Syntax e
Syntax e
ACE SPEAKS...
*.ace
ACE’09 feels very happy to place this yearly book SYNTAX’09 in the hands of its
well-wishers, faculty, friends and supporters.
In order to cope with today’s competition each and every student should be
aware of the happenings all around the world. To achieve this, the Department of
Computer Science and Engineering provides an excellent platform for all the students
in the form of its annual magazine SYNTAX. This book covers a wide range of topics
which are informative and thought provoking.
ACE’09 has tried its level best in meeting the standards set by the department
and ACE’08.
ACE’09 is very thankful to the faculty members for the blessings and guidance
through out the designing of this book. ACE’09 is foreever thankful for the support and
encouragement from seniors,friends and juniors.
Last but not the least, ACE’09 thanks all the article contributors, volunteers,
coordinators and most appropriately all the generous hearts, without whose support,
this monumental work could not happen. This little idea of magazine became a reality
only due to the enthusiastic response from the students.
As a team, ACE’09 dedicates SYNTAX’09 to the well wishing and beloved seniors of
2005-2009 batch who have been the strength and are part of its plans and actions, guiding
through out their times with us. ACE expects the same cooperation and support from
them through out their lives. All the best...
ACE’09
INDEX
*.index
Messages............................................................................................................7-13
About Department................................................................................................15
Body of ACE..........................................................................................................17
Placements...........................................................................................................19
GRE scores...........................................................................................................20
E-mail ids.............................................................................................................21-26
*.tech
Web mining..........................................................................................................29
Quantum computer..............................................................................................29
Spamming............................................................................................................30
Phishing...............................................................................................................31
Ambient Intelligence............................................................................................31
Ajax......................................................................................................................32
Blue Gene.............................................................................................................32
5 worst computer viruses of all time....................................................................33
Computer worm....................................................................................................33
Captcha................................................................................................................34
Types of Computer crimes..................................................................................35
Know them Better.................................................................................................36
Laser Keyboard.....................................................................................................36
Touch Screen........................................................................................................37
Virtualisation........................................................................................................38
3G wireless technology........................................................................................38
Semantic web.......................................................................................................39
Software as a Service...........................................................................................40
Give me a Ring.....................................................................................................42
Wanna be a gamer?.............................................................................................42
Virtual fence for vehicles.....................................................................................43
Mobile computing................................................................................................44
Gate Keeper Pico..................................................................................................45
Cloud Computing..................................................................................................46
Is Internet explorer only your cup of tea?............................................................47
Android.................................................................................................................48
Transferjet............................................................................................................50
The world’s premier technology competition for students..................................51
Computer scientists.............................................................................................52
*.lit
*.msg
Sri M.Seshagiri Rao,
President,
Bapatla Educational Society,
Bapatla.
Message
My wishes to the students of the Department of Computer science on the release of the 4thedition
of their departmental magazine Syntax. Departmental magazines strive to bring awareness among the
students with its technical and literal contents.
I am elated to note that departmental association (ASSOCIATION OF COMPUTER ENGINEERS) is
formed every year for organizing vaious technical and literal activities in the department. Such events will
help the students in building their personality, developing their attitude, enhancing their communication
skills, thus allowing them to face the global competition and to become leaders.
I wish the CSE association every success in efforts to bring out inherent talents of students. I
appreciate the editors for their commendable work. My best wishes for all the graduating students.
(M.Seshagiri Rao)
*.msg
Dr. G.Nageswara Rao, Ph.D
Principal,
Bapatla Engineering College,
Bapatla.
Message
It is indeed great pleasure to note that the Department of CSE is releasing its 4th edition
of the annual magazine Syntax which briefs the activities of the Association. The magazine aims at
bringing the hidden talents of the students of the department.
There are lots of advancements taking place in various technologies at rapid pace. It takes
longer time to get these covered in regular curriculum. It is important to catch up with these advance-
ments at least briefly by putting some additional efforts. The Departmental Associations can play an
important role in bringing out the latest developments by way of articles in magazine, organizing short
seminars etc.; It gives a very good quick insight into these developments.
I wish the Association all the best and I hope that many good activities will be taken up by the
Association in future also for the benefit of the students.
*.msg
Prof. N.Sudhakar, M.Tech,
Head of the Department,
Department of Computer Science and Engineering,
Bapatla Engineering College,
Bapatla.
Message
Engineering is the discipline and profession of applying natural laws to design systems
that work for the cause of mankind. A critical aspect of this (often ignored) is to engineer an optimized
system that satiates and respects conflicting constraints. Indispensably, an engineering pupil is to be
adept at an assorted skill set, preserving academic excellence concurrently.
I regard magazine club as a staging area where a pupil can sharpen the skills of designing, writing,
compiling, optimizing and communicating. I found a great deal of character in the activity team of the
college magazine and the efforts put in deserve plaudit. I claim with pride that I am a part of this
magazine, observing them all through.
I wish that more activities would be rolled in the ensuing time with the same spirit. I appeal to the
students and faculty of the department to be committed beyond the self, to accomplish, and to perpetuate
a congenial and serene academic aura.
An old adage says, “Ability is what you’re capable of doing. Motivation determines what you do.
Attitude determines how well you do it”.
(Prof. N.Sudhakar)
*.msg
Prof. V.Chakradhar, M.Tech,
Department of Computer Science and Engineering,
Bapatla Engineering college,
Bapatla.
Message
Time and tide wait for none. As today’s competitive world is moving at its full pace, maintaing
time as per schedule is the need of the hour. Through the magazine I would like to convey to all the
students “to plan, prioritize and implement” their schedule on time.
Think big. Dream big. Thinking in a broder perspective is the way of approaching and solving
problems. Dream is not the one which comes in sleep. Dream is the one which does not make us sleep.
(At the same time dont sleep for long times in order to get big dreams).
Extra-curricular activities are equally important to the students along with the technical knowledge
because they help in changing the approach of students and to visualize the problems from a different
angle. I wish the association to continue the extra-curricular activities which are a part of department’s
schedule.
It is very glad to note that the association has maintained the standards set by the department
and their seniors. I wish the association the best in all its activities.
(Prof. V.Chakradhar)
ABOUT DEPARTMENT...
*.dept
The Department of Computer Science and Engineering was started in 1994-95. The Department
offers B.Tech and M.Tech programs in the stream of Computer Science & Engineering.The Department
is accredited twice by NBA.
The department is equipped with the state of the art computing facilities, LCD projectors in all
class rooms, experienced staff members and is known for its academic excellence proved by its
performances since its inception.
The pass percentage of the department has been more than 97% and more than 50% of the
students obtain distinction every year, which speaks of the academic fervour in the department. The
department holds the reputation of getting competitive GATE every year, and the students got admitted in
all the IIT’s IISc, Central Univeristy, University of Roorkee and many Regional Engineering Colleges in
M.Tech and M.S. Programs. A good number of students from the department obtained admissions into
M.S.(Computer Science) Program abroad .
Many of the students were placed in reputed organizations like HP, Texas Instruments, Motorola,
Lucent, Wipro, HCL, Siemens, Veritas, Oracle, Hoenywell, Mindtree Solutions, Infosys, Aztec in challenging
positions.Students are encouraged to participate in extra-curricular activities and competitions held by
other universities and colleges within the state and out-side the state. The students have won laurels to
the college winning prizes in competitions – TECHFEST IIT-Bombay, INFLUX: University of Roorkee and
many others. A good number of students from the department represent the college in IIT-M’S SHAASTRA,
SAARANG and BITS-QUARK festivals on a regular basis.
The department strives hard to impart quality education and to keep the students on the competitive
edge of the present-day technology.
BODY OF ACE’09
*.body
V.A.NAVEESHA
T.T.DEEPTHI
R.KAANTHI KEERTHI
S.KAVYA
K.MOUNIKA
D.ABHIRAM
K.AVINASH
B.G.K.VARMA
K.GANESH KUMAR
G.HARI KRISHNA
R.MAHENDRA SINGH
M.N.V.V.RAMESH
B.N.SANDEEP
R.PRAVEEN
P.R.CHAITHANYA SIDDHARTHA
D.PRAVALLIKA
T.S.RAMYA KRISHNA
N.RAMYA
G.S.R.JYOTHI
R.RAMA KRISHNA
M.NAGA JYOTHI
K.ASHA JYOTHI
A.SNEHA
K.DINESH
T.V.K.CHAITANYA
STAFF COORDINATOR
Prof. V.CHAKRADHAR
*.job
The following is the list of students who are placed in various multinational companies for the current
academic year under the esteemed guidence of the placement incharge of the department
Mr.Sajid Ali Ansari.
