cache csi sakec magazine
Post on 30-May-2018
218 Views
Preview:
TRANSCRIPT
8/9/2019 Cache Csi Sakec Magazine
http://slidepdf.com/reader/full/cache-csi-sakec-magazine 2/40
JOURNEY SO FAR...
Winners of CSI Events.....................................................29
Check your Fun-Quotient.................................................27
Acquaint yourself with gizmos .........................................25
How to crack an interview................................................23
Reviews of CSI-SAKEC events
PC assembly.......................................................................1Photoshop ..........................................................................2 Apache, MySQL, PHP.........................................................2Workshop on C/C++............................................................3Virtual DJ.............................................................................3Invent‘09..............................................................................4
Invited Articles
1.Clustering Streaming Data...............................................5
-Prof. Uday Bhave2.Structure from Stereo.......................................................8 -Prof. Jyoti Joglekar 3.Computer Animation.......................................................10 -Prof. Dhanashree Toradmale4.Code‘Oh’Phobia.............................................................13 -Prof. Harshad Mande
Contributed Articles
1.How Google googles?....................................................15
-Sujay Narsale2.Ethical Hacking...............................................................17 -Jugal Thakkar 3.Cloud Computing............................................................19 -Anilkumar Panda
-Dhaval Savla4.Cryptography..................................................................21 -Rushabh Pasad
Contents
FACE TO FACE
TECH-TRENDZ!
FUN-ZONE
Help corner.......................................................................31
WINNERS
ANSWERZONE
CSI-SAKEC
TECHTAINMENT
8/9/2019 Cache Csi Sakec Magazine
http://slidepdf.com/reader/full/cache-csi-sakec-magazine 3/40
Editspeak
The Editorial Team
ÆAishwarya Neelakantan ÆRidhi Maru
ÆSujay Narsale ÆTanvi Dedhia ÆTwinkle Savla ÆVaibhavi Shah
CSI-SAKEC
Dear Readers,
We feel privileged to be writing the editorial for the debut issue of , the CSI-SAKEC magazine. What started as a simple suggestion
from one of the professors during the June 2009, AMP' event, has resulted in the release of the first edition of the of CSI-SAKEC magazine. Achieving this has been no mean feat. This edition is the result of the hard work interms of creativity and research, put in by the editorial team through a
period of nearly eight months.
The tagline 'the knowledge repository' aptly describes the magazine's content. It is our endeavour to bring to you the various advancements in the fields of engineering, latest gizmos and events at our centre till date. The technical articles included in this issue have been contributed by both professors and students from our college. It is our visionto be the platform where the budding researchers at SAKEC can showcasetheir talent. In our future editions, we hope to serve as a medium, through
which our professors can share their experiences and research with their students.
CACHE gives you a glimpse into the successful run of CSI-SAKEC since its inception in 2007. The workshops like PC Assembly, Java and competitions like Website Designing, help students build their technical skils professionally. One such event worth mentioning is the CSI Regional Convention, INVENT'09. CSI-SAKEC was a part of the collaborative effort
put in by eight other colleges in organizing this event of gigantic proportions.
Lastly, we would like to thank the entire support system behind CSI-SAKEC, the management, the faculty, the lab assistants and other
non-teaching staff, as well as the SAKEC-students for extending their valuable support, helping ”CSI-SAKEC” reach its current status and all those people whose cumulative efforts have made this magazine possible.
Till next time.........!!
The Editorial Team ,
CACHE
CACHE
8/9/2019 Cache Csi Sakec Magazine
http://slidepdf.com/reader/full/cache-csi-sakec-magazine 4/40
March 2010 CACHE
Congratulations to the CSI-SAKEC student chapter for bringing outthis quality debut magazine which highlights various activities of CSI-SAKEC along with articles written on modern accomplishments in Computerand Information Technology fields. Within a span of three years of itsemergence, the young and energetic team has various accomplishments to itscredit. It has conducted various workshops to give hands-on experience tostudents, conducted seminars and technical competitions to improve the softskills of students and enhance the placement prospects of our students in thepresent day competitive industrial environment. It has organized the CSI RegionalConvention, Invent'09 and is also a major collaborator in the forth comingregional convention iDeate'10.
What is praiseworthy about CSI-SAKEC is that its programs aremanaged by the students from conception to implementation, therebybringing out the innovation spirit, skill and development of the students.
I wish the CSI-SAKEC student community success in this debute-publication venture and hope that they would carry out new activities toimprove professional competence of our students.
From the
Trustee’s Desk Mr M.L.Shah
Trustee & hon.Jt.secretary
Mahavir Education Trust
CSI-SAKEC
i
8/9/2019 Cache Csi Sakec Magazine
http://slidepdf.com/reader/full/cache-csi-sakec-magazine 5/40
Dear Members,
On the eve of launching of CSI magazine by the members of CSI-SAKEC,I heartily congratulate all the active members and wish them all the success.
I have been observing that CSI-SAKEC chapter has remainedreasonably active since its inception and has been conducting various co-curricular
programs, technical events , multimedia and so on which are useful to students in practical life.
Launching of the magazine will provide the students an opportunity todevelop their skilsl in writing technical papers. I wish all the success to the CSI-SAKECmagazine project.
Dr. R.V.Karambelkar
B.E.(Elec), M.E.(Etrx & Tel),
PhD
Dear students,
I extend my hearty congratulation to CSI-SAKEC for reaching another milestone during this academic year with CSI-SAKEC magazine. The long cherisheddream of providing a platform for students to be able to enhance their technical skills andspread technical awareness has been realized only because of sheer hard work anddiligence of the students involved with the organization. I believe the magazine will act as acatalyst in students towards technical reporting as well as research. I earnestly hope that ethe magazine will grow to reflect the spirit of SAKEC.
Under the banner of CSI-SAKEC, students have been successfully organizing many activities including industrial visits, seminars and innovative technicalcompetitions. The student of today expected to be not only technically sound but alsocomplete professional. CSI-SAKEC is endeavoring to confirm to the aim of CSI i.e. to
transfer students into professionals with thorough knowledge and understanding of thetechnical world. CSI-SAKEC magazine is yet another step in this direction. I wish thecommittee of CSI-SAKEC best of luck.
From the desk of The Principal
From the desk of
The Director
March 2010CACHE
Dr. M B Shah
B.E.(Mech), M.E.(Mech),
PhD
CSI-SAKEC
ii
8/9/2019 Cache Csi Sakec Magazine
http://slidepdf.com/reader/full/cache-csi-sakec-magazine 6/40
Dear members,
CSI-SAKEC student centre was established in our college in the year 2007 and wasformally inaugurated on 24th April 2007. Today it has a strength of over 180 students. I amhappy to announce that Education Directorate of CSI has approved our CSI-SAKEC as astudent branch of CSI. This will facilitate to promote student branch activities like conducting
of workshop, meetings, seminars, IT symposia, IT quiz, etc.The objective of the CSI-SAKEC is to facilitate knowledge sharing, learning and training the students, while simultaneously inspiring and preparing them to meet thechallenges of the fast changing IT industry. The young and vibrant CSI-SAKEC has beenstriving to improve the technical skills of budding engineers in a professional manner. Inachieving this objective, it has organized various workshops and seminars in our college. And sofar it has succeeded in imparting value added technical skills supplementing the classroomteaching. Senior students are also encouraged to organize events and seminars to provide abetter interaction and synergy among the student community. Some of the popular eventsorganized by CSI-SAKEC are workshops on 'PC assembly, OS installation & Troubleshooting','Microprocessors and Microcontrollers', Adobe Flash and Dreamweaver', 'VB', 'Virtual DJ', 'Funwith JAVA', ' Working with MATLAB' etc. The overwhelming response in every workshop
from the students as well as from the faculty encouraged us to organize more such events withrenewed vigor and enthusiasm. For better involvement of the participants, every workshopconcluded with a small contest and prizes for the winners of first, second and third positions.
CSI-SAKEC also had the honor of being an active partner in the organization of theInternational Student Convention – 'Invent 09' hosted by the Mumbai Chapter of ComputerSociety of India. Two intercollegiate events 'Eureka-Technical Quiz' and 'I-Developer-anApplication Development in VB6' were conducted on 7th March '09, wherein student teamsfrom different engineering colleges participated. This year also we are hosting an event of 'Technical Paper Presentation' for International Student Convention 2010 on behalf of MumbaiChapter of Computer Society of India.
CSI-SAKEC has taken a significant step in transforming CSI into a vibrant and activeorganization with the launch of annual magazine and a dedicated web site for CSI-SAKEC. This
will provide a platform for each one of you to interact, discuss and debate on technology. Thisdevelopment will surely add substantial value to all members. And I invite all of you to takeadvantage of the immense learning and personality development opportunity that the CSI-SAKEC provides.
I thank the highly motivated CSI-SAKEC student committee as well as all studentmembers for contributing to the successful journey of our branch since its inception. I alsosincerely thank the Director, Principal and Management of SAKEC for their constant supportand guidance. I am looking forward to have the same type of cooperation and enthusiasm fromyou in the coming years also.
From the Staff Co-ordinator
March 2010 CACHE
Prof. Rekha Ramesh
CSI-SAKEC Staff Coordinator
CSI-SAKEC
iii
8/9/2019 Cache Csi Sakec Magazine
http://slidepdf.com/reader/full/cache-csi-sakec-magazine 7/40
Hello!
You might be wondering who I am with an article almost at the beginning of this magazine. Most of you probablyhaven't even heard of me considering that I passed out of Shah & Anchor Kutchhi Engineering College in May 2007. So letme introduce myself. I am Rishi Popat. And I am a very lucky person. That's because I had the good fortune of being one of the
founding members and the very first Chairman of CSI-SAKEC!
At the very outset, let me congratulate you on being a part of this prestigious organization called Computer Society of India-SAKEC. As our Bairi Sir famously puts it, CSI-SAKEC is an organization of the student, by the studentsand for the students! If you are a student of SAKEC, then surely you must have observed CSI-SAKEC's strive for excellenceand professionalism in all the activities it undertakes. This has been its hallmark since day one, which reminds me of the dayit was founded...
CSI-SAKEC had a very humble beginning in the spring of 2007. Since my initial days in SAKEC, like most of my fellow students, I always felt that there was very little on offer to students, in terms of co-curricular activities. Sure we had a fantastic cultural festival in Verve and a ravishing technical festival in Nucleus, but that mostly came under the domain of extra-curricular. But there was nothing really to complement our theoretical studies with practical exposure. Such
practical exposure would definitely be a boon when facing real projects and problems in the industry.Then, in my very final semester, Prof. Bairi approached me with the idea of starting an organization under the CSI
banner which would cater exactly to this lacuna. I was a bit hesitant at the start. Because only after you come into the final
year of B.E., do you realize how much workload one has! I had my hands already full with project and academics. But Idecided to go and give it my best. And in hindsight, I am very glad I did! I distinctly remember the long meetings I had withBairi Sir, Rekha Ma'am and Jyoti Ma'am; trying to hammer out the details of CSI-SAKEC's working, its objectives and soon. We already had two excellent organizations in place at SAKEC and it was important that CSI-SAKEC complimentstheir work ably.
