80

Magnum opus 2k14f

  • Upload
    swastik

  • View
    249

  • Download
    7

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Magnum opus 2k14f
Page 2: Magnum opus 2k14f
Page 3: Magnum opus 2k14f

Editorial board

Starting from left side of the 1st row:

Mrs. Gayathri Kamath, Dr. K.G. Mohan, Mr. Suresh Patel.

Starting from left side of the 2nd row:

Girish, Nagaraj, Megha, Pruthvi, Shreyas, Shreedhar, Varun, Anil, Arun, Swastik, Hari.

Page 4: Magnum opus 2k14f

Magnum opus in Latin means “great work.” A magnum opus is

a work on a large scale which is widely regarded as an artist’s pinnacle of

achievement, often reflecting a lifetime of work. It provides an opportunity to

pay tribute in the field of engineering by its power and imagination. It sets to

build a platform of techniques, skills and thoughts to discover new horizons

in the field named innovation. This is not just a platform, but A TEST OF

CHARACTER & TEST OF WILL!! It helps us to prove our mettle with FINESSE &

SUBTLETY amidst exhilarating performances.

OBJECTIVES:

To encourage young people to bring about positive change in their local

and global communities.

To provide young people of today who care about their future carrier,

community and culture for the generations of the future.

To create awareness among faculty & students to

1. Know about the recent trends in the field of Computer Science.

2. Know about the various activities conducted in the department of

Computer Science and Engineering.

3. Know about the calendar of events.

A key and continuing feature of the magazine is its preparation by young

people themselves, providing faculty and students with a national and

international forum for the exchange of ideas and a resource base.

Apart from being the contributors of articles and other content, the

students form a youth editorial board, and are part of the production

team.

ABOUT MAGNUM OPUS

Page 5: Magnum opus 2k14f

Motto

Vision

Mission

ACHARYA INSTITUTES

Page 6: Magnum opus 2k14f

PREFACE

The Department of Computer Science and Engineering was started in the year 2000 with an

intake of 60 students. Subsequently, in 2001, the intake was raised to 120 students.

The has been by NBA New Delhi, having 28 highly qualified and experi-

enced faculty. The department has around 200 systems on local area network with Wi-Fi facili-

ties and licensed software required as per the VTU curriculum.

The internet facility of 20Mbps is provided for all the students.

Computer Lab facility is available even after college hours up to 6 pm.

The department has library facility with more than 172 titles.

A proctorial system is introduced effectively and practiced in the department. Each proctor

will take care of a group of 20 students, send progress report of the students to their

parents and also monitor them.

Training on advanced topics is conducted by the staff members to help student in the

campus placements.

The department also has a Student Forum “LAKSHYA” in which the students organize and

participate in the various events.

The department organizes workshops, seminars and invited talks from experts from

both academia and industry.

Page 7: Magnum opus 2k14f

PROGRAM EDUCATIONAL

OBJECTIVES

The educational objectives of a program are the statements that describe

the expected achievements of graduates within first few years of their gradu-

ation from the program.

The program educational objectives of Bachelor of Engineering in Com-

puter Science and Engineering can be broadly defined on four counts:

EMPLOYABLE: Computer Science graduates will be capable to apply their

knowledge and skills to succeed in solving computational engineering

problems.

PROFESSIONALISM: Our graduates will exhibit the ability to function ethi-

cally and responsibly in their profession with active participation to uplift

the societal status.

INTER-DISCIPLINARY: Computer Science graduate will function success-

fully as team member/leader in multi-disciplinary teams.

CONTINUOUS LEARNING: Our graduates attain the ability to learn to up-

date him/her self with state-of-the-art technological innovations and apply

the same for the successful completion of IT related engineering problems.

Page 8: Magnum opus 2k14f

PROGRAM OUTCOMES

The Program Outcomes of Computer Science & Engineering shall acquire completeness to

practice at appropriate level and shall demonstrate/capable to:

I. Apply knowledge of mathematics, science and computing skills to solve IT related

engineering problems.

II. Identify, formulate and analyze complex engineering problems related to computer science

engineering.

III. Design software/hardware solutions for complex IT problems to uplift the societal status

of common man.

IV. Function effectively as an individual and as a member or leader in homogeneous/

heterogeneous teams.

V. Apply ethical principles in responsible way to follow the IT norms and cyber ethics.

VI. Communicate effectively on complex engineering activities with the engineering

community and the society for the effective presentation and/or report generation.

VII. Use and methods including design of experiments, analysis and

of data, and synthesis of the to provide valid conclusions.

VIII. Create/select an appropriate IT tool to model, implement and automate the complex

computational system.

IX. Apply reasoning informed by the contextual knowledge to assess societal, cultural,

environmental issues and the consequent responsibilities relevant to the IT practice.

X. Understand the impact of the IT solutions to demonstrate the knowledge of, and need

for sustainable IT development.

XI. Recognize the need for, and have the preparation and ability to engage in independent and

life-long learning in the broadest context of technological change.

XII. Demonstrate the knowledge of computing / managerial principles to solve and manage IT

projects.

Page 9: Magnum opus 2k14f

CHAIRMAN’S MESSAGE

At the very outset please accept my

on your efforts to bring out the

fourth edition of “MAGNUM OPUS-Spirit of

Innovation” of the department of Computer

Science & Engineering which will provide

for students to express their views

and inculcate enthusiasm for creativity in writing.

My be in

the department wishes to take

up for the benefit of the student community.

The students should bear in mind

the motto of JMJ Education Society-“Truth,

Joy & Service” and direct their sincere and

true efforts in providing service, which would

benefit their fellow students, institution where

they learn and for the development and progress

of their country.

With best wishes for the success of the magazine.

Shri. B. Premnath

Chairman, Acharya Institutes

Page 10: Magnum opus 2k14f

PRINCIPAL’S MESSAGE

I feel a great pleasure to know that department of comput-

er science and engineering is bringing out its fourth issue of

departmental magazine “Magnum Opus-Spirit of Innovation”.

Technical education is the largest human development sys-

tem in the country and so is the area of science and has pro-

gressed as a tool for development. It has evolved as the driv-

ing force for the economic growth and an agent for cultural

and social change.

We are in the pursuit of global standards of

excellence in all our endeavors and we aim at creating all

rounded personality in our students professionally and so-

cially. I congratulate the editorial team for their efforts in

bringing out the magazine.

I hope that everyone enjoy going through this volume.

Dr. H. D. Maheshappa

Principal, Acharya Institute of Technology

Page 11: Magnum opus 2k14f

HOD’S MESSAGE

It gives me immense pleasure to note that the department of

Computer Science is bringing out

“Magnum Opus” the departmental annual

magazine.

“Lakshya” is the student forum of

Computer Science department. These

two provide excellent platform for the

students as well as faculty and experts

to share their ideas and aspirations.

I congratulate the editorial team

and the efforts made b all the staff and

students in making this academic year

more colorful!!

Dr. K.G Mohan

Prof. & Dean (R&D), Dept. of CS&E

Page 12: Magnum opus 2k14f

ADVISORY BOARD

Dr. H.D. Maheshappa, Principal,

Acharya Institute of Technology Chief Advisor

Dr. K.G. Mohan,

Professor, Dean of R&D & Head, Department

of Computer Science & Engineering, Acharya

Institute of Technology

Chairman

Dr. B.H. Shekar

Chairman

Department of Computer Science,

Mangalore University,

Mangalore- 574 199, Karnataka, India

Dr. C.B. Akki

Senior Consultant-Talent Transformation,

Wipro Technologies,

Bangalore-560 100, Karnataka, India

Dr. Basavaraj S. Anami

Principal, KLE Institute of Technology,

Airport Road.

Hubli-580030, Karnataka, India

Dr. Dinesh Ramegowda

Technical Manager, HCL Technologies,

No. 8 & 9, G.B Palya, Off. Hosur Road,

Bangalore-560068, Karnataka, India

Dr. Krishna Mohan C.

Head of the Department of Computer Sci-

ence, Indian Institute of Technology,

Hyderabad

Dr. Dinesh M.S.

Senior Member, Technical Staff,

Siemens Technology and Solutions,

Bangalore

Dr. P.V. Kumar

Professor, Department of Computer Science

& Engineering, Acharya Institute of

Technology

Page 13: Magnum opus 2k14f

ACKNOWLEDGEMENT

and it is the only beginning that opens an era of technological innovation

and spirit. It gives us an immense pleasure to bring out the FOURTH issue of

the departmental magazine “Magnum Opus - Spirit of Innovation” before you.

We are very much indebted for the constant help extended

by our honorable Chairman, Shri. B. Premnath Reddy, Smt. Shalini Red-

dy, Director - Admissions, Mrs. Madhavi Srinivas, Director, HR & IA-

Acharya Institutes, Dr. H.D. Maheshappa, Principal, Acharya Institute of

Technology and Dr. K.G. Mohan, Dean of R&D, in bringing out this maga-

zine.

We would also like to warmly acknowledge Dr. K.G. Mohan, Head of

CSE for his guidance and input in the making of the magazine. Of

the many people who have been enormously helpful in the preparation of this

magazine, we are especially thankful to Associate Professor, Prof. Gayathri

Kamath, Assistant Pr Pr Patel, Professor & Forum

Coordinator, and the entire CSE faculty for their help and support in

guiding us through to its success full completion.

We are obliged to faculty, for the valuable information

provided by them in their respective fields. We are grateful for their co-

operation during the period of the production of the magazine.

We would also like to thank Mr. Swastik Biswas (4th semes ter) CSE department for being the critic and designing this magazine.

-Team Compass 2k14

Page 14: Magnum opus 2k14f

STAFF AT DEPARTMENT

OF CS&E

Starting from left side of the 1st row:

Mrs. Surekha K.B., Mrs. Varalakshmi B.D., H.O.D. Sir, Dr. Mohan K.G., Principal Sir, Dr.

H.D. Maheshappa, Dr. P.V. Kumar, Mr. Nagesh A.G., Mr. Deepak S. Sakkari.

Starting from left side of the 2nd row:

Mrs. Latharani T.R., Mrs. Nagaveni V., Mrs. Gayathri Kamath, Mrs. Manujakshi B.C., Mrs.

Deepa T.P., Mrs. Vani K.S., Mrs. Naidila Sadashiv, Mrs. Nagashree N.

Starting from left side of the 3rd row:

Mr. Suresh Patel, Mr. Madhu N., Mr. Srivinay, Mr. Praveen Naik, Mr. Sunil G.L., Mr.

Vaishak Sundaresh, Mr. Dayananda Lal N., Mr. Manjunath G.S., Mr. Raghunandan V., Mr.

Narasimha Murthy M.S., Mr. M.D. Ziaur Rahman.

Page 15: Magnum opus 2k14f

STAFF AT DEPARTMENT

OF CS&E

Page 16: Magnum opus 2k14f

FACULTY ACHIEVEMENTS

Mrs. Varalakshmi B.D. has been awarded 6 Lakhs by VTU-VGST

(2013-14) for her project on the Design and Implementation of Haptic devices

for Physically Challenged People.

Mrs. Latharani T.R. has completed her research on Digital Image

Processing under the guidance of Dr. Thippeswamy G. of BMSIT in the R&D

Centre of Acharya Institute of Technology affiliated to VTU.

