Vous êtes sur la page 1sur 45

P age |1

P age |2

P age |3 Editor-in-Chief Dr. R. G. Tated, Principal, MIT(E), Aurangabad

Editorial Board Dr. C. G. Desai, Head MCA Department Prof. K V Bhosle, Head Computer Science and Engineering Department Prof. V. M. Kulkarni, Head Electronics and Communication Department Prof. S. M. Badave, Head Electrical and Electronics Department Prof. S. V. Mhaske, Head Architecture Department Prof. S. R. Andhale, Head Mechanical Engineering Department Prof. A. M. Naphade, Head Information Technology Department Prof. A. W. Yerekar, Head Civil Engineering Department Prof. R. D. Mahajan, Head Engineering Science and Humanities Department Associate Editors Prof. J. A. Kamble, Computer Science and Engineering Department Prof. S. B. Atre, Architecture Department Prof. S. S. Patil, Mechanical Engineering Department Prof. A. Nair, MCA Department Prof. M. S. Joshi, Electronics and Communication Department Prof. S. R. Survase, Civil Engineering Department

Cover page Design: Prof. J. A. Kamble Satish, Saurabh

P age |4

P age |5

Android Operating System


In Mobile Phones:Like a computer operating system, a mobile operating system is the software platform on top of which other programs run. When you purchase a mobile device, the manufacturer will have chosen the operating system for that specific device. The operating system is responsible for determining the functions and features available on your device, such as thumbwheel, keyboards, WAP, e-mail, text messaging and more. The mobile operating system will also determine which thirdparty applications can be used on your device. Some of the more common and well-known Mobile operating systems include the following: - Symbian OS -Windows Mobile -Palm OS -Mobile Linux: -MXI -Android Android, initially developed by Android Inc was bought by Google in 2005. Android is based upon a modified version of the Linux kernel. The Android Open Source Project (AOSP) is tasked with the maintenance and further development of Android. Android has a large community of developers writing application program that extend the functionality of the devices. There are currently over 200,000 apps available for Android. Android Market is the online app store run by Google, though apps can be downloaded from third-party sites. Developers write primarily in the Java language, controlling the device via Googledeveloped Java libraries. Python, Ruby and other languages are also available for Android development via the Android Scripting Environment. The Android operating system consists of 12 million lines of code including 3 million lines of XML, 2.8 million lines of C, 2.1 million lines of Java, and 1.75 million lines of C++. Features:UI refinements for simplicity and speed The user interface is refined in many ways across the system, making it easier to learn, faster to use, and more power-efficient. A simplified visual theme of colors against black brings vividness and contrast to the notification bar, menus, and other parts of the UI. Changes in menus and settings make it easier for the user to navigate and control the features of the system and device. Faster, more intuitive text input The Android soft keyboard is designed and optimized for faster text input and editing. The keys themselves are shaped and positioned for improved targeting, making them easier to see and press accurately, even at high speeds. The keyboard also displays the current character and dictionary suggestions in a larger, more vivid style that is easier to read. Improved power management The Android system takes a more active role in managing apps that are keeping the device awake for too long or that are consuming CPU while running in the background. By managing such apps closing them if appropriate the system helps ensure best possible performance and maximum battery life. The system also gives the user more visibility over the power being consumed by system components and running apps. The Application settings provide an accurate overview of how the battery is being used, with details of the usage and relative power consumed by each component or application.

P age |6 New ways of communicating, organizing Internet calling The user can make voice calls over the internet to other users who have SIP accounts. The user can add an internet calling number (a SIP address) to any Contact and can initiate a call from Quick Contact or Dialer. To use internet calling, the user must create an account at the SIP provider of their choice SIP accounts are not provided as part of the internet calling feature. Additionally, support for the platform's SIP and internet calling features on specific devices is determined by their manufacturers and associated carriers. Near-field communications An NFC Reader application lets the user read and interact with near-field communication (NFC) tags. For example, the user can touch or swipe an NFC tag that might be embedded in a poster, sticker, or advertisement, then act on the data read from the tag. A typical use would be to read a tag at a restaurant, store, or event and then rate or register by jumping to a web site whose URL is included in the tag data. NFC communication relies on wireless technology in the device hardware, so support for the platform's NFC features on specific devices is determined by their manufacturers. Downloads management The Downloads application gives the user easy access to any file downloaded from the browser, email, or another application. Downloads is built on an completely new download manager facility in the system that any other applications can use, to more easily manage and store their downloads. Camera The application now lets the user access multiple cameras on the device, including a front-facing camera, if available.

-Aditya A Akolkar -BE CSE

Page |7

Eco_Ganpati
I have created an eco friendly Ganpati from old newspapers clay. I have also designed the Ganpati Makhar from handmade paper and waste Invitation cards . List of material for Ganpati Murti: 1. Old news papers(80%) 2. Whitening powder (20%) 3. Glue in small amount (Gum) 4. Water 5. Colors List of material for Ganpati Makhar: 1. Handmade paper 2. Old Invitation cards (Lagnapatrika) 3. Glue/Gum 4. Old waste Box. Some of the snapshots are:

List of materials used for Dekhava (Statues and mountain) 1. Clay 2. Old news paper 3. Tissue paper 4. Glue 5. Colors 6. Aleev seeds (for trees in Dive Ghat) The Ganpati murthi, Ganesh makhar and the statues of Various Saints are Hand made... Mrs.Shilpa Avinash Sanap Assist. Prof. in CSE Dept.

P age |8

LIFE
Life is just an endless stream of experiences some are good, some are bad, some are sweet, some are bitter, Learn to make the best of them. Even if the neem flower is bitter, the nectar inside is sweet so it is with life. A pleasant experience demands a happy disposition and makes everybody around happy. So your life should be flowing and happy like a river. Dont ever let the mass of gloom settle on the surface. If your heart is happy, your face will reflect the feeling. Be happy and let your face flow with that special light this life is for joy and hope. By the way where does happiness come from? Is it available in the market? Or is it just covered on the face like powder and lipstick? Happiness is never on scale, it is available to everybody because it resides in the heart of everyone. All the feelings and emotions fill the heart and play games. Some people are pessimists that means they always look at the gloomy side of life, they are always unhappy. Oh! Its my fate, they say or my luck is bad they grumble, but if it good? Has god really made things so tragic for some people? Of course not. It is just that such people do not understand the wonders of life. One thing you can do is that practise focusing on here & now as often as you can. Remind yourself that you really have only this moment. Stop warring about the future and rehearsing the past, make a commitment to yourself to protect and treasure your life force, energy, every day in a positive and gentle way. God loves the cheerful giver so let us strive to be content in what we have and enjoy the sweetness of life and be ready to open our heart to the various experience of life.

-Shriprasad Durgadas Joshi TE- B CSE ************************************************

P age |9

PAR-RENT..
Parents are our most gods, Who give life and the earth for us to be And I am indubitable thankful to them, That we got our god to see. My parents are my god, As every ones may matter They give a rhythm to the music, Pluck a thorn in vain, They shap up the fallacy, As they are our umbrella in the rain. I have no more to say, As their goodness is till infinity Parents give fragrance to a flower, There by improving its beauty Although they do would our worries lower, As they eradicate our enmity. They are god, no-way, We must remember this till externity. They are indoubty odd, So they possess gods character. They will surely stay in my heart and behaviour forever.

