insights on engineering and · pdf filemr. hitesh jangir dated: 26/11/16 34 22. technological...
TRANSCRIPT
Insights on Engineering and Technology
A Compendium on extracts of IFDP Session 2017
Editor
Ms. Jeetu Sharma
Insights on Engineering and
Technology
A Compendium on extracts of IFDP Session 2017
Editor
Ms. Jeetu Sharma
Assistant Professor, Department of Electronics & Communication Engineering
CET, Mody University of Science & Technology, Lakshmangarh, India
Contents
Preface viii
Acknowledgements
x
1. Orientation to IPR, Innovation & Entrepreneurship
Dr. Yogesh Misra Dated: 20/08/16
1
2. E-Governance
Mr. Pradeep Kumar Dated: 20/08/16
3
3. Pervasive Computing: Present Trend and Future
Mr. Kaushik Ghosh Dated: 27/08/16
5
4. Bhagwat Geeta: The Manual of Dharma
Dr. Dhananjay Mani Tripathi Dated: 27/08/16
7
5. Testing of Logic Circuits
Ms. Aditi Kajala Dated: 17/09/16
8
6. Internet of Things
Mr. Pinaki Ghosh Dated: 17/09/16
10
7. Sensors and its Applications
Ms. Ranjana Thalore Dated: 24/09/16
12
8. Energy is Synergy
Mr. G. Divya Deepak Dated: 24/09/16
14
9. Image Processing
Mr. Suneet Gupta Dated: 01/10/16
16
10. An Introduction to RADAR and LIDAR Remote Sensing
Dr. S. K. Jha Dated: 01/10/16
17
11. Smart City & India
Ms. Maumita Ghosh Dated: 08/10/16
18
12. Big Data in Everyday Life
Mr. Manish Kakhani Dated: 08/10/16
20
13. Harr Wavelet
Mr. Vaibhav Nema Dated: 15/10/16
22
14. Effect of Electromagnetic Radiation on Human Health
Dr. P. P. Bhattacharya Dated: 15/10/16
23
15. Computational Epidemiology - A Common Man's Perspective
Dr. A. Senthil Dated: 20/10/16
24
16. Project Proposals and Implementation
Dr. Ashok Khanna Dated: 20/10/16
25
17. Wireless Sensor Network
Dr. Manju Khurana Dated: 21/10/16
26
18. Challenges for Nano Scale MOSFETs and Promising Nano
Devices: Multigate/Nanowire Transistors
Mr. Gaurav Dhiman Dated: 05/11/16
28
19. Coordination Compounds and their Applications
Dr. Harlal Singh Dated: 05/11/16
30
20. Cyber Crime: A General Perspective
Mr. S. S. Verma Dated: 12/11/16
32
21. Dark Side of the Information
Mr. Hitesh Jangir Dated: 26/11/16
34
22. Technological Innovations - Past, Present & Future in Automotive
Industry
Mr. Vikrant Sharma Dated: 26/11/16
36
23. Hermatic Technology Transformer
Ms. Sunita Kumari Dated: 29/11/16
37
24. Innovations in Biomedical Engineering
Mr. Satyajit Anand Dated: 03/12/16
39
25. Indian Nuclear Power Program
Dr. N. K. Joshi Dated: 03/12/16
41
26. TQM in Technical Education
Dr. V. K. Jain Dated: 17/12/16
43
27. Information Security
Dr. Anil Kumar Dated: 07/01/17
45
28. Internal Combustion Engines
Mr. N. S. Baroule Dated: 14/01/17
47
29. The Benefits of Ethical Hacking
Mr. Niranjan Lal Dated: 14/01/17
48
30. Vedic Mathematics
Dr. Shamik Tiwari Dated: 28/01/17
50
31. Antenna for Mobile Communication
Ms. Purnima Sharma Dated: 07/03/17
51
32. Low Power VLSI Design: Challenges and Solutions
Ms. Anshu Gupta Dated: 07/03/17
53
33. E-Governance and You
Dr. Puneet Kumar Dated: 25/03/17
55
34. Quantum Computing Limit - Finite or Infinite
Mr. Nisheeth Saxena Dated: 25/03/17
56
35. ICT for Teaching & Learning
Mr. P. K. Bishnoi Dated: 25/03/17
57
36. Underwater Wireless Sensor Network
Mr. Vikas Raina Dated: 15/04/17
59
37. WSN in Smart Grid
Ms. Jeetu Sharma Dated: 15/04/17
61
38. Electronic in Security Systems
Ms. Suman Nehra Dated: 22/04/17
63
39. Machine Learning
Dr. S. K. Vasistha Dated: 22/04/17
64
40. Introduction to Engineering Materials
Mr. Atul Kumar Dated: 27/04/17
66
41. Bio Sensors
Ms. Suneetha Rikhari Dated: 28/04/17
67
42. Plagiarism
Ms. Shally Dated: 28/04/17
69
43. Green Building
Ms. Ritu Tak Dated: 29/04/17
71
44. E-Governance: Exploring the Unexplored
Mr. Somil Jain Dated: 29/04/17
73
45. Micro-Electro Mechanical System
Ms. Uma Nirmal Dated: 12/08/17
75
46. Data Mining using Weka
Mr. Shivam Pandey Dated: 19/08/17
77
47. The Pride of Rajasthan: Our Power Generation Plants
Dr. Sanjeev Patwa Dated: 26/08/17
79
48. Safety System in Nuclear Power Plant
Mr. Manish Kumar Dated: 02/09/17
80
49. Technology and Healthcare
Mr. Rajesh Yadav Dated: 02/09/17
82
50. VLSI Design
Ms. Shruti Suman Dated: 07/09/17
84
51. The World of Microwaves
Dr. Rajeev Pourush Dated: 07/09/17
86
52. Automation in Software Testing
Mr. Manmohan Sharma Dated: 07/09/17
88
53. Impact of E-waste in Global and Indian Scenario
Dr. Ajay Kumar Singh Dated: 08/09/17
90
54. Wireless Body Area Network
Mr. Deepak Sethi Dated: 08/09/17
92
55. Energy Storage
Mr. Thoudam Paras Kumar Dated: 16/09/17
94
56. Introduction to Gyroscope and its Effect
Mr. Mukul Kant Paliwal Dated: 16/09/17
96
57. Magnetic Levitation: Driving Without Wheels, Flying Without
Wings
Mr. P. K. Bhatt Dated: 23/09/17
98
58. Climate Smart Agriculture
Mr. Ajay Kumar Dated: 23/09/17
100
59. Distributed Computing
Dr. Vinod Maan Dated: 07/10/17
102
60. The Myth: “Deep Web and Dark Web are Same”
Dr. Uma Kumari Dated: 07/10/17
104
61. Engineering Education in India
Dr. Prateek Bhanti Dated: 25/11/17
106
62. Information Security: Quantum Cryptography
Dr. Anand Sharma Dated: 25/11/17
107
63. Peak Load Power Demand Management in India
Dr. Sudhir Y. Kumar Dated: 04/12/17
109
64. Big Data & Hadoop
Ms. Priyanka Dahiya Dated: 04/12/17
111
Coordinator Note 113
Preface
To embolden interdisciplinary knowledge and research that can be more easily adapted
into community initiatives to embellish life and nature is of prime importance. The
augmentation in interdisciplinary knowledge and skills of teachers as well as researchers
is very important to effectively contribute in the existent global scenario of research.
Interdisciplinary wisdom plays a vital role in the conduction of multidirectional quality
research.
The interdisciplinary approach to enlighten future students, educators and researchers is
very important as most influential discoveries of eminent researchers based on the
fundamental of the basic sciences were interdisciplinary. They incorporated
interdisciplinary research by making significant contributions across multiple disciplines.
College of Engineering and Technology, Mody University of Science & Technology,
Lakshmangarh, Rajasthan has initiated a new pursuit - “Internal Faculty Development
Program” from August 20, 2016 of Autumn Semester 2016-17 to enhance
interdisciplinary awareness of the faculty members. It is a systematic, comprehensive,
well-resourced effort to help us to learn and grow as an intellectual teaching community.
Faculty Development Programs (FDPs) are especially important in adapting faculty
members to their changing roles in initiating and setting the directions for curricular
changes. These programs can be a powerful tool to constitute a positive institutional
climate and can range from basic orientation programs for new faculty members to expert
deliberating on latest topics.
The aim of this program is to support educators in adapting to changing missions of
teaching and to enhance the efficiency and performance of their teaching skills while
improving work satisfaction and teaching confidence by developing good teachers. The
topics of presentation are general and evolving like Cloud Computing, E-Governance,
Data Mining, Internet of Things and many more. The presentations of any two faculty
members are organized during 3:00 PM to 4:00 PM normally on each working Saturday.
This compendium consists of the abstract of the 65 presentations made by the faculty
members of College of Engineering and Technology during August 2016 till December
2017. The contribution of faculty members is commendable and it will be a milestone in
the enhancement of interdisciplinary wisdom.
Acknowledgements
The subsistence of this compendium ought to the contribution of distinguished
administrators, eminent faculty members of College of Engineering and Technology and
many more persons that we can summon here. There are, withal, those to whom we wish
to proffer our special thanks.
It is a moment of elation to present a compendium on Internal Faculty Development
Program 2016-17. It would not have been possible without the support of many people
from Mody University of Science and Technology to whom we owe a great deal. No
work, however big or small, is ever been complete without the contribution of others. It
would be a great pleasure to write a few words, which would although not suffice as the
acknowledgements of this long cherished effort, but in the absence of which this
compendium would necessarily be incomplete. So, these words of acknowledgement
come as a small gesture of gratitude towards all those people, without whom the
successful completion of this program would not have been possible.
Foremost, I would like to express my deepest gratitude to esteemed personality Shri
R. P. Mody, Chairman and Founder, Mody University of Science and Technology,
Lakshmangarh, Rajasthan, India. I am greatly indebted to him for his valuable advice and
moral support during the organization of this significant program for the enhancement of
our interdisciplinary knowledge. I am also grateful for his benign grace and blessings for
the completion of this compendium.
I would like to sincerely thank Shri S. S. Bhuwania, Board of Management, Mody
University of Science & Technology, Lakshmangarh, Rajasthan, India for his valuable
encouragement.
I am extremely grateful to Prof. (Dr.) Suresh Advani, President, Mody University
of Science & Technology, Lakshmangarh, Rajasthan, India. Needless to mention that
without his valuable guidance and constant encouragement, this program would not have
been completed. We are highly obliged to him for providing the essential resources and
healthy environment to complete this compendium.
The words are not enough to thank Dr. V. K. Jain, Dean, CET, Mody University of
Science & Technology, Lakshmangarh, Rajasthan, India. IFDP has originated from his
sheer knowledge, versatile approach and belief in interdisciplinary wisdom. I would like
to pay my highest gratitude to him for his guidance, support and cooperation.
My thanks and regards are also due to all those whom I have unintentionally
repressed to mention their names that have helped me directly or indirectly throughout
this endeavor.
Editor
Jeetu Sharma
1
Orientation to IPR, Innovation & Entrepreneurship
Dr. Yogesh Misra
Assistant Professor, ECE Dept., CET, MUST
The presentation elaborates about the
existing body of work on innovation
policy seemed to have neglected to
adequately address the role of
intellectual property in innovation
policy making. Intellectual Property
Rights (IPRs) help to interpret how the
features and practices of IPRs interact
with the public presentation of
innovation policy measures. Those
responsible for supporting IPRs
regimes and practices throughout the
world, especially in developing countries with their need to attract foreign competencies
and move from imitation to innovation, need to realize how strong IPRs regimes and their
appropriate use of innovation policies are.
Dr. Yogesh Misra elucidated the important terms such as Copyright, Layout Design of IC,
Geographical Indication, Trade Mark and Patentused in IPRs with appropriate examples
supported by pictures and videos. He has efficaciously presented few success stories of
the renowned entrepreneurs who have established, successful companies such as Lizzat
Papad, herbal beauty products by Shahnaz Husain, Infosys, Shaadi.com, Dabbawala,
Nirma etc.
Finally, he showed examples of some innovations with registered patents.
The speaker asked few questions during his presentation such as:
• What prompts a person to become an entrepreneur?
• Does motivation to become an entrepreneur is different in male and female?
2
• Does motivation to become an entrepreneur vary with the age?
• Does motivation to become an entrepreneur vary with the experience?
• Which one is most suited finance options for entrepreneurs?
• What is the importance of training for an entrepreneur?
He has deliberated some fact based study as per National Knowledge Commission 2008
which has analyzed the importance of education in entrepreneurship before and after year
2000, availability of bank finances at different stages of business, motivation variations
according to work experiences (which includes family background, dream, desire, market
opportunities), and motivation variation according to age and gender (under 35 years or
after 35 years or male or female).
3
E-Governance
Mr. Pradeep Kumar
Assistant Professor, CSE Dept., CET, MUST
The presentation aims attention at E-Governance. E-Governance means “Electronic
Governance”. It is an application of Information Technology (IT) in government
functioning in order to have good and smart governance. SMART here refers to “Simple,
Moral, Accountable, Responsive and Transparent”. Mr. Pradeep Kumar emphasized that
to attain E-Governance the foremost requirement is such that, the workplace has to be
fully computerized. The computer is the most important requirement for E-Governance;
computers should be connected so that online work is possible. There has to be some
online work flow procedure.
