tech niyati - gvpcew.ac.ingvpcew.ac.in/college magazines/tech niyati... · for gayatri vidya...

34

Upload: others

Post on 04-Aug-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Tech Niyati - gvpcew.ac.ingvpcew.ac.in/College Magazines/Tech Niyati... · for Gayatri Vidya Parishad College of Engineering for Women, I am jubilant to meet you through this page
Page 2: Tech Niyati - gvpcew.ac.ingvpcew.ac.in/College Magazines/Tech Niyati... · for Gayatri Vidya Parishad College of Engineering for Women, I am jubilant to meet you through this page
Page 3: Tech Niyati - gvpcew.ac.ingvpcew.ac.in/College Magazines/Tech Niyati... · for Gayatri Vidya Parishad College of Engineering for Women, I am jubilant to meet you through this page

Tech Niyati | April 2017 | 1

Tech NiyatiContents

Tech Niyati

4

7

11

13

16

21

24

26

27

28

29

30

Cover StoryFinTech: A Brief Introduction

Invited ArticleGlobal Technology Trends for 2017Dr. Sitarama Brahmam GLead, Emerging Technologies Group,IP &E Unit, Tata Consultancy Services Ltd.,Hyderabad

Invited ArticleThe Scientific World is Calling You!Professor G. P. Raja SekharDepartment of Mathematics,IIT Kharagpur

ArticleAre we sure that we are Earthians Prof.Dr. B. S. Murthy

ArticleSecure Multiple Routing ConfigurationFor Network RecoverySri S.Sumahasan

ArticleSecurity in Cloud ComputingMs. V. A.Gowtami

Know a ScientistJohn von Neumann

Trending NewsPolymer - Based Transistors Bring Ful lyStretchable Devices Within Reach

Graphene Could Buttress Next-Gen ComputerChip Wiring

At-Home Electric Headband For DepressionCould Go Mainstream

Trending ArticleAchieving a 100% Renewable Grid

Faculty DevelopmentOur Experiences @ IIT KanpurA.S.V. Vijaya Lakshmi,D. Srinivas Reddy

Technotsav-2K17College Event

Alumni Speak

Page 4: Tech Niyati - gvpcew.ac.ingvpcew.ac.in/College Magazines/Tech Niyati... · for Gayatri Vidya Parishad College of Engineering for Women, I am jubilant to meet you through this page

Tech Niyati | April 2017 | 2 www.gvpcew.ac.in

Dear Reader,

As I embark upon my journey as the third Principalfor Gayatri Vidya Parishad College of Engineeringfor Women, I am jubilant to meet you through thispage. Tech Niyati is a driving force for the studentsand faculty at GVPCEW to be proactive towardslearning. As we try to prepare the students alwaysto "think and review" so as to discover the causeand effect of every event, would surely reveal thehidden talents of the academic fraternity. It givesme immense pleasure to encapsulate yet anotheroccasion of success. I congratulate every one whoendeavours towards our cherished motto ofempowering the students for all rounddevelopment through technical education.Thorough acquisition of knowledge fringed withskills required and character building is our promiseby providing necessary resources and resourcefulintelligentsia ensuring expected settlement.

The call of the time is to progress, not merely tomove ahead. Quality education depends mainly onperformance of the students in academics, sportsand cultural activities along with maintaining highvalues and ethics. I take pride to say that ourstudents do well in all aspects. Our progressive

Principal’s Message Prof. E.V. PrasadFrom : Principal’s Desk - [email protected] : 4th April 2017

management looks forward and wishes that ourinstitute raises to the occasion by standing in theprivileged front row. Steps are being taken in thisdirection and fruits of these efforts will be sharedby our students in the near future.

Vision is strong ; the dream comes true only throughgrit, determination and devotion. I bless all theyoung aspirants to strive hard, use synergy to reachparamounting position in your desired path. Realizethe immanent strength; never leave any stoneunturned in the path of learning and gaining.

I am a staunch believer that the actions speak morethan the words and that everybody must keep hispromises to discharge duties as a responsible personof the society.

At this juncture let me quote lines of inspirationfrom Robert Frost:

"The woods are lovely, dark and deep. But I have promises to keep, and miles to go before I sleep"

My best wishes to all

Prof. E.V. Prasad

Page 5: Tech Niyati - gvpcew.ac.ingvpcew.ac.in/College Magazines/Tech Niyati... · for Gayatri Vidya Parishad College of Engineering for Women, I am jubilant to meet you through this page

Tech Niyati | April 2017 | 3

Dear Reader,

The encouragement given to the first issue of Tech Niyati by the Management,Faculty and Student fraternity was overwhelming. We thank them for themotivation and encouragement. The primary goal for Tech Niyati team is to ensurethat, it has a broad set of articles, that are of wide interest to the scientificcommunity and that these articles are all understandable, and readable by everyundergraduate student, whatever their specialization may be.

The editorial team is constantly on the lookout for the potential new articles. Anapproach we have adopted in looking for ideas is to consider articles by recognizedindividuals from institutes of repute. We find that this is often a great source ofinspiration. In this issue we have articles by Dr. Rajasekhar, Professor, IIT Kharagpurand Dr.SitaramaBrahmam G, Lead, Emerging Technologies Group, IP & E Unit, TCS,Hyderabad. We thank both of them for readily accepting our invitation to contributeto the magazine. This issue has regular and invited article that cover the broadestrange of disciplines.

In this issue of Tech Niyati, we have regular articles by our own faculty that providesscientific and engineering information on varied disciplines for the professionaldevelopment of our students in general. The Trending News and Article sectionsare chosen based on the current trends in various fields of engineering. All thisand more has been written and placed in the next few knowledge pages.

Finally, we look forward to receive the feedback, contribution, suggestions fromour esteemed readers at [email protected]

We wish you a happy reading

Editorial Team

Editorial WeFrom : Editor’s Desk - [email protected] : 1st April 2017

Page 6: Tech Niyati - gvpcew.ac.ingvpcew.ac.in/College Magazines/Tech Niyati... · for Gayatri Vidya Parishad College of Engineering for Women, I am jubilant to meet you through this page

Tech Niyati | April 2017 | 4 www.gvpcew.ac.in

Cover Story Dr. A. Suseelatha* and Dr. G. Sudheer**

* Assistant Professor, BS & H Department** Professor & Vice Principal

Given the global scale of the banking industry, theinterdependence between finance and technologyhas also grown steadily because InformationTechnology (IT) has facilitated the harnessing ofeconomies of scale. In order to strengthen their fastgrowing operations and adapting themselves to moreefficient technology frameworks, banks have beenthe front runners in IT spending. Notwithstanding,today's digitalization shift has revealed that mostbanking systems still need drastic reforms and leavethe industry exposed to unexpected competition:FinTechs.

Financial Technology - FinTech for short - describesthe evolving intersection of the financial services andtechnology sectors. The term basically refers totechnology focused start-ups and new marketentrants who innovate the products and servicesprovided by the traditional financial services industry.These companies are imposing themselves againsttraditional models by using digital technology as aweapon to tear down the barriers of entry andpotentially change the whole industry. The theory ofinnovation can provide the mindset to explain thetransformation at play by revising, and helping tounderstand, the most common reasons that leadfinancial companies to go out of business or adaptthemselves to the change.

There are several players in a FinTech ecosystem andall these players are in motion, moving towards eachother over time. The players include well-establishedfinancial institutions, big technology companies thatare active in the financial services space but notexclusively, companies that provide technology tofacilitate financial services and start-ups focused ona particular innovative technology/financial process.The first issue is that the motive for the marketplayers to get involved in the formation of a commonsolut ion is, for various reasons, obscured. Themajority of financial institut ions, when facingregulatory obligat ions, undertake cost/benefitanalyses to locate the most efficient approach tocomply with each party's regulation. This has led to

the rise of younger sibling RegTech of FinTech.RegTech could provide a platform that takes away thepain, but could well require revolutionizing the wayregulation is developed and implemented. FinTechand RegTech should go hand in hand in utilizing thetechnological and scientific innovations that can helpthe f inancial services industry rise up to theexpectation of the customer. We intend to introducethe Engineering graduate to this platform oftechnologies where he/she has to learn/upgrade inorder to be a part of the FinTech revolution.

It is generally opined that one of the most concreteways to move forward in implementing a FinTechstrategy is to put executives with strong technologybackgrounds in leadership positions. Most of theexperts in the financial services and technologysectors agree that Big Data and Analytics will have animpact on their business and operating models byhelping them improve the customer experiencethrough more personalized service. For this, thetechnologies having strategic importance are CloudComputing, Automated Advisory Solutions, Internetof Things and Block Chain Technology.

Of these, Block chain is one of the most talked - aboutand rapidly expanding technology in the FinancialServices (FS). The technology provides a number ofbenefits to the FS industry that include simplifiedecosystem via common ledger, security from fraudand tampering of records, decentralized andtransparent operations, increased speed and low costof operations. A B lock chain is essentially adistributed database of records or public ledger of alltransactions or events that have been executed andshared among participating parties. Each transactionin the public ledger is verified by consensus of amajority of the participants in the system. And, onceentered, information can never be erased. The Blockchain contains a certain and verifiable record of everysingle transaction ever made. According to MarcAndreesen, the doyen of Silicon Valley's Capitalists,the block chain distributed consensus model is oneof the most important inventions since the birth ofthe internet itself.

