cache csi sakec magazine

40

Upload: vaibhavi9

Post on 30-May-2018

218 views

Category:

Documents


0 download

TRANSCRIPT

8/9/2019 Cache Csi Sakec Magazine

http://slidepdf.com/reader/full/cache-csi-sakec-magazine 1/40

8/9/2019 Cache Csi Sakec Magazine

http://slidepdf.com/reader/full/cache-csi-sakec-magazine 2/40

JOURNEY SO FAR...

Winners of CSI Events.....................................................29

Check your Fun-Quotient.................................................27

 Acquaint yourself with gizmos .........................................25

How to crack an interview................................................23

Reviews of CSI-SAKEC events

PC assembly.......................................................................1Photoshop ..........................................................................2 Apache, MySQL, PHP.........................................................2Workshop on C/C++............................................................3Virtual DJ.............................................................................3Invent‘09..............................................................................4

Invited Articles

1.Clustering Streaming Data...............................................5

  -Prof. Uday Bhave2.Structure from Stereo.......................................................8  -Prof. Jyoti Joglekar 3.Computer Animation.......................................................10  -Prof. Dhanashree Toradmale4.Code‘Oh’Phobia.............................................................13  -Prof. Harshad Mande

Contributed Articles

1.How Google googles?....................................................15

  -Sujay Narsale2.Ethical Hacking...............................................................17  -Jugal Thakkar 3.Cloud Computing............................................................19  -Anilkumar Panda

-Dhaval Savla4.Cryptography..................................................................21  -Rushabh Pasad 

Contents

FACE TO FACE

TECH-TRENDZ!

FUN-ZONE

Help corner.......................................................................31

WINNERS

ANSWERZONE

CSI-SAKEC

TECHTAINMENT

8/9/2019 Cache Csi Sakec Magazine

http://slidepdf.com/reader/full/cache-csi-sakec-magazine 3/40

Editspeak

The Editorial Team

ÆAishwarya Neelakantan ÆRidhi Maru 

ÆSujay Narsale ÆTanvi Dedhia ÆTwinkle Savla ÆVaibhavi Shah 

CSI-SAKEC

Dear Readers,

We feel privileged to be writing the editorial for the debut issue of  , the CSI-SAKEC magazine. What started as a simple suggestion

 from one of the professors during the June 2009, AMP' event, has resulted  in the release of the first edition of the of CSI-SAKEC magazine. Achieving this has been no mean feat. This edition is the result of the hard work interms of creativity and research, put in by the editorial team through a

 period of nearly eight months.

The tagline 'the knowledge repository' aptly describes the  magazine's content. It is our endeavour to bring to you the various  advancements in the fields of engineering, latest gizmos and events at our  centre till date. The technical articles included in this issue have been contributed by both professors and students from our college. It is our visionto be the platform where the budding researchers at SAKEC can showcasetheir talent. In our future editions, we hope to serve as a medium, through

 which our professors can share their experiences and research with their  students.

CACHE gives you a glimpse into the successful run of CSI-SAKEC  since its inception in 2007. The workshops like PC Assembly, Java and  competitions like Website Designing, help students build their technical  skils professionally. One such event worth mentioning is the CSI Regional Convention, INVENT'09. CSI-SAKEC was a part of the collaborative effort 

 put in by eight other colleges in organizing this event of gigantic proportions.

 Lastly, we would like to thank the entire support system behind CSI-SAKEC, the management, the faculty, the lab assistants and other 

 non-teaching staff, as well as the SAKEC-students for extending their valuable support, helping ”CSI-SAKEC” reach its current status and all those people whose cumulative efforts have made this magazine possible.

Till next time.........!! 

The Editorial Team ,

 

CACHE 

CACHE 

8/9/2019 Cache Csi Sakec Magazine

http://slidepdf.com/reader/full/cache-csi-sakec-magazine 4/40

March 2010 CACHE  

Congratulations to the CSI-SAKEC student chapter for bringing outthis quality debut magazine  which highlights various activities of CSI-SAKEC along with articles written on modern accomplishments in Computerand Information Technology fields. Within a span of three years of itsemergence, the young and energetic team has various accomplishments to itscredit. It has conducted various workshops to give hands-on experience tostudents, conducted seminars and technical competitions to improve the softskills of students and enhance the placement prospects of our students in thepresent day competitive industrial environment. It has organized the CSI RegionalConvention, Invent'09 and is also a major collaborator in the forth comingregional convention iDeate'10.

What is praiseworthy about CSI-SAKEC is that its programs aremanaged by the students from conception to implementation, therebybringing out the innovation spirit, skill and development of the students.

I wish the CSI-SAKEC student community success in this debute-publication venture and hope that they would carry out new activities toimprove professional competence of our students.

From the 

Trustee’s Desk Mr M.L.Shah

Trustee & hon.Jt.secretary

Mahavir Education Trust

CSI-SAKEC

i

8/9/2019 Cache Csi Sakec Magazine

http://slidepdf.com/reader/full/cache-csi-sakec-magazine 5/40

Dear Members,

On the eve of launching of CSI magazine by the members of CSI-SAKEC,I heartily congratulate all the active members and wish them all the success.

I have been observing that CSI-SAKEC chapter has remainedreasonably active since its inception and has been conducting various co-curricular 

  programs, technical events , multimedia and so on which are useful to students in practical life.

Launching of the magazine will provide the students an opportunity todevelop their skilsl in writing technical papers. I wish all the success to the CSI-SAKECmagazine project.

Dr. R.V.Karambelkar

B.E.(Elec), M.E.(Etrx & Tel),

PhD

Dear students,

I extend my hearty congratulation to CSI-SAKEC for reaching another milestone during this academic year with CSI-SAKEC magazine. The long cherisheddream of providing a platform for students to be able to enhance their technical skills andspread technical awareness has been realized only because of sheer hard work anddiligence of the students involved with the organization. I believe the magazine will act as acatalyst in students towards technical reporting as well as research. I earnestly hope that ethe magazine will grow to reflect the spirit of SAKEC.

Under the banner of CSI-SAKEC, students have been successfully organizing many activities including industrial visits, seminars and innovative technicalcompetitions. The student of today expected to be not only technically sound but alsocomplete professional. CSI-SAKEC is endeavoring to confirm to the aim of CSI i.e. to

transfer students into professionals with thorough knowledge and understanding of thetechnical world. CSI-SAKEC magazine is yet another step in this direction. I wish thecommittee of CSI-SAKEC best of luck.

From the desk of The Principal 

From the desk of 

The Director 

March 2010CACHE  

Dr. M B Shah

B.E.(Mech), M.E.(Mech),

PhD

CSI-SAKEC

ii

8/9/2019 Cache Csi Sakec Magazine

http://slidepdf.com/reader/full/cache-csi-sakec-magazine 6/40

Dear members,

CSI-SAKEC student centre was established in our college in the year 2007 and wasformally inaugurated on 24th April 2007. Today it has a strength of over 180 students. I amhappy to announce that Education Directorate of CSI has approved our CSI-SAKEC as astudent branch of CSI. This will facilitate to promote student branch activities like conducting

of workshop, meetings, seminars, IT symposia, IT quiz, etc.The objective of the CSI-SAKEC is to facilitate knowledge sharing, learning and training the students, while simultaneously inspiring and preparing them to meet thechallenges of the fast changing IT industry. The young and vibrant CSI-SAKEC has beenstriving to improve the technical skills of budding engineers in a professional manner. Inachieving this objective, it has organized various workshops and seminars in our college. And sofar it has succeeded in imparting value added technical skills supplementing the classroomteaching. Senior students are also encouraged to organize events and seminars to provide abetter interaction and synergy among the student community. Some of the popular eventsorganized by CSI-SAKEC are workshops on 'PC assembly, OS installation & Troubleshooting','Microprocessors and Microcontrollers', Adobe Flash and Dreamweaver', 'VB', 'Virtual DJ', 'Funwith JAVA', ' Working with MATLAB' etc. The overwhelming response in every workshop

from the students as well as from the faculty encouraged us to organize more such events withrenewed vigor and enthusiasm. For better involvement of the participants, every workshopconcluded with a small contest and prizes for the winners of first, second and third positions.

CSI-SAKEC also had the honor of being an active partner in the organization of theInternational Student Convention – 'Invent 09' hosted by the Mumbai Chapter of ComputerSociety of India. Two intercollegiate events 'Eureka-Technical Quiz' and 'I-Developer-anApplication Development in VB6' were conducted on 7th March '09, wherein student teamsfrom different engineering colleges participated. This year also we are hosting an event of 'Technical Paper Presentation' for International Student Convention 2010 on behalf of MumbaiChapter of Computer Society of India.

CSI-SAKEC has taken a significant step in transforming CSI into a vibrant and activeorganization with the launch of annual magazine and a dedicated web site for CSI-SAKEC. This

will provide a platform for each one of you to interact, discuss and debate on technology. Thisdevelopment will surely add substantial value to all members. And I invite all of you to takeadvantage of the immense learning and personality development opportunity that the CSI-SAKEC provides.

I thank the highly motivated CSI-SAKEC student committee as well as all studentmembers for contributing to the successful journey of our branch since its inception. I alsosincerely thank the Director, Principal and Management of SAKEC for their constant supportand guidance. I am looking forward to have the same type of cooperation and enthusiasm fromyou in the coming years also.

From the Staff Co-ordinator 

March 2010 CACHE  

Prof. Rekha Ramesh

CSI-SAKEC Staff Coordinator

CSI-SAKEC

iii

8/9/2019 Cache Csi Sakec Magazine

http://slidepdf.com/reader/full/cache-csi-sakec-magazine 7/40

Hello!

You might be wondering who I am with an article almost at the beginning of this magazine. Most of you probablyhaven't even heard of me considering that I passed out of Shah & Anchor Kutchhi Engineering College in May 2007. So letme introduce myself. I am Rishi Popat. And I am a very lucky person. That's because I had the good fortune of being one of the

 founding members and the very first Chairman of CSI-SAKEC!

 At the very outset, let me congratulate you on being a part of this prestigious organization called Computer Society of India-SAKEC. As our Bairi Sir famously puts it, CSI-SAKEC is an organization of the student, by the studentsand for the students! If you are a student of SAKEC, then surely you must have observed CSI-SAKEC's strive for excellenceand professionalism in all the activities it undertakes. This has been its hallmark since day one, which reminds me of the dayit was founded...

CSI-SAKEC had a very humble beginning in the spring of 2007. Since my initial days in SAKEC, like most of my fellow students, I always felt that there was very little on offer to students, in terms of co-curricular activities. Sure we had a fantastic cultural festival in Verve and a ravishing technical festival in Nucleus, but that mostly came under the domain of extra-curricular. But there was nothing really to complement our theoretical studies with practical exposure. Such

 practical exposure would definitely be a boon when facing real projects and problems in the industry.Then, in my very final semester, Prof. Bairi approached me with the idea of starting an organization under the CSI

banner which would cater exactly to this lacuna. I was a bit hesitant at the start. Because only after you come into the final

 year of B.E., do you realize how much workload one has! I had my hands already full with project and academics. But Idecided to go and give it my best. And in hindsight, I am very glad I did! I distinctly remember the long meetings I had withBairi Sir, Rekha Ma'am and Jyoti Ma'am; trying to hammer out the details of CSI-SAKEC's working, its objectives and soon. We already had two excellent organizations in place at SAKEC and it was important that CSI-SAKEC complimentstheir work ably.

