lakshya final
TRANSCRIPT
8/4/2019 Lakshya Final
http://slidepdf.com/reader/full/lakshya-final 3/45
P a g e | 3
Editor-in-Chief
Dr. R. G. Tated, Principal, MIT(E), Aurangabad
Editorial Board
Dr. C. G. Desai, Head MCA Department
Prof. K V Bhosle, Head Computer Science and Engineering Department
Prof. V. M. Kulkarni, Head Electronics and Communication Department
Prof. S. M. Badave, Head Electrical and Electronics Department
Prof. S. V. Mhaske, Head Architecture Department
Prof. S. R. Andhale, Head Mechanical Engineering Department
Prof. A. M. Naphade, Head Information Technology Department
Prof. A. W. Yerekar, Head Civil Engineering Department
Prof. R. D. Mahajan, Head Engineering Science and Humanities Department
Associate Editors
Prof. J. A. Kamble, Computer Science and Engineering Department
Prof. S. B. Atre, Architecture Department
Prof. S. S. Patil, Mechanical Engineering Department
Prof. A. Nair, MCA Department
Prof. M. S. Joshi, Electronics and Communication Department
Prof. S. R. Survase, Civil Engineering Department
Cover page Design: Prof. J. A. KambleSatish, Saurabh
8/4/2019 Lakshya Final
http://slidepdf.com/reader/full/lakshya-final 5/45
P a g e | 5
Android Operating System
In Mobile Phones:-
Like a computer operating system, amobile operating system is the software
platform on top of which other programsrun. When you purchase a mobile device,the manufacturer will have chosen theoperating system for that specific device.The operating system is responsible fordetermining the functions and featuresavailable on your device, such asthumbwheel, keyboards, WAP, e-mail, textmessaging and more. The mobile operatingsystem will also determine which third-party applications can be used on your
device. Some of the more common andwell-known Mobile operating systemsinclude the following:- Symbian OS-Windows Mobile-Palm OS-Mobile Linux:-MXI-Android
Android, initially developed by AndroidInc was bought by Google in 2005.
Android is based upon a modified versionof the Linux kernel. The Android OpenSource Project (AOSP) is tasked with themaintenance and further development ofAndroid. Android has a large community ofdevelopers writing application programthat extend the functionality of the devices.There are currently over 200,000 appsavailable for Android. Android Market isthe online app store run by Google, thoughapps can be downloaded from third-party
sites.Developers write primarily in the Javalanguage, controlling the device via Google-developed Java libraries. Python, Ruby andother languages are also available forAndroid development via the AndroidScripting Environment. The Androidoperating system consists of 12 million lines
of code including 3 million lines of XML, 2.8million lines of C, 2.1 million lines of Java,and 1.75 million lines of C++.
Features:-UI refinements for simplicity and speed
The user interface is refined in many waysacross the system, making it easier to learn,faster to use, and more power-efficient. Asimplified visual theme of colors againstblack brings vividness and contrast to thenotification bar, menus, and other parts ofthe UI. Changes in menus and settingsmake it easier for the user to navigate and
control the features of the system anddevice.
Faster, more intuitive text input
The Android soft keyboard is designed andoptimized for faster text input and editing.The keys themselves are shaped andpositioned for improved targeting, makingthem easier to see and press accurately,even at high speeds. The keyboard alsodisplays the current character anddictionary suggestions in a larger, morevivid style that is easier to read.
Improved power managementThe Android system takes a more activerole in managing apps that are keeping thedevice awake for too long or that areconsuming CPU while running in thebackground. By managing such apps —closing them if appropriate — the systemhelps ensure best possible performance andmaximum battery life.
The system also gives the user morevisibility over the power being consumedby system components and running apps.The Application settings provide anaccurate overview of how the battery isbeing used, with details of the usage andrelative power consumed by eachcomponent or application.
8/4/2019 Lakshya Final
http://slidepdf.com/reader/full/lakshya-final 6/45
P a g e | 6
New ways of communicating, organizing Internet calling The user can make voice calls over theinternet to other users who have SIPaccounts. The user can add an internet
calling number (a SIP address) to anyContact and can initiate a call from QuickContact or Dialer. To use internet calling,the user must create an account at the SIPprovider of their choice — SIP accounts arenot provided as part of the internet callingfeature.Additionally, support for the platform's SIPand internet calling features on specificdevices is determined by theirmanufacturers and associated carriers.
Near-field communicationsAn NFC Reader application lets the userread and interact with near-fieldcommunication (NFC) tags. For example,the user can “touch” or “swipe” an NFC tagthat might be embedded in a poster, sticker,or advertisement, then act on the data readfrom the tag. A typical use would be to reada tag at a restaurant, store, or event andthen rate or register by jumping to a website whose URL is included in the tag data.
NFC communication relies on wirelesstechnology in the device hardware, sosupport for the platform's NFC features onspecific devices is determined by theirmanufacturers.
Downloads managementThe Downloads application gives the usereasy access to any file downloaded from thebrowser, email, or another application.Downloads is built on an completely new
download manager facility in the systemthat any other applications can use, to moreeasily manage and store their downloads.
CameraThe application now lets the user accessmultiple cameras on the device, including afront-facing camera, if available.
-Aditya A Akolkar-BE CSE
8/4/2019 Lakshya Final
http://slidepdf.com/reader/full/lakshya-final 7/45
P a g e | 7
Eco_Ganpati
I have created an eco friendly Ganpati
from old newspapers clay. I
have also designed the Ganpati Makhar
from handmade paper and waste
Invitation cards .
List of material for Ganpati Murti:
1. Old news papers(80%)
2. Whitening powder (20%)
3. Glue in small amount (Gum)
4. Water
5. Colors
List of material for Ganpati Makhar:
1. Handmade paper
2. Old Invitation cards (Lagnapatrika)3. Glue/Gum
4. Old waste Box.
Some of the snapshots are:
List of materials used for Dekhava
(Statues and mountain)
1. Clay
2. Old news paper
3. Tissue paper
4. Glue
5. Colors
6. Aleev seeds (for trees in Dive Ghat)
The Ganpati murthi, Ganesh makhar
and the statues of Various
Saints are Hand made...
Mrs.Shilpa Avinash Sanap
Assist. Prof. in CSE Dept.
8/4/2019 Lakshya Final
http://slidepdf.com/reader/full/lakshya-final 8/45
P a g e | 8
LIFE
Life is just an endless stream of experiences
some are good, some are bad, some are
sweet, some are bitter, Learn to make the
best of them. Even if the neem flower isbitter, the nectar inside is sweet so it is with
life.
A pleasant experience demands a happy
disposition and makes everybody around
happy. So your life should be flowing and
happy like a river. Don’t ever let the mass of
gloom settle on the surface. If your heart is
happy, your face will reflect the feeling. Be
happy and let your face flow with thatspecial light this life is for joy and hope.
By the way where does happiness come
from? Is it available in the market? Or is it
just covered on the face like powder and
lipstick? Happiness is never on scale, it is
available to everybody because it resides in
the heart of everyone. All the feelings and
emotions fill the heart and play games.
Some people are pessimists that means theyalways look at the gloomy side of life, they
are always unhappy.” Oh! It’s my fate”,
they say or “my luck is bad” they grumble,
but if it good? Has god really made things
so tragic for some people? Of course not. It
is just that such people do not understand
the wonders of life.
One thing you can do is that practise
focusing on “here & now” as often as you
can. Remind yourself that you really have
only this moment.
Stop warring about the future and
rehearsing the past, make a commitment to
yourself to protect and treasure your life
force, energy, every day in a positive andgentle way.
“God loves the cheerful giver” so let
us strive to be content in what we have and
enjoy the sweetness of life and be ready to
open our heart to the various experience of
life.
-Shriprasad Durgadas Joshi
TE- B CSE
************************************************
8/4/2019 Lakshya Final
http://slidepdf.com/reader/full/lakshya-final 9/45
P a g e | 9
PAR-RENT…..
Parents are our most gods,
Who give life and the earth for us to be
And I am indubitable thankful to them,
That we got our god to see….
They give a rhythm to the music,
Pluck a thorn in vain,
They shap up the fallacy,
As they are our umbrella in the rain….
Parents give fragrance to a flower,
There by improving its beauty
Although they do would our worries
lower,
As they eradicate our enmity….
They do lend to us their sagacious
thoughts,
That one could think never in his dreams
They think before they give-off plights,
As they protect us so it seems…..