Mrs. Vani K.S. has been awarded the Best Paper Award for her pa-

per on FEC Techniques for Reliable Data transmission at the International

Conference on CSE held on 28th April, 2013 in Bangalore.

Dr. G.K. Ravi Kumar has been awarded the 2nd Prize for his paper

on Analysis of Big Data at Advances in Information Technology Conference

held on 4th April, 2013 at SJBIT college.

Dr. K.G. Mohan was felicitated with the title of Young Investigator

Award for his work on A Low Cost Barcode Reader Health Application at the

International Conference on CSE held on 28th April,2013 in Bangalore.

A very successful four day VTU-VGST FDP workshop was organized

on Distributed computing from 10th-13th July 2013 Acharya Institute of

Technology under the sponsorship of VTU-VGST Acharya Institute of Technol-

ogy.

Workshop on Intellectual property rights was held on 16th

April,2013 at Acharya Institute of Technology sponsored by AIT and KSCST.

Page 17: Magnum opus 2k14f

PUBLICATIONS BY FACULTY

DURING 2013-14

Sl. No. Name of the

Teacher Title of the Paper

Publication

citation

National or

International

Journal

1 Dr. K.G. Mohan Barcode Scanner for

Health Applications -

IrNet

International Jour-

nal

2 Vani K.S.

FEC Techniques for

Reliable Data

transmission

-

IrNet

International Jour-

nal

An Efficient Method

To Feed High

Resolution Images

To Facial Analysis

Systems

GRET

Graduate

Research in

Engineering and

Technology (GRET)

An International

Journal (JUNE 2013)

ISSN 2320 â “ 6632

3

Multintenacny and

Scalability issues in

Cloud Computing

Recent Trend in

Computer Science &

Engg. [NCRTCSE-13],

4TH MAY 2013

National

Narasimha Murthy

M.S.

Cloud Vision

Using MOCHA

Architecture on

Jelastic Cloud

International Jour-

nal on Engineering

and Innovative

Technology, Vol.2,

Issue.11, May 2013

National

E-Health care billing

and record

Management system

using Android with

Cloud

IOSR Journal of

Computer Engineer-

ing, Vol.11, Issue-4,

May-Jun-2013

International

Page 18: Magnum opus 2k14f

Sl.. No. Name of the

Teacher Title of the Paper

Publication

citation

National or

International

Journal

4

An on demand

routing technique for

cognitive radio

ADHOC network and

its performance

analysis

International Journal

on Engineering and

Innovative

Technology, Vol.2,

Issue.11, May 2013

International Suresh Patel

5

Secure data

aggregation for Peer

to peer node

IRNet, May 2013 International Nagesh A.G.

6 Nagaveni V.

An Efficient

Method To Feed High

Resolution Images

To Facial Analysis

Systems

GRET

Graduate

Research in

Engineering and

Technology (GRET)

An International

Journal (JUNE 2013)

ISSN 2320 â “ 6632

7 Sunil G.L.

Data sharing in the

cloud with

distributed

accountability

IJERT 2013 International

8 Surekha K.B.

Improved AODV

Based on

energy strength and

dropping ratio

IRNet, May 2013 National

9 Varalakshmi B.D.

Ensuring Security in

Multi Clouds using

Secret Sharing

Scheme

IRNet, May 2013 International

Page 19: Magnum opus 2k14f

Sl.. No. Name of the

Teacher Title of the Paper

Publication

citation

National or

International

Journal

10 Deepak S. Sakkari

Frame work for

enhanced joint

connectivity and cov-

erage using random

based distribution in

WSN

IEEE international

Optimized coverage

and connectivity for

randomly

deployed WSN for

lifetime

optimization

Vol4, Issue6,

PP247-255 International (IJCET)

11 Praveen Naik

Protection of Control

Frames in Wireless

Network

IJARCSSE

JOURNAL International

12 Deepa T.P.

EEG based sleep sig-

nal detection Vol3, number 1 International (IJETT)

A routing protocol to

evade congestion in

ADHOC

Vol3, number 1 International (IJETT)

13

Protection of frames

in Wireless sensor

Networks

Volume 3 issue 12 IJARCSSE

Manujakshi B.C. Under Water Acous-

tic (UW-A)

Communication

Architecture and the

Key Notions of UW-A

Propagation

Volume 3, issue 12 International

Page 20: Magnum opus 2k14f

Sl.. No. Name of the

Teacher Title of the Paper

Publication

citation

National or

International

Journal

Vandana Reddy

EEG SLEEP SIGNAL

PROCESSING TO ALERT

DRIVER IN INTELLI-

GENT VEHICULAR

SYSTEM USING

MOBILE DEVICE

Volume 3,

Number 1 International

14

A Routing

Protocol to Evade

Congestion in Time

Critical Events in Wire-

less Sensor Networks

(ECTCE)

Volume 3,

Number 1 International

Page 21: Magnum opus 2k14f

STUDENT ACHIEVEMENTS

Bachelor of Engineering

Prachi Sharma student of Department of CS&E secured 9th rank in

VTU Examinations for the academic year 2012-13.

Gajender Pandey and Stuti Joshi of 8th semester have secured a

rank of 97 percentile and 92 percentile in GATE 2014.

Hema Bindu qualified for GRE 2013.

Gaurav Divedi has qualified for CAT 2013.

Manasa P., Prathima C., Manjushu H.P., Mamatha G. have been

awarded Rs. 5000 by KSCST for their project on Pedestrian Detection System

using SHADELET & Haar Detection System.

Abhishek Kumar Singh, Hari Ashwath, and Swastik Biswas had

qualified for the final/state level Aspirations2020 where they secured the 6th

place. It was organized by Infosys Campus Connect.

Raja Joseph of 4th semester has been awarded the Silver Medal in

Best Physique of 85Kg category held under VTU.

Swetha has presented her paper on Emotion Recognition using

Brain Waves at the IrNet held on 28 April, 2013 in Bangalore.

Roopa R. has presented her paper on An Efficient Method To Feed

High Resolution Images To Facial Analysis Systems at the Graduate Research

in Engineering and Technology (GRET) An International Journal (JUNE 2013)

ISSN 2320 held in June in Bangalore.

Page 22: Magnum opus 2k14f

Sirisha G.N. has presented her paper on the topic Ensur-

ing Security in Multi Clouds using Secret Sharing Scheme at ICICE-2013 on

28th June, 2013 in IRD-India, Bangalore.

Jangaseshalekhya has presented her paper on Data sharing in the

cloud with distributed accountability at ICICE-2013 on 28th June, 2013 in IRD-

India, Bangalore.

Punith Kumar has presented his paper, An on-demand routing

technique for cognitive radio ADHOC network and its performance analysis at

ICICE-2013 on 28th June, 2013 in IRD-India, Bangalore.

Page 23: Magnum opus 2k14f

LAKSHYA

The Student Forum was started in the year 2005, which marked the beginning

of a new era for the Department of Computer Science & Engineering. Being ed-

ucational and scientific, it endeavors to encourage and assist students in vari-

ous fields to meet the future competence, by involving them in various activi-

ties such as talent search, industry-academic interactions etc.

Every semester Lakshya conducts various activities which includes

technical training & tests on C & C++, Aptitude test, Group discussion, Paper

Presentation, Quiz etc.., which helps students to participate in various tech-

nical events, campus interviews and for their future enhancements. At the end

of every academic year, Lakshya organizes COMPASS – technical symposium,

which is an inter/intra collegiate event.

“To motivate the students intellectually, professionally and socially

to lead productive and satisfying lives in the global and competitive society of

the 21st century.”

Page 24: Magnum opus 2k14f

Forum- A room of people brought together to discuss upon the interests of different do-

mains.

What is Lakshya Forum?

Lakshya Forum is a room provided to the aspiring engineers of the college to step out of

their classrooms, their mandatory course books and their daily prescribed curriculum, giv-

ing them an opportunity to identify their strengths and work as an individual in a group

discussion towards the achievement of the intended target-“The Lakshya”.

There always have been many conversations and questions about why actually

are forums conducted when every individual is successful enough in working for his self

by himself.

What are its objectives?

Objectives are generally framed on the basis of the requirements and expectations of the

group involved. Here, in Lakshya Forum as well the similar tradition is followed, involving

both students and faculty. It gives them a platform to share their ideas , putting on the

billboard some of the most entertaining events.

One of the objectives of our forum is to enhance the skills and practices of

working as a team among students. Along with the above, socializing with a different

crowd outside the classroom and of course reducing the gap between seniors and juniors

also has been seen as a much needful context to be given a thought towards the framing of

the forum’s objectives.

Forums always are based on some goals and motives to be achieved, hence,

faces some real time achievements categorized as outcomes.

What are its outcomes?

Lakshya is a student’s forum which makes students take up responsibilities and simultane-

ously help them in brushing up their skills to put up the best events.

In this process of planning and bringing up events, catering to diverse interests, stu-

dents get to experience the duty of being an organizer and a manager, in turn enhancing

their confidence which is known to be an essential requirement of a professional degree

holder.

To conclude with something which has kept Lakshya alive as a forum in the years

gone and what makes it awaited in the years to come is the success which brings along the

satisfaction of a good work and the call for enjoyment which truly should be an unmissed

element in a meaningful and happy life.