Shriprasad Durgadas Joshi T.E. (B) C.S.E.

They do lend to us their sagacious thoughts, That one could think never in his dreams They think before they give-off plights, As they protect us so it seems.. Its not a wow, That my parents shallnt stay with me forever But still I know,

P a g e | 10

Sixth Sense Technology

INTRODUCTION Sixth Sense is a wearable gestural interface that augments the physical world around us with digital information and lets us use natural hand gestures to interact with that information. Sixth Sense bridges the gap by bringing intangible, digital information out into the tangible world, and allowing us to interact with this information via natural hand. Sixth Sense comprises a pocket projector, a mirror and a camera. The hardware components are coupled in a pendant like mobile wearable device

Camera Projector

WHY SIXTH SENSE? Mirror Mobile Component Colored Markers

Fig: sixth sense COMPONENTS (pictorial view)

P a g e | 11 CAMERA A tiny LED projector displays data sent from the phone on any surface in view object, wall, and person. MIRROR

Captures an object in view and track the users hand gestures. It sends the data to smart phones. It acts as a DIGITAL EYE, connecting you to the world of digital information. PROJECTOR

The usage of the mirror is significant as the projector dangles pointing downwards from the neck.

SMART PHONE

The projector projects visual information enabling surface and physical objects to be used as interfaces. The project itself contains a battery inside, with 3 hours of battery life.

A web enabled smart phone in the users pocket processes the video data interprets the hand gestures. Other software searches the web & interprets the hand gestures.

P a g e | 12 COLOR MARKERS

HOW IT WORKS? (Pictorial view) It is at the tip of users fingers. Marking the users fingers with red, yellow, green, blue tape helps the webcam recognize gestures. The movement and arrangement of these markers are interpreted into gestures that act as interaction instruction for the projected application interfaces. SIXTH SENSE (PICTORIAL VIEW) PROTOTYPE

HOW IT WORKS? (Theory) The hardware that makes sixth sense work is a pendant like mobile wearable interface.

P a g e | 13 It has a camera, a mirror, projector, and is connected wirelessly to a Bluetooth smart phone that can slip comfortably into ones pocket. Camera recognizes individuals, images, pictures, gestures one makes with their hands. Information is sent to the smart phone for processing. The downward facing projector projects output image onto the mirror. Mirror reflects image onto the desired surface. Thus, digital information is freed from its confines and placed in the physical world. APPLICATIONS WEAR UR WORLD (WUW) WUW projects information onto surfaces, walls, and physical objects around us.

MAKE A CALL AND MULTIMEDIA READING Phone Call: You can call to your friend by typing the numbers on your hand. It displays the keypad of the phone over your palm and the key appears on the four fingers. Newspapers: Did you saw the moving pictures of the Newspaper in the movie Harry Patter; it is quite similar to it. It Searches the most appropriate video from the web by seeing the headlines or the caption of the News report. Use your hand's finger to press the keys.

P a g e | 14 TAKE PICTURE The user interacts with the projected information through natural hand gestures, arm movements, or interaction with the object itself.

CHECK THE TIME and CALL UP A MAP Draw a circle on your wrist to get a virtual watch that that gives you the correct time. With the map application we can call up the map of our choice and then thumbs index fingers to navigate the map.

FEED INFORMATION ON PEOPLE By using sixth sense technology the user can convert anything as a surface. (Wall, hand, newspaper) If we using sixth sense technology it will give u information about the thing you are looking.

P a g e | 15

Zoom Out

Get Flights Update

DRAWING APPLICATION (ZOOMING IN/OUT)

Get Product Info.

Draw Picture

Get Book Information

Zoom in

P a g e | 16 WORLD AROUND US Sixth Sense analyses what the user sees and visually augments surfaces or physical objects the user is interacting with. It is an open source COST & AVALIBLITY The device can be made in current prototype system costs approximately $350 to build. In Indian currency Rs. 17000. Sixth Sense hardware and software at present works with Smartphones. The softwares source code will be available on an open-source model. AS THE STATEMENT OF its MAKER. DEVELOPER OF TECHNOLOGY SIXTH SENSE

Pranav Mistry is the inventor of Sixth Sense. He is a research assistant and a PhD candidate at MIT Media Lab. Pranav holds a Master in Media Arts and Sciences from MIT and Master of Design from IIT Bombay besides his Bachelor degree in Computer Engineering from Nirma Institute Of Technology, Ahmedabad.. Sixth Sense has been awarded 2009 Invention Award by Popular Science. Pranav also won Young Innovator Award by Technology Review.

ADVANTAGES Portable Support multi touch and multi user interaction Connectedness between world and information Cost effective Data access directly from machine in real time Mind map the idea anywhere

P a g e | 17 CONCLUSION Sixth sense recognize object around displaying information automatically and letting us to access it any way to need. The six sense prototype implements several applications that demonstrate the usefulness, viability and flexibility of system. Allowing us to interact with this information via natural hand gestures. The potential of becoming the ultimate transparent user interface for accessing information about everything around us.

Miss. Madhuri Bagdane Lecturer in IT Dept.

P a g e | 18

Computer Aided Engineering An overview

Computer-aided engineering (CAE) is the broad usage of computer software to aid in engineering tasks. It includes computer-aided design (CAD), computer-aided analysis (CAA), computer-integrated manufacturing (CIM), computer-aided manufacturing (CAM), material requirements planning (MRP), and computer-aided planning (CAP). Software tools that have been developed to support these activities are considered CAE tools. CAE tools are being used, for example, to analyze the robustness and performance of components and assemblies. The term encompasses simulation, validation, and optimization of products and manufacturing tools. In the future, CAE systems will be major providers of information to help support design teams in decision making. In regard to information networks, CAE systems are individually considered a single node on a total information network and each node may interact with other nodes on the network. CAE systems can provide support to businesses. This is achieved by the use of reference architectures and their ability to place information views on the business process. Reference architecture is the basis from which information model, especially product and manufacturing models. The term CAE has also been used by some in the past to describe the use of computer technology within engineering in a broader sense than just engineering analysis. It was in this

context that the term was coined by Jason Lemon, founder of SDRC in the late 1970s. This definition is however better known today by the terms CAx and PLM.

CAE fields and phases CAE areas covered include:

Stress analysis on components and assemblies using FEA (Finite Element Analysis); Thermal and fluid flow analysis Computational fluid dynamics (CFD); Kinematics; Mechanical event simulation (MES). Analysis tools for process simulation for operations such as casting, molding, and die press forming. Optimization of the product or process.