FinTech: A Brief Introduction

Page 7: Tech Niyati - gvpcew.ac.ingvpcew.ac.in/College Magazines/Tech Niyati... · for Gayatri Vidya Parishad College of Engineering for Women, I am jubilant to meet you through this page

Tech Niyati | April 2017 | 5

From a technical point of view, the block chain is aninnovation relying on three concepts: peer-to-peernetworks, public-key cryptography and distributedconsensus based on the resolution of a randommathematical challenge. It's their combination that

allows a breakthrough in computing strategy. Theconcepts of advanced cryptography, customnetwork protocols and performance optimizationsare all too sophisticated to be redeveloped eachtime a project needs a block chain. Fortunately,there are several open-source block chainimplementations of which Ethereum, Hyper ledgerare widely used. However "eris" is the firstapplication platform built to provide a logical basefor developers and DevOps to build, test and runecosystem applications with a block chain backend.The tutorials and explainers available at https://monax.io (the company behind eris) is a resourcefulstart ing point for an overview of block chaintechnology.

The Block chain technology is finding application ina wide range of areas - both financial and non-financial. The applications of block chain technologyand their implementation are illustrated in thefigure.

The technology has potential to become the newengine of growth in digital economy where we areincreasingly using internet to conduct digitalcommerce and share our personal data and lifeevents.

The crypto currency Bitcoin is the most popularexample that is intrinsically tied to Block chaintechnology. The term 'Bitcoin' is an overloaded wordand can mean several things

1. The protocol: The protocol is the specificationof how to construct the distributed database(the Block chain), how to parse it , howtransaction should be assembled, etc…

Page 8: Tech Niyati - gvpcew.ac.ingvpcew.ac.in/College Magazines/Tech Niyati... · for Gayatri Vidya Parishad College of Engineering for Women, I am jubilant to meet you through this page

Tech Niyati | April 2017 | 6 www.gvpcew.ac.in

2. The network: This is a peer-to-peer network towhich nodes connect. Nodes in this peer-to-peernetwork exchange messages containing newblocks being added to the Block Chain and newtransactions being published.

3. The currency: A Bitcoin, usually spelled withlowercase 'b' is a unit of the native currency ofthe Bitcoin network.

4. The open source implementation: This is theoriginal open source project, written in C++,implementing the protocol. The project wasrebranded to Bitcoin Core.

In essence, Bitcoin is an Application ProgrammingInterface (API) for money/value and Bitcoin thecurrency is an application. Bitcoin could be used as aprotocol on top of which applications can be builtand has the potential to become a platform forfinancial innovation as illustrated through Blockchain Technology.

Educational institut ions can help in thetransformation of the finance industry by laying the

academic and mathematical foundations for the useof Fintech in the area of Algorithmic Strategies, RiskManagement and Investment Banking.

References[1] Paolo Sironi, FinTech Innovation: From Robo-

Advisors to Goal based Investing andGamification, Wiley, 2016.

[2] The World F i Tech Report 2017, https://www.capgemini.com/the-world-fintech-report-2017.

[3] Blurred Lines: How FinTech is shaping financialservices, www.pwc.com/fintech report, 2016.

[4] M.Crosby, Nachiappan, P.Pradhan, S. Verma, V.Kalyanaraman, Sutardja, Center forEntrepreneurship & Technology technicalReport, University of California Berkeley, 2015.

[5] Daniel Simpson, RegTech: the seeds of revolutionare sewn, 2017, https://regtechfs.com.

[6] Pedro Franco, Understanding Bitcoin, WileyPublishers, 2015.

[7] Francois Zaninotto, https://marmelab.com/blog/2016/04/28.

Page 9: Tech Niyati - gvpcew.ac.ingvpcew.ac.in/College Magazines/Tech Niyati... · for Gayatri Vidya Parishad College of Engineering for Women, I am jubilant to meet you through this page

Tech Niyati | April 2017 | 7

Invited Article Dr. Sitarama Brahmam GLead, Emerging Technologies Group,IP &E Unit, Tata Consultancy Services Ltd., Hyderabad

There has been a technology explosion in the last onedecade resulting to a paradigm shift in the wayorganizations are doing business. Digital forces(Social, Mobile, Analytics and Cloud) have disruptedthe business houses and forced them to come up withinnovative approaches to out-perform competitorsin the market. Knowingly or unknowingly, all of usare part of this transition; we have entered the digitalera, crossed it and entered the post-digital era.Looking forward, in the post-digital era, CXOs of theIT industry shifted focus from maintenance andsupport of systems, to innovating and enablingbusiness strategies. Companies no longer just servecustomers; they collaborate with them. They nolonger just compete with rivals; they partner with

them. They're no longer limited by industryboundaries; they ignore them. The connecting tissuefor all this may be digital, but the defining factor ispeople. The business objective of the organizationsis to provide "right content to the right person on theright product at the right time at the right placethrough the right medium" and digital forces are thekey enablers.

Though many technologies are expected to be in thefocus, various industries are prioritizing few of themin order to stay ahead in the competition. We willhere mention the technologies that are catching theattention in the IT industry.

Global Technology Trends for 2017

Page 10: Tech Niyati - gvpcew.ac.ingvpcew.ac.in/College Magazines/Tech Niyati... · for Gayatri Vidya Parishad College of Engineering for Women, I am jubilant to meet you through this page

Tech Niyati | April 2017 | 8 www.gvpcew.ac.in

Internet of Things (IoT):The Internet of Things (IoT) is the network of physicalobjects that contain embedded technology tocommunicate and sense or interact with their internalstates or the external environment - Gartner's. Thesedevices are connected with the Internet throughuniquely identifiable IP addresses; whereby data isgathered and communicated via the embeddedelectronics and software, additional connectivitytechnologies and the c loud, networks or IoTplatforms. The Internet of Things exists in manyindustries, applications and contexts. Some projectsare still in the pilot stage while others form thebackbone of important processes, operations andinnovations. In other words: the Internet of Things iscertainly here but the degree in which it is changingthe ways we live, work and conduct business dependson the context.

IoTis already bigger than many believe and used infar more applications than those which are typicallymentioned in mainstream media.At the same time itis true that the increase of connected devices isstaggering and accelerating. As we write this,approximately each single hour a million newconnections are made and there are about 5 to 6 billiondifferent items connected to the Internet. By 2020,Cisco expects there will be 50 billion devices in theIoT.

With the increase in the number of connected devices,there will be flood of challenges and opportunities inthe areas of data collection, data management,security, performance etc., Industry is gearing up forthese challenges and it is expected that IoT willcontinue to capture the attention in the next 5 - 10years to come.

Virtual Reality:Virtual Reality (VR) provides a computer-generated3D environment that surrounds a user and respondsto that individual's actions in a natural way, usuallythrough immersive head-mounted displays and headtracking - Gartner.

With recent developments in technology, VR hasfound applications in many business areas, such as,

Page 11: Tech Niyati - gvpcew.ac.ingvpcew.ac.in/College Magazines/Tech Niyati... · for Gayatri Vidya Parishad College of Engineering for Women, I am jubilant to meet you through this page

Tech Niyati | April 2017 | 9

Retail, Aerospace, Healthcare, Automotive. In thecontext of retail, with the accelerating advancementof Digital era, the e-shopping concept created acuriosity among the consumers to search for products,view details, write reviews most of all to buy realtime. The mobile apps also stirred up the world widee-tail growth. The SMAC stack (social, mobile,analytics and cloud) technologies enhanced theaccessibility and consumer experience to the nextlevel. Though the e-commerce has reached up to asaturation level, there is an increased number ofconsumers and the frequency of online shoppinginstances increasing exponentially. This growth willeventually lead to setting the consumer expectationsmuch higher than ever before, be it the speed,fulfillment, delivery options and various other factorstake the major share. Virtual Reality is on its way inhelping the retailers to engage the consumers in animmense shopping experience. According to recentanalyst reports, like, Gartner, Forbes, virtual realitywould become ubiquitous for many industries in theupcoming years as they look for ways to reinvigoratethe experience for consumers. VR enables theshoppers with a virtual tour experience and obtainadditional product information with some demoswhich may not be available at a physical store.

VR is fast maturing and has shown great potential tobe in the spot light among the emerging technologiesin the next few years.

AI - Deep Learning:Recently, deep Learning (DL), a new research area ofmachine learning has gained unparalleled popularitywith the objective of bridging the gap betweenmachine learning and artificial intelligence and takingthem close to each other. DL, also referred to as"stacked neural networks"; that is , networkscomposed of several layers, is about learning multiplelevels of representation and abstract ion to getinsights from data consisting of different types, suchas, text, audio, video/images. It is observed that DLcan solve problems that have resisted the bestattempts of the artificial intelligence community for

many years by discovering intricate structures in high-dimensional data and is therefore applicable to manydomains of science, business and government. Deepneural network architectures differ from "normal"neural networks and machine learning approaches,such as, SVM, because they have more hidden layersand can be trained in an unsupervised or supervisedmanner for both unsupervised and supervisedlearning tasks.

DL has already attracted the attention of the industryand academia and there are several success stories inthe literature are available. Interestingly, open sourceAPIs (DeepLearning4J, TensorFlow)and Computingplatforms such as, R, Python provide readymadesolutions to explore and understand the principlesand philosophy of DL. It is expected that DL willcontinue to dominate the technology maps in the next5 years and provide exciting opportunities.

Analytics:The field of analytics evolved over a period of timeand this period of evolution has been divided into 3different eras.

Era Analytics CapabilityAnalytics 1.0 Business IntelligenceAnalytics 2.0 Big DataAnalytics 3.0 Data Enriched Offerings

Today, billions of connected devices around us leavea data trail (also called as data exhaust) that i) ismassive in volume ii) has many varieties (text, audio,video, etc., ) iii) is extremely volatile and iv) is verynoisy. Practically, it is very challenging to move suchlarge volumes to a centralized data store to performanalytics and to gain business insights. With so many

Page 12: Tech Niyati - gvpcew.ac.ingvpcew.ac.in/College Magazines/Tech Niyati... · for Gayatri Vidya Parishad College of Engineering for Women, I am jubilant to meet you through this page

Tech Niyati | April 2017 | 10 www.gvpcew.ac.in

challenges of data, traditional way of doing analyticsmay not yield the desired insights.