He has explicated the following topics:
� Introduction of E-Governance
� Many Reasons for E-Governance
� Role of ICT (Information Communication and Technology)
� Re-Engineering of Business Process
� Requisites of E-Governance
� Interactions in E-Governance
� E-Governance in India
� E-Governance Projects in India
� Digital India and E-Governance
� Conclusion and Future Scope
He has mentioned that government employees should be trained so that they can work on
the software. He also insisted on removing the paper based system and making everything
computerized to increase the transparency of work and a speedy flow of work is possible.
He has elaborated that interactions in E-Governance are divided into four categories: one
is government to government; it includes interaction within government offices and with
other governments, second is government to consumers, third is government to employee
and fourth is government to business for e-tendering and tax payments. “E-Governance
Policy Initiatives under Digital India” is a compendium of several policy initiatives in the
4
E-Governance domain, namely the E-Kranti Framework, Open-Application Programming
Interfaces (APIs) and E-Mail Policy.
The presentation concluded with the illustration of E-Kranti (E-Education), it includes all
schools connected with broadband, free Wi-Fi in all schools, Digital Literacy Program,
Massive Open Online Course (MOOCs)-to develop pilot Massive Online Open Courses.
Technology for Health (E-Healthcare) comprises of online medical consultation, online
medical records, online medical supply, Presence Across Nation-India (PAN-India)
exchange of patient information.
5
Pervasive Computing
Mr. Kaushik Ghosh
Assistant Professor, CSE Dept., CET, MUST
Pervasive computing has shaped our
lives in the present decade and is sure
to do the same in the coming one too.
The basic postulate of Pervasive
Computing, as per the definition
coined by Mark Weiser, is to make
many computers available throughout
the physical environment, but making
them effectively invisible to the user.
The bias of the presentation is mainly
upon the application areas of pervasive
Computing.
The main topics of the presentation are as follows:
• Invisible technology
• Making things appear obvious
• Integration of virtual and physical worlds
The presentation discussed in details the present and future of Pervasive Computing. In
that process the presenter focused on smart objects for realizing the benefits of Pervasive
Computing.
The presentation also discussed different enablers for Pervasive Computing. The four
different enablers discussed in the presentation were:
• Moore’s Law of IC Technologies
• Communication Technologies
• Material Technologies
• Sensors/Actuators
6
The major takeaways from the presentation were:
• An outline of the future for pervasive computing
• Different application areas of Pervasive Computing that are in use at present
• Hand shaking between different disciplines of engineering, in order to get tangible
benefits of pervasive Computing
7
Bhagavad-Gītā: The Manual of Dharma
Dr. Dhananjay Mani Tripathi
Assistant Professor, CASH, MUST
The Bhagavad-Gītā is a
manual of Dharma that
provides guidelines for
attaining the heights of
human excellence. This
text contains the essence of
the teachings of the ancient
Rishis. The wisdom of the
Gītā makes us not only
wise, but also enlightened
human beings for the
Mānava-Dharma.
The speaker begins the presentation with a question “What is my Dharma?”
The धम�-�े�े कु�े�,े समवेता युय�ुसवः ।
मामकाः पा�डवाः चैव, �कम अकुव�त स�जय ॥ 1.1
Bhagavad-Gita opens with blind King Dhritarashtra requesting his secretary, Sanjaya, to
narrate the battle between his sons, the Kauravas, and their cousins, the Pandavas. Lord
Krishna, the Supreme Personality of Godhead, out of affection for His devotee, the
Pandava prince Arjuna, has agreed to drive his chariot.
The objective of the presentation is to provide gist of all its 18 chapters and 700 shlokas.
These shlokas are designated as different types of Yoga and they deal with methodologies
for the application of spiritual knowledge to practical life.
8
Testing of Logic Circuits
Ms. Aditi Kajala
Assistant Professor, CSE Dept., CET, MUST
The presentation is about
the role of testing of logic
circuits. The logic circuits
can be divided into two
types-combinational and
sequential circuits. In this
presentation, stuck-at-fault
and delay fault models are
considered. In stuck-at-fault
one line is permanently
stuck either at logic 0 or at
logic 1. In delay fault models the timing delays of certain logic elements are considered.
This presentation has elaborated the following points:
• Motivation behind testing of Logic Circuits
• Definition and types of testing
• Testing principle
• Fault models
• Steps required for test generation
• Examples of test generation for combinational circuits
• Procedure of test generation for sequential circuits (ATPG)
• Fault Coverage and Efficiency
• Delay fault model
• Zero Defect
• Challenges of testing
9
The presentation starts by explaining the meaning of logic circuits and its types. In the
explanation of the need and motivation of testing one video about the Moore law is
shown. Testing can be divided as structural and functional testing. The digital testing of a
system is subjecting it to a set of inputs and checking its output to verify whether it
behaves as per the specification targeted during design.
The presentation is concluded with the need of Zero defect where the presence of every
possible fault is checked and the challenges of testing.
10
Internet of Things
Mr. Pinaki Ghosh
Assistant Professor, CSE Dept., CET, MUST
The presenter introduces the topic
Internet of Things (IoT) as the
network of physical objects-
devices, vehicles, buildings and
other items-embedded with
electronics, software, sensors, and
network connectivity that enables
these objects to collect and
exchange data. The IoT allows
objects to be sensed and
controlled remotely across
existing network infrastructure, creating opportunities for more direct integration of the
physical world into computer-based systems, and resulting in improved efficiency,
accuracy and economic benefit.
This presentation covers the following points:
• History
• What is IoT
• Architecture of IoT
• Applications of IoT
• Research Groups
• Challenges
The presentation begins with a quote of Nikola Tesla, “When wireless is perfectly
applied, the whole earth will be converted into a huge brain, which in fact it is, all things
being particles of a real and rhythmic whole… and the instruments through which we
shall be able to do this, will be amazingly simple compared with our present telephone”.
11
The objective of this presentation is to provide the audience the information, application
and different aspects of the Internet of Things. The audience is informed about the
applications of IoT in different sectors like, smart home, retail, medical, military,
industries, automobiles, agriculture and governance. The research groups which are
working in the field of IoT have also been discussed.
This presentation has been concluded with a discussion on the challenges and future of
IoT in India.
12
Sensors and its Applications
Ms. Ranjana Thalore
Assistant Professor, ECE Dept., CET, MUST
A sensor is an object whose
purpose is to detect events or
changes in its environment, and
then provide a corresponding
output. A sensor is a type of
transducer that may provide
various types of output, but
typically use electrical or optical
signals. For example, a
thermocouple generates a known
voltage (the output) in response
to its temperature (the environment). A mercury-in-glass thermometer, similarly, converts
measured temperature into expansion and contraction of a liquid, which can be read on a
calibrated glass tube.
The presentation focused on the following points:
• Introduction to Sensors
• Classification of Sensors
• Temperature sensors and Applications
• Pressure sensors and Applications
• Proximity sensors and their types
• Level sensors and their types
• Flow sensors and Applications
• Examples of Monitoring and Controlling using sensors
The presentation starts with an interesting question; “What if there is a sensor that can
read our minds?” The introduction to sensors is done with the help of a video introducing
13
the five senses of a human body. Then a generalized definition of a sensor is given as “A
sensor is a device that detects events or changes in quantities and provides a
corresponding output.
The presentation classified the sensors into five general categories as:
• Temperature Sensors
• Flow Sensors
• Pressure Sensors
• Proximity Sensors
• Level Sensors
Each of the categories above is introduced to the spectators with the help of a video
depicting the working principles of various types of sensors. The different categories are
further classified into sub-categories; e.g. temperature sensors can be broadly categorized
as contact temperature sensors (RTD, thermocouple, thermistor, etc.) and non-contact
temperature sensors (IR sensor).
The purpose behind this presentation is to introduce the spectators about various kinds of
sensors available to be used in day-to-day life and their principle of working. The
presentation concludes with the two real-life examples of sensors for monitoring and
controlling purpose.
14
Energy is Synergy
Mr. G. Divya Deepak
Assistant Professor, NST Dept., CET, MUST
Energy is the entity that
defines the way of our
lives. It characterizes the
standard of our living and
creates a behavioral pattern
that shapes our life.
This presentation focused
upon the importance of
energy by concentrating on
the following points:
• Introduction of Energy
• Sources of Energy and their Viability
• Comparison of various Energy Resource Potentials
• Environmental Effects of these Energy Resources-Global Warming
• Need to integrate the Energy Resources-Synergy
The presentation begins with the introduction of energy and its inherent role in our daily
lives. The audience enlightened on the concept of energy and the mechanism involved in
the extraction and potential viability of these various energy resources.
The prime objective of the talk is to understand the imperative need for using and
deriving energy from viable potent sources that would serve mankind in the far future.
The various energy sources were characterized with their pros and cons. Further, the
presentation focused upon on the gravity of effort and resources involved in the extraction
of energy from the various energy resources are also concentrated upon and taken into
consideration in the analysis.
15
In the concluding part of the presentation, the speaker discussed the overall need to
integrate the potential energy resources according to the demography, economic viability
and global policies. Furthermore, the sustainability and economic viabilities of each
energy resource were addressed profoundly.
16
Image Processing
Mr. Suneet Gupta
Assistant Professor, CSE Dept., CET, MUST
Basically Digital Image Processing is
processing of images which are digital
in nature. One of the major application
area is Biomedical Images. The entire
digital image processing techniques or
algorithms can be implemented in
biomedical image processing. Therefore
Biomedical Image Processing is nothing
but using digital image processing
techniques in biomedical sciences.
The presentation informs about a way
or method to reduce or eliminate these
ringing effects. In this method, pixels
on and along the edges have not been
considered in the restoration process and this is done by assigning them weights zero. If a
slight ringing effect is tolerable the weights can be increased. The ringing effect becomes
more and more prominent as the weights have increased from zero to one. However the
method is very useful and effective, but some parts of the image are not considered.
The presentation elaborates how to get the benefits of both, Laplacian image and Gradient
image. This way we get an image with highlighted fine details and edges which would
have been impossible by using any one of the two alone. The future work may be to
develop a single filter by combining the two filters.
The final point in the presentation is a way to find the most appropriate measure which
verifies that the image has really been enhanced. For this purpose several images are
taken and enhanced to different levels by some standard enhancing function.
17
An Introduction to RADAR and LIDAR Remote Sensing
Dr. S. K. Jha
Assistant Professor, ECE Dept., CET, MUST
The presentation is based on remote sensing with the help of Radio Detection and
Ranging (RADAR) and Light Detection and Ranging (LIDAR). Remote sensing is the
process of sensing and measuring objects from a distance without physical contact with
them. It elaborates that the two types of remote sensing based on the utilization of energy
source are active and passive. Radio Detection and Ranging (RADAR) and Light
Detection and Ranging (LIDAR) are the examples of active remote sensing.
He has mentioned that RADAR can see through darkness, fog, rain and snow. They can
determine the location of the target very accurately. RADAR can be used in ship safety,
weather monitoring, etc. LIDAR data collection is not only limited to daylight hours.
LIDAR has many applications in forestry, canopy heights, biomass measurements etc.
He strongly apprise that LIDAR mapping is an accepted method of generating precise and
directly Geo-referenced spatial information about the shape and surface characteristics of
the Earth. Recent advancements in LIDAR mapping systems and their enabling
technologies allow scientists and mapping professionals to examine natural and built
environments across a wide range of scales with greater accuracy, precision and
flexibility than ever before.
The presentation concluded with the affirmation that several national reports issued over
the past five years, highlighted the value and critical need of LIDAR data. The National
Enhanced Elevation Assessment (NEEA) surveyed over 200 federal, states, local, tribal,
and non-government organizations to better understand how they use enhanced elevation
data, such as LIDAR data. In the report of Northern Dimension Environmental
Partnership (NDEP, 2012), the 400 resulting functional activities were grouped into 27
predefined business uses for summary and benefit-cost analysis.
18
Smart City & India
Ms. Moumita Ghosh
Assistant Professor, CSE Dept., CET, MUST
Nowadays, in the whole world
with the advancement of
technology, smart city concept
is running everywhere. Smart
word comes with the
application aspects of wireless
sensor nodes, big data
analytics & internet of things.
Sensor node’s application is
already started in India with
the military application, agriculture field and communication field. So, the smart city
concept is possible in India also and this project has taken by our honorable Prime
Minister Sri. Narendra Modi.
The presentation emphasized on the following points:
• What is a smart city?
• Vision & mission of smart city
• Smart services of the smart city with details
• Smart cities concept of India
• Name of the cities of India, which are going to be converted into smart one
• How mission of making smart cities in India is going to be a success
Starting phase giving the clear concept of how smartness can be adopted. Wireless sensor
network, Big Data & Internet of Thing clear the picture of smartness relate with these
three fields. Then what are the services is needed in the smart city concept that is also
discussed in details like smart water, smart energy, smart buildings, smart public services
& smart mobility etc.