In general, there are three phases in any computer-aided engineering task:

Pre-processing defining the model and environmental factors

P a g e | 19 to be applied to it. (typically a finite element model, but facet, voxel and thin sheet methods are also used) Analysis solver (usually performed on high powered computers) Post-processing of results (using visualization tools)

Finite element method The finite element method (FEM) (its practical application often known as finite element analysis (FEA)) is a numerical technique for finding approximate solutions of partial differential equations (PDE) as well as of integral equations. The solution approach is based either on eliminating the differential equation completely (steady state problems), or rendering the PDE into an approximating system of ordinary differential equations, which are then numerically integrated using standard techniques such as Euler's method, Runge-Kutta, etc. In solving partial differential equations, the primary challenge is to create an equation that approximates the equation to be studied, but is numerically stable, meaning that errors in the input and intermediate calculations do not accumulate and cause the resulting output to be meaningless. There are many ways of doing this, all with advantages and disadvantages. The Finite Element Method is a good choice for solving partial differential equations over complicated domains (like cars and oil pipelines), when the domain changes (as during a solid state reaction with a moving boundary), when the desired precision varies over the entire domain, or when the solution lacks smoothness. For instance, in a frontal crash simulation it is possible to increase prediction accuracy in "important" areas

This cycle is iterated, often many times, either manually or with the use of commercial optimization software. CAE in the automotive industry CAE tools are very widely used in the automotive industry. In fact, their use has enabled the automakers to reduce product development cost and time while improving the safety, comfort, and durability of the vehicles they produce. The predictive capability of CAE tools has progressed to the point where much of the design verification is now done using computer simulations rather than physical prototype testing. CAE dependability is based upon all proper assumptions as inputs and must identify critical inputs (BJ). Even though there have been many advances in CAE, and it is widely used in the engineering field, physical testing is still used as a final confirmation for subsystems due to the fact that CAE cannot predict all variables in complex assemblies (i.e. metal stretch, thinning).

P a g e | 20 like the front of the car and reduce it in its rear (thus reducing cost of the simulation). Another example would be in Numerical weather prediction, where it is more important to have accurate predictions over developing highlynonlinear phenomena (such as tropical cyclones in the atmosphere, or eddies in the ocean) rather than relatively calm areas. The finite element method originated from the need for solving complex elasticity and structural analysis problems in civil and aeronautical engineering. Its development can be traced back to the work by Alexander Hrennikoff (1941) and Richard Courant (1942). While the approaches used by these pioneers are different, they share one essential characteristic: mesh discretization of a continuous domain into a set of discrete sub-domains, usually called elements. Starting in 1947, Olgierd Zienkiewicz from Imperial College gathered those methods together into what would be called the Finite Element Method, building the pioneering mathematical formalism of the method. Hrennikoff's work discretizes the domain by using a lattice analogy, while Courant's approach divides the domain into finite triangular sub regions to solve second order elliptic partial differential equations (PDEs) that arise from the problem of torsion of a cylinder. Courant's contribution was evolutionary, drawing on a large body of earlier results for PDEs developed by Rayleigh, Ritz, and Galerkin. Development of the finite element method began in earnest in the middle to late 1950s for airframe and structural analysis and gathered momentum at the University of Stuttgart through the work of John Argyris and at Berkeley through the work of Ray W. Clough in the 1960s for use in civil engineering. By late 1950s, the key concepts of stiffness matrix and element assembly existed essentially in the form used today. NASA issued a request for proposals for the development of the finite element software NASTRAN in 1965. The method was again provided with a rigorous mathematical foundation in 1973 with the publication of Strang and Fix's An Analysis of The Finite Element Method, and has since been generalized into a branch of applied mathematics for numerical modeling of physical systems in a wide variety of engineering disciplines, e.g., electromagnetism, thanks to Peter P. Silvester and fluid dynamics. FEA Applications A variety of specializations under the umbrella of the mechanical engineering discipline (such as aeronautical, biomechanical, and automotive industries) commonly use integrated FEM in design and development of their products. Several modern FEM packages include specific components such as thermal, electromagnetic, fluid, and structural working environments. In a structural simulation, FEM helps tremendously in producing stiffness and strength visualizations and also in minimizing weight, materials, and costs. FEM allows detailed visualization of where structures bend or twist, and indicates the distribution of stresses and displacements. FEM software provides a wide range of simulation options for controlling the complexity of both modeling and analysis of a system. Similarly, the desired level of accuracy

P a g e | 21 required and associated computational time requirements can be managed simultaneously to address most engineering applications. FEM allows entire designs to be constructed, refined, and optimized before the design is manufactured. This powerful design tool has significantly improved both the standard of engineering designs and the methodology of the design process in many industrial applications. The introduction of FEM has substantially decreased the time to take products from concept to the production line. It is primarily through improved initial prototype designs using FEM that testing and development have been accelerated. In summary, benefits of FEM include increased accuracy, enhanced design and better insight into critical design parameters, virtual prototyping, fewer hardware prototypes, a faster and less expensive design cycle, increased productivity, and increased revenue. CAE Software CAE Sources This is a list of software packages that implement the finite element method for solving partial differential equations or aid in the pre- and post-processing of finite element models. Abaqus: Franco-American software from SIMULIA, owned by Dassault Systemes ANSA: An advanced CAE pre-processing software for complete model build up. ANSYS: American software AutoForm: Swiss origin German software for Sheet metal forming process chain. COMSOL Multiphysics COMSOL Multiphysics Finite Element Analysis Software formerly Femlab. FEFLOW: simulates groundwater flow, mass transfer and heat transfer in porous media. Femap, Siemens PLM Software: A pre and post processor for Windows. LS-DYNA, LSTC - Livermore Software Technology Corporation. Nastran: American software, from MSC Software. Radioss: A linear and nonlinear solver owned by Altair Engineering. Pro/Mechanica COSMOSWorks ALGOR . HyperMesh.. PAM-CRASH HyperForm. Dynaform. Autoform. MoldFlow C Mold Modex-3D

www. Ansys.com www. Moldflow.com www.mscsoftware.com www.altairhyperworks.com www.finitetoinfinite.com www.algor.com www.abacom.de

P a g e | 22 Er. Sandeep Patil APMED In-charge, Center of Excellence-CAE I think and think, for months, for years, ninetynine times the conclusion is false. The hundredth time I am right ALBERT EINSTINE

The three great essentials to achieve anything worthwhile are first, hard work, second, stick to itiveness; third, common sense. THOMAS A EDISON

P a g e | 23

TATA JARITI Y ATRA 2010

I am yatri of 2010 yatra .It is most amazing experience and one of the great achievement among all. Jagriti Yatra is an annual train journey that that takes hundreds of India's highly motivated youth (with some participation of international students) between the ages of 20-25 and experienced professionals with age above 25, on a eighteen day national odyssey, introducing them to unsung heroes of India. The aim is to awaken the spirit of entrepreneurship - both social and economic - within India's youth by exposing them to individuals and institutions that are developing unique solutions to India's challenges. Through this national event we have begun to inspire the youth of India to lead and develop institutions both nationally and within their communities. The vision of Jagriti Yatra is to inspire young Indians living in the middle of the Indian demographic diamond (Rs 40-Rs 120 per day) to lead development by taking to enterprise. By doing so, they can turn from being job seekers to job creators. Apart from this economic argument, they also discover a purpose that is appropriate for their talents. Only if we create a movement around enterprise led development will Indias youth employment and development issues will be resolved. Enterprise Led Development has been applauded as a key paradigm to bring about grassroots development. Indias demography represents a diamond more than a pyramid. The middle of this diamond consists of 50 Crore Indians, who are no longer destitute but often lack the

means to earn a living. Government jobs are few and far between, and for these young Indians enterprise is not a luxury, it is a necessity. Instead of relying on charitable aid or government grants, enterprise led development seeks to create sustainable and scalable enterprises in the middle of the Indian demographic diamond. By participating in local, scalable enterprise, these Indians, most of whom are young will not only find employment, they will create employment for others. Jagriti Yatra is one of the key strands of Jagriti to create national awareness about this program, and to build leaders who will follow the path of enterprise led development in their lives. Tatas are leading sponsors for this yatra.