TATA CONSULTANCY
SERVICES
1 K. Anusha
2 P. Anusha
3 D. Bhavya INFOSYS
4 M. Lakshmi Harika
5 K. Amarendra
6 P. Gopal Krisna Murthy 1 P. Bhargavi
7 G. Gautham 2 K. H. N. V. Vijay VIRTUSA
8 K. H. N. V .Vijay 3 J. Sravya
9 P. Kishore Kumar 4 Shaik Rizwan
10 Ch Ravi Teja 5 N .Siva Ram Krishna 1 Y.Teja
11 C. T . V. Neelima 6 SK Rizwan Basha
12 G. Rajani 7 G. Srihari
13 B. Srividya 8 P. Sunil Kumar
14 Shaik Rizwan 9 B. Vinod Kumar
15 M. Sri Ram Avinash 10 Jahid Shaik
16 T. V. N. Siva Kumar 11 Ch Naga Kishore
17 P. Vedavyas
18 M. V. Sumanth
19 B. Vinod Kumar
20 P. Swetha Mourya
GRE-TOFEL - 2008
S.No. Name of the student GRE TOFEL
*.id
2 Y5CS404 Anusha.P [email protected]
3 Y5CS413 Bhargavi.P [email protected]
4 Y5CS414 Bhavya.D [email protected]
5 Y5CS417 Dakshayani.Ch [email protected]
6 Y3CS419 Harika.Ch [email protected]
7 Y5CS426 Kavitha.J [email protected]
8 Y5CS429 Lakshmi Harika.M [email protected]
9 Y5CS430 Lakshmi Prasanna.K [email protected]
10 Y5CS434 Maheswari.K [email protected]
11 Y5CS436 Mercy kumari.A [email protected]
12 Y5CS438 Mrudula.M [email protected]
14 Y5CS443 Navya.S [email protected]
16 Y5CS402 Amarendra.K [email protected]
17 Y5CS405 Aravind Kumar.P [email protected]
18 Y5CS406 Arun Babu.K [email protected]
19 Y5CS407 Arun Kumar.G [email protected]
20 Y5CS408 Avinash.M [email protected]
21 Y5CS410 Bala Krishna.A [email protected]
22 Y5CS411 Bala Krishna.V [email protected]
23 Y5CS412 Bharath.M [email protected]
24 Y5CS416 Chiranjeevi.S [email protected]
25 Y5CS418 Deva Prasad.A [email protected]
26 Y5CS419 Gopala Krishna Murthy.P [email protected]
27 Y5CS420 Gautham.G [email protected]
28 Y5CS425 Naga Venkata.Vijay.K.H [email protected]
29 Y5CS421 Harish.N [email protected]
30 Y5CS422 Hemanth.J [email protected]
31 Y5CS423 Hemanth Reddy.B [email protected]
32 Y5CS424 Jahid.Sk [email protected]
33 Y5CS427 Kishore Kumar.P [email protected]
34 Y5CS428 Krishna Reddy.Y [email protected]
35 Y5CS432 Madusudhana Rao.Ch [email protected]
36 Y5CS433 Mahesh.G [email protected]
37 Y5CS435 Manohara Reddy.D [email protected]
38 Y5CS437 Moulali.Sk [email protected]
39 Y5CS439 Munesh Kumar.P [email protected]
40 Y5CS440 Naga Kishore.Ch [email protected]
*.id
90 Y5CS478 Sri Ram Avinash.M [email protected]
91 Y5CS480 Sumanth.M [email protected]
92 Y5CS481 Sundar.V [email protected]
93 Y5CS463 Sundeep.N [email protected]
94 Y5CS482 Sunil Kumar.P [email protected]
95 L6CS500 UmaMaheswara Rao.B [email protected]
96 Y5CS486 Siva Kumar .T.V.N [email protected]
97 Y5CS409 Datta Pavan .B.V.S.N [email protected]
98 Y5CS487 Veda Vyas.P [email protected]
99 Y5CS488 Veeraiah Chowdary.K [email protected]
100 Y5CS401 Phani Kumar.A.V [email protected]
101 Y5CS489 Venkata Sumanth.M [email protected]
102 Y1CS483 Venu Babu.N [email protected]
103 Y5CS490 Vinod Kumar.B [email protected]
104 Y5CS491 Yatish.T [email protected]
105 Y5CS448 Pravallika.M [email protected]
106 Y4CS473 Sujith Kumar.R [email protected]
107 Y3CS484 Ratna Sekhar.V
108 Y3CS448 Naveen Kumar.T [email protected]
109 Y3CS453 Priscilla.J [email protected]
110 Y5CS452 Ravi Kiran.M
111 Y4CS401 Adilakshmi.Y [email protected]
112 Y2CS409 Chinni Babu [email protected]
113 Y2CS430 Nageswara Rao [email protected]
114 Y4CS491 Vineeth Krishna.G [email protected]
115 Y4CS458 Sasi Kumar.T [email protected]
BATCH ID:[email protected]
*.id
47 Y6CS446 Sandeep.B.N [email protected]
48 Y6CS447 Nagarjuna Reddy.V [email protected]
49 Y6CS448 Naresh Babu.K [email protected]
50 Y6CS449 Nareshbabu.M [email protected]
51 Y6CS451 Naveen Kumar [email protected]
52 Y6CS452 Naveen Sagar [email protected]
53 Y6CS454 Phani Kumar [email protected]
54 Y6CS460 Praveen.R [email protected]
55 Y6CS461 Praveen.T [email protected]
56 Y6CS462 Siddhartha.P.R.C [email protected]
57 Y6CS463 Raghavendra.I [email protected]
58 Y6CS464 Raghavendra Raja [email protected]
59 Y6CS465 Raghu.K [email protected]
60 L7CS529 Rambabu.R [email protected]
61 L7CS530 Sesha Sai.M [email protected]
62 Y6CS424 Jaya Krishna [email protected]
63 Y6CS431 Krishnaveni.M [email protected]
64 Y6CS444 Teja Dev.N [email protected]
71 Y6CS458 Pravallika.D [email protected]
72 Y6CS459 Pravallika.K [email protected]
73 Y6CS469 Rajitha.P [email protected]
74 Y6CS472 Ramya.N [email protected]
75 Y6CS478 S.Madhuri.D [email protected]
76 Y4CS453 S R Jyothi.G [email protected]
77 Y6CS479 S R Krishna.T [email protected]
78 Y6CS484 Shiny.P [email protected]
79 Y6CS485 Sireesha.P [email protected]
80 Y6CS491 Sowmya.G [email protected]
81 Y6CS492 Sowmya.K [email protected]
82 Y6CS496 Srilakshmi.K [email protected]
83 Y6CS500 Supraja.N [email protected]
84 Y6CS501 Surekha.G [email protected]
85 Y6CS502 Sushma.K [email protected]
86 Y6CS507 Anusha.B.V.S.N [email protected]
87 Y6CS510 Vamsi Krishna.D [email protected]
88 Y6CS512 Venna Madhuri.G [email protected]
89 Y6CS513 Alekhya.M.V.L [email protected]
90 Y6CS514 Neeharika.A.V.N.L [email protected]
91 Y6CS515 Mahathi.K.V.R [email protected]
WEB MINING
K.SUDHEER KRISHNA
M.BHANU KIRAN KUMAR
*.tech
FIRST YEAR
With the explosive growth of information sources
available on the World Wide Web (WWW), it has
become increasingly necessary for users to utilize
automated tools in order to find, extract, filter and
evaluate the desired information and resources. It is using the tree-like structure to analyse and
Web Mining can be broadly defined as the describe the HTML (Hyper Text Markup Language)
technology that mines the data gathered from the or XML (eXtensible Markup Language) tags within
World Wide Web and comes out with some critical the web page.
results. As more organizations rely on the internet and
Web Mining can be categorized into two types: the World Wide Web to conduct business, the
1.Web Content Mining traditional strategies and techniques for market
2.Web Usage Mining analysis need to be revisited in this context. Most
3.Web Structure Mining of this information is usually generated
Mining Process: automatically by web servers and is collected in
server access logs.As the popularity of World Wide
The key component of Web Mining is the mining
Web continues to increase, there is a growing need
process itself. It has adopted techniques from the
to develop tools and techniques that will enrich the
field of data mining, databases and information
usage of web mining.
retrieval, along with some techniques of its own.
Web Content Mining: QUANTUM COMPUTER
Web Content Mining is an automatic process that
extracts patterns from online information, such as
HTML files, images, E-mails along with some simple K.DIVYASRI
statistics of words and phrases in the documents J.MARY GOLD
based on the keyword.
SECOND YEAR
Web Usage Mining:
Web Usage Mining is the type of Web Mining A quantum computer is any device for
activity that involves the automatic discovery of user computation that makes direct use of distinctively
access patterns from one or more web servers quantum mechanical phenomena, such as
Web structure mining: superposition and entanglement, to perform
Web structure mining is the process of using graph operations on data. In classical computer,
theory to analyse the node and connection structure information is stored as bits; in a quantum computer
of a web site. According to the type of web structural it is stored as zubits (quantum bits).
data, web structure mining can be divided into two The basic principle of quantum computation is
kinds. that the quantum properties can be used to
The first kind of web structure mining is extracting represent and structure data, and that quantum
patterns from hyperlinks in the web.A hyperlink is a mechanisms can be devised and built to perform
structural component that connects the web page operations with this data.
to a different location. The other kind of the web Classical computer has a memory made up of
structure mining is mining the document structure. “bits” where each bit holds either 0 or 1. A quantum
SPAMMING
computer maintains a sequence of “qubits”. A single
B.USHA PRIYADARSHINI
qubit can hold a one or a zero or crucially a quantum
superposition of these. K.SINDHURA
A pair of qubits can be in a quantum-superposition FIRST YEAR
of 4 states and three bits in a superposition of 8. In
general a quantum computer with n qubits can be E-mail spam, also known as bulk e-mail or junk
in upt o 2n different states simultaneously. Quantum e-mail is a subset of spam that involves sending
computer must have atleast several dozen qubits nearly identical messages to numerous recipients
to be able to solve real world problems. A by e-mail. E-mail spam has existed since the
quantum.Computer operates by manipulating those beginning of the internet and has grown to about
qubits with a fixed sequence of quantum logic gates. 90 billion messages a day, although about 80% is
The sequence of gates to be applied is called a sent by fewer than 200 sporadically implemented,
“Quantum Algorithm”. with some being opt-out laws and others being opt-
Quantum computers are different from other in.
computers such as DNA computers and traditional Spam definition defined as, unsolicited bulk e-
computers based on transistors. By comparison, a mail (UBE)-Unsolicited e-mail, sent in large
quantum computer could solve this problem more quantities. This is the most popular definition.
efficiently than a classical computer using shor’s How E-mail spam is sent?
algorithm to find its factors. This ability would allow Spam is a term to describe unsolicited e-mail sent
a quantum computer to break many of the to you, often by commercial firms that attempt to
cryptographic systems in use today, in the sense sell you goods and services. Spam is sent out as
that there would be a polynomial time algorithm for bulk e-mail, often to list of 10,000 or more persons
solving the problem. But for now the technology at once. It is inexpensive to send.
required to develop such a quantum computer is To send out unsolicited bulk e-mail, a spammer
beyond of our research. Most research in quantum first needs to get a list of e-mail addresses. Often,
computing is theoritical.The most advanced spammers buy the lists from companies that
quantum computer have not gone beyond compile them.
manipulating more than 16 qubit meaning that they
Statistics and Estimations
are far cry from practical application.