The first task at hand was to establish a team of students to get CSI-SAKEC up and running. And again I provedlucky as I was blessed with the best team one could have asked for. Even though they had no previous experience they handledthe various departments like Logistics, Publicity and Event Management extremely well. Soon their efforts paid off andhow! Right at our debut, CSI-SAKEC registered an astounding 181 members! But the real challenge was to live upto suchexpectations. But we managed to do that admirably by conducting three workshops during the summer, namely on Matlab,Web Technologies and C Programming. Prof Uma Rao, Prof Dhanashree Toradmalle and Prof Milind Khairnar were kindenough to take up Introduction to Matlab and Web Technologies. But the high point for me was when 3 final year students

  from our own college Dinesh Dhongade, Kaushak Satra and Raj Thakkar came up and conducted the workshop on C Programming. It really seemed to highlight our motto as I had mentioned above itself: CSI-SAKEC is an organization of the students, for the students, by the students.

But this was just the tip of the ice berg. I have been in touch with the CSI-SAKEC committees every year and Iobserved that each committee brings with it, great new ideas to improve CSI-SAKEC. Every committee seems committedto better the work done by the last. This magazine being a prime example! I just hope and pray the torch of CSI gets passed onto as able hands, batch after batch, and each year I feel a little bit more proud to say: Yes, I am a pioneer of CSI-SAKEC.

From the Pioneer of CSI -SAKEC 

March 2010CACHE  

Rishi Popat

CSI-SAKEC

iv

8/9/2019 Cache Csi Sakec Magazine

http://slidepdf.com/reader/full/cache-csi-sakec-magazine 8/40

 J O U R Y S  

 F A R...

 N E    O

PC

 Assembling

We take through the  journey of CSI-SAKEC right

from its inception uptill now. CSI-SAKEC has made enhancing the technical

knowledge of the students of sakec its priority. Inthe following section we describe a few of our sucessful

workshops held in the academic year 2009-2010.

CSI SAKEC Student's

Center organized a workshop on

'PC Assembly, OS Installation

a n d T r o u b l e s h o o t i n g ' o n

Saturday 12th September, 2009.

The session was conducted by

'St Angelo's IT Graduate ' (SAIG)

M u m b a i . T h e w o r k s h o p  began with a brief introduction

on activities of CSI-SAKEC,

following which the SAIG guests

and facu l ty o f Shah and

Anchor were felicitated. The

workshop primarily comprised

of three sessions: the first

session comprised of hands-on

PC Assembling, wherein all the

participants were given anopportunity to practice. The

session was taken up by Mr Ranjit

V i s h w a k a r m a o f

SAIG faculty. At the beginning,

all the participants were given

a brief introduction of the

v a r i o u s g e n e r a t i o n s o f

computers , s tar t ing f rom

transistor assembly units to the

supercomputer mainframescomprising 5th generation of

computers. This was followed

  b y t h e v a r i o u s t y p e s o f

microprocessors along with an

introduction about the various

c o m p o n e n t s o f t h e P C

motherboard. From here on all

t h e c o m p o n e n t s o f t h e

motherboard including the

Expansion slots, socket,

external ports , USB wereexplained in detail. After going

through the functionality of

each and every component

present on the motherboard by

t h e v a r i o u s t y p e s o f

microprocessors along with an

introduction about the various

c o m p o n e n t s o f t h e P C

motherboard. From here on all

t h e c o m p o n e n t s o f t h emotherboard including the

present on the motherboard the

installation of the Operating

system on the assembled PC

h a r d w a r e . T h e o p e r a t i o n

consisted of powering the

computer, deleting all partitions,

creating a new partition and

selecting the disk drive to installOS.

The third session was

  basically a continuation of

session-2 and it dealt with

troubleshooting. Troubleshooting

is a technique of problem solving

most often applied to repair of

failed products or functional

processes. The workshop ended

with all the participants gainingan insight of the details and

processes involved in the

Assembling of a PC.

March 2010 CACHE  

Reviews of CSI-SAKEC events CSI-SAKEC

1

8/9/2019 Cache Csi Sakec Magazine

http://slidepdf.com/reader/full/cache-csi-sakec-magazine 9/40

 R 

.

 J O R N E Y  S O F A

. ..

 Apache,MySQL & PHP

Photoshop

CSI SAKEC conducted a

workshop on Photoshop, a

versatile technology and the art of

image editing. The workshop was

conducted on 31 January 2009 by

faculty members of MAAC (Mayaacademy of advanced cinematic)

one of the reputed institute in

animation and cinematic. Over 70

students participated in the

works hop. For eng ineers ,

excelling in technical field is not

enough, ability to convey these

ideas to the client through visual

medium is important and that is

where the need to master the skillof Photoshop arises. Photoshop

allows us to enhance and edit

photos to make attractive designs

and templates.

T h e w o r k s h o p w a s

divided in two sessions. Firsts e s s i o n w a s d e v o t e d t o

introducing students to the world

of animation. Prof. Rahul

explained students the splendid

effects created by the software, its

increasing use in technical field

and its significance. The second

session that followed gave a

hands-on practice to the students.

The students got an opportunityto edit, correct photos, use

various Photoshop tools like

clone stamp, lasso and so on.

With the assistance and help of

the volunteers some students

came up with really captivating

pictures and a range of designs.

We were pleased to receive

an astounding response from the

students and were gratified to

meet up their huge expectations.

Due to the varied applications of

this software in technical field aswell as graphical design features

this software is a prerequisite for

engineers opting for a bright

career in gaming and animation.

In its bid to continue the

path of learning, CSI-SAKEC

ventured into a new field of Web

Technology, by conducting a

workshop on PHP from15th June

and 19th June 2009.The team of

speakers consisted of Mr. Akshay

Rao, Mr. Sagar Gupta, Mr. Nirav

Nagda, Mr. Jugal Thakkar & Mr.

Sashank Shah, students from

SAKEC.

T h e A M P p a c k a g e

consists of the open source

scripting language PHP (PHP-

Hypertext Preprocessor), Apache

Server & MySQL which acts as a

  backend support for database

operations. The first day of the

5-day workshop was conducted

  by Mr. Sashank Shah who

explored the roots of PHP.

Informative seminars and

practical sessions covered topics

such as PHP script, data types,

operators and global variables

like _GET, _POST, _SESSION and

concepts of cookies, sessions and

h e a d e r s w e r e p r o v i d e d .

S i m u l t a n e o u s l y D a t a b a s econnectivity too was taught.

In the following sessions,

Mr. Sagar Gupta and Mr. Jugal

Thakkar described an application

called Content Management

System (CMS) that deals with

managing the content of the

webpages dynamically. Mr.

Akshay Rao covered in depth the

topic of Object Oriented (OO)paradigm of PHP. He took up the

example of “Photogallery”

paradigm of PHP (involving file

uploading and downloading),

explaining how security could be

enhanced using the Object

Oriented paradigm.

This was not the end of the

interesting and exciting journey

of AMP. Mr. Sashank Shah gave

the students a detailed picture of

the world wide web. He talked

about how websites are loaded

on the server, How the interaction

  between client and server takes

place, How the big picture helps

in building a successful network.

These topics accentuated the

importance of the topics covered

in the workshop.

March 2010CACHE  

CSI-SAKEC Reviews of CSI-SAKEC events

2

8/9/2019 Cache Csi Sakec Magazine

http://slidepdf.com/reader/full/cache-csi-sakec-magazine 10/40

 N

 R

 J O U R E Y 

 S O  F A ....

 VIRTUAL DJ

 Workshop on

C/C++

The best way to learn a

new “human” language is to

speak it right from the outset,

listening and repeating, leaving

the intricacies of grammar for

later. the same applies to

computer languages- to learn

C/C++,we must start writing

C/C++ programs as quickly as

possible.

CSI-SAKEC organized a

seminar on “Joy of programming

in C/C++” which aimed to make

the participants well acquainted

with the features of C/C++

language and thus enabling them

to write programs in C/C++. The

seminar began with a brief

introduction on C/C++ by Prof.

Harshad Mande. Participants

were taught concepts like classes,

data abstraction, encapsulation,

inheritance etc each with an

example and thorough hands onpractice. Later Mr. Jugal Thakkar

(B.E, computer engineering

student of SAKEC) took the

seminar and gave a brief

introduction on C graphics. Basic

inbuilt functions and a smal

Application like a screensaver

using C graphics were discussed .

The seminar came to an

end with a small test on C/C++

which boosted the confidence of

the students. The seminar servedas a practical guide that took the

participants through a step by

step process of programming. It

offered concrete suggestions and

guidelines to the participants for

enhancing their knowledge and

c o m p e t e n c i e s w h i l e

simultaneously engaging them

in a substantive discussion on

various concepts and issuesrelated to programming in C/C++.

W h e t h e r o n e i s a n

amateur DJ striving to improve,

or an accomplished DJ, the

virtual DJ can be used by anyone

from absolute musical neophyte

to the expert performer. Virtual-

DJ is a digital panel that you can

install on your computer.

With Virtual DJ, you cando all your DJing on your PC,

drag and drop your tracks from

your music database to the

turntables, adjust the sound

levels, synchronize the songs by

adjusting pitch, smoothly drag

the cross fader to create the

transition between the tracks.

To get the students

acquainted with the art of soundmixing, the workshop on Virtual

DJ was conducted in two sessions.

Bharath gave an overview of

Virtual-DJ, its tools, functions

a n d a l s o d e s c r i b e d t h e

implementation of Mixcraft.

M i x c r a f t i s a m u l t i t a s k

application for Windows and is a

music loop remix program.A large library of virtual

instruments, loops, sound effects,

and audio effects is included in

the Mixcraft. Bharath then laid

emphasis on how to remix the

original sound tracks, play with

the lyrics, enhance the music

quality and come up with a

melodious song.

A C o m p e t i t i o n o nremixing of original sound tracks

was held in the second session of

the workshop. The response

received from students was

impressive. They came up with

wonderful remixes.From among

25 participants, three winners

were announced.

Apart f rom being a

technical event, it was also a fun

event comprising both the juniorand senior students from all

engineering streams. Its immense

popularity among students

encouraged CSI-SAKEC to

organize such events in future.

March 2010 CACHE  

CSI-SAKECReviews of CSI-SAKEC events

3

8/9/2019 Cache Csi Sakec Magazine

http://slidepdf.com/reader/full/cache-csi-sakec-magazine 11/40

Since 1999, the Mumbai

Chapter of the Computer Society

o f I n d i a ( C S I ) h a s b e e n

instrumental in organizing

Student Conventions for the

 benefit of its student members. It

has been organizing student

conventions since a decade. It

started with eConnect '99 being

hosted at VESIT which was a great

success and it was the genesis of

the idea that other colleges could

also be a part of the growing

student activity. It is from here

that the Mumbai chapter sowed

the concept of student activity

centers in every engineering

college. Thus the activity centers

grew and with it started the yearly

conventions. eMerge 2000, eSense

2001, eNable 2002, iMagine 2003,

iDeas 2004, iDeas 2005 and

iNnovate 2006 were some of the

earlier conventions to name a few.

Last year, CSI-SAKEC was

privileged to be invited to become

a part of the organizing team of

INVENT'09 - the Annual CSI

Regional Student Convention.

Our college was one of the eight

premier engineering colleges in

Mumbai that came together to

s h o w c a s e t h e t e c h n i c a l

e x t r a v a g a n z a o f c o l o s s a l

proportions. The other colleges

were NMIMS, TSEC, VESIT,

FCRCE, Atharva, VCET and

UMIT.