Page 25: Magnum opus 2k14f

COORDINATORS OF

COMPASS 2k14

AISHWARYA N. 1AY12CS007 4-A

HULSI KUMARI 1AY12CS042 4-A

HARI ASHWATH 1AY12CS041 4-A

MD. NAWAID ALI 1AY12CS053 4-A

ABHISHEK CHANDRA SINGH

1AY12CS003 4-A

ABHISHEK UPADHYAY 1AY12CS005 4-A

ANKIT POUDEL 1AY12CS013 4-A

ANKITA DIVYA 1AY12CS014 4-A

MD. ILIYAS HASSAN 1AY12CS056 4-A

KOMAR KANTHI 1AY12CS045 4-A

ABHIJEET SASI-DHARAN

1AY12CS001 4-A

RICHA MEHTA 1AY12CS080 4-B

NEHA KUMARI 1AY12CS060 4-B

SHILPI SINHA 1AY12CS091 4-B

SRISHAILA K.R. 1AY12CS105 4-B

SHASHWATHI K.N. 1AY12CS090 4-B

SANDHYA D. BIRAJ-DAR

1AY12CS088 4-B

SHREEDHAR BHAT 1AY12CS095 4-B

NIKHITHA P. 1AY12CS061 4-B

PRERNA SHARMA 1AY12CS070 4-B

RASHMI G. 1AY12CS076 4-B

UJJWAL JAIN 1AY12CS122 4-B

NISCHITHA S. 1AY12CS063 4-B

RASHMI C.S. 1AY12CS075 4-B

SULEKHA KUMARI 1AY12CS112 4-B

RUPAN ROY 1AY12CS083 4-B

SRUSHITI K. 1AY12CS107 4-B

MANJINDER SINGH DIP 4-C

TILAK KUMAR DIP 4-C

NAVYA G. DIP 4-C

HARSHITHA P.S. DIP 4-C

JAGADISH H.S. DIP 4-C

ROHIT PAWAR DIP 4-C

SWASTIK BISWAS 1AY12CS119 4-C

SUSHMITA KUMARI 1AY12CS118 4-C

ASHWINI B.N. 1AY11CS023 6-A

AMRIT KISHORE 1AY11CS013 6-A

PRIYA AGARWAL 1AY11CS085 6-A

MAAAZ MAJA 1AY11CS061 6-A

M. SRI PADMA SUDHA 1AY11CS060 6-A

MEGHA V. 1AY11CS064 6-A

PRUTHVI P V. 1AY11CS086 6-A

Page 26: Magnum opus 2k14f

COORDINATORS OF

COMPASS 2k14

GAGANA P. 1AY11CS040 6-A

K. MANASA SARALAYA 1AY11CS053 6-A

AISHWARYA S.P. 1AY11CS006 6-A

AKASH KARIWAL 1AY11CS008 6-A

SAFI AADIL ANSARI 1AY11CS100 6-B

SHIVAM SINGHAL 1AY11CS108 6-B

SUMIT KUMAR 1AY11CS123 6-B

VISHAL KUMAR 1AY11CS135 6-B

UMESH KUMAR 1AY11CS131 6-B

SHIVIKA PANDEY 1AY11CS110 6-B

SHALINI SRIVASTAVA 1AY11CS103 6-B

ANILKUMAR A. 1AY10CS006 8-A

ARUN S. 1AY10CS009 8-A

CHARITH KUMAR JAIN 1AY10CS014 8-A

MAHESH KOTI 1AY09CS042 8-A

NAGARAJ G.B. 1AY10CS037 8-A

NARESH KUMAR 1AY10CS039 8-A

IRFAN KHAN 1AY10CS025 8-A

ANIMESH PROSAD 1AY10CS007 8-A

ASIF PASHA 1AY10CS010 8-A

HIMABINDU P. 1AY10CS024 8-A

MAMATHA G. 1AY10CS031 8-A

MANJUSHREE M.P. 1AY10CS034 8-A

MANASA P. 1AY10CS032 8-A

NANDALAKSHMI D.M. 1AY10CS038 8-A

PRATHIMA C. 1AY10CS050 8-A

NEHA 1AY10CS042 8-A

AAYUSHI BHATTACHARYA

1AY10CS001 8-A

NAYANA METHRE 1AY10CS040 8-A

MOUSHUMI MAHATO 1AY10CS035 8-A

NEETIKA SINGH 1AY10CS041 8-A

GIRISH PRASAD K.S. 1AY10CS021 8-A

DHRUVA M. 1AY10CS017 8-A

HEENA A. 1AY10CS023 8-A

RAJIB BISWAS 1AY10CS057 8-B

SACHIN 1AY10CS060 8-B

SAUVIK DAS 1AY10CS069 8-B

SHASHIDA NAHID 1AY10CS073 8-B

SHUBAM 1AY10CS074 8-B

SAMEE ALAM 1AY10CS061 8-B

RISHAB SACHAN 1AY10CS059 8-B

SUKRITI KALYANI 1AY10CS081 8-B

THASNEEMA V. 1AY10CS085 8-B

RAJESHWARI A. 1AY10CS056 8-B

RESHMA R. 1AY10CS058 8-B

SHWETHA S. 1AY10CS075 8-B

MAHANKALI PRI-YANKA

1AY09CS041 8-B

SAVITA KARABASANAVAR

1AY10CS070 8-B

SRIVIDYA R. 1AY10CS079 8-B

SAMEERA ALLURI 1AY10CS063 8-B

SANJANA R. 1AY10CS064 8-B

SHABNAM BANDYOPADHYAY

1AY10CS072 8-B

SANJU SHWETABH 1AY10CS066 8-B

Page 27: Magnum opus 2k14f

LAUNCHING OF COMPASS

2k14

The Annual techno fest of the Computer Science department - Compass 2k14

was launched with great applause on 2nd May, 2014. Principal of AIT, Dr. H. D. Maheshap-

pa declared the Technical Symposium open by rolling down the banner amidst thunder-

ous cheers from the crowd signaling the launch of the biggest technical spectacle which

takes place every year.

Compass celebrates the spirit of participation as student from various

branches and colleges come together and take part in various technical and non-technical

events. This year the much awaited techno fest is happening on 7th May, 2014.

Page 28: Magnum opus 2k14f
Page 29: Magnum opus 2k14f

N o matter how fast our connection speed is,

it could always stand to be faster. And the peo-

ple who make it their business to see that tele-

communications networks do get faster are also

keenly aware, and they're apparently already at

work on the next big thing. Till now we all were

astonished by the speed of 3G and yet it was

slower when we knew about 4G. It was way fast-

er than 3g technology. the prices of 3G were

slashed and brought close to that of 2G and

just then 4G was about the corner.it could

download a file as large as 800mb in 40 sec-

onds only and that meant a film can be down-

loaded in only a couple of minutes.

4G is yet to reach parts in India and the

world started to think about something faster

as people don’t have even those couple of

minutes. Imagine if someone told us that a

movie can be downloaded in a single blink 5

years earlier we could have laughed on it, but as

we all are aware of the recent developments in

technology we raise our brows to these ques-

tions and the answer was 5G.

A new mobile generation has ap-

peared approximately every 10th year since the

first 1g system, Nordic Mobile Telephone, was

introduced in 1981. The first 2G system started

to roll out in 1992, the first 3G system first ap-

peared in 2001 and 4G systems fully compliant

with IMT Advanced were standardized in 2012.

The development of the 2G (GSM) and 3G (IMT-

2000 and UMTS) standards took about 10 years

from the official start of the R&D projects, and

development of 4G systems started in 2001 or

2002. Predecessor technologies have occurred

on the market a few years before the new mo-

bile generation, for example the pre-3G system

CDMA-One/IS95 in the US in 1995, and the pre-

4G systems Mobile Wi-MAX in South-Korea

2006, and first release-LTE in Scandinavia 2009.

5G (fifth generation communication tech-

nology) is way faster than its predecessors and

is claimed to give a speed up to 800mb/s which

means….yes we CAN actually download a full

movie in a single blink. but we will have to wait

for some time to experience that as develop-

ments are still ongoing for the technology and

many countries are into this project and we are

seeing so many claims of getting this technolo-

gy first among all. India is also not far behind in

this scenario and is developing it quickly.

India and Israel have agreed to

work jointly on development of fifth generation

(5G) telecom technologies, sources said. The

matter was discussed during the visit of tele-

com and IT minister Kapil Sibal to Israel. Sibal

and his Israeli counterpart Gilad Erdan in a

meeting agreed that both the countries can co-

operate on exploring the possibilities of stand-

ard formulation, development and manufactur-

ing in the area of 4G and 5G telecom technolo-

gies.

"Israel has technology and innovation,

India has the capital and market. The two areas

which emerge out of discussion related to tele-

com were: reducing roaming charges between

India and Israel and exploring the possibilities

of standard formulation, research and develop-

ment, and manufacturing in the area of 4G and

5G," a DoT official said. At present, Indian tele-

com operators are providing 2G, 3G and some

4G services. No country in the world has 5G

technology FULLY WORKING while some com-

panies AROUND THE WORLD claim to have test-

ed 5G technology. There have been claims by

companies that 5G technology will be in place

by 2020.

3g vs. 4g vs. 5g

Page 30: Magnum opus 2k14f

Global semiconductor services provider,

Broadcom has introduced the industry's first 5G

Wi-Fi (802.11ac) system-on-chip (SoC) to deliver

pinpoint indoor positioning technology. The

BCM43462 SOC, featuring Broadcom's new Accu

-Locate technology, provides sub-meter accura-

cy on physical locations enabling retailers and

public venue operators to deliver more person-

alized experiences to consumers. Broadcom will

demonstrate its Accu-Locate technology at In-

terop, Las Vegas, 1-3 April.

Key features of the Broadcom

BCM43462 SoC include: dual band (2.4 GHz and

5 GHz) complete 5G Wi-Fi (11ac) SoC with inte-

grated MAC, PHY and radio, three-stream spa-

tial multiplexing up to 1.3Gbps, standardized

security, embedded hardware acceleration, full

IEEE 802.11a/b/g/n legacy compatibility and

support for Fast-Path UAP, Broadcom's enter-

prise class access point software. Broadcom's

BCM43462 SoC with integrated Accu-Locate

technology is now sampling.

So we will still have to wait for 4-5 years

to use this 5g technology with eye-blinking

speeds. but wait always give the right result.so

wait and only until then keep using 4g.

Speed comparisons of all

generations…….

Page 31: Magnum opus 2k14f

D ata center is a large group of networked

computer servers typically used by organiza-

tions for the remote storage, processing, or dis-

tribution of large amounts of data. As men-

tioned in Wikibon’s “The Data Center: Past, Pre-

sent and Future” post, “Data centers are at the

center of modern software technology, serving

a critical role in the expanding capabilities for

enterprises.” The concept of “data centers” has

been around since the late 1950s when Ameri-

can Airlines and IBM partnered to create a pas-

senger reservations system offered by Sabre,

automating one of its key business areas. The

idea of a data processing system that could cre-

ate and manage airline seat reservations and

instantly make that data available electronically

to any agent at any location became a reality in

1960, opening the door to enterprise-scale data

centers.

Since then, physical and technological

changes in computing and data storage have

led us down a winding road to where we are

today. Let’s take a brief look at the evolution of

the data center, from the mainframe of yester-

day, to today’s cloud-centric evolution, and

some impacts they’ve had on IT decision-

making. In an effort to support application de-

mands, especially through the cloud, today’s

data center capabilities need to match those of

the cloud. The entire data center industry is

now changing thanks to consolidation, cost

control, and cloud support. Cloud computing

paired with today’s data centers allow IT deci-

sions to be made on a “call by call” basis about

how resources are accessed, but the data cen-

ters themselves remain completely their own

entity.

There are 4 main drawbacks of data centers-

Proximity challenges

In many cases, outdoor facility modules

supply power and cooling to data centers locat-

ed indoors. When the indoor data center is

housed along the perimeter of a building, facili-

ty module connection costs are small.

But some data centers are located in the

middle of large, sprawling buildings. In such

instances, connecting the data center to an out-

side facility module would quickly transform

what should be a “site integration” project into

a construction project. Cable and piping must

be run through walls and/or ceilings, which

means time, expense and disruption along the

connection route.

Elements of risk

Facility modules located outside are sus-

ceptible to damage from a variety of sources,

including rain, wind, vandals, animals and in-

sects and, if located in a parking lot, traffic.

Data Furnaces

Page 32: Magnum opus 2k14f

Form factor restrictions

The functional advantages of a

“modular” design are flexibility, mobility and

adaptability. But facility modules are what they

are – pre-assembled power and cooling sys-

tems, typically housed in 20 foot by 40 foot

shipping containers.

Which means, for one thing, a facility

module may be too heavy to place on a build-

ing’s roof. And because facility modules are

built as limited, self-contained units, they

aren’t able to accommodate further data center

expansion. An enterprise seeking to add to its

data center infrastructure would have to buy

more facility modules.