Its not a wow,
That my parents shalln’t stay with me
forever
But still I know,
They will surely stay in my heart and
behaviour forever….
My parents are my god,
As every one’s may matter
They are indoubty odd,
So they possess god’s character….
I have no more to say,
As their goodness is till infinity
They are god, no-way,
We must remember this till externity….
– Shriprasad Durgadas Joshi
T.E. (B) C.S.E.
8/4/2019 Lakshya Final
http://slidepdf.com/reader/full/lakshya-final 10/45
P a g e | 10
Sixth Sense Technology
INTRODUCTION
Sixth Sense is a wearable gesturalinterface that augments the
physical world around us with
digital information and lets us use
natural hand gestures to interact
with that information.
Sixth Sense bridges the gap by
bringing intangible, digital
information out into the tangible
world, and allowing us to interact
with this information via natural
hand.
Sixth Sense comprises a pocket
projector, a mirror and a camera.
The hardware components are
coupled in a pendant like mobile
wearable device
WHY SIXTH SENSE?
Fig: sixth sense
COMPONENTS (pictorial view)
Camera
Projector
Mirror
Mobile Component
Colored Markers
8/4/2019 Lakshya Final
http://slidepdf.com/reader/full/lakshya-final 11/45
P a g e | 11
CAMERA
Captures an object in view and
track the users hand gestures.
It sends the data to smart phones.
It acts as a DIGITAL EYE,
connecting you to the world of
digital information.
PROJECTOR
The projector projects visualinformation enabling surface and
physical objects to be used as
interfaces.
The project itself contains a battery
inside, with 3 hours of battery life.
A tiny LED projector displays data
sent from the phone on any surface
in view –object, wall, and person.
MIRROR
The usage of the mirror is
significant as the projector dangles
pointing downwards from the
neck.
SMART PHONE
A web enabled smart phone in the
users pocket processes the video
data interprets the hand gestures.
Other software searches the web &
interprets the hand gestures.
8/4/2019 Lakshya Final
http://slidepdf.com/reader/full/lakshya-final 12/45
P a g e | 12
COLOR MARKERS
It is at the tip of users fingers.
Marking the user’s fingers with
red, yellow, green, blue tape helps
the webcam recognize gestures.
The movement and arrangement
of these markers are interpreted
into gestures that act as interaction
instruction for the projectedapplication interfaces.
SIXTH SENSE PROTOTYPE
(PICTORIAL VIEW)
HOW IT WORKS? (Pictorial view)
HOW IT WORKS? (Theory)
The hardware that makes sixth
sense work is a pendant like
mobile wearable interface.
8/4/2019 Lakshya Final
http://slidepdf.com/reader/full/lakshya-final 13/45
P a g e | 13
It has a camera, a mirror, projector,
and is connected wirelessly to a
Bluetooth smart phone that can
slip comfortably into one’s pocket.
Camera recognizes individuals,
images, pictures, gestures one
makes with their hands.
Information is sent to the smart
phone for processing.
The downward facing projector
projects output image onto the
mirror.
Mirror reflects image onto the
desired surface.
Thus, digital information is freed
from its confines and placed in the
physical world.
APPLICATIONS
WEAR UR WORLD (WUW)
• WUW projects information onto
surfaces, walls, and physical
objects around us.
MAKE A CALL AND MULTIMEDIA
READING
• Phone Call: You can call to your
friend by typing the numbers on
your hand. It displays the keypad
of the phone over your palm and
the key appears on the four
fingers.
• Newspapers: Did you saw the
moving pictures of the
Newspaper in the movie Harry
Patter; it is quite similar to it. It
Searches the most appropriate
video from the web by seeing the
headlines or the caption of the
News report. Use your hand's
finger to press the keys.
8/4/2019 Lakshya Final
http://slidepdf.com/reader/full/lakshya-final 14/45
P a g e | 14
CHECK THE TIME and CALL UP A
MAP
Draw a circle on your wrist to get a
virtual watch that that gives you
the correct time.
With the map application we can
call up the map of our choice and
then thumbs index fingers to
navigate the map.
TAKE PICTURE
• The user interacts with the
projected information through
natural hand gestures, arm
movements, or interaction with the
object itself.
FEED INFORMATION ON PEOPLE
By using sixth sense technology
the user can convert anything as a
surface.
(Wall, hand, newspaper)
If we using sixth sense technology
it will give u information about the
thing you are looking.
8/4/2019 Lakshya Final
http://slidepdf.com/reader/full/lakshya-final 15/45
P a g e | 15
DRAWING APPLICATION (ZOOMING
IN/OUT)
Draw Picture
Zoom in
Zoom Out
Get Flights Update
Get Product Info.
Get Book Information
8/4/2019 Lakshya Final
http://slidepdf.com/reader/full/lakshya-final 16/45
P a g e | 16
WORLD AROUND US
Sixth Sense analyses what the user
sees and visually augments
surfaces or physical objects the
user is interacting with.
ADVANTAGES
Portable
Support multi touch and multi
user interaction
Connectedness between world and
information
Cost effective
Data access directly from machine
in real time
Mind map the idea anywhere
It is an open source
COST & AVALIBLITY
The device can be made in current
prototype system costs
approximately $350 to build.
In Indian currency Rs. 17000.
Sixth Sense hardware and software
at present works with
Smartphone’s.
The software’s source code will be
available on an open-source
model. AS THE STATEMENT OF
its MAKER.
DEVELOPER OF SIXTH SENSE
TECHNOLOGY
Pranav Mistry is the inventor of
Sixth Sense.
He is a research assistant and a
PhD candidate at MIT Media Lab.
Pranav holds a Master in Media
Arts and Sciences from MIT andMaster of Design from IIT Bombay
besides his Bachelor degree in
Computer Engineering from
Nirma Institute Of Technology,
Ahmedabad..
Sixth Sense has been awarded 2009
Invention Award by Popular
Science. Pranav also won Young
Innovator Award by Technology
Review.
8/4/2019 Lakshya Final
http://slidepdf.com/reader/full/lakshya-final 17/45
P a g e | 17
CONCLUSION
Sixth sense recognize object
around displaying information
automatically and letting us to
access it any way to need.
The six sense prototype
implements several applications
that demonstrate the usefulness,
viability and flexibility of system.
Allowing us to interact with this
information via natural hand
gestures.
The potential of becoming the
ultimate “transparent” userinterface for accessing information
about everything around us.
Miss. Madhuri Bagdane
Lecturer in IT Dept.
8/4/2019 Lakshya Final
http://slidepdf.com/reader/full/lakshya-final 18/45
P a g e | 18
Computer Aided Engineering – An overview
Computer-aided engineering (CAE) is
the broad usage of computer software toaid in engineering tasks. It includescomputer-aided design (CAD),computer-aided analysis (CAA),computer-integrated manufacturing(CIM), computer-aided manufacturing(CAM), material requirements planning(MRP), and computer-aided planning(CAP). Software tools that have beendeveloped to support these activities areconsidered CAE tools. CAE tools arebeing used, for example, to analyze therobustness and performance ofcomponents and assemblies. The termencompasses simulation, validation, andoptimization of products andmanufacturing tools. In the future, CAEsystems will be major providers ofinformation to help support designteams in decision making.
In regard to information networks, CAEsystems are individually considered asingle node on a total informationnetwork and each node may interactwith other nodes on the network.
CAE systems can provide support tobusinesses. This is achieved by the useof reference architectures and theirability to place information views on thebusiness process. Reference architectureis the basis from which informationmodel, especially product and
manufacturing models.
The term CAE has also been used bysome in the past to describe the use ofcomputer technology withinengineering in a broader sense than justengineering analysis. It was in this
context that the term was coined by
Jason Lemon, founder of SDRC in thelate 1970s. This definition is howeverbetter known today by the terms CAxand PLM.
CAE fields and phases
CAE areas covered include:
• Stress analysis on componentsand assemblies using FEA (Finite
Element Analysis);• Thermal and fluid flow analysis
Computational fluid dynamics(CFD);
• Kinematics;• Mechanical event simulation
(MES).• Analysis tools for process
simulation for operations such ascasting, molding, and die pressforming.
•
Optimization of the product orprocess.
In general, there are three phases in anycomputer-aided engineering task:
• Pre-processing – defining themodel and environmental factors
8/4/2019 Lakshya Final
http://slidepdf.com/reader/full/lakshya-final 19/45
P a g e | 19
to be applied to it. (typically afinite element model, but facet,voxel and thin sheet methods arealso used)
• Analysis solver (usually
performed on high poweredcomputers)• Post-processing of results (using
visualization tools)
This cycle is iterated, often many times,either manually or with the use ofcommercial optimization software.
