Monday, May 24, 2010

12th HSC std result for Mahrashtra state.

Maharashtra Board Class 12 HSC Results 2010

The results for the Higher Secondary Certificate (HSC) for Class XII or Std 12th held in Maharashtra will be declared on May 25th 2010 at 11AM.

Students who appeared for the Maharashtra HSC exams in 2010 will be able to check their results online after 11AM at the official Maharashtra Exam site. Maharashtra HSC results will be available at http://mahresult.nic.in/ after 11AM on Tuesday.

Students will require to have their hall ticket roll numbers in order to view their HSC exam results online. Students can also check their exam results by visiting http://results.maharashtraeducation.net/ or http://www.msbshse.ac.in/.

The HSC results will be declared for the Arts, Science and Commerce streams for students who appeared for the exams in February 2010. However, students will get their marksheets from their colleges only on May 31st after 3PM.

The online results are being declared a week earlier than the actual results is handed out in order to allow students to better plan out their future course of actions. We wish all the students best of luck for their exam results.

Friday, May 14, 2010

“NETWORK SECURITY”

ABSTRACT


 


 

Today's world is a networked world in which everyone is entering into outside world for mainly, for communication purpose. This is possible only due to the internet facility whose access is an immense source of information. Apart from being a source, we need to have secure communication channel through which the information passes. Loss of irreplaceable data is very real threat, especially for the business owners. They need to communicate with their vendors, employees, customers who are far away from each other. At this stage, Internet will be the easiest & fast source of information exchange for them. So, to keep this information safe & secure, a need felt to provide security to the Internet.

Network security is a complicated subject, historically only tackled by well-trained and experienced experts. Network, as it is vast, interconnected & complicated structure requires lot of understanding about each component, which is a part of it. So, Network Security tests our stamina about keeping the network as safe, secure as possible. As more and more people become ``wired'', an increasing number of people need to understand the basics of security in a networked world. Network Security ensures the reliability, flexibility of an network's working so as to make smooth communication through the network. Any organization, before taking Internet access, first think of firewall.

Some history of networking is included, as well as an introduction to TCP/IP and internetworking. Some points are also concerned to the types of threats, from which one should be aware of, & providing protection against it.


 


 


 


 


 


 


 


 


 

INDEX


 

1.    INTRODUCTION

2.    SECURED COMMUNICATION

3.    NEED OF SECURITY

  • THREATS TO SECURITY

    4.    MECHANISMS OF SECURITY

    5.    CRYPTOGRAPHY

  • SECRET - KEY ENCRYPTION
  • PUBLIC - KEY ENCRYPTION
  1. FIREWALL AND INTERNET ACCESS.
  • FIREWALL ARCHITECTURE
  • PACKET - LEVEL FILTERS.
  • SECURITY AND PACKET FILTER MECHANISM.
  • ACCESSING SERVICES THROUGH A FIREWALL.


     

  1. NETWORK SECURITY TOOLS
  2. CONCLUSION
  3. REFERENCES


 


 


 


 


 


 


 


 


 


 


 


 


 


 


 


 

INTRODUCTION


 

Network


 

A ``network'' has been defined as

``Any set of interlinking lines resembling a net, a network of roads || an
interconnected system, a network of alliances.''

This definition suits our purpose well:

A computer network is simply a system of interconnected computers.


 

Security

Security by the name itself is very important for any individual, a machine or also in a network like the locks to help tangible property secure, computers and data networks need provisions that help keep the information secure. Security in an Internet environment is both important and difficult. It is important because information has a significant value -information can be bought and sold directly or used indirectly to create new products and services that yield high profits. Security in an internet is difficult because involves understanding when and how participating users, computers, services and networks can trust one another, as well as understanding the technical details of network hardware and protocols.

As the Internet is becoming more complex day by day security administrators face the risk of being attacked by external intruders that may

  • Read Access - Read or copy confidential information.
    • Write Access - Write to network or perhaps infect the system with the system with viruses and Trojan horses.
  • Denial of Service - Deny authorized users normal network services.

A single computer can compromise the security of entire network. To guard against such threats the security of distributed system, security
policies must be adapted and security mechanisms must be employed to implement security policies.