Squeeze box

Facility modules were built to provide

power and cooling for data centers, not to pro-

vide a secret recreation room for data center

staff. The limited space inside may mean minor

contortions for maintenance personnel drop-

ping in to do repairs. In addition, facility mod-

ules that provide service personnel access

through an outside door are exposed to corro-

sive elements – heat, moisture, dust, cold –

when these doors are opened.

Data centers are large facilities filled

with servers and other equipment. In the Unit-

ed States, data centers are responsible for more

than 2% of the country's electricity usage, ac-

cording to researchers at Villanova University.

If the global cloud computing industry were

considered to be a single country, it would be

the fifth-largest in the world in terms of energy

consumption, according to Ed Turkel of

Hewlett-Packard's (HPQ, Fortune 500) Hyper

scale Business Unit.

Nearly half of the energy data centers

consume goes to cooling the equipment using

fans and other methods. That's "just wasteful,"

said Jill Simmons, director of Seattle's Office of

Sustainability and Environment.

That's why the city of Seattle is working

on a project to make use of the heat data cen-

ters produce. The city plans to route heat from

two local data centers to help warm 10 million

square feet of building space in the surround-

ing area. The project is still in the conceptual

phase, but Simmons said the city hopes to have

it in motion "within the next year."

Recently, Google pulled back the curtain

on how it manages the heat at some of the larg-

est data centers in the world. The company’s

techniques involve stripping almost every un-

necessary component and scrap of metal away

from the processors inside their data centers.

The computers in the racks at Google centers

are little more than pallets holding mother-

boards.

Even the internal walls of the data center

are constructed of fabric — enough to direct air

flow in the proper direction, but not enough to

add to the complex problems associated with

heat management. They are also cheap, and

easy to reconfigure on the fly. Then Google

runs a lot of cool water into the facility, some-

times having the liquid-carrying pipes within

inches of the processors themselves.

Page 33: Magnum opus 2k14f

That’s a pretty efficient model of doing things, but Microsoft is now going one

further, literally setting their servers outside in roofless data centers. According to Data Center

Knowledge, the idea behind Microsoft’s new billion-dollar roofless data center facility in Boydton,

Va., came from Christian Belady, general manager of Microsoft Data Center Services. He thought

that computers should be able to brave the outdoor elements, and set up a server rack in a pup

tent back in 2008. It ran for eight months with 100 percent up time. That demonstrated that out-

door computer cooling and housing was theoretically possible.

But Microsoft has been designing smaller and smaller containers to hold its servers for

years, Data Center Knowledge reports. Called IT-PACs, for pre-assembled components, the shipping

-crate-like boxes can each hold hundreds of servers. Cool air from the outside is brought into the

unit through vents on the side, where it passes through a wet membrane that cools the air down

before being used to ultimately cool the servers. This method reportedly uses just 10 percent of

the water needed to cool most data centers of the same size. Future Microsoft data centers may be

little more than concrete slabs on the ground, with the IT-PACs sitting on top.

Page 34: Magnum opus 2k14f

Year Data centers

1946

The Electronic Numerical Integrator and Computer (ENIAC) was built in 1946 for the U.S. Army to store artillery firing codes and was dubbed as the first general-purpose

electronic digital computer.

Early

1960s

The first transistorized computer (TRADIC) was introduced in 1954 and was the first machine to use all transistors and diodes and no vacuum tubes. Serious commercial

systems did not arrive until the 1960s, leading to mainframes like the IBM System se-ries to develop a substantial jump in compute abilities.

1971

Intel introduced its 4004 processor, becoming the first general-purpose programmable processor on the market. It served as a “building block” that engineers could purchase and then customize with software to perform different functions in a wide variety of

1973

The Xerox Alto becomes the first desktop computer to use a graphical UI and included a bit-mapped high-resolution screen, large internal memory storage, and special soft-

ware.

1977

ARCnet is introduced as the first LAN, being put into service at Chase Manhattan Bank.

It supported data rates of 2.5 Mbps, and connected up to 255 computers across the

network.

1978 SunGard develops and establishes the business of commercial disaster recovery.

1980s

Personal computers (PCs) were introduced in 1981, leading to a boom in the microcom-puter industry. Sun Microsystems developed the network file system protocol, allowing a user on a client computer to access files over a network in a manner similar to how

local storage is accessed.

Early

1990s

Microcomputers began filling old mainframe computer rooms as “servers,” and the rooms became known as data centers. Companies then began assembling these banks

of servers within their own walls.

Mid

1990s

The “.com” surge caused companies to desire fast internet connectivity and nonstop

operation. This resulted in enterprise construction of server rooms, leading to much

larger facilities (hundreds and thousands of servers). The data center as a service mod-

el became popular at this time.

1997

Apple created a program called Virtual PC and sold it through a company called Con-nectix. Virtual PC, like SoftPC allowed users to run a copy of windows on the Mac com-

puter, in order to work around software incompatibilities.

1999

VMware began selling VMware Workstation, which was similar to Virtual PC. Initial ver-sions only ran on Windows, but later added support for other operating systems.

2001

VMware ESX is launched – bare-metal hypervisors that run directly on server hardware without requiring an additional underlying operating system.

2002

Amazon Web Services begins development of a suite of cloud-based services, which in-cluded storage, computation and some human intelligence through “Amazon Mechani-

cal Turk.”

2006

Amazon Web Services begins offering IT infrastructure services to businesses in the form of web services, now commonly known as cloud computing.

2007

Sun Microsystems introduces the modular data center, transforming the fundamental economics of corporate computing.

Page 35: Magnum opus 2k14f

2011

Facebook launches Open Compute Project, an industry-wide initiative to share specifi-cations and best practices for creating the most energy efficient and economical data

centers.

2012

Surveys indicated that 38 percent of businesses were already using the cloud, and 28 percent had plans to either initiate or expand their use of the cloud.

2013

Telcordia introduces generic requirements for telecommunications data center equip-ment and spaces. The document presents minimal spatial and environmental require-

ments for data center equipment and spaces. Google invested a massive $7.35 billion in capital expenditures in its Internet infrastructure during 2013. The spending was driv-en by a massive expansion of Google’s global data center network, which represented

perhaps the largest construction effort in the history of the data center industry

Today /

Beyond

Today’s datacenters are shifting from an infrastructure, hardware and software owner-

ship model, toward a subscription and capacity on demand model.

By Mrs. Deepa T.P.

Assistant Professor

(CSE Faculty)

Page 36: Magnum opus 2k14f

T he "Tongue Drive" is a wireless, noncon-tact tongue-operated assistive technology de-veloped for people with severe disability for Computer Access and to control their environ-ment such as wheel chairs and other devices simply by using their tongue. The tongue is considered an excellent appendage in severely disabled people for operating an assistive de-vice. Tongue Drive consists of an array of Hall-effect magnetic sensors magnet secured on the tongue. The sensor movements of a cursor on a computer screen or to operate a powered wheelchair, a phone, or other equipments. sig-nals are transmitted across a wireless link and processed to control the mounted on a dental retainer on the outer side of the teeth to meas-ure the magnetic field generated by a small permanent tiny magnet, size of a grain of rice, is attached to an individual's tongue using im-plantation, piercing or adhesive. This technology allows a disabled person to use tongue when moving a computer mouse or a powered wheel chair. The principal advantage of this technology is the possibility of capturing a large variety of tongue move-ments by processing a combination of sensor outputs. This would provide the user with a smooth proportional control as opposed to a switch based on/off control that is the basis of most existing technologies. A large group of assistive technology devices are available that are controlled by switches. The switch integrat-ed hand splint, blow-n-suck (sip-n-puff) device, chin control system and electromyography

(EMG) switch are all switch based systems and provide the user with limited degrees of free-dom. A group of head-mounted assistive devic-es has been developed that emulate a computer mouse with head movements. Cursor move-ments in these devices are controlled by track-ing an infrared beam emitted or reflected from a transmitter or reflector attached to the user's glasses, cap, or headband. Tilt sensors and vid-eo based computer interfaces that can track a facial feature have also been implemented. One limitation of these devices is that only those people whose head movement is not inhibited may avail of the technology. Another limitation is that the user's head should always be in positions within the range of the device sensors. For example the control-ler may not be accessible when the user is lying or not sitting in front of a computer. The needs of persons with severs motor disabilities who cannot benefit from mechanical movements of any body organs are addressed by utilizing electric signals originated from brain waves or muscle twitches. Such brain computer interfac-es, either invasive, or non-invasive, have been the subject of major research activities. Brain-Gate is an example of an invasive technology using intra-cortical electrodes, while Cyberlink is a non invasive interface using electrodes at-tached to the forehead.

OPERATING WITH

TONGUE DRIVES

Page 37: Magnum opus 2k14f

ADVANTAGES (1). The signals from the magnetic sensors are linear functions the magnetic field, which is a continuous position dependent property. Thus a few sensors are able to capture a wide variety of tongue movements. (2). This would provide a tremendous ad-vantage over switch based devices in that the user has the options of proportional, fuzzy, or adaptive control over the environment. (3). These would offer smoother, faster, and more natural controls as the user is saved the trouble of multiple on/off switch operations. (4). Alternative assistive technologies that emu-late a computer mouse use an additional input device such as a switch for the mouse button clicks besides the primary method for moving the pointer. (5). In Tongue Drive system on the other hand, the additional switches are unnecessary since a specific tongue movement can be assigned to the button press. (6). The permanent magnet which generates the magnetic field is a small, passive, and inherent-ly wireless component leading to user conven-

ience and additional power saving. The mouth-piece electronics can be integrated circuit (AISC). The AISC along with the transmitter antenna can be incorporated into a miniaturized package that may be fitted under the tongue as part of the dental retainer. (7). Due to the proximity of the magnet and Hall-effect sensors in the oral cavity, the Tongue Drive system is expected to be more robust against noise, interference, and involuntary movements compared to alternative technolo-gies. Therefore, the Tongue Drive system can serve as a platform to address a variety of needs of different individuals. The results of the trials showed 100 percent of commands were accurate with the response time less than one second, which equals to an information transfer rate of ap-proximately 150 bits per minute.

LIMITATIONS (1). Implementation is slightly harder. (2). Slightly Expensive

Page 38: Magnum opus 2k14f

T here has been a significant development

in the financial sector over the last 40 years be-

cause of the improvement in information com-

munication technology. According to Consoli

(2003), until the early 1980s and 1990s there

were many regulatory restrictions which pre-

vented banks to adopt new technology. As a

result there was heavy reliance on customary

branch based delivery of financial services and

little pressure to change. This changed gradual-

ly with the deregulation of industry during the

1990s.This time the increasing importance of

Information Communication Technology (ICT)

brought stiffer competition and pressure for

faster change.

Customers today are demanding much

more from banking services. They want new

levels of convenience and flexibility on top of

powerful and easy to use financial management

tools, products and services that traditional

banks could not offer.

Internet banking services enables banks

to perform transactions such as transferring

funds, payments of bills, access of latest bal-

ances, statement viewing, and account detail

viewing, printing and downloading of state-

ments just to mention but a few. This in its self

has been a fundamental shift in the banking

delivery channels towards self service chan-

nels.

What is electronic banking?