If quantum computers can be built they will The growth of e-mail spam:
be valuable in these ways. Spam is growing, with no signs of abating. The
In factoring large numbers. amount of spam users see in their mail boxes is
These are used to protect secure web pages, just the tip of the iceberg. Since spammer’s lists
often contain a large percentage of invalid addresses contacted about an account needing to be
and many spam filters simply delete or reject verified, it is a sense of precaution to contact the
“obvious spam”. company from which the e-mail apparently
In Absolute Numbers: originates to check that the e-mail is legitimate.
1978- An e-mail spam is sent to 600 addresses. Alternatively, the address that the individual
1944- First large scale spam sent to 6000 news knows is the company’s genuine website can be
*.tech
groups, reaching millions of people. typed into the address bar of the browser, rather
2005- 30 billion per day. than trusting any hyperlinks in the suspected
2006- 55 billion per day. phishing message.
2007- 90 billion per day.
*.tech
the iChat contacts and sends a message to each
It affected in 2003. It is such a dangerous virus person on the list. The message contains a
that, only a few minutes after infecting its first corrupted file that appears to be an innocent JPEG
Internet server, the image. The Leap-A virus doesn’t cause much
Slammer virus was harm to computers, but it does show that
doubling its number even a Mac computer can fall prey to
of victims every malicious software.
second. F ifteen Storm Worm:
minutes after its first The latest virus on our list is the dreaded
attack, the Slammer Storm Worm. The public began to call the virus
virus infected nearly the Storm Worm because one of the e-mail
half of the servers messages carrying the virus had as its subject
that act as the pillars “230 dead as storm batters Europe.” The Storm
of the Internet. Worm is a Trojan horse program. Some versions
M y d o o m / of the Storm Worm turn computers into
Novarg: zombies or bots. Some hackers use the Storm Worm
It is another worm that can create a backdoor in to create a botnet and use it to send spam mail
the victim computer’s OS. The original MyDoom virus across the Internet. Although the Storm Worm is
had two triggers. One trigger caused the virus to widespread, it’s not the most difficult virus to detect
begin a Denial of Service (DoS). The second trigger or remove from a computer system.
commanded the virus to stop distributing itself. Even
after the virus stopped spreading, the backdoors
created during the initial infections remained active. COMPUTER WORM
Sasser/Netsky:
Unlike other worms, it didn’t spread through e-
mail. Instead, once the virus infected a computer, it M.VINOD KUMAR
looked for other vulnerable systems. It contacted KAUTILYA
those systems and instructed them to download the SECOND YEAR
virus. The virus altered the victim’s operating system
in a way that made it difficult to shut down the A Computer Worm is a self-replicating computer
computer without cutting off power to the system. program. It uses a network to send copies of itself
The Netsky virus moves through e-mails and to other nodes (computer terminals on the network)
Windows networks. It spoofs e-mail addresses and and it may do so without any user intervention. Unlike
propagates through a 22,016-byte file attachment. a virus, it does not need to attach itself to an existing
As it spreads, it can cause a Denial of Service (DoS) program. Worms always harm the network where
attack as systems collapse while trying to handle as viruses always infect or corrupt files on a
all the Internet traffic. targeted computer. Worms mainly spread by
Leap-A/Oompa: exploiting vulnerabilities in operating systems or by
In 2006, the Leap-A virus, also known as Oompa- tricking users to assist them.
A, uses the iChat instant messaging program to
CAPTCHA
T.V.K.CHAITANYA
S.RAMESH REDDY
SECOND YEAR
checks if the text entered by the user matches the
CAPTCHA stands for Completely Automated initial generated text. If it does, the transaction
Public Turing test to tell Computers and Humans continues. Otherwise, an error message is displayed
Apart. CAPTCHA is very useful tool in differentiating and the user has to enter a new code.
robots from humans. It is a simple test to determine - Exploits observation that humans are still
if the user is a robot or human.Computer Viruses: much better than computers at many pattern
Computer viruses are computer programs that can recognition tasks.
replicate themselves and harm the computer Types of CAPTCHA’s:
systems on a network without the The first CAPTCHA built was text CAPTCHA.
knowledge of the system users. Viruses Next there came image CAPTCHA.For the people
spread to other computers through who have difficulty to see there were CAPTCHAs in
network file system, through the audio format.For the people who can not see as well
network, Internet or by the means of as listen, there are mathematical CAPTCHAs called
removable devices like USB drives and MAPTCHAs.
CD. CAPTCHAs can prevent
History Auto registration,Mass mailing in forums and
Primitive CAPTCHA’s were developed in 1997 by g u e s t b o o k s , C o m m e r c i a l
Andrei Broder, Martin Abadi, Krishna Bharat and promotion,Harassment,Rate limiting for competitive
Mark Lillibridge to prevent bots from adding URLs websites,Article rating by computers but not
to Altavista search engine. In 2000, Luis von Ahn humans.
and Manuel Blum coined the term “CAPTCHA”. They
invented multiple examples of CAPTCHAs, including
Bypassing Captcha’s
the first CAPTCHA’s used by Yahoo.
There are a few approaches to defeating
CAPTCHAs:
· exploiting bugs in the implementation that
allow the attacker to completely bypass the
CAPTCHA,
· improving character recognition software, or
· using cheap human labor to process the
Principle tests.
The principles behind CAPTCHA are as At the present moment text-CAPTCHA is still
follows: effective because there is no universal algorithm
- The user is presented with a distorted image for text recognition.There are two strategies of
on which some text is displayed. This image is defense:
generated by the server using random text. 1) Make a change in CAPTCHA as soon it is
- The user must enter the same letters in the broken.
text into a text field that is displayed on the form to 2) Use innovative approaches in CAPTCHA’s
protect. engines to make it complex and attack free.
- When the form is submitted, the server
*.tech
spread to other computers through network file
Computer crimes are criminal activities, which system, through the network, Internet or by the
involve the use of information technology to gain means of removable devices like USB drives and
an illegal or an unauthorized access to a computer CDs. Computer viruses are after all, forms of
system with intent of damaging, deleting or altering malicious codes written with an aim to harm a
computer data. Computer crimes also include the computer system and destroy information. Writing
activities such as electronic frauds, misuse of computer viruses is a criminal activity as virus
devices, identity theft and data as well as system infections can crash computer systems, thereby
interference. Computer crimes may not necessarily destroying great amounts of critical data.
involve damage to physical property. They rather Cyber stalking: The use of communication
include the manipulation of technology, mainly the Internet, to
confidential data and critical torture other individuals is known
information. Computer crimes as cyber stalking. False
involve activities of software theft, accusations, transmission of
wherein the privacy of the users is threats and damage to data and
hampered. These criminal activities equipment fall under the class of
involve the breach of human and cyber stalking activities. Cyber
information privacy, as also the stalkers often target the users by
theft and illegal alteration of means of chat rooms, online
system critical information. forums and social networking
Types of computer crimes: websites to gather user information
Hacking: The act of defeating the and harass the users on the basis
security capabilities of a computer of the information gathered.
system in order to obtain an illegal access to the Identity Theft: This is one of the most serious
information stored on the computer system is called frauds as it involves stealing money and obtaining
hacking. Another highly dangerous computer crime other benefits through the use of a false identity. It
is the hacking of IP addresses in order to transact is the act of pretending to be someone else by using
with a false identity, thus remaining anonymous someone else’s identity as one’s own. Financial
while carrying out the criminal activities. Phishing: identity theft involves the use of a false identity to
Phishing is the act of attempting to acquire sensitive obtain goods and services and a commercial identity
information like usernames, passwords and credit theft is the using of someone else’sbusinessname
card details by disguising as a trustworthy source. or credit card details for commercial purposes.
Phishing is carried out through emails or by luring Identity cloning is the use of another user’s
the users to enter personal information through fake information to pose as a false user. Illegal migration,
websitesCriminals often use websites that have a terrorism and blackmail are often made possible by
look and feel of some popular website, which makes means of identity theft.
the users feel safe to enter their details there.