Each college volunteered

to conduct an event. The events

conducted under INVENT'09

were technical competitions like

Programming Contest, Circuit

Designing, Technical Paper

Presentation, Technical Quiz, 

S o f t w a r e D e v e l o p m e n t ,

Technical Debate and fun events

like LAN and PS Gaming, Online

Treasure Hunt, which tested not

only one's technical skills and

knowledge but also one's ability

to deliver when it matters.

G r a b b i n g t h i s

opportunity to truly enter the

inter-collegiate level, CSI-SAKEC

conducted two events: - eUreka-

Technical Quiz and iDeveloper-

an Application Development

competition which were held onth7 March 2009. Mr. Shirkant

Karode, IT Head, Crompton

Greaves , the chief guest ,

inaugurated the SAKEC leg of

I n v e n t ' 0 9 .

Out of thirty participating

teams in eUreka, five were

shortlisted based on an online test

that tested the contestants on

  basic concepts which are

common to all branches of

engineering.

The Convention Finalethwas held on 17 March, 2009 at

K.J. SIMSR and was inaugurated

  by the chief guest, Mr. S.

Mahalingam - CFO, Tata

Consultancy Services & Vice

President Computer Society of

India. It was followed by the

release of the magazine Epoch '09

celebrating 10 years of CSI

Conventions. It was an eventful

day consisting of seminars such as

Wi-Fi Security Systems by

Mr.Jatin Parikh from Airtight

Security, Internet Marketing by

Vishal Prabhukhanolkar-Director,

Quetzal Verify Private Limited,

Panel Discussion on “The future

of IT in this period of meltdown.”

  by Mr. Anand Jhaveri (Founder,

Chairman and CEO Rave

Technologies), Ms. Rajashri

Hazare (Director - Cerebrus

Consultants) and Mr. Kunal

Gursahani (Director for Global

Strategy and Marketing-Alpha

Plus Technologies) and an

intensive Linux Workshop.

The final round of eUreka

was held in parallel to a full house.

The five teams were quizzed on

topics ranging from digital logic

t o m i c r o p r o c e s s o r s t o

programming. The audience was

kept captivated by the brain

tingling questions and excellent

hosting.

To conclude, we, at CSI-

SAKEC, treasure the experience

got from direct interaction with

the CSI Mumbai Chapter and

with the other CSI Student

Centers. We hope to continue

  being a part of this technical

extravaganza in the years to come.

!NVENT '09

March 2010CACHE  

 R 

.

 J O R N E Y  S O F A

. ..

CSI-SAKEC Reviews of CSI-SAKEC events

4

8/9/2019 Cache Csi Sakec Magazine

http://slidepdf.com/reader/full/cache-csi-sakec-magazine 12/40

 c  T  eh  t

a  i  n  m  e  n  t

A data stream is a real-

time, continuous, ordered

(implicitly by arrival time or

e x p l i c i t l y b y t i m e s t a m p )

sequence of items. For analysis of

such data, the ability to process

the data in a single pass, or a small

number of passes, while usinglittle memory, is crucial. However

it is not possible to control the

order in which items arrive, nor is

it feasible to locally store a stream

in its entirety. As a result,

developing clustering algorithms

for streaming data has emerged as

an important problem in the area

of clustering.

The clustering problem isa difficult problem for the data

stream domain. This is because

the large volume of data arriving

in a stream renders most

traditional algorithms too

inefficient. These data sets are far

too large to fit in main memory

and are typically stored in

secondary storage devices. Linear

scans are the only cost effectiveaccess method; random access is

prohibitively expensive. Not only

those but some data sets, such as

r o u t e r p a c k e t s t a t i s t i c s ,

meteorological data, and sensor

network data, are transient and

need not be realized on disk.

 What is Clustering?

  Clustering problem can be

formally defined as follows:

Given n points in a metric

space M, partition the points into

k clusters so as to minimize the

maximum cluster diameter.

The diameter of a cluster is

defined to be the maximum inter-point distance in it. Sometimes the

objective function is chosen to be

the maximum cluster radius.

Data Stream  is sequence

of points x ,…x,…xn read in1 i

increasing order of the indices i.

The Data Stream Model 

assumes that input data are not

available for random access from

disk or memory, but rather arrivein the form of one or more

continuous data streams.

The stream model differs from

the standard relational model in

the following.

· The elements of a stream arrive

online (the stream is “active” in

the sense that the incoming items

trigger operations on the data,

rather than being send on request).· The order in which elements of a

stream arrive are not under the

control of the system.

· Data streams are potentially of

unbounded size.

· Data stream elements that have

  been processed are either

discarded or archived.

· They cannot be retrieved easily

unless being stored in memory,which is typically small relative to

the size of the stream.

· Due to limited resources

(memory) and s tr ict t ime

constraints, the processing of

stream data will usually produce

approximateresults.

Considering above-

mentioned features of the

Streaming data, Clusteringalgorithm for

streaming data must have

1.Clustering Streaming Data

Decode clustering, Discoverhow to combat your fear of coding,

hack with principles, the logic behind pageranking... learn all this and much more in the

following section containing articles contributed byboth professors and students of SAKEC.

Mr.Uday Bhave

Professor

Head of Dept. (Computer)

March 2010 CACHE  

Invited Articles CSI-SAKEC

5

8/9/2019 Cache Csi Sakec Magazine

http://slidepdf.com/reader/full/cache-csi-sakec-magazine 13/40

following characteristics

· It should be strictly one pass.

· It can be paused any time to

view current structure of the

clusters.

· It can be resumed again.

· It must take current trends intoconsideration while clustering.

S i n g l e p a s s c l u s t e r i n g  technique:

T h i s t e c h n i q u e i s

summarized as follows:

1. Divide large data-set into

chunks (windows)

2. For each window, initialize

with random cluster seeds and

assign each point to its closest

center.

3. When all points in the window

are assigned to cluster centers,

adjust weight to each cluster

center by the number of points

assigned to it.

4. When all windows are

clustered, Cluster these weighted

cluster centers from each window

into final desired number of

clusters.

Above technique is fine

for clustering large database in

single pass but cannot be used

directly for streaming data as it

considers that the whole data is

available, though large, before

clustering process begins.

The above idea can be

further explored to suit for the

streaming data. In general two

approaches are considered for

streaming data:

1. Local Clustering and

2. Incremental Clustering

1. Local Clustering Approach:

Local clustering is based

on processing the complete

window to generate the clusters

(local to that window). These

clusters may be utilized in the

next window as a starting

solution.

Local Clustering approach:

1. Fix no. of centers (k), initial

points (m), size of window (n)

2. Randomly initialize 'm' cluster

means for window.

3. Fill the window with new

points.

4. Perform iteration of k-means

clustering on the points in the

window till it converges.5. Give weights to each center

 based on number of points in it.

(Summarization)

6. Adjust cluster centers of the

window, accordingly

7. Repeat from step 2

2. Incremental Approach:

Incremental clustering

algorithms employ division of

stream in windows. They use

weighted windows and treat

them as generation. It adjusts

cluster centre as and when new

p o i n t a r r i v e s ; b u t

merging/splitting is done at the

end of the generation. This gives

t i m e t o e v a l u a t e c u r r e n t

generation, recognize new trends

and thus can locate outliers and

patterns in current data easily.

I n c r e m e n t a l c l u s t e r i n gtechniques

1. Fix no. of clusters (k), initial

points (m), size of window (n)

2. Randomly select 'm' cluster

centers for window.

3. Assign points to these m centers

and increment wt accordingly.

Adjust centers with each point.

4. Once entire window is

processed decide fittest centers

from 'm' and use it in new window,

add new centers with weight=1.

5. Continue with steps 3 and 4.

6. When final clusters are

recorded, Group m centers from

step 5 into k centers to create final

clusters.

Fitness criteria in step 4

may be depending upon type of

application in hand. It can bepossibly a threshold, comparing

weights of the centers. If weight of

the center is less than threshold, a

center can be discarded.

Considering new trends:

As seen in both the

techniques above, it becomes

necessary to devise techniques for

maintaining summaries orsynopses of the history of the

stream. Most research until now

has focused on techniques for

 building summaries of all the data

seen so far. However, in most

applications very old data points

are considered less useful and

relevant than more recent data.

Thus it is necessary that old or

“ s t a l e ” d a t a d o e s n o toverly.influence the statistics.

Sl iding window approach

considers new trends in a good

manner. This can be further fine-

tuned, according to the specific

requirements by reducing

weights of the old windows

exponentially and thus to have a

control in the manner in which

trends should be handled.Conclusion:

In the case of incremental

March 2010CACHE  

Invited Articles

I N M E 

T E C H T A

N T 

CSI-SAKEC

6

8/9/2019 Cache Csi Sakec Magazine

http://slidepdf.com/reader/full/cache-csi-sakec-magazine 14/40

clustering, at the arrival of each

point cluster centers are pulled out

or pulled in towards the new point.

This essentially takes new trends

into consideration. Furthermore

at the end of processing of current

window, clusters with less

number of points (weight) are

discarded, giving better means of

handling outliers. (Or can bestored for future visualization)

L o c a l C l u s t e r i n gtechnique has to use one of theexisting algorithms like k-meansfor clustering current window andthus heavily depend upon prosand cons of the algorithm used forl o c a l c l u s t e r i n g , w h e r e a si n c r e m e n t a l c l u s t e r i n g i sadaptable and not using any of thetraditional algorithm and directlyconsiders each new point arrivedfor clustering decision.

Another point to

  be noted is that, local clustering

method has to wait till the entire

widow is clustered completely

and then only it can continue

responding to the input. This may

not be suitable for transient data

streams, where portion of the

stream may be lost, on the other

hand incremental technique

processes with each newly

arrived data point. If arrival of the

transient data is at very highs p e e d c o m p a r a b l e w i t h

computation, portion of the

stream within the window itself

may be lost. This would be more

objectionable than to lose some

portion after each window.

In essence, local clustering

gives better clustering quality, but

is slow whereas incremental

clustering takes current trends

into considerations in better way,at the cost of overall cluster

quality. Thus it can be finally

concluded that Incremental-

clustering approach is better-

suited approach particularly for

clustering streaming data.

March 2010 CACHE  

Surf the internet without any browser.(However there must be an internet connection)

1. Go 2 the paint...2. Select the HELP...help topic OR F1.3. Right click on the title bar in the help window and the select the contextcommand ' jump to URL'4. Enter the complete web address in the subsequently dialog as the

'http: //www.yahoo.com' click ok....

5. Then again open the dialog box 'http://www.yahoo.com' right on upperside......and more blank space left....u write the website..and got it...

Invited Articles

 I N T

 T E C H T A

M E N

CSI-SAKEC

7

8/9/2019 Cache Csi Sakec Magazine

http://slidepdf.com/reader/full/cache-csi-sakec-magazine 15/40

March 2010CACHE  

1. 3D Reconstruction

3D reconstruction is the problem

of recovering depth information

from intensity images. One

c o m m o n a p p r o a c h o f 3 D

reconstruction uses multiple

images. It is based on the principlethat a physical point in space is

projected onto different locations

on images captured from

different viewpoints . The

difference in the projected

locations is used to infer depth

information.[1].