Online banking can simply be de-

fined as the process of entering into transac-

tions by a particular client and the bank using

modern technology. With the various capabili-

ties of the computer and other technological

developments, online banking is one of the

many businesses that benefited from it. Since

banking plays a very important role in the

economy of a nation, then there is truly a need

to maximize and improve its features to be cli-

ent friendly and easy to access. There are of

course the advantages and disadvantages of

online banking.

Among the advantages of online banking in-

clude the following:-

Very convenient: Online banking is a totally

easy thing to do. In the comfort of your

home or offices, you can do whatever mon-

etary transactions you wish to do with your

bank.

Unlimited service day and night: The services

and various features of your bank are al-

ways available seven days a week and 24

hours daily. The most interesting thing here

is that, everything can happen at just one

click of your mouse.

No time constraint: Online banking is also

stress free because it never closes unlike

the traditional banking that has cut-off

time.

E-Banking

Page 39: Magnum opus 2k14f

Easy to access via PC: Using your personal

computer, you can easily do various trans-

actions with your bank in view of your busi-

ness or any other personal or financial mat-

ters.

Easy way of payment: Bill payments can also

be handled properly and smartly. Instead

of waiting for certain due dates, you can

easily pay all your transactions using your

computer and in coordination with your

bank.

Smart: Online banking is also ubiquitous or

simply put smart. This enables you to do

troubleshooting regarding any problem that

may arise from your business.

Higher interest rate: Another great advantage

of online banking is the interest rates which

basically range between 5% to 3.40% annual-

ly. Unlike the traditional banking, online

banking can earn you a better interest or

return of investment both in your savings

and checking account.

Easy transaction: Another advantage is the

speed of every transaction. Online transac-

tions, compared to ATM or traditional bank-

ing, works faster. Thus business matters

could benefit so much from this speed fea-

ture.

Banking online is both efficient and effec-

tive. With just one secure site, all your fi-

nancial transactions can be managed order-

ly.

On the other hand, the following are the dis-

advantages of online banking:-

Banking relationship – Customary banking al-

lows creation of a personal touch between a

bank and its clients. A personal touch with a

bank manager for example can enable the man-

ager to change terms in your account since he/

she has some discretion in case of any personal

circumstantial change. It can include reversal

of an undeserved service charge.

Security matters – Direct banks are governed

by laws and regulations similar to those of cus-

tomary banks. Accounts are protected by Fed-

eral Deposit Insurance Corporation (FDIC).

Complex encryption software is used to protect

account information. However, there are no

perfect systems. Accounts are prone to hacking

attacks, phishing, malware and illegal activities.

Learning – Banks with complicated sites can

be cumbersome to navigate and may require

one to read through tutorials to navigate them.

Transaction problems – face to face meeting

is better in handling complex transactions and

problems. Customary banks may call for meet-

ings and seek expert advice to solve issues.

Though internet banking has its own ad-

vantages and disadvantages, it is indeed a nec-

essary in this global world. Further develop-

ment of software can overcome the drawbacks

and make e-banking more easy and effective.

Page 40: Magnum opus 2k14f

By Nikhitha P.

(B.E. 4th semester)

Page 41: Magnum opus 2k14f

I n 2009, compared to physical theft fraudu-

lent money transfers has exceeded in bank

branches of United States. Crimes have gone up

by 60% every year, in 2012, 3500 cases and

2070 in 2011 reported in India. As per report

from National Crime records Bureau (NCRS),

Maharashtra reports 561 cases, Andhra 454

cases, Karnataka 437 cases in the year 2012

crimes which are done by age group of 18 to 30

[18].Haryana registered 3 cases in 2011 but 116

in the year 2012 which is a drastic raise. Com-

pared to other crimes, this cyber crime doesn’t

require much investment and can be done in

various locations. These crimes originate from

various sources and exhibits socio-educational/

economic and technological factors including

addiction which also includes counterfeiting,

economic crimes, money laundering, child por-

nography, sexual exploitation, drug trafficking,

human trafficking, terrorism, fraud etc.

Why Cyber Crime is more nowadays?

There are 5 common trends which give

chances to cyber crime: More online transac-

tions and digital data. Transaction and custom-

er information, results of product launches,

and other market information are easily availa-

ble. Creating valuable intellectual property

online is an attractive target. Comparatively

Corporations and companies are expected to be

more transparent than before. Majority of peo-

ple want to access to corporate networks

through their mobile devices for day to day ac-

tivities. Though smarter technology devices in-

creases connectivity and but present latest

types of security threats. Hackers can crack

these securities and get an easy entry into cor-

porate networks. Malicious Software like virus-

es and spyware are strong enough to take the

partial control of main applications. In busi-

ness, customer and vendors are joined to the

networks to increase their business profits. In

December 2010, a famous E-business website

was attacked by dozens of people claiming to

be part of the unnamed group. They attempted

to perpetrate a denial of service attack in retali-

ation for website to shut dMore than a dozen

hackers were arrested in that crime. There is

more technology advanced hackers, profession-

al cyber crime organization. For example, hack-

er receives payment to infect end user device

with malware. Today’s Malwares are difficult to

trace and they steal data for financial gain.

Some people think that they get more money if

they become hackers compared to securers.

Cyber security

Page 42: Magnum opus 2k14f

What is cyber Security?

The dictionary meaning says that Cyber

Security is state of being protected against the

criminal or unauthorized use of electronic data,

or the measures taken to achieve this. It is the

collection of tools, policies, security concepts,

security safeguards, guidelines, risk manage-

ment approaches, actions, training, best prac-

tices, assurance and technologies that can be

used to protect the cyber environment and or-

ganization and user’s assets. Organization and

user’s assets include connected computing de-

vices, personnel, infrastructure, applications,

services, telecommunications systems, and the

totality of transmitted and/or stored infor-

mation in the cyber environment.

Cyber security ensures the maintenance

of the security properties of the organization

and user’s assets against security risks in the

networked environments. It is the body of tech-

nologies, processes and practices designed to

protect networks, computers, programs and

data from attack, damage or unauthorized ac-

cess. Elements of cyber security include:

Application security which is the use of

software, hardware, and procedural

methods to protect applications from

external threats.

Information security is the practice of

avoiding information from unauthorized

access, use, disclosure, disruption, modi-

fication, perusal, inspection, recording

or destruction. IT Security and Infor-

mation assurance are two major aspects

of information security.

Network security which consists of the

provisions and policies adopted by a net-

work administrator. They prevent and moni-

tor unauthorized access, misuse, modifica-

tion, or denial of a computer network and

network-accessible resources. Network se-

curity involves the authorization of access

to data in a network, which is controlled by

the network administrator. Users choose or

are assigned an ID and password or other

authenticating information that allows them

access to information and programs within

their authority. Network security covers a

variety of computer networks, both public

and private, that are used in everyday jobs

conducting transactions and communica-

tions among businesses, government agen-

cies and individuals.

Disaster recovery / business continuity plan-

ning - need to encompass how employees will

communicate, where they will go and how they

will keep doing their jobs. The details can vary

greatly, depending on the size and scope of a

company and the way it does business. For

some businesses, issues such as supply chain

logistics are most crucial and are the focus on

the plan. For others, information technology

may play a more pivotal role, and the BC/DR

plan may have more of a focus on systems re-

covery. For example, the plan at one global

manufacturing company would restore critical

mainframes with vital data at a backup

Page 43: Magnum opus 2k14f

Challenges in Cyber Security

Cyber security has been considered as

one of the most urgent national security prob-

lems. A report says, in a speech during his

presidential campaign, President Obama prom-

ised to “make cyber security the top priority

that it should be in the 21st century . . . and

appoint a National Cyber Advisor who will re-

port directly” to the President.

Cyber security must address not only

deliberate attacks, such as from disgruntled

employees, industrial espionage, and terrorists,

but inadvertent compromises of the infor-

mation infrastructure due to user errors, equip-

ment failures, and natural disasters. Vulnerabil-

ities might allow an attacker to penetrate a net-

work, gain access to control software, and alter

load conditions to destabilize a network in un-

predictable ways.

The defense of cyberspace necessarily

involves the forging of effective partnerships

between the public organizations charged with

ensuring the security of cyberspace and those

who manage the use of this space by myriad

users like government departments, banks, in-

frastructure, manufacturing and service enter-

prises and individual citizens. The defense of

cyberspace has a special feature. The national

territory or space that is being defended by the

land, sea and air forces is well defined. Outer

space and cyberspace are different. They are

inherently international even from the perspec-

tive of national interest.

Methods of Attacks and avoidance

The most popular weapon in cyber terrorism is

the use of computer viruses and worms. That is

why in some cases of cyber terrorism is also

called 'computer terrorism'[1]. The attacks or

methods on the computer infrastructure can be

classified into three different categories.

(a) Physical Attack. The computer infrastruc-

ture is damaged by using conventional meth-

ods like bombs, fire etc.

(b) Syntactic Attack. The computer infra-

structure is damaged by modifying the logic

of the system in order to introduce delay or

make the system unpredictable. Computer

viruses and Trojans are used in this type of

attack.

(c) Semantic Attack. This is more treacherous

as it exploits the confidence of the user in the

system. During the attack the information

keyed in the system during entering and exit-

ing the system is modified without the user’s

knowledge in order to induce errors.

The first step in protecting yourself is to recog-

nize the risks and become familiar with some

of the terminology associated with them.

Viruses - This type of malicious code re-

quires you to actually do something before it

infects your computer. This action could be

opening an email attachment or going to a

particular web page..

Page 44: Magnum opus 2k14f

Worms - Worms propagate without user inter-

vention. They typically start by exploiting a

software vulnerability (a flaw that allows the

software's intended security policy to be vio-

lated), then once the victim computer has been

infected the worm will attempt to find and in-

fect other computers. Similar to viruses,

worms can propagate via email, web sites, or

network-based software. The automated self-

propagation of worms distinguishes them

from viruses.

Trojan horses - A Trojan horse program is

software that claims to be one thing while in

fact doing something different behind the

scenes. For example, a program that claims it

will speed up your computer may actually be

sending confidential information to a remote

intruder.

Hacker, attacker, or intruder - people who ex-

ploit weaknesses in software and computer

systems for their own gain. Though they do it

for curiosity, their actions are typically in vio-

lation of the intended use of the systems. The

results can range from creating a virus with no

intentionally negative impact to stealing or al-

tering information.

Malicious code - This category includes code

such as viruses, worms, and Trojan horses.

Although some people use these terms inter-

changeably, they have unique characteristics.

E-Mail Related Crime- Certain emails are used

as host by viruses and worms. E-mails are also

used for spreading disinformation, threats and

defamatory stuff.

Denial of Service -These attacks are aimed at

denying authorized persons access to a com-

puter or computer network.

Cryptology-Terrorists have started using en-

cryption, high frequency encrypted voice/data

links etc. It would be a Herculean task to de-

crypt the information terrorist is sending by

using a 512 bit symmetric encryption.