CAE in the automotive industry
CAE tools are very widely used in the
automotive industry. In fact, their use
has enabled the automakers to reduce
product development cost and time
while improving the safety, comfort,
and durability of the vehicles they
produce. The predictive capability of
CAE tools has progressed to the point
where much of the design verification is
now done using computer simulations
rather than physical prototype testing.CAE dependability is based upon all
proper assumptions as inputs and must
identify critical inputs (BJ). Even though
there have been many advances in CAE,
and it is widely used in the engineering
field, physical testing is still used as a
final confirmation for subsystems due to
the fact that CAE cannot predict all
variables in complex assemblies (i.e.
metal stretch, thinning).
Finite element method
The finite element method (FEM) (itspractical application often known asfinite element analysis (FEA)) is anumerical technique for findingapproximate solutions of partialdifferential equations (PDE) as well as ofintegral equations. The solution
approach is based either on eliminatingthe differential equation completely(steady state problems), or rendering thePDE into an approximating system ofordinary differential equations, whichare then numerically integrated usingstandard techniques such as Euler'smethod, Runge-Kutta, etc.
In solving partial differential equations,the primary challenge is to create an
equation that approximates the equationto be studied, but is numerically stable,meaning that errors in the input andintermediate calculations do notaccumulate and cause the resultingoutput to be meaningless. There aremany ways of doing this, all withadvantages and disadvantages. TheFinite Element Method is a good choicefor solving partial differential equationsover complicated domains (like cars and
oil pipelines), when the domain changes(as during a solid state reaction with amoving boundary), when the desiredprecision varies over the entire domain,or when the solution lacks smoothness.For instance, in a frontal crashsimulation it is possible to increaseprediction accuracy in "important" areas
8/4/2019 Lakshya Final
http://slidepdf.com/reader/full/lakshya-final 20/45
P a g e | 20
like the front of the car and reduce it inits rear (thus reducing cost of thesimulation). Another example would bein Numerical weather prediction, whereit is more important to have accurate
predictions over developing highly-nonlinear phenomena (such as tropicalcyclones in the atmosphere, or eddies inthe ocean) rather than relatively calmareas.
The finite element method originatedfrom the need for solving complexelasticity and structural analysisproblems in civil and aeronauticalengineering. Its development can betraced back to the work by AlexanderHrennikoff (1941) and Richard Courant
(1942). While the approaches used bythese pioneers are different, they shareone essential characteristic: meshdiscretization of a continuous domaininto a set of discrete sub-domains,usually called elements. Starting in 1947,Olgierd Zienkiewicz from ImperialCollege gathered those methodstogether into what would be called theFinite Element Method, building the
pioneering mathematical formalism ofthe method.
Hrennikoff's work discretizes thedomain by using a lattice analogy, whileCourant's approach divides the domaininto finite triangular sub regions tosolve second order elliptic partialdifferential equations (PDEs) that arisefrom the problem of torsion of acylinder. Courant's contribution was
evolutionary, drawing on a large bodyof earlier results for PDEs developed byRayleigh, Ritz, and Galerkin.
Development of the finite elementmethod began in earnest in the middleto late 1950s for airframe and structuralanalysis and gathered momentum at the
University of Stuttgart through thework of John Argyris and at Berkeleythrough the work of Ray W. Clough inthe 1960s for use in civil engineering. Bylate 1950s, the key concepts of stiffness
matrix and element assembly existedessentially in the form used today.NASA issued a request for proposals forthe development of the finite elementsoftware NASTRAN in 1965. Themethod was again provided with arigorous mathematical foundation in1973 with the publication of Strang andFix's An Analysis of The Finite Element Method, and has since been generalizedinto a branch of applied mathematics fornumerical modeling of physical systemsin a wide variety of engineeringdisciplines, e.g., electromagnetism,thanks to Peter P. Silvester and fluiddynamics.
FEA Applications
A variety of specializations under theumbrella of the mechanical engineeringdiscipline (such as aeronautical,biomechanical, and automotive
industries) commonly use integratedFEM in design and development of theirproducts. Several modern FEMpackages include specific componentssuch as thermal, electromagnetic, fluid,and structural working environments.In a structural simulation, FEM helpstremendously in producing stiffness andstrength visualizations and also inminimizing weight, materials, and costs.
FEM allows detailed visualization ofwhere structures bend or twist, andindicates the distribution of stresses anddisplacements. FEM software provides awide range of simulation options forcontrolling the complexity of bothmodeling and analysis of a system.Similarly, the desired level of accuracy
8/4/2019 Lakshya Final
http://slidepdf.com/reader/full/lakshya-final 21/45
P a g e | 21
required and associated computationaltime requirements can be managedsimultaneously to address mostengineering applications. FEM allowsentire designs to be constructed, refined,
and optimized before the design ismanufactured.
This powerful design tool hassignificantly improved both thestandard of engineering designs and themethodology of the design process inmany industrial applications. Theintroduction of FEM has substantiallydecreased the time to take productsfrom concept to the production line. It isprimarily through improved initialprototype designs using FEM thattesting and development have beenaccelerated. In summary, benefits ofFEM include increased accuracy,enhanced design and better insight intocritical design parameters, virtualprototyping, fewer hardwareprototypes, a faster and less expensivedesign cycle, increased productivity,and increased revenue.
CAE Software
This is a list of software packages that
implement the finite element method for
solving partial differential equations or aid
in the pre- and post-processing of finite
element models.
• Abaqus: Franco-American software
from SIMULIA, owned by Dassault
Systemes
• ANSA: An advanced CAE pre-processing
software for complete model build up. • ANSYS: American software • AutoForm: Swiss origin German
software for Sheet metal forming
process chain.
• COMSOL Multiphysics COMSOL
Multiphysics Finite Element Analysis
Software formerly Femlab. • FEFLOW: simulates groundwater flow,
mass transfer and heat transfer in
porous media.
• Femap, Siemens PLM Software: A pre
and post processor for Windows. • LS-DYNA, LSTC - Livermore Software
Technology Corporation. • Nastran: American software, from
MSC Software. • Radioss: A linear and nonlinear
solver owned by Altair Engineering. • Pro/Mechanica • COSMOSWorks • ALGOR .
• HyperMesh.. • PAM-CRASH • HyperForm. • Dynaform. • Autoform. • MoldFlow • C – Mold • Modex-3D
CAE Sources
www. Ansys.com
www. Moldflow.com
www.mscsoftware.com
www.altairhyperworks.com
www.finitetoinfinite.com
www.algor.com
www.abacom.de
8/4/2019 Lakshya Final
http://slidepdf.com/reader/full/lakshya-final 22/45
P a g e | 22
Er. Sandeep Patil
APMED
In-charge, Center of Excellence-CAE
“I think and think, for months, for years, ninety-
nine times the conclusion is false. The hundredth
time I am right”
ALBERT EINSTINE
“The three great essentials to achieve anything
worthwhile are first, hard work, second, stick to
itiveness; third, common sense.”
THOMAS A EDISON
8/4/2019 Lakshya Final
http://slidepdf.com/reader/full/lakshya-final 23/45
P a g e | 23
TATA JARITI Y ATRA 2010
I am yatri of 2010 yatra .It is most amazing
experience and one of the greatachievement among all.
Jagriti Yatra is an annual train journey thatthat takes hundreds of India's highlymotivated youth (with some participationof international students) between the agesof 20-25 and experienced professionals withage above 25, on a eighteen day nationalodyssey, introducing them to unsungheroes of India. The aim is to awaken the
spirit of entrepreneurship - both social andeconomic - within India's youth by exposingthem to individuals and institutions that aredeveloping unique solutions to India'schallenges. Through this national event wehave begun to inspire the youth of India tolead and develop institutions bothnationally and within their communities.
The vision of Jagriti Yatra is to inspire
young Indians living in the middle of the
Indian demographic diamond (Rs 40-Rs 120per day) to lead development by taking to
enterprise. By doing so, they can turn from
being job seekers to job creators. Apart from
this economic argument, they also discover
a purpose that is appropriate for their
talents. Only if we create a movement
around enterprise led development will
India’s youth employment and
development issues will be resolved.