 


 

Threats

There are four classes of Security threats to computers systems. These are

  1. Leakage
  2. Tempering
  3. Resource stealing
  4. Vandalism

Thus to guard against threats to the security of distributed system, security policies as well as security mechanisms must be employed thereby providing a secure communication link for a data transmission between interconnected host computer systems of network.


 

SECURED COMMUNICATION

Suppose two persons A & B are communicating. Both of them make sure that contents delivered are not altered by an intruder and are being transferred between them only. The following considerations below reflect these desirable properties of secure communication.


 

  • SECRECY

Only the sender and the intended receiver should be able to understand the contents of the transmitted message. Because eavesdroppers may intercept the message been somehow "encrypted" so that an intercepted message can be "decrypted" by an interceptor. For example, A might also want the mere fact that she's communicating with B to be a secret.


 

  • AUTHENTICATION

Here both the sender and receiver need to confirm the identity of the other party involved in the communication- to confirm that the other party is indeed who or what they claim to be.

For example - If A receives mail from B, in order to know that it has been sent by the B only A needs some authentication; likewise in network there are authentication protocols.


 

  • MESSAGE INTEGRITY

Here the sender and receiver want to ensure that apart from authentication the content of their communication is not altered, either maliciously or by accident in transmissions.


 

NEED FOR NETWORK SECURITY

Most of the security problems are intentionally caused by malicious people trying to gain some benefit or harm some one enforcing the security administrators to keep network free from programming errors. Thus in turn involves out mastering often intelligent, dedicated and sometimes well-funded adversaries and hence need for security rises. The issue is that network security calls for protections against malicious attack by hackers and intruders, but security is also associated with controlling and authorization mechanisms and the prevention of the effects of errors and equipment failures.

All communication over Internet uses the transmission control protocol /Internet protocol (TCP/IP). TCP/IP allows information to be send from one computer to another computer through variety of intermediate computer and separate network before its destination.

The great flexibility of TCP/IP has led to its worldwide acceptance as the basic Internet and Intranet communications protocol. At the same time, the fact that TCP/IP allows information to pass through intermediate computers makes it possible for a third party to interface with communications in the following ways:


 

  • Eavesdropping. Information remains intact, but its privacy is compromised .For example, someone could learn your credit card number, record a sensitive conversation, or intercept classified information.
  • Tampering. Information in transit is changed or replaced and then sent on to the recipient. For example, someone could alter an order for goods or change a person's resume.
  • Impersonation. Information passes to a person who poses as the indirect recipients. Impersonation can take two forms


 


 


 


 

MECHANISMS FOR NETWORK SECURITY


 

Internet security problems can be divided into three broad sets.

Authentication mechanisms solve the problem of verifying identification. In centralized multi-user systems, the user's identity can be authenticated by a password check at the start of each interactive session. In distributed systems, authentication is the means by which the identities of servers and clients are reliably established. The mechanism used to achieve this is based on possession of encryption keys.


 

Encryption can also handle the problem of privacy. If a sender and receiver both use public key encryption scheme, the sender can guarantee that the intended receiver can read a message .To do so, the sender uses the receiver's public key to encode the message and the receiver uses its private key to decode the message. Because only the intended receiver has necessary private key, no other party can decode the message.


 

Mechanisms that control Internet access handle problem of screening of particular network or an organization from an unwanted communication. Such mechanism can help to prevent outsiders from obtaining information, changing information, or disrupting communication on an organization 's internal Internet.


 

CRYPTOGRAPHY

INTRODUCTION

"The art of devising a ciphers i.e. converting the plaintext into coded format & then decoding it" refers to cryptography. Here message to be encrypted are known as plain text & are transformed by a function parameterized by a key. The output of encryption process is known as 'cipher text' and is often transmitted by a messenger .At the receiver its decrypted with help of decryption key and the original message is retrieved.

To encrypt information we transform it in such way that it cannot understand by anyone except the intended recipient who posses the means to reverse the transformation. Computer encryption techniques fall into two main classes-

which useful implementation security, which can be used without much impact on the method of encryption.


 

This method is used for transformation of secret information. In this method applying an agreed encryption function to the plain text with secret key encrypts a message. Decryption is achieved by applying inverse function to the cipher text using the same key, to produce the original plain text. Since the keys are kept secret, the encryption and decryption function need not be secret. Before communication can take place both the sender and receiver must acquire the secret key.


