+ All Categories
Home > Documents > Lakshya Final

Lakshya Final

Date post: 07-Apr-2018
Category:
Upload: patilssp
View: 223 times
Download: 0 times
Share this document with a friend
45
Page | 1
Transcript

8/4/2019 Lakshya Final

http://slidepdf.com/reader/full/lakshya-final 1/45

P a g e | 1

8/4/2019 Lakshya Final

http://slidepdf.com/reader/full/lakshya-final 2/45

P a g e | 2

8/4/2019 Lakshya Final

http://slidepdf.com/reader/full/lakshya-final 3/45

P a g e | 3

Editor-in-Chief  

Dr. R. G. Tated, Principal, MIT(E), Aurangabad

Editorial Board 

Dr. C. G. Desai, Head MCA Department

Prof. K V Bhosle, Head Computer Science and Engineering Department

Prof. V. M. Kulkarni, Head Electronics and Communication Department

Prof. S. M. Badave, Head Electrical and Electronics Department

Prof. S. V. Mhaske, Head Architecture Department

Prof. S. R. Andhale, Head Mechanical Engineering Department

Prof. A. M. Naphade, Head Information Technology Department

Prof. A. W. Yerekar, Head Civil Engineering Department

Prof. R. D. Mahajan, Head Engineering Science and Humanities Department

Associate Editors

Prof. J. A. Kamble, Computer Science and Engineering Department

Prof. S. B. Atre, Architecture Department

Prof. S. S. Patil, Mechanical Engineering Department

Prof. A. Nair, MCA Department

Prof. M. S. Joshi, Electronics and Communication Department

Prof. S. R. Survase, Civil Engineering Department

Cover page Design: Prof. J. A. KambleSatish, Saurabh

8/4/2019 Lakshya Final

http://slidepdf.com/reader/full/lakshya-final 4/45

P a g e | 4

8/4/2019 Lakshya Final

http://slidepdf.com/reader/full/lakshya-final 5/45

P a g e | 5

Android Operating System

In Mobile Phones:-

Like a computer operating system, amobile operating system is the software

platform on top of which other programsrun. When you purchase a mobile device,the manufacturer will have chosen theoperating system for that specific device.The operating system is responsible fordetermining the functions and featuresavailable on your device, such asthumbwheel, keyboards, WAP, e-mail, textmessaging and more. The mobile operatingsystem will also determine which third-party applications can be used on your

device. Some of the more common andwell-known Mobile operating systemsinclude the following:- Symbian OS-Windows Mobile-Palm OS-Mobile Linux:-MXI-Android

Android, initially developed by AndroidInc was bought by Google in 2005.

Android is based upon a modified versionof the Linux kernel. The Android OpenSource Project (AOSP) is tasked with themaintenance and further development ofAndroid. Android has a large community ofdevelopers writing application programthat extend the functionality of the devices.There are currently over 200,000 appsavailable for Android. Android Market isthe online app store run by Google, thoughapps can be downloaded from third-party

sites.Developers write primarily in the Javalanguage, controlling the device via Google-developed Java libraries. Python, Ruby andother languages are also available forAndroid development via the AndroidScripting Environment. The Androidoperating system consists of 12 million lines

of code including 3 million lines of XML, 2.8million lines of C, 2.1 million lines of Java,and 1.75 million lines of C++.

Features:-UI refinements for simplicity and speed

The user interface is refined in many waysacross the system, making it easier to learn,faster to use, and more power-efficient. Asimplified visual theme of colors againstblack brings vividness and contrast to thenotification bar, menus, and other parts ofthe UI. Changes in menus and settingsmake it easier for the user to navigate and

control the features of the system anddevice.

Faster, more intuitive text input

The Android soft keyboard is designed andoptimized for faster text input and editing.The keys themselves are shaped andpositioned for improved targeting, makingthem easier to see and press accurately,even at high speeds. The keyboard alsodisplays the current character anddictionary suggestions in a larger, morevivid style that is easier to read.

Improved power managementThe Android system takes a more activerole in managing apps that are keeping thedevice awake for too long or that areconsuming CPU while running in thebackground. By managing such apps —closing them if appropriate — the systemhelps ensure best possible performance andmaximum battery life.

The system also gives the user morevisibility over the power being consumedby system components and running apps.The Application settings provide anaccurate overview of how the battery isbeing used, with details of the usage andrelative power consumed by eachcomponent or application.

8/4/2019 Lakshya Final

http://slidepdf.com/reader/full/lakshya-final 6/45

P a g e | 6

New ways of communicating, organizing Internet calling  The user can make voice calls over theinternet to other users who have SIPaccounts. The user can add an internet

calling number (a SIP address) to anyContact and can initiate a call from QuickContact or Dialer. To use internet calling,the user must create an account at the SIPprovider of their choice — SIP accounts arenot provided as part of the internet callingfeature.Additionally, support for the platform's SIPand internet calling features on specificdevices is determined by theirmanufacturers and associated carriers.

Near-field communicationsAn NFC Reader application lets the userread and interact with near-fieldcommunication (NFC) tags. For example,the user can “touch” or “swipe” an NFC tagthat might be embedded in a poster, sticker,or advertisement, then act on the data readfrom the tag. A typical use would be to reada tag at a restaurant, store, or event andthen rate or register by jumping to a website whose URL is included in the tag data.

NFC communication relies on wirelesstechnology in the device hardware, sosupport for the platform's NFC features onspecific devices is determined by theirmanufacturers.

Downloads managementThe Downloads application gives the usereasy access to any file downloaded from thebrowser, email, or another application.Downloads is built on an completely new

download manager facility in the systemthat any other applications can use, to moreeasily manage and store their downloads.

CameraThe application now lets the user accessmultiple cameras on the device, including afront-facing camera, if available.

-Aditya A Akolkar-BE CSE 

8/4/2019 Lakshya Final

http://slidepdf.com/reader/full/lakshya-final 7/45

P a g e | 7

Eco_Ganpati

I have created an eco friendly Ganpati

from old newspapers clay. I

have also designed the Ganpati Makhar

from handmade paper and waste

Invitation cards .

List of material for Ganpati Murti:

1. Old news papers(80%)

2. Whitening powder (20%)

3. Glue in small amount (Gum)

4. Water

5. Colors

List of material for Ganpati Makhar:

1. Handmade paper

2. Old Invitation cards (Lagnapatrika)3. Glue/Gum

4. Old waste Box.

Some of the snapshots are:

List of materials used for Dekhava

(Statues and mountain)

1. Clay

2. Old news paper

3. Tissue paper

4. Glue

5. Colors

6. Aleev seeds (for trees in Dive Ghat)

The Ganpati murthi, Ganesh makhar

and the statues of Various

Saints are Hand made...

Mrs.Shilpa Avinash Sanap

Assist. Prof. in CSE Dept.

8/4/2019 Lakshya Final

http://slidepdf.com/reader/full/lakshya-final 8/45

P a g e | 8

LIFE

Life is just an endless stream of experiences

some are good, some are bad, some are

sweet, some are bitter, Learn to make the

best of them. Even if the neem flower isbitter, the nectar inside is sweet so it is with

life.

A pleasant experience demands a happy

disposition and makes everybody around

happy. So your life should be flowing and

happy like a river. Don’t ever let the mass of

gloom settle on the surface. If your heart is

happy, your face will reflect the feeling. Be

happy and let your face flow with thatspecial light this life is for joy and hope.

By the way where does happiness come

from? Is it available in the market? Or is it

  just covered on the face like powder and

lipstick? Happiness is never on scale, it is

available to everybody because it resides in

the heart of everyone. All the feelings and

emotions fill the heart and play games.

Some people are pessimists that means theyalways look at the gloomy side of life, they

are always unhappy.” Oh! It’s my fate”,

they say or “my luck is bad” they grumble,

but if it good? Has god really made things

so tragic for some people? Of course not. It

is just that such people do not understand

the wonders of life.

One thing you can do is that practise

focusing on “here & now” as often as you

can. Remind yourself that you really have

only this moment.

Stop warring about the future and

rehearsing the past, make a commitment to

yourself to protect and treasure your life

force, energy, every day in a positive andgentle way.

“God loves the cheerful giver” so let

us strive to be content in what we have and

enjoy the sweetness of life and be ready to

open our heart to the various experience of

life.

-Shriprasad Durgadas Joshi

TE- B CSE

************************************************

8/4/2019 Lakshya Final

http://slidepdf.com/reader/full/lakshya-final 9/45

P a g e | 9

PAR-RENT…..

Parents are our most gods,

 Who give life and the earth for us to be

And I am indubitable thankful to them,

That we got our god to see….