These challenges triggered the evolution of Analytics3.0 which is looked at as a combination of businessintelligence, analytics, big data technologies andinternet of things (IoT). Many organizations are gettingready for the requirements of Analytics 3.0 and it maytake a while to realize the potential benefits.

Like the first two, the era of Analytics 3.0 brings newchallenges and opportunities, both for the companiesthat want to compete on analytics and for the vendorsthat supply the data and tools with which to do so.How to capitalize on the shift is a subject we will turnto shortly. First, however, let's consider what Analytics3.0 looks like in some well-known firms-all of whichwere decidedly offline businesses for most of theirmany decades in operation.

Block Chain:Block chain is a distributed database that maintains acontinuously growing list of ordered records called

blocks. Each block contains a timestamp and a link toa previous block. By design, blockchains are inherentlyresistant to modification of the data - once recordedthe data in a block cannot be alteredretroactively.Blockchains are "an open, distributedledger that can record transactions between twoparties efficiently and in a verifiable and permanentway. Blockchains are secure by design and an exampleof a distributed computing system with highbyzantine fault tolerance. Block chains are expectedredefine and dominate the banking industry in thenext few years.

To conclude, technology is changing rapidly and is oneof the biggest influencers in our lives. This inter-twining is changing the way we live. But, change alsocreates an opportunity and there is good number ofopportunities in the IT industry. Change is acontinuous phenomenon and as Charles Darwin said,"it is not the strongest of the species that survive orthe most intelligent, but the one most responsive tochange".

Abou

t th

e Au

thor Dr.Ramabrahmam was born in East Godavari District of Andhra Pradesh, India. He obtained his master's

and Ph. D degrees in Applied Mathematics from Andhra University(1989) and IITM - Chennai (1996)respectively. During the doctoral program, he studied the applications of wavelet based numerical methodsto non-linear partial differential equations. During the period 1996 - 2001, he worked in Telecom and datawarehousing projects of TCS. He joined DNAPrint Genomics Inc., a Florida based company in 2001 andworked in Bio-informatics. During this period (2001 - 2003), he was instrumental in developing the AncestryTest kit and in solving the Human Eye Colour Classification problem". He was with the Life Sciences R&DDivision, Innovation Labs Hyderabad, Tata Consultancy Services for many years and is at present the Lead ,Emerging Technology Group, IP & E Unit, TCS Limited, Hyderabad.

Page 13: Tech Niyati - gvpcew.ac.ingvpcew.ac.in/College Magazines/Tech Niyati... · for Gayatri Vidya Parishad College of Engineering for Women, I am jubilant to meet you through this page

Tech Niyati | April 2017 | 11

Invited Article Professor G. P. Raja SekharDepartment of Mathematics, IIT Kharagpur

The beginning of 90s, India witnessed so calledrevolution, which Academicians call it "ComputerScience" or "Computer Applications" and industry callit "Software". While Academician's job is to learn anddeliver various upcoming techniques and tools at aquick pace, the main task at software industry was towork on module based models and deliver them withdeadlines. This was the time, not only these softwarecompanies pay hefty packages, but also had gone fordilution in the minimum level of education requiredat the entry level. Here goes, the first blow on theacademic sector, where few of the experts who couldnot withstand the pressure of not being paid well atacademia and got attracted towards hefty packages,made a vertical shift to the so called "Softwareindustry" to try their luck. This continued for aboutten years during which period, lakhs of youngstudents across various disciplines tried their luck, ofwhich some could succeed well and others burnt theirfingers. However, on an average, majority of thismigrated population got benefited financially, inparticular those who have gone abroad on these kindof Software jobs. The other side of the coin is, thereis a direct impact on the education system in India. Itis not a surprise to know that there is no specializationleft that is not being influenced by this massmigration.

Most of the educational institutes in the countryincluding the premier institutes, where young mindsare expected to come out with great technologicalthoughts and become integrated to the industry oracademic sectors also suffered. The situation was notso much disappointing in this context until last tenyears, when the "Software" got brothers and sisters,"Information Technology" "Financial Management"and "Data Analytics". The situation became worsewhen each and every individual was aiming to makea vertical shift by leaving the core fields. Of thedisciplines that got affected by this scenario,Mathematics could be the one that is victimized at

the most. The experience with young high schoolchildren proves this. The best part is these childrenwere mostly exposed to Mathematics, Physics andChemistry at their high school level and are not in aposition on their own to really decide the kind ofspecialization they would like to study. However,these days technology transfers so fast, theenvironment responds faster and hence these schoolchildren also gets influenced quickly by the near anddear. As a result, all these young bright students, whoare supposed to pause a while, think, enjoy the fun inlearning and opt the f ield in which they areinterested, could never do this. They just merelyfollow the so called "Technology Revolution" and endup with fields in which they are never interested.However, a part of this group knows the reality andtries to cope up with the field in which they getadmitted and try to do their bit. But, the other partstill lives in a virtual world and spoils their academics.These students are thinking "Core Fields" as "BoreFields". In this midst, we, are becoming hybrid day byday and getting confused. The student community byand large stopped looking beyond to look for careersin Core Engineering fields at various industries oracademia. This did not mean that one should not optfor Computer based engineering, rather, one shouldmake use of the advancements in this field and aimhigh for new innovations. Neither the teachingcommunity is an exception for this, as sometimes thesystem forces them to move away from core sectorsand do for mere survival and sometimes on acompromise. Days are gone slowly, and boardersacross various scientific disciplines are getting washedaway. The innovations for the development ofmankind demand a complete integrat ion ofknowledge across various fields. In spite of the factthat a majority of the scientif ically educatedpopulation is draining out to non-scientific tasks,today the country's is proud to look at ISRO and itsachievements. Such organizations are plenty in India,which expects your presence and contribution to

The Scientific World is Calling You!

Page 14: Tech Niyati - gvpcew.ac.ingvpcew.ac.in/College Magazines/Tech Niyati... · for Gayatri Vidya Parishad College of Engineering for Women, I am jubilant to meet you through this page

Tech Niyati | April 2017 | 12 www.gvpcew.ac.in

almost all the fields of science and engineering. Also,with the advancements in computational power,research in fields like Biology, Medicine has gone to anext level so that some challenges like controllingthe growth of a tumor, operating complicated organsetc. has become possible easily. It is time for the youngstudents to think a while and pick up your interest

and take up scientific career, only then the qualitycontributions can take place. Since, you are one ofthose, please give a thought! Finally, Edward Lorentz'sdefinition of Chaos: When the present determinesthe future, but the approximate present does notapproximately determine the future.

Abou

t th

e Au

thor Dr.Raja Sekhar was born on 8th August 1970 at a temple village Simhachalam, which is in the district of

Visakhapatnam in Andhra Pradesh. He completed his M. Sc. (Applied Mathematics) at Department ofMathematics and Statistics, University of Hyderabad (HCU) during 1990 -1992, where he continued for hisM. Phil. (1993) and Ph. D. (1993 - 1997). He spent two years at Tokyo in Department of Applied Physics,Tokyo University of Agriculture and Technology (TUAT) on Japan Society for the Promotion of Science (JSPS)Post Doctoral Fellowship. He won the INSA (Indian National Science Academy) Young Scientist Award in2002 and the Alexander Von Humboldt Fellowship for Experienced Researchers in 2008. He is presentlyworking as Professor in the Department of Mathematics at IIT Kharagpur.

Page 15: Tech Niyati - gvpcew.ac.ingvpcew.ac.in/College Magazines/Tech Niyati... · for Gayatri Vidya Parishad College of Engineering for Women, I am jubilant to meet you through this page

Tech Niyati | April 2017 | 13

Article Prof. B.S. MurthyProfessor, ECE Department

Are We Sure That We Are Earthians(Based on Prof. Y. Nayudmma memorial award lecture delivered by Prof.J.V.Narlikar, on 01-03-2014, atTENALI,A.P)

Ever since man began to understand his existence,evolution and surroundings on this planet EARTH onethought that had been haunting the man is whether theplanet Earth is the only habitat of living systems or arethere any locations beyond Earth i.e., other planetarysystems in our or other Solar systems of the Universe.Old folklores of various cultures all over the world havetalked about Extra Terrestrials (ETs) and some of themeven claimed to have seen and experienced those'unidentified' objects. As those unidentified objectsappeared to be ' Saucer ' shaped and reaching the earthflying from space they were called as 'Flying Saucers' -Unidentified Flying Objects (UFOs). To make the recordof these observations and to establish a sort ofcommunication anUFO project was launched in 1960's.This project recorded the evidences described by thepeople who claimed to have seen the UFOs in theirbackyards and other places and tried to establish aconnection to know about their nativity. They wereconsidered to be coming from other planets (Martians)and called them ETs. Unfortunatelynothing has comeout from this project and the UFO project was officiallyclosed in the year 2009. Interestingly, there are reportsfrom Germany about the sightings of the UFOs in June2014 also. The reason for the closure of the UFO projectwas probably the serious Science has kept aloof fromthese observations as there were no examples of hardevidence for making one believe in the existence ofETs. However, Astronomers are different sect ofscientists. They are die hard optimists. They argue thatwith about 100 billion stars in our Galaxy and overseveral million galaxies in observable Universe , whenan average star like our Sun can have a Planetary system(consisting of 8 planets orbiting round the sun withseveral satellites (moons) around the planets ) it is morethan probable that some stars to have planetary systemsthat might support life !