19
The main objective of giving the presentation is to aware the people with the latest
development in technology in everyday life and how with the change of worlds other
country’s vision of modernization India is adopting the latest technology and already
started implementing on that. Many cities of India are modifying their services under the
supervision of the Government’s plans on smart city project.
The presentation is concluded with the solution part that how the change of the thinking
process and the help of the Government’s plan give the people of India a smart place for
living and if people are feeling happy with the modern services & motivated to avail the
smart services in smart way then India will also progress in the technical field and leave
its footprints in world map.
20
Big Data in Everyday Life
Mr. Manish Kakhani,
Assistant Professor, CSE Dept., CET, MUST
The presentation is about the impact of Big Data in our
everyday life. Data is very valuable asset of any
organization in today’s digital world. A world without
data is not possible. Data is important to any
organization for extracting valuable information and
improved decision making. Managing and gaining
insights from the produced data is a challenge and key
to competitive advantage. Today data is coming from a
variety of sources like social media sites, sensor devices, mobile phones, etc. The data,
producing is of different types –Structured, Semi-Structured and Unstructured.
In the presentation, Speaker shared the information about the data generation per minute
in this world such as: Google receives 4,00,000 search in queries per minute, user shares
2,4,60,000 pieces of content on Facebook in one minute, etc.
Big Data has no clear definition and uncertain origins. It is a quite misleading term. The
term big data is not only related to volume, but it is beyond the volume of data.
According to Gartner, “Big data is high-volume, high-velocity and high-variety
information assets that demand cost-effective, innovative forms of information processing
for enhanced insight and decision making”.
Speaker defined the characteristics of Big Data by three V’s-Volume, Velocity and
Variety:
• Volume: Large size of data (Tera Byte or Peta Byte)
• Velocity: Rate at which data is generated and processing
• Variety: Different formats and types of data
The following points have been elaborated in the presentation:
• Data and its importance
21
• Sources of Big data
• Big Data: Application area
• HADOOP
• HADOOP Core Components
• Architecture of HADOOP
• Big Data and IoT: Two sides of a same coin
In the concluding part speaker correlated big data with cloud computing.
22
Harr Wavelet
Mr. Vaibahv Nema
Assistant Professor, ECE Dept., CET, MUST
A wavelet is a mathematical function useful in digital signal processing and image
compression. The use of wavelets for these purposes is a recent development. The
principles are similar to those of Fourier analysis, which is first developed in the early
part of the 19th
century.
The important points covered in the presentation are:
• Fourier Transform
• How does Fourier Transform work?
• Fourier Transform of a signal having more than one frequency component
• Loss of localization information in Fourier Transform
• The Short Time Fourier Transform
• Fixed window size: The problem of resolution in Fourier Transform
• Wavelet Transform
Wavelet Transform is a useful signal processing tool. Wavelet analysis is similar to
Fourier analysis in the sense that it breaks a signal down into its constituent parts for
analysis. Whereas the Fourier transform breaks the signal into a series of sine waves of
different frequencies, the wavelet transform breaks the signal into its "Wavelets", scaled
and shifted versions of the "Mother Wavelet".
The presenter compared the sine wave with wavelet: sine wave is smooth and of infinite
length, the wavelet is irregular in shape and compactly supported.
23
Effect of Electromagnetic Radiation on Human Health
Dr. P. P. Bhattacharya
Professor & Head, ECE Dept., CET, MUST
The presentation mainly
focuses on non-ionizing
radiation in Radio
Frequency (RF) and
microwave range and
their effect on human
health. Both thermal and
non-thermal effects are
addressed here.
The basic principle of
mobile communication,
IT & telecom scenario is
addressed.
The important points covered in the presentation are:
• Effects due to mobile phones, base stations
• The precautionary measures
• Alarming effects such as Leukemia, cancer and effects on teenagers
• Effect on sperm, nervous system
Several case studies have been addressed which includes famous Usha Kiran Building
case of Mumbai. Safety standards and licensing have been dealt in the talk. Brief about
many researches carried out in India are discussed. The talk ends with Ministerial
Recommendations of using mobile phones.
24
Computational Epidemiology-A Common Man’s Perspective
Dr. A. Senthil
Assistant Professor, CSE Dept., CET, MUST
Computational Epidemiology
is an interdisciplinary field
which helps us in
understanding the spread of
diseases and paves the way to
find possible solutions to
control the epidemics. It also
helps health authorities in
planning evacuation and
quarantine strategies during
an epidemic.
This presentation intended to
give an idea about epidemics and computational epidemiology in a way that a common
man could get an overview of epidemics and its effects.
Disease outbreak like cholera in 1854 to the cholera outbreak in 2010 is being taken as an
example for understanding the effects of an outbreak.
The presentation deals with the components of real time computational epidemiology and
concludes with the discussion of the impact of a disease outbreak on a country i.e. Ebola
in 2014.
25
Project Proposals and Implementation
Dr. Ashok Khanna
Professor, NST Dept., CET, MUST
The presentation emphasizes on the importance of preparing project proposals with
precise objective, methodology and results. He has mentioned that a proposal is a request
for financial assistance to implement a project. The proposal outlines the plan of the
implementing organization about the project, giving extensive information about the
intention, for implementing it, the ways to manage it and the results to be delivered from
it. He has presented the following guidelines designed considering his own personal
experiences to help scholars in preparing their full proposal. He strongly advised that
“How well you plan the action is critical to the success of the project”. A project proposal
is a detailed description of a series of activities aimed at solving a certain problem
(NEBIU 2002). In order to be successful, the document should provide a logical
presentation of a research idea (REPOA 2007). He exemplified that project should:
• Illustrate the significance of the idea
• Show the idea's relationship to past actions
• Articulate the activities for the proposed project
He elaborated that designing a project is a process consisting of two elements, which are
equally important and thus essential to forming a solid project proposal which are:
• Project planning (formulation of project elements)
• Proposal writing (converting the plan into a project document)
He concluded his presentation mentioning that the project proposal should be a detailed
and directed manifestation of the project design. It is a means of presenting the project to
the outside world in a format that is immediately recognized and accepted.
26
Wireless Sensor Network
Dr. Manju
Assistant Professor, CSE Dept., CET, MUST
A general definition of a
sensor is a device that
produces a measurable
response to a change in a
physical or chemical
condition. One of the
challenges and design
constraints on Wireless
Sensor Networks (WSNs)
is efficient energy
utilization. Since a sensor
node is a microelectronic
device, it can only be supplied with a limited power source (<0.5 Ah, 1.2 V).
The presentation discussed the following points:
• Introduction to Wireless Sensor Networks (WSNs)
• Difference between Wireless Networks (WNs) and WSNs
• Communication Architecture
• Applications of WSNs
• Research Issues
• MAC Protocols
• IEEE 802.11
• IEEE 802.15.4
• ML-MAC
• Conclusion
The presentation starts with an introduction to sensor node and the functions performed
by a sensor node like sensing, processing and communication in the network. Next to the
27
introduction, basic differences between architecture, topology and resource availability in
WNs and WSNs is explained. This is followed by the depiction of a sensor network in a
way that how an event is sensed and communicated to the control center. The presenter
then introduced the audiences with the various layers in communication protocol stack.
Various types of sensor nodes available in the market and their evolution year by year
were explained. The presenter categorized the WSN application domain into following
categories and explained each one with the help of videos:
• Military
• Environment
• Health
• Smart Home
• Commercial
The research issues associated with the design of efficient WSNs are discussed and
spectators were made aware of various types of techniques that are used by researchers to
improve performance of a WSN. Also, a network simulator QualNet 6.1 is introduced to
the audience.
The presentation concluded with the following directions that could be addressed by the
researchers:
• Standardized Sensor Hardware
• Cross-Layer Protocol Design
• Mobile Sensor Networks
• New Optimization Criteria
• Peaceful Coexistence
28
Challenges for Nano Scale MOSFETs and Promising Nano Devices:
Multigate/Nanowire Transistors
Mr. Gaurav Dhiman
Assistant Professor, ECE Dept., CET, MUST
As dimensional scaling of
CMOS transistors is
reaching its fundamental
limits, various researches
have been actively carried
out to find an alternative
way to continue to follow
Moore’s Law. Among these
efforts, various kinds of
alternative memory and
logic devices, so called
“beyond CMOS” devices, have been proposed.
The presentation focused on the following points:
• Introduction to Solid State Devices
• Importance of Semiconductors Devices
• Semiconductor Technology
• Processing Conditions for Semiconductor Technology
• CMOS Technology
• Newer Devices
• Conclusion
The presentation begins with the introduction of solid state devices such as Small Signal
Diodes and Transistors, High Power Insulated Gate Bipolar Transistor, High Electron
Mobility Transistor, Monolithic Accelerometer, and Laser Diodes. The audience is
informed about the importance of semiconductors devices in everyday life. Further, these
devices enhance:
29
• Reliability
• Performance
• Cost-Effectiveness of both Energy Systems and Information Systems
The presentation also focused on semiconductor technology with emphasis on
requirements for processing conditions such as Perfect Single-Crystal Material, Ultra-
Clean Environment and Sophisticated Equipment.
One of the main objectives of the presentation is to introduce audience to Complementary
Metal-Oxide-Semiconductor (CMOS) technology. CMOS scaling has been a main key
for continuous progress in silicon-based semiconductor industry over the past three
decades. As dimensional scaling of CMOS transistors is arriving at its fundamental limits,
various researches have been actively carried out to find an alternative way to continue to
follow Moore’s Law.
Lastly, the presentation focused on new device architectures like Silicon on Insulator
Multigate MOSFETs, Junction Less and Junction Based, Nanowire Transistor and Carbon
Nanotube FET. These nano-devices take advantage of the quantum mechanical
phenomena and ballistic transport characteristics under lower supply voltage and hence
low power consumption. Moreover, due to their extremely small size, those devices are
expected to be used for ultra-density integrated electronic computers. These nano-devices
are the future of VLSI devices.
30
Coordination Compounds and their Applications
Dr. Harlal Singh
Associate Professor, Chemistry, CET, MUST
Coordination compounds play
important roles in nature.
Coordination compounds include
such substances as vitamin
B12, hemoglobin,
and chlorophyll, dyes and pigme
nts etc. A major application of
coordination compounds is their
use as catalysts and metal based
drug. In addition, a very stable
class of organometallic
coordination compounds has provided impetus to the development of organometallic
chemistry.
This presentation has elaborated the following points:
• General chemistry of Materials
• Coordination compounds
• Comparison of simple salt, double salt and complex salt
• Synthesis of coordination compounds
• Characterization of coordination compounds.
• Applications of coordination compounds in industries.
• Application of coordination compounds in Medicine.
The objective of this presentation is to imagine the benefits and applications of
coordination compounds in various fields such as chemical and pharmaceutical industries.
In this presentation, the process of preparation of coordination compounds with various
ligands and their effects were discussed and also compared with simple salt and double
salt on the basis of their properties, such as color, bonding etc.
31
The presentation begins with the introduction of Materials and their chemistry involved in
our everyday life. Chemistry is the most power full tool to understand the world at almost
every scale. Chemistry is closely associated with humans in day to day life. Medicine is
the life living entity which plays a vital role in one's life.
In the presentation, the chemical properties and the effect of medicine in human body are
discussed. The presentation deals with the many applications in qualitative/quantitative
chemical analysis within analytical chemistry and coordination compounds play a vital
role in metallurgy and medicine.
In the concluding part of the presentation, the speaker discussed and briefed few
examples of coordination compounds used nowadays in chemical and pharmaceutical
industries, such as treatment of cancer, Chlorophyll: photosynthesis, Hemoglobin: oxygen
transporter in the human body, metal complexes enzymes that regulate biological
processes, Ziegler-Natta catalyst, DSSC, High Temp Superconductors etc.
32
Cyber Crime: A General Perspective
Mr. S. S. Verma
Assistant Professor, CSE Dept., CET, MUST
A cyber-attack is initiated
from a computer against a
website, computer system
or individual computer that
compromises the
confidentiality and
integrity. Cyber-crime is
coming forth as a very
severe threat in today’s
universe. The internet
brings joy to our lives, but at the same time it has some negative sides too. The cyber
criminals are always in a search to find out the new ways to attack the possible internet
victims.
The presentation highlighted the following points:
• What is Cyber Crime?
• What is Cyber Security?
• History: Case Study
• Animation
• Types of Attacks
• Attacks Year Wise Map
• Cyber Warfare Live in Real Time
• Some simple hacks tricks
The presentation in brief introduced different cyber-crimes and cyber laws, so that one
can become aware of any cyber world is the combination of computers and other
communication convergence technologies.
33
The presentation also gave knowledge using a small video on cyber security. Further,
classifies the types of cyber-attacks as follows:
• Cyber Crimes against person
• Cyber Crimes against personal property
• Cyber Crimes against government
The presentation is designed and presented to the audience in such a way that a person
from any background can understand ‘checks and controls’ for security threats.