The first task at hand was to establish a team of students to get CSI-SAKEC up and running. And again I provedlucky as I was blessed with the best team one could have asked for. Even though they had no previous experience they handledthe various departments like Logistics, Publicity and Event Management extremely well. Soon their efforts paid off andhow! Right at our debut, CSI-SAKEC registered an astounding 181 members! But the real challenge was to live upto suchexpectations. But we managed to do that admirably by conducting three workshops during the summer, namely on Matlab,Web Technologies and C Programming. Prof Uma Rao, Prof Dhanashree Toradmalle and Prof Milind Khairnar were kindenough to take up Introduction to Matlab and Web Technologies. But the high point for me was when 3 final year students
from our own college Dinesh Dhongade, Kaushak Satra and Raj Thakkar came up and conducted the workshop on C Programming. It really seemed to highlight our motto as I had mentioned above itself: CSI-SAKEC is an organization of the students, for the students, by the students.
But this was just the tip of the ice berg. I have been in touch with the CSI-SAKEC committees every year and Iobserved that each committee brings with it, great new ideas to improve CSI-SAKEC. Every committee seems committedto better the work done by the last. This magazine being a prime example! I just hope and pray the torch of CSI gets passed onto as able hands, batch after batch, and each year I feel a little bit more proud to say: Yes, I am a pioneer of CSI-SAKEC.
From the Pioneer of CSI -SAKEC
March 2010CACHE
Rishi Popat
CSI-SAKEC
iv
8/9/2019 Cache Csi Sakec Magazine
http://slidepdf.com/reader/full/cache-csi-sakec-magazine 8/40
J O U R Y S
F A R...
N E O
PC
Assembling
We take through the journey of CSI-SAKEC right
from its inception uptill now. CSI-SAKEC has made enhancing the technical
knowledge of the students of sakec its priority. Inthe following section we describe a few of our sucessful
workshops held in the academic year 2009-2010.
CSI SAKEC Student's
Center organized a workshop on
'PC Assembly, OS Installation
a n d T r o u b l e s h o o t i n g ' o n
Saturday 12th September, 2009.
The session was conducted by
'St Angelo's IT Graduate ' (SAIG)
M u m b a i . T h e w o r k s h o p began with a brief introduction
on activities of CSI-SAKEC,
following which the SAIG guests
and facu l ty o f Shah and
Anchor were felicitated. The
workshop primarily comprised
of three sessions: the first
session comprised of hands-on
PC Assembling, wherein all the
participants were given anopportunity to practice. The
session was taken up by Mr Ranjit
V i s h w a k a r m a o f
SAIG faculty. At the beginning,
all the participants were given
a brief introduction of the
v a r i o u s g e n e r a t i o n s o f
computers , s tar t ing f rom
transistor assembly units to the
supercomputer mainframescomprising 5th generation of
computers. This was followed
b y t h e v a r i o u s t y p e s o f
microprocessors along with an
introduction about the various
c o m p o n e n t s o f t h e P C
motherboard. From here on all
t h e c o m p o n e n t s o f t h e
motherboard including the
Expansion slots, socket,
external ports , USB wereexplained in detail. After going
through the functionality of
each and every component
present on the motherboard by
t h e v a r i o u s t y p e s o f
microprocessors along with an
introduction about the various
c o m p o n e n t s o f t h e P C
motherboard. From here on all
t h e c o m p o n e n t s o f t h emotherboard including the
present on the motherboard the
installation of the Operating
system on the assembled PC
h a r d w a r e . T h e o p e r a t i o n
consisted of powering the
computer, deleting all partitions,
creating a new partition and
selecting the disk drive to installOS.
The third session was
basically a continuation of
session-2 and it dealt with
troubleshooting. Troubleshooting
is a technique of problem solving
most often applied to repair of
failed products or functional
processes. The workshop ended
with all the participants gainingan insight of the details and
processes involved in the
Assembling of a PC.
March 2010 CACHE
Reviews of CSI-SAKEC events CSI-SAKEC
1
8/9/2019 Cache Csi Sakec Magazine
http://slidepdf.com/reader/full/cache-csi-sakec-magazine 9/40
U
R
.
J O R N E Y S O F A
. ..
Apache,MySQL & PHP
Photoshop
CSI SAKEC conducted a
workshop on Photoshop, a
versatile technology and the art of
image editing. The workshop was
conducted on 31 January 2009 by
faculty members of MAAC (Mayaacademy of advanced cinematic)
one of the reputed institute in
animation and cinematic. Over 70
students participated in the
works hop. For eng ineers ,
excelling in technical field is not
enough, ability to convey these
ideas to the client through visual
medium is important and that is
where the need to master the skillof Photoshop arises. Photoshop
allows us to enhance and edit
photos to make attractive designs
and templates.
T h e w o r k s h o p w a s
divided in two sessions. Firsts e s s i o n w a s d e v o t e d t o
introducing students to the world
of animation. Prof. Rahul
explained students the splendid
effects created by the software, its
increasing use in technical field
and its significance. The second
session that followed gave a
hands-on practice to the students.
The students got an opportunityto edit, correct photos, use
various Photoshop tools like
clone stamp, lasso and so on.
With the assistance and help of
the volunteers some students
came up with really captivating
pictures and a range of designs.
We were pleased to receive
an astounding response from the
students and were gratified to
meet up their huge expectations.
Due to the varied applications of
this software in technical field aswell as graphical design features
this software is a prerequisite for
engineers opting for a bright
career in gaming and animation.
In its bid to continue the
path of learning, CSI-SAKEC
ventured into a new field of Web
Technology, by conducting a
workshop on PHP from15th June
and 19th June 2009.The team of
speakers consisted of Mr. Akshay
Rao, Mr. Sagar Gupta, Mr. Nirav
Nagda, Mr. Jugal Thakkar & Mr.
Sashank Shah, students from
SAKEC.
T h e A M P p a c k a g e
consists of the open source
scripting language PHP (PHP-
Hypertext Preprocessor), Apache
Server & MySQL which acts as a
backend support for database
operations. The first day of the
5-day workshop was conducted
by Mr. Sashank Shah who
explored the roots of PHP.
Informative seminars and
practical sessions covered topics
such as PHP script, data types,
operators and global variables
like _GET, _POST, _SESSION and
concepts of cookies, sessions and
h e a d e r s w e r e p r o v i d e d .
S i m u l t a n e o u s l y D a t a b a s econnectivity too was taught.
In the following sessions,
Mr. Sagar Gupta and Mr. Jugal
Thakkar described an application
called Content Management
System (CMS) that deals with
managing the content of the
webpages dynamically. Mr.
Akshay Rao covered in depth the
topic of Object Oriented (OO)paradigm of PHP. He took up the
example of “Photogallery”
paradigm of PHP (involving file
uploading and downloading),
explaining how security could be
enhanced using the Object
Oriented paradigm.
This was not the end of the
interesting and exciting journey
of AMP. Mr. Sashank Shah gave
the students a detailed picture of
the world wide web. He talked
about how websites are loaded
on the server, How the interaction
between client and server takes
place, How the big picture helps
in building a successful network.
These topics accentuated the
importance of the topics covered
in the workshop.
March 2010CACHE
CSI-SAKEC Reviews of CSI-SAKEC events
2
8/9/2019 Cache Csi Sakec Magazine
http://slidepdf.com/reader/full/cache-csi-sakec-magazine 10/40
N
R
J O U R E Y
S O F A ....
VIRTUAL DJ
Workshop on
C/C++
The best way to learn a
new “human” language is to
speak it right from the outset,
listening and repeating, leaving
the intricacies of grammar for
later. the same applies to
computer languages- to learn
C/C++,we must start writing
C/C++ programs as quickly as
possible.
CSI-SAKEC organized a
seminar on “Joy of programming
in C/C++” which aimed to make
the participants well acquainted
with the features of C/C++
language and thus enabling them
to write programs in C/C++. The
seminar began with a brief
introduction on C/C++ by Prof.
Harshad Mande. Participants
were taught concepts like classes,
data abstraction, encapsulation,
inheritance etc each with an
example and thorough hands onpractice. Later Mr. Jugal Thakkar
(B.E, computer engineering
student of SAKEC) took the
seminar and gave a brief
introduction on C graphics. Basic
inbuilt functions and a smal
Application like a screensaver
using C graphics were discussed .
The seminar came to an
end with a small test on C/C++
which boosted the confidence of
the students. The seminar servedas a practical guide that took the
participants through a step by
step process of programming. It
offered concrete suggestions and
guidelines to the participants for
enhancing their knowledge and
c o m p e t e n c i e s w h i l e
simultaneously engaging them
in a substantive discussion on
various concepts and issuesrelated to programming in C/C++.
W h e t h e r o n e i s a n
amateur DJ striving to improve,
or an accomplished DJ, the
virtual DJ can be used by anyone
from absolute musical neophyte
to the expert performer. Virtual-
DJ is a digital panel that you can
install on your computer.
With Virtual DJ, you cando all your DJing on your PC,
drag and drop your tracks from
your music database to the
turntables, adjust the sound
levels, synchronize the songs by
adjusting pitch, smoothly drag
the cross fader to create the
transition between the tracks.
To get the students
acquainted with the art of soundmixing, the workshop on Virtual
DJ was conducted in two sessions.
Bharath gave an overview of
Virtual-DJ, its tools, functions
a n d a l s o d e s c r i b e d t h e
implementation of Mixcraft.
M i x c r a f t i s a m u l t i t a s k
application for Windows and is a
music loop remix program.A large library of virtual
instruments, loops, sound effects,
and audio effects is included in
the Mixcraft. Bharath then laid
emphasis on how to remix the
original sound tracks, play with
the lyrics, enhance the music
quality and come up with a
melodious song.
A C o m p e t i t i o n o nremixing of original sound tracks
was held in the second session of
the workshop. The response
received from students was
impressive. They came up with
wonderful remixes.From among
25 participants, three winners
were announced.
Apart f rom being a
technical event, it was also a fun
event comprising both the juniorand senior students from all
engineering streams. Its immense
popularity among students
encouraged CSI-SAKEC to
organize such events in future.
March 2010 CACHE
CSI-SAKECReviews of CSI-SAKEC events
3
8/9/2019 Cache Csi Sakec Magazine
http://slidepdf.com/reader/full/cache-csi-sakec-magazine 11/40
Since 1999, the Mumbai
Chapter of the Computer Society
o f I n d i a ( C S I ) h a s b e e n
instrumental in organizing
Student Conventions for the
benefit of its student members. It
has been organizing student
conventions since a decade. It
started with eConnect '99 being
hosted at VESIT which was a great
success and it was the genesis of
the idea that other colleges could
also be a part of the growing
student activity. It is from here
that the Mumbai chapter sowed
the concept of student activity
centers in every engineering
college. Thus the activity centers
grew and with it started the yearly
conventions. eMerge 2000, eSense
2001, eNable 2002, iMagine 2003,
iDeas 2004, iDeas 2005 and
iNnovate 2006 were some of the
earlier conventions to name a few.
Last year, CSI-SAKEC was
privileged to be invited to become
a part of the organizing team of
INVENT'09 - the Annual CSI
Regional Student Convention.
Our college was one of the eight
premier engineering colleges in
Mumbai that came together to
s h o w c a s e t h e t e c h n i c a l
e x t r a v a g a n z a o f c o l o s s a l
proportions. The other colleges
were NMIMS, TSEC, VESIT,
FCRCE, Atharva, VCET and
UMIT.