 

  1. PUBLIC KEY ENCRYPTION

In this method each potential recipient of message makes a pair of keys, Ke & Kd and keeps the decryption key Kd a secret. The encryption key Ke can be made known publicly for use by anyone who wants to communicate. This method is based on use of any-way function to define the relation between the two keys, so that it is very hard to determine Kd from knowledge of Ke. Thus it avoids the need for transmission of secret keys between principles.


 

FIREWALLS AND INTERNET ACCESS

The Firewalls defines as "a system or group of systems that enforces an access control policy between two networks." In the context of home networks, a firewall typically takes one of two forms:

or


 


 


 

A single technique has emerged as the basis for Internet access control .The technique places a block known as Internet firewall at the entrance to the part of Internet to be produced .For example, an organization can place firewall at its connection to the global Internet to protect it from unwanted access .A firewall partition has two regions , Informally referred as inside & outside.

There are lots of ways to structure your network to protect your systems using a firewall. If you have a dedicated connections to the Internet through a router, you could plug the router directly into your firewall system. Or, you could go through a hub to provide for full access servers outside your firewall.

You may be using a dialup service like an ISDN line. In this case you might use a third network card to provide provide a filtered DMZ. This gives you full control over your Internet services and still separates them from your regular network.

If there is a router or cable modem between you and the Internet. If you own the router you could setup some hard filter rules in the router. If this router is owned by your ISP so you may not the have the needed controls. You can ask your ISP to put in filters.

If you need to monitor where users of your network are going and your network is small, you can intergrate a proxy server into your firewall. ISP's some times do this to create interest list of their users to resell to marketing agencies.

You can put the proxy server on your LAN as will. In this case the firewall should have rules to only allow the proxy server to connect to the Internet for the services it is providing. This way the users can get to the Internet only through the proxy.

If you are going to run a service like YAHOO or may be Slash Dot you may want to make your system by using redundant routers and firewalls. (Check out the High Availability HowTo.) By using a round-robin DNS techniques to provide access to multiple web servers from one URL and multiple ISP's, routers and firewalls using High Availability techniques you can create a 100% uptime service.

It is easy to let your network get out of hand. Keep control of every connection. It only takes a user with a modem to compromise your LAN.


 

Many commercial routers offer a mechanism tact augments normal routine and permits a manager to further control packet processing . Packet filters mechanism requires the manager to specify how the router should dispose of each datagram . When Datagram first arrives, the router passes the Datagram through its packet filter before performing any other processing . if the filter rejects the Datagram the router drops it immediately. Each router vender is free to choose the capabilities of their packet filter as well as the interface a manager use to configure the filter.


 

Packet filtering firewall consists of list of acceptance denial rules . These rules explicitly define which packets will and will not be allowed through the network interface. These rules are based on the specific network layer's source and destination addresses.


 

An organization can only provide safe access to outside services through a secure computer . Instead of trying to make all computer system organizations secure,an organization usually associates one secure computer with each firewall. It is often called as bastion host.


 


 

Bastion host :

A general-purpose computer used to control access between the internal (private) network (intranet) and the Internet (or any other untrusted network). Typically, these are hosts running a flavor of the Unix operating system that has been customized in order to reduce its functionality to only what is necessary in order to support its functions. Many of the general-purpose features have been turned off, and in many cases, completely removed, in order to improve the security of the machine.


 

To permit safe access, firewall has two conceptual barriers which the figure shows. The outer barrer blocks all incoming traffic except :


 

to make available externally,

  1. The inner barrier blocks the incoming traffic excepts datagrams that originate on the

    bastion host.


 

To understand how the bastion host operates ,consider the FTP service. Suppose a user in the organization needs to access an external FTP server to obtain copy of the file . Because the firewall prevents the user's computer from receiving incoming datagrams , the user cannot run FTP client software directly .Instead, the user must run the FTP clienton the bastion host. after the file has been copied to the bastion host,the user can run file transfer between the bastion host and their local computer .