Computer Viruses: Computer viruses are
computer programs that can replicate themselves
Manner reveals Character
and harm the computer systems on a network
without the knowledge of the system users. Viruses
LASER KEYBOARD
R.MAHENDRA SINGH
SIDDARDHA
THIRD YEAR M.V.L.ALEKHYA
K.PRATHYUSHA
Yahoo! – It represents a person who is repulsive THIRD YEAR
in appearance and barely human. Yahoo! founders
David Filo and Jerry Yang jokingly considered
themselves yahoos. In recent days, many keyboards are taking their
Oracle – Larry Ellison, Ed Oates and Bob Miner birth in the market. One of such keyboards is LASER
were working on a consulting project for the CIA. KEYBOARD. This keyboard can be placed
The code name for the project was Oracle (the CIA anywhere.It is compact and user friendly. The Virtual
saw this as the system to give answers to all Laser Keyboard leverages the power of laser and
questions or some such). The project was designed infrared technology and projects a full-size keyboard
to use the newly written SQL database language onto any flat surface.
from IBM. The project was eventually terminated Mobile users can type normally on this virtual
but they decided to finish what they started and keyboard (VKB).It allows them to work quickly and
bring it to the world. Later they changed the name effectively. Based on optical recognition, it enables
of the company, Relational Software Inc., to the the user to tap the images of the keys, which are
name of the product. then fed into the compatible Bluetooth-enabled PDA,
Intel – Robert Noyce and Gordon Moore initially Smartphone, laptop or PC.
incorporated their company as N M Electronics. The Virtual Laser Keyboard provides a full-size
Someone suggested Moore Noyce Electronics but QWERTY keyboard. It is also smaller and more
it sounded too close to “more noise”. convenient to use than the folding-type keyboards
Later, Integrated Electronics was proposed but it made by some manufacturers and are similar to
had already been taken, so they used the initial them in functionality. It provides a projected image
syllables (INTegrated ELectronics). which is the perfect portable input device for PDAs.
Microsoft – coined by Bill Gates to represent the It is similar in responsiveness to regular keyboards.
company that was devoted to microcomputer It includes a self-contained, rechargeable Lithium
software. Originally christened Micro-Soft, the ‘-’ ion battery. It provides the Virtual Laser Keyboard
disappeared on 3/2/1987 with the introduction of a with its own internal power supply, so it doesn’t drain
new corporate identity and logo. The “slash between any battery power from the PDA or PC. The battery
*.tech
scalability, versatility and affordability especially
for larger units.
Dispersive Signal Technology
Introduced in 2002, this system uses sensors
to detect the mechanical energy in the glass that
occurs due to a touch. Complex algorithms then
interpret this information and provide the actual
location of touch. The technology claims to be
lasts two to three hours, more than enough time to unaffected by dust and other elements, including
do some instant messaging and SMS messaging scratches.
from the handheld existing minuscule keyboards and Since there is no need for additional elements on
handwriting recognition software. screen, it also claims to provide excellent optical
clarity. Also since mechanical vibrations are used
TOUCH SCREEN to detect a touch event, any object can be used to
generate these events, including fingers and styles.
B.MANIKANTA A downside is that after the initial touch the system
ASHWIN cannot detect a motionless finger.
FIRST YEAR
*.tech
SEMANTIC WEB
T.PRAVEEN
PHANI KUMAR
THIRD YEAR
· Vocabulary flexibility & standardization
Services of Semantic Web:
The word semantic stands for the meaning of. A) Semantic Web Ping Service
The Semantic Web is an evolving extension of the The Semantic Web Ping Service is a notification
World Wide Web in which the semantics of service for the semantic web that tracks the creation
information and services on the web is defined and and modification of RDF based data sources on the
satisfy the requests of people and machines to use Web.
the content. It derives from World Wide Web B) Piggy Bank
Consortium director Sir Tim Berners-Lee’s vision of Piggy Bank works by extracting or translating eb
the Web as a universal medium for data, scripts into RDF information and storing this
information, and knowledge exchange.The Semantic information on the user’s computer.Ex: Google Maps
Web is a web that is able to describe things in a to display information. Piggy Bank works with a new
way that computers can understand. The Semantic service, Semantic Bank, which combines the idea
Web describes the relationships between things and of tagging information with the new web languages
the properties of things. Components:
RDF (Resource Description Framework) is a
· XML provides an elemental syntax for
markup language for describing information and
content structure within documents.
resources on the web.Semantic web involve
· XML Schema is a language for providing and
publishing in languages specifically designed for
restricting the structure and content of elements
data: RDF, Web Ontology Language (OWL), and
contained within XML documents.
Extensible Markup Language (XML).
· RDF is a simple language for expressing data
Potential Advantages of Semantic web: models, which refer to objects (“resources”) and
· Search their relationships. ( in XML syntax).
· Agents · RDF Schema is a vocabulary for describing
· Knowledge management properties and classes of RDF-based resources.
· Integration · OWL (WEB ONTOLOGY LANGUAGE ) adds
· Composition of complex systems more vocabulary for describing properties and
· Multimedia collection classes.
· Information filtering · SPARQL is a protocol and query language for
· Machine dialogue across the domains semantic web data sources.
· Virtual community SW enriches current Web with semantics in terms
· Serendipity (unexpected benefits) of some standards and could improve Internet
commerce from several aspects.
Network-based access to, and management of, level provides greater program flexibility through
commercially available software configurable metadata, so that many customers
· activities that are managed from central can use separate instances of the same
locations rather than at each customer’s site, application code. This allows the vendor to meet
enabling customers to access applications remotely the different needs of each customer through
*.tech
via the Web detailed configuration options, while simplifying
· application delivery that typically is closer maintenance and updating of a common code
to a one-to-many model (single instance, multi- base.
tenant architecture) than to a one-to-one model, . Level 3 - Configurable, Multi-Tenant-
including architecture, pricing, partnering, and Efficient: The third maturity level adds multi-
management characteristics tenancy to the second level, so that a single
· Centralized feature updating, which obviates program instance serves all customers. This
the need for downloadable patches and upgrades. approach enables more efficient use of server
· SaaS is often used in a larger network of resources without any apparent difference to the
communicating software - either as part of a mash end user, but ultimately is limited in its scalability.
up or as a plug-in to a platform as a service. Service · Level 4 - Scalable, Configurable, Multi-
oriented architecture is naturally more complex than Tenant-Efficient: At the fourth and final SaaS
traditional models of software deployment. maturity level, scalability is added through a
· More feature requests from users since multitier architecture supporting a load-balanced
there is frequently no marginal cost for requesting farm of identical application instances, running on
new features; a variable number of servers. The system’s capacity
· Faster releases of new features since the can be increased or decreased to match demand by
entire community of users benefits from new adding or removing servers, without the need for
functionality; and any further alteration of application software
· The embodiment of recognized best practices architecture
since the community of users drives the software Limiting factors
publisher to support the best practice. Widespread implementation of SaaS requires that
Implementation the services be well defined. That can achieve an
According to Microsoft, SaaS architectures economy of scale and the capacity to balance supply
generally can be classified as belonging to one of and demand. This requires areas of IT that are
four “maturity levels,” whose key attributes are ubiquitous and commodity-like. SaaS is therefore not
configurability, multi-tenant efficiency, and suitable for innovative or highly specialized niche
scalability.[4] Each level is distinguished from the systems, though SaaS may be used to provide one
previous one by the addition of one of those three or more components in such systems.
attributes: As with manufacturing, a lack of substitutability
· Level 1 - Ad-Hoc/Custom: At the first level and second sourcing options with any commodity
of maturity, each customer has its own customized creates a strategic weakness for any customer in
version of the hosted application and runs its own terms of security, competition and pricing
instance of the application on the host’s servers.
Migrated traditional non-networked or client-server
application to this level of SaaS typically requires
the least development effort and reduces operating Think like genius, work like giant and
costs by consolidating server hardware and live like a saint
administration.
· Level 2 - Configurable: The second maturity
*.tech
o History The point is that game designers, as creators
o Drawing / Painting / of worlds for players to inhabit, need to have a
Sculpture (learn how to solid understanding of what worlds are made
make your own art) of. They are not just made of stone, metal, dirt,
o Music Appreciation and water—they are also made of people with
o Writing an extensive body of knowledge.
o Literature It’s unlikely any game designers are actually
o Mythology going to get raucous over flower parts, but you
o Foreign language get the point. Get a good education.
(any language that
interests you; especially VIRTUAL FENCE -VEHICLES
one from a country where
there are game
developers) K.DINESH
o Computers (even if SECOND YEAR
you want to design board
games) Vehicle thefts and fuel pilferage have become
o Acting common these days. Can these be checked?...Yes,
o Playwriting / Screenwriting indeed. Thanks to virtual fencing, stealing a vehicle
o Film Appreciation could become difficult for seasoned thieves .Today
o Public Speaking / Debate one can virtually mark boundaries. Today one can
o Marketing / Salesmanship virtually mark boundaries or points on the map,
o Management / Leadership (especially, how to which would be highlighted, if a vehicle comes to a
inspire and manage people) particular marked area, the system will put out an
Game designers are, above all, effective alert.
communicators and storytellers. Don’t sleep through The device works on GPS/GSM tracking system,
your writing, acting, and speaking classes. widely used in mobile phones, and is pre-configured
Additional Subjects with a mobile number of the owner. A similar device
It would also be good if you study some of these is also fixed in the vehicle. The owner can call
things too: the device and talk to the driver as he does on his
o Music (learn how to play an instrument) mobile phone.
o Geology The device, fixed in the vehicle’s dashboard, is
o Astronomy fitted with a sim card of any service provider. The
o Paleontology / Archeology card is activated to transit GPS data to the person
o Ethnic Studies sitting in front of a computer. The device gives
o Biology latitude and longitude co-ordinates to the card,
o Art History which then sends the data to an IP address, which
o Radio / TV is the computer. This data is correlated on the digital
o Drama / Film v map and the location is displayed on the computer
o Business screen. The frequency of knowing the location will
o Fencing or karate (some kind of one-on-one range from 3 seconds to 24 hours.