They give a rhythm to the music,

Pluck a thorn in vain,

They shap up the fallacy,

As they are our umbrella in the rain….

Parents give fragrance to a flower,

There by improving its beauty

Although they do would our worries

lower,

As they eradicate our enmity….

They do lend to us their sagacious

thoughts,

That one could think never in his dreams

They think before they give-off plights,

As they protect us so it seems…..

Its not a wow,

That my parents shalln’t stay with me

forever

But still I know,

They will surely stay in my heart and

behaviour forever….

My parents are my god,

As every one’s may matter

They are indoubty odd,

So they possess god’s character….

I have no more to say,

As their goodness is till infinity

They are god, no-way,

 We must remember this till externity….

– Shriprasad Durgadas Joshi

T.E. (B) C.S.E.

8/4/2019 Lakshya Final

http://slidepdf.com/reader/full/lakshya-final 10/45

P a g e | 10

Sixth Sense Technology

INTRODUCTION

  Sixth Sense is a wearable gesturalinterface that augments the

physical world around us with

digital information and lets us use

natural hand gestures to interact

with that information.

  Sixth Sense bridges the gap by

bringing intangible, digital

information out into the tangible

world, and allowing us to interact

with this information via natural

hand.

  Sixth Sense comprises a pocket

projector, a mirror and a camera.

  The hardware components are

coupled in a pendant like mobile

wearable device

 WHY SIXTH SENSE?

Fig: sixth sense 

COMPONENTS (pictorial view)

  Camera

 Projector

  Mirror

  Mobile Component

  Colored Markers

8/4/2019 Lakshya Final

http://slidepdf.com/reader/full/lakshya-final 11/45

P a g e | 11

CAMERA

  Captures an object in view and

track the users hand gestures.

  It sends the data to smart phones.

  It acts as a DIGITAL EYE,

connecting you to the world of

digital information.

PROJECTOR

  The projector projects visualinformation enabling surface and

physical objects to be used as

interfaces.

  The project itself contains a battery

inside, with 3 hours of battery life.

  A tiny LED projector displays data

sent from the phone on any surface

in view –object, wall, and person.

MIRROR

  The usage of the mirror is

significant as the projector dangles

pointing downwards from the

neck.

SMART PHONE

  A web enabled smart phone in the

users pocket processes the video

data interprets the hand gestures.

  Other software searches the web &

interprets the hand gestures.

8/4/2019 Lakshya Final

http://slidepdf.com/reader/full/lakshya-final 12/45

P a g e | 12

COLOR MARKERS

  It is at the tip of users fingers.

  Marking the user’s fingers with

red, yellow, green, blue tape helps

the webcam recognize gestures.

  The movement and arrangement

of these markers are interpreted

into gestures that act as interaction

instruction for the projectedapplication interfaces.

SIXTH SENSE PROTOTYPE

(PICTORIAL VIEW)

HOW IT WORKS? (Pictorial view)

HOW IT WORKS? (Theory)

  The hardware that makes sixth

sense work is a pendant like

mobile wearable interface.

8/4/2019 Lakshya Final

http://slidepdf.com/reader/full/lakshya-final 13/45

P a g e | 13

  It has a camera, a mirror, projector,

and is connected wirelessly to a

Bluetooth smart phone that can

slip comfortably into one’s pocket.

  Camera recognizes individuals,

images, pictures, gestures one

makes with their hands.

  Information is sent to the smart

phone for processing.

  The downward facing projector

projects output image onto the

mirror.

  Mirror reflects image onto the

desired surface.

  Thus, digital information is freed

from its confines and placed in the

physical world.

APPLICATIONS

 WEAR UR WORLD (WUW)

• WUW projects information onto

surfaces, walls, and physical

objects around us.

MAKE A CALL AND MULTIMEDIA

READING

• Phone Call: You can call to your

friend by typing the numbers on

your hand. It displays the keypad

of the phone over your palm and

the key appears on the four

fingers.

• Newspapers: Did you saw the

moving pictures of the

Newspaper in the movie Harry

Patter; it is quite similar to it. It

Searches the most appropriate

video from the web by seeing the

headlines or the caption of the

News report. Use your hand's

finger to press the keys.

8/4/2019 Lakshya Final

http://slidepdf.com/reader/full/lakshya-final 14/45

P a g e | 14

CHECK THE TIME and CALL UP A

MAP 

  Draw a circle on your wrist to get a

virtual watch that that gives you

the correct time.

  With the map application we can

call up the map of our choice and

then thumbs index fingers to

navigate the map.

TAKE PICTURE

• The user interacts with the

projected information through

natural hand gestures, arm

movements, or interaction with the

object itself.

FEED INFORMATION ON PEOPLE

  By using sixth sense technology

the user can convert anything as a

surface.

(Wall, hand, newspaper)

If we using sixth sense technology

it will give u information about the

thing you are looking.

8/4/2019 Lakshya Final

http://slidepdf.com/reader/full/lakshya-final 15/45

P a g e | 15

DRAWING APPLICATION (ZOOMING

IN/OUT)

Draw Picture

Zoom in

Zoom Out

Get Flights Update

Get Product Info.

Get Book Information

8/4/2019 Lakshya Final

http://slidepdf.com/reader/full/lakshya-final 16/45

P a g e | 16

 WORLD AROUND US

  Sixth Sense analyses what the user

sees and visually augments

surfaces or physical objects the

user is interacting with.

ADVANTAGES

  Portable

  Support multi touch and multi

user interaction

  Connectedness between world and

information

  Cost effective

  Data access directly from machine

in real time

  Mind map the idea anywhere

  It is an open source

COST & AVALIBLITY

  The device can be made in current

prototype system costs

approximately $350 to build.

  In Indian currency Rs. 17000.

  Sixth Sense hardware and software

at present works with

Smartphone’s.

  The software’s source code will be

available on an open-source

model. AS THE STATEMENT OF

its MAKER.

DEVELOPER OF SIXTH SENSE

TECHNOLOGY

  Pranav Mistry is the inventor of

Sixth Sense.

  He is a research assistant and a

PhD candidate at MIT Media Lab.

  Pranav holds a Master in Media

Arts and Sciences from MIT andMaster of Design from IIT Bombay 

besides his Bachelor degree in

Computer Engineering from

Nirma Institute Of Technology,

Ahmedabad..

  Sixth Sense has been awarded 2009

Invention Award by Popular

Science. Pranav also won Young

Innovator Award by Technology

Review.

8/4/2019 Lakshya Final

http://slidepdf.com/reader/full/lakshya-final 17/45

P a g e | 17

CONCLUSION

  Sixth sense recognize object

around displaying information

automatically and letting us to

access it any way to need.

  The six sense prototype

implements several applications

that demonstrate the usefulness,

viability and flexibility of system.

  Allowing us to interact with this

information via natural hand

gestures.

  The potential of becoming the

ultimate “transparent” userinterface for accessing information

about everything around us.

Miss. Madhuri Bagdane

Lecturer in IT Dept.

8/4/2019 Lakshya Final

http://slidepdf.com/reader/full/lakshya-final 18/45

P a g e | 18

Computer Aided Engineering – An overview

Computer-aided engineering  (CAE) is

the broad usage of computer software toaid in engineering tasks. It includescomputer-aided design (CAD),computer-aided analysis (CAA),computer-integrated manufacturing(CIM), computer-aided manufacturing(CAM), material requirements planning(MRP), and computer-aided planning(CAP). Software tools that have beendeveloped to support these activities areconsidered CAE tools. CAE tools arebeing used, for example, to analyze therobustness and performance ofcomponents and assemblies. The termencompasses simulation, validation, andoptimization of products andmanufacturing tools. In the future, CAEsystems will be major providers ofinformation to help support designteams in decision making.

In regard to information networks, CAEsystems are individually considered asingle node on a total informationnetwork and each node may interactwith other nodes on the network.

CAE systems can provide support tobusinesses. This is achieved by the useof reference architectures and theirability to place information views on thebusiness process. Reference architectureis the basis from which informationmodel, especially product and

manufacturing models.

The term CAE has also been used bysome in the past to describe the use ofcomputer technology withinengineering in a broader sense than justengineering analysis. It was in this

context that the term was coined by

  Jason Lemon, founder of SDRC in thelate 1970s. This definition is howeverbetter known today by the terms CAxand PLM.

CAE fields and phases

CAE areas covered include:

•  Stress analysis on componentsand assemblies using FEA (Finite

Element Analysis);•  Thermal and fluid flow analysis

Computational fluid dynamics(CFD);

•  Kinematics;•  Mechanical event simulation

(MES).•  Analysis tools for process

simulation for operations such ascasting, molding, and die pressforming.