Specifically, consider a rigid

object represented by a set of N 3D

points,{pi(f)} on some coordinatesystem at frame f. Each point pi(f)

is projected onto an image,Is(f),

which is captured from a

viewpoint s. Then mi(f), the

point's coordinates in the Image

Coordinate System can be

expressed in terms of a vector-

valued non-linear function h :

h is a simplification of the

perspective equations for a

specified camera.

Given a set of images that are

taken from different viewpoints s

(structure-from-stereo) or at

different time frames f (structure-from-motion), we may be able to

reconstruct the points from a

complete set of their projections .

T h e r e a r e t w o

computational sub-problems

a s s o c i a t e d w i t h 3 D

reconstruction from two or more

images:

1. Feature correspondence,

2. Structure estimation.

The first problem is best

explained in an example. For

instance, a physical 3D point is

projected onto Image A as point 1

and Image B as point 2. Points 1

a n d 2 a r e s a i d t o b e

correspondences. Hence, the

feature correspondence orfeature matching problem is to

find where point 2 is on image B

given the location of point 1 on

image A. Human vision is superb

in solving this problem, but the

automation of this process by

computers is rather difficult. It

essentially requires a search on

the whole image B. Applying

proper constraints can narrowdown the search, but without

sufficient constraints , the

problem becomes difficult and

ambiguities arise.

The second problem, structure

estimation, is relatively easy in

comparison. It is the computation

of the point set {Pi} after the

correspondence problem is

solved. The difficulty of this sub-problem depends on the amount

of a priori information available.

onsequence, even if intrinsic and

extrinsic parameters are known,

the challenge remains for

developing algorithms that

reduce the effects of errors in the

preprocessing steps on the

structure estimate.

If the intrinsic and extrinsic

parameters of the camera are

known for the whole set of images,

then an exact reconstruction in

absolute coordinates is possible.

However, the accuracy of the

reconstructed s tructure is

sensitive to the accuracy of these

parameters. Moreover, any errors

in solving the correspondenceproblem between two images also

affect the accuracy of the

reconstruction. As a consequence,

even if intrinsic and extrinsic

parameters are known, the

challenge remains for developing

algorithms that reduce the effects

of errors in the preprocessing

steps on the structure estimate.

2 Feature Extraction

In some 3D reconstruction

applications, it may be necessary

to estimate the structure of a scene

for every point in the image.

However, sometimes we may

o n l y b e i n t e r e s t e d i n

reconstructing the depth of an

object or scene at certain parts.

Image features usually refer to

parts of an image that have special

propert ies , and they may

correspond to parts of an object or

))(,()( f   pi sh y x f  m si =úûùê

ëé=

2.Structure from

Stereo Jyoti Joglekar

 Asst. Prof.

Computer Engg. Department

Invited Articles

I N M E 

T E C H T A

N T 

CSI-SAKEC

8

8/9/2019 Cache Csi Sakec Magazine

http://slidepdf.com/reader/full/cache-csi-sakec-magazine 16/40

If some files cannot be deleted by the delete key, try to navigateThat folder on the command prompt and use the erase command.

March 2010 CACHE  

scene that have structural

significance, to regions that have

visually identifiable textures or

intensity patterns, or to

a n y o t h e r d e r i v e d

properties that can be

localised on an image.

Some common examples

are edges, lines, corners,

  junctions, ellipses, andzero-crossings of image

gradients.

common examples are

edges, lines, corners,

  junctions, ellipses, and

zero-crossings of image

gradients.

Feature extraction is the process

of locating these particularelements on an image and it is an

intermediate step for many

computer vision applications.

The choice of features to extract

for reconstruction very often

depends on the properties of the

objects in the scene. Some

important factors to consider are

invariance, ease of detectability,

and how they are eventually used.Point features, are features that

c a n b e l o c a l i s e d i n t w o

dimensions. Point features are

easy to represent mathematically

and they can directly correspond

to three dimensional points in

space. Many features that can be

localised to a point are usually

easy to detect, and are relatively

consistent across different images

compared to other features such

as edges and lines. There are

many mathematical definitions of

localised image structures and

sometimes they are broadly

compared to other features such

as edges and lines. There are

many mathematical definitions of

localised image structures and

sometimes they are broadly

identified as corners.

3. Structure From Stereo

The use of stereopsis for depthperception in human vision is a

well known phenomenon.

Structure-from-stereo simply

refers to the class of computer

vision algorithms that applies the

same principle for inferring depth

information from images taken

from different viewpoints[2]. A

Figure 1 : A typical s tereo camera

configuration used for capturing stereo

images.

typical binocular stereo camera

system is illustrated in Figure 1. In

summary, the two cameras are

mounted such that their optical

axes (the Z -axes) are coplanar and

aligned in parallel. The separation

 between the optical centres of theleft and right cameras is called the

 baseline, and it is usually created

  by a translation between the

cameras' optical centres

along their common X -

axis.

i n f o r m a t i o n f r o m

images taken from

different viewpoints[2].

A typical binocular

stereo camera system is

illustrated in Figure 1. In

s u m m a r y , t h e t w o

cameras are mounted

such that their optical

axes (the Z -axes) are

coplanar and aligned in

parallel. The separation between

the optical centres of the left and

right cameras is called the

 baseline, and it is usually created

  by a translation between the

cameras' optical centres along

their common X -axis.

The left and right cameras in the

stereo system capture a pair of

images, s imultaneously or

separately when no changes have

occurred in the scene between theacquisition of the two images. In

stereo vision, the difference in the

projected positions of a point on

the left and right images is

referred to as the disparity, and

the collection of disparity values

for a whole image is known as the

disparity map.

Invited Articles

 I N T

 T E C H T A

M E N

CSI-SAKEC

9

8/9/2019 Cache Csi Sakec Magazine

http://slidepdf.com/reader/full/cache-csi-sakec-magazine 17/40

Animation is the rapid

display of a sequence of images of

2-D or 3-D artwork or model

positions in order to create an

illusion of movement. It is an

optical illusion of motion due to

the phenomenon of persistence ofvision, and can be created and

demonstrated in a number of

ways. The most common method

of presenting animation is as a

motion picture or video program,

although several other forms of

p r e s e n t i n g

animation also

exist.

E a r l y

e x a m p l e s o f

a t t e m p t s t o

c a p t u r e t h e

phenomenon of

motion drawing

can be found in

paleolithic cave

paintings, where

a n i m a l s a r e

depicted with

multiple legs in

superimposed

positions, clearly

a t t e m p t i n g t o

c o n v e y t h e

p e r c e p t i o n o f

motion.

A 5,200 year old earthen

  bowl found in Iran in Shahr-i

Sokhta has five images of a goat

painted along the sides. This has

 been claimed to be an example of

early animation. However, since

from sequential drawings using

t e c h n o l o g i c a l m e a n s , b u t

animation did not really developmuch further until the advent of

cinematography.

There is no single person

who can be considered the

"creator" of the art of film

animation, as there were several

people doing several projects

which could be considered

various types of animation all

around the same time.Georges Méliès was a

creator of special-effect films; he

was generally one of the first

people to use animation with his

technique. He discovered a

technique by accident which was

to stop the camera

rolling to change

something in the

scene, and thencontinue rolling

the film. This idea

was later known

as stop-motion

animation. Méliès

discovered this

t e c h n i q u e

a c c i d e n t a l l y

when his camera

  b r o k e d o w nwhile shooting a

  bus driving by.

When he had

fixed the camera,

a h e a r s e

happened to be

passing by just

as Méliès restarted rolling the film,

his end result was that he had

managed to make a bus transforminto a hearse. This was just one of

the great contr ibutors to

animation in the early years.

no equipment existed to show the

images in motion, such a series of

i m a g e s c a n n o t b e c a l l e d

animation in a true sense of the

word.

T h e   phe nak i s t os cope ,

 praxinoscope  , as well as thecommon   flip book were early

popular animation devices

invented during the 1800s, while a

Chinese zoetrope-type device was

invented already in 180 AD. These

devices produced movement

3.Computer

 AnimationMs.Dhanashree K Toradmalle

 Asst Professor

(IT Dept)

An Egyptian burial chamber mural, approximately 4000 years old, showing

wrestlers in action. Even though this may appear similar to a series of animation

drawings, there was no way of viewing the images in motion. It does, however, indicate

the artist's intention of depicting motion.

March 2010CACHE  

Invited Articles

I N M E 

T E C H T A

N T 

CSI-SAKEC

10

8/9/2019 Cache Csi Sakec Magazine

http://slidepdf.com/reader/full/cache-csi-sakec-magazine 18/40

T h e p r o d u c t i o n o f

animated short films, typically

referred to as "cartoons", became

an industry of its own during the

1910s, and cartoon shorts were

produced to be shown in movie

theaters.

Traditional animation (also

called cel animation or hand-

drawn animation) was theprocess used for most animated

films of the 20th century. The

i n d i v i d u a l f r a m e s o f a

traditionally animated film are

photographs of drawings, which

are first drawn on paper. To create

the illusion of movement, each

drawing differs slightly from the

one before it. The animators'

d r a w i n g s a r e t r a c e d o rphotocopied onto transparent

acetate sheets called cels, which

are filled in with paints in

assigned colors or tones on the

side opposite the line drawings.

The completed character cels are

photographed one-by-one onto

motion picture film against a

painted background by a rostrum

camera.T h e t r a d i t i o n a l c e l

animation process became

obsolete by the beginning of the

21st century. Today, animators'

drawings and the backgrounds

are either scanned into or drawn

directly into a computer system.

Various software programs are

used to color the drawings and

simulate camera movement andeffects. The final animated piece is

output to one of several delivery

media, including traditional 35

mm film and newer media such as

digital video. The "look" of

traditional cel animation is still

preserved, and the character

animators' work has remained

essentially the same over the past

70 years. Some animation

producers have used the term

"tradigital" to describe cel

animation which makes extensive

use of computer technology.

Examples of traditionally

animated feature films includePinocchio (United States, 1940),

  Animal Farm (United Kingdom,

1954), and  Akira (Japan, 1988).

Traditional animated films which

were produced with the aid of

computer technology include The

Lion King (US, 1994) Sen to Chihiro

Walt Disney studio (Beauty and the

Beast ,  Aladdin , Lion King) to the

more "cartoony" styles of those

produced by the Warner Bros.

animation studio (Iron Giant,

Quest for Camelot, Cats Don't

Dance). Many of the Disneyanimated features are examples

of full animation, as are non-

Disney works such as The Secret of 

NIMH  (US, 1982) and The Iron

Giant (US, 1999), Nocturna (Spain,

2007)

R o t o s c o p i n g   i s a

technique, patented by Max

F l e i s c h e r i n 1 9 1 7 , w h e r e

animators trace live-actionmovement, frame by frame. The

source film can be directly copied

from actors ' outlines into

animated drawings, as in The Lord

of the Rings (US, 1978), used as a

 basis and inspiration for character

animation, as in most Disney

films,

Live-action/animation is

a technique, when combininghand-drawn characters into live

action shots.

 2D animation

2D animation figures are

created and/or edited on the

computer using 2D bitmap

graphics or created and edited

using 2D vector graphics. This

i n c l u d e s a u t o m a t e dcomputer ized vers ions o f

traditional animation techniques

such as of tweening, morphing,

onion skinning and interpolated

rotoscoping.

3D animation

3D animation are digitally

modelled and manipulated by an

animator. In order to manipulatea mesh, it is given a digital skeletal

structure that can be used to

Animation:

Tracing

live-action

Movement

Frame by

frame…

no Kamikakushi (Spirited Away) (Japan, 2001), Treasure Planet 

(USA, 2002) and Les Triplettes de

Belleville (2003).