Each college volunteered
to conduct an event. The events
conducted under INVENT'09
were technical competitions like
Programming Contest, Circuit
Designing, Technical Paper
Presentation, Technical Quiz,
S o f t w a r e D e v e l o p m e n t ,
Technical Debate and fun events
like LAN and PS Gaming, Online
Treasure Hunt, which tested not
only one's technical skills and
knowledge but also one's ability
to deliver when it matters.
G r a b b i n g t h i s
opportunity to truly enter the
inter-collegiate level, CSI-SAKEC
conducted two events: - eUreka-
Technical Quiz and iDeveloper-
an Application Development
competition which were held onth7 March 2009. Mr. Shirkant
Karode, IT Head, Crompton
Greaves , the chief guest ,
inaugurated the SAKEC leg of
I n v e n t ' 0 9 .
Out of thirty participating
teams in eUreka, five were
shortlisted based on an online test
that tested the contestants on
basic concepts which are
common to all branches of
engineering.
The Convention Finalethwas held on 17 March, 2009 at
K.J. SIMSR and was inaugurated
by the chief guest, Mr. S.
Mahalingam - CFO, Tata
Consultancy Services & Vice
President Computer Society of
India. It was followed by the
release of the magazine Epoch '09
celebrating 10 years of CSI
Conventions. It was an eventful
day consisting of seminars such as
Wi-Fi Security Systems by
Mr.Jatin Parikh from Airtight
Security, Internet Marketing by
Vishal Prabhukhanolkar-Director,
Quetzal Verify Private Limited,
Panel Discussion on “The future
of IT in this period of meltdown.”
by Mr. Anand Jhaveri (Founder,
Chairman and CEO Rave
Technologies), Ms. Rajashri
Hazare (Director - Cerebrus
Consultants) and Mr. Kunal
Gursahani (Director for Global
Strategy and Marketing-Alpha
Plus Technologies) and an
intensive Linux Workshop.
The final round of eUreka
was held in parallel to a full house.
The five teams were quizzed on
topics ranging from digital logic
t o m i c r o p r o c e s s o r s t o
programming. The audience was
kept captivated by the brain
tingling questions and excellent
hosting.
To conclude, we, at CSI-
SAKEC, treasure the experience
got from direct interaction with
the CSI Mumbai Chapter and
with the other CSI Student
Centers. We hope to continue
being a part of this technical
extravaganza in the years to come.
!NVENT '09
March 2010CACHE
U
R
.
J O R N E Y S O F A
. ..
CSI-SAKEC Reviews of CSI-SAKEC events
4
8/9/2019 Cache Csi Sakec Magazine
http://slidepdf.com/reader/full/cache-csi-sakec-magazine 12/40
c T eh t
a i n m e n t
A data stream is a real-
time, continuous, ordered
(implicitly by arrival time or
e x p l i c i t l y b y t i m e s t a m p )
sequence of items. For analysis of
such data, the ability to process
the data in a single pass, or a small
number of passes, while usinglittle memory, is crucial. However
it is not possible to control the
order in which items arrive, nor is
it feasible to locally store a stream
in its entirety. As a result,
developing clustering algorithms
for streaming data has emerged as
an important problem in the area
of clustering.
The clustering problem isa difficult problem for the data
stream domain. This is because
the large volume of data arriving
in a stream renders most
traditional algorithms too
inefficient. These data sets are far
too large to fit in main memory
and are typically stored in
secondary storage devices. Linear
scans are the only cost effectiveaccess method; random access is
prohibitively expensive. Not only
those but some data sets, such as
r o u t e r p a c k e t s t a t i s t i c s ,
meteorological data, and sensor
network data, are transient and
need not be realized on disk.
What is Clustering?
Clustering problem can be
formally defined as follows:
Given n points in a metric
space M, partition the points into
k clusters so as to minimize the
maximum cluster diameter.
The diameter of a cluster is
defined to be the maximum inter-point distance in it. Sometimes the
objective function is chosen to be
the maximum cluster radius.
Data Stream is sequence
of points x ,…x,…xn read in1 i
increasing order of the indices i.
The Data Stream Model
assumes that input data are not
available for random access from
disk or memory, but rather arrivein the form of one or more
continuous data streams.
The stream model differs from
the standard relational model in
the following.
· The elements of a stream arrive
online (the stream is “active” in
the sense that the incoming items
trigger operations on the data,
rather than being send on request).· The order in which elements of a
stream arrive are not under the
control of the system.
· Data streams are potentially of
unbounded size.
· Data stream elements that have
been processed are either
discarded or archived.
· They cannot be retrieved easily
unless being stored in memory,which is typically small relative to
the size of the stream.
· Due to limited resources
(memory) and s tr ict t ime
constraints, the processing of
stream data will usually produce
approximateresults.
Considering above-
mentioned features of the
Streaming data, Clusteringalgorithm for
streaming data must have
1.Clustering Streaming Data
Decode clustering, Discoverhow to combat your fear of coding,
hack with principles, the logic behind pageranking... learn all this and much more in the
following section containing articles contributed byboth professors and students of SAKEC.
Mr.Uday Bhave
Professor
Head of Dept. (Computer)
March 2010 CACHE
Invited Articles CSI-SAKEC
5
8/9/2019 Cache Csi Sakec Magazine
http://slidepdf.com/reader/full/cache-csi-sakec-magazine 13/40
following characteristics
· It should be strictly one pass.
· It can be paused any time to
view current structure of the
clusters.
· It can be resumed again.
· It must take current trends intoconsideration while clustering.
S i n g l e p a s s c l u s t e r i n g technique:
T h i s t e c h n i q u e i s
summarized as follows:
1. Divide large data-set into
chunks (windows)
2. For each window, initialize
with random cluster seeds and
assign each point to its closest
center.
3. When all points in the window
are assigned to cluster centers,
adjust weight to each cluster
center by the number of points
assigned to it.
4. When all windows are
clustered, Cluster these weighted
cluster centers from each window
into final desired number of
clusters.
Above technique is fine
for clustering large database in
single pass but cannot be used
directly for streaming data as it
considers that the whole data is
available, though large, before
clustering process begins.
The above idea can be
further explored to suit for the
streaming data. In general two
approaches are considered for
streaming data:
1. Local Clustering and
2. Incremental Clustering
1. Local Clustering Approach:
Local clustering is based
on processing the complete
window to generate the clusters
(local to that window). These
clusters may be utilized in the
next window as a starting
solution.
Local Clustering approach:
1. Fix no. of centers (k), initial
points (m), size of window (n)
2. Randomly initialize 'm' cluster
means for window.
3. Fill the window with new
points.
4. Perform iteration of k-means
clustering on the points in the
window till it converges.5. Give weights to each center
based on number of points in it.
(Summarization)
6. Adjust cluster centers of the
window, accordingly
7. Repeat from step 2
2. Incremental Approach:
Incremental clustering
algorithms employ division of
stream in windows. They use
weighted windows and treat
them as generation. It adjusts
cluster centre as and when new
p o i n t a r r i v e s ; b u t
merging/splitting is done at the
end of the generation. This gives
t i m e t o e v a l u a t e c u r r e n t
generation, recognize new trends
and thus can locate outliers and
patterns in current data easily.
I n c r e m e n t a l c l u s t e r i n gtechniques
1. Fix no. of clusters (k), initial
points (m), size of window (n)
2. Randomly select 'm' cluster
centers for window.
3. Assign points to these m centers
and increment wt accordingly.
Adjust centers with each point.
4. Once entire window is
processed decide fittest centers
from 'm' and use it in new window,
add new centers with weight=1.
5. Continue with steps 3 and 4.
6. When final clusters are
recorded, Group m centers from
step 5 into k centers to create final
clusters.
Fitness criteria in step 4
may be depending upon type of
application in hand. It can bepossibly a threshold, comparing
weights of the centers. If weight of
the center is less than threshold, a
center can be discarded.
Considering new trends:
As seen in both the
techniques above, it becomes
necessary to devise techniques for
maintaining summaries orsynopses of the history of the
stream. Most research until now
has focused on techniques for
building summaries of all the data
seen so far. However, in most
applications very old data points
are considered less useful and
relevant than more recent data.
Thus it is necessary that old or
“ s t a l e ” d a t a d o e s n o toverly.influence the statistics.
Sl iding window approach
considers new trends in a good
manner. This can be further fine-
tuned, according to the specific
requirements by reducing
weights of the old windows
exponentially and thus to have a
control in the manner in which
trends should be handled.Conclusion:
In the case of incremental
March 2010CACHE
Invited Articles
I N M E
T E C H T A
N T
CSI-SAKEC
6
8/9/2019 Cache Csi Sakec Magazine
http://slidepdf.com/reader/full/cache-csi-sakec-magazine 14/40
clustering, at the arrival of each
point cluster centers are pulled out
or pulled in towards the new point.
This essentially takes new trends
into consideration. Furthermore
at the end of processing of current
window, clusters with less
number of points (weight) are
discarded, giving better means of
handling outliers. (Or can bestored for future visualization)
L o c a l C l u s t e r i n gtechnique has to use one of theexisting algorithms like k-meansfor clustering current window andthus heavily depend upon prosand cons of the algorithm used forl o c a l c l u s t e r i n g , w h e r e a si n c r e m e n t a l c l u s t e r i n g i sadaptable and not using any of thetraditional algorithm and directlyconsiders each new point arrivedfor clustering decision.
Another point to
be noted is that, local clustering
method has to wait till the entire
widow is clustered completely
and then only it can continue
responding to the input. This may
not be suitable for transient data
streams, where portion of the
stream may be lost, on the other
hand incremental technique
processes with each newly
arrived data point. If arrival of the
transient data is at very highs p e e d c o m p a r a b l e w i t h
computation, portion of the
stream within the window itself
may be lost. This would be more
objectionable than to lose some
portion after each window.
In essence, local clustering
gives better clustering quality, but
is slow whereas incremental
clustering takes current trends
into considerations in better way,at the cost of overall cluster
quality. Thus it can be finally
concluded that Incremental-
clustering approach is better-
suited approach particularly for
clustering streaming data.
March 2010 CACHE
Surf the internet without any browser.(However there must be an internet connection)
1. Go 2 the paint...2. Select the HELP...help topic OR F1.3. Right click on the title bar in the help window and the select the contextcommand ' jump to URL'4. Enter the complete web address in the subsequently dialog as the
'http: //www.yahoo.com' click ok....
5. Then again open the dialog box 'http://www.yahoo.com' right on upperside......and more blank space left....u write the website..and got it...
Invited Articles
I N T
T E C H T A
M E N
CSI-SAKEC
7
8/9/2019 Cache Csi Sakec Magazine
http://slidepdf.com/reader/full/cache-csi-sakec-magazine 15/40
March 2010CACHE
1. 3D Reconstruction
3D reconstruction is the problem
of recovering depth information
from intensity images. One
c o m m o n a p p r o a c h o f 3 D
reconstruction uses multiple
images. It is based on the principlethat a physical point in space is
projected onto different locations
on images captured from
different viewpoints . The
difference in the projected
locations is used to infer depth
information.[1].
Specifically, consider a rigid
object represented by a set of N 3D
points,{pi(f)} on some coordinatesystem at frame f. Each point pi(f)
is projected onto an image,Is(f),
which is captured from a
viewpoint s. Then mi(f), the
point's coordinates in the Image
Coordinate System can be
expressed in terms of a vector-
valued non-linear function h :
h is a simplification of the
perspective equations for a
specified camera.