  Optimization of the product orprocess.

In general, there are three phases in anycomputer-aided engineering task:

•  Pre-processing – defining themodel and environmental factors

8/4/2019 Lakshya Final

http://slidepdf.com/reader/full/lakshya-final 19/45

P a g e | 19

to be applied to it. (typically afinite element model, but facet,voxel and thin sheet methods arealso used)

•  Analysis solver (usually

performed on high poweredcomputers)•  Post-processing of results (using

visualization tools)

This cycle is iterated, often many times,either manually or with the use ofcommercial optimization software.

CAE in the automotive industry

CAE tools are very widely used in the

automotive industry. In fact, their use

has enabled the automakers to reduce

product development cost and time

while improving the safety, comfort,

and durability of the vehicles they

produce. The predictive capability of

CAE tools has progressed to the point

where much of the design verification is

now done using computer simulations

rather than physical prototype testing.CAE dependability is based upon all

proper assumptions as inputs and must

identify critical inputs (BJ). Even though

there have been many advances in CAE,

and it is widely used in the engineering

field, physical testing is still used as a

final confirmation for subsystems due to

the fact that CAE cannot predict all

variables in complex assemblies (i.e.

metal stretch, thinning).

Finite element method

The finite element method (FEM) (itspractical application often known asfinite element analysis (FEA)) is anumerical technique for findingapproximate solutions of partialdifferential equations (PDE) as well as ofintegral equations. The solution

approach is based either on eliminatingthe differential equation completely(steady state problems), or rendering thePDE into an approximating system ofordinary differential equations, whichare then numerically integrated usingstandard techniques such as Euler'smethod, Runge-Kutta, etc.

In solving partial differential equations,the primary challenge is to create an

equation that approximates the equationto be studied, but is numerically stable,meaning that errors in the input andintermediate calculations do notaccumulate and cause the resultingoutput to be meaningless. There aremany ways of doing this, all withadvantages and disadvantages. TheFinite Element Method is a good choicefor solving partial differential equationsover complicated domains (like cars and

oil pipelines), when the domain changes(as during a solid state reaction with amoving boundary), when the desiredprecision varies over the entire domain,or when the solution lacks smoothness.For instance, in a frontal crashsimulation it is possible to increaseprediction accuracy in "important" areas

8/4/2019 Lakshya Final

http://slidepdf.com/reader/full/lakshya-final 20/45

P a g e | 20

like the front of the car and reduce it inits rear (thus reducing cost of thesimulation). Another example would bein Numerical weather prediction, whereit is more important to have accurate

predictions over developing highly-nonlinear phenomena (such as tropicalcyclones in the atmosphere, or eddies inthe ocean) rather than relatively calmareas.

The finite element method originatedfrom the need for solving complexelasticity and structural analysisproblems in civil and aeronauticalengineering. Its development can betraced back to the work by AlexanderHrennikoff (1941) and Richard Courant 

(1942). While the approaches used bythese pioneers are different, they shareone essential characteristic: meshdiscretization of a continuous domaininto a set of discrete sub-domains,usually called elements. Starting in 1947,Olgierd Zienkiewicz from ImperialCollege gathered those methodstogether into what would be called theFinite Element Method, building the

pioneering mathematical formalism ofthe method.

Hrennikoff's work discretizes thedomain by using a lattice analogy, whileCourant's approach divides the domaininto finite triangular sub regions tosolve second order elliptic partialdifferential equations (PDEs) that arisefrom the problem of torsion of acylinder. Courant's contribution was

evolutionary, drawing on a large bodyof earlier results for PDEs developed byRayleigh, Ritz, and Galerkin.

Development of the finite elementmethod began in earnest in the middleto late 1950s for airframe and structuralanalysis and gathered momentum at the

University of Stuttgart through thework of John Argyris and at Berkeleythrough the work of Ray W. Clough inthe 1960s for use in civil engineering. Bylate 1950s, the key concepts of stiffness

matrix and element assembly existedessentially in the form used today.NASA issued a request for proposals forthe development of the finite elementsoftware NASTRAN in 1965. Themethod was again provided with arigorous mathematical foundation in1973 with the publication of Strang andFix's   An Analysis of The Finite Element Method, and has since been generalizedinto a branch of applied mathematics fornumerical modeling of physical systemsin a wide variety of engineeringdisciplines, e.g., electromagnetism,thanks to Peter P. Silvester and fluiddynamics.

FEA Applications

A variety of specializations under theumbrella of the mechanical engineeringdiscipline (such as aeronautical,biomechanical, and automotive

industries) commonly use integratedFEM in design and development of theirproducts. Several modern FEMpackages include specific componentssuch as thermal, electromagnetic, fluid,and structural working environments.In a structural simulation, FEM helpstremendously in producing stiffness andstrength visualizations and also inminimizing weight, materials, and costs.

FEM allows detailed visualization ofwhere structures bend or twist, andindicates the distribution of stresses anddisplacements. FEM software provides awide range of simulation options forcontrolling the complexity of bothmodeling and analysis of a system.Similarly, the desired level of accuracy

8/4/2019 Lakshya Final

http://slidepdf.com/reader/full/lakshya-final 21/45

P a g e | 21

required and associated computationaltime requirements can be managedsimultaneously to address mostengineering applications. FEM allowsentire designs to be constructed, refined,

and optimized before the design ismanufactured.

This powerful design tool hassignificantly improved both thestandard of engineering designs and themethodology of the design process inmany industrial applications. Theintroduction of FEM has substantiallydecreased the time to take productsfrom concept to the production line. It isprimarily through improved initialprototype designs using FEM thattesting and development have beenaccelerated. In summary, benefits ofFEM include increased accuracy,enhanced design and better insight intocritical design parameters, virtualprototyping, fewer hardwareprototypes, a faster and less expensivedesign cycle, increased productivity,and increased revenue.

CAE Software

This is a list of software packages that

implement the finite element method for

solving partial differential equations or aid

in the pre- and post-processing of finite

element models.

• Abaqus: Franco-American software

from SIMULIA, owned by Dassault

Systemes

• ANSA: An advanced CAE pre-processing

software for complete model build up. • ANSYS: American software • AutoForm: Swiss origin German

software for Sheet metal forming

process chain. 

• COMSOL Multiphysics COMSOL

Multiphysics Finite Element Analysis

Software formerly Femlab. • FEFLOW: simulates groundwater flow,

mass transfer and heat transfer in

porous media. 

• Femap, Siemens PLM Software: A pre

and post processor for Windows. •  LS-DYNA, LSTC - Livermore Software

Technology Corporation. •  Nastran: American software, from

MSC Software. •  Radioss: A linear and nonlinear

solver owned by Altair Engineering. •  Pro/Mechanica •  COSMOSWorks •  ALGOR .

 •  HyperMesh.. •  PAM-CRASH •  HyperForm. •  Dynaform. •  Autoform. •  MoldFlow •  C – Mold •  Modex-3D 

CAE Sources

www. Ansys.com

www. Moldflow.com

www.mscsoftware.com

www.altairhyperworks.com

www.finitetoinfinite.com

www.algor.com

www.abacom.de

8/4/2019 Lakshya Final

http://slidepdf.com/reader/full/lakshya-final 22/45

P a g e | 22

Er. Sandeep Patil

APMED

In-charge, Center of Excellence-CAE

“I think and think, for months, for years, ninety- 

nine times the conclusion is false. The hundredth 

time I am right” 

ALBERT EINSTINE

“The three great essentials to achieve anything 

worthwhile are first, hard work, second, stick to 

itiveness; third, common sense.” 

THOMAS A EDISON

8/4/2019 Lakshya Final

http://slidepdf.com/reader/full/lakshya-final 23/45

P a g e | 23

TATA JARITI Y ATRA 2010

I am yatri of 2010 yatra .It is most amazing

experience and one of the greatachievement among all.

  Jagriti Yatra is an annual train journey thatthat takes hundreds of India's highlymotivated youth (with some participationof international students) between the agesof 20-25 and experienced professionals withage above 25, on a eighteen day nationalodyssey, introducing them to unsungheroes of India. The aim is to awaken the

spirit of entrepreneurship - both social andeconomic - within India's youth by exposingthem to individuals and institutions that aredeveloping unique solutions to India'schallenges. Through this national event wehave begun to inspire the youth of India tolead and develop institutions bothnationally and within their communities.

The vision of Jagriti Yatra is to inspire

young Indians living in the middle of the

Indian demographic diamond (Rs 40-Rs 120per day) to lead development by taking to

enterprise. By doing so, they can turn from

being job seekers to job creators. Apart from

this economic argument, they also discover

a purpose that is appropriate for their

talents. Only if we create a movement

around enterprise led development will

India’s youth employment and

development issues will be resolved.