The speed at which the vehicle travels or has move is vital in order to utilize time efficiently.The
traveled can be checked out. The system provides importance of mobile computers has highlighted in
details of the distance travelled on a particular day. the following fields:
The location can also be viewed through a mobile Estate agents can work either at home or out in
phone, if it is GPS-enabled. the field. With mobile computers they can be more
The cost of the hardware device would vary productive. They can obtain current real estate
according to the features on offer. The price of one information by accessing multiple listing services,
unit varies from Rs. 8,000 to Rs. 12,000. The software which they can do from home, office or car when
interface would be Rs. 500 a month out with clients. Therefore, mobile computers allow
On a rental basis. The rental covers the cost of them to devote more time to clients.
storing the continuous data coming coming from the Emergency services:
client’s vehicle and maintenance and technical Ability to receive information on the move is
support. viable where the emergency services are involved.
MOBILE COMPUTING
K.PHANI CHANDRA
K.SANDHYA
K.SRI VIDYA
SECOND YEAR
S.NAVEEN KUMAR
V.V.RAVI TEJA
SECOND YEAR
*.tech
The Gatekeeper Pico a USB key-sized personal
security computer with 12 security applications, has
been awarded “Best of Innovations 2008 - Computer
Accessories” by the 2008 Consumer Electronics
Show (CES).
Purpose of gatekeeper pico:
If Gatekeeper Pico mini-computer connects to any
PC or laptop blocking Internet threats outside the
host computer and security software.
A revolution in laptop and PC security, Yoggie’s
personal security computer is the ‘next generation The Gatekeeper Pico, with a suggested retail price
Internet Security Suite’ a powerful USB key-size of $179, is now available at market.
Linux-based 520 MHz computer with 12 built-in
Benefits:
security applications.
Block all Internet threats outside before they
The Gatekeeper Pico appears to be a sleek, silver
reach your PC
USB-key,it has the yoggie logo on the front and three
Hide your computer from Internet Hackers (‘Stealth
status icons with LED lights behind them, but is
Mode’)
infact a full-blown computer with its own processor,
Boost your PC’s performance
memory and unique operating system.
Untouchable Operating System
It combines best-of-breed security software with
Protection from known as well as unknown attacks
proprietary patent-pending developments to
Plug and forget easy installation and operation
provide the most comprehensive all-in-one security
Automated security updates
technology available to consumers today.The
Gatekeeper Pico delivers plug and forget The full list of security functions provided
functionality. Users do not have to worry about by the Gatekeeper Pico includes:
updates as it automatically checks for them each Anti-Virus
time it connects to the Internet, and manages the Anti-Spyware
entire process. The device does not require complex Anti-Phishing
installation, configuration or ongoing management Anti-Spam
(although advanced users can alter the Intrusion Detection System / Intrusion Prevention
configuration should they wish to). With the System
Gatekeeper Pico providing Pentagon-level security Firewall (Stateful inspection)
for their home PC or laptop, consumers no longer Web Filtering/Parental Content Control
need to run software-based security suites.This Adaptive Security Policy(TM)
means increased performance for their computer. Multi-Layer Security Agent(TM) (Patent pending)
In addition, the Gatekeeper Pico has parental Layer-8 Security Engine (TM) (Patent pending)
controls built in and can be configured so that, if it Transparent Email Proxies (POP3; SMTP)
is disconnected (by a child wanting access to off- Transparent Web Proxies (HTTP; FTP)
limits websites) Internet access will be denied.
M.N.V.V.RAMESH Safari
GANESH Apple stunned the world in
THIRD YEAR 2003 when they announced this
*.tech
browser for Mac OS X. It became
so popular with Mac users that
Google Chrome Microsoft stopped developing IE
In 2008, Google stripped down for the Mac! Safari is designed for elegance and
the web browser to its essentials speed, and is now both the default browser on
and rethought basic assumptions the Mac and the most popular Macintosh browser.
about what a browser should do. Starting with version 3, Safari is also available
Focused on enhanced for Windows.
performance for web applications, Chrome stays out Safari is also the web browser on the iPhone
of your way and lets you focus on the web itself. and iPod Touch.
Chrome uses the Web Kit engine (like Safari) and * Features: Web · Private Browsing · RSS
is similar to the default web browser on the Android * Import: Bookmarks from any browser.
mobile phone platform.
At this time, Chrome is only available for Firefox
Windows, but Macintosh and Linux versions are Mozilla Firefox has been the
planned. most successful alternative
* Features: Web- Private Browsing web browser since the “browser
* Import: Bookmarks, History and Passwords wars” ended. The flagship
from Internet Explorer. product of the Mozilla
Foundation traces its lineage
Opera back to the original Netscape. Firefox was designed
Opera has managed to for simplicity, security, and extensibility, with
weather the browser wars since hundreds of extensions available. The Mozilla
its original release in 1996. Thunderbird mail & news client is a perfect
Constantly innovating, this companion. Both applications are open-source.
browser is now a full-fledged * Features: Web · RSS headlines · Email and full
Internet suite with web, e-mail, RSS via Thunderbird · Extensions for chat,
news (use net and RSS) and chat with a wealth of customization, etc. · Skin able · Phishing Filter
features for new switchers and power users alike. * Import: All settings from Internet Explorer, Opera,
Opera also provides a mobile web browser, Opera Mozilla, Netscape, bookmarks from generic HTML file.
Mini, which runs on most Java-capable devices, BenchMark Test Results
bringing the web to even low-end mobile phones.
You can sync your bookmarks between Opera Mini
and the desktop version of Opera using Opera Link.
* Features: Web · Email · RSS · Chat · Skin able ·
Phishing Filter · Widgets · Bit Torrent · Sync
* Import: Bookmarks from Internet Explorer,
Firefox, Safari, Netscape, or generic HTML file; Mail
from Outlook Express, Netscape, Thunderbird, Apple
Mail, Eudora, or generic mbox file.
features as a MapView API (which integrates Google open-source mobile initiatives. But current
Maps into Android) and support for location-based limitations shouldn’t be a deterrent: Android will
services (GPS). This first release of Android is only get better as more developers get on board.
missing native APIs for Bluetooth and wifi, but And Google’s 10 million dollar bounty for the best
Google says that they are coming. Android application should provide plenty of
*.tech
At the bottom of the stack is Linux version incentive for jumping in.
2.6, which handles core system services such as Applications:
security,memory management, network stack and Android will ship with a set of core applications
driver model, while acting as including an email client, SMS
an abstraction layer between program, calendar, maps,
the hardware and the rest of browser, contacts, and others.
the software stack. All applications are written
Nailing the Interface: using the Java programming
Coming up with a good user language.
interface for a mobile device Application Framework
is tough, as is evidenced by Developers have full access to
how long it took Microsoft to the same framework APIs used
produce a usable version of by the core applications. The
Windows Mobile. Since every phone has a different application architecture is designed to simplify the
design, screen, keypad and control layout it is reuse of components; any application can publish
almost impossible to define a general-purpose its capabilities and any other application may then
platform like you can with the PC. Partly because of make use of those capabilities (subject to security
that, the Android interface (which Morrill said is a constraints enforced by the framework). This same
work in progress) is not as radical of a departure mechanism allows components to be replaced by
from the kinds of interfaces seen on Nokia and the user.
Motorola Inc. devices as that of the iPhone, where Prototypes:
Apple retains the luxury of designing both hardware Google announced its plans for the Android phone
and software. The actual UI elements provided are software in November 2007 with a declared aim of
what would be expected standard check boxes, making it easier to get at the web. To help develop
radio buttons and pull-down menus — but Google Android, Google also unveiled the Open Handset
has innovated inotherareas. Alliance - a partnership of more than 30 firms that
Android’s layout classes allow developers to would work to make phone software easier to work
arrange the user interface in such a way that it will with.The group includes operators such as Telefonica,
behave properly — regardless of whether it is in handset makers such as HTC and Motorola as well
portrait or landscape orientation. as chip makers such as Intel and Qualcomm.
In its first release, Android supports touch-screen T-Mobile G1
phones but not the multitouch technology seen in
The T-Mobile G1 is the first phone to the market
the iPhone. Digging around in the SDK also only
that uses the Android platform.The phone is part of
reveals support for 320x240-pixel resolution
an open standards effort of the Open Handset
(standard on many smartphones), but Morrill said
Alliance. It was released in the US on October 22,
that other resolutions will be supportedinthefuture.
2008 and will be available in European countries
Android’s SDK has a way to go before it can
including Germany, Netherlands and the Czech
compete with the commercial development
Republic by early 2009. The T-Mobile G1 is made by
environments for Palm, Windows Mobile, Symbian
HTC, which may be rebranded by operators or
and other mobile platforms. And developers face a
original equipment manufacturer (OEM) partners.
difficult choice given the existence of competing
TRANSFERJET
B.GAUTAM KUMAR
G.HARI KRISHNA
THIRD YEAR
TransferJet a new Close Proximity Wireless Transfer Technology enabling the high speed transfer of
large data files (photos, HD images, etc.) between electronic devices such as mobile phones, digital
cameras, digital video cameras, computers and TVs. Using this technology, data can be sent at speeds of
560Mbps. It eliminates the need for complex setup and operation. For e.g., just touching a TV with a
digital camera enables photos to be instantaneously displayed on the TV screen. Alternatively, downloaded
music content can be easily enjoyed by touching a mobile phone to a portable audio player. TransferJet
can be used as a Universal Interface among a wide variety of consumer electronics devices.