Enterprise Led Development has beenapplauded as a key paradigm to bringabout grassroots development. India’sdemography represents a diamond morethan a pyramid. The middle of thisdiamond consists of 50 Crore Indians, whoare no longer destitute but often lack the
means to earn a living. Government jobs are
few and far between, and for these youngIndians enterprise is not a luxury, it is anecessity. Instead of relying
on charitable aid or government grants,enterprise led development seeks to createsustainable and scalable enterprises in themiddle of the Indian demographicdiamond. By participating in local, scalableenterprise, these Indians, most of whom areyoung will not only find employment, they
will create employment for others.
Jagriti Yatra is one of the key strands of Jagriti to create national awareness aboutthis program, and to build leaders who willfollow the path of enterprise leddevelopment in their lives. Tatas are leadingsponsors for this yatra.
Myself
Basically if I have to tell about this yatrathen I would like to describe this as this oneof the unpredictable experience which one
8/4/2019 Lakshya Final
http://slidepdf.com/reader/full/lakshya-final 24/45
P a g e | 24
cannot benefit without going through it.The person who wants to achieve his goalthat of becoming successful entrepreneurshould go for this.
This yatra taken me from all corners ofIndia and make me help to understand howsmall scale and big scale industries fixed upthere roots. In India from small villages upto metro cities that sizes and types ofenterprises may vary but the inspirationbehind all is one that “I have to becomeentrepreneur”.
I would like to share my experience of thisyatra in brief. We had started from Mumbai,the charming young 400 yatries and onetrain .we travelled 9000km as shown in map.at every destination shown in map we hadvisit our role models.
These learnings span across the 4 axes of
programming - the Role model visits, thepanel discussions and the Yatri interactionsas well as the special sessions that wereorganized during the journey.
During the Yatra, 17 groups were assignedto study Role models as well as paneldiscussions. Each group presented theirfindings to the rest of the train. In theinteractions that followed, many common
themes and some contradictions emerged.A smaller group of 17 was as-signed tobrainstorm on these and a final group of 7Yatris compiled the final document onbehalf of all the 400 Yatris.
Route of TATA JARITI Y ATRA
My friend this is best platform to learn thethings ,to experience the diversity ofindia,to built yourself as entrepreneur .iwant to share our jagriti geet “yaroo chalobadalne ki r ut hai…yaroo chalo sawarne kirut hai…” .
- ASHWINI LAHANE
B E (Mechanical )(YATRI OF 2010)
8/4/2019 Lakshya Final
http://slidepdf.com/reader/full/lakshya-final 25/45
P a g e | 25
GSM Vs CDMA
The ultimate outcome of the battle fordominance between these two competingcellular data transmission technologies may
lie more in their history than theirrespective merits. To understand thecurrent prevalence of GSM, one needs afoundation in the forces that converged topush one technology ahead of the other.
One of the most contentious battles beingwaged in the wireless infrastructureindustry is the debate over the efficient useand allocation of finite airwaves. For severalyears, the world's two main methods --
Code-Division Multiple Access (CDMA)and Global System for Mobilecommunications (GSM) -- have divided thewireless world into opposing camps.Ultimately, the emergence of a victorioustechnology may owe more to historicalforces than the latest wireless innovation, orthe merits of one standard over the other.
CDMA's World War II Foundations CDMA, put into an historical context, is a
recently patented technology that onlybecame commercially available in the mid-1990s, but had its roots in pre-World War IIAmerica. In
1940, hollywood actress turned inventor,Hedy Lamarr, and co-inventor GeorgeAntheil, with World War II looming, co-patented a way for torpedoes to becontrolled by sending signals over multipleradio frequencies using random patterns.Despite arduous efforts by the inventors toadvance the technology from experiment toimplementation, the U.S. Navy discardedtheir work as architecturally unfeasible. Theidea, which was known as frequency-hopping, and later as frequency-hoppingspread-spectrum technology (FHSS),remained dormant until 1957 whenengineers at the Sylvania Electronic Systems
Division, in Buffalo, New York took up theidea, and after the Lamarr-Antheil patentexpired, used it to secure communications
for the U.S. during the 1962 Cuban MissileCrisis. After becoming an integral part ofgovernment security technology, the U.S.military, in the mid-80s, declassified whathas now become CDMA technology, atechnique based on spread-spectrumtechnology.
What interested the military soon caughtthe eye of a nascent wireless industry.CDMA, incorporating spread-spectrum,
works by digitizing multiple conversations,attaching a code known only to the senderand receiver, and then dicing the signalsinto bits and reassembling them. Themilitary loved CDMA because codedsignals with trillions of possiblecombinations resulted in extremely securetransmissions.
Qualcomm, which patented CDMA, andother telecommunications companies, were
attracted to the technology because itenabled many simultaneous conversations,rather than the limited stop-and-gotransmissions of analog and the previousdigital option.
CDMA was not field tested for commercialuse until 1991, and was launchedcommercially in Hong Kong in 1995. CDMAtechnology is currently used by majorcellular carriers in the United States and isthe backbone of Sprint's PersonalCommunications System (PCS). Along withSprint, major users of CDMA technologyare Verizon and GTE.
Advantages of CDMA include:
• Increased cellular communicationssecurity.
8/4/2019 Lakshya Final
http://slidepdf.com/reader/full/lakshya-final 26/45
P a g e | 26
• Simultaneous conversations.• Increased efficiency, meaning that
the carrier can serve moresubscribers.
• Smaller phones.•
Low power requirements and littlecell-to-cell coordination needed byoperators.
• Extended reach - beneficial to ruralusers situated far from cells.
Disadvantages of CDMA include:
• Due to its proprietary nature, all ofCDMA's flaws are not known to theengineering community.
• CDMA is relatively new, and thenetwork is not as mature as GSM.
• CDMA cannot offer internationalroaming, a large GSM advantage.
The Euro-Asian Alternative: GSM
Analysts consider Qualcomm's majorcompetitive disadvantage to be its lack ofaccess to the European market nowcontrolled by Global System for Mobilecommunications (GSM). The wireless worldis now divided into GSM (much of WesternEurope) and CDMA (North America andparts of Asia).
Bad timing may have prevented theevolution of one, single global wirelessstandard. Just two years before CDMA's1995 introduction in Hong Kong, Europeancarriers and manufacturers chose to support
the first available digital technology - TimeDivision Multiple Access (TDMA). GSMuses TDMA as its core technology.Therefore, since the majority of wirelessusers are in Europe and Asia, GSM hastaken the worldwide lead as the technologyof choice.
Mobile Handset manufacturers ultimatelysplit into two camps, as Motorola, Lucent,and Nextel chose CDMA, and Nokia andEricsson eventually pushed thesecompanies out and became the dominant
GSM players.
Advantages of GSM:
• GSM is already used worldwidewith over 450 million subscribers.
• International roaming permitssubscribers to use one phonethroughout Western Europe. CDMAwill work in Asia, but not France,Germany, the U.K. and otherpopular European destinations.
• GSM is mature, having started in themid-80s. This maturity means amore stable network with robustfeatures. CDMA is still building itsnetwork.
• GSM's maturity means engineers cuttheir teeth on the technology,creating an unconscious preference.
• The availability of SubscriberIdentity Modules, which are smartcards that provide secure data
encryption give GSM m-commerceadvantages.
In brief, GSM is a "more elegant way toupgrade to 3G," says Strategis Group seniorwireless analyst Adam Guy.
Disadvantages of GSM:
• Lack of access to burgeoningAmerican market.
8/4/2019 Lakshya Final
http://slidepdf.com/reader/full/lakshya-final 27/45
P a g e | 27
Conclusion
Today, the battle between CDMA and GSMis muddled. Where at one point Europeclearly favored GSM and North America,
CDMA, the distinct advantage of one overthe other has blurred as major carriers likeAT&T Wireless begin to support GSM, andrecent trials even showed compatibilitybetween the two technologies.
GSM still holds the upper hand however.
Th
GSM Vs CDMA IN WIRELESSCOMMUNICATIONS.
The ultimate outcome of the battle fordominance between these two competingcellular data transmission technologies maylie more in their history than theirrespective merits. To understand thecurrent prevalence of GSM, one needs afoundation in the forces that converged topush one technology ahead of the other.
One of the most contentious battles being
waged in the wireless infrastructureindustry is the debate over the efficient useand allocation of finite airwaves. For severalyears, the world's two main methods --Code-Division Multiple Access (CDMA)and Global System for Mobilecommunications (GSM) -- have divided thewireless world into opposing camps.Ultimately, the emergence of a victorioustechnology may owe more to historicalforces than the latest wireless innovation, or
the merits of one standard over the other.