Given a set of images that are
taken from different viewpoints s
(structure-from-stereo) or at
different time frames f (structure-from-motion), we may be able to
reconstruct the points from a
complete set of their projections .
T h e r e a r e t w o
computational sub-problems
a s s o c i a t e d w i t h 3 D
reconstruction from two or more
images:
1. Feature correspondence,
2. Structure estimation.
The first problem is best
explained in an example. For
instance, a physical 3D point is
projected onto Image A as point 1
and Image B as point 2. Points 1
a n d 2 a r e s a i d t o b e
correspondences. Hence, the
feature correspondence orfeature matching problem is to
find where point 2 is on image B
given the location of point 1 on
image A. Human vision is superb
in solving this problem, but the
automation of this process by
computers is rather difficult. It
essentially requires a search on
the whole image B. Applying
proper constraints can narrowdown the search, but without
sufficient constraints , the
problem becomes difficult and
ambiguities arise.
The second problem, structure
estimation, is relatively easy in
comparison. It is the computation
of the point set {Pi} after the
correspondence problem is
solved. The difficulty of this sub-problem depends on the amount
of a priori information available.
onsequence, even if intrinsic and
extrinsic parameters are known,
the challenge remains for
developing algorithms that
reduce the effects of errors in the
preprocessing steps on the
structure estimate.
If the intrinsic and extrinsic
parameters of the camera are
known for the whole set of images,
then an exact reconstruction in
absolute coordinates is possible.
However, the accuracy of the
reconstructed s tructure is
sensitive to the accuracy of these
parameters. Moreover, any errors
in solving the correspondenceproblem between two images also
affect the accuracy of the
reconstruction. As a consequence,
even if intrinsic and extrinsic
parameters are known, the
challenge remains for developing
algorithms that reduce the effects
of errors in the preprocessing
steps on the structure estimate.
2 Feature Extraction
In some 3D reconstruction
applications, it may be necessary
to estimate the structure of a scene
for every point in the image.
However, sometimes we may
o n l y b e i n t e r e s t e d i n
reconstructing the depth of an
object or scene at certain parts.
Image features usually refer to
parts of an image that have special
propert ies , and they may
correspond to parts of an object or
))(,()( f pi sh y x f m si =úûùê
ëé=
2.Structure from
Stereo Jyoti Joglekar
Asst. Prof.
Computer Engg. Department
Invited Articles
I N M E
T E C H T A
N T
CSI-SAKEC
8
8/9/2019 Cache Csi Sakec Magazine
http://slidepdf.com/reader/full/cache-csi-sakec-magazine 16/40
If some files cannot be deleted by the delete key, try to navigateThat folder on the command prompt and use the erase command.
March 2010 CACHE
scene that have structural
significance, to regions that have
visually identifiable textures or
intensity patterns, or to
a n y o t h e r d e r i v e d
properties that can be
localised on an image.
Some common examples
are edges, lines, corners,
junctions, ellipses, andzero-crossings of image
gradients.
common examples are
edges, lines, corners,
junctions, ellipses, and
zero-crossings of image
gradients.
Feature extraction is the process
of locating these particularelements on an image and it is an
intermediate step for many
computer vision applications.
The choice of features to extract
for reconstruction very often
depends on the properties of the
objects in the scene. Some
important factors to consider are
invariance, ease of detectability,
and how they are eventually used.Point features, are features that
c a n b e l o c a l i s e d i n t w o
dimensions. Point features are
easy to represent mathematically
and they can directly correspond
to three dimensional points in
space. Many features that can be
localised to a point are usually
easy to detect, and are relatively
consistent across different images
compared to other features such
as edges and lines. There are
many mathematical definitions of
localised image structures and
sometimes they are broadly
compared to other features such
as edges and lines. There are
many mathematical definitions of
localised image structures and
sometimes they are broadly
identified as corners.
3. Structure From Stereo
The use of stereopsis for depthperception in human vision is a
well known phenomenon.
Structure-from-stereo simply
refers to the class of computer
vision algorithms that applies the
same principle for inferring depth
information from images taken
from different viewpoints[2]. A
Figure 1 : A typical s tereo camera
configuration used for capturing stereo
images.
typical binocular stereo camera
system is illustrated in Figure 1. In
summary, the two cameras are
mounted such that their optical
axes (the Z -axes) are coplanar and
aligned in parallel. The separation
between the optical centres of theleft and right cameras is called the
baseline, and it is usually created
by a translation between the
cameras' optical centres
along their common X -
axis.
i n f o r m a t i o n f r o m
images taken from
different viewpoints[2].
A typical binocular
stereo camera system is
illustrated in Figure 1. In
s u m m a r y , t h e t w o
cameras are mounted
such that their optical
axes (the Z -axes) are
coplanar and aligned in
parallel. The separation between
the optical centres of the left and
right cameras is called the
baseline, and it is usually created
by a translation between the
cameras' optical centres along
their common X -axis.
The left and right cameras in the
stereo system capture a pair of
images, s imultaneously or
separately when no changes have
occurred in the scene between theacquisition of the two images. In
stereo vision, the difference in the
projected positions of a point on
the left and right images is
referred to as the disparity, and
the collection of disparity values
for a whole image is known as the
disparity map.
Invited Articles
I N T
T E C H T A
M E N
CSI-SAKEC
9
8/9/2019 Cache Csi Sakec Magazine
http://slidepdf.com/reader/full/cache-csi-sakec-magazine 17/40
Animation is the rapid
display of a sequence of images of
2-D or 3-D artwork or model
positions in order to create an
illusion of movement. It is an
optical illusion of motion due to
the phenomenon of persistence ofvision, and can be created and
demonstrated in a number of
ways. The most common method
of presenting animation is as a
motion picture or video program,
although several other forms of
p r e s e n t i n g
animation also
exist.
E a r l y
e x a m p l e s o f
a t t e m p t s t o
c a p t u r e t h e
phenomenon of
motion drawing
can be found in
paleolithic cave
paintings, where
a n i m a l s a r e
depicted with
multiple legs in
superimposed
positions, clearly
a t t e m p t i n g t o
c o n v e y t h e
p e r c e p t i o n o f
motion.
A 5,200 year old earthen
bowl found in Iran in Shahr-i
Sokhta has five images of a goat
painted along the sides. This has
been claimed to be an example of
early animation. However, since
from sequential drawings using
t e c h n o l o g i c a l m e a n s , b u t
animation did not really developmuch further until the advent of
cinematography.
There is no single person
who can be considered the
"creator" of the art of film
animation, as there were several
people doing several projects
which could be considered
various types of animation all
around the same time.Georges Méliès was a
creator of special-effect films; he
was generally one of the first
people to use animation with his
technique. He discovered a
technique by accident which was
to stop the camera
rolling to change
something in the
scene, and thencontinue rolling
the film. This idea
was later known
as stop-motion
animation. Méliès
discovered this
t e c h n i q u e
a c c i d e n t a l l y
when his camera
b r o k e d o w nwhile shooting a
bus driving by.
When he had
fixed the camera,
a h e a r s e
happened to be
passing by just
as Méliès restarted rolling the film,
his end result was that he had
managed to make a bus transforminto a hearse. This was just one of
the great contr ibutors to
animation in the early years.
no equipment existed to show the
images in motion, such a series of
i m a g e s c a n n o t b e c a l l e d
animation in a true sense of the
word.
T h e phe nak i s t os cope ,
praxinoscope , as well as thecommon flip book were early
popular animation devices
invented during the 1800s, while a
Chinese zoetrope-type device was
invented already in 180 AD. These
devices produced movement
3.Computer
AnimationMs.Dhanashree K Toradmalle
Asst Professor
(IT Dept)
An Egyptian burial chamber mural, approximately 4000 years old, showing
wrestlers in action. Even though this may appear similar to a series of animation
drawings, there was no way of viewing the images in motion. It does, however, indicate
the artist's intention of depicting motion.
March 2010CACHE
Invited Articles
I N M E
T E C H T A
N T
CSI-SAKEC
10
8/9/2019 Cache Csi Sakec Magazine
http://slidepdf.com/reader/full/cache-csi-sakec-magazine 18/40
T h e p r o d u c t i o n o f
animated short films, typically
referred to as "cartoons", became
an industry of its own during the
1910s, and cartoon shorts were
produced to be shown in movie
theaters.
Traditional animation (also
called cel animation or hand-
drawn animation) was theprocess used for most animated
films of the 20th century. The
i n d i v i d u a l f r a m e s o f a
traditionally animated film are
photographs of drawings, which
are first drawn on paper. To create
the illusion of movement, each
drawing differs slightly from the
one before it. The animators'
d r a w i n g s a r e t r a c e d o rphotocopied onto transparent
acetate sheets called cels, which
are filled in with paints in
assigned colors or tones on the
side opposite the line drawings.
The completed character cels are
photographed one-by-one onto
motion picture film against a
painted background by a rostrum
camera.T h e t r a d i t i o n a l c e l
animation process became
obsolete by the beginning of the
21st century. Today, animators'
drawings and the backgrounds
are either scanned into or drawn
directly into a computer system.
Various software programs are
used to color the drawings and
simulate camera movement andeffects. The final animated piece is
output to one of several delivery
media, including traditional 35
mm film and newer media such as
digital video. The "look" of
traditional cel animation is still
preserved, and the character
animators' work has remained
essentially the same over the past
70 years. Some animation
producers have used the term
"tradigital" to describe cel
animation which makes extensive
use of computer technology.
Examples of traditionally
animated feature films includePinocchio (United States, 1940),
Animal Farm (United Kingdom,
1954), and Akira (Japan, 1988).
Traditional animated films which
were produced with the aid of
computer technology include The
Lion King (US, 1994) Sen to Chihiro
Walt Disney studio (Beauty and the
Beast , Aladdin , Lion King) to the
more "cartoony" styles of those
produced by the Warner Bros.
animation studio (Iron Giant,
Quest for Camelot, Cats Don't
Dance). Many of the Disneyanimated features are examples
of full animation, as are non-
Disney works such as The Secret of
NIMH (US, 1982) and The Iron
Giant (US, 1999), Nocturna (Spain,
2007)
R o t o s c o p i n g i s a
technique, patented by Max
F l e i s c h e r i n 1 9 1 7 , w h e r e
animators trace live-actionmovement, frame by frame. The
source film can be directly copied
from actors ' outlines into
animated drawings, as in The Lord
of the Rings (US, 1978), used as a
basis and inspiration for character
animation, as in most Disney
films,
Live-action/animation is
a technique, when combininghand-drawn characters into live
action shots.
2D animation
2D animation figures are
created and/or edited on the
computer using 2D bitmap
graphics or created and edited
using 2D vector graphics. This
i n c l u d e s a u t o m a t e dcomputer ized vers ions o f
traditional animation techniques
such as of tweening, morphing,
onion skinning and interpolated
rotoscoping.
3D animation
3D animation are digitally
modelled and manipulated by an
animator. In order to manipulatea mesh, it is given a digital skeletal
structure that can be used to
Animation:
Tracing
live-action
Movement
Frame by
frame…
no Kamikakushi (Spirited Away) (Japan, 2001), Treasure Planet
(USA, 2002) and Les Triplettes de
Belleville (2003).
