Académique Documents
Professionnel Documents
Culture Documents
Volume 4, Issue 1
Editors Column
Rest is not idleness, and to lie sometimes on the grass on a summer day listening to the murmur of water, or watching the clouds float across the sky, is h a r d ly a was te of time. (John Lubbock ) As the semester comes to a close and the great summers stretch ahead, lets take a break with this new refreshing issue, before the final grind for the majors. Find out whats happening in the department. From welcoming the new faculty, to introducing some in t e r es ti n g p r oj e c ts , t o d i s c u s s i n g t h e v a r i ou s prestigious awards given to faculty members of our department, this issue covers it all. Not only do we discuss the various events covered by the ACM Student Chapter like talks/seminars by various high profile speakers, workshops, contests etc but also various other events of the department like freshers given by ACES and the departmental fest. ACM India Annual Conference which was held in January proved to be an enriching experience for all those who attended it. A glimpse of the same is given in the pages ahead. Did you wonder how various companies got their names? Well move directly onto the fun section for details! Th e news letter tea m appreciates the receipt of articles and feedback received so far and continues with the hope that this edition will also be enjoyed by the readers. Looking forward to continued participation from professors and students in future editions!
CSE Newsletter
"It is not the critic who counts, not the man who points out how the strong man stumbled, or where the doer of deeds could have done them better. The credit belongs to the man who is actually in the arena; whose face is marred by dust and sweat and blood; who strives valiantly; who errs and comes short again and again; who knows the great enthusiasms, the great devotions, and spends himself in a worthy cause; who, at the best, knows in the end the triumph of high achievement; and who, at the worst, if he fails, at least fails while daring greatly, so that his place shall never be with those cold and timid souls who know n e ithe r vic tory nor de feat."( Theodore Roosevelt, 1910) Fortune indeed favors the brave! It takes the greatest amount of courage to take the first step, the rest just follow. And its this leap which we fear. The constant worry about not meeting expectations, messing up, falling down, prevent us from taking risks. The risk which could fulfill our dreams if we gave ourselves the chance. In order to become a successful entrepreneur you may well have to pay your dues. You'll most probably have to fail a few times, learn from your lessons, and only then be able to come through a winner. While you don't have to take wild chances, you do have to take calculated and educated risks.
It is human instinct to shy away from mistakes and blame ourselves for making them.. However, mistakes are simply opportunities to learn something new. The more mistakes a person makes, the more they will have learnt and the greater chance they will have of succeeding on their next try. The key, however, is to learn from them and take them as stepping stone for the next milestone. All this and more is reflected in the Adam Story. Launched at CES 2010 by Notion Ink , an entrepreneurial venture by IIT grads, Adam is their first go, in the tablet market. Regularly reviewed and featured in prominent media, it has quickly grown into an internet love child. Spec-tospec, Adam has stood on its own against every tablet n the town, including the iPad. Sold out in minutes during its pre-booking window, Adam is the first device in the world to integrate two breakthrough power-saving components - nVidias Tegra 2 Chip and a Pixel Qi screen. Though the launch was marred with glitches, the world media has hailed Notion Ink for taking on the Goliaths. The essence of 'starting up' can be best summarized by this issue, which predominantly focuses on budding ideas, be it SURA projects, new workshops or the interesting personality profile reflecting the strife and triumph of Adi Shamir. Read on for more!
Start up now Project article SURA Honor the mentor Newsflashes Personality Profile Faculty Profile The Power of Gram Vaani ACM India Annual Conference Fun Section
1 2 3,4
4
5,6 7 8 9
10
Number of input parameters for a specific domain The possible fuzzy sets and their membership function parameters Initial rule base based on their experiences and intuitions.