Myself Basically if I have to tell about this yatra then I would like to describe this as this one of the unpredictable experience which one

P a g e | 24 cannot benefit without going through it. The person who wants to achieve his goal that of becoming successful entrepreneur should go for this. This yatra taken me from all corners of India and make me help to understand how small scale and big scale industries fixed up there roots. In India from small villages up to metro cities that sizes and types of enterprises may vary but the inspiration behind all is one that I have to become entrepreneur. During the Yatra, 17 groups were assigned to study Role models as well as panel discussions. Each group presented their findings to the rest of the train. In the interactions that followed, many common themes and some contradictions emerged. A smaller group of 17 was as-signed to brainstorm on these and a final group of 7 Yatris compiled the final document on behalf of all the 400 Yatris.

Route of TATA JARITI Y ATRA I would like to share my experience of this yatra in brief. We had started from Mumbai ,the charming young 400 yatries and one train .we travelled 9000km as shown in map .at every destination shown in map we had visit our role models. These learnings span across the 4 axes of programming - the Role model visits, the panel discussions and the Yatri interactions as well as the special sessions that were organized during the journey. My friend this is best platform to learn the things ,to experience the diversity of india,to built yourself as entrepreneur .i want to share our jagriti geet yaroo chalo badalne ki r ut haiyaroo chalo sawarne ki rut hai . ASHWINI LAHANE B E (Mechanical ) (YATRI OF 2010)

P a g e | 25

GSM Vs CDMA
The ultimate outcome of the battle for dominance between these two competing cellular data transmission technologies may lie more in their history than their respective merits. To understand the current prevalence of GSM, one needs a foundation in the forces that converged to push one technology ahead of the other. One of the most contentious battles being waged in the wireless infrastructure industry is the debate over the efficient use and allocation of finite airwaves. For several years, the world's two main methods -Code-Division Multiple Access (CDMA) and Global System for Mobile communications (GSM) -- have divided the wireless world into opposing camps. Ultimately, the emergence of a victorious technology may owe more to historical forces than the latest wireless innovation, or the merits of one standard over the other. CDMA's World War II Foundations CDMA, put into an historical context, is a recently patented technology that only became commercially available in the mid1990s, but had its roots in pre-World War II America. In 1940, hollywood actress turned inventor, Hedy Lamarr, and co-inventor George Antheil, with World War II looming, copatented a way for torpedoes to be controlled by sending signals over multiple radio frequencies using random patterns. Despite arduous efforts by the inventors to advance the technology from experiment to implementation, the U.S. Navy discarded their work as architecturally unfeasible. The idea, which was known as frequencyhopping, and later as frequency-hopping spread-spectrum technology (FHSS), remained dormant until 1957 when engineers at the Sylvania Electronic Systems Division, in Buffalo, New York took up the idea, and after the Lamarr-Antheil patent expired, used it to secure communications for the U.S. during the 1962 Cuban Missile Crisis. After becoming an integral part of government security technology, the U.S. military, in the mid-80s, declassified what has now become CDMA technology, a technique based on spread-spectrum technology. What interested the military soon caught the eye of a nascent wireless industry. CDMA, incorporating spread-spectrum, works by digitizing multiple conversations, attaching a code known only to the sender and receiver, and then dicing the signals into bits and reassembling them. The military loved CDMA because coded signals with trillions of possible combinations resulted in extremely secure transmissions. Qualcomm, which patented CDMA, and other telecommunications companies, were attracted to the technology because it enabled many simultaneous conversations, rather than the limited stop-and-go transmissions of analog and the previous digital option. CDMA was not field tested for commercial use until 1991, and was launched commercially in Hong Kong in 1995. CDMA technology is currently used by major cellular carriers in the United States and is the backbone of Sprint's Personal Communications System (PCS). Along with Sprint, major users of CDMA technology are Verizon and GTE. Advantages of CDMA include:

Increased cellular communications security.

P a g e | 26 Simultaneous conversations. Increased efficiency, meaning that the carrier can serve more subscribers. Smaller phones. Low power requirements and little cell-to-cell coordination needed by operators. Extended reach - beneficial to rural users situated far from cells. Mobile Handset manufacturers ultimately split into two camps, as Motorola, Lucent, and Nextel chose CDMA, and Nokia and Ericsson eventually pushed these companies out and became the dominant GSM players. Advantages of GSM:

Disadvantages of CDMA include:

Due to its proprietary nature, all of CDMA's flaws are not known to the engineering community. CDMA is relatively new, and the network is not as mature as GSM. CDMA cannot offer international roaming, a large GSM advantage.

The Euro-Asian Alternative: GSM Analysts consider Qualcomm's major competitive disadvantage to be its lack of access to the European market now controlled by Global System for Mobile communications (GSM). The wireless world is now divided into GSM (much of Western Europe) and CDMA (North America and parts of Asia). Bad timing may have prevented the evolution of one, single global wireless standard. Just two years before CDMA's 1995 introduction in Hong Kong, European carriers and manufacturers chose to support the first available digital technology - Time Division Multiple Access (TDMA). GSM uses TDMA as its core technology. Therefore, since the majority of wireless users are in Europe and Asia, GSM has taken the worldwide lead as the technology of choice.

GSM is already used worldwide with over 450 million subscribers. International roaming permits subscribers to use one phone throughout Western Europe. CDMA will work in Asia, but not France, Germany, the U.K. and other popular European destinations. GSM is mature, having started in the mid-80s. This maturity means a more stable network with robust features. CDMA is still building its network. GSM's maturity means engineers cut their teeth on the technology, creating an unconscious preference. The availability of Subscriber Identity Modules, which are smart cards that provide secure data encryption give GSM m-commerce advantages.

In brief, GSM is a "more elegant way to upgrade to 3G," says Strategis Group senior wireless analyst Adam Guy. Disadvantages of GSM:

Lack of access American market.

to

burgeoning

P a g e | 27 Conclusion Today, the battle between CDMA and GSM is muddled. Where at one point Europe clearly favored GSM and North America, CDMA, the distinct advantage of one over the other has blurred as major carriers like AT&T Wireless begin to support GSM, and recent trials even showed compatibility between the two technologies. GSM still holds the upper hand however. Th GSM Vs CDMA IN COMMUNICATIONS. WIRELESS

War II America. In 1940, hollywood actress turned inventor, Hedy Lamarr, and co-inventor George Antheil, with World War II looming, copatented a way for torpedoes to be controlled by sending signals over multiple radio frequencies using random patterns. Despite arduous efforts by the inventors to advance the technology from experiment to implementation, the U.S. Navy discarded their work as architecturally unfeasible. The idea, which was known as frequencyhopping, and later as frequency-hopping spread-spectrum technology (FHSS), remained dormant until 1957 when engineers at the Sylvania Electronic Systems Division, in Buffalo, New York took up the idea, and after the Lamarr-Antheil patent expired, used it to secure communications for the U.S. during the 1962 Cuban Missile Crisis. After becoming an integral part of government security technology, the U.S. military, in the mid-80s, declassified what has now become CDMA technology, a technique based on spread-spectrum technology. What interested the military soon caught the eye of a nascent wireless industry. CDMA, incorporating spread-spectrum, works by digitizing multiple conversations, attaching a code known only to the sender and receiver, and then dicing the signals into bits and reassembling them. The military loved CDMA because coded signals with trillions of possible combinations resulted in extremely secure transmissions. Qualcomm, which patented CDMA, and other telecommunications companies, were attracted to the technology because it enabled many simultaneous conversations, rather than the limited stop-and-go transmissions of analog and the previous