Need for Cyber Security in India 9.4% houses in India have computer (any

of Laptop or Desktop). Chandigarh (U/T), Goa

and NCT of Delhi are top three stats/union ter-

ritories with highest computer usage. Accord-

ing to 2011 Census, Only 3.1 percent of total

houses have Internet access in India. The cen-

sus covered 24,66,92,667(246.7 million) houses

in India and found only 76,47,473 (3.1%) of this

houses use Internet. The Internet includes both

broadband and low-speed connections. Accord-

ing to Internet World Stats on June 30 2012,

there were 2.4 billion internet users

(2,405,510,175) worldwide. China was the larg-

est countries in terms of internet users with

over 538 million users [19]. The following graph

(figure 1) shows top 20 internet countries

worldwide at mid-year 2012:

Internet Users in million

Page 45: Magnum opus 2k14f

Cyber security initiatives in India

ISO 27001 (ISO27001) is the international Cyber security Standard that provides a model for

establishing, implementing, operating, monitoring, reviewing, maintaining, and improving an Infor-

mation Security Management System.

India’s legal framework for cyber security.

Indian IT Act, 2000

Section 65 - Tampering with computer source code,

Section 66 - Hacking & computer offences,

Section 43 – Tampering of electronic records

Indian Copyright Act

States any person who knowingly makes use of an illegal copy of computer program shall be

punishable. Computer programs have copy right protection, but no patent protection.

Indian Penal Code

Section 406 - Punishment for criminal breach of trust and Section 420 - Cheating and dishonest-

ly inducing delivery of property.

Indian Contract Act, 1872

Offers following remedies in case of breach of contract, Damages and Specific performance of

the contract.

Increasing usage of E-commerce in India Percentage of usage of different online payment methods in India

By Mrs. Deepa T.P.

Assistant Professor

(CSE Faculty)

Page 46: Magnum opus 2k14f

Haptic technology

H aptic technology, or haptics, is a tactile feedback technology which takes advantage of a user's sense of touch by applying forces, vi-brations, and/or motions upon the user. This mechanical stimulation may be used to assist in the creation of virtual objects (objects exist-ing only in a computer simulation), for control of such virtual objects, and for the enhance-ment of the remote control of machines and devices. It has been described as “for the sense of touch what computer graphics does for vi-sion". Although haptic devices are capable of measuring bulk or reactive forces that are ap-plied by the user, it should not be confused with touch or tactile sensors that measure the pressure or force ex-

erted by the user to the interface.

“Haptic”, is the term derived from the Greek word, “haptesthai”, which means ‘sense of touch’. Haptic is defined as the “science of applying tactile sensation to human interaction with computers”. Haptic permits users to sense (“feel”) and manipulate three dimensional virtu-al objects with respect to such features as shape, weight, surface textures, and tempera-ture. By using Haptic devices, the user can not only feed information to the computer but can receive information from the computer in the form of a felt sensation on some part of the body. This is referred to as a Haptic interface . HAPTIC TECHNOLOGIES:

Tactile cues include textures, vibrations, and bumps, while kinesthetic cues include weight, impact, etc. In the following section, we present some crucial concepts and terminology related to haptics. Haptic: the science of applying tactile, kines-thetic, or both sensations to human computer interactions. It refers to the ability of sensing and/or manipulating objects in a

natural or synthetic environment using a haptic interface.

Cutaneous: relating to or involving the skin. It includes sensations of pressure, temperature, and pain. Tactile: pertaining to the cutaneous sense, but more specifically the sensation of pressure ra-ther than temperature or pain. Kinesthetic: re-lating to the feeling of motion. It is related to sensations originating in muscles, tendons, and joints. Force Feedback: relating to the mechanical production of information that can be sensed by the human kinesthetic system. Haptic communication: the means by which humans and machines communicate via touch. It mostly concerns networking is-sues. Haptic device: is a manipulator with sensors, actuators, or both. A variety of haptic devices have been developed for their own purposes. The most popular are tactile based, pen-based, and 3 degree-of-freedom (DOF) force feedback devices. Haptic interface: consists of a haptic device and software-based computer control mecha-nisms. It enables human–machine communica-tion through the sense of touch. By using a haptic interface, someone can not only feed the information to the computer but can also re-ceive information or feedback from the com-puter in the form of a physical sensation on some parts of the body. Applications of Haptic Technology: Surgical simulation & Medical training, Physi-cal rehabilitation, Training and education, Mu-seum display, Painting, sculpting and CAD, Sci-entific Visualization, Military application and Entertainment

Page 47: Magnum opus 2k14f

By Vishwanth Koli (M. Tech 2nd semester)

Page 48: Magnum opus 2k14f

Sixth sense

Technology

W e‘ve evolved over millions of years to

sense the world around us. When we encounter

something, someone or some place, we use our

five natural senses which includes eye, ear,

nose, tongue mind and body to perceive infor-

mation about it; that information helps us

make decisions and chose the right actions to

take. But arguably the most useful information

that can help us make the right decision is not

naturally perceivable with our five senses,

namely the data, information and knowledge

that mankind has accumulated about every-

thing and which is increasingly all available

online. Although the miniaturization of compu-

ting devices allows us to carry computers in

our pockets, keeping us continually connected

to the digital world, there is no link between

our digital devices and our interactions with

the physical world. Information is confined tra-

ditionally on paper or digitally on a screen.

Sixth Sense bridges this gap, bringing intangi-

ble, digital information out into the tangible

world, and allowing us to interact with this in-

formation via natural hand gestures.

Sixth Sense‘ frees information from its

confines by seamlessly integrating it with reali-

ty, and thus making the entire world your com-

puter. Sixth Sense Technology, it is the newest

jargon that has proclaimed its presence in the

technical arena. This technology has emerged,

which has its relation to the power of these six

senses. Our ordinary computers will soon be

able to sense the different feelings accumulat-

ed in the surroundings and it is all a gift of the

Sixth Sense Technology newly introduced. Sixth

Sense is a wearable gesture based device that

augments the physical world with digital infor-

mation and lets people use natural hand ges-

tures to interact with that information. It was

developed by Pranav Mistry, a PhD student in

the Fluid Interfaces Group at the MIT Media

Lab. A grad student with the Fluid Interfaces

Group at MIT, he caused a storm with his crea-

tion of Sixth Sense. He says that the movies Ro-

bocop and Minority Report gave him the inspi-

ration to create his view of a world not domi-

nated by computers, digital information and

human robots, but one where computers and

other digital devices enhance people‘s enjoy-

ment of the physical world. Right now, we use

our devices (computers, mobile phones, tablets,

etc.) to go into the internet and get information

that we want. With Sixth Sense we will use a

device no bigger than current cell phones and

probably eventually as small as a button on our

shirts to bring the internet to us in order to in-

teract with our world!

Sixth Sense will allow us to interact with our

world like never before. We can get information

on anything we want from anywhere within a

few moments! We will not only be able to inter-

act with things on a whole new level but also

with people! One great part of the device is its

ability to scan objects or even people and pro-

ject out information regarding what you are

looking at.

Page 49: Magnum opus 2k14f

Sixth Sense in scientific (or non-scientific)

terms is defined as Extra Sensory Perception or

in short ESP. It involves the reception of infor-

mation not gained through any of the five sens-

es. Nor is it taken from any experiences from

the past or known. Sixth Sense aims to more

seamlessly integrate online information and

tech into everyday life. By making available in-

formation needed for decision-making beyond

what we have access to with our five senses, it

effective Maes‘ MIT group, which includes sev-

en graduate students, were thinking about how

a person could be more integrated into the

world around them and access information

without having to do something like take out a

phone. They initially produced a wristband that

would read an Radio Frequency Identification

tag to know, for example, which book a user is

holding in a store. They also had a ring that

used infrared to communicate by beacon to su-

permarket smart shelves to give you infor-

mation about products. As we grab a package

of macaroni, the ring would glow red or green

to tell us if the product was organic or free of

peanut traces —whatever criteria we program

into the system. They wanted to make infor-

mation more useful to people in real time with

minimal effort in a way that doesn‘t require

any behavior changes. The wristband was get-

ting close, but we still had to take out our cell

phone to look at the information. That‘s when

they struck on the idea of accessing infor-

mation from the internet and projecting it. So

someone wearing the wristband could pick up

a paperback in the bookstore and immediately

call up reviews about the book, projecting them

onto a surface in the store or doing a keyword

search through the book by accessing digitized

pages on Amazon or Google books. They start-

ed with a larger projector that was mounted on

a helmet. But that proved cumbersome if some-

one was projecting data onto a wall then

turned to speak to friend — the data would

project on the friend‘s face.

Recent Prototype

Now they have switched to a smaller projector

and created the pendant prototype to be worn

around the neck. The Sixth Sense prototype is

composed of a pocket projector, a mirror and a

camera. The hardware components are coupled

in a pendant-like mobile wearable device. Both

the projector and the camera are connected to

the mobile computing device in the user‘s

pocket. We can very well consider the Sixth

Sense Technology as a blend of the computer

and the cell phone. It works as the device asso-

ciated to it is hanged around the neck of a per-

son and thus the projection starts by means of

the micro projector attached to the device.

Therefore, in course, you turn out to be a mov-

ing computer in yourself and the fingers act

like a mouse and a keyboard. The prototype

was built from an ordinary webcam and a bat-

tery-powered 3M projector, with an attached

mirror — all connected to an internet-enabled

mobile phone. The setup, which costs less than

$350, allows the user to project information

from the phone onto any surface — walls, the

body of another person or even your hand. Mis-

try wore the device on a lanyard around his

neck, and colored Magic Marker caps on four

fingers (red, blue, green and yellow) helped the

camera distinguish the four fingers and recog-

nize his hand gestures with software that Mis-

try created.

Page 50: Magnum opus 2k14f

COMPONENT OF SIXTH SENSE

TECHNOLOGY

The hardware components are coupled in a

pendant like mobile wearable device.

Camera: A webcam captures and recognizes an

object in view and tracks the user‘s hand ges-

tures using computer-vision based techniques.

It sends the data to the smart phone. The cam-

era, in a sense, acts as a digital eye, seeing what

the user sees. It also tracks the movements of

the thumbs and index fingers of both of the

user's hands. The camera recognizes objects

around you instantly, with the micro projector

overlaying the information on any surface, in-

cluding the object itself or your hand.

Mirror: The usage of the mirror is significant as

the projector dangles pointing downwards

from the neck.

Projector: Also, a projector opens up interac-

tion and sharing. The project itself contains a

battery inside, with 3 hours of battery life. The

projector projects visual information enabling

surfaces, walls and physical objects around us

to be used as interfaces. We want this thing to

merge with the physical world in a real physical

sense. You are touching that object and pro-

jecting info onto that object. The information

will look like it is part of the object. A tiny LED

projector displays data sent from the smart

phone on any surface in view–object, wall, or

person.

Mobile Component: The mobile devices like

Smartphone in our pockets transmit and re-

ceive voice and data anywhere and to anyone

via the mobile internet. An accompanying

Smartphone runs the Sixth Sense software, and

handles the connection to the internet. A Web-

enabled smart phone in the user‘s pocket pro-

cesses the video data. Other software searches

the Web and interprets the hand gestures.

Color Markers

It is at the tip of the user‘s fingers. Marking the

user‘s fingers with red, yellow, green, and blue

tape helps the webcam recognize gestures. The

movements and arrangements of these makers

are interpreted into gestures that act as inter-

action instructions for the projected applica-

tion interfaces.