It is simple operation, safe connection and efficient transfer of data can maintain the highest possible
wireless link by automatically adjusting the data transmission rate. It radiates very low-power radio
waves, it causes virtually no interference to other wireless systems, and there is no impact to
performance.Operation is also very intuitive, and as there is no host/target relationship, data transfer
can take place between mobile phones and PCs for example, as well as between mobile devices.TransferJet
technology are able to transfer data among each other’s products regardless of whether they are indoors
or outdoors and irrespective of their geographic location.It maintains high transmission gain and efficient
coupling in near-field proximity, while providing sharp attenuation over longer distances to avoid
interference with other wireless systems.Furthermore, as there is no antenna polarization it is possible to
transmit data without any performance loss, regardless of the contact angle of the electronic devices.
Transfer Jet technology is similar to the current Bluetooth standard, however the Transfer Jet system
has the advantage of operating at a much higher throughput rate while not having the security concerns
that can be found in a Bluetooth connection.For e.g., with Bluetooth, transfer of data takes place over a
range of several feet. Since the signal is not encrypted, it can be intercepted by other Bluetooth devices.
Similar to Bluetooth, Transfer Jet will offer users the ability to restrict their equipment to communicating
with only approved devices, preventing accidental data sharing with other non-approved equipment.It
works once both devices are within 3cm of each other, and then blasts information between them at up to
560Mbps.
*.tech
“I wish there had been an Imagine Cup when I was growing up. It
gets people involved in seeing that software is changing the world.”
—Bill Gates
Everything that the world may become “someday” lies in the
hands of young people today. As they look at the road ahead, their
close relationship with technology enables them to dream in ways
we never have before. Put the two together, and you have young minds holding the tools that can make
their vision a reality.
This is the recipe that inspired Microsoft to create the Imagine Cup.The Imagine Cup encourages young
people to apply their imagination, their passion and their creativity to technology innovations that can
make a difference in the world – today. Now in its seventh year, the Imagine Cup has grown to be a truly
global competition focused on finding solutions to real world issues.
Open to students around the world, the Imagine Cup is a serious challenge that draws serious talent,
and the competition is intense. The contest spans a year, beginning with local, regional and online contests
whose winners go on to attend the global finals held in a different location every year. The intensity of
the work brings students together, and motivates the competitors to give it their all. The bonds formed
here often last well beyond the competition itself.
The location of the Imagine Cup has rotated from year to year. The finals have been held in locations all
across the world. Location in 2003: Spain, 2004: Brazil, 2005: Japan, 2006: India, 2007: Korea, and 2008:
France. A selection committee representing Microsoft and competition captains evaluate applications
from countries interested in hosting. Many factors are taken into consideration, including the resources
available at the hosting country. However, the selection process is not an exact science.
Eligibility:
1. You are 16 years of age or older.
2. You are actively enrolled as a student at an accredited educational institution that grants high-
school or college/university (or equivalent) degrees any time between January 1, 2008 and May 31, 2009.
3. You are not an employee of Microsoft Corporation, or an employee of a Microsoft subsidiary.
4. You are not involved in an y part of the execution or administration of this Contest.
5. You are not an immediate family member of (parent, sibling, spouse, child) or household member
of a Microsoft employee, an employee of a Microsoft subsidiary, or a person involved in any part of the
administration and execution of this Contest.
6. You are not a resident of any of the following countries: Cuba, Iran, North Korea, Sudan, and Syria.
7. If you are a Microsoft campus representative, such as Microsoft Student Partner http://student-
partners.com or Microsoft Intern, and you meet the eligibility criteria set forth above, you may enter, but
you are prohibited from using Microsoft property or resources, including without limitation, Microsoft
networks, hardware tools and technology resources and/or the counsel of Microsoft employees, in
connection with the creation or execution of your entry.
8. If you have previously placed first in the Worldwide Finals of an Imagine Cup competition, you are
not eligible to enter that same competition again, but you may enter any of the other competitions.
9. This Contest is void where prohibited by law.
For further information visit::http://imaginecup.com
Charles Babbage
Designed the Difference Engine but the machine will never be realized. He also
start plans for the Analytical engine. But it will be his son that realizes the project
in part.
Biography
Charles Babbage was born in London on December 26, 1792, the son of Benjamin
Babbage, a London banker. As a youth Babbage was his own instructor in algebra,
of which he was passionately fond, and was well-read in the continental
mathematics of his day. Upon entering Trinity College, Cambridge, in 1811, he
found himself far in advance of his tutors in mathematics.
With Herschel, Peacock, and others, Babbage founded the Analytical Society for promoting continental
mathematics and, reforming the mathematics of Newton, then taught at the university.
In his twenties Babbage worked as a mathematician, principally in the calculus of functions. He was
elected a Fellow of the Royal Society, in 1816, and played a prominent part in the foundation of the
Astronomical Society (later Royal Astronomical Society) in 1820. It was about this time that Babbage first
acquired the interest in calculating machinery that became his consuming passion for the remainder of
his life.
Throughout his life Babbage worked in many intellectual fields typical of his day, and made contributions
that would have assured his fame irrespective of the Difference and Analytical Engines.
Tim Berners-Lee
*.tech
Through 1991 and 1993, Tim continued working on the design of the Web, coordinating feedback
from users across the Internet. His initial specifications of URIs, HTTP and HTML were refined and
discussed in larger circles as the Web technology spread.
In 1994, Tim founded the World Wide Web Consortium at the Laboratory for Computer Science (LCS)
at the Massachusetts Institute of Technology (MIT). Since that time he has served as the Director of
the World Wide Web Consortium which coordinates Web development worldwide, with teams at MIT,
at INRIA in France, and at Keio University in Japan. The Consortium takes as its goal to lead the Web to
its full potential, ensuring its stability through rapid evolution and revolutionary transformations of its
usage. The Consortium may be found at http://www.w3.org/.
In 1999, he became the first holder of the 3Com Founders chair at LCS, and is now a Senior Research
Scientist within the Lab. The Lab merged with the AI lab to became “CSAIL”, the Computer Science and
Artificail Intelligence Laboratory at MIT.
Edsger Dijkstra
Laid the foundation stone in the march towards creating structure in the domain of programming by
writing, not a scholarly paper on the subject, but instead a letter to the editor entitled “GO TO Statement
Considered Harmful”. (Comm. ACM, August 1968) The movement to develop reliable software was
underway.
My area of interest focuses on the streamlining of the mathematical argument
so as to increase our powers of reasoning, in particular, by the use of formal
techniques
Biography
Edsger Wybe Dijkstra was born in Rotterdam, Netherlands in 1930. Both of
his parents were intellectual people and had received good educations. His
father was a chemist, and his mother was a mathematician. In 1942, when
Dijkstra was 12 years old he entered the Gymnasium Erasminium, a high school
for extremely bright students, and he was educated in a number of different
subjects including: Greek, Latin, French, German, English, biology, mathematics, and chemistry.
In 1945, Dijkstra thought that he might study law and possibly serve as a representative for the
Netherlands at the United Nations. However, due to the fact that he had scored so well in chemistry,
mathematics, and physics, he entered the University of Leiden, where he decided to study theoretical
physics. He went to summer school on the subject of programming at Cambridge University, during the
summer of 1951. He began part-time work at the Mathematical Centre in Amsterdam in March 1952,
which further helped fuel his growing interest in programming. He finished the requirements for his
theoretical physics degree as quickly as possible and began to pursue his interests in progamming. One
of the problems that he ran into, however was that programming still was not officially recognized as a
profession. In fact, when he applied for a marriage license in 1957, he had to put down “theoretical
physicist” as his profession.
-EDITORIAL BOARD
*.lit
Favorite Animal: Mouse Smash forehead on keyboard to continue...
Favorite Dress: Software ASCII stupid question, get a stupid ANSI!
Favorite Letter: C
Disease I am afraid of: Virus Fever SK.SANDANI
Friends: Good Programmers FIRST YEAR
Aim: To think like a man
Lucky Numbers: 0,1
P.SUNEETHA B.L.SRAVANTHI
FIRST YEAR FIRST YEAR
MARRIAGE: It’s an agreement in which a man looses his bachelor degree & a woman gains her master
degree.
LECTURE: An art of transferring information from the notes of lecturer to the notes of students without
passing through “the minds of either”.
CONFERENCE: The confusion of one man multiplied by the number present.
COMPROMISE: The art of dividing a cake in such a way that everybody believes that he got the big piece.
DICTIONARY: A place where divorce comes before marriage.
CONFERENCEROOM: A place where everybody talks, nobody listens & everybody disagrees later on.
ECSTASY: Feeling when you feel you are going to feel a feeling you have never felt before.
SMILE: A curve that can set a lot of things straight.
CLASSIC: Books which people praise but do not read.
OFFICE: A place where you can relax after your strenuous home life.
YAWN: The only time some married men get to open their mouth.
Etc.: A sign to make others believe that you know more than you actually do.
COMMITTEE: Individuals who can do nothing individually & sit to decide that nothing can be done together.
EXPERIENCE: The name men give to their mistakes.