The ultimate outcome of the battle for dominance between these two competing cellular data transmission technologies may lie more in their history than their respective merits. To understand the current prevalence of GSM, one needs a foundation in the forces that converged to push one technology ahead of the other. One of the most contentious battles being waged in the wireless infrastructure industry is the debate over the efficient use and allocation of finite airwaves. For several years, the world's two main methods -Code-Division Multiple Access (CDMA) and Global System for Mobile communications (GSM) -- have divided the wireless world into opposing camps. Ultimately, the emergence of a victorious technology may owe more to historical forces than the latest wireless innovation, or the merits of one standard over the other. CDMA's Foundations CDMA, put into an historical context, is a recently patented technology that only became commercially available in the mid1990s, but had its roots in pre-World

P a g e | 28

digital option. CDMA was not field tested for commercial use until 1991, and was launched commercially in Hong Kong in 1995. CDMA technology is currently used by major cellular carriers in the United States and is the backbone of Sprint's Personal Communications System (PCS). Along with Sprint, major users of CDMA technology are Verizon and GTE. Advantages of CDMA include:

is now divided into GSM (much of Western Europe) and CDMA (North America and parts of Asia). Bad timing may have prevented the evolution of one, single global wireless standard. Just two years before CDMA's 1995 introduction in Hong Kong, European carriers and manufacturers chose to support the first available digital technology - Time Division Multiple Access (TDMA). GSM uses TDMA as its core technology. Therefore, since the majority of wireless users are in Europe and Asia, GSM has taken the worldwide lead as the technology of choice. Mobile Handset manufacturers ultimately split into two camps, as Motorola, Lucent, and Nextel chose CDMA, and Nokia and Ericsson eventually pushed these companies out and became the dominant GSM players. Advantages of GSM:

Increased cellular communications security. Simultaneous conversations. Increased efficiency, meaning that the carrier can serve more subscribers. Smaller phones. Low power requirements and little cell-to-cell coordination needed by operators. Extended reach - beneficial to rural users situated far from cells.

Disadvantages of CDMA include:


Due to its proprietary nature, all of CDMA's flaws are not known to the engineering community. CDMA is relatively new, and the network is not as mature as GSM. CDMA cannot offer international roaming, a large GSM advantage.

GSM Analysts consider Qualcomm's major competitive disadvantage to be its lack of access to the European market now controlled by Global System for Mobile communications (GSM). The wireless world

GSM is already used worldwide with over 450 million subscribers. International roaming permits subscribers to use one phone throughout Western Europe. CDMA will work in Asia, but not France, Germany, the U.K. and other popular European destinations. GSM is mature, having started in the mid-80s. This maturity means a more stable network with robust features. CDMA is still building its network. GSM's maturity means engineers cut their teeth on the technology, creating an unconscious preference. The availability of Subscriber Identity Modules, which are smart cards that provide secure data encryption give GSM m-commerce

P a g e | 29

advantages. In brief, GSM is a "more elegant way to upgrade to 3G," says Strategis Group senior wireless analyst Adam Guy. Disadvantages of GSM:

CDMA, will become the long sought after grail for a global wireless standard. A universalization of wireless technologies can only stand to benefit the compatibility and development costs and demands on all wireless commerce participants.

Lack of access American market.

to

burgeoning

Conclusion Today, the battle between CDMA and GSM is muddled. Where at one point Europe clearly favored GSM and North America, CDMA, the distinct advantage of one over the other has blurred as major carriers like AT&T Wireless begin to support GSM, and recent trials even showed compatibility between the two technologies. GSM still holds the upper hand however. There's the numerical advantage for one thing: 456 million GSM users versus CDMA's 82 million. Factors tipping the scales in the GSM direction include : AT&T Wireless' move to overlay GSM atop its TDMA network means the European technology (GSM) gains instant access to North America's number two network. Qualcomm's recently announced that Wideband-CDMA (WCDMA) won't be ready in Europe until 2005. This comes amidst reports that GSM's successor, General Packet Radio Services (GPRS) remains on target for deployment in 20012002. For all of the historical and technological reasons outlined above, it appears that GSM, or some combination of GSM and

P a g e | 30

THE NEW WORLD OF PLASMA ANTENNAS


The future of high-frequency, high-speed wireless communications could very well be plasma antennas capable of transmitting focused radio waves that would quickly dissipate conventional antennas
Transmission and reception of electromagnetic waves have become an integral part of the present day civilization. Antenna is an essential device for this process. It is a transducer that transmits or receives electromagnetic waves. In other words, antennas convert electromagnetic radiation into electric current, or vice versa. Antennas are used in system such as radio and television broadcasting, point-to-point radio communication, wireless LAN, cellphones, radar, and spacecraft communication. Antennas are most commonly employed in air or outer space, but can also be operated underwater or even through soil and rock at certain frequencies for short distances. Growing need for speed of communication network along with datahandling capacity are the major forces helping to explore new vistas of transmission and reception. With the wireless generations moving from 2G to 3G, 4G, 5G and on, the real benefit of upgrading the Wi-Fi networks is to get them to run faster. Wi-Fi usually can manage 54 megabits of data per second. The fancied Wi-Fi (a graphical user interface for configuring wireless connection) would handle up to 7 gigabits per second. This would mean downloading a TV show in a matter of seconds. Advances in antenna technology are expected to play a great role in the desired speed and capacityhandling capabilities of communication networks. Antenna Technology Physically, an antenna is an arrangement of one or more conductors, usually called elements. In transmission, an alternating current is created in the elements by applying a voltage at the antenna terminals, causing the elements to radiate an electromagnetic field. In reception, the inverse occurs. An electromagnetic field from another source induces alternating current in the elements and a corresponding voltage at the antennas terminals. Some receiving antennas (such a parabolic and horn types) incorporate shaped reflective surfaces to collect the radio waves striking them, and direct these waves onto the actual conductive elements. Some of the first rudimentary antennas were built in 1888 by Heinrich Hertz (1857-1894) in his pioneering experiments to prove the existence of electromagnetic waves predicted by the theory of James Clerk Maxwell. Hertz placed the emitter dipole at the focal point of a parabolic reflector. The words antenna (plural: antennas) and aerial are used interchangeably, but usually a rigid metallic structure is termed an antenna and a wire format is called an aerial. The origin of the word antenna relative to wireless apparatus is attributed to Guglielmo Marconi. In 1895, while testing