Full animation refers to the
process of producing high-
quality traditionally animated
films, which regularly use
detailed drawings and plausible
movement. Fully animated films
can be done in a variety of styles,from realistically designed works
such as those produced by the
March 2010 CACHE
Invited Articles
I N T
T E C H T A
M E N
CSI-SAKEC
11
8/9/2019 Cache Csi Sakec Magazine
http://slidepdf.com/reader/full/cache-csi-sakec-magazine 19/40
control the mesh. This process is
called rigging. Various other
techniques can be applied, such as
mathematical functions (ex.
gravity, particle simulations),
simulated fur or hair, effects such
as fire and water and the use ofMotion capture to name but a few,
these techniques fall under the
category of 3d dynamics. Many
3D animations are very believable
and are commonly used as Visual
effects for recent movies.
So, what does it take to be
a 3D artist? Well, obviously, you
must have an eye for art. Most
people who begin learning 3Dhave some kind of background in
drawing and sketching. It's not
unheard of for 3D studios to hire
artists who have no experience in
3D, based solely on the strength of
a pencil drawing portfolio.
Sculptors, who were previously
limited to animatronics and
claymation (clay animation), also
tend to make an easier transitionto 3D.
Even if you don't have
formal art training that goes
beyond the few classes you took
in high school or college you can
still do great work in 3D.
A 3D Artist must have
following qualities:
1. Patience. Many beginnersunfairly compare themselves to
established artists possessing
years of experience. While it can
be a great motivator and a
valuable source of inspiration, 3D
art is a diverse subject, requiring
dedication and practice. Some
say that 3D is like Go, the ancient
game of strategy: it takes minutes
to learn, but a lifetime to bemaster.
2. Detail. 3D artists tend to have a
strong background in computers,
compared to non-digital artists.
E x p e r i e n c e i n c o m p u t e r
programming is common in 3D
circles, though not required. 3D
artists need to have an eye for
detail, be resourceful and self-
sufficient.3. Hard work. If you want
something easy, pick up a pencil
and paper and start drawing. 3D
art isn't nearly as immediate with
results. One can spend, hours,
days, and even weeks perfecting a
3D model before ever moving
onto texturing, animation or final
renders. 3D art is unique in that it
can require a broad array of skills,
from drawing to acting, to
successfully bring together a
finished piece. The payoff is that
3D artist is perhaps the most
sought-after creative workers.4. Willingness to accept criticism.
Eventually you'll feel motivated
to submit your art for review by
other artists. 3D artists can nitpick
like no one else in the world, so be
prepared to have even the
slightest error pointed out to you
in exacting detail - especially if
you're attempting to create
anything realistic. If you intend towork in a studio one day, your
ability to accept criticism will be
crucial to the overall success of the
team.
March 2010CACHE
Invited Articles
Ü400 => this is bad request error, First check you may be typing wrong URL name and
server could not understand your request.
Ü401 => you are trying to open any unauthorized access site or page. Check your
username and password if you are trying to open any webpage.
Ü402 => Payment Required Error
Ü403 => you are trying to open any forbidden page and you are blocked by that domain.
Ü404 => you are trying to open the webpage that was removed or re-named, also
check the URL spell ing.
Ü408 => this is time out error. You should send the request with in t ime that the serverset for you.
Internet Error codes and Meaning
I N M E
T E C H T A
N T
CSI-SAKEC
12
8/9/2019 Cache Csi Sakec Magazine
http://slidepdf.com/reader/full/cache-csi-sakec-magazine 20/40
When you are placed
in an IT firm and all
you have to do from
9:00 am to 5:00 pm is
fiddle around with a
piece of code, you are
Bound to figure a
way around it.
As a lecturer in the
I n f o r m a t i o n T e c h n o l o g y
department of Shah and Anchor
Kutchhi Engineering College for
more than a year now, I know one
thing for sure, not many of us are
comfortable when it comes to the
word 'coding'. As a student it wasC programming, as a teacher now
its Java programming, thanks or
no thanks to the new pattern of
the syllabus.
As a student I had a
colleague who used to finish
his practical session in one
hour flat and I used to take
about a day. I definitely felt an
inferiority complex creepinginside me and that to a certain
extent did motivate me, but to
most of us it's quite perplexing. I
knew I had to clear the air on a
topic like this because I came
across a very peculiar situation
lately. I was conducting my
practical session and while most
students were struggling doing
their programs, I noticed this onegirl who never bothered to even
try. All of a sudden, when it was
about time to leave, she had a
program ready and fit for
execution. I knew at once it was a
c a s e o f m u c h n e g l e c t e d
plagiarism in Mumbai University.
I asked her, “Listen, I know you
haven't written this program on
your own. How can I possiblygrade your work?” She was very
quick in replying, “Sir, I
completely understand this
program and you can ask me any
question you want on this piece of
code.” After a few ifs-and-buts
she confessed that she couldn't
write a program, but she knew all
the syntaxes well. She knew all
t h e i n t r i c a c i e s o f J a v a
programming. She basically
knew the theory well, but she
couldn't create something called
as a working program.
Now is another situation:
this one is kind of personal. I
once gave a technical
interview and was asked
about a project which I had
implemented using VB.net. The
interviewer asked me to elaborate
on the .net framework. I didn't
have much of a say, because I
really didn't know what it meant,
but I could write any program in
.net given the MSDN library and
an Internet connection. I was
obviously given negative marks
for such an answer.
4.Code'Oh’Phobia!!!- Harshad M. Mande
Ex-Lecturer I.T.
What I just presented to
you are two situations which a so
called IT engineering student
finds him in. One is when he
knows the theory, and the other
one is when he can put things to
practice without knowing much
of the theory. Often students askme, “Sir, I am very weak in C
programming. Which book
should I refer to?” It's one of those
situations where I cannot conjure
up a considerable advice. A
reasonable answer to such a
question is another question:
“Which exam are you preparing
for?” If the answer is say exam A,
then I would give him a decentenough book to read, some links
to refer to, but if the answer is I-
just-want-to-learn-programming.
Then my answer would take a
completely different form. The
f a c t i s y o u c a n n o t l e a r n
programming by reading a lot of
l i t e r a t u r e . I t ' s j u s t l i k e
assimilating a lot of knowledge
but not knowing where to use it.In the case of programming you
have to follow the adage: If you
want to learn to swim, u should
just jump directly into the well.
This is how many infamous
swimmers learn how to swim.
Start with a set of programs and
keep hitting your keyboard is the
mantra.
Now many people get to avery fantastic start. They are
really spirited when it comes to
March 2010 CACHE
Invited Articles
I N T
T E C H T A
M E N
CSI-SAKEC
13
8/9/2019 Cache Csi Sakec Magazine
http://slidepdf.com/reader/full/cache-csi-sakec-magazine 21/40
this new methodology. But what
exactly happens is that coding the
wrong way can be quite a
dampener. Within no time you are
so demoralized that you decide
that coding is not your piece of
cake. Now what exactly is thiswrong way of coding? It's
basically writing a program with
whatever syntax you know and
then constantly compiling it to
discover some errors. Then again
you wonder what the errors are so
you keep staring at the code and
hope that some Bill Gate's spirit
enters you and you are able to
debug the error. But such a scenenever happens. So you go back to
your books and literature and
hope to find a solution to the error.
Then you see the size of the book
and you keep it away. Then you
say I would rather watch a movie
than write code.
Well what separates a
good programmer from a non
programmer is his speed andaccuracy in programming. The
one helping hand that God (in our
case the compiler designer) does
provide is a debugging tool.
Instead of sitting in front of the
computer screen and staring at
your code you can use the single
step debugging, the watch
windows, etc. and discover your
sticky bugs in no time. In theprocess you end up learning a lot
about the details of program
compilation and execution. For
those who are unaware about
using these tools meet me over acup of Java (Java is a kind of coffee,
for those who don't know).
One must remember that
it's no great deal to be a good
programmer. You may contact
some of your senior friends who
are placed in IT companies and let
them drip nostalgia over their
coding fear. They would possibly
laugh over it. It's for a fact thatcoding ain't tough. It's about the
number of hours you give to it.
When you are placed in an IT firm
and all you have to do from 9:00
am to 5:00 pm is fiddle around
with a piece of code, you are
bound be a figure a way around it.
Currently as students you are not
able to give enough time to coding,
because you are not really gettingpaid for it, you are actually paying
for it (Haha). Another important
thing is coding is like slavery to
your computer. You are a slave to
the syntaxes of the programming
language. And considering the
rich Indian heritage of slavery as
an Indian we are born to be good
programmers.
The programmers whoreally shine out of this huge
battalion of the coders are the
ones who write clean and efficient
programmes. The programs that
are time and space efficient, are
the so-called good programs.
Have you ever wondered how a
game program sits on your 25MB
of feeble memory on your cell
phones? It's because someone has
written the application using the best possible space efficient logic.
For beginners I would strongly
suggest you to read this definitive
guide on programming, called
T h e A r t o f C o m p u t e r
Programming by Donald. E.
Knuth (pronounced as 'Kuh'nuth)
Volumes 1 to 4. He has very
convincingly given you a vivid
treatment on programmingdescribing as an art than a mere
science. Throw away your Chetan
Bhagats or Harry Potters and pick
up a copy of this book. A little bit
of dedication and a pinch of
mental commitment is the recipe
t o o v e r c o m e y o u r
Code'Oh'Phobia!!!
March 2010CACHE
Have fun with ALT!!!
Invited Articles
I N M E
T E C H T A
N T
CSI-SAKEC
14
8/9/2019 Cache Csi Sakec Magazine
http://slidepdf.com/reader/full/cache-csi-sakec-magazine 22/40
For as far as most of us canremember now, we have usedonly one tool for starting of ourquests into the great World WideWeb. A simple page with just onetext box and a few buttons hides
behind it a mammoth machinery
which has compelled millions ofusers to set it as their home pageand use it innumerable times perday. I am of course talking aboutGoogle, the undisputed King ofSearch. With its simplisticinterface and clean and accurateresults it has firmly lodged itselfas one of the most powerfulentities on the Internet. So muchso that searching on the net is
often colloquially referred to as'Googling'!
So how does Google do it?
The secret behind it is a
combination of simple logic and
some basic mathematics. Google
calls this secret, the PageRank
Algorithm. To understand
PageRank, we will first see how
most modern Search Engines
search the Web:They make use of somethingcalled as a Crawler (or Search-botor Web-bot or spiders). Thesecrawlers move through the WorldWide Web from page to pagethrough Hyperlinks (links toother webpages). Each time theyencounter a new page they indexthe information in that page and itis stored in a central database.
Whenever the user types in aquery, the query or keyword issearched against the database and
the pages which are related tothat keyword are listed as results.As one can imagine, the problemhere is that each keyword willgive millions of results majorityof which will be useless to the
The trick is
therefore to sort
the [million] results
correctly. This
Is exactly what
PageRank does and
does it very well.
currently is quite complicatedand a closely guarded secret, butthe formula used when Googlewas still being developed was:
PR(A) = (1-d) + d(PR(t )/C(t ) + ... +1 1
PR(t )/C(t ))n n
Here, A = Current Page,t ….t = pages linking to A,1 n
PR(X) = PageRank of page X,
C(X) = Number of outbound links from
page X,
d = dampening factor.