APPLICATIONS

The Sixth Sense prototype implements several

applications that demonstrate the usefulness,

viability and flexibility of the system. The Sixth

Sense device has a huge number of applica-

tions. The following are few of the applications

of Sixth Sense Technology.

Page 51: Magnum opus 2k14f

This is the thrilling power of Sixth sense technology...

By Swastik Biswas

(B.E. 4th semester)

Making Calls Multimedia reading experience

Calling up Maps Checking Time

Drawing/Designing

Zooming applications

Page 52: Magnum opus 2k14f

Technology of Google

A s a Google user, you're familiar with the speed and accuracy of a Google search. How exactly does Google manage to find the right results for every query as quickly as it does? The heart of Google's search technology is PigeonRank™, a system for ranking web pages developed by Google founders Larry Page and Sergey Brin at Stanford University.

Building upon the breakthrough work of B. F. Skinner, Page and Brin reasoned that low cost pigeon clusters (PCs) could be used to compute the relative value of web pages faster than human editors or machine-based algorithms. And while Google has dozens of engineers working to improve every aspect of our service on a daily basis, Pigeon Rank continues to provide the basis for all of our web search tools. Why Google's patented Pigeon Rank™ works so well Pigeon Rank's success relies primarily on the superior trainability of the domestic pi-geon (Columba livia) and its unique capacity to recognize objects regardless of spatial orientation. The common gray pigeon can easily distinguish among items displaying only the minutest differ-ences, an ability that enables it to select relevant web sites from among thousands of similar pages. By collecting flocks of pigeons in dense clusters, Google is able to process search queries at speeds superior to traditional search engines, which typically rely on birds of prey, brooding hens or slow-moving waterfowl to do their relevance rankings. When a search query is submitted to Google, it is routed to a data coop where moni-tors flash result pages at blazing speeds. When a relevant result is observed by one of the pigeons in the cluster, it strikes a rubber-coated steel bar with its beak, which assigns the page a Pigeon Rank value of one. For each peck, the Pigeon Rank increases. Those pages receiving the most pecks, are returned at the top of the user's results page with the other results displayed in pecking order.

Page 53: Magnum opus 2k14f

Integrity Google's pigeon-driven methods make tampering with our results extremely difficult. While some unscrupulous websites have tried to boost their ranking by including images on their pages of bread crumbs, bird seed and parrots posing seductively in resplendent plumage, Google's PigeonRank technology cannot be deceived by these techniques. A Google search is an easy, honest and objective way to find high-quality websites with information relevant to your search.

Pi-

geon Rank Frequently Asked Questions How was Pigeon Rank developed? The ease of training pigeons was documented early in the annals of science and fully explored by noted psychologist B.F. Skinner, who demonstrated that with only minor incentives, pigeons could be trained to execute complex tasks such as playing ping pong, piloting bombs or revising the Abatements, Credits and Refunds section of the national tax code. Brin and Page were the first to recognize that this adaptability could be harnessed through massively parallel pecking to solve complex problems, such as ordering large datasets or ordering pizza for large groups of engineers. Page and Brin experimented with numerous avian mo-tivators before settling on a combination of linseed and flax (lin/ax) that not only offered superior performance, but could be gathered at no cost from nearby open space preserves. This open space lin/ax powers Google's operations to this day, and a visit to the data coop reveals pigeons happily pecking away at lin/ax kernels and seeds. What are the challenges of operating so many pigeon clusters (PCs)? Pigeons naturally operate in dense populations, as anyone holding a pack of peanuts in an urban plaza is aware. This compatibility enables Google to pack enormous numbers of pro-cessors into small spaces, with rack after rack stacked up in our data coops. While this is optimal from the standpoint of space conservation and pigeon contentment, it does create issues during molting season, when large fans must be brought in to blow feathers out of the data coop. Removal of other pigeon byproducts was a greater challenge, until Page and Brin developed groundbreaking technology for converting poop to pixels, the tiny dots that make up a monitor's display. The clean white background of Google's home page is powered by this renewable process.

Page 54: Magnum opus 2k14f

Aren't pigeons really stupid? How do they do this? While no pigeon has actually been confirmed for a seat on the Supreme Court, pigeons are surprisingly adept at making instant judgments when confronted with difficult choices. This makes them suitable for any job requiring accurate and authoritative decision-making under pressure. Among the positions in which pigeons have served capably are replacement air traffic controllers, butterfly ballot counters and pro football referees during the "no-instant replay" years. Where does Google get its pigeons? Some special breeding lab? Google uses only low-cost, off-the-street pigeons for its clusters. Gathered from city parks and plazas by Google's pack of more than 50 Phd’s (Pigeon-harvesting dogs), the pigeons are given a quick orientation on web site relevance and assigned to an appropriate data coop. Isn't it cruel to keep pigeons penned up in tiny data coops? Google exceeds all international standards for the ethical treatment of its pigeon personnel. Not only are they given free range of the coop and its window ledges, special break rooms have been set up for their convenience. These rooms are stocked with an assortment of delectable seeds and grains and feature the finest in European statuary for roosting. What's the future of pigeon computing? Google continues to explore new applications for Pigeon Rank and affiliated technologies. One of the most promising projects in development involves harnessing millions of pigeons world-wide to work on complex scientific challenges. For the latest developments on Google's distributed cooing initiative, please consider signing up for our Google Friends newsletter.

By Anil Kumar A

(B.E. 8th semester)

Page 55: Magnum opus 2k14f
Page 56: Magnum opus 2k14f

BRIGHTNING, THE DARK LANE

All the way in smudgy lane

Unkind air, water, the atmosphere blue.

This is my country we say in vain

The dark lane remains unseen and unheard too.

The child cries, in pain of hunger

What does the mother feed, with her empty hand?

Consoling the weak heart in hope of tomorrow

For nothing more than a piece of bread.

Time when the kid has to go out and play,

His hands are on the task tough.

Standing at the distant in a construction site

With the dream of school in bright time ahead

Deprived of love, nurture and care

Old man walks alone in the frigid world

Counting the days and moment left to unfold

Holding back the pain, praying for departure

Bridging the gap in the biased world,

Open the hands and hearts for the people unloved;

Spend a little time in sharing the knowledge,

Bring the brightness in the dark lane.

- Kanthi Komar

(B.E. 4th semester)

Page 57: Magnum opus 2k14f

"¯ÁAzÀæ...¤Ã£ÀÄ...ZÀA¢gÀ.."

¯ÁAzÀæªÀ »rzÀÄ ZÀA¢gÀ §AzÀ

¨Á¤£À JzÉAiÀÄ° ¨É¼ÀPÀ£ÀÄ vÀAzÀ

¸ÀªÉ¹zÀ ºÁ¢AiÀÄ £É£À¦£À vÀÄA§

eÉÆvÉAiÀįÉà CAnzÉ PÁtzÀ ©A§..

£À¸ÀÄvÀĸÀÄ ZÉzÀÄjzÀ ªÀÄÄV°£À M¼ÀUÉ

ºÉ¥ÀÄàUÀnÖzÁ ºÀ¤UÀ¼À ¨É¸ÀÄUÉ..

M¼ÀUÀÆ ºÉÆgÀUÀÆ §tÚzÀ ¨ÉgÀUÀÄ

£ÉjUÉð £ÁazÉ CAa£À ¸ÉgÀUÀÄ..

ZÀAzÀæ£À G¹j£À «ÄrvÀzÀ ®AiÀÄPÉ

PÀqÀ°£À C¯ÉAiÀÄ° ºÉaÑzÀ ¸É¼ÀªÀÅ..

ºÀgÀrzÀ ªÀļÀ®° §gÉzÀgÉ §AiÀÄPÉ

¨ÉgɪÀÅzÉà CzÀgÉƼÀÄ ¨ÉgÀ½£À M®ªÀÅ..

IÄvÀĪÀ° ¤Ã£ÀÄ ¥À¸Àj¸É ªÀÄzsÀĪÀ

vÉÆzÀ°zÀ ZÀA¢gÀ ¤£ÁßUÀªÀÄPÉ..

PÀ£À¸À° ¤£Àß PÀ°à¹ £ÉÆÃqÀĪÀ

ªÀÄ£ÀzÀ° vÀÄA©zÉ ¤Ã ZÀqÀ¥ÀrPÉ..

¤£ÀßAiÀÄ ¸À¤ºÀ¢ ¥ÀætAiÀĪÀ £É£ÉzÀÄ

¯ÁAzÀæªÀ «ÄtÄQ¹ ZÀA¢gÀ ºÀ®Ä©zÀ£ÀÄ..

¤£ÀßAiÀÄ £ÉgÀ¼À¯Éà ZɮĪÀ£ÀÄ ªÉÆUÉzÀÄ

£É£À¦£À ¨É¼ÀPÀ¯Éà ZÀA¢gÀ PÀgÀVzÀ£ÀÄ...

~`²æÃ'

vÀ®UÉÃj

Page 58: Magnum opus 2k14f

“EXAMS A DISGUISED CRUELTY”

In a deep sleep after a long tiring day,

He finds himself struggling for answers not falling the right way,

Few problems of math in his dreams, which are lying on the desk,

Is making him fight in his sleep to find the value of ‘x’ .

His peace of mind is at stake,

Even in his sleep he is so awake.

The element working as an alarm for him these days is called tension,

The thickness of the syllabus book is apparently gaining all his attention.

He wakes up unplanned and starts learning his lessons,

The fast moving hands of the clock is leaving him in aggression.

This is not the condition pointing out to one or two,

Everyone has gone through it and exceptions may be only few.

Relaxation is the requirement of the time being,

Please tell the acquirers of rights to treat students as human beings.

Exams are not the way to judge someone’s capabilities,

It is a harsh punishment doubting one’s ability.

If that is how it still has to identify an individual,

So be it, but at least change the culture of marks to something a little trivial.

Page 59: Magnum opus 2k14f

Why change the entire life of someone just on the basis of few papers?

Isn’t it so demotivating for all the destiny believers?

The system of examination and the consequential atmosphere,

is leaving the most beautiful creations in despair.

It’s not about studies although as a whole,

It’s about the cruelty of judgements which unfairly decides one’s role.

But there’s nothing worthy in craving for any change in this so called modern

system,

This culture is going to prevail years after years like a custom.

And as of now, I can just make an attempt to voice the thoughts, with which

most of us are cribbing,

Rest is for later, because now even I have to go and get eligibility after beauti-

fully scribbling.

- Priya Agarwal

(B.E. 6th semester)

Page 60: Magnum opus 2k14f

"ºÀ¹ªÀÅ.."

SÁ° ºÁ¼ÉAiÀÄ ªÉÄÃ¯É ªÀÄÆrzÉ

§gɪÀ ¨ÉgÀ½£À ªÉÆÃlÄ £ÉgÀ¼ÀÄ..

©¢gÀ vÀÆvÀ° UÁ½ ¸ÁVzÉ

±ÀÄæwAiÀÄ »rAiÀÄ®Ä ¤gÀvÀ PÉƼÀ®Ä..

PÀvÀÛ¯ÉAiÀÄ ¤©qÀ KPÁAvÀ

§AiÀĸÀĪÀÅzÀÄ ¨É¼ÀQ£Á ¸ÀAVÃvÀ..