The proposed tool provides GUI for designing the system. A fuzzy system can model the quantitative aspects of human knowledge and reasoning process without using precise quantitative analysis. But it takes lot of time to design and fine tune the membership functions which quantitatively defines the linguistic terms. We have used neural network to automate this process and reduce the time while improving the cost. We have used ANFIS for fine-tuning the membership parameters of the system designed. The ranker searches the set of services that matches the clients functional requirements and then rank them on the basis of non-functional properties of the advertised services. Users preferences for non-functional parameters are considered by taking weight for each input parameter. These weights are then taken into consideration while the rule evaluation in the fuzzy system. 3. Conclusions We have proposed and implemented a tool WSS-NFP for web service selection based on non-functional properties using soft computing techniques. Results generated by WSSNFP are comparable with existing mathematical models. A system for particular domain can be customized and trained using the proposed tool. We have provided GUI to facilitate the use of the tool by the different users of the system. In our future work we will incorporate the feedback knowledge from web service execution in the service selection. Contributed by: Sunita Tiwari
Page 2
Web services provide a promising solution to an age old need of fast and flexible information sharing among people and businesses. Selection of web service has become a tedious job because of the increasing number of service providers providing services with similar functionality. In this work, we have developed a selection tool (WSS-NFP) for web services which can rank services based on their nonfunctional properties such as performance, delay etc. We have used soft computing techniques for selection and discovery of web services based on non functional properties. Web service may be fully described by two sets of properties namely functional and non-functional. Functional properties describe what a web service can do and nonfunctional properties describe how good a web service can do. Functional properties include input, Output, conditional output, precondition, access condition and effect of service. These functional properties can be characterized as the capability of the service.
tain and unpredictable environment. Therefore we have used this approach to solve the problem under consideration. The domain expert will design and train a Neuro Fuzzy System for each web service domain. The domain expert can customize the system by
3.
Student: Abhishek Gupta and Jatin Kumar Supervisor: Prof. Sorav Bansal Details: Application provisioning, maintenance, high availability and disaster recovery make virtual machines ideal for use in a setup where computational power of computers is not used up to the optimum level. For example, VMWare, but its non-intuitive and a bit complex interface along with high software costs calls for an application which replaces the VMWare in an institute setup
Roongta
Supervisor: Prof Naveen Garg
2.
Student: Dhruv Jain Supervisor: Prof. M Balakrishnan Details: Bioinformatics is a field which
like IIT-D. Also, being highly customized to our needs we will be better able to utilize our resources. For building such interface the help of an API namely libvirt will be taken. A recent study in General Computing Lab have shown the actual usage statistics of Lab Computers to be less than 5% of what would have otherwise been possible. Thus, our model will focus on utilizing the computational power of already available Lab Machines which are available most of the times. The work on client-server model has already been done and at present, focus is on better UI and command-line interface for the same so that it can soon replace the VMWare based network. The implementation will see not only monetary benefits to IIT but a customized user interface required by an Institution. An institution like IIT Delhi will see a tremendous computational power being generated out of almost noth-
concerns with application of information technology and computer science to the field of molecular biology. A very popular discipline in bioinformatics is Next-generation sequencing or DNA sequencing. It specifies sequencing methods for determining the order of nucleotide bases-adenine, guanine, cytosine, and thymine in a molecule of DNA which is then assembled for analysis. A central challenge in DNA sequencing is sequence alignment, whereby fragments of much longer DNA sequence are aligned and merged in order to construct the original sequence. A wide variety of alignment algorithms and software have been subsequently developed over the past few years. Some commonly used ones include BWA-SW , Bowtie , Mosaik , Velvet , SOAP and MAQ. These algorithms have been implemented successfu ll y on pr ocessor s and supercomputers. Most of these take lot of time to execute on General purpose processors. Hardware accelerators such as FPGAs and GPUs can be used with processors to fasten these applications. As per our knowledge there are very few reports published in literature about accelerating these applications using FPGAs. This project aims at exploring FPGAs as accelerators for these applications resulting in speeding up sequence alignment by using hardwaresoftware co-design.
out much cooperation from other departments floats courses in a slot of their choice. This leads to comflict of interest for many students especially pursuing minor degrees or courses across say, more than 2 departments. We propose that each student fills in his choice of courses without the slot in mind following which we allot slots to courses minimising the number of conflicts giving higher weightage to core courses. Max cut Local Search algorithms and Particle Swarm Optimisation are among several algorithms that we plan to test.
4. Plagiarism Detection Tool
Gupta
Supervisor: Prof Huzur Saran Details: A plagiarism detection tool is the need of the hour in the modern world with software being written and plagiarized at a bewildering pace. Importance of such a tool in academic scenarios can hardly be over emphasized.With a bewildering range of techniques available, for this purpose there is a compelling need for up-to-date comparative research into their relative effectiveness,Challenges such as detecting plagiarism in a wide variety of programming languages remain. There is a growing need to devise an efficient algorithm, with realistic runtimes, the validity of whose results can be argued.