OPPORTUNIST: A person who starts taking bath when he accidentally falls into a river.
PESSIMIST: A person who says ‘o’ is the last letter in zero, instead of first letter in opportunity.
MISER: A person who lives poor so that he can die rich.
BOSS: Someone who is early when you are late & late when you are early.
DIVORCE: Future tense of marriage.
TEARS: The hydraulic force by which masculine will power is defeated by feminine waterpower.
DICTIONARY: A place where divorce comes before marriage.
ATOMBOMB: An invention to end all inventions.
CRIMINAL: A guy no different from the rest … except that he got caught.
DOCTOR: One who kills your ills by pills & kills you with his bills.
K.SRI VIDYA
J.LAKSHMI BAI
SECOND YEAR
*.lit
following: It’s a new venture
1. Viruses replicate quickly. If a politician makes a mistake
Windows does this. It’s a new law
If a scientist makes a mistake
2. Viruses use up valuable system resources, It’s a new invention
slowing down the system as they do so. If a tailor makes a mistake
Windows does this. It’s a new fashion
If a teacher makes a mistake
3. Viruses will, from time to time, trash your hard It’s a new point
disk. But unfortunately
Windows does this. If a student makes a mistake
NO doubt it’s a mistake
4. Viruses are usually carried, unkown to theu s e r,
along with valuable programs and sys tems. T.S.RAMYAKRISHNA
Windows does that too.
THIRD YEAR
5. Viruses will occasionally make the user sus pect
their system is too slow (see 2) and the user will
buy new hardware.
Same with Windows, yet again.
TECHNOLOGY - MYTHOLOGY
*.lit
Oriented Language NEXT:
WINDOWS: Now EXchange for Trash
Well, It Never Does Operate With
Speed SK.CHOTA SHAHID
SECOND YEAR
FOOTPRINTS
One night a man had a dream. He dreamed he was walking along the beach with the LORD. Across the
sky flashed scenes from his life. For each scene , he noticed two sets of footprints in the sand; one
belonging to him, and other to the LORD.
When the last scene of his life flashed before him, he looked back at the footprints in the sand. He
noticed that many times along the path of his life there was only one set of footprints. He also noticed
that it happened at the very lowest and saddest times of his life.This really troubled him and questioned
the LORD about it: “LORD, you said that once I decided to follow you, you would walk with me all the way,
But I have noticed that during the most troublesome times in my life there is only one set of footprints. I
don’t understand why when I needed you most you would leave me.”
The LORD replied: “My son, My precious child, I love you and I would never leave you. during your
times of trial and suffering, when you see only one set of footprints, it was then that I carried you.
M.SINDHURA
L.MANJUSHA
SECOND YEAR
SYMBOL’S POEM
How to read:
HRD NOTICE
Dear STAFF, Ramu : Hey.... whats time now?
Please be advised that these are NEW rules and Somu : System time or local time...??
regulations implemented to raise the efficiency of
our company.
1) TRANSPORTATION:
It is advised that you come to work driving a car
anything. We hired you intact.- To have something
according to your salary.
removed constitutes a breach of employment.
A) If we see you driving a Honda, we assume you
6) INTERNET USAGE :
are doing well financially and therefore
All personal Internet usage will be recorded and
you do not need a raise.
charges will be deducted from your bonus (if any)
B) If you drive a 10 year old car or taking public
and if we decide not to give you any, charges will
transportation, we assume you must have lots of
be deducted from your salary.
savings therefore you do not need a raise.
- Important Note: Charges applicable as Rs.20 per
C) If you drive a Pickup, you are right where you
minute as we have 10MB connection. Just for
need to be and therefore you do not need a raise.
information, 73% of staff will not be entitled to any
2) ANNUAL LEAVE :
salary for next 3 months as their Internet charges
Each employee will receive 104 Annual Leave days
have exceeded their 3 months salary.
a year ( Wow! Said 1 employee).
Thank you for your loyalty to our company. We are
They are called SATURDAYs AND SUNDAYs.
here to provide a positive employment experience.
3) LUNCH BREAK:
Therefore, all questions,comments,concerns,
A) Skinny people get 30 minutes for lunch as they
complaints, frustrations,irritation,aggravations,
need to eat more so that they can look healthy.
insinuations, allegations, accusations, input
B) Normal size people get 15 minutes for lunch to
contemplation and consternation should be
get a balanced meal to maintain their
directed somewhere else.
average figure.
C) Fat people get 5 minutes for lunch, because that’s
all the time needed to drink a Slim Fast and take a SAROJA
diet pill. THIRD YEAR
4) SICK DAYS:
We will no longer accept a doctor Medical
Certificate as proof of sickness.
- If you are able to go to the doctor, you are able to
come to work.
5) SURGERY :
As long as you are an employee here, you need all
your organs. You should not consider removing
*.lit
and quickly draw them in In the voyage of my life you are the safest
painting love and illusion harbor whom I can trust and truly depend
on stark computer palettes without any hesitation.
the little black words I know that even if the world is in whirlpool
race across white screens You are there for me,
filling hearts and minds I cherish your presence in every movement of
with passion my life,
two souls reach out Thank you friend for being there for me,
to touch one another No,Thank you god, for giving me such a friend.
in hollow little word worlds
where things are shared K.SINDHURA
that shouldn’t be
FIRST YEAR
lonely spouse sits by the bed
starred for love and understanding
and with each new key stroke
in another room
the little black words
dig the gulf between them IN SEARCH OF MY FRIEND
just a little bit wider
My Friend,
A.YUGHANDHAR Should be my Medicine
FIRST YEAR When I am in Pain,
Should be my Letter
Winning is not everything, it’s the only When I am Far,
thing. Should be my Chain
When I am Mad,
An achieved goal is the starting point for future Should be my Concentration
progress. When I Work,
Should be my Sea Shore
When I Sink,
SOLUTION Should be my Hand-Kerchief
When I Cry,
Should be my Expression
Thinking is the capital,
When I Speak,
Enterprise is the way,
Should be my Life
Hard work is the solution
When I Die.
K.SINDHU
K.HANISHA
B.LAKSHMI PRASANNA
FIRST YEAR
FIRST YEAR
He worked by day
And worked by night. SASI PRIYA
He gave up play M.DIVYA TEJA
And some delight.
FIRST YEAR
Dry books he read,
New things to learn
And forged ahead
Success to earn
He plodded on with Ramu : Hey.. I have a problem. My system is
Faith and pluck not booting up!
And when he won Somu : may be, its internal buses are on strike..
Men called it Luck check out!
P.MADHAVI
M.NAGA JYOTHI
SECOND YEAR
LAN, LAN ago, in the SYSTEM of I/O-dhya, there ruled a PROCESSOR named DOS-rat.Once
he EXECUTED a great sacrifice PROGRAM after which his queens gave an OUTPUT of four SUNs—
RAM, LSIman,BUG-rat and SED-rughana. RAM the eldest was a MICROCHIP withexcellent MEMORY.
*.lit
His brothers, however, were only PERIPHERAL ICs. Once when RAM was only 16MB, he married princess
‘C’ta. 12years passed and DOS-rat decided to INSTALL RAM as his successor. However, Queen CIE/
CAE(Kayegayee), who was once offered a boon by DOS-rat for a lifesaving HELP COMMAND, took this
opportunity at the instigation of her BIOSed maid (a real plotter),and insisted that her son Bug-rat be
INSTALLED and that RAM be CUT-N-PASTED to the forest for a period of 14 years.
At this cruel and unexpected demand, a SURGE passed through DOS-rat and he collapsed power-
less. RAM agreed to LOG INTO forest and ‘C’ta insisted to LOGIN with him. LSI-man also resolved on
LOGGING IN with his brother. The forest was the dwelling of SPARCnakha, the TRAN-SISTOR of RAW-
van, PROCESSOR of LAN-ka. Attracted by RAM’s stature, she proposed and asked him to marry her. RAM,
politely declined. Perceiving ‘C’ta to be the SOURCE CODE of her distress, she hastened to kill her.
Weeping, SPARC-nakha fled to LAN-ka, where RAW-van, moved by TRAN-SISTOR’s plight, approached his
uncle MAR-icha. MAR-icha REPROGRAMED himself into the form of a golden stag and drew RAM deep
into the forest. Finally, RAM shot the deer and MAR-icha with his last breath, cried out desperately for
LSI-man. MAR-icha cried for LSI-man in the voice of RAM.
Fooled by this VIRTUAL RAM SOUND, ‘C’ta urged LSI-man to his brother’s aid. Catching the
opportunity, RAW-van DELINKED ‘C’ta from her LIBRARY and changed her ROOT DIRECTORY to LAN-ka.
RAM and LSI-man started SEARCHING for the missing ‘C’ta all over the forest. They made friendship
with th e forest SYSTEM ADMINISTRATOR SU-greev and his powerful co-processor Ha-NEUMAN.
SU-greev agreed to help RAM. SU-greev ordered his PROGRAMMERS to use powerful ‘SEARCH’
techniques to FIND the missing ‘C’ta. His PROGRAMMERS SEARCHED all around the INTER-NETworked
forests. Many tried to ‘EXCITE’ the birds and animals not to forget the ‘WEBCRAWLERS’ (Insects) and
tried to ‘INFO SEEK’ something about ‘C’ta. Some of them even shouted ‘YAA-HOO’ but they all ended up
with ‘NOT FOUND MESSAGES’. Several other SEARCH techniques proved useless. Ha-NEUMAN devised a
RISKy TECHNOLOGY and used it to cross the seas at an astonishing CLOCK SPEED.Soon Ha-NEUMAN
DOWNLOADED himself into LAN-ka. After doing some local SEARCH, Ha-NEUMAN found ‘C’ta weeping
under a TREE STRUCTURE. Ha-NEUMAN used a LOGIN ID (ring) to identify himself to ‘C’ta. After
DECRYPTING THE KEY, ‘C’ta believed in him and asked him to send a ‘STATUS_OK’ MESSAGE to RAM.