34
Dark Side of the Information
Mr. Hitesh Jangir
Assistant Professor, CSE Dept., CET, MUST
The presentation addressed that in the
world of information and technology; we
often forget and become a little careless
regarding the safeguard of our personal
information. Thus, we need to understand
how best suitably we can align ourselves
with the upcoming technology by
extending our knowledge towards the stuff
that we cannot live without (Modern Age
Technology). In recent years, digital
technologies have been transforming
workplaces and increasing economic
productivity, but could overuse of information technology now be sapping your
employees’ and your organization’s well-being.
Mr. Hitesh Jangir has illustrated the appropriate use of information technology with the
assurance of data security.
He mentioned that to secure our personal information is our responsibility too. We should
access the internet from safe and secure data access points. He drew the attention of
listeners to very important terms and elaborated the significance of safe access. The terms
elaborated are as follows:
• Personal Information
• Hacking
• Types and Tools
• Availability of Tools
• Wireless Security
• Passwords
35
• Encryption and tools
• The IoT world
• Risks in IoT and solution
• The Dark Side
• Types of Web
• Invention
• Working Principle
The speaker asked few questions during his presentation such as:
• How dangerous it is?
• What to do?
• Can I use it (Tools)?
• What happens in the dark side
36
Technological Innovations - Past, Present & Future in Automotive
Industry
Mr. Vikrant Sharma
Assistant Professor, ME Dept., CET, MUST
Cars give people the freedom to travel
where they like and when they like. The
cars of today are the result of more than
120 years of development and
improvement. Today’s car still work on
the same principles as the earliest cars,
but they take us from place to place
more quickly and more safely than ever
before and also they use much less fuel.
This presentation explained about the
history of cars and has elaborated the
following points:
• Car definition
• History of cars
• First experimental car by Benz
• Mass production in automotive industry
• Most popular cars
• History of car industry in India
• Major car industries in India
• Features available in today’s car and future concept cars
The presentation begins with the definition of a car, and evolution of the automobile.
The gathering is informed about the development of cars, the invention of the internal
combustion engine, model T of Henry Ford, most iconic car, and automotive industry in
India, present and future trends in automotive.
The objective of this presentation is to envisage the history of the automotive industry as
well as past, present and future trends of the automobile.
37
Hermetic Technology Transformer
Ms. Sunita Kumari
Assistant Professor, EE Dept., CET, MUST
A Hermetical Transformer Non-Gas-
Cushion type is a transformer design which
has no conservator and breather fitted on its
cover. Here the dielectric insulating fluid in
the transformer tank is completely sealed
and is in no contact with the atmosphere.
This presentation covers the following
points:
• Introduction of transformers
• Existing conventional transformers
in industries
• Comparison of existing
conventional transformers and
hermetic technology transformers
• Working of hermetic transformers
• Applications
The presentation begins with the introduction of conventional transformer which is used
to transfer the electrical power from one circuit to another without changing the
frequency. It is used for increasing or decreasing the voltage by decreasing or increasing
the current accomplishes this by electromagnetic induction as per requirement of the
industrial/domestic/commercial purposes.
The objective of this presentation is to predict the benefits and use of the fully immersed
in oil and no nitrogen gas cushion transformer applications in harsh climatic conditions
like smoke, pollution, high humidity, dusty environment and rain. The consumers look at
increasing the availability of transformers due to the maintenance and are keen in
reducing maintenance costs.
38
In this presentation, the traditional transformers compared to the modern technology on
the foundation of electricity transfer for the generating, transmission and distribution
systems. It is safe to say that these transformers are maintenance free, allow to reduce the
cost of maintenance and also reduces drastically the time of non-availability.
In the concluding part of the presentation, the speaker discussed advanced design
combined to these rigorous manufacturing processes ensures a partial discharge free and
overall best quality of product available for Indian market.
.
39
Technological Innovations in Biomedical Engineering
Mr. Satyajit Anand
Assistant Professor, ECE Dept., CET, MUST
Biomedical Engineering is
the application of
engineering principles and
design procedures to
analyze and solve the
problems in biology and
Medical. Biomedical
engineers may be called
upon in a wide range of
capacities, including
designing instruments,
devices and software; bringing together knowledge from many technical sources to
develop new procedures; and conducting research needed to solve clinical problem.
This presentation included the following contents:
• What is Biomedical Engineering?
• What Biomedical Engineers do?
• Biomedical Engineering important qualities
• Physiological Signal
• Focus on Medical Device Technology
• Biomedical Engineering Innovations in last decade
� Motorised Wheel Chair
� AbioCor Artificial Heart
� Cameral Pill
� Bionic Contact Lens
� iLimb Bionic Hand
� Robots Helping Perform Surgeries
� Berkley Bionics eLEGS skeleton
� Eye Writer
40
• The Future of Biomedical Engineering
• Dream Options for Biomedical Engineers
• Companies in India for Biomedical Engineers
• List of Biomedical Engineering Research Centers in India
At the outset, the presenter discussed with the basics of Biomedical engineering followed
by its application in engineering field.
It is explained in detail the importance of biomedical engineering that how the students of
biomedical engineering can achieve their dreams in India as well as abroad. The objective
of this presentation is to make people understand the subspecialty areas of biomedical
engineering exists and what are the innovations made in the last decade.
At last, having been a briefed discussion about the companies and research centers for
Biomedical Engineers in India presentation is concluded.
41
Indian Nuclear Power Program
Dr. N. K. Joshi
Professor & Head, NST Dept., CET, MUST
The speaker begins the
presentation with the
introduction stating that
access to energy is one of the
basic requirements for
human development. Socio-
economic development like
literacy, longevity, GDP and
human development are
directly dependent upon the
per capita energy consumption of a country. Per capita annual consumption in India is
about 1000 kWh where the world average is around 2500 kWh. Although India is the 3rd
largest producer of electricity after China & USA but 300 Million People in India have no
access to electricity. India has 16 % of world’s population on ~ 2.4 % of land.
In this presentation, the speaker elaborated the following points:
• What is a perfect source of energy?
• India’s percentage share by different source of energy
• Advantages of nuclear energy
• Highly concentrated source of energy
• Economical source of base-load electricity generation
• It releases zero carbon dioxide, sulfur and nitrous oxide
• Small nuclear wastes, which can be contained and managed
The speaker also explained the basis of fission and controlled chain reaction necessary for
the production of electricity. India has a third of the entire world’s thorium. Thorium is a
fertile element, and needs to be first converted into a fissile material, U-233 in a reactor.
The large growth in nuclear power capacity can be realized only through efficient
42
conversion of fertile materials into fissile materials and utilizing the fissile materials to
produce energy.
In the conclusion, the speaker emphasized that nuclear power is a clean and green source
of energy essential for sustainable development of India.
43
TQM in Technical Education
Dr. V. K. Jain
Dean, CET, MUST
The presentation elaborated
about the technical education
in India. This has faced
enormous changes after
independence to this day.
The exponential growth in
technical education has,
however, not translated into
any significant growth in the
number of quality graduates acceptable to industry; causing a huge unemployment due to
the degradation of quality education at the input level as well as at the output level.
This work urges the institutions to focus on maintaining quality of education for making
technical education in India more competitive and fruitful for graduates and suggests
various strategies to attain the same such as adopting Total Quality Management (TQM)
and hence enhancing the standard of Indian Technical Education.
Dr. V. K. Jain has elucidated the important terms such as:
• Principles of TQM in Technical Education
• Methodologies & Tools of TQM
The presentation also discussed the five different approaches of maintaining
quality:
• In the terms of excellent and high standards
• In the terms of consistency
• As a fitness for purpose
• As a value for money through efficiency and effectiveness
• As transformative in terms of qualitative change
44
The presentation in brief introduced the eight components for achieving total quality
management successfully are:
• Ethics
• Integrity
• Trust
• Education
• Teamwork
• Leadership
• Recognizability
• Communication
In the conclusion, speaker emphasized on few quality issues of technical education are
listed below:
• The existing student evaluation and certification system do not reflect
employability criteria
• The curriculum does not reflect the needs of industry
• Competent faculty is either not available or too expensive
• Inferior quality of student input
• R & D culture in the institute is missing
• Teaching is mostly chalk and talk type
• Inferior quality of practical work done in the colleges
• Industry-Institute linkage is weak
• Curriculum does not provide for self-paced learning
• Management has lukewarm attitude towards quality improvement; quantity
prevails over quality
• Faculty development programs are on adhoc basis
• Faculty retention is a problem
• Inadequate infrastructure
• Non-availability of young dynamic leadership
45
Information Security
Dr. Anil Kumar
Professor & Head, CSE Dept., CET, MUST
Information in the age of the
Internet, protecting our information
has become just as important as
protecting our property. Information
Security (InfoSec) is the practice of
protecting both physical and digital
information from destruction or
unauthorized access.
This presentation has elaborated the
following points:
• Introduction of Information Security
• The Five Ws of Information Security
• Principles of Information Security
• Applications of Information Security
The importance of security in the physical world can never be exaggerated. Every day we
take steps to protect the things that are important to us. In this modern, technological
world, however, there’s a new form of theft or break-in that’s virtual in nature: illegal
data access.
The objective of this presentation is to explain the W’s of information security. What is
Information Security? Why do you need Information Security? Who is responsible for
Information Security? When is the right time to address Information Security? Where
does Information Security apply?
In the next part of presentation, the five principles of security are confidentiality,
Integrity, Authentication, Non-repudiation, Access control and Availability are explained
in detail. Comparison of passive attacks and active attacks were explained.
46
Presentation enlightened the prevention of cyber-crimes. Presenter discussed many tips to
prevent cyber-crime in the concluding part.
47
Internal Combustion Engines
Mr. N. S. Baroule
Assistant Professor & Head, ME Dept., CET, MUST
Automakers continue to look to the Internal
Combustion Engine (ICE) and its decades of
reliable and resilient service when it comes
to offering improved fuel economy and
longer engine life. From its humble
beginnings in the early 1800s to its evolved
cousins of today and beyond, the ICE has
made improvements in not only how quickly
you can get to the destination, but also how
efficiently that journey can be made without
environment norms violation.
In this presentation technology that makes Internal Combustion Engines better such as
clean diesel, direct injection, cylinder deactivation, turbochargers, variable valve timing
and battery-only electric cars are discussed. In the long run, the ICE is on the way out and
electric motors are on the way in, but ICEs have been around for so long that one should
be careful about announcing their demise.
This presentation covered the following points:
• Introduction
• Classification of I.C. Engines
• Engine details
• I. C. Engine Terminology
• Four Stroke Petrol Engine
• Four Stroke Diesel Engine
• Two Stroke Cycle Engines
• Difference between Two Stroke and Four Stroke Cycle Engines
• Advancement in I. C. Engines
48
The Benefits of Ethical Hacking
Mr. Niranjan Lal
Assistant Professor, CSE Dept., CET, MUST
The wide growth of the Internet has
brought good things to the modern
societies such as easy access to online
stores, electronic commerce, emails, and
new avenues of information distribution
and advertising. As with the most
technological advances, there is always a
dark side: the criminal hackers where
they represent a threat to these
information avenues.
With the fast growth of the Internet
technologies, computer security has
become a major concern for governments
and business where the possibility of
being hacked is proportional to the security implemented in their infrastructure.
The Ethical Hacking presentation covered the following points:
• Overview of Hacking
• Why do hackers hack?
• Types of Hacker
• Corporate Espionage Attacks
• What is Ethical Hacking?
• Why Ethical Hacking?
• Ethical Hacking-Process
• How to protect the system?
• Final words
49
The presentation begins with the introduction of Hacking with different types of hackers,
who play the role in today’s internet and networking era. This presentation explained the
importance and benefit of ethical hackers as compared to malicious hackers for the
organizations.
This presentation also covered the top 5 Corporate Espionage Attacks, estimated loss of
world due to Hacking, from 2017 to 2021 and total estimated spent on Cyber Security
worldwide from 2017 to 2021.
The objective of this presentation is to give simple tips to keep your computer safe from
the malicious hackers.
In the concluding part of the presentation, the speaker asked some question and answered
some frequently asked questions: some possible reasons of hacking, and how to keep our
systems safe from unwanted problems that can stop our day to day working?
50
Vedic Mathematics
Dr. Shamik Tiwari
Assistant Professor, CSE Dept., CET, MUST
Vedic Mathematics is the
name given to a supposedly
ancient system of
calculation which is “re-
discovered” from the Vedas
between 1911 and 1918 by
Sri Bharati Krishna Tirthaji
Maharaj (1884-1960).
According to Tirthaji, all of
Vedic Mathematics is based
on sixteen Sutras, or word
formulae. For example, “Vertically and Crosswise” is one of these Sutras.
The presentation covered the following points:
• Sutras
• High Speed Multiplication
The speaker explained the gathering that the Vedic Math system is based upon 16 main
and many more Sub-Sutras, which are formulas that can be applied to various math
problems. Think of the different Sutras as you would think of the various tools in a
carpenter's tool belt. Depending on the application required, the carpenter will pull a
certain tool from his belt.
He took some examples such as finding square of a number ending with 5 and
multiplication of large digit numbers.
51
Antenna for Mobile Communication
Ms. Purnima Sharma
Assistant Professor, ECE Dept., CET, MUST
Antenna plays an important
role in wireless
communication applications.