What sort of evidence that one requires, believing theexistence of ETs? First of all one must prove the

existence of complex life supporting organic moleculesin the other planetary atmospheres of ours /other solarsystems. How to detect the existence of thesemolecules in the atmospheres of other planets?Astronomers came up with some sort of evidence in1960s with the development of 'millimeter' waveastronomy (See Box). They probed the Universe withmillimeter radio waves which gave the evidence to thepresence of clouds in the interstellar space containingmolecules. The discovery started in a modest fashionwith small molecules like hydroxyl, carbon monoxideand cyanogen's etc., but soon led them to find complexorganic molecules of the kind found in the basic structureof life on earth. Then the question emerged was whetherthese molecules combined together to form thecomplete picture of life somewhere.

The 'somewhere' is expected to be a planet with eco-friendly atmosphere going round a star from which thelife forms derive energy for their survival and progress.The evidence for planets around stars was missing for along time before a break-through is achieved in 1990swhen new optical techniques began to reveal evidencefor extra-solar planets. Today more than severalhundreds of them are known and some of which areecofriendly.(NASA reported,in Feb.2014, over 700 newplanets outside our solar system,some of which havefeatures similar to earth). The stage is set for theAstronomers of the 21st century to make a scientificsearch for ETs.

There are some enthusiasts who have not waited forthe above developments. They thought the best way ofdiscovering technologically advanced ETs is throughradio messages. A programmecalled Search forExtraTerrestrial Intelligence (SETI) was launched and is inoperation for more than four decades. SETI programmerelies on our receiving replies to messages sent usuallyon the 21 cm radio wave length band. Coded messagesdescribing basic scientific information and facts aboutour existence on the Earth have been sent to locations

Page 16: Tech Niyati - gvpcew.ac.ingvpcew.ac.in/College Magazines/Tech Niyati... · for Gayatri Vidya Parishad College of Engineering for Women, I am jubilant to meet you through this page

Tech Niyati | April 2017 | 14 www.gvpcew.ac.in

usually within a few tens of light years. The messagesare not in any earthly languages but try to incorporatebinary arithmetic and fundamental scientific facts. If'They ' get our message and do think worthwhile toreply on the same system ,then their presence will beknown to us and that will definitely be the mostimportant discovery in the history of Human civilizationon this planet. But the system requires patience. Fore.g., if you send a signal towards a star 15 light yearsaway , it means that travelling with the speed of lightthe signal will reach its destination in 15 years. Another15 years for the reply to arrive (of course,if 'They" wishto send reply only) and we have a full 30 years to waitfor the response. In short, success is not guaranteedand even it does materialize, the entire project will havetaken up a significant part of human lifespan.

Another approach , may not be as glamorous as SETI,involves searching for life in a microbial form Do cells ,bacteria and viruses exist at heights of 40 -50 Km. abovethe Earth's surface? Two British astrophysicists FredHoyle and Chandra Wickramasinghe responded with apositive theory to the above question. They argued thatmicroorganisms ride on comets in their frozen form,thuscoming from vast interstellar distances. When thecomet approaches the sun its outer layers evaporateand form a long tail. The microorganisms spread out andsome get shifted to the tail. If the tail brushes the Earth'satmosphere,the microorganisms get transferred to itand then over the next 6-12 weeks they descend to the'terra ferma '. Given that there are many cometary visitsduring the year, we can expect a flux of in fallingbacteria,viruses etc., at considerable heights above thesea-level. This has led scientists all over the world tolook for these microorganisms at 30-40 km. altitudesabove the earth's surface, because at lower heights thereis a danger of terrestrial contamination , say by earthlymicroorganisms tossed up by aircrafts, volcanoes,cyclones, etc. At heights far in excess of the above range,the probability of finding anything in the extremelyrarified atmosphere is very low.

Indian Scientists from Tata Institute of FundamentalResearch (TIFR),headed by Dr.J.V.Narlikarare the first to

make a sincere effort to detect these microorganisms at30-40 Km.heights. They had balloons capable of carryingscientific payloads up to41 km.height. They haveapproached Indian Space Research Organization (ISRO)for a research project which involve, sending scientificballoons into atmosphere for collecting air samples fromspecified height bands and examining them underaseptic conditions in biological laboratories. Theseballoons could be launched fromthe National BalloonFacility (see box), managed by TIFR at Hyderabad,located near the ECIL campus. The ISRO has sponsoredtwo Balloon flights,one in 2001 and the other in 2005.Prof. Narlikar claimed that they got excellent data in2005 flight. The air samples collected were examined atthe Centre for Cellular and Molecular Biology Laboratoryat Hyderabad and National Cell centre at Pune. In bothcases they got evidence for live Bacteria at a height ofaround 41 km. They also observed that the bacteriashowed survival ability against ultraviolet radiation.They wondered how long have those bacteria remainedin high UV environment and could they have come fromfar away in space as Hoyle and Wickrama singhesuggested. May be yes!

Further studies are therefore are needed to confirmthese ideas. If the composition of the bacteriumcollected, differs from the composition of the terrestrialbacterium, then that will establish the extraterrestrialorigin. One way of testing the composition of bacteriumis through nuclear isotope verification. The results orthe outcome of these studies are very important ; for ifthe bacteria turn out to be extraterrestrial then itbecomes possible to argue that life on earth itself mayhave been seeded by such showering microorganisms.That would make us all ETs!

Mm wavelength Astronomy: The visible spectrum isonly a tiny portion of the Total Electromagnetic spectrumwith gamma rays at shortest wavelengths to VLF radiowaves at longest wavelengths. Optical astronomy seesthe Universe through the visible spectrum. While TVand microwave signals are all light waves of relativelylow energy,Ultraviolet, X-Ray and Gamma ray signals arehigh energy waves. They are capable of carrying

Page 17: Tech Niyati - gvpcew.ac.ingvpcew.ac.in/College Magazines/Tech Niyati... · for Gayatri Vidya Parishad College of Engineering for Women, I am jubilant to meet you through this page

Tech Niyati | April 2017 | 15

extremely high energy .When we look at the Universein a different light , i.e., at non visible wavelength, weprobe different kinds of physical condition of theUniverse -for eg- Gamma-ray and X-ray tend to see mostenergetic dynamos in the Cosmos , such as activeGalaxies, Supernovae, accretion of matter surroundingBlack Holes etc. Long wavelength telescopes probe coolobscured structure in the Universe,dusty and starforming regions,dark cold, molecular clouds,theprimordial radiation emitted by the formation of theUniverse, shortly after the BIG BANG. By studying theastronomical objects at different wavelengths one canpiece together a coherent comprehensive picture of theworking of the Universe.

Sub mm wavelength (0.3 mm to 1 mm) is the least whollyunexplored wavelength portion of the spectrum. Why?Sub mm (microwave) astronomy is technically verydifficult due to the sheer complexity of theinstrumentation and to the opaqueness of the earth'satmosphere in the microwave light. The sub mmmicrowave band lies between the wavelength bandsused by radio telescopes and optical telescopes. As suchthe techniques of sub mm radio astronomy borrowthetechniques of both optical and radio methods. Extremelysensitive and high frequency (800-1600Ghz) receiversare required for Sub mm studies. Secondly, groundbased Sub mm observations are extremely difficult tomeasure as the atmosphere is opaque to thesefrequencies.

Ambient atmospheric water vapour absorbs (blocks)incoming sub mm microwave light, particularly at lowelevations where most of the water vapour lies (= 40km.).The abundant water vapour absorbs sub mmwavelength photons before they reach the ground basedradio telescopes. At higher elevations the water vapourcontent decreases substantially .By minimizing theatmospheric water vapour;one improves thetransparency of the atmosphere and makes astronomicalobservations possible. The Transparency (transmissionefficiency) of the atmosphere at microwave frequenciesis measured at two levels of PWV (perceptible watervapour). A 4mm PWV means if every molecule of watervapour above us is condensed into a Ocean, it will have

a depth of 4mm.That ocean can be considered to bepretty dry. But even this atmosphere blocks 98% of lightenergy at 0.3 mm wavelength.( 1Thz frequency). Movingto a dry site say 1mm PWV,only 75 % of sub mm lightwould be blocked. It is for this reason most of IR and submm astronomical telescopes are built as high aspossible.(Space Shuttles carry these detectors).

National Balloon facility: Meteorological balloons areused all over the world for getting weather profiles upto stratospheric heights. These balloons made ofrubber/polyethylene materials filled with Hydrogen gascarry weather and telemetry instrumentation andprovide useful data for weather predictions.

Prof.HomiJ.Bhabha was the first to use stratosphericballoons,during 1940s,for cosmic ray measurements ataround 25 km. altitudes. TIFR under the jointmanagement with the ISROstarted the National balloonfacility in Osmania University Campus;Hyderabad in theyear 1959.The first research balloon was launched in1961. With NCAR (USA), collaboration more than 170balloons were launched in next 5years. This facility latermoved closer to the ECIL campus.

The NBF activities include besides manufacturingscientific balloons, balloon based scientific experimentsin X-ray, Infrared astronomy and Aeronomy. Theyconduct two balloon launches every year. On Jan.7, 2014a 61000 cubic meter balloon made up of ultrathinpolyethylene film of thickness 3.8 microns ( human hairthickness is about 17 microns) weighing 31 kg waslaunched. It carried a pay load of 7.9 kg consisting ofsingle card tele-command, Integrated electronictimer,radio transceiver, ATS transponder, mobiletelephony, GPS-GSM for last leg tracking, Upward lookingvideo camera two GPS sounds for navigation andmeasurement of atmospheric parameters likepressure,temperature and humidity and a 4.3 mdiameter parachute weighing 3kg for the safe recoveryof instrumentation after the flight .This has reached analtitude of 51.66km in about 2 hours. This achievementis a record of sorts for India as an indigenously madeballoon for the first time reached Mesospheric height.Only USA and Japan earlier achieved it.