CDMA's FoundationsCDMA, put into an historicalcontext, is a recently patentedtechnology that only becamecommercially available in the mid-1990s, but had its roots in pre-World
War II America. In
1940, hollywood actress turned inventor,Hedy Lamarr, and co-inventor GeorgeAntheil, with World War II looming, co-
patented a way for torpedoes to becontrolled by sending signals over multipleradio frequencies using random patterns.Despite arduous efforts by the inventors toadvance the technology from experiment toimplementation, the U.S. Navy discardedtheir work as architecturally unfeasible. Theidea, which was known as frequency-hopping, and later as frequency-hoppingspread-spectrum technology (FHSS),remained dormant until 1957 when
engineers at the Sylvania Electronic SystemsDivision, in Buffalo, New York took up theidea, and after the Lamarr-Antheil patentexpired, used it to secure communicationsfor the U.S. during the 1962 Cuban MissileCrisis. After becoming an integral part ofgovernment security technology, the U.S.military, in the mid-80s, declassified whathas now become CDMA technology, atechnique based on spread-spectrumtechnology.
What interested the military soon caughtthe eye of a nascent wireless industry.CDMA, incorporating spread-spectrum,works by digitizing multiple conversations,attaching a code known only to the senderand receiver, and then dicing the signalsinto bits and reassembling them. Themilitary loved CDMA because codedsignals with trillions of possiblecombinations resulted in extremely secure
transmissions.
Qualcomm, which patented CDMA, andother telecommunications companies, wereattracted to the technology because itenabled many simultaneous conversations,rather than the limited stop-and-gotransmissions of analog and the previous
8/4/2019 Lakshya Final
http://slidepdf.com/reader/full/lakshya-final 28/45
P a g e | 28
digital option.
CDMA was not field tested for commercialuse until 1991, and was launchedcommercially in Hong Kong in 1995. CDMA
technology is currently used by majorcellular carriers in the United States and isthe backbone of Sprint's PersonalCommunications System (PCS). Along withSprint, major users of CDMA technologyare Verizon and GTE.
Advantages of CDMA include:
• Increased cellular communicationssecurity.
• Simultaneous conversations.• Increased efficiency, meaning that
the carrier can serve moresubscribers.
• Smaller phones.• Low power requirements and little
cell-to-cell coordination needed byoperators.
• Extended reach - beneficial to ruralusers situated far from cells.
Disadvantages of CDMA include:
• Due to its proprietary nature, all ofCDMA's flaws are not known to theengineering community.
• CDMA is relatively new, and thenetwork is not as mature as GSM.
• CDMA cannot offer internationalroaming, a large GSM advantage.
GSM
Analysts consider Qualcomm's majorcompetitive disadvantage to be its lack ofaccess to the European market nowcontrolled by Global System for Mobilecommunications (GSM). The wireless world
is now divided into GSM (much of WesternEurope) and CDMA (North America andparts of Asia).
Bad timing may have prevented the
evolution of one, single global wirelessstandard. Just two years before CDMA's1995 introduction in Hong Kong, Europeancarriers and manufacturers chose to supportthe first available digital technology - TimeDivision Multiple Access (TDMA). GSMuses TDMA as its core technology.Therefore, since the majority of wirelessusers are in Europe and Asia, GSM hastaken the worldwide lead as the technologyof choice.
Mobile Handset manufacturers ultimatelysplit into two camps, as Motorola, Lucent,and Nextel chose CDMA, and Nokia andEricsson eventually pushed thesecompanies out and became the dominantGSM players.
Advantages of GSM:
• GSM is already used worldwide
with over 450 million subscribers.• International roaming permits
subscribers to use one phonethroughout Western Europe. CDMAwill work in Asia, but not France,Germany, the U.K. and otherpopular European destinations.
• GSM is mature, having started in themid-80s. This maturity means amore stable network with robustfeatures. CDMA is still building its
network.• GSM's maturity means engineers cut
their teeth on the technology,creating an unconscious preference.
• The availability of SubscriberIdentity Modules, which are smartcards that provide secure dataencryption give GSM m-commerce
8/4/2019 Lakshya Final
http://slidepdf.com/reader/full/lakshya-final 29/45
P a g e | 29
advantages.
In brief, GSM is a "more elegant way toupgrade to 3G," says Strategis Group seniorwireless analyst Adam Guy.
Disadvantages of GSM:
• Lack of access to burgeoningAmerican market.
Conclusion
Today, the battle between CDMA and GSMis muddled. Where at one point Europeclearly favored GSM and North America,
CDMA, the distinct advantage of one overthe other has blurred as major carriers likeAT&T Wireless begin to support GSM, andrecent trials even showed compatibilitybetween the two technologies.
GSM still holds the upper hand however.There's the numerical advantage for onething: 456 million GSM users versusCDMA's 82 million.
Factors tipping the scales in the GSMdirection include :
AT&T Wireless' move to overlay GSM atopits TDMA network means the Europeantechnology (GSM) gains instant access toNorth America's number two network.
Qualcomm's recently announced thatWideband-CDMA (WCDMA) won't beready in Europe until 2005. This comes
amidst reports that GSM's successor,General Packet Radio Services (GPRS)remains on target for deployment in 2001-2002.
For all of the historical and technologicalreasons outlined above, it appears thatGSM, or some combination of GSM and
CDMA, will become the long sought aftergrail for a global wireless standard. Auniversalization of wireless technologiescan only stand to benefit the compatibilityand development costs and demands on all
wireless commerce participants.
8/4/2019 Lakshya Final
http://slidepdf.com/reader/full/lakshya-final 30/45
P a g e | 30
THE NEW WORLD OF PLASMA ANTENNAS
The future of high-frequency, high-speed wireless communications could
very well be plasma antennas capable of transmitting focused radio waves
that would quickly dissipate conventional antennas
Transmission and reception ofelectromagnetic waves have become an
integral part of the present day
civilization. Antenna is an essential device
for this process. It is a transducer that
transmits or receives electromagnetic
waves. In other words, antennas convert
electromagnetic radiation into electric
current, or vice versa. Antennas are used
in system such as radio and television
broadcasting, point-to-point radiocommunication, wireless LAN,
cellphones, radar, and spacecraft
communication. Antennas are most
commonly employed in air or outer space,
but can also be operated underwater or
even through soil and rock at certain
frequencies for short distances.
Growing need for speed of
communication network along with data-
handling capacity are the major forceshelping to explore new vistas of
transmission and reception. With the
wireless generations moving from 2G to
3G, 4G, 5G and on, the real benefit of
upgrading the Wi-Fi networks is to get
them to run faster. Wi-Fi usually can
manage 54 megabits of data per second.
The fancied Wi-Fi (a graphical user
interface for configuring wireless
connection) would handle up to 7 gigabitsper second. This would mean
downloading a TV show in a matter of
seconds. Advances in antenna technology
are expected to play a great role in the
desired speed and capacity-
handling capabilities of communicationnetworks.
Antenna Technology
Physically, an antenna is an
arrangement of one or more conductors,
usually called elements. In transmission,
an alternating current is created in the
elements by applying a voltage at the
antenna terminals, causing the elements to
radiate an electromagnetic field. Inreception, the inverse occurs. An
electromagnetic field from another source
induces alternating current in the
elements and a corresponding voltage at
the antenna’s terminals. Some receiving
antennas (such a parabolic and horn
types) incorporate shaped reflective
surfaces to collect the radio waves striking
them, and direct these waves onto the
actual conductive elements.
Some of the first rudimentary
antennas were built in 1888 by Heinrich
Hertz (1857-1894) in his pioneering
experiments to prove the existence of
electromagnetic waves predicted by the
theory of James Clerk Maxwell. Hertz
placed the emitter dipole at the focal point
of a parabolic reflector.
The words antenna (plural:
antennas) and aerial are used
interchangeably, but usually a rigid
metallic structure is termed an antenna
and a wire format is called an aerial. The
origin of the word antenna relative to
wireless apparatus is attributed to
Guglielmo Marconi. In 1895, while testing
8/4/2019 Lakshya Final
http://slidepdf.com/reader/full/lakshya-final 31/45
P a g e | 31
early radio apparatuses Marconi
experimented with early wireless
equipment. A 2.5 meter long pole along
which a wire was carried, was used as a
radiating and receiving aerial element. In
Italian a tent pole is known as l’ antennacentral, and the pole with a wire alongside
it used as an aerial was simply called l’
antenna. Until then wireless radiating,
transmitting and receiving elements were
known simply as aerials or terminals.