It is the element that receives
and transmits the signals
which is to be
communicated. It is the end
point communication
component. Applications of
an antenna are Radio
broadcasting, Broadcast
television, Two-way radio, Communications receivers, Radar, Cell phones, Satellite
communications and Bluetooth-enabled devices. Nowadays antennas that can support
wide bandwidth are used.
This presentation elaborated the following points:
• Need of an antenna in mobile communication
• Revolution in antenna design
• Applications of antennas in mobile communication
• Antenna design for base station
The presentation starts with the introduction of an antenna. A brief introduction about
various types of antennas used for mobile phones is given. Development in antenna
design from internal antenna to external antenna is illustrated.
Various types of antennas that can be used for mobile phone and base station were also
discussed. Specific Absorption Rate which is a performance parameter that describes the
heat handling capability of a particular antenna is also discussed. Different antennas
which are used in latest mobile phones are presented. Smart antennas, that are used
52
nowadays due to various features such as Capacity Enhancement, Coverage Extension,
Increase in Transmission Efficiency, Reduction of Interference and Improves Call
Reliability are discussed.
The objective of the presentation is to give an idea about the role and need of an antenna
in mobile communication along with the information about the development in antenna
design technology.
The presenter concluded the presentation with remark on the latest antenna design used
today in the latest mobile phones.
53
Low Power VLSI Design: Challenges and Solutions
Ms. Anshu Gupta
Assistant Professor, ECE Dept., CET, MUST
Very Large Scale
Integration (VLSI) is the
process of creating
an Integrated Circuit (IC)
by combining thousands
of transistors into a single
chip. A state of art of VLSI
has more than 100 million
transistors. Precise and
efficient CAD tools are a
must to design, verify and test the VLSI chips. The increased customer demand for
Handheld, Battery-operated devices, Portable devices, Note Book Computers, PDAs,
Laptops, Palmtops, Cell Phones, Pacemaker need to be fulfilled by increasing the
manufacturing.
The presentation discussed the following points:
• Introduction to VLSI Design
• Motivation
• Sources of Power Dissipation
• Low Power Design Methodologies
• Conclusion
The presentation starts with the introduction of VLSI and comparison of First Planer IC
(1961) and Intel Nehalem Quad Core Die (2010). The presenter introduced the audiences
with various companies involved in VLSI design. Then CMOS is introduced followed by
Moore’s Law and a beautiful trend showing how various processors evolved with
increasing number of transistors year by year.
The following three processors were compared in terms of parameters like transistor
count, technology, frequency, area and power dissipation:
54
• Intel 4004
• Pentium 4 Cedar Mill
• 22-Core Xeon Broadwell-E5
The presenter focused on the various research areas that need to be explored in the field
of VLSI design. The prime requirements are:
• High Speed
• Low Power Consumption
• Low Area
The presentation concluded with the facts that for portable devices low power ICs are
required and there are different low power design techniques which are used in the
present day context.
55
E-Governance & YOU
Dr. Puneet Kumar
Assistant Professor, MCA Dept., CET, MUST
The Government of India is
transcending from
traditional modus operandi
of governance towards
technological involvement
in the process of
governance. Currently, the
Government of India is in
the transition phase and
seamlessly unleashing the
power of ICT in governance. The government is spending an enormous amount of
finances in the deployment of e-governance, but, are these efforts are going in the
appropriate direction and leads towards intended results?
The presentation titled “E-Governance and You” is an attempt to demystify the facts like;
what do the people percept from the concept of e-governance? What is the global
perspective about perception of e-governance? What are the major challenges confronting
the deployment of e-governance?
The presentation also encompassed the genesis and growth of e-government in India
along with the prevailing democratic structure of Indian society which includes both rural
and urban society. Further, it has also under gone dissemination of information about the
initiatives taken by Government of India in order to strengthen digital democracy like
conceptualization and evolution of MMPs (Mission Mode Projects) in year 2006 and
Digital India Program in year 2015. It has also thrown some spotlight on the digital divide
existing between rural and urban populace and the key challenges associated with the
successful deployment of e-government in India.
56
Quantum Computers Limit – Finite or Infinite
Mr. Nisheeth Saxena
Assistant Professor, CSE Dept., CET, MUST
Quantum computers work on the
principles of Quantum Mechanics to
process information in a manner
which is not possible on classical
computers. They can solve certain
mathematical problems
astonishingly fast such as
factorization problem, the difficult
problem, on which the security of
most of the cryptographic
algorithms is based on. Previously, it is thought that Quantum Computers will solve all
the difficult NP-Complete Problems very easily where quantum computers fail
drastically. But it appears by recent critical analysis that for most of the problems they
would surpass classical computers only slightly.
The topics included in the presentation are:
• What is Quantum Computing?
• Quantum Computers Capabilities
• What if Quantum Computers are realized?
• Hardness of a problem
• Complexity Class-P and NP
• What the Quantum can do?
• Qubits
57
ICT for Teaching & Learning
Mr. P. K. Bishnoi
Assistant Professor, CSE Dept., CET, MUST
Information and Communication
Technology played very
important role in many areas of
real life like social media,
medical science, governance and
business etc. One important
application of ICT is education
also. In this lecture of ICT based
teaching learning some specific
tools for class room and online teaching are discussed. ICT tools are for multimedia
contents transmissions and receiving.
This presentation has elaborated the following points:
• Multimedia Contents • Android Marker
• Why Computer? • Droid@Screen
• Test Yourself • Pen Tablet
• Tight Projector • FM
• Cam Studio • I-Spring Presenter
• WebcamXP • Demo…
The presentation begins with the introduction of ICT and its applications in education.
Presentation illustrates about many software and hardware to use ICT in theory classes
and conducting laboratories.
This presentation is not only informative, it demonstrated the many open source software
for class conductions. These softwares are able to provide recorded lectures to the
students at the end of class/lab. So, revisions will not be difficult for students. So many
58
important points of ICT learning are discussed in this presentation like role of multimedia
contents in teaching and learning.
Today, Android is playing an important role in society; presentation included the role of
Android for teaching and learning. It can be used to make electronic black/white board
i.e. Android device can be converted to a teaching board in couple of minutes.
In the concluding part of the presentation, the speaker demonstrated softwares like Tight
Projector, WebcamXP, Cam Studio and I-Springers.
59
Underwater Wireless Sensor Network
Mr. Vikas Raina
Assistant Professor, ECE Dept., CET, MUST
The presentation has conferred
the design and implementation
of Underwater Sensor
Networks (USNs). It has
emphasized on the importance
of underwater sensor networks
for underwater monitoring and
exploration.
The presentation begins with
the introduction of USNs and
continued the elaboration of its different architectures.
The significance of various architectures of USNs has been discussed in accordance with
the requirements of distinct applications and environs. The different scenarios of
monitoring field and the effective implementation of sensors to attain optimum
performance are also discussed. It has deliberated that the appropriate utilization and
deployment of static and mobile sensors are of prime importance to save the battery
power to prolong the network lifetime.
The challenges and opportunities for underwater sensor networks are elaborated in the
presentation. The different methods and techniques to design a waterproof sensor nodes
are discussed which are very important for the designing and implementation of USNs.
Waterproofing can be done by the application of paint, rubber coating and the most
effective method is the application of Nano Protect Spray based on Nano Technology. The
videos of modifying a simple electronic circuit to waterproof electronic circuit have
presented. The utilization of SmartBall® to detect the leakage of gas and oil pipelines has
elaborated with the help of simulation video.
The presentation introduced the new sensors designed to track undersea volcanoes to
timely detect the volcanic eruptions to act proactively to save infrastructures and lives.
60
The video shown has explained the method of deploying these sensors on the hard rocks
present on the sea bed. The project Subnero aiming to design the internet of underwater
things by connecting all electronic devices with each other with the help of wireless
connectivity has been discussed.
The presentation also elaborated that India installs Israeli Under Water Harbour Defence
System to protect Naval Assets.
Finally, the presentation concluded explaining the importance of USNs to implement
seamless connectivity between terrestrial as well as underwater Internet of Things (IoT).
The main objective is to draw the attention of researchers in this area.
61
WSN in Smart Grid
Ms. Jeetu Sharma
Assistant Professor, ECE Dept., CET, MUST
Wireless Sensor Network (WSN) plays a
very important role in the realization of
Smart Grid (SG) having low cost and
multi-functional sensor nodes to monitor
the critical parameters of its components.
The various applications of wireless
sensor network in smart grid are home
automation, real time pricing, power
outages, load control and security
monitoring.
This presentation has elaborated the
following points:
• Introduction of Electric Grid
• Existing Traditional Grid
• Comparison of existing Electric Grid with Smart Grid
• Working of Smart Grid
• Communication Technology used in Smart Gird
• Applications of Wireless Sensor Network in Smart Grid
• Wireless Sensors used in Smart Grid
The presentation begins with the introduction of electric power grid explaining the
mechanism utilized to transmit electricity from generation sites to our home/premises.
The gathering is informed about various demerits of traditional electric grid such as
unidirectional flow of electricity from generation plant to the consumers only, the
generation of electricity is centralized not distributed, the manual detection and
rectification of faults, inability to effectively prevent power theft and many more.
62
The objective of this presentation is to envisage benefits and utilization of wireless sensor
network in various smart grid applications such as residential energy management,
building automation, advanced metering infrastructure, equipment management and
control monitoring, overhead power lines, underground power lines and substations.
In this presentation traditional electric grid is compared to the smart grid on the basis of
electricity flow, power generation, monitoring ability, fault testing, overall efficiency and
environmental pollution.
Many severe blackouts have happened in the different countries including India during
the last fifty years. The presentation also focused on the reason behind these blackouts.
The presentation dealt with the components of real-time wireless sensors used in the
monitoring of transmission lines. It briefly presented different communication standards
used in smart grid so that one can become aware of the best one as per the cost and
efficiency of that communication technology.
In the concluding part of the presentation, the speaker discussed few wireless sensors
used nowadays in monitoring and distribution of electricity in various parts of smart grid.
63
Video Security System
Ms. Suman Nehra
Assistant Professor, ECE Dept., CET, MUST
Technology has made security systems more
affordable, more competent, and more accessible to
everyone. Early security systems were awkward
devices that were hard to install and were very limited
in abilities. As technology advanced, security systems
became smarter and more reliable. Home security
technology has made it virtually impossible for any
danger to approach or make it in your home without
you and the proper emergency response teams knowing about it.
In the presentation the following point are included:
• Electronic Security Devices
• Types of CCTV Cameras
• How do CCTV Cameras work?
• Video Surveillance Basics : System Components
• Camera Characteristics
The bias of the presentation is mainly upon the vedio surviellance systems and their
working.
In the next few slides the detailed discussion is given on Closed Circuit TV (CCTV).
CCTV can act as a twenty-four hour police presence, helping to make the public feel
safer. If used excessively however, the massive increase in the number of CCTV cameras
can lead to an invasion of privacy and violation of human rights.
In the concluding part of the presentation, the speaker discussed about the applications of
CCTV cameras in industry, traffic, transport, home etc.
64
Machine Learning
Dr. S. K. Vasistha
Associate Professor & Deputy HOD, CSE Dept., CET, MUST
Machine learning is a buzzword in the current
technological era. It is a sub domain of
Artificial Intelligence aimed at making
machines learn. Learning capability in
machines is not new and the intent goes back to
the Turing days. However, the renewed interest
of the scientific community in Machine
Learning is driven by the rapid growth in the
hardware capabilities and need to use the huge
amount of data generated over the web and
other media.
The presentation has elaborated the following
points:
• What is Machine Learning?
• The Journey
• Similar Terms
• Types of Learning
• Increasing Relevance
• Application Areas
• Research Trends
• Open Issues and Challenges
• Resources
• Conclusion
The presentation begins with the introduction of Machine Learning. The gathering is
informed about that machine learning can be used to maximize the value of existing data.
The subsequent phases of machine learning have been discussed i.e. how the machine
learning is changing from its beginning to till date.
65
This presentation is aimed at making the faculty aware of the recent trends in Machine
Learning and the avenues available for future research. The speaker explained the
different categorizations of machine learning. The emergence of Big Data, IoT and Cloud
technology has almost made Machine Learning a mandatory discipline.
The speaker concluded his presentation by the future scope of machine learning. In the
future, machine learning will plays an important role in our daily life and takes away the
burden from humans (Who knows?).
66
Introduction to Engineering Materials
Mr. Atul Kumar
Assistant Professor, ME Dept., CET, MUST
The goal of materials science is to
empower scientists and engineers
to make informed decisions about
the design, selection and use of
materials for specific applications.
The properties of a given material
are determined by its structure.
Processing can alter the structure
in specific and predictable ways.
Properties of all materials change
over time with use and exposure to
environmental conditions.
The presentation starts with the history of engineering materials which described
engineering materials starting from Stone Age to today’s exotic materials age with
pictorial illustrations. Then classification & applications of materials are discussed.
The objective of this presentation is to envisage benefits and utilization of properties,
processing and performance of the principal classes of materials.