Page 18: Tech Niyati - gvpcew.ac.ingvpcew.ac.in/College Magazines/Tech Niyati... · for Gayatri Vidya Parishad College of Engineering for Women, I am jubilant to meet you through this page

Tech Niyati | April 2017 | 16 www.gvpcew.ac.in

ArticleS.SumahasanAssistant Professor, CSE Department

Secure Multiple Routing Configuration for NetworkRecoveryINTRODUCTION

As the Internet takes an increasingly central role inour communicat ions infrastructure, the slowconvergence of routing protocols after a networkfailure becomes a growing problem. To assure fastrecovery from link and node failures in IP networks,this present a new recovery scheme called MultipleRouting Configurations (MRC). Our proposed schemeguarantees recovery in all single failure scenarios,using a single mechanism to handle both link and nodefailures, and without knowing the root cause of thefailure. MRC is strictly connectionless, and assumesonly destination based hop-by-hop forwarding. MRCis based on keeping additional routing informationin the routers, and allows packet forwarding tocontinue on an alternative output link immediatelyafter the detection of a failure. It can be implementedwith only minor changes to existing solutions. Thesecurity is provided to the forwarding packets byapplying encryption technique to it.

As the Internet takes an increasingly central role inour communications infrastructure a network failurebecomes a growing problem. The objective of thisproject is to provide recovery in all single link andnode failures in networks, regardless of whether it isa link or node failures.

The project is used in the LAN networks to send thepackets from source to destination in a shortest pathand it also provides fast and efficient recovery fromsingle link and node failures by providing alternativepath. The main idea used in this project isSecureMultiple Routing Configurations(SMRC).It is aproactive and local protection mechanism that allowsrecovery and provides security to the packets. SMRCallows packet forwarding to continue overpreconfigured alternative path immediately after thedetection of the failure. The IGP convergence processis slow because it is reactive and global. It reacts to afailure after it has happened, and it involves all the

routers in the domain. This paper presents a newscheme for handling link and node failures in IPnetworks (Connection Oriented). Secure multipleouting Configurations (SMRC) is a proactive and localprotection mechanism that allows recovery in therange of milliseconds.SMRCallows packet forwardingto continue over preconfigured alternative next-hopsimmediately after the detection of the failure.

SMRC guarantees recovery from any single link ornode failure, which constitutes a large majority ofthe failures experienced in a network. SMRC makesno assumptions with respect to the root cause offailure, e.g., whether the packet forwarding isdisrupted due to a failed link or a failed router.

MODULES

Topology ConstructionIn this module, This paper focus on construct atopology structure like mesh topology because of itsunstructured nature. Topology is constructed bygetting the names of the nodes and the connectionsamong the nodes as input from the user. While gettingeach of the nodes, their associated port and ip addressis also obtained. For successive nodes, the node towhich it should be connected is also accepted fromthe user. While adding nodes, comparison will bedone so that there would be no node duplication.Then areidentified the source and the destinations.

Message TransmissionIn this module its transferred the message fromsource to destination. Here destination and selectinga shortest path for that destination is chosen. Theshortest path is updated in the routing table. Thesource obtains the shortest path from the routingtable itself. After receiving a message the destinationwill send an acknowledgement to the correspondingsource.

Preventing Link Failure Using SMRCAs soon as the failure is detected SMRC System checks

Page 19: Tech Niyati - gvpcew.ac.ingvpcew.ac.in/College Magazines/Tech Niyati... · for Gayatri Vidya Parishad College of Engineering for Women, I am jubilant to meet you through this page

Tech Niyati | April 2017 | 17

the shortest path from the routing table. Then, thepacket is transmitted from the source to the destinationvia that shortest path. Security is provided to theforwarding packets by applying encryption algorithmsto it.

Existing SystemLink and Node failures of IP networks are very common.To handle that IGP routing protocols like OSPF aredesigned to update the forwarding information basedon the changed topology after a failure. The IGPconvergence process is slow because it is reactive andglobal. It reacts to a failure after it has happened. Forthe existing system global routing information isneeded.

DisadvantagesThis network-wide IP re-convergence is a timeconsuming process and a link or node failure istypically followed by a period of routing instability.During this period, packets may be dropped due toinvalid routes.

The IGP convergence process is slow because it isreactive and global. It reacts to a failure after it hashappened. For the existing system global routinginformation is needed.

Proposed SystemThe main idea of SMRC is handling link and node failuresin IP networks. Secure Multiple Routing Configurations(SMRC) is a proactive and local protection mechanismthat allows recovery in the range milliseconds. SMRCallows packet forwarding to continue overpreconfigured alternative next-hops immediately afterthe detection of the failure. It provides security as wellas recovery in all single failure scenarios withoutknowing root cause of the failure. Each and every nodehaving preconfigured backup path. That backup pathmaintains the routing table. SMRC assumes onlydestination of hop by hop forwarding.

AdvantagesSecure Multiple Routing Configurations (SMRC) is aproactive and local protection mechanism that allowsrecovery in the range of milliseconds.

SMRC allows packet forwarding to continue overpreconfigured alternative next-hops immediatelyafter the detection of the failure.

MODULE IMPLEMENTATION

Topology ConstructionThis flow diagram provides the flow for TopologyCreation in MRC System. The sequence of steps areprovided below. A Node is entered by the User using the Java Swing

UI Front end. Upon entering the node information, the system

checks whether the node is present in theNodeInfo table or not.

. If the node is already present on NodeInfo, donothing. Otherwise,

. Add the node to NodeInfo table.

Message TransmissionThis flow diagramprovides the flow for Node Login inMRC System. The sequence of steps are providedbelow. User enters a Node to be logged in as. This will be

the source node. Then, the user selects the destination node to

where the message needs to be transferred. With the Source Node and Destination Node, the

MRC System computes the shortest path. This willmake use of Paths Table

. Then, the message is transferred along theshortest path from Source to Destination.

Preventing Failure Using MRCThis flowdiagram provides the flow for PreventingFailure using MRC System. The sequence of stepsare provided below. Initially the screen for entering the node

details is displayed. Here is given nodeinformation i.e., nodename, ip address and portnumber and click on the add button, a dialoguebox is displayed with data added successfully.

. The number of nodes required is entered and thenfinish button is checked. The add node screen isclosed and the new screen for adding the pathdetails is displayed.

Page 20: Tech Niyati - gvpcew.ac.ingvpcew.ac.in/College Magazines/Tech Niyati... · for Gayatri Vidya Parishad College of Engineering for Women, I am jubilant to meet you through this page

Tech Niyati | April 2017 | 18 www.gvpcew.ac.in

. User clicks on Send button to initiate the Messagetransmission in MRC System.

. MRC System then checks the Shortest path fromthe Paths Table

. Then, the MRC System checks whether theselected shortest path really exists or not?

. If the shortest path exists, Message is transmittedon that path

. Otherwise, an alternative shortest path iscalculated and message is transmitted along thatpath.

. Here we enter the path details and theircorresponding weights and click on the createbutton then a dialogue box is displayed with themessage data added successfully.

. In this way we give the paths and weightsbetween the nodes and click on the finish button.

. The screen is closed and the server is run/started.

. Screen for NODEA is displayed on the c lientmachine with the node, router tabs.

. The node tab consists of the link details of thecorresponding node and the router tab consists ofthe possible paths to the destination.

. Here the destination node selected is C and themessage HELLO to be sent is written in the sendmsg box.

Page 21: Tech Niyati - gvpcew.ac.ingvpcew.ac.in/College Magazines/Tech Niyati... · for Gayatri Vidya Parishad College of Engineering for Women, I am jubilant to meet you through this page

Tech Niyati | April 2017 | 19

. On clicking the send button the msg is sent to C inan encrypted form.

. The message is received at NODE C in anencrypted form and a dialog box with messagereceived successfully is displayed.

. On clicking on OK button acknowledgement is sentto NODE A indicating that destination received themessage

. The acknowledgement is received fromdestination node C to source node A

. The message received from node A is displayed inthe received message box at node C in anencrypted form.

. Now the message is decrypted by clicking on thedecrypt button.

. The message is displayed at NODE C is the originalmessage before encryption that was sent by NODEA.

. To restrict any particular link select the link fromlink details and click on restrict button.

. A dialogue box is displayed with selected link isrestricted.

. To isolate any link click on the link that you wantto isolate and then click on isolate button.

. A dialogue box is displayed with selected link isisolated.

Page 22: Tech Niyati - gvpcew.ac.ingvpcew.ac.in/College Magazines/Tech Niyati... · for Gayatri Vidya Parishad College of Engineering for Women, I am jubilant to meet you through this page

Tech Niyati | April 2017 | 20 www.gvpcew.ac.in

CONCLUSION

Inthis paper, Secure Multiple Routing Configurationsas an approach to achieve fast recovery in IP networksis proposed. SMRC is based on providing the routerswith additional routing configurations,allowing themto forward packets along routes that avoid a failedcomponent. SMRC guarantees recovery from anysingle node or link failure in an arbitrary bi-connectednetwork. By calculating backup configurations inadvance, and operating based on locally availableinformation only, SMRC can act promptly after failurediscovery. SMRC operates without knowing the rootcause of failure, i.e., whether the forwardingdisruption is caused by a node or link failure. SMRCthus achieves fast recovery with a very limitedperformance penalty. This system can beimplemented in a real network to transfer themessage in an predefined alternate path after afailure occurs.

REFERENCES

[1] D. D. Clark, "The design philosophy of theDARPAinternet protocols"ACM SIGCOMMComput. Commun. Rev., vol. 18, no. 4, pp. 106-114,Aug. 1988.

[2] A. Basu and J. G. Riecke, "Stability issues inOSPFrouting" in Proc. ACM SIGCOMM, SanDiego, CA,Aug. 2001, pp. 225-236.

[3] C. Labovitz, A. Ahuja, A. Bose, and F.Jahanian,"Delayed internet routingconvergence. "IEEE/ACMTrans. Networking, vol.9, no. 3, pp. 293-306, Jun.