Marconi’s uses of the word antenna
(Italian for pole) become a popular term
for what today is uniformly known as the
antenna.
Since the discovery of radiofrequency (RF) transmission, antenna
design has been an integral part of
virtually every communication and radar
application. Technology has advanced to
provide unique antenna designs for
applications ranging from general
broadcast of radio frequency signals for
public use to complex weapon systems. In
its most common form, an antenna
represents a conducting metal surface thatis sized to emit radiations at one or more
selected frequencies. Antennas must be
efficient so the maximum amount of
signal strength is expended in the
propagated wave and not wasted in
antenna reflection.
There is a list of antenna designs
with their suitability, advantage and
limitations. There are many antenna types
and many ways of categorizing them.Antenna types can be used to differentiate
antennas for radios, televisions and radar
system. Because antennas can be built for
transmission of different frequencies,
another way to categories antenna types is
by their frequency. For radio antennas, it’s
important to know whether these are built
for, say, frequency modulation (FM)
broadcasting at 88-108 MHz or amplitude
modulation (AM) broadcasting at 535-
1605 kHz. For television antennas, one
distinguishes between ultra-high
frequency (UHF) antennas and very-highfrequency (VHF) antennas, or antennas
that pick up both.
Stores that sell antennas categorise
various types on terms of customers’
needs. The range of antennas can be
categorized as short, medium or long. For
customers buying a television antenna, the
decision dependent on how close they are
transmitting towers that they wish to pick
up a signal from. If the range is well-matched to the distance, it will help avoid
the antenna picking up unwanted signals.
Location is another way of looking
at antenna type. Antennas can be made for
indoor, outdoor or attic installation.
Indoor antennas are easy to install but
usually do not have the elevation to
provide the best signal, particularly for
customers who are far from the
transmission. Outdoor antennas were
primarily made for rooftops, but more
now are being designed to mount on the
side of a house, on a pole or deck. The
attic can be a useful installation point for
those who do not want their antenna
inside or outside for aesthetic or other
reasons.
Another set of antenna types is
differentiated by style. Style can mean the
antenna’s appearance in terms of design.
It can also address whether the antenna is
directional and gathers signals from a
central location or whether it is multi-
directional – seeking signals from towers
transmitting from different locations. The
latest version of antenna, i.e., plasma
8/4/2019 Lakshya Final
http://slidepdf.com/reader/full/lakshya-final 32/45
P a g e | 32
antenna employs ionized gas enclosed in a
tube (or other enclosure) as the
conducting element of the antenna.
Plasma Antennas
The different states of matter
generally found on earth are solid, liquid
and gas. Sir William Crookes, and English
physicist, identified a fourth state of
matter, now called plasma, in 1879.
Plasma is by far the most common form of
matter. Plasma in the stars and in the
tenuous space between them makes up
over 99 per cent of the visible universe
and perhaps most of what is not visible.
Important to antenna technology,
plasmas are conductive assemblies of
charged and neutral particles and fields
that exhibit collective effects. Plasmas
carry electrical currents and generate
magnetic fields.
A plasma antenna is a type of
antenna in which the metal-conducting
elements of a conventional antenna arereplaced by plasma. These are radio
frequency antennas that employ plasma as
the guiding medium for electromagnetic
radiation. The plasma antennas are
essentially a cluster of thousands of
diodes on a silicon chip that6 produces a
tiny cloud of electrons when charged.
These tiny, dense clouds can reflect high-
frequency waves like mirrors, focusing the
beams by selectively activating particulardiodes. The ‘beam-forming’ capability
could allow ultra-fast transmission of high
data loads – like those needed to
seamlessly stream a TV show to an
untethered tablet-creating an attractive
option for the next generation of
supercharged wireless transmitters.
Many types of plasma antennas
can be constructed, including dipole, loop
and reflector antennas. Plasma antennas
are interpreted as various devices in
which plasma with electric conductivity
serves as an emitting element. In gasplasma antenna the concept is to plasma
discharge tubes as the antenna elements.
When the tubes are energized, these turn
into conductors, and can transmit and
receive radio signals. When de-energized,
these revert to non-conducting elements
and do not reflect probing radio signals.
The fact that the emitting element
is formed over the interval needed for the
emission of an electromagnetic pulse is animportant advantage of plasma antennas.
In the passive state (in the absence of
plasma in the discharge tube), such a
device does not exhibit electric
conductivity.
A plasma stream flowing from a jet
into the ambient space, the plasma trace of
a body moving at an ultrasonic velocity in
the atmosphere, and alternative plasma
objects have been studied as possible
antenna elements. Solid-state plasma
antenna uses beam-forming technology
and the same manufacturing process that
is currently used for silicon chips. That
makes it small enough to fit into smart
phones.
Higher frequencies mean shorter
wavelengths and hence smaller antennas.
The antenna actually becomes cheaper
with the smaller size because it needs less
silicon. There is a gas plasma alternative
but it’s not solid-sate, so it is bigger and
contains moving parts – making it more a
pain to manufacture. The leaves the door
open for solid-state plasma antenna to be
used for next generation Wi-Gig(its
8/4/2019 Lakshya Final
http://slidepdf.com/reader/full/lakshya-final 33/45
P a g e | 33
version 1.0was announced in December
2009) that can reach up to 7Gbps
bandwidth over frequencies up to 60 GHz.
Development Progress
Initial investigations were relatedto the feasibility of plasma antennas as
low-radar cross-section radiating elements
with further development and future
commercialization of this technology. The
plasma antenna R & D project has
proceeded to develop a new antenna
solution that minimizes antenna-
detectability by radar at the first instance.
But since then an investigation of the
wider technical issues of existing antennasystem has revealed areas where plasma
antennas might be useful.
A significant progress has been
made in developing plasma antennas.
Present plasma antenna have been
operating in the region of 1 to 10 GHz.
Field trials have shown that an energized
plasma reflector is essentially as effective
as a metal reflector. However, when de-
energized, the reflected signal drops byover 20 dB. Still some technicalities related
to plasma antennas like increasing the
operating plasma density without
overloading the plasma discharge tubes,
reducing the power required and the
plasma noise caused by the ionizing
power supply, etc, have to be looked into
in order to them the useful technologies
for wireless communication in near future.
The future of high-frequency,high-speed wireless communications
could very well be plasma antennas
capable of transmitting focused radio
waves that would quickly dissipate using
conventional. Thus, plasma antennas
might be able to revolutionize not high-
speed wireless communications but also
radar arrays and directed energy
weapons. The good news is that plasma
antennas will be on-shelf in the next
couple of years. The bad news is that some
military powers can use it to create a more
advanced version of its existing painbeam.
Advantages of Plasma Antennas
1. An important advantage of plasma
antenna over a conventional
antenna is that the former is much
lighter. Based on a set of patented
beam-forming technologies, this
high-performance electronically –
steerable antennas are extremelylightweight and compact.
2. Free from mechanical part, these
maintenance-free plasma antennas
are ideally suited for a wide range
of wireless communications and
sensing applications.
3. Plasma antennas have a number of
potential advantages for antenna
design. These are reconfigurable.
When one plasma antenna is d-
energized, the antenna reverts to a
dielectric tube, and a second can
transmit through it. This allows
using several large antennas
stacked over each other instead of
several small antennas placed next
to each other. This results in better
sensitivity and directivity.
4. When a plasma element is not
energized it is difficult to detect it
by radar. Even when it isenergized, it is transparent to the
transmissions above the plasma
frequency, which falls in the
microwave region.
5. Plasma elements can be energized
and de-energized in seconds,
which prevents signal degradation.
8/4/2019 Lakshya Final
http://slidepdf.com/reader/full/lakshya-final 34/45
P a g e | 34
6. When a particular plasma element
is not energized, its radiation does
not affect nearby elements.
7. Plasma antenna can focus high-
frequency radio waves that woulddissipate quickly if beamed by
conventional arrays.
8. Plasma antennas boost wireless
speeds. Such antennas could
enable next-generation Wi-Fi that
allows for super-fast wireless data
transfers.
9. Solid-wireless plasma antennas
deliver gigabit-bandwidth, and
high-frequency plasma antenna
could hold the key for
economically viable super-fast
wireless networking.
10. Plasma antennas might also be
used to create low-cost radar
arrays that could be mounted on
cars to help them navigate in low-
visibility conditions, or used to
make directed, more focused and
less bulky energy weapons.