Enterprise Led Development has beenapplauded as a key paradigm to bringabout grassroots development. India’sdemography represents a diamond morethan a pyramid. The middle of thisdiamond consists of 50 Crore Indians, whoare no longer destitute but often lack the

means to earn a living. Government jobs are

few and far between, and for these youngIndians enterprise is not a luxury, it is anecessity. Instead of relying

on charitable aid or government grants,enterprise led development seeks to createsustainable and scalable enterprises in themiddle of the Indian demographicdiamond. By participating in local, scalableenterprise, these Indians, most of whom areyoung will not only find employment, they

will create employment for others.

  Jagriti Yatra is one of the key strands of  Jagriti to create national awareness aboutthis program, and to build leaders who willfollow the path of enterprise leddevelopment in their lives. Tatas are leadingsponsors for this yatra.

Myself

Basically if I have to tell about this yatrathen I would like to describe this as this oneof the unpredictable experience which one

8/4/2019 Lakshya Final

http://slidepdf.com/reader/full/lakshya-final 24/45

P a g e | 24

cannot benefit without going through it.The person who wants to achieve his goalthat of becoming successful entrepreneurshould go for this.

This yatra taken me from all corners ofIndia and make me help to understand howsmall scale and big scale industries fixed upthere roots. In India from small villages upto metro cities that sizes and types ofenterprises may vary but the inspirationbehind all is one that “I have to becomeentrepreneur”.

I would like to share my experience of thisyatra in brief. We had started from Mumbai,the charming young 400 yatries and onetrain .we travelled 9000km as shown in map.at every destination shown in map we hadvisit our role models.

These learnings span across the 4 axes of

programming - the Role model visits, thepanel discussions and the Yatri interactionsas well as the special sessions that wereorganized during the journey.

During the Yatra, 17 groups were assignedto study Role models as well as paneldiscussions. Each group presented theirfindings to the rest of the train. In theinteractions that followed, many common

themes and some contradictions emerged.A smaller group of 17 was as-signed tobrainstorm on these and a final group of 7Yatris compiled the final document onbehalf of all the 400 Yatris.

Route of TATA JARITI Y ATRA

My friend this is best platform to learn thethings ,to experience the diversity ofindia,to built yourself as entrepreneur .iwant to share our jagriti geet “yaroo chalobadalne ki r ut hai…yaroo chalo sawarne kirut hai…” .

-  ASHWINI LAHANE

B E (Mechanical )(YATRI OF 2010)

 

8/4/2019 Lakshya Final

http://slidepdf.com/reader/full/lakshya-final 25/45

P a g e | 25

GSM Vs CDMA

The ultimate outcome of the battle fordominance between these two competingcellular data transmission technologies may

lie more in their history than theirrespective merits. To understand thecurrent prevalence of GSM, one needs afoundation in the forces that converged topush one technology ahead of the other.

One of the most contentious battles beingwaged in the wireless infrastructureindustry is the debate over the efficient useand allocation of finite airwaves. For severalyears, the world's two main methods --

Code-Division Multiple Access (CDMA)and Global System for Mobilecommunications (GSM) -- have divided thewireless world into opposing camps.Ultimately, the emergence of a victorioustechnology may owe more to historicalforces than the latest wireless innovation, orthe merits of one standard over the other.

CDMA's World War II Foundations CDMA, put into an historical context, is a

recently patented technology that onlybecame commercially available in the mid-1990s, but had its roots in pre-World War IIAmerica. In

1940, hollywood actress turned inventor,Hedy Lamarr, and co-inventor GeorgeAntheil, with World War II looming, co-patented a way for torpedoes to becontrolled by sending signals over multipleradio frequencies using random patterns.Despite arduous efforts by the inventors toadvance the technology from experiment toimplementation, the U.S. Navy discardedtheir work as architecturally unfeasible. Theidea, which was known as frequency-hopping, and later as frequency-hoppingspread-spectrum technology (FHSS),remained dormant until 1957 whenengineers at the Sylvania Electronic Systems

Division, in Buffalo, New York took up theidea, and after the Lamarr-Antheil patentexpired, used it to secure communications

for the U.S. during the 1962 Cuban MissileCrisis. After becoming an integral part ofgovernment security technology, the U.S.military, in the mid-80s, declassified whathas now become CDMA technology, atechnique based on spread-spectrumtechnology.

What interested the military soon caughtthe eye of a nascent wireless industry.CDMA, incorporating spread-spectrum,

works by digitizing multiple conversations,attaching a code known only to the senderand receiver, and then dicing the signalsinto bits and reassembling them. Themilitary loved CDMA because codedsignals with trillions of possiblecombinations resulted in extremely securetransmissions.

Qualcomm, which patented CDMA, andother telecommunications companies, were

attracted to the technology because itenabled many simultaneous conversations,rather than the limited stop-and-gotransmissions of analog and the previousdigital option.

CDMA was not field tested for commercialuse until 1991, and was launchedcommercially in Hong Kong in 1995. CDMAtechnology is currently used by majorcellular carriers in the United States and isthe backbone of Sprint's PersonalCommunications System (PCS). Along withSprint, major users of CDMA technologyare Verizon and GTE.

Advantages of CDMA include: 

•  Increased cellular communicationssecurity.

8/4/2019 Lakshya Final

http://slidepdf.com/reader/full/lakshya-final 26/45

P a g e | 26

•  Simultaneous conversations.•  Increased efficiency, meaning that

the carrier can serve moresubscribers.

•  Smaller phones.•

  Low power requirements and littlecell-to-cell coordination needed byoperators.

•  Extended reach - beneficial to ruralusers situated far from cells.

Disadvantages of CDMA include: 

•  Due to its proprietary nature, all ofCDMA's flaws are not known to theengineering community.

•  CDMA is relatively new, and thenetwork is not as mature as GSM.

•  CDMA cannot offer internationalroaming, a large GSM advantage.

The Euro-Asian Alternative: GSM 

Analysts consider Qualcomm's majorcompetitive disadvantage to be its lack ofaccess to the European market nowcontrolled by Global System for Mobilecommunications (GSM). The wireless worldis now divided into GSM (much of WesternEurope) and CDMA (North America andparts of Asia).

Bad timing may have prevented theevolution of one, single global wirelessstandard. Just two years before CDMA's1995 introduction in Hong Kong, Europeancarriers and manufacturers chose to support

the first available digital technology - TimeDivision Multiple Access (TDMA). GSMuses TDMA as its core technology.Therefore, since the majority of wirelessusers are in Europe and Asia, GSM hastaken the worldwide lead as the technologyof choice.

Mobile Handset manufacturers ultimatelysplit into two camps, as Motorola, Lucent,and Nextel chose CDMA, and Nokia andEricsson eventually pushed thesecompanies out and became the dominant

GSM players.

Advantages of GSM: 

•  GSM is already used worldwidewith over 450 million subscribers.

•  International roaming permitssubscribers to use one phonethroughout Western Europe. CDMAwill work in Asia, but not France,Germany, the U.K. and otherpopular European destinations.

•  GSM is mature, having started in themid-80s. This maturity means amore stable network with robustfeatures. CDMA is still building itsnetwork.

•  GSM's maturity means engineers cuttheir teeth on the technology,creating an unconscious preference.

•  The availability of SubscriberIdentity Modules, which are smartcards that provide secure data

encryption give GSM m-commerceadvantages.

In brief, GSM is a "more elegant way toupgrade to 3G," says Strategis Group seniorwireless analyst Adam Guy.

Disadvantages of GSM: 

•  Lack of access to burgeoningAmerican market.

8/4/2019 Lakshya Final

http://slidepdf.com/reader/full/lakshya-final 27/45

P a g e | 27

Conclusion 

Today, the battle between CDMA and GSMis muddled. Where at one point Europeclearly favored GSM and North America,

CDMA, the distinct advantage of one overthe other has blurred as major carriers likeAT&T Wireless begin to support GSM, andrecent trials even showed compatibilitybetween the two technologies.

GSM still holds the upper hand however.

Th

GSM Vs CDMA IN WIRELESSCOMMUNICATIONS.

The ultimate outcome of the battle fordominance between these two competingcellular data transmission technologies maylie more in their history than theirrespective merits. To understand thecurrent prevalence of GSM, one needs afoundation in the forces that converged topush one technology ahead of the other.