In simple words, this means:· If a page has a large number of
pages linking to it, it gets ahigher rank: This is the basic
criteria of PageRank. If only thiscriterion was applied anyonecould have increased thePageRank of their webpage but
just paying to put up their links onas many websites as possible. ButGoogle is not fooled as easily.· If a page is linked to by a page
which itself has a high PageRank,it gets a higher rank: This ensuresthat pages recommended by siteswhich are well known, get betterPageRank.· If a page is linked to by a pagewhich does not have links to a lot
of other pages, it gets a higherrank: This ensures that no pagegets a higher rank just by havingits links in otherwise empty sites.If a page is listed in a Link Farm (awebsite which has no real content
of its own but only holds links toother websites), it is penalized bya decrease in its PageRank.
user. The trick is therefore to sortthe results correctly. This is exactlywhat PageRank does and does itvery well.
PageRank implements aranking method that no othersearch engine had thought of
before it. Basically, it determineshow good a page is by the numberof web pages linking to it. Thatmeans, if a certain webpage has alarge number of websites givinglinks to it, it will be ranked higher.This logic is based on simplecommon sense that if a page islinked to more, it must be morepopular and therefore morerelevant. Though this is the major
criteria PageRank uses, it isdefinitely not the only one. Theactual algorithm used by Google
1.How
Google googles?-Sujay Narsale
B.E.(Computers)
March 2010 CACHE
Contributed Articles
I N T
T E C H T A
M E N
CSI-SAKEC
15
8/9/2019 Cache Csi Sakec Magazine
http://slidepdf.com/reader/full/cache-csi-sakec-magazine 23/40
Apart from incominglinks described above, otherfactors determining a PageRankare:· The frequency and location of
keywords within the Web page: If the keyword only appears oncewithin the body of a page, it willreceive a low score for thatkeyword. Also PageRank takesi n t o a c c o u n t o t h e rcharacteristics such as thefont size of the keyword,title, file name, directoryname, etc to make sure thatthe keyword's importance
in the page is properlyknown.· How long the Web page
has existed: People createnew Web pages every day,and not all of them stickaround for long. Googleplaces more value on pageswith an established history.· Domain in which the
page exists: Some popular
domains get higher priorityautomatically since the useris most likely to be lookingfor results from them.
Though until now, itseems that Google has found aperfect, impartial and efficientalgorithm, it has its share ofdetractors. Google claims that itsPageRank algorithm is based onthe democratic nature of the Webwhere links equal to votes. ButPageRank's detractors point outthat:· In PageRank, rich people getmore votes than poor people, or,
in web terms, pages with higherPageRank have their votes
weighted more than the votesfrom lower pages.· Most sites have hundreds ofpages but the majority of linkscome to their home pages. This
means that the deeper pages in asite which have the most amountof information get very lowPageRank, while the home pagegets a disproportionately highrank.
· Also, Google decides how muchof a site to crawl depending on itsPageRank. This means that siteswith an average PageRank do notget their entire site indexed. This
further reduces their chances ofever improving their PageRankas Google does not bother to lookthrough it entirely.
D e s p i t e t h e s ehitches, the greatestproof that PageRankworks is its popularityitself. If it did not giveuseful results then it
would never havem o v e d o u t o f i t sfounders' garage. Also,Google has continued totweak its algorithmover time to iron out itsshortcomings. So muchso that, many believethe original PageRanknow plays on ly asubordinate role inordering of the results.The current algorithm isthought to focus moreo n t h e k e y w o r dcharacteristics. But with
Google keeping the actualalgorithm completely hidden(with good reason), we maynever completely understandhow Google googles.
March 2010CACHE
Quick PC Shut down
· Press Ctrl+ Esc key or the Win key and press 'U' two times
· Win+ M to minimize all windows and then Alt+F4 to bring the Turn Off computer dialog.
· Open Windows Task manager (Alt+ Ctrl+ Del) and choose Shut down from the menu. Useful when the
windows are not responding.
Contributed Articles
I N M E
T E C H T A
N T
CSI-SAKEC
16
8/9/2019 Cache Csi Sakec Magazine
http://slidepdf.com/reader/full/cache-csi-sakec-magazine 24/40
Jugal Thakker
B.E.(Computer)
The term 'hacking' sounds
interesting to today's geeky
generation. So how many of us
know what hacking actually is?
How many know what the
purpose of hacking is? Let's
together try to recognize thesequeries.
To know who or what a
hacker is, we shall first see, what a
hacker is not? First and foremost
a hacker IS NOT A CRIMINAL!
Hackers are neither the ones who
break the laws nor do they steal
credit card information. Likewise
hackers don't belong to the breed
of people who release viruses on
the internet. Interestingly, a
hacker may not always be a
computer wizard. All the above
descriptions that are seemingly
familiar to the definition of a
hacker are nothing more than a
m i s c o n c e p t i o n a n d a
misconstruction of the mass
media and people.
So, who is a hacker? Most
of the hackers have these very
i n t e r e s t i n g q u a l i t i e s a n d
characteristics. He likes to think
out of the box. Everything he tries
to do is with the aim of testing his
own limits! He always wants to
achieve things that so far people
h a v e c o n s i d e r e d t o b e
unachievable or impossible. He
will, almost always, want to try
out things that are not written in
the manual or the rule book. The
most important ingredient that a
hacker has is unlimited curiosity.
He constantly thrives to discover
unknown features, characteristics,
tips and tricks. A hacker has to be
dedicated to knowledge and
research in his field. He also is
highly creative and innovative.All these traits are necessity for
being a hacker. After knowing this,
it's not bizarre to term the greats
of Newton, Einstein and Edison
as hackers. These were the real
hackers who did things beyond
the average person's aptitude;
they flourished to challenge andstretch the limits.
A hacker today, is by and
large associated with computers
and computer security. The
individualities that you need to
have to become a modern-day-
hacker are:- You need to excel in
computer security. You need to
know at least one programming
language, which more often than
not is, C++. You essentially have to
be networking guru, you must
know how the internet works,
how the computers communicate,
and should know the in and out of
networking concepts and rules.
Moreover to be good hacker, you
need to have the basics of UNIX,
since all good security expertswill encounter UNIX at some time.
Most appropriately to catch a
criminal you need to become one,
hence, a hacking attitude , which
is to have criminal or a crooked
mind, is a prerequisite.
Let us have a look at the
following good real world
analogy to hacking. Assume the
ultimate goal is breaking into a
safe (the safe is a database, a
password file, confidential
records or whatever). The safe is
located inside of a physical
building (the computer that hosts
the data). The building is located
inside a town (the computer is
connected to a network). There is
a path/highway leading to the
town and the path connects the
town to other towns and/or cities
(read Internet/Intranet). The
town/city is protected by a
tollgate or an inspection point (the
network is protected by a firewall,
screening router etc.) There might
be certain residents (the police) in
the town looking for suspicious
activity, and reporting it to the
town's mayor (the police reports
attacks to the sysadmin) .
Buildings have their own
protection methods, locks &
2.‘Ethical’
Hacking!
White hat hackers
have prior
permissions from
the administratorto exploit the
loopholes!
March 2010 CACHE
Contributed Articles
I N T
T E C H T A
M E N
CSI-SAKEC
17
8/9/2019 Cache Csi Sakec Magazine
http://slidepdf.com/reader/full/cache-csi-sakec-magazine 25/40
chains, and access doors (on-host
firewalling, TCP wrappers,
usernames and passwords).
T h e m o t i v e b e h i n d
hacking is what separates the
good guys from the bad ones. The
ones with a positive aim forhacking are termed as 'white hat
hackers' and the bad guys are the
'black hat hackers'. Understandably
the white-hats follow a set of rules
or ethics while exploiting a given
system hence they are also known
as ethical hackers. Ethics is
defined as 'the discipline dealing
with what is good and bad and
with moral duty and obligation'.More simply, one could say it is
the study of what is right to do in a
given situation. Whereas the only
ethic the black-hats follow is to
break into the system regardless
of the security measures that are
taken to stop them from doing
that very task, of hacking. The
term hacking implies only to
breaking into a system. Thekeyword here is, 'only'. That is, a
hacker, irrespective of the clan
that they belong to, aims only for
getting into the so called secure
network, but does not cause any
harm in terms of data loss or
stealing. So when people say that,
“my email account was hacked”,
they are actually wrong, because
of a fallacy in the usage of the term
hacker. It's is not the hackers who
cause harm, but they are the
'crackers'.
You may ask, s incehackers don't pose any harm, why
are there blacks and whites? The
white hat hackers have prior
p e r m i s s i o n s f r o m t h e
administrator to exploit the
loopholes into their application.
This exploitation brings out the
security issues with the system,
and hence, helps in creating a
much more secure application
and thus making ethical hackers
as ' friends of developers'. The black
hat hackers don't have any such
p e r m i s s i o n . U n l i k e t h e i r
counterparts, the black hat
hackers don't report the loopholes
to the owners. But, in almost all
c a s e s t h e s e s e c u r i t y
vulnerabilities are brought to the
notice of crackers, who in turn use
it to steal or destroy data.
Consequently black hat hackers
are ' friends of crackers'. To begin
their journey to be deemed as
ethical, they are officially hired by
the companies, wherein theyperform penetration tests onto the
systems that the company builds.
A penetration test is basically
breaking into the network and
hence finding weak points in the
system. These weak points are not
exploited by them, but instead
like innocent good boys are
reported to the owners. The
system admins improve on thesevulnerabilities.
So, all the to-be-hackers
reading this, decide upon what
ethics you plan to follow, what
kind of a hacker you aim to be,
and decided for yourself whether
you fall into the elite group of
'ethical hackers'.
March 2010CACHE
Contributed Articles
I N M E
T E C H T A
N T
CSI-SAKEC
18
Google Search Made EASY
§ Site-specific. Use site: operator to search only within a certain website.[site: dumbl ittleman
§ File types. If you just want to search for .PDF files, or Word documents, or Excel spreadsheets,
for example, use the f ile type: operator.
§ Answer to l ife, the universe, and everything. Search for that phrase, in lower case.
§ Intitle: at the beginning of a query word or phrase (intitle:"Three Blind Mice") restricts your
search results to just the titles of Web pages.§ Intext: searches only the body text, ignoring titles, l inks, and so forth. Intent: is perfect when
what you're searching for might commonly appear in URLs.
8/9/2019 Cache Csi Sakec Magazine
http://slidepdf.com/reader/full/cache-csi-sakec-magazine 26/40
Anilkumar PandaT.E.(I.T.)
Dhaval Savla
T.E.(computers)
The foundations of
The nextgeneration of
computing… A world
where the network isthe platform for
all Computing…
the concept of cloud computing
was present long ago it is poised
to take off now. But the question is
what is cloud computing?
CLOUD COMPUTING
refers to both the applications
delivered as services over theInternet and the Hardware and
s y s t e m s s o f t w a r e i n t h e
datacenters that provide those
services. It delivers higher
efficiency, massive scalability, and
f a s t e r , e a s i e r s o f t w a r e
development. special kind of
software called middleware.
In cloud computing your
data is present on your machine but on a remote server of the
company providing you the
s e r vice. In order to access your
data you just need to install the
middleware software that will
connect you to the cloud when
needed and you can use the entire
services in the cloud (the net or
the remote server) as per your
requirement).
The basic technologies for
cloud computing such as
horizontal scaling, distributed
computing nodes, virtualization
have been available for some time.