 

NETWORK SECURITY TOOLS

Various Tools for the Network Security are existing in this world which can work better& provides reliable communication channel through which information can be safely transmitted from sender to the reciever. These tools are as follows:

SATAN, the System Administrator Tool for Analyzing Networks, is a network security analyzer designed by Dan Farmer and Wietse Venema. SATAN scans systems connected to the network noting the existence of well known, often exploited vulnerabilities. For each type of problem found, SATAN offers a tutorial that explains the problem and what can be done.


 

  • ipacl

The ipacl package from Siemens. Forces all TCP and UDP packets to pass through an access control list facility. The configuration file allows packets to be accepted, rejected, conditionally accepted, and conditionally rejected based on characteristics such as source address, destination address, source port number, and destination port number. Should be portable to any system that uses System V STREAMS for its network code.

  • TCP Wrappers

The tcp_wrapper package by Wietse Venema. Formerly called log_tcp. Allows monitoring and control over who connects to a hosts TFTP, EXEC, FTP, RSH, TELNET, RLOGIN, FINGER, and SYSTAT ports. Also includes a library so that other programs can be controlled and monitored in the same fashion.


 

Some more no. of tools are as follows:

  1. Logdaemon
  2. Portmap
  3. Rpcbind
  4. Sara
  5. Scanssh
  6. Securelib
  7. Rpcbind


     


 


 


 


 


 


 


 


 


 


 


 


 


 


 


 


 


 


 


 


 


 


 


 


 


 


 


 


 


 


 


 


 


 


 


 


 


 


 

CONCLUSION


 


 

Security is a very difficult topic. Everyone has a different idea of what ``security'' is, and what levels of risk are acceptable. The key for building a secure network is to define what security means to your organization . Once that has been defined, everything that goes on with the network can be evaluated with respect to that policy. Projects and systems can then be broken down into their components, and it becomes much simpler to decide whether what is proposed will conflict with your security policies and practices.

Many people pay great amounts of lip service to security, but do not want to be bothered with it when it gets in their way. It's important to build systems and networks in such a way that the user is not constantly reminded of the security system around him. Users who find security policies and systems too restrictive will find ways around them. It's important to get their feedback to understand what can be improved, and it's important to let them know why what's been done has been, the sorts of risks that are deemed unacceptable, and what has been done to minimize the organization's exposure to them.

Security is everybody's business, and only with everyone's cooperation, an intelligent policy, and consistent practices, will it be achievable.


 


 


 


 


 


 


 


 


 


 


 


 


 


 


 


 

REFERENCES


 


 


 

  1. Computer networks by Andrew Tannenbaum.
  2. Computer networking by John Martin.
  3. Internetworking with TCP/IP by Douglas E.Comer.


 


 

Bio-Informatics: A computational approach to molecular biology

What is Bio-informatics?

Bio-informatics is a newly emerging interdisciplinary research area which may be defined as the interface between biological and computational sciences. Thus, the people working in this field in most cases either have a training in biology or computer science, and they learned about the other field by dealing with problems or using the tools of the other one. And although the term 'Bio-informatics' is not really well-defined, you could say that this scientific field deals with the computational management of all kinds of biological information, whether it may be about genes and their products, whole organisms or even ecological systems. Most of the Bio-informatics work that is being done deals can be described as analyzing biological data, although a growing number of projects deal with the organization of biological information. As a consequence of the large amount of data produced in the field of molecular biology, most of the current Bio-informatics projects deal with structural and functional aspects of genes and proteins. Many of these projects are related to the Human Genome Project.

First, the data produced by the thousands of research teams all over the world are collected and organized in databases specialized for particular subjects. Well-known examples are: GDB (Genome Data Base). , SWISS-PROT , GenBank , and PDB (Protein Data Bank). In the next step, computational tools are needed to analyse the collected data in the most efficient manner.

One example for such an integration effort is the GeneCards encyclopedia,. This resource contains data about human genes, their products and the diseases in which they are involved. (a process similar to "data mining").

Bio-Informatics: A computational approach to molecular biology

Bio-informatics has been the latest buzzword in the business and scientific community, the hype for this emerging field has been increasing day by day, more and more educational organizations have already added this name to their academic profiles.

       If you were a computer-programmer, bio-informatics skills would enable you to make software for biological applications and if you were biologist, bio-informatics would probably be the best tool to speed up your work just by using a computer with an internet connection. On an over all, bio-informatics is a very important tool for any one who is serious about computing biological processes.

