017 - Dr. Wadhwa, VC, MRIU & Dr. M N Hoda,

Chairman, Division-1 inaugurating the CSI Student Branch28-1-2017 – Student Branch Inauguration

Page 51: ISSN 0970-647X Operating Systems - CSI INDIAcsi-india.org/Communications/CSIC_feb_2017.pdf · 2019-01-15 · Knowledge Digest for IT Community ISSN 0970-647X Operating Systems SECURITY

51 C S I C o m m u n I C a t I o n S | F E B R u a R Y 2 0 1 7

REGION-Iv REGION-vGandhi Institute for Education and Tech., Bhubaneswar K S Institute of Technology, Bangaluru

18-1-2017 – Student Branch Inauguration 18 to 21-1-2017 - FDP on Raspberry Pi and its Applications in IoT

REGION-vSt. Claret College, Bangaluru Potti Sriramulu Chalavadi Mallikarjuna Rao College of

Engineering & Technology, vijayawada

21-1-2017 – Student Branch Inauguration 7-1-2017 – Sri Chalavadi Mallikarjuna Rao Lightening the Lamp during Student Branch inauguration

Bharat Institute of Engineering and Technology, Ibrahimpatnam

16 & 17-12-2016 – Two days National Conference on Innovative Technologies In Big Data, Cloud, Mobile and Security (ITBCMS-2016)

29-12-2016 – CSI Digital Life: Cashless Transactions Awareness Program

CMR Technical Campus, Hyderabad

29-12-2016 - Guest Lecture on Java programming 5-1-2017 - Workshop on Game Tools

F R O M S T U D E N T B R A N C H E S

Page 52: ISSN 0970-647X Operating Systems - CSI INDIAcsi-india.org/Communications/CSIC_feb_2017.pdf · 2019-01-15 · Knowledge Digest for IT Community ISSN 0970-647X Operating Systems SECURITY

www.csi-india.org 52

C S I C o m m u n I C a t I o n S | F E B R u a R Y 2 0 1 7

F R O M S T U D E N T B R A N C H E S

REGION-vNBKR Institute of Science and Technology, Nellore

10-1-2017 - Dr Vijaya Kumar Reddy during Motivation Session 17-1-2017 – Participants during Technical Quiz

JSS Academy of Technical Education, Bangaluru

5-11-2016 - One day workshop on Learn to Code 11 & 12-11-2016 – Two day workshop on Programming in Python

Chalapathi institute of Engg. and Technology, Guntur Amrita vishwa vidyapeetham (University), Bangaluru

11 & 12-2-2017 - Second National Conference on Recent Advances in Computer Science and Engineering

20-1-2017 - Invited talk on Intentions in Inventions – Healthcare by Dr. Vishal Rao

GITAM University, visakhapatnam GSSS Institute of Engineering and Technology for Women, Mysuru

5-2-2017 – Event on WALK-A-THON as a part of its National Symposium

20 to 23-1-2017 - Three Day Workshop on Challenges in Enterprise Network Environment

Page 53: ISSN 0970-647X Operating Systems - CSI INDIAcsi-india.org/Communications/CSIC_feb_2017.pdf · 2019-01-15 · Knowledge Digest for IT Community ISSN 0970-647X Operating Systems SECURITY

53 C S I C o m m u n I C a t I o n S | F E B R u a R Y 2 0 1 7

REGION-vIMukesh Patel School of Tech. Mgmt. & Engg., Shirpur Marathwada Mitra Mandal’s College of Engineering, Pune

27 & 28-12-2016 - International Conference on Artificial Intelligence in Health Care

28-1-2017- Session on Agile- The Methodology You Must Know by Mr. Prashant Pund

Late G N Sapkal College of Engineering Anjaneri, Nashik

27 & 28-12-2016 – Prof Wankhade & Mr Nikhil Shahane during Two Days Hands on Workshop on Android Appilication Development

12-1-2017 – Dr. Bagal, Prof Wankhade & Mr. Vijay Mhaske during National Youth Day Celebration