One of the most contentious battles being

waged in the wireless infrastructureindustry is the debate over the efficient useand allocation of finite airwaves. For severalyears, the world's two main methods --Code-Division Multiple Access (CDMA)and Global System for Mobilecommunications (GSM) -- have divided thewireless world into opposing camps.Ultimately, the emergence of a victorioustechnology may owe more to historicalforces than the latest wireless innovation, or

the merits of one standard over the other.

  CDMA's FoundationsCDMA, put into an historicalcontext, is a recently patentedtechnology that only becamecommercially available in the mid-1990s, but had its roots in pre-World

War II America. In

1940, hollywood actress turned inventor,Hedy Lamarr, and co-inventor GeorgeAntheil, with World War II looming, co-

patented a way for torpedoes to becontrolled by sending signals over multipleradio frequencies using random patterns.Despite arduous efforts by the inventors toadvance the technology from experiment toimplementation, the U.S. Navy discardedtheir work as architecturally unfeasible. Theidea, which was known as frequency-hopping, and later as frequency-hoppingspread-spectrum technology (FHSS),remained dormant until 1957 when

engineers at the Sylvania Electronic SystemsDivision, in Buffalo, New York took up theidea, and after the Lamarr-Antheil patentexpired, used it to secure communicationsfor the U.S. during the 1962 Cuban MissileCrisis. After becoming an integral part ofgovernment security technology, the U.S.military, in the mid-80s, declassified whathas now become CDMA technology, atechnique based on spread-spectrumtechnology.

What interested the military soon caughtthe eye of a nascent wireless industry.CDMA, incorporating spread-spectrum,works by digitizing multiple conversations,attaching a code known only to the senderand receiver, and then dicing the signalsinto bits and reassembling them. Themilitary loved CDMA because codedsignals with trillions of possiblecombinations resulted in extremely secure

transmissions.

Qualcomm, which patented CDMA, andother telecommunications companies, wereattracted to the technology because itenabled many simultaneous conversations,rather than the limited stop-and-gotransmissions of analog and the previous

8/4/2019 Lakshya Final

http://slidepdf.com/reader/full/lakshya-final 28/45

P a g e | 28

digital option.

CDMA was not field tested for commercialuse until 1991, and was launchedcommercially in Hong Kong in 1995. CDMA

technology is currently used by majorcellular carriers in the United States and isthe backbone of Sprint's PersonalCommunications System (PCS). Along withSprint, major users of CDMA technologyare Verizon and GTE.

Advantages of CDMA include: 

•  Increased cellular communicationssecurity.

•  Simultaneous conversations.•  Increased efficiency, meaning that

the carrier can serve moresubscribers.

•  Smaller phones.•  Low power requirements and little

cell-to-cell coordination needed byoperators.

•  Extended reach - beneficial to ruralusers situated far from cells.

Disadvantages of CDMA include: 

•  Due to its proprietary nature, all ofCDMA's flaws are not known to theengineering community.

•  CDMA is relatively new, and thenetwork is not as mature as GSM.

•  CDMA cannot offer internationalroaming, a large GSM advantage.

  GSM 

Analysts consider Qualcomm's majorcompetitive disadvantage to be its lack ofaccess to the European market nowcontrolled by Global System for Mobilecommunications (GSM). The wireless world

is now divided into GSM (much of WesternEurope) and CDMA (North America andparts of Asia).

Bad timing may have prevented the

evolution of one, single global wirelessstandard. Just two years before CDMA's1995 introduction in Hong Kong, Europeancarriers and manufacturers chose to supportthe first available digital technology - TimeDivision Multiple Access (TDMA). GSMuses TDMA as its core technology.Therefore, since the majority of wirelessusers are in Europe and Asia, GSM hastaken the worldwide lead as the technologyof choice.

Mobile Handset manufacturers ultimatelysplit into two camps, as Motorola, Lucent,and Nextel chose CDMA, and Nokia andEricsson eventually pushed thesecompanies out and became the dominantGSM players.

Advantages of GSM: 

•  GSM is already used worldwide

with over 450 million subscribers.•  International roaming permits

subscribers to use one phonethroughout Western Europe. CDMAwill work in Asia, but not France,Germany, the U.K. and otherpopular European destinations.

•  GSM is mature, having started in themid-80s. This maturity means amore stable network with robustfeatures. CDMA is still building its

network.•  GSM's maturity means engineers cut

their teeth on the technology,creating an unconscious preference.

•  The availability of SubscriberIdentity Modules, which are smartcards that provide secure dataencryption give GSM m-commerce

8/4/2019 Lakshya Final

http://slidepdf.com/reader/full/lakshya-final 29/45

P a g e | 29

advantages.

In brief, GSM is a "more elegant way toupgrade to 3G," says Strategis Group seniorwireless analyst Adam Guy.

Disadvantages of GSM: 

•  Lack of access to burgeoningAmerican market.

Conclusion 

Today, the battle between CDMA and GSMis muddled. Where at one point Europeclearly favored GSM and North America,

CDMA, the distinct advantage of one overthe other has blurred as major carriers likeAT&T Wireless begin to support GSM, andrecent trials even showed compatibilitybetween the two technologies.

GSM still holds the upper hand however.There's the numerical advantage for onething: 456 million GSM users versusCDMA's 82 million.

Factors tipping the scales in the GSMdirection include : 

AT&T Wireless' move to overlay GSM atopits TDMA network means the Europeantechnology (GSM) gains instant access toNorth America's number two network.

Qualcomm's recently announced thatWideband-CDMA (WCDMA) won't beready in Europe until 2005. This comes

amidst reports that GSM's successor,General Packet Radio Services (GPRS)remains on target for deployment in 2001-2002.

For all of the historical and technologicalreasons outlined above, it appears thatGSM, or some combination of GSM and

CDMA, will become the long sought aftergrail for a global wireless standard. Auniversalization of wireless technologiescan only stand to benefit the compatibilityand development costs and demands on all

wireless commerce participants.

8/4/2019 Lakshya Final

http://slidepdf.com/reader/full/lakshya-final 30/45

P a g e | 30

THE NEW WORLD OF PLASMA ANTENNAS 

The future of high-frequency, high-speed wireless communications could

very well be plasma antennas capable of transmitting focused radio waves

that would quickly dissipate conventional antennas 

Transmission and reception ofelectromagnetic waves have become an

integral part of the present day

civilization. Antenna is an essential device

for this process. It is a transducer that

transmits or receives electromagnetic

waves. In other words, antennas convert

electromagnetic radiation into electric

current, or vice versa. Antennas are used

in system such as radio and television

broadcasting, point-to-point radiocommunication, wireless LAN,

cellphones, radar, and spacecraft

communication. Antennas are most

commonly employed in air or outer space,

but can also be operated underwater or

even through soil and rock at certain

frequencies for short distances.

Growing need for speed of

communication network along with data-

handling capacity are the major forceshelping to explore new vistas of

transmission and reception. With the

wireless generations moving from 2G to

3G, 4G, 5G and on, the real benefit of

upgrading the Wi-Fi networks is to get

them to run faster. Wi-Fi usually can

manage 54 megabits of data per second.

The fancied Wi-Fi (a graphical user

interface for configuring wireless

connection) would handle up to 7 gigabitsper second. This would mean

downloading a TV show in a matter of

seconds. Advances in antenna technology

are expected to play a great role in the

desired speed and capacity-

handling capabilities of communicationnetworks.

Antenna Technology

Physically, an antenna is an

arrangement of one or more conductors,

usually called elements. In transmission,

an alternating current is created in the

elements by applying a voltage at the

antenna terminals, causing the elements to

radiate an electromagnetic field. Inreception, the inverse occurs. An

electromagnetic field from another source

induces alternating current in the

elements and a corresponding voltage at

the antenna’s terminals. Some receiving

antennas (such a parabolic and horn

types) incorporate shaped reflective

surfaces to collect the radio waves striking

them, and direct these waves onto the

actual conductive elements.

Some of the first rudimentary

antennas were built in 1888 by Heinrich

Hertz (1857-1894) in his pioneering

experiments to prove the existence of

electromagnetic waves predicted by the

theory of James Clerk Maxwell. Hertz

placed the emitter dipole at the focal point

of a parabolic reflector.

The words antenna (plural:

antennas) and aerial are used

interchangeably, but usually a rigid

metallic structure is termed an antenna

and a wire format is called an aerial. The

origin of the word antenna relative to

wireless apparatus is attributed to

Guglielmo Marconi. In 1895, while testing

8/4/2019 Lakshya Final

http://slidepdf.com/reader/full/lakshya-final 31/45

P a g e | 31

early radio apparatuses Marconi

experimented with early wireless

equipment. A 2.5 meter long pole along

which a wire was carried, was used as a

radiating and receiving aerial element. In

Italian a tent pole is known as l’ antennacentral, and the pole with a wire alongside

it used as an aerial was simply called l’

antenna. Until then wireless radiating,

transmitting and receiving elements were

known simply as aerials or terminals.