ºÀ©âgÀĪÀ ®vÉAiÀÄ ¸É¼ÉvÀ

ªÀÄgÀzÉƼÀUÉ ¨É¼É¸ÀĪÀÅzÀÄ ©VvÀ..

PÀuÉÚªÉAiÀÄ vÀÄ¢AiÀÄ §tÚPÀÆ

PÀ£À¹£ÉÆA¢UÉ vÁ ¨ÉgɪÀ vÀªÀPÀ

ªÀÄuÉÚzÉAiÀÄ ¥Àæ¸ÀªÀ UÀAzsÀPÀÆ

¤ÃgÀºÀ¤UÀ¼À £ÁdÆPÀÄ ¥ÀļÀPÀ

eÁjgÀĪÀ ¸ÉgÀUÀ PÀA¥À£À

ªÀÄzÀ£À ªÀļÉAiÀÄ ªÉÆzÀ® UÀÄgÀÄvÀÄ

EA¢æAiÀÄzÀ C¢gÀ GvÀÍ£À£À

©¹AiÀÄĹgÀ ¸ÀĽAiÉƼÀUÉ ¨ÉgÉvÀÄ..

ºÀ¹zÀ GzÀgÀzÀ MAn PÀÆUÀÄ

ºÁqÁVzÉ eÉÆÃVAiÀiÁ vÀA§Æj vÀAwAiÀÄ°..

ªÀÄ£ÀzÀ §AiÀÄPÉUÉ £ÀÆgÀÄ ¸ÉÆÃUÀÄ

vÀAVºÀÄzÀÄ ºÀ¹ªÀÅ F §zÀÄPÀ ¹Ã¸ÉAiÀÄ°..

~`²æÃ'

vÀ®UÉÃj

Page 61: Magnum opus 2k14f

INNOCENSE SMILES

She feels her hand, coins her mother gave

For the candy she loved and longed for days

Amused by the glossy store, for which she crave

She hops into the place where all her merriness lies

Her wavering eyes wandering everywhere

Sticks on a big colourful candy stick

She sees the grinning shopkeeper there,

She decides on a few toffies to pick

Counting the handful of coins twice

Wishing if she had few more

Sharing toffies with kid bother wherein happiness lies

More or less in her, the innocence smiles

She races down the muddy lane

Pebbles don’t seem to hurt her barefoot

Her joyful true laugh masks the pain

To the dusk, bright colour it brings

- Kanthi Komar

(B.E. 4th semester)

Page 62: Magnum opus 2k14f

Why this examveri examveri examveri di …

Distancile friends friends, friends mind sharp

Exam teacher strict, strict, My future dark

Why this examveri examveri examveri di …

White colour paper, paper paper print blake

time waste …

Why this examveri examveri examveri di …

pe pe pa pan pe pe pan

Seriya vasi

Ready 1 2 3 4 …

Tune changes …

Kayila paper … only English …

Handla paper, paper question eyes fulla tear …

Empty brain, exam come, life reverse gear …

Friend u friend u oh my friend please

Show me answers now u

God I’m dying now

Please make pass now …..

Examveri

Page 63: Magnum opus 2k14f

IN THE REALM OF

PAINTING...

I ts usual Sunday morning time, Vikram had

his own work to complete assessment given to

him. He had started to complete it and put

brush into colors, revolved it round and round

likewise his rounded mind with rounded

thoughts. He just kept brush on drawing paper

and glanced towards garden where he used to

seat as usual. It’s the daily work he had. Again

he turned his moody face and suddenly meet

to a shock. He shouted “Oh! What a natural

beauty she has got” His gaze becomes fixed

and now it’s hard to pull it away from her deli-

cious beauty. She was a charming girl wonder-

ing in garden just like a butterfly. A shiny glow-

ing face with long curly hears. She was smiling

from the heart and her laughter made flowers

to open there petals. Fragrance of beauty

turned the garden into the heaven. She was so

pretty than the flowers on which her hands

were fluttering. Oh! What a lucky flower. For a

movement if I may be that flower! Still Vikram

was in her thoughts even if she had left the

garden. His eyes were looking wonders of sky

created in his mind that comes out through the

painting.

Now Vikram was waiting for next Sun-

day awaiting her thoughts On Sunday Vikram

went into the garden. His eyes were thirsty of

her look. God’s grace She comes as sun was ris-

ing. Same charming face same smiling chicks.

Her hairs were talking with air and making it

too cool. Vikram handled his painting papers

and colors. She nodded. She had understood,

there was something wrong with that guy who

was trembling with his hands. Now Vikram was

totally buried in the painting. She was looking

towards him with doubtful gaze. Vikram had

completed his sketch and turned up his face.

She puzzled and turned back. Vikram had not

understood what to do. He just smiled but she

was not there to look after him. Now it was my

passion to aspire her on the paper.

AT THE EXHIBITION: She came there as

I was looking for her ! My paintings were only

for her. She went at my painting and smiled

looking towards me. She wrote there a com-

ment “It’s impossible to understand what’s go-

ing through a guy’s heart” She smiled again and

went off the center. It was my prestige to have

her comment. It was the realm of painting for

someone’s smile. To see someone happy all the

time.

One day she was unable to come into the

garden and I was waiting for still midday. In

the next exhibition I posted a blank paper. She

came as usual. She might have understood

what I mean to say! She smiled and wrote there

a comment “Don’t keep me in your heart just

take out and put me on the paper” My brain

had understood what she wants to say but my

heart was getting too much eccentric to my

brain. Heart was thinking different and my

brain didn’t want to make any clearance. It was

the relation between mind, connection between

soul, understanding without talk, and truest

contact of two hearts flirting in the garden.

Page 64: Magnum opus 2k14f

One day I paint the painting having

many colorful ways but there was only two

guys finding the ways for life… She wrote a

comment “Though it was precious to choose

colorful ways of life but these were pseudo

ways having no destination”. Best effort but for

what ..?? Today I have my best effort with col-

ors. Colors are my life but now I lost all sense

to determine the favorite. My love is not the

color it is she the gorgeous s beauty..! For

whom I kept my soul on paper. This color

blindness of mind made me to paint her ear

ring with wrong color i.e. pink. She wrote there

a comment “Watch the nature Catch the

truth” (See me as natures don’t ever try to

change it, it’s dangerous.) Vikram had under-

stood what the girl wants to say..! But she did-

n’t understand his color of heart that it was

PINK..! She had tried to know the language of

painting but failed to understand expressions

of color.

VIKRAM BROKEN UP Next Sunday morn-

ing Vikram was waiting for her with wet brush

and wet heart..!! She did not came. Vikram saw

her on next exhibition but this time with

friends having fun. Today she didn’t glanced at

me and my colors my life my painting..! She

went without commenting a single word. She

had gone with nothing in her hand but every-

thing in her soul.

NEXT TRACK: May she felt guilty some-

thing wrong may she felt something missing,

She came back to comment…! But Vikram was

not there…! There was some ash and wounded

brushes in it…! “What happened to Vikram” her

mind was asking this question again and again.

She lean forward two steps ahead and get

stroked. Vikram had burned that painting. He

made color with ash and wrote something….

“NEVER AGAIN” She screamed out and heard a

soft voice “I felt it was my mistake. If my

painting is not making someone to feel happy

then what is the use of this god’s gift…..! I can’t

make her to understand the language of colors.

But there is only one way to get rid of this mis-

cellaneous And it was my last painting.

“Although I say I hate you now, I’ll be missing

you” …

- Vishwanth Koli

M. Tech 2nd semester

Page 65: Magnum opus 2k14f
Page 66: Magnum opus 2k14f
Page 67: Magnum opus 2k14f
Page 68: Magnum opus 2k14f
Page 69: Magnum opus 2k14f
Page 70: Magnum opus 2k14f
Page 71: Magnum opus 2k14f

Om Ganesha!

by Mrs. Deepa T.P.

Assistant Professor

(CS Faculty)

Page 72: Magnum opus 2k14f

by Mrs. Deepa

T.P., Assistant

Professor

(CSE Faculty)

by Shreedhar Bhat

(B.E. 4th semester)

The colourful

Peacock

It is more than what meets the eye

Page 73: Magnum opus 2k14f

by Navya G.

(B.E. 4th semester)

by Rohit

(B.E. 4th semester)

Art is Life!

Love is Immortal…

Page 74: Magnum opus 2k14f

TOPPERS LIST

Sl. No. Name USN 1st & 2nd Semester Percentage

(%)

1 UJJWAL JAIN 1AY12CS122 1377 88.83%

2 SHREEDHAR BHAT 1AY12CS095 1370 88.38%

3 JOHNSON 1AY12CS044 1327 85.6%

Sl. No. Name USN 3rd & 4th Semester Percentage

(%)

1

PADMA SUDHA 1AY11CS060 1497 83.16%

POOJA BHATIA 1AY11CS080

2 TANUSHREE Y 1AY11CS129 1462 81.22%

3 GRISH .N 1AY11CS043 1439 79.94%

Sl. No. Name USN 5th & 6th Semester

Marks

Percentage (%)

1 MOUSHUMI MAHATO 1AY10CS035 1424 79.11%

2 SHWETHA S 1AY10CS075 1397 77.61%

3 SWAPNEEL A.

KULKARNI 1AY10CS083 1387 77.0%

Page 75: Magnum opus 2k14f

Sl. No. Name USN 1st & 2nd Semester

Marks

Percentage (%)

1 CHANNABASAMMA 1AY12SCS07 1049 80.6%

2 NALINA S. 1AY12SCS16 1015 78.07.%

3

SHRUTHI

CHANDRASHEKHAR

KAMOJI

1AY12SCS23 994 76.46%

Page 76: Magnum opus 2k14f

PLACEMENTS

NITIN GUPTA GLOBAL STEP GAMING,

PUNE

ARUN S. IGATE

CHARITH KUMAR JAIN TCS, IGATE

DHRUVA M. IGATE

GAURAV DWIVEDI IGATE

AAYUSHI

BHATTACHARYA IGATE

AVINASH NISHANT S. IGATE

MOUSHUMI MAHATO IGATE

NEETIKA SINGH IGATE

ANKITA KUKRETI IGATE

RESHMA R. IGATE, MPHASIS Ltd

SOURAV AGARWAL IGATE

SWAPNEL KULKARNI IGATE

MANAV SHARMA MPHASIS Ltd

GIRISH PRASAD K.S. HP

Page 77: Magnum opus 2k14f

SWATHIKIRAN S. HP

SOME ADITHYA MAN-

DAL CSC

GAJENDER PANDEY CSC

VINOD S. BHISTE CSC

SAMEE ALAM CSC

NIKITHA N. CSC

MANASA P. CSC

NAGARAJ

BOMMASHETTI G. CSC

M.S. NAVEEN KUMAR CSC

PRAMOD M.A. CSC

MANJUSHREE M.P. CSC

NEHA FARYA CSC

ANILKUMAR A. SONATA SOFTWARE

RISHABH SACHAN

SONATA SOFTWARE

SHABNAM

BANDYOPADHYAY SONATA SOFTWARE

Page 78: Magnum opus 2k14f

If you think you know your teachers…. Well think again!!! ;)

Page 79: Magnum opus 2k14f
Page 80: Magnum opus 2k14f