Full animation refers to the

process of producing high-

quality traditionally animated

films, which regularly use

detailed drawings and plausible

movement. Fully animated films

can be done in a variety of styles,from realistically designed works

such as those produced by the

March 2010 CACHE  

Invited Articles

 I N T

 T E C H T A

M E N

CSI-SAKEC

11

8/9/2019 Cache Csi Sakec Magazine

http://slidepdf.com/reader/full/cache-csi-sakec-magazine 19/40

control the mesh. This process is

called rigging. Various other

techniques can be applied, such as

mathematical functions (ex.

gravity, particle simulations),

simulated fur or hair, effects such

as fire and water and the use ofMotion capture to name but a few,

these techniques fall under the

category of 3d dynamics. Many

3D animations are very believable

and are commonly used as Visual

effects for recent movies.

So, what does it take to be

a 3D artist? Well, obviously, you

must have an eye for art. Most

people who begin learning 3Dhave some kind of background in

drawing and sketching. It's not

unheard of for 3D studios to hire

artists who have no experience in

3D, based solely on the strength of

a pencil drawing portfolio.

Sculptors, who were previously

limited to animatronics and

claymation (clay animation), also

tend to make an easier transitionto 3D.

Even if you don't have

formal art training that goes

 beyond the few classes you took

in high school or college you can

still do great work in 3D.

A 3D Artist must have

following qualities:

1. Patience. Many beginnersunfairly compare themselves to

established artists possessing

years of experience. While it can

  be a great motivator and a

valuable source of inspiration, 3D

art is a diverse subject, requiring

dedication and practice. Some

say that 3D is like Go, the ancient

game of strategy: it takes minutes

to learn, but a lifetime to bemaster.

2. Detail. 3D artists tend to have a

strong background in computers,

compared to non-digital artists.

E x p e r i e n c e i n c o m p u t e r

programming is common in 3D

circles, though not required. 3D

artists need to have an eye for

detail, be resourceful and self-

sufficient.3. Hard work. If you want

something easy, pick up a pencil

and paper and start drawing. 3D

art isn't nearly as immediate with

results. One can spend, hours,

days, and even weeks perfecting a

3D model before ever moving

onto texturing, animation or final

renders. 3D art is unique in that it

can require a broad array of skills,

from drawing to acting, to

successfully bring together a

finished piece. The payoff is that

3D artist is perhaps the most

sought-after creative workers.4. Willingness to accept criticism.

Eventually you'll feel motivated

to submit your art for review by

other artists. 3D artists can nitpick

like no one else in the world, so be

prepared to have even the

slightest error pointed out to you

in exacting detail - especially if

you're attempting to create

anything realistic. If you intend towork in a studio one day, your

ability to accept criticism will be

crucial to the overall success of the

team.

March 2010CACHE  

Invited Articles

Ü400 => this is bad request error, First check you may be typing wrong URL name and

server could not understand your request.

Ü401 => you are trying to open any unauthorized access site or page. Check your

username and password if you are trying to open any webpage.

Ü402 => Payment Required Error

Ü403 => you are trying to open any forbidden page and you are blocked by that domain.

Ü404 => you are trying to open the webpage that was removed or re-named, also

check the URL spell ing.

Ü408 => this is time out error. You should send the request with in t ime that the serverset for you.

Internet Error codes and Meaning

I N M E 

T E C H T A

N T 

CSI-SAKEC

12

8/9/2019 Cache Csi Sakec Magazine

http://slidepdf.com/reader/full/cache-csi-sakec-magazine 20/40

When you are placed

in an IT firm and all

you have to do from

9:00 am to 5:00 pm is

fiddle around with a

piece of code, you are

Bound to figure a

way around it.

As a lecturer in the

I n f o r m a t i o n T e c h n o l o g y

department of Shah and Anchor

Kutchhi Engineering College for

more than a year now, I know one

thing for sure, not many of us are

comfortable when it comes to the

word 'coding'. As a student it wasC programming, as a teacher now

its Java programming, thanks or

no thanks to the new pattern of

the syllabus.

As a student I had a

colleague who used to finish

his practical session in one

hour flat and I used to take

about a day. I definitely felt an

inferiority complex creepinginside me and that to a certain

extent did motivate me, but to

most of us it's quite perplexing. I

knew I had to clear the air on a

topic like this because I came

across a very peculiar situation

lately. I was conducting my

practical session and while most

students were struggling doing

their programs, I noticed this onegirl who never bothered to even

try. All of a sudden, when it was

about time to leave, she had a

program ready and fit for

execution. I knew at once it was a

c a s e o f m u c h n e g l e c t e d

plagiarism in Mumbai University.

I asked her, “Listen, I know you

haven't written this program on

your own. How can I possiblygrade your work?” She was very

quick in replying, “Sir, I

completely understand this

program and you can ask me any

question you want on this piece of

code.” After a few ifs-and-buts

she confessed that she couldn't

write a program, but she knew all

the syntaxes well. She knew all

t h e i n t r i c a c i e s o f J a v a

programming. She basically

knew the theory well, but she

couldn't create something called

as a working program.

Now is another situation:

this one is kind of personal. I

once gave a technical

interview and was asked

about a project which I had

implemented using VB.net. The

interviewer asked me to elaborate

on the .net framework. I didn't

have much of a say, because I

really didn't know what it meant,

 but I could write any program in

.net given the MSDN library and

an Internet connection. I was

obviously given negative marks

for such an answer.

4.Code'Oh’Phobia!!!- Harshad M. Mande

Ex-Lecturer I.T.

What I just presented to

you are two situations which a so

called IT engineering student

finds him in. One is when he

knows the theory, and the other

one is when he can put things to

practice without knowing much

of the theory. Often students askme, “Sir, I am very weak in C

programming. Which book

should I refer to?” It's one of those

situations where I cannot conjure

up a considerable advice. A

reasonable answer to such a

question is another question:

“Which exam are you preparing

for?” If the answer is say exam A,

then I would give him a decentenough book to read, some links

to refer to, but if the answer is I-

 just-want-to-learn-programming.

Then my answer would take a

completely different form. The

f a c t i s y o u c a n n o t l e a r n

programming by reading a lot of

l i t e r a t u r e . I t ' s j u s t l i k e

assimilating a lot of knowledge

 but not knowing where to use it.In the case of programming you

have to follow the adage: If you

want to learn to swim, u should

  just jump directly into the well.

This is how many infamous

swimmers learn how to swim.

Start with a set of programs and

keep hitting your keyboard is the

mantra.

Now many people get to avery fantastic start. They are

really spirited when it comes to

March 2010 CACHE  

Invited Articles

 I N T

 T E C H T A

M E N

CSI-SAKEC

13

8/9/2019 Cache Csi Sakec Magazine

http://slidepdf.com/reader/full/cache-csi-sakec-magazine 21/40

this new methodology. But what

exactly happens is that coding the

wrong way can be quite a

dampener. Within no time you are

so demoralized that you decide

that coding is not your piece of

cake. Now what exactly is thiswrong way of coding? It's

 basically writing a program with

whatever syntax you know and

then constantly compiling it to

discover some errors. Then again

you wonder what the errors are so

you keep staring at the code and

hope that some Bill Gate's spirit

enters you and you are able to

debug the error. But such a scenenever happens. So you go back to

your books and literature and

hope to find a solution to the error.

Then you see the size of the book

and you keep it away. Then you

say I would rather watch a movie

than write code.

Well what separates a

good programmer from a non

programmer is his speed andaccuracy in programming. The

one helping hand that God (in our

case the compiler designer) does

provide is a debugging tool.

Instead of sitting in front of the

computer screen and staring at

your code you can use the single

step debugging, the watch

windows, etc. and discover your

sticky bugs in no time. In theprocess you end up learning a lot

about the details of program

compilation and execution. For

those who are unaware about

using these tools meet me over acup of Java (Java is a kind of coffee,

for those who don't know).

One must remember that

it's no great deal to be a good

programmer. You may contact

some of your senior friends who

are placed in IT companies and let

them drip nostalgia over their

coding fear. They would possibly

laugh over it. It's for a fact thatcoding ain't tough. It's about the

number of hours you give to it.

When you are placed in an IT firm

and all you have to do from 9:00

am to 5:00 pm is fiddle around

with a piece of code, you are

 bound be a figure a way around it.

Currently as students you are not

able to give enough time to coding,

 because you are not really gettingpaid for it, you are actually paying

for it (Haha). Another important

thing is coding is like slavery to

your computer. You are a slave to

the syntaxes of the programming

language. And considering the

rich Indian heritage of slavery as

an Indian we are born to be good

programmers.

The programmers whoreally shine out of this huge

  battalion of the coders are the

ones who write clean and efficient

programmes. The programs that

are time and space efficient, are

the so-called good programs.

Have you ever wondered how a

game program sits on your 25MB

of feeble memory on your cell

phones? It's because someone has

written the application using the best possible space efficient logic.

For beginners I would strongly

suggest you to read this definitive

guide on programming, called

T h e A r t o f C o m p u t e r

Programming by Donald. E.

Knuth (pronounced as 'Kuh'nuth)

Volumes 1 to 4. He has very

convincingly given you a vivid

treatment on programmingdescribing as an art than a mere

science. Throw away your Chetan

Bhagats or Harry Potters and pick

up a copy of this book. A little bit

of dedication and a pinch of

mental commitment is the recipe

t o o v e r c o m e y o u r

Code'Oh'Phobia!!!

March 2010CACHE  

Have fun with ALT!!!

Invited Articles

I N M E 

T E C H T A

N T 

CSI-SAKEC

14

8/9/2019 Cache Csi Sakec Magazine

http://slidepdf.com/reader/full/cache-csi-sakec-magazine 22/40

For as far as most of us canremember now, we have usedonly one tool for starting of ourquests into the great World WideWeb. A simple page with just onetext box and a few buttons hides

 behind it a mammoth machinery

which has compelled millions ofusers to set it as their home pageand use it innumerable times perday. I am of course talking aboutGoogle, the undisputed King ofSearch. With its simplisticinterface and clean and accurateresults it has firmly lodged itselfas one of the most powerfulentities on the Internet. So muchso that searching on the net is

often colloquially referred to as'Googling'!

So how does Google do it?

The secret behind it is a

combination of simple logic and

some basic mathematics. Google

calls this secret, the PageRank

Algorithm. To understand

PageRank, we will first see how

most modern Search Engines

search the Web:They make use of somethingcalled as a Crawler (or Search-botor Web-bot or spiders). Thesecrawlers move through the WorldWide Web from page to pagethrough Hyperlinks (links toother webpages). Each time theyencounter a new page they indexthe information in that page and itis stored in a central database.

Whenever the user types in aquery, the query or keyword issearched against the database and

the pages which are related tothat keyword are listed as results.As one can imagine, the problemhere is that each keyword willgive millions of results majorityof which will be useless to the

The trick is

therefore to sort

the [million] results

correctly. This

Is exactly what

PageRank does and

does it very well.

currently is quite complicatedand a closely guarded secret, butthe formula used when Googlewas still being developed was:

PR(A) = (1-d) + d(PR(t )/C(t ) + ... +1 1

PR(t )/C(t ))n n

Here, A = Current Page,t ….t = pages linking to A,1 n

PR(X) = PageRank of page X,

C(X) = Number of outbound links from

page X,

d = dampening factor.