Marconi’s uses of the word antenna

(Italian for pole) become a popular term

for what today is uniformly known as the

antenna.

Since the discovery of radiofrequency (RF) transmission, antenna

design has been an integral part of

virtually every communication and radar

application. Technology has advanced to

provide unique antenna designs for

applications ranging from general

broadcast of radio frequency signals for

public use to complex weapon systems. In

its most common form, an antenna

represents a conducting metal surface thatis sized to emit radiations at one or more

selected frequencies. Antennas must be

efficient so the maximum amount of

signal strength is expended in the

propagated wave and not wasted in

antenna reflection.

There is a list of antenna designs

with their suitability, advantage and

limitations. There are many antenna types

and many ways of categorizing them.Antenna types can be used to differentiate

antennas for radios, televisions and radar

system. Because antennas can be built for

transmission of different frequencies,

another way to categories antenna types is

by their frequency. For radio antennas, it’s

important to know whether these are built

for, say, frequency modulation (FM)

broadcasting at 88-108 MHz or amplitude

modulation (AM) broadcasting at 535-

1605 kHz. For television antennas, one

distinguishes between ultra-high

frequency (UHF) antennas and very-highfrequency (VHF) antennas, or antennas

that pick up both.

Stores that sell antennas categorise

various types on terms of customers’

needs. The range of antennas can be

categorized as short, medium or long. For

customers buying a television antenna, the

decision dependent on how close they are

transmitting towers that they wish to pick

up a signal from. If the range is well-matched to the distance, it will help avoid

the antenna picking up unwanted signals.

Location is another way of looking

at antenna type. Antennas can be made for

indoor, outdoor or attic installation.

Indoor antennas are easy to install but

usually do not have the elevation to

provide the best signal, particularly for

customers who are far from the

transmission. Outdoor antennas were

primarily made for rooftops, but more

now are being designed to mount on the

side of a house, on a pole or deck. The

attic can be a useful installation point for

those who do not want their antenna

inside or outside for aesthetic or other

reasons.

Another set of antenna types is

differentiated by style. Style can mean the

antenna’s appearance in terms of design.

It can also address whether the antenna is

directional and gathers signals from a

central location or whether it is multi-

directional – seeking signals from towers

transmitting from different locations. The

latest version of antenna, i.e., plasma

8/4/2019 Lakshya Final

http://slidepdf.com/reader/full/lakshya-final 32/45

P a g e | 32

antenna employs ionized gas enclosed in a

tube (or other enclosure) as the

conducting element of the antenna.

Plasma Antennas

The different states of matter

generally found on earth are solid, liquid

and gas. Sir William Crookes, and English

physicist, identified a fourth state of

matter, now called plasma, in 1879.

Plasma is by far the most common form of

matter. Plasma in the stars and in the

tenuous space between them makes up

over 99 per cent of the visible universe

and perhaps most of what is not visible.

Important to antenna technology,

plasmas are conductive assemblies of

charged and neutral particles and fields

that exhibit collective effects. Plasmas

carry electrical currents and generate

magnetic fields.

A plasma antenna is a type of

antenna in which the metal-conducting

elements of a conventional antenna arereplaced by plasma. These are radio

frequency antennas that employ plasma as

the guiding medium for electromagnetic

radiation. The plasma antennas are

essentially a cluster of thousands of

diodes on a silicon chip that6 produces a

tiny cloud of electrons when charged.

These tiny, dense clouds can reflect high-

frequency waves like mirrors, focusing the

beams by selectively activating particulardiodes. The ‘beam-forming’ capability

could allow ultra-fast transmission of high

data loads – like those needed to

seamlessly stream a TV show to an

untethered tablet-creating an attractive

option for the next generation of

supercharged wireless transmitters.

Many types of plasma antennas

can be constructed, including dipole, loop

and reflector antennas. Plasma antennas

are interpreted as various devices in

which plasma with electric conductivity

serves as an emitting element. In gasplasma antenna the concept is to plasma

discharge tubes as the antenna elements.

When the tubes are energized, these turn

into conductors, and can transmit and

receive radio signals. When de-energized,

these revert to non-conducting elements

and do not reflect probing radio signals.

The fact that the emitting element

is formed over the interval needed for the

emission of an electromagnetic pulse is animportant advantage of plasma antennas.

In the passive state (in the absence of

plasma in the discharge tube), such a

device does not exhibit electric

conductivity.

A plasma stream flowing from a jet

into the ambient space, the plasma trace of

a body moving at an ultrasonic velocity in

the atmosphere, and alternative plasma

objects have been studied as possible

antenna elements. Solid-state plasma

antenna uses beam-forming technology

and the same manufacturing process that

is currently used for silicon chips. That

makes it small enough to fit into smart

phones.

Higher frequencies mean shorter

wavelengths and hence smaller antennas.

The antenna actually becomes cheaper

with the smaller size because it needs less

silicon. There is a gas plasma alternative

but it’s not solid-sate, so it is bigger and

contains moving parts – making it more a

pain to manufacture. The leaves the door

open for solid-state plasma antenna to be

used for next generation Wi-Gig(its

8/4/2019 Lakshya Final

http://slidepdf.com/reader/full/lakshya-final 33/45

P a g e | 33

version 1.0was announced in December

2009) that can reach up to 7Gbps

bandwidth over frequencies up to 60 GHz.

Development Progress

Initial investigations were relatedto the feasibility of plasma antennas as

low-radar cross-section radiating elements

with further development and future

commercialization of this technology. The

plasma antenna R & D project has

proceeded to develop a new antenna

solution that minimizes antenna-

detectability by radar at the first instance.

But since then an investigation of the

wider technical issues of existing antennasystem has revealed areas where plasma

antennas might be useful.

A significant progress has been

made in developing plasma antennas.

Present plasma antenna have been

operating in the region of 1 to 10 GHz.

Field trials have shown that an energized

plasma reflector is essentially as effective

as a metal reflector. However, when de-

energized, the reflected signal drops byover 20 dB. Still some technicalities related

to plasma antennas like increasing the

operating plasma density without

overloading the plasma discharge tubes,

reducing the power required and the

plasma noise caused by the ionizing

power supply, etc, have to be looked into

in order to them the useful technologies

for wireless communication in near future.

The future of high-frequency,high-speed wireless communications

could very well be plasma antennas

capable of transmitting focused radio

waves that would quickly dissipate using

conventional. Thus, plasma antennas

might be able to revolutionize not high-

speed wireless communications but also

radar arrays and directed energy

weapons. The good news is that plasma

antennas will be on-shelf in the next

couple of years. The bad news is that some

military powers can use it to create a more

advanced version of its existing painbeam.

Advantages of Plasma Antennas

1.  An important advantage of plasma

antenna over a conventional

antenna is that the former is much

lighter. Based on a set of patented

beam-forming technologies, this

high-performance electronically –

steerable antennas are extremelylightweight and compact.

2.  Free from mechanical part, these

maintenance-free plasma antennas

are ideally suited for a wide range

of wireless communications and

sensing applications.

3.  Plasma antennas have a number of

potential advantages for antenna

design. These are reconfigurable.

When one plasma antenna is d-

energized, the antenna reverts to a

dielectric tube, and a second can

transmit through it. This allows

using several large antennas

stacked over each other instead of

several small antennas placed next

to each other. This results in better

sensitivity and directivity.

4.  When a plasma element is not

energized it is difficult to detect it

by radar. Even when it isenergized, it is transparent to the

transmissions above the plasma

frequency, which falls in the

microwave region.

5.  Plasma elements can be energized

and de-energized in seconds,

which prevents signal degradation.

8/4/2019 Lakshya Final

http://slidepdf.com/reader/full/lakshya-final 34/45

P a g e | 34

6.  When a particular plasma element

is not energized, its radiation does

not affect nearby elements.

7.  Plasma antenna can focus high-

frequency radio waves that woulddissipate quickly if beamed by

conventional arrays.

8.  Plasma antennas boost wireless

speeds. Such antennas could

enable next-generation Wi-Fi that

allows for super-fast wireless data

transfers.

9.  Solid-wireless plasma antennas

deliver gigabit-bandwidth, and

high-frequency plasma antenna

could hold the key for

economically viable super-fast

wireless networking.

10. Plasma antennas might also be

used to create low-cost radar

arrays that could be mounted on

cars to help them navigate in low-

visibility conditions, or used to

make directed, more focused and

less bulky energy weapons.