P a g e | 31 early radio apparatuses Marconi experimented with early wireless equipment. A 2.5 meter long pole along which a wire was carried, was used as a radiating and receiving aerial element. In Italian a tent pole is known as l antenna central, and the pole with a wire alongside it used as an aerial was simply called l antenna. Until then wireless radiating, transmitting and receiving elements were known simply as aerials or terminals. Marconis uses of the word antenna (Italian for pole) become a popular term for what today is uniformly known as the antenna. Since the discovery of radio frequency (RF) transmission, antenna design has been an integral part of virtually every communication and radar application. Technology has advanced to provide unique antenna designs for applications ranging from general broadcast of radio frequency signals for public use to complex weapon systems. In its most common form, an antenna represents a conducting metal surface that is sized to emit radiations at one or more selected frequencies. Antennas must be efficient so the maximum amount of signal strength is expended in the propagated wave and not wasted in antenna reflection. There is a list of antenna designs with their suitability, advantage and limitations. There are many antenna types and many ways of categorizing them. Antenna types can be used to differentiate antennas for radios, televisions and radar system. Because antennas can be built for transmission of different frequencies, another way to categories antenna types is by their frequency. For radio antennas, its important to know whether these are built for, say, frequency modulation (FM) broadcasting at 88-108 MHz or amplitude modulation (AM) broadcasting at 5351605 kHz. For television antennas, one distinguishes between ultra-high frequency (UHF) antennas and very-high frequency (VHF) antennas, or antennas that pick up both. Stores that sell antennas categorise various types on terms of customers needs. The range of antennas can be categorized as short, medium or long. For customers buying a television antenna, the decision dependent on how close they are transmitting towers that they wish to pick up a signal from. If the range is wellmatched to the distance, it will help avoid the antenna picking up unwanted signals. Location is another way of looking at antenna type. Antennas can be made for indoor, outdoor or attic installation. Indoor antennas are easy to install but usually do not have the elevation to provide the best signal, particularly for customers who are far from the transmission. Outdoor antennas were primarily made for rooftops, but more now are being designed to mount on the side of a house, on a pole or deck. The attic can be a useful installation point for those who do not want their antenna inside or outside for aesthetic or other reasons. Another set of antenna types is differentiated by style. Style can mean the antennas appearance in terms of design. It can also address whether the antenna is directional and gathers signals from a central location or whether it is multidirectional seeking signals from towers transmitting from different locations. The latest version of antenna, i.e., plasma

P a g e | 32 antenna employs ionized gas enclosed in a tube (or other enclosure) as the conducting element of the antenna. Many types of plasma antennas can be constructed, including dipole, loop and reflector antennas. Plasma antennas are interpreted as various devices in which plasma with electric conductivity serves as an emitting element. In gas plasma antenna the concept is to plasma discharge tubes as the antenna elements. When the tubes are energized, these turn into conductors, and can transmit and receive radio signals. When de-energized, these revert to non-conducting elements and do not reflect probing radio signals. The fact that the emitting element is formed over the interval needed for the emission of an electromagnetic pulse is an important advantage of plasma antennas. In the passive state (in the absence of plasma in the discharge tube), such a device does not exhibit electric conductivity. A plasma stream flowing from a jet into the ambient space, the plasma trace of a body moving at an ultrasonic velocity in the atmosphere, and alternative plasma objects have been studied as possible antenna elements. Solid-state plasma antenna uses beam-forming technology and the same manufacturing process that is currently used for silicon chips. That makes it small enough to fit into smart phones. Higher frequencies mean shorter wavelengths and hence smaller antennas. The antenna actually becomes cheaper with the smaller size because it needs less silicon. There is a gas plasma alternative but its not solid-sate, so it is bigger and contains moving parts making it more a pain to manufacture. The leaves the door open for solid-state plasma antenna to be used for next generation Wi-Gig(its

Plasma Antennas The different states of matter generally found on earth are solid, liquid and gas. Sir William Crookes, and English physicist, identified a fourth state of matter, now called plasma, in 1879. Plasma is by far the most common form of matter. Plasma in the stars and in the tenuous space between them makes up over 99 per cent of the visible universe and perhaps most of what is not visible. Important to antenna technology, plasmas are conductive assemblies of charged and neutral particles and fields that exhibit collective effects. Plasmas carry electrical currents and generate magnetic fields. A plasma antenna is a type of antenna in which the metal-conducting elements of a conventional antenna are replaced by plasma. These are radio frequency antennas that employ plasma as the guiding medium for electromagnetic radiation. The plasma antennas are essentially a cluster of thousands of diodes on a silicon chip that6 produces a tiny cloud of electrons when charged. These tiny, dense clouds can reflect highfrequency waves like mirrors, focusing the beams by selectively activating particular diodes. The beam-forming capability could allow ultra-fast transmission of high data loads like those needed to seamlessly stream a TV show to an untethered tablet-creating an attractive option for the next generation of supercharged wireless transmitters.

P a g e | 33 version 1.0was announced in December 2009) that can reach up to 7Gbps bandwidth over frequencies up to 60 GHz. Development Progress Initial investigations were related to the feasibility of plasma antennas as low-radar cross-section radiating elements with further development and future commercialization of this technology. The plasma antenna R & D project has proceeded to develop a new antenna solution that minimizes antennadetectability by radar at the first instance. But since then an investigation of the wider technical issues of existing antenna system has revealed areas where plasma antennas might be useful. A significant progress has been made in developing plasma antennas. Present plasma antenna have been operating in the region of 1 to 10 GHz. Field trials have shown that an energized plasma reflector is essentially as effective as a metal reflector. However, when deenergized, the reflected signal drops by over 20 dB. Still some technicalities related to plasma antennas like increasing the operating plasma density without overloading the plasma discharge tubes, reducing the power required and the plasma noise caused by the ionizing power supply, etc, have to be looked into in order to them the useful technologies for wireless communication in near future. The future of high-frequency, high-speed wireless communications could very well be plasma antennas capable of transmitting focused radio waves that would quickly dissipate using conventional. Thus, plasma antennas might be able to revolutionize not highspeed wireless communications but also radar arrays and directed energy weapons. The good news is that plasma antennas will be on-shelf in the next couple of years. The bad news is that some military powers can use it to create a more advanced version of its existing pain beam. Advantages of Plasma Antennas 1. An important advantage of plasma antenna over a conventional antenna is that the former is much lighter. Based on a set of patented beam-forming technologies, this high-performance electronically steerable antennas are extremely lightweight and compact. 2. Free from mechanical part, these maintenance-free plasma antennas are ideally suited for a wide range of wireless communications and sensing applications. 3. Plasma antennas have a number of potential advantages for antenna design. These are reconfigurable. When one plasma antenna is denergized, the antenna reverts to a dielectric tube, and a second can transmit through it. This allows using several large antennas stacked over each other instead of several small antennas placed next to each other. This results in better sensitivity and directivity. 4. When a plasma element is not energized it is difficult to detect it by radar. Even when it is energized, it is transparent to the transmissions above the plasma frequency, which falls in the microwave region. 5. Plasma elements can be energized and de-energized in seconds, which prevents signal degradation.

P a g e | 34

6. When a particular plasma element is not energized, its radiation does not affect nearby elements. 7. Plasma antenna can focus highfrequency radio waves that would dissipate quickly if beamed by conventional arrays. 8. Plasma antennas boost wireless speeds. Such antennas could enable next-generation Wi-Fi that allows for super-fast wireless data transfers. 9. Solid-wireless plasma antennas deliver gigabit-bandwidth, and high-frequency plasma antenna could hold the key for economically viable super-fast wireless networking. 10. Plasma antennas might also be used to create low-cost radar arrays that could be mounted on cars to help them navigate in lowvisibility conditions, or used to make directed, more focused and less bulky energy weapons. 11. Plasma antennas have developed an innovative range of selectable multi-beam antennas that meet the demands in todays wireless communication, defense and homeland security markets.