In simple words, this means:· If a page has a large number of

pages linking to it, it gets ahigher rank: This is the basic

criteria of PageRank. If only thiscriterion was applied anyonecould have increased thePageRank of their webpage but

 just paying to put up their links onas many websites as possible. ButGoogle is not fooled as easily.· If a page is linked to by a page

which itself has a high PageRank,it gets a higher rank: This ensuresthat pages recommended by siteswhich are well known, get betterPageRank.· If a page is linked to by a pagewhich does not have links to a lot

of other pages, it gets a higherrank: This ensures that no pagegets a higher rank just by havingits links in otherwise empty sites.If a page is listed in a Link Farm (awebsite which has no real content

of its own but only holds links toother websites), it is penalized bya decrease in its PageRank.

user. The trick is therefore to sortthe results correctly. This is exactlywhat PageRank does and does itvery well.

PageRank implements aranking method that no othersearch engine had thought of

 before it. Basically, it determineshow good a page is by the numberof web pages linking to it. Thatmeans, if a certain webpage has alarge number of websites givinglinks to it, it will be ranked higher.This logic is based on simplecommon sense that if a page islinked to more, it must be morepopular and therefore morerelevant. Though this is the major

criteria PageRank uses, it isdefinitely not the only one. Theactual algorithm used by Google

1.How

Google googles?-Sujay Narsale

B.E.(Computers)

March 2010 CACHE  

Contributed Articles

 I N T

 T E C H T A

M E N

CSI-SAKEC

15

8/9/2019 Cache Csi Sakec Magazine

http://slidepdf.com/reader/full/cache-csi-sakec-magazine 23/40

Apart from incominglinks described above, otherfactors determining a PageRankare:· The frequency and location of

keywords within the Web page: If the keyword only appears oncewithin the body of a page, it willreceive a low score for thatkeyword. Also PageRank takesi n t o a c c o u n t o t h e rcharacteristics such as thefont size of the keyword,title, file name, directoryname, etc to make sure thatthe keyword's importance

in the page is properlyknown.· How long the Web page

has existed: People createnew Web pages every day,and not all of them stickaround for long. Googleplaces more value on pageswith an established history.· Domain in which the

page exists: Some popular

domains get higher priorityautomatically since the useris most likely to be lookingfor results from them.

Though until now, itseems that Google has found aperfect, impartial and efficientalgorithm, it has its share ofdetractors. Google claims that itsPageRank algorithm is based onthe democratic nature of the Webwhere links equal to votes. ButPageRank's detractors point outthat:· In PageRank, rich people getmore votes than poor people, or,

in web terms, pages with higherPageRank have their votes

weighted more than the votesfrom lower pages.· Most sites have hundreds ofpages but the majority of linkscome to their home pages. This

means that the deeper pages in asite which have the most amountof information get very lowPageRank, while the home pagegets a disproportionately highrank.

· Also, Google decides how muchof a site to crawl depending on itsPageRank. This means that siteswith an average PageRank do notget their entire site indexed. This

further reduces their chances ofever improving their PageRankas Google does not bother to lookthrough it entirely.

D e s p i t e t h e s ehitches, the greatestproof that PageRankworks is its popularityitself. If it did not giveuseful results then it

would never havem o v e d o u t o f i t sfounders' garage. Also,Google has continued totweak its algorithmover time to iron out itsshortcomings. So muchso that, many believethe original PageRanknow plays on ly asubordinate role inordering of the results.The current algorithm isthought to focus moreo n t h e k e y w o r dcharacteristics. But with

Google keeping the actualalgorithm completely hidden(with good reason), we maynever completely understandhow Google googles.

March 2010CACHE  

 Quick PC Shut down

· Press Ctrl+ Esc key or the Win key and press 'U' two times

· Win+ M to minimize all windows and then Alt+F4 to bring the Turn Off computer dialog.

· Open Windows Task manager (Alt+ Ctrl+ Del) and choose Shut down from the menu. Useful when the

windows are not responding.

Contributed Articles

I N M E 

T E C H T A

N T 

CSI-SAKEC

16

8/9/2019 Cache Csi Sakec Magazine

http://slidepdf.com/reader/full/cache-csi-sakec-magazine 24/40

 Jugal Thakker

B.E.(Computer)

The term 'hacking' sounds

interesting to today's geeky

generation. So how many of us

know what hacking actually is?

How many know what the

purpose of hacking is? Let's

together try to recognize thesequeries.

To know who or what a

hacker is, we shall first see, what a

hacker is not? First and foremost

a hacker IS NOT A CRIMINAL!

Hackers are neither the ones who

 break the laws nor do they steal

credit card information. Likewise

hackers don't belong to the breed

of people who release viruses on

the internet. Interestingly, a

hacker may not always be a

computer wizard. All the above

descriptions that are seemingly

familiar to the definition of a

hacker are nothing more than a

m i s c o n c e p t i o n a n d a

misconstruction of the mass

media and people.

So, who is a hacker? Most

of the hackers have these very

i n t e r e s t i n g q u a l i t i e s a n d

characteristics. He likes to think

out of the box. Everything he tries

to do is with the aim of testing his

own limits! He always wants to

achieve things that so far people

h a v e c o n s i d e r e d t o b e

unachievable or impossible. He

will, almost always, want to try

out things that are not written in

the manual or the rule book. The

most important ingredient that a

hacker has is unlimited curiosity.

He constantly thrives to discover

unknown features, characteristics,

tips and tricks. A hacker has to be

dedicated to knowledge and

research in his field. He also is

highly creative and innovative.All these traits are necessity for

 being a hacker. After knowing this,

it's not bizarre to term the greats

of Newton, Einstein and Edison

as hackers. These were the real

hackers who did things beyond

the average person's aptitude;

they flourished to challenge andstretch the limits.

A hacker today, is by and

large associated with computers

and computer security. The

individualities that you need to

have to become a modern-day-

hacker are:- You need to excel in

computer security. You need to

know at least one programming

language, which more often than

not is, C++. You essentially have to

  be networking guru, you must

know how the internet works,

how the computers communicate,

and should know the in and out of

networking concepts and rules.

Moreover to be good hacker, you

need to have the basics of UNIX,

since all good security expertswill encounter UNIX at some time.

Most appropriately to catch a

criminal you need to become one,

hence, a hacking attitude , which

is to have criminal or a crooked

mind, is a prerequisite.

Let us have a look at the

following good real world

analogy to hacking. Assume the

ultimate goal is breaking into a

safe (the safe is a database, a

password file, confidential

records or whatever). The safe is

located inside of a physical

 building (the computer that hosts

the data). The building is located

inside a town (the computer is

connected to a network). There is

a path/highway leading to the

town and the path connects the

town to other towns and/or cities

(read Internet/Intranet). The

town/city is protected by a

tollgate or an inspection point (the

network is protected by a firewall,

screening router etc.) There might

 be certain residents (the police) in

the town looking for suspicious

activity, and reporting it to the

town's mayor (the police reports

attacks to the sysadmin) .

Buildings have their own

protection methods, locks &

2.‘Ethical’

Hacking!

White hat hackers

have prior

permissions from

the administratorto exploit the

loopholes!

March 2010 CACHE  

Contributed Articles

 I N T

 T E C H T A

M E N

CSI-SAKEC

17

8/9/2019 Cache Csi Sakec Magazine

http://slidepdf.com/reader/full/cache-csi-sakec-magazine 25/40

chains, and access doors (on-host

firewalling, TCP wrappers,

usernames and passwords).

T h e m o t i v e b e h i n d

hacking is what separates the

good guys from the bad ones. The

ones with a positive aim forhacking are termed as 'white hat

hackers' and the bad guys are the

'black hat hackers'. Understandably

the white-hats follow a set of rules

or ethics while exploiting a given

system hence they are also known

as ethical hackers. Ethics is

defined as 'the discipline dealing

with what is good and bad and

with moral duty and obligation'.More simply, one could say it is

the study of what is right to do in a

given situation. Whereas the only

ethic the black-hats follow is to

 break into the system regardless

of the security measures that are

taken to stop them from doing

that very task, of hacking. The

term hacking implies only to

  breaking into a system. Thekeyword here is, 'only'. That is, a

hacker, irrespective of the clan

that they belong to, aims only for

getting into the so called secure

network, but does not cause any

harm in terms of data loss or

stealing. So when people say that,

“my email account was hacked”,

they are actually wrong, because

of a fallacy in the usage of the term

hacker. It's is not the hackers who

cause harm, but they are the

'crackers'.

You may ask, s incehackers don't pose any harm, why

are there blacks and whites? The

white hat hackers have prior

p e r m i s s i o n s f r o m t h e

administrator to exploit the

loopholes into their application.

This exploitation brings out the

security issues with the system,

and hence, helps in creating a

much more secure application

and thus making ethical hackers

as ' friends of developers'. The black

hat hackers don't have any such

p e r m i s s i o n . U n l i k e t h e i r

counterparts, the black hat

hackers don't report the loopholes

to the owners. But, in almost all

c a s e s t h e s e s e c u r i t y

vulnerabilities are brought to the

notice of crackers, who in turn use

it to steal or destroy data.

Consequently black hat hackers

are '  friends of crackers'. To begin

their journey to be deemed as

ethical, they are officially hired by

the companies, wherein theyperform penetration tests onto the

systems that the company builds.

A penetration test is basically

  breaking into the network and

hence finding weak points in the

system. These weak points are not

exploited by them, but instead

like innocent good boys are

reported to the owners. The

system admins improve on thesevulnerabilities.

So, all the to-be-hackers

reading this, decide upon what

ethics you plan to follow, what

kind of a hacker you aim to be,

and decided for yourself whether

you fall into the elite group of

'ethical hackers'.

March 2010CACHE  

Contributed Articles

I N M E 

T E C H T A

N T 

CSI-SAKEC

18

Google Search Made EASY

§ Site-specific. Use site: operator to search only within a certain website.[site: dumbl ittleman

§ File types. If you just want to search for .PDF files, or Word documents, or Excel spreadsheets,

for example, use the f ile type: operator.

§ Answer to l ife, the universe, and everything. Search for that phrase, in lower case.

§ Intitle: at the beginning of a query word or phrase (intitle:"Three Blind Mice") restricts your

search results to just the titles of Web pages.§ Intext: searches only the body text, ignoring titles, l inks, and so forth. Intent: is perfect when

what you're searching for might commonly appear in URLs.

8/9/2019 Cache Csi Sakec Magazine

http://slidepdf.com/reader/full/cache-csi-sakec-magazine 26/40

 Anilkumar PandaT.E.(I.T.)

Dhaval Savla

T.E.(computers)

The foundations of

The nextgeneration of

computing… A world

where the network isthe platform for

all Computing…

the concept of cloud computing

was present long ago it is poised

to take off now. But the question is

what is cloud computing?

CLOUD COMPUTING 

refers to both the applications

delivered as services over theInternet and the Hardware and

s y s t e m s s o f t w a r e i n t h e

datacenters that provide those

services. It delivers higher

efficiency, massive scalability, and

f a s t e r , e a s i e r s o f t w a r e

development. special kind of

software called middleware.

In cloud computing your

data is present on your machine  but on a remote server of the

company providing you the

s e r vice. In order to access your

data you just need to install the

middleware software that will

connect you to the cloud when

needed and you can use the entire

services in the cloud (the net or

the remote server) as per your

requirement).

The basic technologies for

cloud computing such as

horizontal scaling, distributed

computing nodes, virtualization

have been available for some time.