The presentation dealt with the components of real-time wireless sensors used in the
monitoring of transmission lines. It briefly presented different communication standards
used in smart grid so that one can become aware of the best one as per the cost and
efficiency of that communication technology.
In the concluding part of the presentation, the speaker discussed future of materials
science, design of materials, miniaturization, smart materials, environment-friendly
materials and learning from nature.
67
Bio Sensors
Ms. Suneetha Rikhari
Assistant Professor, ECE Dept., CET, MUST
A biosensor is an analytical
device which converts a
biological response into an
electrical signal. The term
“Biosensor” is often used to
cover sensor devices used in
order to determine the
concentration of substances
and other parameters of
biological interest even where
they do not utilize a biological system directly.
This presentation elaborated the following points:
• Electro Chemical Biosensors
• Optical Biosensors
• Acoustic Biosensors
• Calorimetric Biosensors
• Nucleic Acid Biosensors
• Microbial Biosensors
• Immuno Biosensors
• Applications of Biosensors
The presentation begins with the definition of biosensor explaining the components of a
biosensor with a detailed block diagram.
The objective of this presentation is to give insight knowledge on different biosensors and
their uses.
68
The presentation has focused on some of the following beneficial features a successful
biosensor must possess:
• The biocatalyst must be highly specific for the purpose of the analyses, be stable
under normal storage conditions and, except in the case of colorimetric enzyme
strips and dipsticks, show good stability over a large number of assays (i.e. much
greater than 100).
• The reaction should be as independent of such physical parameters as stirring, pH
and temperature as is manageable. This would allow the analysis of samples with
minimal pre-treatment. If the reaction involves co-factors or co-enzymes these
should, preferably, also be co-immobilized with the enzyme.
• The response should be accurate, precise, reproducible and linear over the useful
analytical range, without dilution or concentration. It should also be free from
electrical noise.
• If the biosensor is to be used for invasive monitoring in clinical situations, the
probe must be tiny and biocompatible, having no toxic or antigenic effects. If it is
to be used in fermenters it should be serializable. This is preferably performed by
autoclaving but no biosensor enzymes can presently withstand such drastic wet-
heat treatment. In either case, the biosensor should not be prone to fouling or
proteolysis.
• The complete biosensor should be cheap, small, portable and capable of being
used by semi-skilled operators.
In the concluding part of the presentation, the speaker discussed about various
applications of biosensors in food technology and medical field.
69
Plagiarism
Ms. Shally Vasistha
Assistant Professor, MCA Dept., CET, MUST
The presentation elaborated that
with the increasing use of internet
for disseminating the knowledge
and pressure to publish more,
plagiarism has become a menace.
There is strong need to educate
people involved in academic
publishing about the challenges
posed by plagiarism and ways to
avoid it. This presentation is aimed
at spreading awareness about
plagiarism and ways to avoid it.
The presentation elaborated the following points:
• Introduction
• Origin
• History
• Reasons
• Types
• Plagiarism Avoidance
• Consequences
• Tools
• Some instances of Plagiarism
The presentation begins with the introduction of plagiarism. The gathering is informed
about the origin i.e. from where this word has been evolved, how this has been included
in English Dictionary and what is the literal meaning of it?
70
The objective of this presentation is to make people aware about different types of
plagiarism and the ways to avoid it. The speaker explained the reasons due to which
someone gets indulged into plagiarism.
The consequences of doing plagiarism have been discussed in the presentation. Also,
brief introductions of the automated tools available to check text plagiarism are given by
the speaker. Some of the famous cases of plagiarism in different walks of life are included
in the presentation.
In the concluding part of the presentation, the speaker emphasized on not to use the
similarity checker blindly. Keep these for assistance, ultimate decision should be taken
by the expert of the field because words are limited.
71
Green Building
Ms. Ritu Tak
Assistant Professor, EE Dept., CET, MUST
Few recent trends in the building
industry have achieved the
momentum that has marked the
growing interest in Green
Building Technology. Advances
in techniques and materials have
made it possible to do what was
unthinkable only a few years ago:
To design buildings that enhance
the environment instead of
exploiting it.
This presentation summarized some of these advances and explains the role that a high-
efficiency, environmentally friendly geothermal or water source heating and cooling
system can play in designing a green building.
Green buildings are designed to reduce the overall impact of the built environment on
human health and the natural environment by:
• Efficiently using energy, water, and other resources.
• Protecting occupant health and improving employee productivity.
• Reducing waste, pollution and environment degradation.
This presentation briefly explained the Leadership in Energy and Environmental Design
(LEED) & Green Building Rating System Program from the U. S. Green Building
Council.
The motive of this presentation is based on this quote ‘Better living for all and future
generations’. With increasing urbanization, natural resources are being utilized rapidly
and erratically without any planning and equivalent replenishment.
72
Presenter briefly explained that, if such a situation continues for long, the disparity in
living conditions will create social upheaval and revolt. Also, future generations will not
have any natural resources. Thus, the dreams of our future will shatter if proper steps are
not taken in time.
The presentation concluded with the brief discussion on the implementation of green
building policies and programs, and highlights the progress made toward a more
sustainable built environment.
The presentation also focused on the past successes and recommendations for future work
that still needs to be done to fulfill the sustainable environment.
73
E-Governance: Exploring the Unexplored
Mr. Somil Jain
Lecturer, CSE Dept., CET, MUST
Electronic-Governance or E-Governance is
the application of Information and
Communication Technology (ICT) for
delivering government services, exchange
of information, communication
transactions, integration of various stand-
alone systems and services between
Government to Citizen (G2C), Government
to Business (G2B), Government to
Government (G2G), Government to
Employees (G2E) as well as back
office processes and interactions within the
entire government framework.
The following points have been considered for discussion in this presentation:
• Introduction to E-Governance
• About National e-Governance Plans (NeGP) and Mission Mode Projects (MMP)
• Success of e-Governance in India
• E-Governance Best Practices
• E-Governance Scalability
• Digital India
The presentation begins with the introduction to E-Governance by explaining what is
governance and how e-governance can act as mediator between good and bad
governance. The gathering is informed about the various benefits of having the e-
governance.
The prime objective of this presentation is to spread the information about the various
services provided under e-governance and how a citizen can be benefitted by using them.
In this presentation, information is given about the various target agents of government
74
service delivery like Business, Citizens and Government itself along with the introduction
of NeGP i.e. National e-Governance Plan which is an important aspect in terms of e-
governance as it is an initiative of government of India to make all the government
services available to the citizens of the country via electronic media.
In the presentation various MMPs i.e. Mission Mode Projects along with their status are
addressed to the gathering, that there are total 44 MMPs are currently running fully or
partially which are owned either by the state government, central government or both in
various sectors like banking, insurance, health education etc. and also the success rate of
e-governance in India. The gathering is also briefed about the Digital India along with its
vision and working model.
In the concluding part of the presentation, the speaker discussed the overall impact and
approximate cost of the various projects in India by 2019.
75
Micro-Electro-Mechanical Systems
Ms. Uma Nirmal
Assistant Professor, ECE Dept., CET, MUST
Over the last decade Micro-
Electro-Mechanical Systems
(MEMS) have evoked great
interest in the scientific and
engineering communities. They are
formed by the integration of
electronic and mechanical
components at micron level. They
have several substantive
advantages: orders of magnitude
smaller size, better performance
than other solutions, possibilities
for batch fabrication and cost-effective integration with electronics and potentially large
reduction in power consumption.
This presentation provides an introduction to these exciting developments of MEMS, the
fabrication technology used and applications in various fields.
The presentation starts with the introduction of Micro-Electro-Mechanical Systems, a
manufacturing technology that enables the development of electromechanical systems
using batch fabrication techniques similar to those used in Integrated Circuit (IC) design
followed by the comparison of Microelectronics with Microsystems.
The objective of this presentation is to introduce the audience with MEMS technology
and its future scope. In addition, it included fields in which MEMS devices are being used
such as Consumer Products, Aerospace, Automotive, Biomedical, Chemical, Optical
Displays, Wireless and Optical Communications and Micro-Fluidics. Current MEMS
devices include accelerometers for airbag sensors, inkjet printer heads, computer disk
drive read/write heads, projection display chips, blood pressure sensors, optical switches,
micro-valves, biosensors and many other products that are all manufactured and shipped
in high commercial volumes.
76
The section of presentation deals with the fundamental fabrication methods of MEMS
including photolithography, bulk micromachining, surface micromachining and high-
aspect-ratio micromachining; assembly, system integration and packaging of MEMS
devices is also described here.
Moreover, the presentation also included the range of MEMS sensors and actuators, the
phenomena that can be sensed or acted upon with MEMS devices, and a brief description
of the basic sensing and actuation mechanisms.
In the concluding part of the presentation, the speaker discussed imprecise fabrication
methods, expensive and complex packaging and CAD Design tool inaccuracies.
77
Data Mining using Weka
Mr. Shivam Pandey
Assistant Professor, CSE Dept., CET, MUST
Weka is a collection of Machine Learning Algorithms for data mining tasks. The
algorithms can either be applied directly to a dataset or called from your own Java Code.
Weka contains tools for data pre-processing, classification, regression, clustering,
association rules and visualization. It is also well-suited for developing new machine
learning schemes.
The presentation starts with the introduction and need of Data Mining Technology with
the following key points:
• Introduction
• Knowledge Discovery
• Examples of Data Mining Applications
• The Data Mining Process
• Why Data Preprocessing?
• Clustering Definition
• WEKA’s ARFF Format
• Data Mining Software
He elaborated the advantages of Weka including:
• Free availability under the General Public License (GPL).
• Portability, since it is fully implemented in the Java programming language and
thus runs on almost any modern computing platform.
• A comprehensive collection of data preprocessing and modeling techniques.
• Ease of use due to its graphical user interfaces.
The presenter concluded the presentation with these points:
• Weka is a comprehensive suite of Java programs united under a common
interface to permit exploration and experimentation on datasets using state-of-
the-art techniques.
78
• The software is available under the GPL from http://www.cs.waikato.ac.nz/~ml.
• Weka provides the perfect environment for ongoing research in data mining.
79
The Pride of Rajasthan: Our Power Generation Plants
Dr. Sanjeev Patwa
Assistant Professor, MCA Dept., CET, MUST
The aim of the presentation is
to feel proud on our power
generation stations; because of
these generation stations we
get uninterrupted power
supply throughout the year
which is a dream of many of
our states.
The presentation is divided
into two main parts:
• The introduction to
electricity.
• The power plants in Rajasthan and their working.
The first part of the presentation is based on the fundamentals of electricity and the
second part provided an introduction to all the power plants of Rajasthan with their
capacity and specifically describes the physical working of Kota Thermal Power Station
with the help of pictures and videos.
The objective of this presentation is to introduce the audience about different power
plants of Rajasthan, their power generation capacity and generation sources.
The presentation emphasized on Kota Thermal Power Station, its working procedure and
main parts such as coal handling plant, boiler, economizer, steam turbine, electricity
generator, wagon tripper, conveyor belt, crusher, ash handling plant, ash disposal and dust
collection plant along with the description of utilization of ash.
In the concluding part of the presentation, the speaker discussed about State-wise all India
allocated power capacity and trend of the growth of energy sources in the world.
80
Safety System in Nuclear Power Plant
Mr. Manish Kumar
Assistant Professor, NST Dept., CET, MUST
Radioactivity is a natural phenomenon and
natural sources of radiation are features of
the environment. Radiation and radioactive
substances have many beneficial
applications, ranging from power
generation to uses in medicine, industry
and agriculture. The radiation risks to
workers, the public and to the environment
that may arise from these applications have
to be assessed, and if necessary, controlled.
The presentation briefly described about
the different safety systems of the Nuclear
Power Plants (NPPs). Safety is accorded
overriding priority in all the activities.
NPPs in India are not only safe but are also
well regulated.
The presenter discussed about the following three basic safety functions in a nuclear
reactors:
• To control reactivity.
• To cool the fuel.
• To contain radioactive substances.
Since, safety in Nuclear Power Plants (NPPs) is often less understood and more talked
about, thus, the objective of the presentation is to share the facts related to it. It also
focuses on different techniques for achieving optimum safety in nuclear plants
81
like Defense-in-Depth and multiple safety systems. These are extended to prevention,
monitoring and action to mitigate consequences of failures.
It also included the design considerations that have a bearing on radiation protection in
NPPs like:
• Proper design, plant layout and adequate shielding.
• Limits of air contamination levels in different zones of the plant.
• Source control by proper selection of materials and components.
• Design limit for collective dose.
Since, safety in NPPs is a very vast subject, however, the presenter tried to summarize it
to the best possible level.
In the concluding part, the speaker discussed about the different passive safety systems.
These types of safety system of a nuclear reactor do not require operator actions or
electronic feedback in order to shut down the reactor in emergency which is safer than
active safety system.
82
Emerging Technologies in Healthcare
Mr. Rajesh Yadav
Lecturer, MCA Dept., CET, MUST
Technology and Health Care
covers the overlapping areas
between physics, engineering,
informatics on the one hand
and human biology, basic
medical sciences, clinical
medicine on the other; and
presents a forum for the
discussion of socio-economic
aspects related to medical
technology.