11. Plasma antennas have developedan innovative range of selectable

multi-beam antennas that meet the

demands in today’s wireless

communication, defense and

homeland security markets.

Limitations

1.  The current hardware uses wider

range of frequencies so it’s

impractically massive to be usedfor mobile environments.

2.  Plasma antennas are expensive

and hard to manufacture.

3.  High-frequency

signals mean that antennas

operating at higher frequencies

couldn’t penetrate walls like

conventional Wi-Fi, so signals

would have to be reflected

throughout the buildings.

Plasma antennas could

theoretically solve some of these problems

because these can operate at a wider range

of frequencies, but gas antennas are also

more complex (and likely more expensive)

than their silicon-diode counterparts,

which are small enough to fit inside a cell

phone.

With plasma antenna technology, there

are kinks to iron out, but researchers and

engineers are optimistic to make this

promising technology commercially

available in few years.

8/4/2019 Lakshya Final

http://slidepdf.com/reader/full/lakshya-final 35/45

P a g e | 35

THE GOOD LIFE FOR PREVENTION AGAINST SUCIDE

Our lives have never been better

We believe this to the letter

We’re all a little richer

Ain’t this such a pretty picture

But what we’ve hidden from view

No one wants to pursue

You see the pain is held inside

And this means it can’t subside

So many seek an escape

Which they can’t communicate

So I’m going to save a soul

The only way I knowI must help them to awake

Before it is too late.

(Reproduced with the kind permission

of Paul Rooney)

People feeling down, depressed ordistressed need our empathy, help and

Support and so below are someimportant points to note from Stamp Out

Suicide!

  Although we live in an ever changingworld, showing compassion must

NEVER goout of fashion...

  Please make time for others as theremay come a point when you need

others to make time for you...  Some people dwell on the past, some

plan for the future and others willget through today...si

  Although we may feel alone, it is a feeling experienced by many, many

people atgiven time and so in this sense we

are never alone...  Why the emphasis on suicideprevention? Because once a suicide is

completed, very sadly, there is nocure...Therefore, we must try to

prevent suicide.

Look after yourself and of course,

others 

8/4/2019 Lakshya Final

http://slidepdf.com/reader/full/lakshya-final 36/45

P a g e | 36

GOOD FOOD EATING HABITS 

Eat a variety of nutrient-rich foods. You needmore than 40 different nutrients for goodhealth, and no single food supplies themall. Your daily food selection should

include bread and other whole-grainproducts; fruits; vegetables; dairyproducts; and meat, poultry, fish andother protein foods. How much youshould eat depends on your calorie needs.Use the Food Guide Pyramid and theNutrition Facts panel on food labels ashandy references.

Enjoy plenty of whole grains, fruits andvegetables. Surveys show most Americansdon't eat enough of these foods. Do you

eat 6-11 servings from the bread, rice,cereal and pasta group, 3 of which shouldbe whole grains? Do you eat 2-4 servingsof fruit and 3-5 servings of vegetables? Ifyou don't enjoy some of these at first, givethem another chance. Look throughcookbooks for tasty ways to prepareunfamiliar foods.

 Maintain a healthy weight. The weight that'sright for you depends on many factorsincluding your sex, height, age andheredity. Excess body fat increases yourchances for high blood pressure, heartdisease, stroke, diabetes, some types ofcancer and other illnesses. But being toothin can increase your risk forosteoporosis, menstrual irregularities andother health problems. If you're constantlylosing and regaining weight, a registereddietitian can help you develop sensibleeating habits for successful weightmanagement. Regular exercise is alsoimportant to maintaining a healthyweight.

Eat moderate portions. If you keep portionsizes reasonable, it's easier to eat the foodsyou want and stay healthy. Did you knowthe recommended serving of cooked meatis 3 ounces, similar in size to a deck ofplaying cards? A medium piece of fruit is

1 serving and a cup of pasta equals 2servings. A pint of ice cream contains 4servings. Refer to the Food GuidePyramid for information on

recommended serving sizes.

Eat regular meals. Skipping meals can leadto out-of-control hunger, often resulting inovereating. When you're very hungry, it'salso tempting to forget about goodnutrition. Snacking between meals canhelp curb hunger, but don't eat so muchthat your snack becomes an entire meal.

Reduce, don't eliminate certain foods. Mostpeople eat for pleasure as well as

nutrition. If your favourite foods are highin fat, salt or sugar, the key is moderatinghow much of these foods you eat and howoften you eat them.Identify major sources of these ingredientsin your diet and make changes, ifnecessary. Adults who eat high-fat meatsor whole-milk dairy products at everymeal are probably eating too much fat.Use the Nutrition Facts panel on the foodlabel to help balance your choices.Choosing skim or low-fat dairy productsand lean cuts of meat such as flank steakand beef round can reduce fat intakesignificantly.If you love fried chicken, however, youdon't have to give it up. Just eat it lessoften. When dining out, share it with afriend; ask for a take-home bag or asmaller portion.

Balance your food choices over time. Notevery food has to be "perfect." Wheneating a food high in fat, salt or sugar,select other foods that are low in theseingredients. If you miss out on any foodgroup one day, make up for it the next.Your food choices over several daysshould fit together into a healthy pattern.

Know your diet pitfalls. To improve youreating habits, you first have to know

8/4/2019 Lakshya Final

http://slidepdf.com/reader/full/lakshya-final 37/45

P a g e | 37

what's wrong with them. Write downeverything you eat for three days. Thencheck your list according to the rest ofthese tips. Do you add a lot of butter,creamy sauces or salad dressings? Ratherthan eliminating these foods, just cut back

your portions. Are you getting enoughfruits and vegetables? If not, you may bemissing out on vital nutrients.

 Make changes gradually. Just as there are no"superfoods" or easy answers to a healthydiet, don't expect to totally revamp youreating habits overnight. Changing toomuch, too fast can get in the way ofsuccess. Begin to remedy excesses or

deficiencies with modest changes that canadd up to positive, lifelong eating habits.For instance, if you don't like the taste ofskim milk, try low-fat. Eventually youmay find you like skim, too.

Remember, foods are not good or bad. Selectfoods based on your total eating patterns,not whether any individual food is "good"or "bad." Don't feel guilty if you lovefoods such as apple pie, potato chips,candy bars or ice cream. Eat them inmoderation, and choose other foods toprovide the balance and variety that arevital to good health.

 

8/4/2019 Lakshya Final

http://slidepdf.com/reader/full/lakshya-final 38/45

P a g e | 38

Cloud Computing 

Cloud computing is a model for enabling

founds everywhere, plans, on-demand

network access to a shared pool of

configurable computing resources (e.g.,

networks, servers, storage, applications,

and services) that can be rapidly

provisioned and released with minimal

management effort or service provider

interaction.

The concept of cloud computing fills

never changing the need of IT: a way to

increase capacity or add capabilities on

the fly without investing in new

infrastructure, training new personnel, or

licensing new software. Cloud computing

includes any subscription-based or pay-

per-use service that, in real time over the

Internet, extends IT's existing capabilities.

Cloud computing provides computation,

software, data access, and storage services

that do not require end-user knowledge of

the physical location and configuration of

the system that delivers the services.

Parallels to this concept can be drawn

with the electricity grid, where in end-

users consume power without needing to

understand the component devices or

infrastructure required to provide the

service.

Characteristics

Cloud computing exhibits the following

key characteristics:

  Agility improves with users'

ability to newly provided

technological infrastructure resources.

  Application Programming 

Interface (API) accessibility to

software that enables machines to

interact with cloud software in the

same way the user interface makes

easy interaction between humans and

computers. Cloud computing systems

typically use REST-based APIs.

  Cost is claimed to be reduced and

in a public cloud delivery

model capital expenditure is

converted to operational

expenditure. This is purported to

lower barriers to entry, as

infrastructure is typically provided by

a third-party and does not need to be

purchased for one-time or infrequent

intensive computing tasks. Pricing on

a utility computing basis is fine-

8/4/2019 Lakshya Final

http://slidepdf.com/reader/full/lakshya-final 39/45

P a g e | 39

grained with usage-based options and

fewer IT skills are required for

implementation (in-house).

  Device and location

independence 

enable users to accesssystems using a web browser

regardless of their location or what

device they are using (e.g., PC, mobile

phone). As infrastructure is off-site

(typically provided by a third-party)

and accessed via the Internet, users

can connect from anywhere. 

  Multi-tenancy enables sharing of

resources and costs across a large poolof users thus allowing for:

  Centralization of

infrastructure in locations with

lower costs (such as real estate,

electricity, etc.)