Page 3
and
performance and its effect patient management, factors influence the ability of obs er ver t o i n t er pr et information.
on that the th e
challenging area for the Medical Sci ence because of both the technological constraints and the time taking diagonosis available so far but many a times also because of the late detection of the disorder due to following reasons : The present technique of MRI scans and diagnosis of disorders called Radiology, is highly practical in the sense that the radiologist should have complete knowlege of brain parts and success of an imaging technique is judged not just on the images themselves but on the radiologist's
Then , there are several cases where many recent diseases detected in human brain are so closely related that it is almost not possible for a human eye to detect the difference between them and come up with one of them with certainty for example in case of Alzheimers disease, Hu n t i n g t on s d i s e a s e , or Parkinsons disease. Also the very large gap between the number of neuropatients to the number of neurologists in India and the time taking Manual analysis of one MRI scan often take the disorder to danger stages before even the patient get to reach a doctor .
So with this scenario in mind we have come up with the technique of image processing to be used on those MRI images of the patients. In this we would be comparing the images with the standard Deformable Models which are both for different Types of diseases and also different Stages for a particular disease. Then, we would provide the analyst with complete details of the comparison results according to the percentage match with each of those standard models so that the radiologist now could see more clearly the kind of Syndrome and the Stage of the Disease of the patient. This technology could pot en t i a l l y pr ovi de di a gn ost i c information to distinguish different causes of dementia and other forms of neurological illness, rapidly and noninvasively
by: Abhishek Gupta and Ankit Agrawal Compiled
Page 4
Dr. Arnab Bhattacharyya, Dept. of EECS, MIT, 19th Jan 2011 Mohit Saxena, University of Wisconsin-Madison, 28th Jan 2011 Dmtr Plvlgyi , ELTE, Budapest,
Feb 2011
Dr. John Augustine, Nanyang Technological University, Singapore, 15th
Rudra Tripathy, Amitabha Bagchi and Sameep Mehta. A study of rumor control strategies on social networks. In Proceedings of 19th ACM Intl. Conference on Information and Knowledge Management (CIKM '10), pp 1817-1820, October 2 0 1 0 . doi:10.1145/1871437.1871737 Sunita Tiwari and Saroj Kaushik, A Non Functional Properties Based Web Service Recommender System, Proceedings of International Conference on Computational Intelligence and Software Engineering (CiSE 2010), Wuhan, China, Dec 2010, IEEE Catalog Number : CFP1026 H-CDR, ISBN:978-1-4244-5392-4 Niladri Chatterjee, Saroj Kaushik, Smit Rastogi and Varun Dua., Automatic Email Classification using User Preference Ontology, Proceedings of International Conference on Knowledge Engineering and Ontology Development (KEOD 2010), Valencia, Spain, November 2010, SciTePress, ISBN 978-9898425-29-4, pp 165 170. Saroj Kaushik and Deepak Kollipalli, Multi-agent based Architecture for Querying Disjoint Data Repositories, International Conference on Machine and Web Intelligence (ICMWI2010), Proc of IEEE ICMWI 2010, October 2010, Algiers, Algeria, ISBN 978-1-42448608-3, DOI: 10.1109/ ICMWI.2010.5648048, pp 2834.URL: Sunita Tiwari and Saroj Kaushik, WSS-NFP: Tool for Web Service Selection Based on Non-Functional Properties using Soft Computing, International Conference on Machine and Web Intelligence (ICMWI2010) , Proc of IEEE ICMWI 2010, Oct 2010, Algiers, Algeria, ISBN978-1-4244-8608-3, D O I : 1 0 . 1 1 0 9 / ICMWI.2010.5648127, pp 28-34.
Feb 2011
Prof. John Hopcroft, Cornel University, 21st Feb 2011 Prof. Gerard Huet, INRIA, France,
21st Feb 2011 Prof. Andrew Lim, University of Hong Kong, 9th March 2011
Prof. Umesh Bellur, IIT Bombay, 11th
March 2011
Prof. Sandeep Sen, IIT Delhi, 11th
March 2011 Prof. Simon Kramer, Univ. of Luxembourg, 21th March 2011 Dr. Saurabh Panjwani , MSRI, 13th April 2011
Prof. Gregory Guthrie, Maharishi University of Management, Fairfield, IOWA State, USA, 16th December 2010
Prof. Vineet Bafna, Univ. California, San Diego, 17th December 2010
II. Department Updates Ayesha Chaudhary defended her thesis on 28th March 2011
Smruti Padhy defended her thesis on 6th April 2011
Prof Arun Somani , IIT Delhi( Visiting ), 4th Jan 2011 Prof. Deepak Kapur, University of New Mexico, 7th Jan 2011
Dr. Rik Sarkar, Technische and FreieUniversities in Berlin, 10th Jan 2011
III. Publications O. Turkcu and A. K. Somani, "Efficient Multicasting Approaches Using CollectionDistribution Networks," in Proc. of INFOCOMM 2011, ShanghaiChina, April 2011.