In the presentation following topics are discussed:
• Search and Mobile Search
• Big Data
• Near Field Communication
• Mobile Diagnostics
• Connected Devices/M2M
• Wireless and Embedded Technologies
• Wellness Apps
The presentation begins with the introduction of technology and its effects in Healthcare.
Technology and Health Care is intended to serve as a forum for the presentation of new
concepts, procedures, and devices associated with the utilization of technology in
medicine as well as their socio-economic impact. As such, it covers all areas of
Biomedical Engineering, in particular: Diagnostic and Therapeutic Procedures and
Devices; Artificial Organs and Implants, Biocompatibility, Bioelectronics and Bio-
83
magnetism, Biosensors, Patient Monitoring, Drug Delivery Systems, Clinical Laboratory
and Laboratory Automation, Efficacy of Diagnostic and Therapeutic Procedures.
The objective of this presentation is to give a knowledge about the technologies are used
in the healthcare field and know how we can be benefited by using those technologies.
In the concluding part of the presentation, the speaker discussed few technologies and
healthcare devices which are available in the market.
84
VLSI Design
Ms. Shruti Suman
Assistant Professor, ECE Dept., CET, MUST
Very Large Scale Integration
(VLSI) is the process of creating
an Integrated Circuit (IC) by
combining thousands of
transistors into a single chip.
VLSI began in the 1970s when
complex semiconductor and
communication technologies
were being developed.
Microprocessor is a VLSI
device. Before the introduction of VLSI technology most ICs had a limited set of
functions they could perform.
The presentation starts with the introduction and need of VLSI Technology elaborating
the following key points:
• VLSI Design Process
• Integrated Circuits and their advantages
• CMOS VLSI Design
• Real Integrated Circuits
• Applications
• Conclusion
The gathering is informed about the different types of ICs and fabrication of solid-state
devices. Also, the reason of using silicon material for fabricating more than 95% of ICs,
the application areas and benefits of VLSI Technology are discussed.
Objective of this presentation is to envisage benefits and utilization of VLSI Technology.
Earlier, we use to make a circuit with discrete components mounted on Printed Circuit
Board (PCB) or Breadboard. Later, the ICs were invented Small Scale Integration (SSI),
Medium Scale Integration (MSI), Large Scale Integration (LSI) and Very Large Scale
85
Integration (VLSI). Current technology has moved far past this mark and today’s
microprocessors have many millions of gates and billions of individual transistors.
The presentation also focuses on an increase in the market and development of ICs. For
that the famous scientist, Gordon Moore, Co-Founder of Intel, predicted that the number
of transistors per chip would grow exponentially and doubles after every 18 months.
At one time, there is an effort to name and calibrate various levels of LSI above VLSI.
Terms like Ultra Large Scale Integration (ULSI) were used. But the huge number of gates
and transistors available on common devices has rendered such fine distinctions moot.
Terms suggesting greater than VLSI levels of integration are no longer in widespread use.
In the concluding part of the presentation, the speaker discussed about how the integration
of ICs improved the design and reduced the costs of devices. It made the device size
smaller and easily available to people.
86
The World of Microwaves
Dr. Rajeev Pourush
Assistant Professor, ECE Dept., CET, MUST
Over the past several
decades, there has been a
growing trend towards the
use of microwave technology
and its application to both
military and civilian areas. In
military applications it has
played a key role by its use in
surveillance, Radio Detection
and Ranging (RADAR) and for civilian purposes it has greatly helped in the expansion of
mobile and satellite communication facilities.
The title of the presentation is “The world of Microwaves”. The objective of the
presentation is to provide the general awareness among the audience regarding the
concept of high frequency waves, their properties and various applications like mobile,
satellite and Radar communication and in domestic applications such as cooking in
microwave oven. The safety criterion which we should keep in our mind while operating
the microwave oven is also discussed in detail.
In the next few slides the detailed discussion is given on the topic like vacuum tubes, low
and high power microwave sources. Various types of transmission lines used at different
frequency ranges are presented. The working concept and the applications of various
transmission lines depend upon the operating frequency and these can be changed
immensely as the frequency changes.
Following important points are discussed in the presentation:
• The basic concept of high frequency waves.
• The difference between high and low frequency rules.
• The sources of power at low frequency.
87
• The power sources at high frequency.
• The transmission line at high frequency.
• The working of microwave oven.
• Microwave for communication.
• Microwave for medical treatment.
• Microwave for RADAR.
• Future uses of Microwaves.
In the concluding slides, the future uses of microwaves, their limitations and challenges
are discussed.
88
Automation in Software Testing
Mr. Manmohan Sharma
Assistant Professor, CSE Dept., CET, MUST
Every software development
group tests its products, yet
delivered software always has
defects. Test engineers strive to
catch them before the product is
released but they always creep
in and they often reappear, even
with the best manual testing
processes. Test Automation
Software is the best way to
increase the effectiveness, efficiency and coverage of software testing.
In this presentation the following points are elaborated:
• Definition of Software Testing
• Reason for Testing
• Types of Testing
• Automation Testing
• Advantages and Disadvantages of Automation
• Automation Tools
The presentation begins with the need of Testing in Software Development. Software
Testing is an essential phase of the software development life cycle. Testing is the only
way to insure the reliability of the software. The presentation described various types of
manual testing techniques.
The main objective of this presentation is to show the importance of software testing. In
the presentation, there were a number of examples that stressed upon the need of testing
for common people. Manual testing is a rigorous process so the presentation also insights
into automation testing.
89
The presentation also included some videos that showed the way to do automated testing.
It included tools configuration information and how to build and run test cases in
Selenium and J Meter tool. Both these tools are generally used for automated testing and
are free of cost available.
90
Impact of E-Waste in Global and Indian Scenario
Dr. Ajay Kumar Singh
Assistant Professor, CSE Dept., CET, MUST
Growth of the waste of electrical and
electronic devices is creating serious
health hazards, unless and until it is
controlled, the reaction out of this
would cause infection which would
create a lot of difficulty to the society.
The major problem that the human
race is facing now is the effects of the
E-Pollution caused by the waste of
electrical and electronic components.
So, there should be a rule to prevent
the people from damaging the
ecosystem of our country to save
nature as well as to save people.
The following points are considered for discussion in the presentation:
• E-Waste and Categorization
• Global Statistics
• Composition of WEEE
• Problems
• E-Waste Scenario in India
• Growth of E-Waste in India
• E-Waste Trade
• Flow of E-Waste
• Recycling Scenario in India
• Informal Recycling
91
• Management and Disposal Options
• E-Waste Management Rules and Policies of Government of India
The presentation starts with the formal introduction, definition, categorization and
composition of E waste followed by global and Indian statistics. The presentation
emphasized on the causes and impact of electronic waste on the environment and human
beings. Exponential growth of generation of E-Waste apparently shows that if we do not
take necessary steps to reduce or recycle E-Waste, our next generation is going to be
affected adversely.
The main goal of the presentation is to create the awareness about the subject matter in
society and how to save the environment from hazards of E-Waste. Most of the electronic
devices are made up of iron, non-ferrous, plastic, fiber, glass and plastic components.
Some of the component materials are highly toxic and non-recyclable.
This presentation also discussed about the recycle scenario in India. Various formal and
informal organizations are involved in the recycling process of E-Waste. The informal
process of recycling of electronic waste material causing numerous infections, diseases
to millions of people and children involved.
At the last part of the presentation, energy intensive down cycling processes to more
mature processing systems is discussed. This can be largely achieved through reuse and
refurbishing. The most encouraging methods of E-Waste management schemes are
reducing, reusing and refurbishing of electronic waste. The initiatives taken by
Government of India specifically Digital India and Swachh Bharat mission are playing
important role in controlling of handling of E-Waste.
92
Wireless Body Area Network
Mr. Deepak Sethi
Assistant Professor, CSE Dept., CET, MUST
Wireless Body Area Network
(WBAN) became a prominent
technology to monitor the health care
conditions. It consists of various tiny,
low powers, lightweight,
invasive/non-invasive sensors that are
placed on/in or near the body to sense
the various physiological symbols of
the body like temperature, heartbeat,
blood pressure, ECG, EEG etc. The
old and disabled persons are benefited
by WBAN, because they don’t need to
travel for a checkup. It also reduces
the gathering of patients in hospitals. So, WBAN reduces the aging and population
problem in hospitals by capturing the sensed data through network periodically.
This presentation has elaborated the following points:
• Introduction to WBAN
• WBAN Applications
• Hardware Architecture of WBAN
• Types of Sensors used in WBAN
• Types of Communication in WBAN
• Advantages of WBAN
• Challenges in WBAN
The presentation begins with the introduction to WBAN. After introduction, the speaker
discussed and showed videos to elaborate the applications of WBAN in medical as well
as non-medical field such as sports and military for security purpose, music and many
more. After that, hardware architecture, types of sensor node and communication ways
93
are discussed. Since, each and every technology comes with few challenges. WBAN have
the following types of challenges:
• Signal and Path Performance
• Sensors with Limited Power Capacity
• Applicable for few meters
• Invasion of Privacy
At last, the speaker concludes its presentation by discussing that, WBAN is a very useful
technology used in various fields. It improves the quality of life through continuous
monitoring and transmitting the sensed data to the specified location on time.
94
Energy Storage
Mr. Thoudam Paras Kumar
Assistant Professor, EE Dept., CET, MUST
The idea being that energy
storage can save the utilities and
their customers by eliminating
the need for expanding new
transmission lines and
infrastructure. By nature, energy
storage is able to provide backup
power when grid power is lost, a
characteristic that is of great
interest to residential customers
as well as business owners.
This presentation has elaborated the following points:
• What is Energy?
• Types of Energy
• Energy conversion or transformation process
• Resources of Energy
• Uses of energy in different applications
• Significance of Electricity
• What is energy storage?
• Need for energy storage
• Different types of energy storage
• Applications of energy storage
The presentation begins with the introduction of energy and went on to elaborate different
types of energy and its transformation process taking place in the conversion of energy
from one form to another form followed by different sources of energy available and their
applications. The presentation went on to emphasize the area of energy storage. What is
the significance of electricity is explained with some examples and also explained the
95
need of the storage systems or devices in day to day time for necessary and comfortable
living.
Further elaboration is done on the methods available and system to store energy naturally
or artificially at the present state and this is illustrated with examples which include the
applications of various storage systems.
The prime objective of the presentation is to revisit the knowledge learnt about energy in
preliminary classes and inform the people about the different systems available to store
energy which also gives the insight information of the latest storage technologies
developed and concluded with the necessity of extensive research in the energy storage
devices as all the energy generated cannot be stored in bulk to supply continuous energy
even to a small locality.
96
Introduction to Gyroscope and its Effect
Mr. Mukul Kant Paliwal
Assistant Professor, ME Dept., CET, MUST
A Gyroscope is a device for
measuring or maintaining
orientation, based on the
principles of Conservation of
Angular Momentum.
Mechanical gyroscopes
typically comprise a spinning
wheel or disc in which the
axle is free to assume any
orientation. This orientation changes in response to an external torque and due to large
angular momentum associated with the disc high rate of spin and moment of inertia.
This presentation has elaborated the following points:
• Gyroscope
• Properties of Gyroscope
• Principle of Gyroscope
• Gyroscopic Couple
• Gyroscopic effect on an Aeroplane
• Gyroscopic effect on the Naval Ship
• Applications of Gyroscopes
The presentation starts with the introduction of simple Gyroscope and explaining the
principles of conservation of angular momentum. Gyroscopic couple is defined as,
whenever a rotating body changes its axis of rotation, a couple is acting on a rotating
body. These couples are known as Gyroscopic Couples.
The objective of this presentation is to understand the effects of gyroscopic couple on an
aeroplane, naval ship, four wheeler and two wheeler.
97
The presentation deals with the basic gyroscope principle which effect on automotive,
aerospace, naval and electronic industry. A small version of a gyroscope some
amusement parks feature gigantic gyroscope rides which could be an exciting experience
for the adrenaline junkies and a terrifying one for others. Amusement gyro rides feature a
huge gyroscope-like structure which spins in all directions giving the riders a feeling of
weightlessness.
In the concluding part of the presentation, the speaker discussed about the application of a
gyroscope in various fields and latest technologies which have introduced gyroscopic
effect on the automotive industry.
98
Magnetic Levitation “Driving Without Wheels, Flying Without Wings”
Mr. P. K. Bhatt
Assistant Professor, EE Dept. CET, MUST
Conventional wheeled trains are
powered by diesel or electric
locomotives. They run on rails at
speeds lower than 200 km/h. In
conventional wheeled trains, a
considerable amount of energy is
wasted due to the friction between
the wheels and the rails. The friction
also causes the wheels and rails to
wear out. In addition, the friction
between the rails and the wheels limits the speed that the trains could achieve. Maglev
technology is a high-speed train technology, which tries to address these challenges with
relatively less maintenance.