[4] C. Boutremans, G. Iannaccone, and C.Diot,"Impact of link failures on VoIPperformance."inProc. Int. Workshop on Network

and OperatingSystem Support for Digital Audioand Video, 2002,pp. 63-71.

[5] D.Watson, F. Jahanian, and C. Labovitz,"Experiences with monitoring OSPF on aregionalservice provider network." in Proc. 23rdInt. Conf.Distributed Computing Systems(ICDCS'03),Washington, DC, 2003, pp. 204-213,IEEEComputer Society.

[6] P. Francois, C. Filsf ils , J. Evans, and O.Bonaventure, "Achieving sub-second IGPconvergence in large IP networks."ACMSIGCOMM Comput.Commun. Rev., vol. 35, no.2,pp. 35-44, Jul. 2005.

[7] A. Markopoulou, G. Iannaccone, S.Bhattacharyya, C.-N.Chuah, and C. Diot,"Characterizat ion of failures in an IPbackbonenetwork." in Proc. IEEE INFOCOM, Mar.2004,vol. 4, pp. 2307-2317.

[8] Harada, Y. Wang Hui ; Fukushima Y , Yokohira T "A reroute method to recover fast from networkfailure" ICTC 2014 IEEE conference.

[9] Xangiabady , M Mizaei M.S " Novel method forfast IP network recovery" SCEECCS -2012 -IEEEConference.

[10] TakounaI , Rojas Cessa R " Routing schemas fornetwork recovery under link and node failure"HSPR 2008 -IEEE conference.

[11] MisicJ ,Misic V.B " Recovery using Backupchannels in channel - Hopping CognitiveNetworks" DCOSS 2013-IEEE Conference.

[12] Abbasi A A , Younis M E , Baroudi U A "RecoveringFrom a Node Failure in Wireless Sensor - ActorNetworks with Minimal Topology Changes"Vehicular Technology , IEEE Transcations 2013.

Page 23: Tech Niyati - gvpcew.ac.ingvpcew.ac.in/College Magazines/Tech Niyati... · for Gayatri Vidya Parishad College of Engineering for Women, I am jubilant to meet you through this page

Tech Niyati | April 2017 | 21

ArticleV.Gowtami AnnapurnaAssistant Professor, CSE Department

Security in Cloud ComputingINTRODUCTION

Cloud Computing security is the set of control-basedtechnologies and policies designed to adhere toregulatory compliance rules and protect information,data applications and infrastructure associated withcloud computing use. Because of the cloud’s very natureas a shared resource, identity management, privacy andaccess control are of particular concern. Cloud computingsecurity processes should address the security controlsthe cloud provider will incorporate to maintain thecustomer’s data security, privacy and compliance withnecessary regulations. The processes will also likelyinclude a business continuity and data back up plan inthe case of a cloud security breach.

Security risks associated with the cloud computingLoss of governance : In a public cloud deployment,customers cede control to the cloud provider over anumber of issues that may affect security .Yet cloudservice agreements may not offer a commitment toresolve such issues on the part of the cloud provider,thus leaving gaps in security defenses.

Responsibility ambiguity : Responsibility over aspects ofsecurity may be split between the provider and thecustomer, with the potential for vital parts of thedefenses to be left unguarded if there is a failure toallocate responsibility clearly. This split is likely to varydepending on the cloud computing model used (e.g.,IaaS vs. SaaS).

Authentication and Authorization : The fact that sensitivecloud resources are accessed from anywhere on the Internetheightens the need to establish with certainty the identityof a user - especially if users now include employees,contractors, partners and customers. Strong authenticationand authorization becomes a critical concern.

Isolation failure : Multi-tenancy and shared resourcesare defining characteristics of public cloud computing.This risk category covers the failure of mechanismsseparating the usage of storage, memory, routing andeven reputation between tenants (e.g. so-called guest-hopping attacks).

Data protection : Here, the major concerns are exposureor release of sensitive data and loss or unavailability ofdata. It may be difficult for the cloud service customer(in the role of data controller) to effectively check thedata handling practices of the cloud provider. Thisproblem is exacerbated in cases of multiple transfers ofdata, (e.g., between federated cloud services or wherea cloud provider uses subcontractors).

Malicious behavior of insiders : Damage caused by themalicious actions of people working within anorganization can be substantial, given the access andauthorizations they enjoy. This is compounded in thecloud computing environment since such activity mightoccur within either or both the customer organizationand the provider organization.

CLOUD SECURITY GUIDANCE

This section provides a prescriptive series of steps forcloud customers to evaluate and manage the securityof their use of cloud services, with the goal of mitigatingrisk and delivering an appropriate level of support.1. Ensure effective governance, risk and compliance

processes exist.2. Audit operational and business processes.3. Manage people, roles and identities.4. Ensure proper protection of data and information.5. Enforce privacy policies.6. Assess the security provisions for cloud

applications.7. Ensure cloud networks and connections are secure.8. Evaluate security controls on physical infrastructure

and facilities.9. Manage security terms in the cloud service

agreement.10. Understand the security requirements of the exit

process.

In this article I want to focus on step 2 Audit operationaland business processes

Audit operational and business processes : One of thebiggest concerns with cloud data storage is that of dataintegrity verification .This technique ensures the

Page 24: Tech Niyati - gvpcew.ac.ingvpcew.ac.in/College Magazines/Tech Niyati... · for Gayatri Vidya Parishad College of Engineering for Women, I am jubilant to meet you through this page

Tech Niyati | April 2017 | 22 www.gvpcew.ac.in

integrity of data storage in cloud computing. weconsider the task of allowing a third party auditor (TPA),on behalf of the cloud client, to verify the integrity ofthe dynamic data stored in the cloud.

THIRD PARTY AUDITOR

The Third party auditor is a kind of inspector who hasresources and experience that a user does not have andcheck the integrity that is difficult for users to check.The auditors can understand the threats and they knowbest practices. The released audit report helps the userto evaluate the risk of their services. It also helps thecloud service provider in improving their cloud platform.

There are three different network entities in cloudsystem, they are users, cloud service provider and thirdparty auditor.

Users : These are active participants. They have data tobe stored in the cloud and rely on the cloud for datamaintenance and computation. Both individualconsumers and organizations can be the users.

Cloud service provider (CSP) : It is the most important partof cloud architecture. It has significant storage space andcomputation resource to store and maintain the userdata.It provides all its services in pay per use manner.

Third party auditor (TPA) : It has more capabilities thanthe user and checks the integrity of data for the user andhis audit reports helps the users in evaluating the risk.

FUNCTIONS OF THIRD PARTY AUDITOR

No data leakage or data learning : TPA should neitherlearn any information about the data file from themessage it receives from client/server nor leak the sameto any unauthorized entity.

Audit without downloading : The TPA should auditwithout asking for entire file from server, not even inencrypted form. TPA should audit the user data withoutasking for the local copy of the data or even learning thedata contents.

Integrity Verification : One of the important securityconcerns is to verify integrity of data stored on cloud.TPA should verify the integrity of client's data stored oncloud with low communication overhead.

High Performance : Performance of TPA is also animportant issue as it is a central component of the cloudsystem, where there are thousands of client andmultiple servers. TPA should not become bottleneck ofentire system and performance of overall system shouldnot be compromised due to heavy load on TPA.

Scalability : As cloud is a completely dynamicenvironment, any number of users can come in or goout. Also it is expected to have huge data storage oncloud server. Functionalities of TPA should not beaffected by number of cloud clients, servers, number ofdata files stored on the cloud or the overall size of theentire storage. TPA should offer scalable architecturewhich is independent on all the factors mentioned.

Page 25: Tech Niyati - gvpcew.ac.ingvpcew.ac.in/College Magazines/Tech Niyati... · for Gayatri Vidya Parishad College of Engineering for Women, I am jubilant to meet you through this page

Tech Niyati | April 2017 | 23

Dynamic data operation support : One of the maindifferences between the cloud computing and otheronline storage system is its dynamic data support &sharing. TPA should take the fact into consideration thatthe data stored on cloud may be used & edited by multipleusers simultaneously. It must support dynamic operationson data blocks i.e. data update, append and delete.

Batch Auditing : Third Party Auditor also supports batchauditing to improve efficiency. TPA performs multipleauditing tasks simultaneously and it also reducescommunication and computation cost.

DIFFERENT SCHEMES USED FOR TPA. MAC Based solutions. Public Auditing Scheme for Third Party Auditor. HLA based solution. Privacy- Preserving Public Auditing Scheme. Digital signatures based solution.

In this article, I want to focus on Public Auditing Schemefor Third Party Auditor

PUBLIC AUDITING SCHEME FOR THIRD PARTY AUDITOR

The working of TPA consists of four algorithms: Keygen,Siggen, Genproof, Verifyproof.

Keygen : Key generation algorithm is run by the user tosetup the scheme. In this the user generates his ownpublic/private key pairs.

Siggen : This algorithm is run by the cloud user for thegeneration of verification metadata, which can besignatures or other information used for auditing.

Genproof : This algorithm is for the generation of proof ofcorrectness of data storage and is run by the cloud server.

Verify proof : This algorithm is run by the tpa for theauditing of the proof generated by the cloud server. It isdivided into two phases: setup and audit phase.

Setup phase: The user initializes the public and privateparameters of the system by executing keygen andpreprocesses the data file by using siggen to generatethe verification metadata. The user then stores the datafile at the cloud server, delete its local copy, and publishthe verification metadata to TPA for later audit.

Audit phase: The TPA issues an audit message orchallenge to the cloud server to make sure that the cloudserver has retained the data file properly at the time ofthe audit. The cloud server will derive a responsemessage from a function of the stored data file byexecuting genproof. Using the verification metadata, theTPA verifies the response via verifyproof.