Virtualization the abstraction of

computer resources is the

cornerstone technology for all

c l o u d a r c h i t e c t u r e s .

Virtualization allows servers,

storage devices, and other

hardware to be treated as a pool of

resources rather than discrete

systems, so that these resources

can be allocated on demand.

T e c h n i q u e s s u c h a s

 paravirtualization which allows

a single server to be treated as

multiple virtual servers, and

clustering which allows multiple

servers to be treated as a single

server.

cloud computingsystem , consists two sections: thefront end and the back end. Theyconnect to each other through anetwork, usually the Internet .The

front end is the client's computerand the applications required to

access the cloud computingsystem. On the back end of thes y s t e m a r e t h e v a r i o u s

computers, servers and datastorage systems that create the"cloud" of computing services.Each application will have its owndedicated server. Central servera d m i n i s t e r s t h e s y s t e m ,monitoring traffic and clientdemands to ensure everything

A

March 2010 CACHE  

The other day I was

talking to one of my friend

regarding his graphics project. He

was complaining about his slow

processor and other hardware

constraints which severely

hampered the development andtesting of his project . .Jokingly he

asked me if he could get a faster

processor or bigger RAM for his

system on lease (since he could

n o t a f f o r d t o b u y t h e m

instantly)…so that he would use

them only while working on his

project and return them once not

needed. I suggested him to go to

the CLOUD. His problem is

similar to most of the small and

medium businesses (SMBs) as

well as traditional enterprises in

verticals such as banking,

financial services and insurance

(BFSI), and manufacturing.

These companies have a specific

IT requirement but need to invest

a considerable amount of their

resources in acquiring and

maintaining the software and

hardware for the company. Also

sometimes they may require a

particular hardware or software

which may be costly so they either

have to find an alternate way out

or use the resources of some other

company which delays the

development of the project. The

solution is a revolutionary

c o n c e p t c a l l e d C L O U D

COMPUTING [CC] . Although

Contributed Articles

3.Cloud

Computing I N T

 T E C H T A

M E N

CSI-SAKEC

19

8/9/2019 Cache Csi Sakec Magazine

http://slidepdf.com/reader/full/cache-csi-sakec-magazine 27/40

runs smoothly. It followsprotocols and uses a Middlewaret h a t a l l o w s n e t w o r k e dcomputers to communicate witheach other.

C l o u d C o m p u t i n g

provides the following threetypes of services:

1. Software as a Service (SaaS):

S a a S p r o v i d e s c o m p l e t e

application as a service to the

c l i e n t s o n d e m a n d v i a

p a r a v i r t u a l i z a t i o n .

E.g.:Salesforce.com2 . P l a t f o r m a s a S e r v i c e(PaaS):PaaS offerings can providefor every phase of software

development and testing. Eg:Google App Engine.3. Infrastructure as a Service(IaaS): Servers, storage systems,switches, routers, and othersystems are pooled (throughvirtualization technology, forexample) to handle specific typesof workloads from batchprocessing to server/storageaugmentation during peak loadsover the network. E.g.: AmazonWeb Services, Joyent. 

Major advantages ofcloud computing are:1. It could bring hardware and

maintenance costs down. CCsystems give easy access to

software..

2. Scalability via dynamic ("on-

demand") allocation of resources

on a, self-service basis without

Fig 1: Cloud Computing Architecture

users having to worry for peak

loads.

3. Batch processing can help

analyze blocks of terabytes of

data simultaneously saving

server hours.

4. Reliability is improved

through the use of multiple

redundant sites, which makes

cloud computing suitable for

  business continuity and disaster

recovery.

Thus, CC ushers in a new

level of efficiency and economy in

delivering IT resources on

demand and thus creates new

market opportunit ies and

 business models.

March 2010CACHE  

Contributed Articles

I N M E 

T E C H T A

N T 

CSI-SAKEC

Know the RUN commands...

· Calc --Calculator · Osk -- to access on screen keyboard· Ping --Sends data to a specified host/IP· Control --Displays Control Panel·Sysedit -- Edit system startup files· Hostname --Returns Computer's name·Taskmgr --Task manager

· Logoff -- to logoff the computer · WinWord -- to open Microsoft word

· Nslookup--Returns your local DNS server · Write -- Used to open WordPad

20

8/9/2019 Cache Csi Sakec Magazine

http://slidepdf.com/reader/full/cache-csi-sakec-magazine 28/40

4.CRYPTOGRAPHY Rushabh Pasad

T.E. (I.T.)

C r y p t o g r a p h y i s a

technique used to hide the

meaning of a message. It is

derived from the Greek word

kryptos (hidden). This is different

from steganograhic techniques. In

cryptography one is not hidingthe actual message, only the

meaning of the message. If a

message were to fall into the

hands of the wrong person,

cryptography should ensure that

that message could not be read.

Typically the sender and receiver

agree upon a message scrambling

protocol beforehand and agree

upon methods for encrypting and

decrypting messages. Thus

Cryptography can be defined as

the science of encrypting and

decrypting messages.

In Cryptography the

message to be encrypted is

referred as   plain text while the

encrypted message is referred as

cipher text.

FIRST CIPHER

The first cipher was made

 by   Julius Caesar who used it to

communicate with his generals. It

is named 'Caesar Box' after the

c r e a t o r .

The system goes as follows:

First select a message to be

encrypted. Make sure the length

of the characters your message is a

  p e r f e c t s q u a r e.

For example: "CAESAR BOX"

Write it in a square grid (here, 3*3

g r i d )

C A E

S A R

B O X

Now read it horizontally....

The encrypted message shall be

CSBAAOERX.

ENIGMA

The need to encrypt

messages appeared at the end of

World War I (although encryption

techniques had already existed

for a long time).

It was a Dutchman living in

Germany, Dr. Arthur Scherbius ,

who developed the Enigma

m a c h i n e f o r c o m m e r c i a l

purposes; this machine was used

to encode mes s ages . The

machine's price at the time

(equivalent to 30,000 euros today)

made it a miserable failure.

Codes that can be used

Concealing secret messages

For example:

CALL

Can Alter Lavender Laces.

Or we can use transposition or

substitution system or both under

cipher system.

You can either re-arrange letters in a

 pre-planned pattern or realign letters

of alphabet.

For Instance,

The quick brown fox jumps over the

lazy dog.

Would read

Eht kciuq nworb xof spmuj revo eht

 yzal god.

This can be easily encoded.

Monoalphabetic Substitution

A m o n o a l p h a b e t i c

substitution is one where a letter

of plaintext always produces the

same letter of ciphertext. This

cryptographic technique is used

very extensively nowadays

The operation is very

similar to the Caesar Cipher, with

the exception that the cipher

alphabet does not have the order

which it had in the previous

examples (which are just special

c a s e s o f m o n o a l p h a b e t i c

substitutions). An example of a

monoalphabetic substitution is

s h o w n b e l o w .

March 2010 CACHE  

Contributed Articles

 I N T

 T E C H T A

M E N

CSI-SAKEC

21

8/9/2019 Cache Csi Sakec Magazine

http://slidepdf.com/reader/full/cache-csi-sakec-magazine 29/40

One may naïvely think

that this cipher is secure, after all26there are 26! (approx. 4 x 10 )

different cipher alphabets to

choose from, however the letter

frequencies and underlying

patterns will be unchanged - andas such the cipher can be solved

  by pen and paper techniques.

These more advanced techniques

include looking systematically at

the position of letters in words in

order to identify vowels, pattern

words, and looking at the letter

frequencies, though common

pairings (TH, HE etc.) may come

up.T h e m o s t c o m m o n

English letters are ETAIN... It is

highly l ikely that in any

ciphertext, we have some matches

- though it is not a certainty. It

should also be noted that the most

commontrigraph (three letter

sequence) in English is 'THE'.

PC-Bar CodeIf you look in your

refrigerator or pantry, you will

find that just about every package

you see has a UPC bar code 

printed on it. In fact, nearly everyitem that you purchase from a

grocery store, department store

and mass merchandiser has a

UPC bar code on it somewhere.

Have you ever wondered where

these codes come from and whatthey mean?

" U P C " s t a n d s f o r

Universal Product Code. UPC

 bar codes were originally created

to help grocery stores speed up

the checkout process and keep

 better track of inventory, but the

system quickly spread to all other

retail products because it was so

successful.A standard UPC code has

12 digits . First 6 are the

Manufacturer Identification

Number, next 5 digits are the item

code and the last digit is the check

digit.

C r y p t o g r a p h y i s

emerging as a very important tool

in the field of security today. With

security becoming a very

important field in the world of

today, cryptography is beingcatapulted into the limelight

together with other methods of

security. Indeed cryptography is

one of the first lines of defense

against hackers and crackers in

today's world. .

March 2010CACHE  

Contributed Articles

I N M E 

T E C H T A

N T 

CSI-SAKEC

Open up an Administrative level Command Prompt :

C:\>taskl ist ....(to see all of the running processes)

Image Name PID Session Name Mem Usage

=========== === ============ ==========

notepad.exe 25304 Console 5,852 K

to kill the notepad process run:

C:\>Taskkill /IM notepad.exe /F

or

C:\>Taskkill /PID 25304 /F (only the specific instane of firefox will be terminated. )

The /F flag is kills the process forcefully.

Kill Processes from Command Prompt!!! 

22

8/9/2019 Cache Csi Sakec Magazine

http://slidepdf.com/reader/full/cache-csi-sakec-magazine 30/40

1.How do you go

about the preliminarypreparations? Which subjects

should be brushed up before

the interview?

3.How important is

it to have knowledge ofcurrent affairs and business

news? How to remain abreast

with it?

4.How to crack the aptitude

test and how to prepare for

the same?

6.How to cope up with

nervousness and tension

inside the interview room?

Ans: Before going for an

interview one should brush up

all programming languages

that one has mentioned in their

resume. Being acquainted withthe basic concepts of

engineering subjects is a

prerequisite.

Ans: Business updates are

essential for Group

Discussion rounds and HR

interview. To be abreast with it

one can refer Business Today,The Analyst, mint or even

Economic Times. You can also

subscribe to online portals like

SiliconIndia.com.

Ans: To crack the aptitude test

one should have clear

concepts of secondary school

mathematics. Vocabulary is

another important aspect in

clearing aptitude tests. One

can solve a few aptitude test

papers to get a hands-on

practice and also an ideaabout how to

tackle such tests.

Ans: Inside the interview room

try to stay calm and composed.

It is human tendency to feel

nervous but show confidence in

your abilities and try to

establish eye contact with the

interviewer. Also be specific

while answering the questions,don't provide any vague or

hypothetical information.

 

An Interview is the

last stage in placement  process, one cannot afford to

leave anything to chance. Face to Facegives an insight into the interview process and

reveals how one can emerge from the gruelingPlacement Interviews.This article has been written with the

help of excerpts from the interviews of Anish Venugopal, SashankShah, Sagar Gupta, Akshay Rao, graduates from SAKEC.

2. Does the

experience of working in astudent organization help in

any way while giving the

interview?

 Ans: Working in a student

organization adds an edge to

your Resume. It inculcates basic

qualities that one needs to

survive in corporate

world like it improves your

communication skills,

confidence level, teaches you

how to be a team player ,how to

co-ordinate in a group and

makes you a better manager.

5. Can you give some tips on

the Group Discussion round?

Ans: In GD it is important to

speak sense. It is also about

listening to others and coming

to a common conclusion at the

end. One should understand

the topic well and try to note

down the punching points.