11. Plasma antennas have developedan innovative range of selectable
multi-beam antennas that meet the
demands in today’s wireless
communication, defense and
homeland security markets.
Limitations
1. The current hardware uses wider
range of frequencies so it’s
impractically massive to be usedfor mobile environments.
2. Plasma antennas are expensive
and hard to manufacture.
3. High-frequency
signals mean that antennas
operating at higher frequencies
couldn’t penetrate walls like
conventional Wi-Fi, so signals
would have to be reflected
throughout the buildings.
Plasma antennas could
theoretically solve some of these problems
because these can operate at a wider range
of frequencies, but gas antennas are also
more complex (and likely more expensive)
than their silicon-diode counterparts,
which are small enough to fit inside a cell
phone.
With plasma antenna technology, there
are kinks to iron out, but researchers and
engineers are optimistic to make this
promising technology commercially
available in few years.
8/4/2019 Lakshya Final
http://slidepdf.com/reader/full/lakshya-final 35/45
P a g e | 35
THE GOOD LIFE FOR PREVENTION AGAINST SUCIDE
Our lives have never been better
We believe this to the letter
We’re all a little richer
Ain’t this such a pretty picture
But what we’ve hidden from view
No one wants to pursue
You see the pain is held inside
And this means it can’t subside
So many seek an escape
Which they can’t communicate
So I’m going to save a soul
The only way I knowI must help them to awake
Before it is too late.
(Reproduced with the kind permission
of Paul Rooney)
People feeling down, depressed ordistressed need our empathy, help and
Support and so below are someimportant points to note from Stamp Out
Suicide!
Although we live in an ever changingworld, showing compassion must
NEVER goout of fashion...
Please make time for others as theremay come a point when you need
others to make time for you... Some people dwell on the past, some
plan for the future and others willget through today...si
Although we may feel alone, it is a feeling experienced by many, many
people atgiven time and so in this sense we
are never alone... Why the emphasis on suicideprevention? Because once a suicide is
completed, very sadly, there is nocure...Therefore, we must try to
prevent suicide.
Look after yourself and of course,
others
8/4/2019 Lakshya Final
http://slidepdf.com/reader/full/lakshya-final 36/45
P a g e | 36
GOOD FOOD EATING HABITS
Eat a variety of nutrient-rich foods. You needmore than 40 different nutrients for goodhealth, and no single food supplies themall. Your daily food selection should
include bread and other whole-grainproducts; fruits; vegetables; dairyproducts; and meat, poultry, fish andother protein foods. How much youshould eat depends on your calorie needs.Use the Food Guide Pyramid and theNutrition Facts panel on food labels ashandy references.
Enjoy plenty of whole grains, fruits andvegetables. Surveys show most Americansdon't eat enough of these foods. Do you
eat 6-11 servings from the bread, rice,cereal and pasta group, 3 of which shouldbe whole grains? Do you eat 2-4 servingsof fruit and 3-5 servings of vegetables? Ifyou don't enjoy some of these at first, givethem another chance. Look throughcookbooks for tasty ways to prepareunfamiliar foods.
Maintain a healthy weight. The weight that'sright for you depends on many factorsincluding your sex, height, age andheredity. Excess body fat increases yourchances for high blood pressure, heartdisease, stroke, diabetes, some types ofcancer and other illnesses. But being toothin can increase your risk forosteoporosis, menstrual irregularities andother health problems. If you're constantlylosing and regaining weight, a registereddietitian can help you develop sensibleeating habits for successful weightmanagement. Regular exercise is alsoimportant to maintaining a healthyweight.
Eat moderate portions. If you keep portionsizes reasonable, it's easier to eat the foodsyou want and stay healthy. Did you knowthe recommended serving of cooked meatis 3 ounces, similar in size to a deck ofplaying cards? A medium piece of fruit is
1 serving and a cup of pasta equals 2servings. A pint of ice cream contains 4servings. Refer to the Food GuidePyramid for information on
recommended serving sizes.
Eat regular meals. Skipping meals can leadto out-of-control hunger, often resulting inovereating. When you're very hungry, it'salso tempting to forget about goodnutrition. Snacking between meals canhelp curb hunger, but don't eat so muchthat your snack becomes an entire meal.
Reduce, don't eliminate certain foods. Mostpeople eat for pleasure as well as
nutrition. If your favourite foods are highin fat, salt or sugar, the key is moderatinghow much of these foods you eat and howoften you eat them.Identify major sources of these ingredientsin your diet and make changes, ifnecessary. Adults who eat high-fat meatsor whole-milk dairy products at everymeal are probably eating too much fat.Use the Nutrition Facts panel on the foodlabel to help balance your choices.Choosing skim or low-fat dairy productsand lean cuts of meat such as flank steakand beef round can reduce fat intakesignificantly.If you love fried chicken, however, youdon't have to give it up. Just eat it lessoften. When dining out, share it with afriend; ask for a take-home bag or asmaller portion.
Balance your food choices over time. Notevery food has to be "perfect." Wheneating a food high in fat, salt or sugar,select other foods that are low in theseingredients. If you miss out on any foodgroup one day, make up for it the next.Your food choices over several daysshould fit together into a healthy pattern.
Know your diet pitfalls. To improve youreating habits, you first have to know
8/4/2019 Lakshya Final
http://slidepdf.com/reader/full/lakshya-final 37/45
P a g e | 37
what's wrong with them. Write downeverything you eat for three days. Thencheck your list according to the rest ofthese tips. Do you add a lot of butter,creamy sauces or salad dressings? Ratherthan eliminating these foods, just cut back
your portions. Are you getting enoughfruits and vegetables? If not, you may bemissing out on vital nutrients.
Make changes gradually. Just as there are no"superfoods" or easy answers to a healthydiet, don't expect to totally revamp youreating habits overnight. Changing toomuch, too fast can get in the way ofsuccess. Begin to remedy excesses or
deficiencies with modest changes that canadd up to positive, lifelong eating habits.For instance, if you don't like the taste ofskim milk, try low-fat. Eventually youmay find you like skim, too.
Remember, foods are not good or bad. Selectfoods based on your total eating patterns,not whether any individual food is "good"or "bad." Don't feel guilty if you lovefoods such as apple pie, potato chips,candy bars or ice cream. Eat them inmoderation, and choose other foods toprovide the balance and variety that arevital to good health.
8/4/2019 Lakshya Final
http://slidepdf.com/reader/full/lakshya-final 38/45
P a g e | 38
Cloud Computing
Cloud computing is a model for enabling
founds everywhere, plans, on-demand
network access to a shared pool of
configurable computing resources (e.g.,
networks, servers, storage, applications,
and services) that can be rapidly
provisioned and released with minimal
management effort or service provider
interaction.
The concept of cloud computing fills
never changing the need of IT: a way to
increase capacity or add capabilities on
the fly without investing in new
infrastructure, training new personnel, or
licensing new software. Cloud computing
includes any subscription-based or pay-
per-use service that, in real time over the
Internet, extends IT's existing capabilities.
Cloud computing provides computation,
software, data access, and storage services
that do not require end-user knowledge of
the physical location and configuration of
the system that delivers the services.
Parallels to this concept can be drawn
with the electricity grid, where in end-
users consume power without needing to
understand the component devices or
infrastructure required to provide the
service.
Characteristics
Cloud computing exhibits the following
key characteristics:
Agility improves with users'
ability to newly provided
technological infrastructure resources.
Application Programming
Interface (API) accessibility to
software that enables machines to
interact with cloud software in the
same way the user interface makes
easy interaction between humans and
computers. Cloud computing systems
typically use REST-based APIs.
Cost is claimed to be reduced and
in a public cloud delivery
model capital expenditure is
converted to operational
expenditure. This is purported to
lower barriers to entry, as
infrastructure is typically provided by
a third-party and does not need to be
purchased for one-time or infrequent
intensive computing tasks. Pricing on
a utility computing basis is fine-
8/4/2019 Lakshya Final
http://slidepdf.com/reader/full/lakshya-final 39/45
P a g e | 39
grained with usage-based options and
fewer IT skills are required for
implementation (in-house).
Device and location
independence
enable users to accesssystems using a web browser
regardless of their location or what
device they are using (e.g., PC, mobile
phone). As infrastructure is off-site
(typically provided by a third-party)
and accessed via the Internet, users
can connect from anywhere.
Multi-tenancy enables sharing of
resources and costs across a large poolof users thus allowing for:
Centralization of
infrastructure in locations with
lower costs (such as real estate,
electricity, etc.)