Limitations 1. The current hardware uses wider range of frequencies so its impractically massive to be used for mobile environments. 2. Plasma antennas are expensive and hard to manufacture. 3. High-frequency signals mean that antennas operating at higher frequencies couldnt penetrate walls like conventional Wi-Fi, so signals would have to be reflected throughout the buildings. Plasma antennas could theoretically solve some of these problems because these can operate at a wider range of frequencies, but gas antennas are also more complex (and likely more expensive) than their silicon-diode counterparts, which are small enough to fit inside a cell phone. With plasma antenna technology, there are kinks to iron out, but researchers and engineers are optimistic to make this promising technology commercially available in few years.

P a g e | 35

THE GOOD LIFE FOR PREVENTION AGAINST SUCIDE

Our lives have never been better We believe this to the letter Were all a little richer Aint this such a pretty picture But what weve hidden from view No one wants to pursue You see the pain is held inside And this means it cant subside So many seek an escape Which they cant communicate So Im going to save a soul The only way I know I must help them to awake Before it is too late. (Reproduced with the kind permission of Paul Rooney) People feeling down, depressed or distressed need our empathy, help and Support and so below are some important points to note from Stamp Out Suicide!

Although we live in an ever changing world, showing compassion must NEVER go out of fashion... Please make time for others as there may come a point when you need others to make time for you... Some people dwell on the past, some plan for the future and others will get through today...si Although we may feel alone, it is a feeling experienced by many, many people at given time and so in this sense we are never alone... Why the emphasis on suicide prevention? Because once a suicide is completed, very sadly, there is no cure...Therefore, we must try to prevent suicide.

Look after yourself and of course, others

P a g e | 36

GOOD FOOD EATING HABITS


Eat a variety of nutrient-rich foods. You need more than 40 different nutrients for good health, and no single food supplies them all. Your daily food selection should include bread and other whole-grain products; fruits; vegetables; dairy products; and meat, poultry, fish and other protein foods. How much you should eat depends on your calorie needs. Use the Food Guide Pyramid and the Nutrition Facts panel on food labels as handy references. Enjoy plenty of whole grains, fruits and vegetables. Surveys show most Americans don't eat enough of these foods. Do you eat 6-11 servings from the bread, rice, cereal and pasta group, 3 of which should be whole grains? Do you eat 2-4 servings of fruit and 3-5 servings of vegetables? If you don't enjoy some of these at first, give them another chance. Look through cookbooks for tasty ways to prepare unfamiliar foods. Maintain a healthy weight. The weight that's right for you depends on many factors including your sex, height, age and heredity. Excess body fat increases your chances for high blood pressure, heart disease, stroke, diabetes, some types of cancer and other illnesses. But being too thin can increase your risk for osteoporosis, menstrual irregularities and other health problems. If you're constantly losing and regaining weight, a registered dietitian can help you develop sensible eating habits for successful weight management. Regular exercise is also important to maintaining a healthy weight. Eat moderate portions. If you keep portion sizes reasonable, it's easier to eat the foods you want and stay healthy. Did you know the recommended serving of cooked meat is 3 ounces, similar in size to a deck of playing cards? A medium piece of fruit is 1 serving and a cup of pasta equals 2 servings. A pint of ice cream contains 4 servings. Refer to the Food Guide Pyramid for information on recommended serving sizes. Eat regular meals. Skipping meals can lead to out-of-control hunger, often resulting in overeating. When you're very hungry, it's also tempting to forget about good nutrition. Snacking between meals can help curb hunger, but don't eat so much that your snack becomes an entire meal. Reduce, don't eliminate certain foods. Most people eat for pleasure as well as nutrition. If your favourite foods are high in fat, salt or sugar, the key is moderating how much of these foods you eat and how often you eat them. Identify major sources of these ingredients in your diet and make changes, if necessary. Adults who eat high-fat meats or whole-milk dairy products at every meal are probably eating too much fat. Use the Nutrition Facts panel on the food label to help balance your choices. Choosing skim or low-fat dairy products and lean cuts of meat such as flank steak and beef round can reduce fat intake significantly. If you love fried chicken, however, you don't have to give it up. Just eat it less often. When dining out, share it with a friend; ask for a take-home bag or a smaller portion. Balance your food choices over time. Not every food has to be "perfect." When eating a food high in fat, salt or sugar, select other foods that are low in these ingredients. If you miss out on any food group one day, make up for it the next. Your food choices over several days should fit together into a healthy pattern. Know your diet pitfalls. To improve your eating habits, you first have to know

P a g e | 37 what's wrong with them. Write down everything you eat for three days. Then check your list according to the rest of these tips. Do you add a lot of butter, creamy sauces or salad dressings? Rather than eliminating these foods, just cut back your portions. Are you getting enough fruits and vegetables? If not, you may be missing out on vital nutrients. Make changes gradually. Just as there are no "superfoods" or easy answers to a healthy diet, don't expect to totally revamp your eating habits overnight. Changing too much, too fast can get in the way of success. Begin to remedy excesses or deficiencies with modest changes that can add up to positive, lifelong eating habits. For instance, if you don't like the taste of skim milk, try low-fat. Eventually you may find you like skim, too. Remember, foods are not good or bad. Select foods based on your total eating patterns, not whether any individual food is "good" or "bad." Don't feel guilty if you love foods such as apple pie, potato chips, candy bars or ice cream. Eat them in moderation, and choose other foods to provide the balance and variety that are vital to good health.

P a g e | 38

Cloud Computing
Cloud computing is a model for enabling founds everywhere, plans, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, and services) that can applications, be rapidly Cloud computing provides computation, software, data access, and storage services that do not require end-user knowledge of the physical location and configuration of the system that delivers the services. Parallels to this concept can be drawn with the electricity grid, where in endusers consume power without needing to understand the component devices or infrastructure required to provide the service. Characteristics Cloud computing exhibits the following key characteristics: Agility improves ability to newly with users' provided Programming accessibility to

provisioned and released with minimal management effort or service provider interaction. The concept of cloud computing fills never changing the need of IT: a way to increase capacity or add capabilities on the fly without investing in new infrastructure, training new personnel, or licensing new software. Cloud computing includes any subscription-based or payper-use service that, in real time over the Internet, extends IT's existing capabilities.

technological infrastructure resources. Application Interface (API)

software that enables machines to interact with cloud software in the same way the user interface makes easy interaction between humans and computers. Cloud computing systems typically use REST-based APIs. Cost is claimed to be reduced and in a public cloud delivery model capital converted expenditure. This lower barriers is to expenditure is to operational purported entry, to as

infrastructure is typically provided by a third-party and does not need to be purchased for one-time or infrequent intensive computing tasks. Pricing on a utility computing basis is fine-

P a g e | 39

grained with usage-based options and fewer IT skills are required for implementation (in-house). Device and systems using a web location browser independence enable users to access regardless of their location or what device they are using (e.g., PC, mobile phone). As infrastructure is off-site (typically provided by a third-party) and accessed via the Internet, users can connect from anywhere. Multi-tenancy enables sharing of resources and costs across a large pool of users thus allowing for: Centralization of infrastructure in locations with lower costs (such as real estate, electricity, etc.) Peak-load capacity increases (users need not engineer for highest possible loadlevels) Utilization and efficiency improvements for systems that are often only 1020% utilized. Reliability is improved if multiple redundant sites makes computing are used, which cloud for business ("onwell-designed suitable

architectures using web interface.