This presentation has elaborated the following points:
• Introduction
• Magnetic Levitation and Levitation Principle
• Applications of Magnetic Levitation
• Evolution of Maglev Trains
• Technology and working of Maglev Trains
• Existing and proposed Maglev systems in various countries
• Indian Scenario
• Future work and advanced applications of Magnetic Levitation Technology
The presentation begins with the introduction of Magnetic Levitation, the technique used
in Maglev Trains. The audience is informed about this new version of bullet trains or
high-speed trains and concerned technology. Maglev Trains are very different from
99
conventional trains as well as high-speed wheeled trains. They are levitated, propelled
and guided by magnets.
The objective of this presentation is to envisage benefits and utilization of Maglev Trains
such as the friction, energy consumption and the noise production are almost zero as they
run on elevated guide ways. Maglevs have already led to a highly energy efficient and
comfortable version of high-speed trains. Unlike wheeled systems, Maglevs do not need
maintenance frequently because the wheels and the rails do not wear out.
The presentation also deals with the proposed Maglev systems in various countries
including India.
In the concluding part of the presentation, the speaker discussed about the future work
and advanced applications of Magnetic Levitation Technology.
100
Climate Smart Agriculture
Mr. Ajay Kumar
Assistant Professor, CSE Dept., CET, MUST
In the present era, climate
change has brought out new
and difficult challenges. They
need careful understanding of
its impact and way-out.
Farmers need to understand
them and adapt to the new
strategy. This is difficult, but
not insurmountable task.
However, this will need
considerable efforts on the part
of all stakeholders. Challenges are of diverse nature and are un-predictable, but with the
experience of our farmers and expertise of our scientists, it is possible to make agriculture
smarter.
This presentation has elaborated the following points:
� Introduction
� History of Climate Smart Agriculture (CSA)
� Indian Scenario
� Area of Climate Smart Agriculture
� Water Cycle
� Soil Management
� Livestock Management
� Weather Forecasting
� Support Activities
� Safety Nets to Farmers
� Summary
The presentation begins with the introduction of Climate Smart Agriculture (CSA)
explaining its need and sustainable development which has well-known implications. The
101
listeners are made aware about the history of CSA and various aspects and scope of CSA
in Indian perspective.
The objective of this presentation is to discuss about CSA and its benefits for the farmers
and other stakeholders talking about various areas of CSA like Water cycle, Soil
management, Livestock management and Weather forecasting.
The presentation also enlightens about the various support activities available and
provided at different levels with the government support by the officials, experts and the
proper training and guidance is made available by the scientists.
Finally, the presentation concluded with the information about backup plans or safety nets
for the farmers or workers in case of any severe condition or natural calamities. The
conclusion also discussed about the various upcoming plans at different levels and
possible financial supports to the farmers.
102
Distributed Computing
Dr. Vinod Maan
Assistant Professor, CSE Dept., CET, MUST
The field of distributed
computing covers all the
aspects of computing and
information access across
multiple processing elements
connected with any form of
communication network. It is
a form of parallel computing,
but parallel computing is most
commonly used to describe
program parts running
simultaneously on multiple processors in the same computer. Both types of processing
require dividing a program into parts that can run simultaneously, but distributed
programs often must deal with heterogeneous environments, network links of varying
latencies and unpredictable failures in networks.
This presentation has elaborated the following points:
� Introduction of Distributed Computing
� Distributed Algorithm
� Types of Distributed Algorithm
� Applications of Distributed Computing
� Conclusion
The presentation starts with the introduction of distributed computing with some common
properties such as fault tolerance, each node play partial role, resource sharing, load
sharing and easy to expand.
Distributed computing is implemented with the utilization of distributed algorithms.
Distributed algorithm is an interconnected collection of autonomous processes. These
103
algorithms run on the hardware consisting of many interconnected processors, run
concurrently and independently, and supposed to function properly even if processors or
channels operate at different speeds, or even if some of them fail. These algorithms are
useful for information exchange, resource sharing, and parallelization, to increase
performance, replication to increase reliability; well they are used in multicore
programming.
The presentation deals with the various models of distributed algorithms (synchronous
and asynchronous distributed algorithms) with complexity measures. Distributed
algorithms are based on message passing model so these are best choice for channel
allocation in wireless networks with channel reuse.
In the concluding part of the presentation, the speaker discussed one of the application i.e.
Weather Prediction.
104
The Myth: “Deep Web and Dark Web are Same”
Dr. Uma Kumari
Assistant Professor, CSE Dept., CET, MUST
Deep web is the web that is
not publicly available and
that has restricted access such
as bank accounts, E-mail ID,
Facebook accounts and
private albums. On the other
hand, dark web is the web
that can only be accessed by
the browsers such as Tor and
I2P. This is a very small part
of the internet, about 0.03%,
but, this has lots of traffic. Most of the illegal activities happen in dark web such as
hacking, selling and buying of drugs, weapons and many more. Deep Web and Dark Web
are totally different, but most of the people believe that both are same. This presentation
is an attempt to clarify this myth.
This presentation considered following points:
� Introduction to Deep Web and Dark Web
� Deep web and Dark web percentage in WWW
� Timeline of Deep Web
� Myths about Dark Web
� Facts about Dark Web and Deep Web
� Tor and its security features
� PGP and Bitcoin
The presentation begins with the introduction of surface web contents which are
accessible to conventional search engines using web crawlers or spiders. Presenter
provided information about history of deep web followed by its difference with dark web.
Presenter conferred the myths about dark web such as it is too scary to access it, only
105
criminals use it and you will get arrested to access it. Facts about myths were provided to
the gathering. Tor security is discussed in detail and its encryption and decryption
mechanism as well. Pretty Good Privacy (PGP) encryption and decryption mechanism is
enlightened.
Reason of dark websites like silkroad shutdown and alphabay emergence is discussed.
Deep web is legal to access but buying or selling at dark websites is illegal.
In the concluding part of the presentation, the speaker briefed that freedom is the state of
being capable of making decisions without external control; therefore it’s our duty to use
it wisely.
106
Engineering Education in India
Dr. Prateek Bhanti
Assistant Professor, MCA Dept., CET, MUST
Engineering education in
India has started to generate
professionals in the field of
surveying, irrigation and
civil construction. Since
1840, there is continued
growth in the quality and
number of institutes
imparting engineering
education. In the
presentation, the speaker
shared his knowledge about the history of engineering colleges in India. The gathering is
informed about various government initiatives which may likely to increase the demand
of engineering professionals in near future. Serious concerns are raised over low
employability of young engineering graduates across the country in the last few years.
The speaker is interested in finding out what current engineering students could do to put
themselves on the fast track to career success. In the second part of the presentation the
speaker elaborated best tips, most of which would work for any career-aspiring
engineering student. The teaching fraternity of CET is advised to tell students about the
importance of networking with people, developing portfolio, informal leadership,
communication skills and many more. A powerful message about Teamwork is given
with the help of a beautiful & inspiring video. Hard skills are certainly the bread and
butter of an engineer, having said that the soft skills are becoming increasingly valuable
in order to excel in today’s workplace.
In the concluding part of the presentation, the speaker discussed a few qualities which an
engineering student should possess, to put themselves on the fast track of success in the
profession. The presentation ended with a vote of thanks to engineers around us.
107
Information Security: Quantum Cryptography
Dr. Anand Sharma
Assistant Professor, CSE Dept., CET, MUST
In this era of information technology,
the need for security has attained
paramount importance. As most of our
sensitive information is stored in
computers, the need for data security
becomes increasingly important.
Protecting this information against
unauthorized access is therefore a major
concern for both operating systems and
users alike. Cryptography is one such
method of safeguarding sensitive data
from being stolen or intercepted by
unwanted third parties. Cryptography
has been a valuable, essential tool for defensive computer security.
This presentation has elaborated the following related points:
� Classical Cryptography
� The Problem
� Security Attacks
� Security Requirements
� The Solution
� Cryptography
� Symmetric vs Asymmetric Key Cryptography
� Secret Key Cryptography
� Public Key Cryptography
� Quantum Cryptography
� Basic Principles
� Conventional Model
� Quantum Key Distribution
108
� Commercial QKD Providers
� Classical vs Quantum Cryptography
� Conclusion
The presentation begins with the problem statement regarding the information security
system. Then the solution for this problem is described as cryptography. The gathering is
informed about the various types of cryptography such as public key cryptography and
private key cryptography.
Then the concept of quantum cryptography is introduced to the audience. In this section,
the speaker described the basic principle of quantum cryptography, then the conventional
model for the same. The quantum key distribution methods are also elaborated in front of
an audience. BB84 Protocol is explained with suitable example.
After it the classical cryptography is compared with quantum cryptography with respect
to merit and demerit of both the cryptographic systems. The presentation also presents the
list of worldwide commercial QKD Providers.
In the concluding part of the presentation, the speaker discussed about the quantum
cryptography developments with respect to the implementation and the adequacy of
current cryptographic methods.
109
Peak Load Power Demand Management in India
Dr. Sudhir Y. Kumar
Associate Professor & Head, EE Dept. CET, MUST
The advances in industries,
development in agriculture and
infrastructure is dependent on
the power sector, which
enhances the economic
development of a country. The
consumption of electricity is
practically synonymous with
modern life in the
industrialized world. It is
forecasted that the electricity
requirements in India would increase rapidly in the next couple of decades. With
continued growth in the power sector, the gap between consumption of power and its
generation is growing every year, so the management of peak load power demand is
becoming crucial.
This presentation has elaborated the following points:
• Need of Energy
• Energy Scenario in India
• Peak Load Power Demand Status
• Total installed Power Capacity in India/World
• Consequences of gap between supply & demand during peak hours
• Solution Methodology/Strategies to fill the gap between supply & demand
• Problems formulation/optimization for increasing the generation capacity
110
The presentation begins with the introduction of peak load power demand status in India
by explaining the current energy scenario & trends to utilize electricity from various
sources. The gathering is also informed about various demerits of traditional methods of
generating the electrical energy.
The objective of this presentation is to envisage benefits and utilization of renewable
energy for various applications/consumers. This IFDP presentation also emphasizes on
various aspects of optimum allocation of the various renewable energy options to meet
the peak load demand at the regional level of India, based upon the application of a linear
programming algorithm considering geological profiles, potential of various renewable
energy sources such as small hydel power, power extracted from solar photovoltaic, wind
power, co-generation and biomass energy.
The presentation deals with the optimization process for maximizing the generation of
energy by discussing the computational results obtained on power generation by
renewable resources is quite suitable to meet the peak load power demand and in fact
some of the regions have the potential, which can be transferred to the other regions
utilizing the existing transmission line network in India.
In the concluding part of the presentation, the speaker discussed about the methodology
used and scope to meet the gap between supply & demand and transferring the surplus
energy through the grid to the other regions of the country.
111
Big Data & Hadoop
Ms. Priyanka Dahiya
Lecturer, CSE Dept., CET, MUST
Earlier understanding of the
historical chain of events was
viewed as knowledge, but
now its meaning has turned
into being a capability to
predict and influence the
future, including the ability
to diminish negative future
outcomes and enhance
positive ones. In one of its
emerging forms, this science
is known as Big Data. Applications of big data analytics are everywhere: Smarter
Healthcare, Finance, Log analysis, Traffic control, Telecom, Manufacturing, Homeland
and Security, Trading analytics, Fraud and Risk.
This presentation has elaborated the following points:
� Introduction to Big Data
� Characteristics of Big Data
� Applications of Big Data
� Hadoop and its core components
� Limitations of Hadoop
� Job Opportunities
� Research Area
The presentation begins with the introduction and characteristics of big data. The
gathering is informed about from where and who are generating the data. How the people
are generating big data in various social media like Facebook, Twitter, Instagram and
112
many more. The importance of big data lies only when it is properly analyzed using big
data analytics.
The objective of this presentation is to envisage benefits and utilization of big data
analytics, its applications in e-governance projects, job opportunities in the companies
and area of research in big data. In the next part, big data new framework Hadoop and its
components were explained. In this presentation, Hadoop 1.x and Hadoop 2.x are
compared.
In the concluding part of the presentation, the speaker discussed about few Indian
companies that handle big data and discuss the job opportunities in these companies.
113
Coordinator Note
The notion of organizing Internal Faculty Development
Program (IFDP) has originated from the belief of Dr. V. K.
Jain, Dean, CET that the knowledge and experience of
faculty members of CET should be shared with each other.
The intent is to enhance the interdisciplinary knowledge of
faculty members by sharing the information regarding the
methodology adopted for effective teaching and learning.
Faculty Development Programs (FDPs) have proven to be
successful for improving teaching skills in higher
education. It tackled why FDP is important, history of FDP in the past years, and
questioned whether FDP produced any positive effect on students’ academic achievement
as well as the different methods to assess FDPs effectiveness. Yet few studies have
systematically explored how a Faculty Development Program can impact the way that
faculty experience or conceive of teaching. It is observed that IFDP produces promising
outcomes in the learning and teaching practices. It is highly commendable that teachers in
higher education should attend FDP training activities on regular basis and that the scope
of intended FDPs should spread further than the health, professions and discipline, to
include social skills necessary for collaboration, professional growth as well as
management, and leadership abilities. Finally, I want to thank Dr. V. K. Jain to have
confidence in me by giving an opportunity to organize such an enlightening program.
Jeetu Sharma
IFDP Coordinator