  Peak-load

capacity increases (users need not

engineer for highest possible load-

levels)  Utilization and

efficiency improvements for systems

that are often only 10–20% utilized. 

  Reliability is improved if multiple

redundant sites are used, which

makes well-designed cloud

computing suitable for business

continuity and disaster recovery. 

  Scalability via dynamic ("on-demand") provisioning of resources

on a fine-grained, self-service basis

near real-time, without users having

to engineer for peak loads.

  Performance is monitored, and

consistent and loosely coupled

architectures are constructed

using web services as the system

interface.

  Security could improve due to

centralization of data, increasedsecurity-focused resources, etc., but

concerns can persist about loss of

control over certain sensitive data, and

the lack of security for stored kernels. 

Security is often as good as or better

than under traditional systems, in part

because providers are able to devote

resources to solving security issues

that many customers cannotafford. However, the complexity of

security is greatly increased when

data is distributed over a wider area

or greater number of devices and in

multi-tenant systems that are being

shared by unrelated users. In addition,

user access to security audit logs may

be difficult or impossible. Private

cloud installations are in part

motivated by users' desire to retain

control over the infrastructure and

avoid losing control of information

security.

  Maintenance of cloud computing

applications is easier, because they do

not need to be installed on each user's

computer. They are easier to support

and to improve, as the changes reachthe clients instantly.

Characteristics with Shared cloud

computing:

8/4/2019 Lakshya Final

http://slidepdf.com/reader/full/lakshya-final 40/45

P a g e | 40

  Autonomic computing —

computer systems capable of self-

management."

  Client–server model – client–server 

computing refers broadly toany distributed  application that

distinguishes between service

providers (servers) and service

requesters (clients).

  Grid computing — "a form

of distributed computing and parallel

computing, whereby a 'super and

virtual computer' is composed of

a cluster of networked, looselycoupled computers acting in concert

to perform very large tasks."

  Mainframe computer — powerful

computers used mainly by large

organizations for critical applications,

typically bulk data processing such

as census, industry and consumer

statistics, enterprise resource

planning, and financial transactionprocessing.

  Utility computing — the

"packaging of computing resources,

such as computation and storage, as a

metered service similar to a

traditional public utility, such

as electricity."

  Peer-to-peer – distributed

architecture without the need forcentral coordination, with participants

being at the same time both suppliers

and consumers of resources (in

contrast to the traditional client–server

model).

  Service-oriented computing –

Cloud computing provides services

related to computing while, in a

reciprocal manner, service-oriented

computing consists of the computing

techniques that operate on software-

as-a-service.

Architecture

Cloud architecture, the systems

architecture of the software

systems involved in the delivery of cloud

computing, typically involves

multiple cloud components communicating

with each other over loose

coupling mechanism such as messaging

queue.

Cloud computing sample architecture

Layers

8/4/2019 Lakshya Final

http://slidepdf.com/reader/full/lakshya-final 41/45

P a g e | 41

Once an Internet Protocol connection is

established among several computers, it is

possible to share services within any one

of the following layers.

Client

A cloud client consists of computer

hardware and/or computer software that

relies on cloud computing for application

delivery and that is in essence useless

without it. Examples include

some computers, phones and other

devices, operating systems, and browsers.

Application

Cloud application services or "Software as

a Service (SaaS)" deliver software as a

service over the Internet, eliminating the

need to install and run the application on

the customer's own computers and

simplifying maintenance and support.

Platform

Cloud platform services, also known

as Platform as a Service (PaaS), deliver

a computing latform and/or solution

stack as a service, often consuming cloud

infrastructure and sustaining cloud

applications. It facilitates deployment of

applications without the cost and

complexity of buying and managing the

underlying hardware and software layers.

InfrastructureCloud infrastructure services, also known

as Infrastructure as a Service (IaaS),

deliver computer infrastructure – typically

a platform virtualization environment – as

a service, along with raw (block) storage

and networking. Rather than purchasing

servers, software, data-center space or

network equipment, clients instead buy

those resources as a fully outsourcedservice. Suppliers typically bill such

services on a utility computing basis; the

amount of resources consumed (and

therefore the cost) will typically reflect the

level of activity.

Server

The server’s layer consists of computer

hardware and/or computer

software products that are specifically

designed for the delivery of cloud

services, including multi-core processors,

cloud-specific operating systems and

combined offerings.

Deployment models 

8/4/2019 Lakshya Final

http://slidepdf.com/reader/full/lakshya-final 42/45

P a g e | 42

Public cloud

Public cloud describes cloud computing in

the traditional mainstream sense, whereby

resources are dynamically provisioned to

the general public on a fine-grained, self-service basis over the Internet, via web

applications/web services, from an off-

site third-party provider who bills on a

fine-grained utility computing basis.

Community cloud

Community cloud shares infrastructure

between several organizations from a

specific community with common

concerns (security, compliance,  jurisdiction, etc.), whether managed

internally or by a third-party and hosted

internally or externally. The costs are

spread over fewer users than a public

cloud (but more than a private cloud), so

only some of the benefits of cloud

computing are realised.

Hybrid cloud

Hybrid cloud is a composition of two or

more clouds (private, community, orpublic) that remain unique entities but are

bound together, offering the benefits of

multiple deployment models.

Private cloud

Private cloud is infrastructure operated

solely for a single organization, whether

managed internally or by a third-party

and hosted internally or externally.

They have attracted criticism because

users "still have to buy, build, and manage

them" and thus do not benefit from lower

up-front capital costs and less hands-on

management essentially "[lacking] the

economic model that makes cloud

computing such an intriguing concept"

8/4/2019 Lakshya Final

http://slidepdf.com/reader/full/lakshya-final 43/45

P a g e | 43

Use of Internet affecting our memory, finds study  

Researchers have found that the

widespread use of search engines and

online databases is affecting the way

people remember information.

To know whether people were more likely

to remember information that could be

easily retrieved from a computer, Betsy

Sparrow, an assistant professor of

psychology at Columbia and her

collaborators, Daniel M. Wegner of

Harvard and Jenny Liu of the University

of Wisconsin, Madison, staged different

memory experiments, reports the New

York Times.

In one experiment where participants

typed 40 bits of trivia, the team found that

the subjects were significantly more likely

to remember information if they thought

they would not be able to find it later.

"Participants did not make the effort to

remember when they thought they could

later look up the trivia statement they had

read," wrote the authors.

A second experiment was aimed at

determining whether computer

accessibility affects precisely what we

remember.

"If asked the question whether there are

any countries with only one color in their

flag, for example," the researchers wrote,

"do we think about flags - or immediately

think to go online to find out?"

In this case, participants were asked to

remember both the trivia statement itself

and which of five computer folders it was

saved in. The researchers were surprised

to find that people seemed better able to

recall the folder.

"That kind of blew my mind," Dr. Sparrow

said.

The experiment explores an aspect of

what is known as transactive memory -

the notion that we rely on our family,

friends and co-workers as well as

reference material to store information for

us.

The Internet's effects on memory are still

largely unexplored, Dr. Sparrow said,

adding that her experiments had led her

to conclude that the Internet has become

our primary external storage system.

"Human memory," she said, "is adapting

to new communications technology."

Prof. V.V. Shaga

MCA Dept.

 

8/4/2019 Lakshya Final

http://slidepdf.com/reader/full/lakshya-final 44/45

P a g e | 44

10-yr-old girl discovers security flaw in Apple, Android games

 A 10 year old hacker left experts amazed with her discovery on the flaw in mobile phones.

 Read on to know how she cracked the nut. 

A 10-year-old hacker has left experts

amazed by finding an old-age securityflaw in many mobile games.

Going by the handle CyFi, she found that

advancing the clock on a tablet or phone

could, in many games, open a loophole

that can be exploited, reports the BBC.

CyFi discovered the bug after getting

bored with the pace of farming games and

seeking ways to speed them up.

Many farm-based games force players to

wait hours before they can harvest a crop

grown from virtual seeds. As a result

CyFi, who has not revealed her real name,

started fiddling with the clock on her

handset to see if she could produce crops

more quickly.

While many games detect and block clock-

based cheating, CyFi found ways roundthese security measures. Disconnecting a

phone from wi-fi and only advancing a

clock by small amounts helped to open up

the loophole as it forced the game into a

state not tested by its original creators.

CyFi's discovery has since been verified

by independent security researchers. The

exploit has been found to work in versions

of games for both Apple and Android

gadgets. The hacker presented her

findings at the DefCon hacker conference

held in Las Vegas.

Prof. V.V. Shaga

MCA Dept.

8/4/2019 Lakshya Final

http://slidepdf.com/reader/full/lakshya-final 45/45

 


Recommended