Meanwhile all the raakshasa BUGS around ‘C’ta captured Ha-NEUMAN and tried to DELETE him using
pyro-techniques. But Ha-NEUMAN managed to spread chaos by spreading the VIRUS ‘Fire’. Ha-NEUMAN
happily pressed ESCAPE from LAN-ka and conveyed all the STATUS MESSAGES to RAM and SU-greev.
RAW-wan decided to take the all powerful RAM head-on and prepared for the battle.One of the RAW-
wan’s SUN (son) almost DELETED RAM & LSI-man with a powerful brahma-astra. But Ha-NEUMAN resorted
to some ACTIVE-X gradients and REFORMATTED RAM and LSI-man. RAM used the SOURCE CODE secrets
of RAW-wan and once for all wiped out RAW-wan’s presense on earth. After the battle, RAM got INSTALLED
in I/O-dhya and spreaded his MICROSOFT WORKS and other USER FRIENDLY PROGRAMS to all USERS
and every one lived happily everafter.
R.RAMAKRISHNA
K.NARESH
THIRD YEAR
Computer Science and Engineering Syntax’09
Bapatla Engineering College
Cust: “What” is the command that will tell me the UNIX: No, I don’t ‘make me’ angry but I did ‘make
revision code of a program? program name’ when i was upset once.
UNIX: Yes, that’s correct. Cust: I don’t want to make trouble, so no “more”.
Cust: No, “what” is it? UNIX: No ‘more’? ‘Which’ will help you find ‘more’?
UNIX: Yes. Every system has ‘more’.
Cust: So, “which” is the one? Cust: Nice ‘help’! I’m confused more now.
UNIX: No. “which” is used to find the program. UNIX: Understand that since ‘help’ is such a small
Cust: Stop this. “Who are you”? program, It is better not to ‘nice help’. A n d
UNIX: Use ‘who am I’ not ‘who r you’.you can also ‘more now’ is not allowed. But ‘at now’ is. Unless
‘finger you’ to get information about ‘you’. of course ‘now’ is a file name.
Cust: All I want to know is “what ” finds the Cust: This is almost as confusing as my PC.
revision code? UNIX: I didn’t know you needed help with ‘pc’.let
UNIX: Use ‘what’. me get you to the Pascal compiler team.
Cust: That’s “what” I am trying to find out. Isn’t M.SRI CHARAN
that “true”? P.SANDEEP
UNIX: No.‘True’ gives you 0.
THIRD YEAR
Cust: Which one?
UNIX: ‘true’ gives you 0. ‘Which program name?’
Cust: Let ’s get back to my problem. What The "Special" tone available to
program? How do I find it? users of Nokia phones when receiving SMS
UNIX: Type ‘find/-name it’ to find ‘it’. Type ‘what (text messages) is actually Morse code
program’ to get the revision code. for "SMS".
Cust: I want to find the “revision code”.
UNIX: You can’t ‘find revision code’; you must use
‘what program’.
Cust: “Which” command will do what I need?
SUCCESS
UNIX: No. ‘Which command’ will find
‘command’? SUCCESS is the realization of a worthy goal.
SUCCESS is getting what you want & happiness is
Cust: I think I understand. Let me “write that”. wanting what you get.
UNIX: You can ‘write that’ only if ‘that’ is a user on SUCCESS is not measured by the position in life but
your system. by the obstacles we over come to get there.
Cust: “Write” what? SUCCESSful people compete against themselves.
UNIX: No. ‘write that’. ’what program’. Every SUCCESS story is also a story of great failure.
Cust: “Cut” that out! SUCCESS is not an accident but is result of our
UNIX: Yes. Those are valid files for ‘cut’. Don’t attitude.
forget the options. SUCCESS is not in the achievement but in the
Cust: “Do” you always do this? achieving.
UNIX: ‘Do’ will give you disk usage. They succeeded inspite of problems not in the
Cust: “HELP!!!!!!!” absence of them.
UNIX: ‘help’ is only used for Source Code Control
System (SCCS). K.SANDHYA,
Cust: You “make me” angry. SECOND YEAR
In the beginning, God created the Bit and the Byte. And from those he created the Word. And
there were two Bytes in the Word; and nothing else existed . And God separated the One from the
Zero; and he saw it was good.
And God said - Let the Data be; And so it happened. And God said - Let the Data go to their proper
*.lit
places. And he created floppy disks and hard disks and compact disks.
And God said - Let the computers be, so there would be a place to put floppy disks and hard disks and
compact disks. Thus God created computers and called them hardware. And there was no Software yet.
But God created programs; small and big... And told them - Go and multiply yourselves and fill all the
Memory.
And God said - I will create the Programmer; And the Programmer will make new programs and
govern over the computers and programs and Data. And God created the Programmer; and put him at
Data Center; And God showed the Programmer the Catalog Tree and said You can use all the volumes
and subvolumes but do not use Windows.
And God said - It is not good for the programmer to be alone. He took a bone from the Programmer’s body
and created a creature that would look up at the Programmer; and admire the Programmer; and love the
things the Programmer does; And God called the creature: the User. And the Programmer and the User
were left under the naked DOS and it was Good. But Bill was smarter than all the other creatures of God.
And Bill said to the User - Did God really tell you not to run any programs?
And the User answered - God told us that we can use every program and every piece of Data but told us
not to run Windows or we will die. And Bill said to the User - How can you talk about something you did
not even try. The moment you run Windows you will become equal to God. You will be able to create
anything you like by a simple click of your mouse.
And the User saw that the fruits of the Windows were nicer and easier to use. And the User saw that any
knowledge was useless—since Windows could replace it. So the User installed the Windows on his
computer; and said to the Programmer that it was good.
And the Programmer immediately started to look for new drivers. And God asked him—What are you
looking for? And the Programmer answered—I am looking for new drivers because I can not find them in
the DOS. And God said - Who told you need drivers? Did you run Windows? And the Programmer said - It
was Bill who told us to!
And God said to Bill - Because of what you did, you will be hated by all the creatures. And the User will
always be unhappy with you. And you will always sell Windows.
And God said to the User - Because of what you did, the Windows will disappoint you and eat up all your
Resources; and you will have to use lousy programs; and you will always rely on the Programmers help.
And God said to the Programmer - Because you listened to the User, you will never be happy. All your
programs will have errors and you will have to fix them and fix them to the end of time.
And God threw them out of the Data Center and locked the door and secured it with a password.
HARSHA
Vani : We have shifted our home to SECOND YEAR
Malleswaram now..
Soni : right shift or left shift??
They conquer who believe
they can
*.lit
Somu : No. = operator has been
overloaded in Star Channel. “Wake up; it’s time to go to school!”
“But why mom? I don’t want to go.”
“Give me two reasons why you don’t want
to go.”
“Well, the kids hate me for one, and the
teachers hate me too!”
“Oh, that’s no reason not to go to school.
Come on now and get ready.”
“Give me two reasons why I should go to
Babu : Yesterday I bought a new TV school.”
whose terminal is compatible with “Well, for one, you are 52 years old and for
computer... but its audio portion is not at all another you are the principal!”
working :-
Gopu : May be its compatible only with dumb K.PHANI CHANDRA
terminals!!!!!!!! SECOND YEAR
ʪ é¶ ¬ A
SANDANI
FIRST YEAR
TWINKLE TWINKLE
LITTLE STAR IN qÉÑ x MÑ ü UÉlÉÉ
TELANGANA STYLE
lÉ iÉÉå UÉålÉå qÉå Wæû
lÉ iÉÉå ÂsÉÉlÉå qÉå Wæû
*.lit
ÎeÉlSaÉÏ Mü qÉeÉÉ
È¢À±¼Êª È¢À±¼Êª »ª¶mé ¶ªÀOµÖ qÉÑxMÑüUÉlÉå qÉå Wæû
¶p±É©¸´m Ki n¶mÀé YÄ»ª
Y¤À´m OÇzõ ¶¢À¶ªÀå lµÃ±µAvÀm¸é¶¢Á
D¶ªî¶mô ¶¢Yñ´¢À vÇOµÖ Gm¸é´¢...... SK.MAHABAOUBBI
FIRST YEAR
SINDHU PRIYA
FIRST YEAR
CRICKET EXAMINIATIONS
RUN OUT: Failing in the examination due to lack of time and studies
BOUNCER: The most difficult question in the question paper
BYES: Grace marks given by evaluator
MAIDEN OVER: Inability to answer any six questions in a row
RETIRED HURT: Fainting in the examination hall on seeing the paper
SIXER: Son’s marks memo thrown by father
NO BALL: Question from a topic outside the syllabus
L.B.W: Failing in the exam because the student in front of you did not write well
UMPIRE: The evaluator of the paper.
V.POOJITHA SWEETHA
FIRST YEAR
*.lit
*.lit
*.lit
M.SUNDAR RAJU
THIRD YEAR
Education abroad programs have always fascinated the Indian students. Before you opt for studying
abroad, you need to take care of certain factors like:
P.HARISH
3rd YEAR CSE