CONCLUSION

Cloud computing provides many benefits to its usersbut security is major issue in cloud computing. Usersstore their data to cloud data centers but as user doesnot know the exact location of their data so integrity ofdata is very important. To check the integrity of datathere are many solutions available. One of the solutionsis to take the assistance of a third party auditor

REFERENCES

[1] Renuka Goyal, Navjot Sidhu, Third Party Auditor:An Integrity Checking Technique for Client DataSecurity in Cloud Computing, IJCSIT, Vol. 5 (3) ,2014, 4526-4530

[2] Cloud Standards Customer Council, www.cloud-council.org

Page 26: Tech Niyati - gvpcew.ac.ingvpcew.ac.in/College Magazines/Tech Niyati... · for Gayatri Vidya Parishad College of Engineering for Women, I am jubilant to meet you through this page

Tech Niyati | April 2017 | 24 www.gvpcew.ac.in

Know a ScientistJOHN von NEUMANN

Great Philosophers,Mathematicians, Sc ientists,Statesmen, Politicians, Artists Sportsmen and manymore with their sheer brilliance in their respectivefields have contributed to the Modern World in a waythat the Humanity around them immenselybenefitted and shaped their lives with the fruits ofthe legendary achievements. John von Neumann aHungarian born American Mathematician stands tallamong the Legendaries of the Modern World.

Born in 1903 in a Jewish family at Budapest,HungaryJohn von Neumann grew from a child prodigy to oneof the world’s foremost Mathematicians by his midtwenty’s. At the age of 6 he could multiply two eightdigit numbers in head and could converse fluently inGreek. Learned languages and mathematics fromtutors and went to the most prestigious school inBudapest. He developed passion for Mathematicsfrom a very early age, but his father, Max Neumann,being a banker, advised his son to take other subjects,as mathematics might not make him earn moremoney. As a compromise,John Neumann pursuedChemistry and Mathematics simultaneously. He gothis first degree in Chemical Engg.in 1925 from SwissFederal Institute, Zurich and Ph.D in Mathematics in1926 from Univ.of Budapest.

John von Neumann commenced his intellectualcareer under the influence of David Hilbert (HilbertTransforms) and establishing axiomatic foundations-transfiniteordinals. The definition of conventionalordinal numbers given by him in his mid-twenties –namely- as the set of all small ordinal numbers- isbeing followed even today!. He continued hispostdoctoral work under Dr.Hilbert at Univ. ofGottingen, Germany, where he has developedinterest in Quantum mechanics. John Neumannpublished a book –Mathematical Foundations ofQuantum Mechanics- (1932) in which Quantum Statesare treated as Vectors in Hilbert’s space. Niel’s Bohrand Heisenberg appreciated John’s work but AlbertEinstein had some reservations.

Neumann moved to Princeton in 1930 and became aProfessor in Mathematics in 1933. Von Neumannproduced succession of pivotal papers in Logic ,Settheory, Group theory, Ergodic theory, automata,measure theory, Lattice theory Operation theory,Functional Analysis, continuous Geometry, ComputerScience Hydrodynamics (of explosions) statistics andGame Theory. Along with Osker Morganstern vonNeumann published a paper on “Theory of Gamesand Economic behavior”, considered to be magnumopus. At Princeton, he became a legend and amember of the Institute of Advanced Study (IAS), themember of one of the six ‘demigods group’ of whichAlbert Einstein is one among them. He used to playpractical jokes on Einstein .He could recite booksverbatim and could edit Assembly language computercode in his head. Never much like the stereotypedmathematician, he was known as a wit, bon-vivantand an aggressive driver. One of the Princetonintersections was named as von Neumann’s cornerbecause of his frequent accidents he made at thatplace.

During 1944 to 1951 von Neumann’s publications onComputer design established the merit of singleProcessor Stored programme Computer- anarchitecture now known as vonNewmannarchitecture. Along with AllanTuring and ClaudeShannon he was responsible for the invention ofstored programme Digital computer.

During World War II he was involved in the ManhattanProject, closely associated with Oppenheimer andNeddermeyer. He provided the required mathematicsfor the atomic bomb (implosion technique). Alsoalong with Edward Teller and StanislowUllamvonNeumann worked out the key steps in thermo nuclearreaction and the Hydrogen bomb.

John von Neumann breathed his last at an age of 53(1957 Feb.).With his pivotal work on Quantum theory,the atomic bomb and the Computer von Neumannexerted greater influence on the Modern World thanany other mathematician of the 20th century.

Page 27: Tech Niyati - gvpcew.ac.ingvpcew.ac.in/College Magazines/Tech Niyati... · for Gayatri Vidya Parishad College of Engineering for Women, I am jubilant to meet you through this page

Tech Niyati | April 2017 | 25

John von Neumann’s ContributionsMathematics : Foundations of Mathematics,

Functional analysis, Lattice theory,Geometry

Physics : Quantum Mechanics, Hydrodynamicsand Fluid Dynamics.

Economics : Game Theory

Statistics : Ergodic Theory.

Computing : von Neumann Architecture, LinearProgramming, Self-ReplicatingMachines, Stochastic Computing

Famous Quotes of John von Neumann“Truth is much too complicated to allow anything butapproximation”

“In Mathematics,you don’t understand things.Youjust get used to them”.

“If people do not believe that mathematics is simple,itis only because they do not realize how complicatedlife is.”

“There is no sense in being precise when you don’teven know what you are talking about.”

“Anyone who attempts to generate random numbersby deterministic means is,of course livingin a state ofsin.”

“There probably is a ‘God’.Many things are easier toexplain if there is than if there isn’t.”

What Great Scientists have said about Neumann:I have sometimes wondered whether a brain like

von Neumann’s does not indicate a species superiorto that of man.

- Hans Bethe

Fastest Mind- Paul Samuelson

Cleverest man in the world.- British NPL

Wigner compared von with Einstein:Einstein’s understanding was deeper than vonNeumann’s.His mind was both penetrating and moreoriginal than von Neumann’s.

Once there was a survey conducted in USA about whocan be considered as ‘The FATHER of COMPUTER‘, andthe options given were:1) Charles Babbage2) Von Neumann3) Allan Turing

A great majority voted John von Neumann!

Page 28: Tech Niyati - gvpcew.ac.ingvpcew.ac.in/College Magazines/Tech Niyati... · for Gayatri Vidya Parishad College of Engineering for Women, I am jubilant to meet you through this page

Tech Niyati | April 2017 | 26 www.gvpcew.ac.in

Polymer - Based Transistors Bring Fully StretchableDevices Within Reach(Source: Physics Today, March 2017- A Publicationof American Institute of Physics)

ZhenanBao wants to give robots the sense of touchThe Stanford University professor is among acontingent of materials scientist, chemists, andengineers who have been working to developstretchable electronic materials that could serve asartificial skin for robot ics. Such material couldbenefit people too, as medical sensors that can beworn like temporary tattoos or as implantabledevices that could,say monitor an internal organwithout inhibiting its function.

Now Bao and her coworkers have reported theirbiggest advance yet in the pursuit of stretchableelectronics: They've demonstrated a method forfabricating polymer films that are both stretchableand good semiconductors, the group found successwith five semiconducting polymers,all paired withthe same polystyrene polybutylene elastomer. Intheir upstretched states, all five films exhibitedelectron motilities on par with those of their pure,conventionally prepared counterparts;in four of thefive,motilities exceeded 1cm2/V.s. But unlike theconventional films, the composite films could bestretched to double their length with virtually noloss in electron mobility.

Graphene Could Buttress Next-Gen Computer ChipWiring(Source: IEEE Spectrum, March 2017)

Current can literally blow copper interconnectsaway, but graphene could keep them intact

Most of the hand-wringing over the fate of Moore'sLaw focuses on the ever shrinking silicon transistor.

But increasingly researchers are concerned withanother critical part of the infrastructure: the copperwires that connect individual transistors to formcomplex circuits.

Copper wires are getting so thin, and must carry somuch current, that the atoms in the wire can literallyget blown out of place. "The electron wind canphysically move the copper atoms and create avoid," says Wong. Growing graphene around copperwires prevent this, according to research that Wong'sgroup presented at the meeting. It also seems tobring down the resistance of copper wires.

At-Home Electric Headband For Depression CouldGo Mainstream(Source: IEEE Spectrum, March 2017)

A consumer-friendly gadget could help tDCStreatment catch on

A doctor's prescription for clinical depression couldone day sound like this: In the comfort of your ownhome, slip on a brain-zapping headband a few timesper week. For 20 minutes, it will send a tiny streamof electricity through your brain.

The treatment is delivered by a user friendly typeof brain stimulation called tDCS (TranscranialDirect-Current stimulation). This mind altering techniquehas become a hot topic in neuro-science researchover the last decade, and it's now beginning thetransition from lab to doctor's office.

tCDS is considered an exciting new possibility forclinical use because the gear is cheap, portable andeasy to use. The headsets press electrodes againstparticular locations on the scalp to channel a fewmilliamperes of current through a specific brainregion, and they can be powered by a 9-Volt battery

Trending NewsSource : Physics Today | IEEE Spectrum

Page 29: Tech Niyati - gvpcew.ac.ingvpcew.ac.in/College Magazines/Tech Niyati... · for Gayatri Vidya Parishad College of Engineering for Women, I am jubilant to meet you through this page

Tech Niyati | April 2017 | 27

Trending ArticleB. Kroposki et al.

(excerpt from Power and Energy Magazine,15(2) April 2017, 61-73)

Achieving a 100% Renewable GridAround the world, most good sites for largehydropower resource have already been developed.So how do other areas achieve 100% renewable grids?Variable Renewable Energy (VRE), such as wind andsolar Photo Voltaic (PV) systems, will be a majorcontributor, and with the reduction in costs for thesetechnologies during the last five years, large-scaledeployments are happening around the world.