Virtualization the abstraction of
computer resources is the
cornerstone technology for all
c l o u d a r c h i t e c t u r e s .
Virtualization allows servers,
storage devices, and other
hardware to be treated as a pool of
resources rather than discrete
systems, so that these resources
can be allocated on demand.
T e c h n i q u e s s u c h a s
paravirtualization which allows
a single server to be treated as
multiple virtual servers, and
clustering which allows multiple
servers to be treated as a single
server.
cloud computingsystem , consists two sections: thefront end and the back end. Theyconnect to each other through anetwork, usually the Internet .The
front end is the client's computerand the applications required to
access the cloud computingsystem. On the back end of thes y s t e m a r e t h e v a r i o u s
computers, servers and datastorage systems that create the"cloud" of computing services.Each application will have its owndedicated server. Central servera d m i n i s t e r s t h e s y s t e m ,monitoring traffic and clientdemands to ensure everything
A
March 2010 CACHE
The other day I was
talking to one of my friend
regarding his graphics project. He
was complaining about his slow
processor and other hardware
constraints which severely
hampered the development andtesting of his project . .Jokingly he
asked me if he could get a faster
processor or bigger RAM for his
system on lease (since he could
n o t a f f o r d t o b u y t h e m
instantly)…so that he would use
them only while working on his
project and return them once not
needed. I suggested him to go to
the CLOUD. His problem is
similar to most of the small and
medium businesses (SMBs) as
well as traditional enterprises in
verticals such as banking,
financial services and insurance
(BFSI), and manufacturing.
These companies have a specific
IT requirement but need to invest
a considerable amount of their
resources in acquiring and
maintaining the software and
hardware for the company. Also
sometimes they may require a
particular hardware or software
which may be costly so they either
have to find an alternate way out
or use the resources of some other
company which delays the
development of the project. The
solution is a revolutionary
c o n c e p t c a l l e d C L O U D
COMPUTING [CC] . Although
Contributed Articles
3.Cloud
Computing I N T
T E C H T A
M E N
CSI-SAKEC
19
8/9/2019 Cache Csi Sakec Magazine
http://slidepdf.com/reader/full/cache-csi-sakec-magazine 27/40
runs smoothly. It followsprotocols and uses a Middlewaret h a t a l l o w s n e t w o r k e dcomputers to communicate witheach other.
C l o u d C o m p u t i n g
provides the following threetypes of services:
1. Software as a Service (SaaS):
S a a S p r o v i d e s c o m p l e t e
application as a service to the
c l i e n t s o n d e m a n d v i a
p a r a v i r t u a l i z a t i o n .
E.g.:Salesforce.com2 . P l a t f o r m a s a S e r v i c e(PaaS):PaaS offerings can providefor every phase of software
development and testing. Eg:Google App Engine.3. Infrastructure as a Service(IaaS): Servers, storage systems,switches, routers, and othersystems are pooled (throughvirtualization technology, forexample) to handle specific typesof workloads from batchprocessing to server/storageaugmentation during peak loadsover the network. E.g.: AmazonWeb Services, Joyent.
Major advantages ofcloud computing are:1. It could bring hardware and
maintenance costs down. CCsystems give easy access to
software..
2. Scalability via dynamic ("on-
demand") allocation of resources
on a, self-service basis without
Fig 1: Cloud Computing Architecture
users having to worry for peak
loads.
3. Batch processing can help
analyze blocks of terabytes of
data simultaneously saving
server hours.
4. Reliability is improved
through the use of multiple
redundant sites, which makes
cloud computing suitable for
business continuity and disaster
recovery.
Thus, CC ushers in a new
level of efficiency and economy in
delivering IT resources on
demand and thus creates new
market opportunit ies and
business models.
March 2010CACHE
Contributed Articles
I N M E
T E C H T A
N T
CSI-SAKEC
Know the RUN commands...
· Calc --Calculator · Osk -- to access on screen keyboard· Ping --Sends data to a specified host/IP· Control --Displays Control Panel·Sysedit -- Edit system startup files· Hostname --Returns Computer's name·Taskmgr --Task manager
· Logoff -- to logoff the computer · WinWord -- to open Microsoft word
· Nslookup--Returns your local DNS server · Write -- Used to open WordPad
20
8/9/2019 Cache Csi Sakec Magazine
http://slidepdf.com/reader/full/cache-csi-sakec-magazine 28/40
4.CRYPTOGRAPHY Rushabh Pasad
T.E. (I.T.)
C r y p t o g r a p h y i s a
technique used to hide the
meaning of a message. It is
derived from the Greek word
kryptos (hidden). This is different
from steganograhic techniques. In
cryptography one is not hidingthe actual message, only the
meaning of the message. If a
message were to fall into the
hands of the wrong person,
cryptography should ensure that
that message could not be read.
Typically the sender and receiver
agree upon a message scrambling
protocol beforehand and agree
upon methods for encrypting and
decrypting messages. Thus
Cryptography can be defined as
the science of encrypting and
decrypting messages.
In Cryptography the
message to be encrypted is
referred as plain text while the
encrypted message is referred as
cipher text.
FIRST CIPHER
The first cipher was made
by Julius Caesar who used it to
communicate with his generals. It
is named 'Caesar Box' after the
c r e a t o r .
The system goes as follows:
First select a message to be
encrypted. Make sure the length
of the characters your message is a
p e r f e c t s q u a r e.
For example: "CAESAR BOX"
Write it in a square grid (here, 3*3
g r i d )
C A E
S A R
B O X
Now read it horizontally....
The encrypted message shall be
CSBAAOERX.
ENIGMA
The need to encrypt
messages appeared at the end of
World War I (although encryption
techniques had already existed
for a long time).
It was a Dutchman living in
Germany, Dr. Arthur Scherbius ,
who developed the Enigma
m a c h i n e f o r c o m m e r c i a l
purposes; this machine was used
to encode mes s ages . The
machine's price at the time
(equivalent to 30,000 euros today)
made it a miserable failure.
Codes that can be used
Concealing secret messages
For example:
CALL
Can Alter Lavender Laces.
Or we can use transposition or
substitution system or both under
cipher system.
You can either re-arrange letters in a
pre-planned pattern or realign letters
of alphabet.
For Instance,
The quick brown fox jumps over the
lazy dog.
Would read
Eht kciuq nworb xof spmuj revo eht
yzal god.
This can be easily encoded.
Monoalphabetic Substitution
A m o n o a l p h a b e t i c
substitution is one where a letter
of plaintext always produces the
same letter of ciphertext. This
cryptographic technique is used
very extensively nowadays
The operation is very
similar to the Caesar Cipher, with
the exception that the cipher
alphabet does not have the order
which it had in the previous
examples (which are just special
c a s e s o f m o n o a l p h a b e t i c
substitutions). An example of a
monoalphabetic substitution is
s h o w n b e l o w .
March 2010 CACHE
Contributed Articles
I N T
T E C H T A
M E N
CSI-SAKEC
21
8/9/2019 Cache Csi Sakec Magazine
http://slidepdf.com/reader/full/cache-csi-sakec-magazine 29/40
One may naïvely think
that this cipher is secure, after all26there are 26! (approx. 4 x 10 )
different cipher alphabets to
choose from, however the letter
frequencies and underlying
patterns will be unchanged - andas such the cipher can be solved
by pen and paper techniques.
These more advanced techniques
include looking systematically at
the position of letters in words in
order to identify vowels, pattern
words, and looking at the letter
frequencies, though common
pairings (TH, HE etc.) may come
up.T h e m o s t c o m m o n
English letters are ETAIN... It is
highly l ikely that in any
ciphertext, we have some matches
- though it is not a certainty. It
should also be noted that the most
commontrigraph (three letter
sequence) in English is 'THE'.
PC-Bar CodeIf you look in your
refrigerator or pantry, you will
find that just about every package
you see has a UPC bar code
printed on it. In fact, nearly everyitem that you purchase from a
grocery store, department store
and mass merchandiser has a
UPC bar code on it somewhere.
Have you ever wondered where
these codes come from and whatthey mean?
" U P C " s t a n d s f o r
Universal Product Code. UPC
bar codes were originally created
to help grocery stores speed up
the checkout process and keep
better track of inventory, but the
system quickly spread to all other
retail products because it was so
successful.A standard UPC code has
12 digits . First 6 are the
Manufacturer Identification
Number, next 5 digits are the item
code and the last digit is the check
digit.
C r y p t o g r a p h y i s
emerging as a very important tool
in the field of security today. With
security becoming a very
important field in the world of
today, cryptography is beingcatapulted into the limelight
together with other methods of
security. Indeed cryptography is
one of the first lines of defense
against hackers and crackers in
today's world. .
March 2010CACHE
Contributed Articles
I N M E
T E C H T A
N T
CSI-SAKEC
Open up an Administrative level Command Prompt :
C:\>taskl ist ....(to see all of the running processes)
Image Name PID Session Name Mem Usage
=========== === ============ ==========
notepad.exe 25304 Console 5,852 K
to kill the notepad process run:
C:\>Taskkill /IM notepad.exe /F
or
C:\>Taskkill /PID 25304 /F (only the specific instane of firefox will be terminated. )
The /F flag is kills the process forcefully.
Kill Processes from Command Prompt!!!
22
8/9/2019 Cache Csi Sakec Magazine
http://slidepdf.com/reader/full/cache-csi-sakec-magazine 30/40
1.How do you go
about the preliminarypreparations? Which subjects
should be brushed up before
the interview?
3.How important is
it to have knowledge ofcurrent affairs and business
news? How to remain abreast
with it?
4.How to crack the aptitude
test and how to prepare for
the same?
6.How to cope up with
nervousness and tension
inside the interview room?
Ans: Before going for an
interview one should brush up
all programming languages
that one has mentioned in their
resume. Being acquainted withthe basic concepts of
engineering subjects is a
prerequisite.
Ans: Business updates are
essential for Group
Discussion rounds and HR
interview. To be abreast with it
one can refer Business Today,The Analyst, mint or even
Economic Times. You can also
subscribe to online portals like
SiliconIndia.com.
Ans: To crack the aptitude test
one should have clear
concepts of secondary school
mathematics. Vocabulary is
another important aspect in
clearing aptitude tests. One
can solve a few aptitude test
papers to get a hands-on
practice and also an ideaabout how to
tackle such tests.
Ans: Inside the interview room
try to stay calm and composed.
It is human tendency to feel
nervous but show confidence in
your abilities and try to
establish eye contact with the
interviewer. Also be specific
while answering the questions,don't provide any vague or
hypothetical information.
An Interview is the
last stage in placement process, one cannot afford to
leave anything to chance. Face to Facegives an insight into the interview process and
reveals how one can emerge from the gruelingPlacement Interviews.This article has been written with the
help of excerpts from the interviews of Anish Venugopal, SashankShah, Sagar Gupta, Akshay Rao, graduates from SAKEC.
2. Does the
experience of working in astudent organization help in
any way while giving the
interview?
Ans: Working in a student
organization adds an edge to
your Resume. It inculcates basic
qualities that one needs to
survive in corporate
world like it improves your
communication skills,
confidence level, teaches you
how to be a team player ,how to
co-ordinate in a group and
makes you a better manager.
5. Can you give some tips on
the Group Discussion round?