If one can direct the

discussion, nothing like it, else

have regular and effective

contributions.

March 2010 CACHE  

How to crack an interview...

 A E T O   A C E

 F C   F

CSI-SAKEC

23

8/9/2019 Cache Csi Sakec Magazine

http://slidepdf.com/reader/full/cache-csi-sakec-magazine 31/40

Ans: This is the easiest question

of the interview and hence onecan impress the interviewer

here. Learn a little bit of the

company and ask some

question related to work or the

company's background. This

will show your interest towards

working in that specific

company. Its too early to ask

about salary, vacation, etc. so

Skip such questions.

7. Mention some questions

that the interviewee can

ask the interviewer

 Sharpen your wit!!!

Try to answer the following

frequently asked interview

questions.

1. What are your salaryexpectations?

2. What can you do for this

company?

3. How are you different from

others who have been

interviewed?

4. What is the color of the wall

 behind you?(you haven’t noticed

the color when you entered)

5. How many steps have youclimbed up?

6. Why are you wearing such

color coordinated clothes?

7. How will you move mount

Fuji?

8. How it is possible to place

four points that are equidistance

from each other?

9. You have to draw three

concentric circles with a linepassing through their center

without lifting hand.

10. You are given a cake; one of

its corner is broken. How will u

cut the rest into

two equal parts? (Note: Answers to these

questions are given on

Page 31 . )

Ans: It is very important to take

note of what not to do in an

interview as this can prevent one

from making any major blunders

or mistakes. One should not rush

to the person who has already

 been interviewed. Try to besimple and straightforward

.Politely apologize if you make

any mistake.Also don't fumble

or panic, be yourself and

maintain your confidence.

10.What not to do at an

interview?

Ans: Such questions test the

smartness and confidence of the

interviewee so don't avoid them.

One should answer such

questions to the best of one's

ability and understanding.

Never say anything negative

about yourself. Whateverquestion is posed make sure you

give a positive spin to your

answer. This is especially true

regarding question about things

you have mentioned as your

weaknesses. Whatever weakness

you may have listed, make sure

you can justify how you have

tried to work on your weakness

and that you have achievedsome progress.

8. How much do

extra and co curricular

activities count?

Ans: Activities related to career

and profession matter at the time

of interview. Working on some

projects or doing internships can

help in grabbing the top-notch job. Also participating in

Technical festival of various

colleges can add a

point in the resume.

9. How

important is your academic

performance?

Ans: Academic performance

helps in clearing the criteria for

many companies, apart from

giving a boost to one’s

confidence before the

recruitment process, recruiters

have a tendency to look for

people with better percentages.

But having practical knowledge

and real-world skills are moreimportant.

11. How to

handle tricky and weirdquestions?

March 2010CACHE  

How to crack an interview...

F AC E  T O   AC E 

CSI-SAKEC

24

8/9/2019 Cache Csi Sakec Magazine

http://slidepdf.com/reader/full/cache-csi-sakec-magazine 32/40

March 2010 CACHE  

B o r e d o f t h e

common hour hand- minutehand clock display, dream of environ-

friendly comp... Nowdays there are gadgetsthat solve every query, every whim of the

consumer. TECH-TRENDZ brings to you a plethora of gadgets-from the ‘currently hot’ ones to the ‘soon to be

releasing ones....’

Acquaint yourself with gizmos...

 E T C H - T R E N D Z !

CSI-SAKEC

25

8/9/2019 Cache Csi Sakec Magazine

http://slidepdf.com/reader/full/cache-csi-sakec-magazine 33/40

March 2010CACHE  

Acquaint yourself with gizmos...

T C H T 

E ! 

E -  R 

N D Z 

CSI-SAKEC

26

8/9/2019 Cache Csi Sakec Magazine

http://slidepdf.com/reader/full/cache-csi-sakec-magazine 34/40

CROSS-QUOTIENT

Across1. Keeping track of links to content.2. Search retrieving matches for partially/misspelled

words.5. Evolving protocol for syndication & sharing of 

contents.7. Optimizing website to get better results in search

engine.8. Small text string stored on user's comp by a web

 browser.10. Favorite language of CGI programmers.11. n/w of educational sites separate from the Internet.12. Program that prowls internet for publicly accessible

resources.15. s/w tool for locating people on other Internet sites.17. Tool to test whether a host is reachable across an IP

n/w.

23. Standard protocol for email retrieval.24. Link between pages in a website.25. Location on which a website is placed.

26. Synonym for cyber piracy.27. Main trunk connections of the Internet.29. Provide client station with access to shared resourceson n/w.31. Device that forwards data packets between n/w.33. One who attempts to gain infamy in chats or onforums?34. Unique visitor to the site from a campaign source.

35. Listing given by search engine in response tokeyword inquiry.

Down1. Communication protocols used to connect host to the

Internet.2. A fiber optic n/w transmitting data at 100 mbps.3. Act of sending unsolicited bulk emails.4. A http server& open source application.6. Web service that combines two or more tools to create

a new service.7. Java server side module.8. A hacker.9. A freeware browser.13. Equivalent to 'Favorites' of Internet Explorer.14. Program used to view HTML documents.16. s/w monitoring activities of user while he/she

navigates the Internet.18. One who searches the Internet for references of 

himself?19. Etiquettes on the Internet.20. A message or a message fragment.21. An online dairy of journal.22. Site, an exact copy of the Internet site.27. Unit of data transmission speed.28. Method of moving caffeine across WANs.

30. Abbr, serial line Internet protocol.32. A family of wed feed formats.

March 2010 CACHE  

Check your fun-quotient... CSI-SAKEC

27

8/9/2019 Cache Csi Sakec Magazine

http://slidepdf.com/reader/full/cache-csi-sakec-magazine 35/40

UPLIFT

 YOURIQ

1.A man builds a house rectangular in

shape. All sides have southern

exposure. A big bear walks by,

what color is the bear? Why?

2.The day before yesterday I was 25 and the

next year I will be 28. This is true only one

day in a year. What day is my birthday?

3. Using the given programming language,

the following words have their equivalents

next to them, what should FOX be?

CLICK = 100501100K

MILK = 1000150KLOG = 50OG

LIFE = 501FE

ALIVE = A5015E

FOX = ==?==

4.What word is represented by this

arrangement of letters?

  HROOOBD

5.What number comes next in this sequence:

1 23 124 1251 26127 128129 ==?==

6.Name an ancient invention, which is still

used in some parts of the world today, that

allows people to see through walls.

What can this be?

7.This is a number crossword puzzle. Enter

one numeral character into each square. The

clue consists of mathematical operations.

(e. g. "D.6 x 3" means, that the number you

are looking for is three times bigger than

number D.6).

 CLUES

  Across:A.1 = D.6 x 3

A.4 = A.7 x A.7

A.5 = (D.3 x 7) - 1A.6 = A.1 + A.5

A.7 = D.3

  Down:D.1 = ?

D.2 = A.7 x 6

D.3 = D.6 + 6

D.4 = A.4 - 210

D.6 = (D.2 + 9) x 1/7

March 2010CACHE  

Check your fun-quotient...CSI-SAKEC

(Note: Answers to these questions are given on page 31 . )

28

8/9/2019 Cache Csi Sakec Magazine

http://slidepdf.com/reader/full/cache-csi-sakec-magazine 36/40

C S I - S A K E C h a s b e e ni n s t r u m e n t a l i n c o n d u c t i n g

competitions enabling students stretch theirlimits and apply their knowledge.We take this

opportunity to congratulate the: 'Winners(2007-2009).’

March 2010 CACHE  

  Abhishek Mehta

1st position

Zeal

Lithin Thomas

1st position (Zodiac)

Eureka

Pankaj Savla

1st position (Zodiac)

Eureka

Piyush Upadhay

1st position

Flash & dreamweaver

Chandrakant Deshmukh2nd position tie

Flash & dreamweaver

Nikit Vora

2nd position tie

Flash & dreamweaver

Bharat Vishwakarma2nd position (DishitaBharat)

Eureka

Dishita Trivedi

2nd position (DishitaBharat)

Eureka

Winners of CSI-SAKEC events

 T A L E N T

 E D  A C H

 I E V E R

 S

CSI-SAKEC

29

8/9/2019 Cache Csi Sakec Magazine

http://slidepdf.com/reader/full/cache-csi-sakec-magazine 37/40

Viral Vira

1st position

Virtual DJ 1

Bhavi Savla2nd position

Virtual DJ 1

Sudatta C

3rd position

Virtual DJ 1

Anand biswas

1st position

Virtual DJ 2

Prasad Parawadi

2nd position

Virtual DJ 2

Shruti Narain

3rd positionVirtual DJ 2

Sagar Dedhia1st position (Maverick)

iDeveloper

 Jithin T K

1st position (Maverick)

iDeveloper

Saurabh Raje

2nd position (CodeMasters)

iDeveloper

Suyash Pavanoji

2nd position (CodeMasters)

iDeveloper

March 2010CACHE  

People succeed at everything

 if they enjoy doing it.

Winners of CSI-SAKEC events

L  N 

A

T AE 

T E D   C H I E V 

E  S 

CSI-SAKEC

30

8/9/2019 Cache Csi Sakec Magazine

http://slidepdf.com/reader/full/cache-csi-sakec-magazine 38/40

CROSS- QUIOTENT

UPLIFT YOUR IQ1. The bear is white since the house is built othe

North Pole.

2. He was born on December 31st and spoke

about it on January 1st.

3. FO10: where Roman numerals exist they are

replaced by their modern equivalents, V = 5,X = 10, L = 50 etc.

4. Robin Hood.

5.1301311: The sequence 123, 124, 125, 126, 127,

etc. has been broken into chunks of 1, 2, 3, 4 etc.

6. A window!

7. A1=135 D1=1651

A4=2601 D2=306

A5=356 D3=51

A6=491 D4=2391

A7=51 D6=45

SHARPEN

YOUR WIT!!

1.The best that company can offer based on my

qualification and my capability.

2.With my hard work and dedication, I would like tocontribute my bit for the company which would take

it to new heights.

3.I don't know the others so I cannot tell you the

difference but I can tell you that I have a curious mind

which also loves to accept challenges and due to its

curiosity it learns more.

4.It is the same as the wall in front of you.

5.I wish to climb even more steps in my life than I

have just climbed(Assuming that I have no idea)

6.Because I feel comfortable in this pair, makes melook good.

7.An ideal response would be to break the question

down, and try solving it in stages. First, you'd have to

estimate the amount of material to be moved, so pick

hypothetical numbers for density of the soil and the

height of Mount Fuji (you'd get extra points for

knowing that information), and use the formula for

volume of a cone to calculate the volume of material.

Extrapolate that to get the mass of material to be

moved. Finally, tackle the actual transport part:estimate that a backhoe can excavate x tons per day,

and a truck can move y tons per trip. Assume z hours

per day and so on.

8. Only 3 points can be equidistant from each other.

But if one places points in the shape of a pyramid

then its possible to place four points at equal distance

from each other.

9.Start the line complete one circle move inside

circles along the line and then draw second circle.

Like wise rest.10. Slice the cake!

March 2010 CACHE  

Help corner  CSI-SAKEC

31

8/9/2019 Cache Csi Sakec Magazine

http://slidepdf.com/reader/full/cache-csi-sakec-magazine 39/40

CSI-SAKEC

8/9/2019 Cache Csi Sakec Magazine

http://slidepdf.com/reader/full/cache-csi-sakec-magazine 40/40