are services as

constructed the system

Security could improve due to centralization of data, increased security-focused resources, etc., but concerns can persist about loss of control over certain sensitive data, and the lack of security for stored kernels. Security is often as good as or better than under traditional systems, in part because providers are able to devote resources to solving security issues that many customers cannot afford. However, the complexity of security is greatly increased when data is distributed over a wider area or greater number of devices and in multi-tenant systems that are being shared by unrelated users. In addition, user access to security audit logs may be difficult or impossible. Private cloud installations are in part motivated by users' desire to retain control over the infrastructure and avoid losing control of information security. Maintenance of cloud computing applications is easier, because they do not need to be installed on each user's computer. They are easier to support and to improve, as the changes reach the clients instantly.

continuity and disaster recovery. Scalability via dynamic demand") provisioning of resources

on a fine-grained, self-service basis near real-time, without users having to engineer for peak loads. Performance is consistent and monitored, loosely and coupled Characteristics computing: with Shared cloud

P a g e | 40

Autonomic computer systems management."

computing capable of self-

Service-oriented

computing

Cloud computing provides services related to computing while, in a reciprocal manner, service-oriented computing consists of the computing techniques that operate on softwareas-a-service.

Clientserver model clientserver computing refers any distributed distinguishes providers Grid (servers) broadly between and "a to service service form application that

requesters (clients). computing Architecture Cloud architecture, the systems architecture of the software systems involved in the delivery of cloud computing, typically involves multiple cloud components communicating with each other over loose coupling mechanism such as messaging queue. of distributed computing and parallel computing, whereby a 'super and virtual computer' is composed of a cluster of networked, loosely coupled computers acting in concert to perform very large tasks." Mainframe computer powerful computers used mainly by large organizations for critical applications, typically bulk data processing such as census, industry and consumer statistics, enterprise planning, processing. Utility computing the "packaging of computing resources, such as computation and storage, as a metered service similar utility, to a traditional public as electricity." Peer-to-peer distributed architecture without the need for central coordination, with participants being at the same time both suppliers and consumers of resources (in Cloud computing sample architecture contrast to the traditional clientserver model). Layers such and resource financial transaction

P a g e | 41

Once an Internet Protocol connection is established among several computers, it is possible to share services within any one of the following layers.

applications. It facilitates deployment of applications without the cost and complexity of buying and managing the underlying hardware and software layers. Infrastructure Cloud infrastructure services, also known as Infrastructure as a Service (IaaS), deliver computer infrastructure typically a platform virtualization environment as a service, along with raw (block) storage and networking. Rather than purchasing servers, software, data-center space or network equipment, clients instead buy those resources as a fully outsourced service. Suppliers typically bill such services on a utility computing basis; the

Client A cloud client consists of computer

amount of resources consumed (and therefore the cost) will typically reflect the level of activity. Server The servers layer consists of computer hardware and/or computer software products that are specifically designed for the delivery of cloud and services, including multi-core processors, cloud-specific operating systems combined offerings. Deployment models

hardware and/or computer software that relies on cloud computing for application delivery and that is in essence useless without it. Examples phones and include other some computers, Application Cloud application services or "Software as a Service (SaaS)" deliver software as a service over the Internet, eliminating the need to install and run the application on the customer's own computers and simplifying maintenance and support. Platform Cloud platform services, also known as Platform as a Service (PaaS), deliver a computing infrastructure latform and/or solution and sustaining cloud stack as a service, often consuming cloud

devices, operating systems, and browsers.

P a g e | 42 Public cloud Public cloud describes cloud computing in the traditional mainstream sense, whereby resources are dynamically provisioned to the general public on a fine-grained, selfservice basis over the Internet, via web applications/web services, from an offsite third-party provider who bills on a fine-grained utility computing basis. Community cloud Community cloud shares infrastructure between several organizations from a specific concerns jurisdiction, community (security, etc.), whether with common compliance, managed

only some of the benefits of cloud computing are realised. Hybrid cloud Hybrid cloud is a composition of two or more clouds (private, community, or public) that remain unique entities but are bound together, offering the benefits of multiple deployment models. Private cloud Private cloud is infrastructure operated solely for a single organization, whether managed internally or by a third-party and hosted internally or externally. They have attracted criticism because users "still have to buy, build, and manage them" and thus do not benefit from lower up-front capital costs and less hands-on management essentially "[lacking] the economic model that makes cloud computing such an intriguing concept"

internally or by a third-party and hosted internally or externally. The costs are spread over fewer users than a public cloud (but more than a private cloud), so

P a g e | 43

Use of Internet affecting our memory, finds study


Researchers have found that the flag, for example," the researchers wrote, "do we think about flags - or immediately think to go online to find out?" In this case, participants were asked to To know whether people were more likely to remember information that could be easily retrieved from a computer, Betsy Sparrow, psychology collaborators, an at assistant Daniel M. professor and Wegner of her of "That kind of blew my mind," Dr. Sparrow said. The experiment explores an aspect of what is known as transactive memory In one experiment where participants typed 40 bits of trivia, the team found that the subjects were significantly more likely to remember information if they thought they would not be able to find it later. The Internet's effects on memory are still "Participants did not make the effort to remember when they thought they could later look up the trivia statement they had read," wrote the authors. A second experiment was aimed at determining remember. Prof. V.V. Shaga "If asked the question whether there are any countries with only one color in their MCA Dept. whether computer accessibility affects precisely what we largely unexplored, Dr. Sparrow said, adding that her experiments had led her to conclude that the Internet has become our primary external storage system. "Human memory," she said, "is adapting to new communications technology." the notion that we rely on our family, friends us. and co-workers as well as reference material to store information for Columbia remember both the trivia statement itself and which of five computer folders it was saved in. The researchers were surprised to find that people seemed better able to recall the folder.

widespread use of search engines and online databases is affecting the way people remember information.

Harvard and Jenny Liu of the University of Wisconsin, Madison, staged different memory experiments, reports the New York Times.

P a g e | 44

10-yr-old girl discovers security flaw in Apple, Android games


A 10 year old hacker left experts amazed with her discovery on the flaw in mobile phones. Read on to know how she cracked the nut. A 10-year-old hacker has left experts amazed by finding an old-age security flaw in many mobile games. Going by the handle CyFi, she found that advancing the clock on a tablet or phone could, in many games, open a loophole that can be exploited, reports the BBC. CyFi discovered the bug after getting bored with the pace of farming games and seeking ways to speed them up. Many farm-based games force players to wait hours before they can harvest a crop grown from virtual seeds. As a result CyFi, who has not revealed her real name, started fiddling with the clock on her handset to see if she could produce crops more quickly. Prof. V.V. Shaga MCA Dept. While many games detect and block clockbased cheating, CyFi found ways round these security measures. Disconnecting a phone from wi-fi and only advancing a clock by small amounts helped to open up the loophole as it forced the game into a state not tested by its original creators. CyFi's discovery has since been verified by independent security researchers. The exploit has been found to work in versions of games for both Apple and Android gadgets. The hacker presented her findings at the DefCon hacker conference held in Las Vegas.

Vous aimerez peut-être aussi