Ans: In GD it is important to
speak sense. It is also about
listening to others and coming
to a common conclusion at the
end. One should understand
the topic well and try to note
down the punching points.
If one can direct the
discussion, nothing like it, else
have regular and effective
contributions.
March 2010 CACHE
How to crack an interview...
A E T O A C E
F C F
CSI-SAKEC
23
8/9/2019 Cache Csi Sakec Magazine
http://slidepdf.com/reader/full/cache-csi-sakec-magazine 31/40
Ans: This is the easiest question
of the interview and hence onecan impress the interviewer
here. Learn a little bit of the
company and ask some
question related to work or the
company's background. This
will show your interest towards
working in that specific
company. Its too early to ask
about salary, vacation, etc. so
Skip such questions.
7. Mention some questions
that the interviewee can
ask the interviewer
Sharpen your wit!!!
Try to answer the following
frequently asked interview
questions.
1. What are your salaryexpectations?
2. What can you do for this
company?
3. How are you different from
others who have been
interviewed?
4. What is the color of the wall
behind you?(you haven’t noticed
the color when you entered)
5. How many steps have youclimbed up?
6. Why are you wearing such
color coordinated clothes?
7. How will you move mount
Fuji?
8. How it is possible to place
four points that are equidistance
from each other?
9. You have to draw three
concentric circles with a linepassing through their center
without lifting hand.
10. You are given a cake; one of
its corner is broken. How will u
cut the rest into
two equal parts? (Note: Answers to these
questions are given on
Page 31 . )
Ans: It is very important to take
note of what not to do in an
interview as this can prevent one
from making any major blunders
or mistakes. One should not rush
to the person who has already
been interviewed. Try to besimple and straightforward
.Politely apologize if you make
any mistake.Also don't fumble
or panic, be yourself and
maintain your confidence.
10.What not to do at an
interview?
Ans: Such questions test the
smartness and confidence of the
interviewee so don't avoid them.
One should answer such
questions to the best of one's
ability and understanding.
Never say anything negative
about yourself. Whateverquestion is posed make sure you
give a positive spin to your
answer. This is especially true
regarding question about things
you have mentioned as your
weaknesses. Whatever weakness
you may have listed, make sure
you can justify how you have
tried to work on your weakness
and that you have achievedsome progress.
8. How much do
extra and co curricular
activities count?
Ans: Activities related to career
and profession matter at the time
of interview. Working on some
projects or doing internships can
help in grabbing the top-notch job. Also participating in
Technical festival of various
colleges can add a
point in the resume.
9. How
important is your academic
performance?
Ans: Academic performance
helps in clearing the criteria for
many companies, apart from
giving a boost to one’s
confidence before the
recruitment process, recruiters
have a tendency to look for
people with better percentages.
But having practical knowledge
and real-world skills are moreimportant.
11. How to
handle tricky and weirdquestions?
March 2010CACHE
How to crack an interview...
F
F AC E T O AC E
CSI-SAKEC
24
8/9/2019 Cache Csi Sakec Magazine
http://slidepdf.com/reader/full/cache-csi-sakec-magazine 32/40
March 2010 CACHE
B o r e d o f t h e
common hour hand- minutehand clock display, dream of environ-
friendly comp... Nowdays there are gadgetsthat solve every query, every whim of the
consumer. TECH-TRENDZ brings to you a plethora of gadgets-from the ‘currently hot’ ones to the ‘soon to be
releasing ones....’
Acquaint yourself with gizmos...
E T C H - T R E N D Z !
CSI-SAKEC
25
8/9/2019 Cache Csi Sakec Magazine
http://slidepdf.com/reader/full/cache-csi-sakec-magazine 33/40
March 2010CACHE
Acquaint yourself with gizmos...
T C H T
E !
E - R
N D Z
CSI-SAKEC
26
8/9/2019 Cache Csi Sakec Magazine
http://slidepdf.com/reader/full/cache-csi-sakec-magazine 34/40
CROSS-QUOTIENT
Across1. Keeping track of links to content.2. Search retrieving matches for partially/misspelled
words.5. Evolving protocol for syndication & sharing of
contents.7. Optimizing website to get better results in search
engine.8. Small text string stored on user's comp by a web
browser.10. Favorite language of CGI programmers.11. n/w of educational sites separate from the Internet.12. Program that prowls internet for publicly accessible
resources.15. s/w tool for locating people on other Internet sites.17. Tool to test whether a host is reachable across an IP
n/w.
23. Standard protocol for email retrieval.24. Link between pages in a website.25. Location on which a website is placed.
26. Synonym for cyber piracy.27. Main trunk connections of the Internet.29. Provide client station with access to shared resourceson n/w.31. Device that forwards data packets between n/w.33. One who attempts to gain infamy in chats or onforums?34. Unique visitor to the site from a campaign source.
35. Listing given by search engine in response tokeyword inquiry.
Down1. Communication protocols used to connect host to the
Internet.2. A fiber optic n/w transmitting data at 100 mbps.3. Act of sending unsolicited bulk emails.4. A http server& open source application.6. Web service that combines two or more tools to create
a new service.7. Java server side module.8. A hacker.9. A freeware browser.13. Equivalent to 'Favorites' of Internet Explorer.14. Program used to view HTML documents.16. s/w monitoring activities of user while he/she
navigates the Internet.18. One who searches the Internet for references of
himself?19. Etiquettes on the Internet.20. A message or a message fragment.21. An online dairy of journal.22. Site, an exact copy of the Internet site.27. Unit of data transmission speed.28. Method of moving caffeine across WANs.
30. Abbr, serial line Internet protocol.32. A family of wed feed formats.
March 2010 CACHE
Check your fun-quotient... CSI-SAKEC
27
8/9/2019 Cache Csi Sakec Magazine
http://slidepdf.com/reader/full/cache-csi-sakec-magazine 35/40
UPLIFT
YOURIQ
1.A man builds a house rectangular in
shape. All sides have southern
exposure. A big bear walks by,
what color is the bear? Why?
2.The day before yesterday I was 25 and the
next year I will be 28. This is true only one
day in a year. What day is my birthday?
3. Using the given programming language,
the following words have their equivalents
next to them, what should FOX be?
CLICK = 100501100K
MILK = 1000150KLOG = 50OG
LIFE = 501FE
ALIVE = A5015E
FOX = ==?==
4.What word is represented by this
arrangement of letters?
HROOOBD
5.What number comes next in this sequence:
1 23 124 1251 26127 128129 ==?==
6.Name an ancient invention, which is still
used in some parts of the world today, that
allows people to see through walls.
What can this be?
7.This is a number crossword puzzle. Enter
one numeral character into each square. The
clue consists of mathematical operations.
(e. g. "D.6 x 3" means, that the number you
are looking for is three times bigger than
number D.6).
CLUES
Across:A.1 = D.6 x 3
A.4 = A.7 x A.7
A.5 = (D.3 x 7) - 1A.6 = A.1 + A.5
A.7 = D.3
Down:D.1 = ?
D.2 = A.7 x 6
D.3 = D.6 + 6
D.4 = A.4 - 210
D.6 = (D.2 + 9) x 1/7
March 2010CACHE
Check your fun-quotient...CSI-SAKEC
(Note: Answers to these questions are given on page 31 . )
28
8/9/2019 Cache Csi Sakec Magazine
http://slidepdf.com/reader/full/cache-csi-sakec-magazine 36/40
C S I - S A K E C h a s b e e ni n s t r u m e n t a l i n c o n d u c t i n g
competitions enabling students stretch theirlimits and apply their knowledge.We take this
opportunity to congratulate the: 'Winners(2007-2009).’
March 2010 CACHE
Abhishek Mehta
1st position
Zeal
Lithin Thomas
1st position (Zodiac)
Eureka
Pankaj Savla
1st position (Zodiac)
Eureka
Piyush Upadhay
1st position
Flash & dreamweaver
Chandrakant Deshmukh2nd position tie
Flash & dreamweaver
Nikit Vora
2nd position tie
Flash & dreamweaver
Bharat Vishwakarma2nd position (DishitaBharat)
Eureka
Dishita Trivedi
2nd position (DishitaBharat)
Eureka
Winners of CSI-SAKEC events
T A L E N T
E D A C H
I E V E R
S
CSI-SAKEC
29
8/9/2019 Cache Csi Sakec Magazine
http://slidepdf.com/reader/full/cache-csi-sakec-magazine 37/40
Viral Vira
1st position
Virtual DJ 1
Bhavi Savla2nd position
Virtual DJ 1
Sudatta C
3rd position
Virtual DJ 1
Anand biswas
1st position
Virtual DJ 2
Prasad Parawadi
2nd position
Virtual DJ 2
Shruti Narain
3rd positionVirtual DJ 2
Sagar Dedhia1st position (Maverick)
iDeveloper
Jithin T K
1st position (Maverick)
iDeveloper
Saurabh Raje
2nd position (CodeMasters)
iDeveloper
Suyash Pavanoji
2nd position (CodeMasters)
iDeveloper
March 2010CACHE
People succeed at everything
if they enjoy doing it.
Winners of CSI-SAKEC events
L N
A
R
T AE
T E D C H I E V
E S
CSI-SAKEC
30
8/9/2019 Cache Csi Sakec Magazine
http://slidepdf.com/reader/full/cache-csi-sakec-magazine 38/40
CROSS- QUIOTENT
UPLIFT YOUR IQ1. The bear is white since the house is built othe
North Pole.
2. He was born on December 31st and spoke
about it on January 1st.
3. FO10: where Roman numerals exist they are
replaced by their modern equivalents, V = 5,X = 10, L = 50 etc.
4. Robin Hood.
5.1301311: The sequence 123, 124, 125, 126, 127,
etc. has been broken into chunks of 1, 2, 3, 4 etc.
6. A window!
7. A1=135 D1=1651
A4=2601 D2=306
A5=356 D3=51
A6=491 D4=2391
A7=51 D6=45
SHARPEN
YOUR WIT!!
1.The best that company can offer based on my
qualification and my capability.
2.With my hard work and dedication, I would like tocontribute my bit for the company which would take
it to new heights.
3.I don't know the others so I cannot tell you the
difference but I can tell you that I have a curious mind
which also loves to accept challenges and due to its
curiosity it learns more.
4.It is the same as the wall in front of you.
5.I wish to climb even more steps in my life than I
have just climbed(Assuming that I have no idea)
6.Because I feel comfortable in this pair, makes melook good.
7.An ideal response would be to break the question
down, and try solving it in stages. First, you'd have to
estimate the amount of material to be moved, so pick
hypothetical numbers for density of the soil and the
height of Mount Fuji (you'd get extra points for
knowing that information), and use the formula for
volume of a cone to calculate the volume of material.
Extrapolate that to get the mass of material to be
moved. Finally, tackle the actual transport part:estimate that a backhoe can excavate x tons per day,
and a truck can move y tons per trip. Assume z hours
per day and so on.
8. Only 3 points can be equidistant from each other.
But if one places points in the shape of a pyramid
then its possible to place four points at equal distance
from each other.
9.Start the line complete one circle move inside
circles along the line and then draw second circle.
Like wise rest.10. Slice the cake!
March 2010 CACHE
Help corner CSI-SAKEC
31
8/9/2019 Cache Csi Sakec Magazine
http://slidepdf.com/reader/full/cache-csi-sakec-magazine 39/40
CSI-SAKEC
top related