Wind and solar power are different from most thermalgenerators because they have variable and uncertainpower output determined by local weatherconditions. Conventional generators, such as coal andgas plants, are considered dispatchable because theycan more easily change their power output (both upand down) to meet changes in load. As thepenetration of VRE increases within a system, manyfactors require greater grid flexibility toaccommodate the changes in generation. PV power ,in particular, has a natural challenge associated withits diurnal cycle because it does not produce anypower during the night. This makes the power outputbetween individual PV generator very well correlated, with large amounts of energy in relatively smallwindow of time .this can lead to larger net load rampsthan might otherwise be seen in the evenings.

Wind energy also has a diurnal cycle, albeit one thatis less pronounced than that for PV power. In many

locations wind power can also produce ramps inpower output when there are large changes inweather conditions across large geographic areas.Generally, these ramps tend to occur during multiplehours when there is a sufficient amount of geographicdiversity in the wind power resource.

A technology that allows for the temporal shifting ofVRE is energy storage. Energy storage has value inthe power system at many timescales, the mostimportant of which is in shifting wind and solar powerfrom times when it might otherwise be curtailed totimes when the power output of VRE is lower thancurrent demand.

Achieving 100% VRE grids will require> better ways of matching supply and demand over

multiple timescales> significant curtailment> proper operation with very high instantaneous

penetration of VRE

As ac power system evolves from synchronousgenerator dominated system to inverter-dominatedones, we must ensure that these technologiesoperate in a compatible manner.

This includes designing inverter-based system toprovide system stability and additional grid servicesnecessary for proper ac power system operations.

Renewable Grid @ GVPCEW

Page 30: Tech Niyati - gvpcew.ac.ingvpcew.ac.in/College Magazines/Tech Niyati... · for Gayatri Vidya Parishad College of Engineering for Women, I am jubilant to meet you through this page

Tech Niyati | April 2017 | 28 www.gvpcew.ac.in

FacultyDevelopment

D.Srinivas Reddy* A.S.V. Vijaya Lakshmi**

* Assistant Professor, EEE Department** Assistant Professor (Incharge HOD), EEE Department

Our Experience @ IIT KanpurWe attended the " International workshop on cyberphysical systems and a short course on control ofcyber physical systems" held during March 20-26,2017in the Department of Electrical Engineering at theIndian Institute of Technology, Kanpur, U.P., India.Ministry of Human Resources development has setup a Teaching Learning Centre for Internet of Thingsat IIT, Patna under PanditMadan Mohan MalviyaNational Mission on teachers and teaching inassociation with IIT, Kanpur, IIT Kharagapur and IITIndore.

The objective of the workshop was to provide acomprehensive PG level course package in this shortcourse on control of cyber physical systems, with acourse module of 40 lecture hours. Prof.SandeerShukla delivered his first lecture on howcyber physical system has evolved and an overall viewon cyber physical systems by stating that "Cyber-Physical Systems (CPS) is engineered systems that arebuilt from, and depend upon, the seamlessintegration of computational algorithms and physicalcomponents. Advances in CPS will enable capability,adaptability, scalability, resiliency, safety, security andusability that will far exceed the simple embeddedsystems of today. CPS technology will drive innovationand competition in sectors such as agriculture, energy,transportation, building design and automation,healthcare, and manufacturing". Few examples forCyber Physical System (CPS) are smart grid, smart city,smart home and assisted living, smart car, autonomousvehicles, networked systems of robots, UAVs, andunmanned cars. Workshop also included lectures onswitching systems, hybrid systems, networked control

systems, quadrotor design, modeling and control,state estimations, graph theory, effect of time delayon consensus, collision avoidance and formationcontrol. During this whole short course we had beengiven lectures by experts in this field and the topicswere of both basics and applications. The Workshopemphasized the importance in developing science andtechnology concerning this emerging field. Thissignifies the importance of this CPS system both interms of technological impact as well as underlyingscientific knowledge creation. They also presentedlive projects and explained about the challenges theyfaced to overcome it.

On 24th March 2017, International Workshop on CSPwas inaugurated. It focused on the challenges indesigning CPS like Smart Grid, Multi Robot Systemcoordination problems, how safe our criticalinfrastructures are from cyber-attacks, UAV pathplanning in urban environments, their experiencesat Amazon picking Challenge 2016 etc. Panel discussedthe key issues of the workshop by having Master'sprogram on IOT. Feedback form from the panelcommittee and the participants about the eligibilityconditions and curriculum of this course were taken.This workshop illuminated us about the emergingnature of this topic in terms of research issues,applications and technological opportunities. Wethank our Princ ipal Prof. K.A. Gopala Rao, V icePrincipal Prof. G. Sudheer and the Management fortheir encouragement and support, without them itwould not have been possible for us to attend thiscourse and interact with national and internationalexperts in this field.

Ms. A.S.V. Vijaya Lakshmi Mr. D. Srinivas Reddy

Facu

lty

Page 31: Tech Niyati - gvpcew.ac.ingvpcew.ac.in/College Magazines/Tech Niyati... · for Gayatri Vidya Parishad College of Engineering for Women, I am jubilant to meet you through this page

Tech Niyati | April 2017 | 29

Technotsav – 2K17 Is A Student LevelTechnical Fest Conducted on 16th -17th March 2017, by Gayatri VidyaParishad College ofEngineering For Women.Various Technical eventslike: Paper Presentations Hardware Expo Technical Workshops Game’oMaina

Around 400 students havep a r t i c i p a t e denthusiastically in variousactivities. The event has beeninaugurated by Smt Ch V S Sudha,Sc ient ist ‘F ’, Head, SoftwareDivision, NSTL, in the august presenceof Sri A S N Prasad (President, Gayatri Vidya

Parishad), Dr P Somaraju (Secretary,Gayatri Vidya Parishad). She

delivered inaugural lecture on“Embedded Systems and its

simulation in TorpedoApplicat ions” whichcaptivated the spectators.

The valedictory wasgraced by Sri A V BalajiKumar, (EngineeringManager, Chegg Inc.,

Vizag) as Chief Guest andSri P Raghuveer, (Sr

Director, Inside Sales,OpenLogix, USA) as Guest of

Honor. The cultural activitieswere performed by students which

enthralled the audience and broughtout the latent talents of the students.

Technotsav2K17 Celebrating Technology

Page 32: Tech Niyati - gvpcew.ac.ingvpcew.ac.in/College Magazines/Tech Niyati... · for Gayatri Vidya Parishad College of Engineering for Women, I am jubilant to meet you through this page

Tech Niyati | April 2017 | 30 www.gvpcew.ac.in

We all have heard about that "impossible word is not there in any dictionary". Butfor me it was there in my dictionary till the time I joined GVPCEW. Our institutetaught me that if you set your mind to do anything, you will reach your goal at anycost. As per my understanding, all the GVPCEW girls working, studying or marriedaround the world are being loved by all whoever they meet because of thediscipline that has been inculcated at the college level. I want to thank all ourcollege Professors and especially Mr. BhaskarSarma Sir, Mr. Sudheer Sir and Mr.Vasu Sir- you all are always the pillars of our college and for our future. They havesupported us in all aspects pertaining to studies or sports. So, dear girls, be patientandwait for your great future ahead that GVPCEW is building for you.

Sand

eep

Kaur

Soft

war

e En

gine

er, I

BM

Anus

ha A

idam

,Te

am Le

ad, R

ay B

usin

ess T

echn

olog

iesIt gives me great pleasure to say with pride that I have completed my graduationfrom GVPCEW. I think GVPCEW is not just a place to earn a degree but to begroomed holistically. I have acquired a lot of confidence through various platformsprovided by the college.I am glad that GVPCEW gave me an opportunity to undergoopportunities for developing my interpersonal skills through weekly seminars,club activities and cultural fests which are add-ons that played a significant role inshaping my confidence.This is a glorious moment for me when I am writing fewwords about my college. And, I would like to thank the GVPCEW family for beingso supportive throughout my journey in the college.

Chitr

a M

edur

iJr.

Scie

ntist

, R&D

, Axio

Bio

solu

tions

Pvt

Ltd,

Belonging to the first batch of Biomedical Engineering in Visakhapatnam had itsshare of cons, but looking back, I now realize that the zeal to pursue such a profoundbranch of Engineering can be attributed to the wonderful faculty of GVPCEW whoconstantly encouraged me. College is a place which gives plethora of opportunities,we need to take a chance to identify ourselves in order excel in whatever domainwe choose to make a career in. After getting an MS from Arizona State University,I currently work with a company that designs novel material substitutes for woundhealing. I will be heading out for a PhD soon. GVPCEW has instilled in me discipline,determination and strong basics - values that will forever ensure my success inthis field. Proud to be a GVPCEW alumnus!

The days spent in GVPCEW are the best that has ever happened to me.This divineinstitution has not only helped me in imbibing knowledge but also in developingmy overall personality. It acted as a catalyst in the process of building myconfidence. My sincere and humble thanks to all my Gurus, mentors and friendsin GVP family for their support and altruism. They have played a very crucial rolein shaping me into an independent woman and I am proud that I chose the rightpath in selecting GVPCEW over other colleges.I'm carrying along with me beautifulmemories of this place and will always cherish them. Thank you GVPCEW formaking my journey so pleasant.M

edid

a Dev

i Pra

sann

aAs

sista

nt, R

eser

ve B

ank

of In

dia

Alumni SpeakIf we can do it, you can too..

Page 33: Tech Niyati - gvpcew.ac.ingvpcew.ac.in/College Magazines/Tech Niyati... · for Gayatri Vidya Parishad College of Engineering for Women, I am jubilant to meet you through this page
Page 34: Tech Niyati - gvpcew.ac.ingvpcew.ac.in/College Magazines/Tech Niyati... · for Gayatri Vidya Parishad College of Engineering for Women, I am jubilant to meet you through this page