A. K. Somani and A. Gumaste, "Light Trails: Distributed Optical Grooming for Emerging Data Center, Cloud Computing, and Enterprize Applications," in Proc. of OFC, 2011, Invited Paper, March, 7-10, 2011.
Page 5
V. Events
Data Analytics and Operations Research Workshop in Oct 29& 30, 2010 Workshop on Cloud Computing in 1st November 2010 Geometric Computing in Nov 12-14 2010
Funde are an important part in life at IIT, especially from seniors. We made it a little formal. The summer internshipand-what-to-do funde session for 2nd yearites by the 3rd year seniors was This year started in a rather exciting hugely attended and appreciated; after way. With a new team, a new enthusi- all, all the funde at one place isnt a bad asm, ACES planned the freshers party idea. Not only this, the 3rd and 4th for the 2010 entrants which turned out yearites also had their share of funde Submitted by : Saumya Yadav to be huge success. There was a lot of regarding the opportunities after IIT, Publicity Secretary, ACES
Page 6
Adi Shamir has received many awards for his extensive contributions. Shamir was co-awarded the 2002 ACM Turing Award, IEEE Koji Kobayashi Computers and Adi Shamir is among the most famous Communications Award and the cryptographers, best known for Secure Computing Lifethe widely-used RSA encryption t i m e A c h i e ve m e n t The major crypto result is that this taught us system. Shamir was born in Tel Award. Shamir has Aviv, Israel, in 1952. He obnearly 100 publications about how to design future hash results to be tained his B.S. degree from Tel stronger. I would say the practical impact [of colli- to his name besides Aviv University in 1973. He was many more prestigious sion attacks] is still not strong. awarded his M.Sc. degree in awards. 1975 and Ph.D. degree in 1977 Shamir has a legendary from Weizmann Institute of Scireputation in the field of ence, Israel. Then, he joined cryptography and secuIn 1980, Shamir started working at Laboratory of Computer Science in Masrity. But, the legend is worried about the Weizmann Institute as a Professachusetts Institute of Technology as an the present state of computer security. sor of Applied Mathematics and instructor. He remarks: "Security wins many batComputer Science. There, he cotles but loses the security war. We are invented the Feige-Fiat-Shamir At MIT, Shamir met Ronald L. Rivest. definitely going backwards in comIdentification Scheme. He also deThey started developing algorithms for puter security. He is also perturbed vised visual cryptosystem, Shamirs public-key cryptography. Leonard Adleabout the individuals security and secret sharing, zero-knowledge and man was brought in to test the systems warns the society: "The government secret dispersion systems. He codevised. The initial systems developed will give you full privacy until they discovered Differential Cryptanalyproved easy to solve but on their 43rd want information about you." The sis. The interesting thing to note is attempt they developed a system based society today needs many more people that it later emerged that differenon prime numbers and one-way functions like Shamir if the privacy of each and tial cryptanalysis was already which was secure enough. It was named every individual is to be preserved. known and kept a secret by the RSA, patented, and the RSA Data Security Incorporated was formed to look IBM and the NSA. Sources: after the system. www.wikipedia.org In 1999, Shamir announced TWIN answers.yahoo.com Shamirs work was often shadowed by KLE (The Weizmann Institute Key www.justice.gov.il Locating Engine). TWINKLE is an officials concerned about national secu www.schneier.co electro-optical device that will exerity. In 1977, Scientific American offered www.zdnet.com a $100 reward to anyone who could cute sieve-based factoring algocrack a message encoded using the key. Readers could request a copy of the scientific paper. Thousands of copies of the rithms much faster than a personal computer. It can be utilized to break computer generated codes
Compiled by : Anant Mittal
We can see the point where the chip is unhappy if a wrong bit is sent and consumes more power from the environment.
Page 7
Prof. Ragesh Jaiwal joined as an assistant professor in the Department of Computer Science and Engineering at IIT Delhi. His areas of interests include Algorithms, Complexity, Theoretical Cryptography, and Machine Learning. Before joining IIT Delhi, he worked as a Postdoctoral Research Scientist at Columbia University, New York.