SNJB’s Late Sau Kantabai Bhavarlalji Jain College of Engineering, Chandwad

Sandip Institute of Technology & Research Center, Nashik

23-1-2017 - Motivational and Patent Registration Seminar by Mr Vijay Mhaske

5 to 18-12-2016 - Two Weeks Industrial Training Program

Guru Gobind Singh Polytechnic, Nashik

2 & 3-1-2017 – Event on College to corporate 13-1-2017 - State Level Event on TECHNOCIA-2k17

F R O M S T U D E N T B R A N C H E S

Page 54: ISSN 0970-647X Operating Systems - CSI INDIAcsi-india.org/Communications/CSIC_feb_2017.pdf · 2019-01-15 · Knowledge Digest for IT Community ISSN 0970-647X Operating Systems SECURITY

www.csi-india.org 54

C S I C o m m u n I C a t I o n S | F E B R u a R Y 2 0 1 7

F R O M S T U D E N T B R A N C H E S

REGION-vIKavikulguru Institute of Technology and Science, Nagpur

20-1-2017 – Event on PRO-WEB 23-1-2017 – Guest Lecture on Android TechnologiesREGION-vII

Shri S S Shasun Jain College for Women, Chennai Mepco Schlenk Engineering College, Sivakasi

16-12-2016 - Digital Awareness Programme 4-1-2017 - Mrs Blessa Binolin Pepsi explaining the basic Concepts of RTool during the workshop

Nandha College of Technology, Erode

17-9-2016 - National Level Symposium on CRYOSAT’16 6-1-2017 - Awareness Workshop on Smart India Hackathon’17

REGION-vIINational Engineering College, Kovilpatti Sri vidya College of Engg. & Technology, virudhunagar

22 & 23-12-2016 – Mr Jerart Julus during the seminar on Vittiya Saksharta Abhiyan

29-12-2016 - Guest Lecture on Introduction to Android Mobile App Development

Registered with Registrar of News Papers for India - RNI 31668/1978 If undelivered return to : Regd. No. MCN/222/20l5-2017 Samruddhi Venture Park, Unit No.3, Posting Date: 10 & 11 every month. Posted at Patrika Channel Mumbai-I 4th floor, MIDC, Andheri (E). Mumbai-400 093 Date of Publication: 10th of every month

Page 55: ISSN 0970-647X Operating Systems - CSI INDIAcsi-india.org/Communications/CSIC_feb_2017.pdf · 2019-01-15 · Knowledge Digest for IT Community ISSN 0970-647X Operating Systems SECURITY

55 C S I C o m m u n I C a t I o n S | F E B R u a R Y 2 0 1 7

REGION-vIIvalliammai Engineering College, Kattankulathur

21-12-2016 – Mr Nagarajan handling the Staff Development Training Programme on Programming in JAVA

7-2-2017 - Mr. Muthuraj Durairaj handling the workshop on Data Analysis using HADOOP

Jamal Mohamed College (Autonomous), Tiruchirappalli

2 & 3-9-2016 - Dr Khaja Nazeemudeen inaugurating the International Workshop on Image Restoration Techniques

with MATLAB

8 & 9-9-2016 - Students from Thiagarajar College of Engineering receiving the overall championship award at

Inter-Collegiate Technical Symposium SWAP-2K16Sathyabama University, Chennai JCT College of Engineering and Technology, Coimbatore

9-2-2017 - Mr Vasudeva Rao, Vice Chairman, CSI-Chennai Chapter inaugurated the CSI Student Branch

8 & 9-2-2017 National Level Workshop on IoT (Internet of Things)

Student branches are requested to send their report to [email protected] with a copy to [email protected].

Chapters are requested to send their activity report to [email protected].

Kindly send high resolution photograph with the report.

Registered with Registrar of News Papers for India - RNI 31668/1978 If undelivered return to : Regd. No. MCN/222/20l5-2017 Samruddhi Venture Park, Unit No.3, Posting Date: 10 & 11 every month. Posted at Patrika Channel Mumbai-I 4th floor, MIDC, Andheri (E). Mumbai-400 093 Date of Publication: 10th of every month