Peak-load
capacity increases (users need not
engineer for highest possible load-
levels) Utilization and
efficiency improvements for systems
that are often only 10–20% utilized.
Reliability is improved if multiple
redundant sites are used, which
makes well-designed cloud
computing suitable for business
continuity and disaster recovery.
Scalability via dynamic ("on-demand") provisioning of resources
on a fine-grained, self-service basis
near real-time, without users having
to engineer for peak loads.
Performance is monitored, and
consistent and loosely coupled
architectures are constructed
using web services as the system
interface.
Security could improve due to
centralization of data, increasedsecurity-focused resources, etc., but
concerns can persist about loss of
control over certain sensitive data, and
the lack of security for stored kernels.
Security is often as good as or better
than under traditional systems, in part
because providers are able to devote
resources to solving security issues
that many customers cannotafford. However, the complexity of
security is greatly increased when
data is distributed over a wider area
or greater number of devices and in
multi-tenant systems that are being
shared by unrelated users. In addition,
user access to security audit logs may
be difficult or impossible. Private
cloud installations are in part
motivated by users' desire to retain
control over the infrastructure and
avoid losing control of information
security.
Maintenance of cloud computing
applications is easier, because they do
not need to be installed on each user's
computer. They are easier to support
and to improve, as the changes reachthe clients instantly.
Characteristics with Shared cloud
computing:
8/4/2019 Lakshya Final
http://slidepdf.com/reader/full/lakshya-final 40/45
P a g e | 40
Autonomic computing —
computer systems capable of self-
management."
Client–server model – client–server
computing refers broadly toany distributed application that
distinguishes between service
providers (servers) and service
requesters (clients).
Grid computing — "a form
of distributed computing and parallel
computing, whereby a 'super and
virtual computer' is composed of
a cluster of networked, looselycoupled computers acting in concert
to perform very large tasks."
Mainframe computer — powerful
computers used mainly by large
organizations for critical applications,
typically bulk data processing such
as census, industry and consumer
statistics, enterprise resource
planning, and financial transactionprocessing.
Utility computing — the
"packaging of computing resources,
such as computation and storage, as a
metered service similar to a
traditional public utility, such
as electricity."
Peer-to-peer – distributed
architecture without the need forcentral coordination, with participants
being at the same time both suppliers
and consumers of resources (in
contrast to the traditional client–server
model).
Service-oriented computing –
Cloud computing provides services
related to computing while, in a
reciprocal manner, service-oriented
computing consists of the computing
techniques that operate on software-
as-a-service.
Architecture
Cloud architecture, the systems
architecture of the software
systems involved in the delivery of cloud
computing, typically involves
multiple cloud components communicating
with each other over loose
coupling mechanism such as messaging
queue.
Cloud computing sample architecture
Layers
8/4/2019 Lakshya Final
http://slidepdf.com/reader/full/lakshya-final 41/45
P a g e | 41
Once an Internet Protocol connection is
established among several computers, it is
possible to share services within any one
of the following layers.
Client
A cloud client consists of computer
hardware and/or computer software that
relies on cloud computing for application
delivery and that is in essence useless
without it. Examples include
some computers, phones and other
devices, operating systems, and browsers.
Application
Cloud application services or "Software as
a Service (SaaS)" deliver software as a
service over the Internet, eliminating the
need to install and run the application on
the customer's own computers and
simplifying maintenance and support.
Platform
Cloud platform services, also known
as Platform as a Service (PaaS), deliver
a computing latform and/or solution
stack as a service, often consuming cloud
infrastructure and sustaining cloud
applications. It facilitates deployment of
applications without the cost and
complexity of buying and managing the
underlying hardware and software layers.
InfrastructureCloud infrastructure services, also known
as Infrastructure as a Service (IaaS),
deliver computer infrastructure – typically
a platform virtualization environment – as
a service, along with raw (block) storage
and networking. Rather than purchasing
servers, software, data-center space or
network equipment, clients instead buy
those resources as a fully outsourcedservice. Suppliers typically bill such
services on a utility computing basis; the
amount of resources consumed (and
therefore the cost) will typically reflect the
level of activity.
Server
The server’s layer consists of computer
hardware and/or computer
software products that are specifically
designed for the delivery of cloud
services, including multi-core processors,
cloud-specific operating systems and
combined offerings.
Deployment models
8/4/2019 Lakshya Final
http://slidepdf.com/reader/full/lakshya-final 42/45
P a g e | 42
Public cloud
Public cloud describes cloud computing in
the traditional mainstream sense, whereby
resources are dynamically provisioned to
the general public on a fine-grained, self-service basis over the Internet, via web
applications/web services, from an off-
site third-party provider who bills on a
fine-grained utility computing basis.
Community cloud
Community cloud shares infrastructure
between several organizations from a
specific community with common
concerns (security, compliance, jurisdiction, etc.), whether managed
internally or by a third-party and hosted
internally or externally. The costs are
spread over fewer users than a public
cloud (but more than a private cloud), so
only some of the benefits of cloud
computing are realised.
Hybrid cloud
Hybrid cloud is a composition of two or
more clouds (private, community, orpublic) that remain unique entities but are
bound together, offering the benefits of
multiple deployment models.
Private cloud
Private cloud is infrastructure operated
solely for a single organization, whether
managed internally or by a third-party
and hosted internally or externally.
They have attracted criticism because
users "still have to buy, build, and manage
them" and thus do not benefit from lower
up-front capital costs and less hands-on
management essentially "[lacking] the
economic model that makes cloud
computing such an intriguing concept"
8/4/2019 Lakshya Final
http://slidepdf.com/reader/full/lakshya-final 43/45
P a g e | 43
Use of Internet affecting our memory, finds study
Researchers have found that the
widespread use of search engines and
online databases is affecting the way
people remember information.
To know whether people were more likely
to remember information that could be
easily retrieved from a computer, Betsy
Sparrow, an assistant professor of
psychology at Columbia and her
collaborators, Daniel M. Wegner of
Harvard and Jenny Liu of the University
of Wisconsin, Madison, staged different
memory experiments, reports the New
York Times.
In one experiment where participants
typed 40 bits of trivia, the team found that
the subjects were significantly more likely
to remember information if they thought
they would not be able to find it later.
"Participants did not make the effort to
remember when they thought they could
later look up the trivia statement they had
read," wrote the authors.
A second experiment was aimed at
determining whether computer
accessibility affects precisely what we
remember.
"If asked the question whether there are
any countries with only one color in their
flag, for example," the researchers wrote,
"do we think about flags - or immediately
think to go online to find out?"
In this case, participants were asked to
remember both the trivia statement itself
and which of five computer folders it was
saved in. The researchers were surprised
to find that people seemed better able to
recall the folder.
"That kind of blew my mind," Dr. Sparrow
said.
The experiment explores an aspect of
what is known as transactive memory -
the notion that we rely on our family,
friends and co-workers as well as
reference material to store information for
us.
The Internet's effects on memory are still
largely unexplored, Dr. Sparrow said,
adding that her experiments had led her
to conclude that the Internet has become
our primary external storage system.
"Human memory," she said, "is adapting
to new communications technology."
Prof. V.V. Shaga
MCA Dept.
8/4/2019 Lakshya Final
http://slidepdf.com/reader/full/lakshya-final 44/45
P a g e | 44
10-yr-old girl discovers security flaw in Apple, Android games
A 10 year old hacker left experts amazed with her discovery on the flaw in mobile phones.
Read on to know how she cracked the nut.
A 10-year-old hacker has left experts
amazed by finding an old-age securityflaw in many mobile games.
Going by the handle CyFi, she found that
advancing the clock on a tablet or phone
could, in many games, open a loophole
that can be exploited, reports the BBC.
CyFi discovered the bug after getting
bored with the pace of farming games and
seeking ways to speed them up.
Many farm-based games force players to
wait hours before they can harvest a crop
grown from virtual seeds. As a result
CyFi, who has not revealed her real name,
started fiddling with the clock on her
handset to see if she could produce crops
more quickly.
While many games detect and block clock-
based cheating, CyFi found ways roundthese security measures. Disconnecting a
phone from wi-fi and only advancing a
clock by small amounts helped to open up
the loophole as it forced the game into a
state not tested by its original creators.
CyFi's discovery has since been verified
by independent security researchers. The
exploit has been found to work in versions
of games for both Apple and Android
gadgets. The hacker presented her
findings at the DefCon hacker conference
held in Las Vegas.
Prof. V.V. Shaga
MCA Dept.