Q 1. Please walk us through some of the landmarks of your career. Ans 1. I completed my B.Tech from IIT- Kanpur in 2003. After that, I went to University of California, San Diego to pursue the PhD program. Somewhere in the middle of that , I received my M.Phil degree. After defending the thesis in 2008, I worked as Post Doctoral Research Scientist in Columbia University for about two years. Q 2. Tell us something about your student life and postdoctoral Research Scientist and the contrast between the two. Ans 2. Life was amazing in IIT Kanpur . The first three years were very hectic as the course structure was very intense but in the end it was great fun to be there. The major difference be-
Ans 6. Presently , I am focusing a lot on Theoretical Cryptography , especially on Ans 3. I have always wanted to come back topics like Streaming to India and pursue a career in academic Algorithms, Security Networks and Data field. I really like teaching . IIT Delhi is one Privacy. These are new and interesting areas of the best places as the students here are and all these problems are very relevant excellent and it has been a great pleasure to nowadays. I always encourage students to teach them explore these areas. When you explore new areas with students it always takes times but Q 4. Besides academics, what other ac- we are making progress. tivities/hobbies are of major interest to you? Q 7. Any message you would like to give Ans 4. During my life at IIT-Kanpur , I was to students at IIT-Delhi ? a part of hostel band as I used to play Guitar. During my Phd programme I used to do Ans 7. Think positively about academics a lot of driving and hiking but after coming and research. Even if you have family comback to India, I haven't been able mitments and have to work after graduation, to find much time to do these things. think positively about academics on long term. May be as an undergraduate student, Q 5. What made you choose Theoretical you do not get to look at the various reComputer Science as your research search areas , but there are always people in the department who are always ready to area ? help you in doing impactful work. There are lot of excellent students here and we do not Ans 5. During my graduation , I did some want to lose all of them in non-research advanced level courses at IIT K like Adfields. vanced Complexity Theory, etc. This area always fascinated me, so I kept digging in and made some progress on a few important problems. Theoretical computer science is one of the pillars of computer science. Without the formal study of this subject , we can't even think about the advanced levels. Today lot of focus is there in areas like han- Compiled by : Ankit Agrawal, Georgy dling large databases, Cryptography, etc. Sebastian & Nitin Aggarwal
Dont worry if it doesnt work right. If everything did, youd be out of a job.
(Moshers Law of Software Engineering )
Page 8
Page 9
mon world, but will also need to empowe the participants in ways that are better than being physically present. In this talk, the speaker explained the various component technologies as well as experiences that are being developed in Mixed virtual and physical reality as well as ubiquitous computing - includ- Microsoft Research for the future of ing robotics will play key roles, be- Telepresence. cause these systems will not only need to immerse the participants in a com- Contributed by : Aditi Kapoor
All in all, it was an enriching and stimulating experience to attend the ACM India Annual Conference which not only contained the recent technical advancements, but also explained their relevance towards the betterment of the society as a whole and Indians scenarios in particuThe Day 2 began with tutorials on Virlar. tualizations in two separate sessions one from Microsoft and the other one from Trillion Technologies. I preferred to attend the tutorials in second half so can share a detailed version of those Submitted by : Richa Sharma only! The second half of the tutorials
Page 10
Fun Section:
A rose remains so even from a distance You may not be able to feel its fragrance but know you do that it exists Authors of long ago inspire from a distance You can never meet them but know you do that on their words, many souls subsist Loved ones are sometimes apart in physical distance You can't hear all the words, you can't feel the loving touch But know you do that it exists Success sometimes haunts from a distance It may not be yours today But you know come it will someday if you persist
Page 11
B R O U G H T OU T B Y A C M STUDENT CHAPTER
ACM Student Chapter SponsorM Balakrishnan
Newsletter Team Magazine in-charge: Aditi Kapoor (aditi@cse.iitd.ernet.in) Assisted by ACM chapter members Associate Editors Nitin Aggarwal Savin Goyal Ankit Agrawal Chair - Akash Khandelwal ( cs5070208@cse.iitd.ernet.in (Photos in above order left to right)
Q5. Java Originally called Oak by creator James Gosling, from the tree that stood outside his window, the programming team had to look for a substitute as there was no other language with the same name. Java was selected from a list of suggestions. It came from the name of the coffee that the pro-