"Bio informatics is a science of solving biological problem using a mathematical and computational approach."

        Many of us confuse Bio-informatics with that of Bio-computing; fundamentally it's a complete different field. Bio-computing or molecular computing is applying biology to solve complex and computationally almost impossible problems using biology, the best example is the famous 'Traveling sales man problem' which was treated computationally impossible to solve.// Bio-informatics a very new field, it has been hardly five years since this science has come into existence in a common man's life. It is a mathematical and computational approach, you need to know mathematics to actually understand bio-informatic application. Fundamental knowledge of molecular biology is also necessary to learn bio-informatics. Molecular biology is a branch of biology which primarily deals with functions, characteristics and structures of mainly three major macro-molecules DNA,RNA and Proteins.

Protecting Bio-informatics Tools :

Bio-informatics involves the use of computer software to gather, sort, and analyze biological data – often with a goal of finding "drug gable targets" for pharmaceutical R&D. It has not always been clear which form of legal protection (primarily, copyright or patents) provides the best value for a bio-informatics product, given, in particular, the considerable doubt and confusion in the European Union as to the validity of software patents. However, recent developments in the European Union with respect to software patents, coupled with industry trends in the US as well as Europe, suggest that bio-informatics companies should give patent protection a very close look.

Genomes to Life

The revolution in biology triggered by the Human Genome Project now promises far-reaching benefits.

Today, scientists have in hand the complete DNA sequences of genomes for many organisms — from microbes to plants to humans. The U.S. Department of Energy's Genomes to Life program will use the new genomic data and high-throughput technologies for studying the proteins encoded by the genome to explore the amazingly diverse natural capabilities in microbes. These can be exploited to help solve DOE mission challenges in


 


 

Features

  • Data Integration
    • Data export to excel and other formats
    • Import and integration from diverse sources:
      • Sequence data: Genbank, FASTA formatted files,     Swissprot format
      • Gene Ontology
      • PDB
      • KEGG
  • Method Integration

    • Methods from various disciplines for analysis of
      • Sequence
      • Structure
      • Expression data
      • Taxonomy and Phylogeny
      • Metabolic pathways
    • Workflows
    • Automatic checking of data compatibility
    • Background execution of workflows
    • Available methods:
      • Bio-informatics
        • Blast and Psi-Blast
        • Sequence repeat detection
        • Function analysis for cluster of sequences
        • Match sequence profiles and regular expressions
        • Expression matrix processing: Completion,     Normalization, Filtering and Masking
        • Mapping of expression data to metabolic     pathways, Gene Ontology
        • Metabolic pathway reconstruction
      • General
        • Vector operations
        • Sorting
        • Shuffling
        • Statistics (average, mean, etc.)
  • Visual Orientation

    • Graphical workflow representation
    • Drag n drop workflow construction
    • Hierarchical tabular viewers
    • Diverse graphical viewers for biological data and workflow     results
  • Advantages

    • Shallow learning curve thanks to visual programming
    • Unified data structure
    • Expandability through script language (python)
    • Scalability from desktop to corporation
    • Company-wide sharing of results and methods

The Daphnia Genomics Consortium (DGC) is an international network of investigators committed to mounting the freshwater crustacean Daphnia as a model system for evolutionary / ecological genetics and genomics


 

    Dictyostelium discoideum genome annotation and analysis portal; specialized Dictyostelium sequence and function annotaton database.

Website, MySQL server and perl API access to software system which produces and maintains automatic annotation on eukaryotic genomes.

Munich Information Centre for Protein Sequences projects include: fungal genome analysis, plant genome Bio-informatics, structural genomics, proteomics and genome annotation; databases include: Sputnik, MosDB, and PEDANT.

Parasite genome databases and genome research resources.

Genomic and cDNA library screening (human, mouse, dog, pig) is provided free to Canadian academic researchers with a nominal clone retrieval fee; includes Research Genetics, NIA/NIH and RIKEN cDNAs.

Provides a rapid and reliable display of any requested portion of the SARS genome at any scale, together with dozens of aligned annotation tracks.

Integrated Bio-informatics Software

GCG :-

GCG is one of the earliest integrated Bio-informatics system. It maintains more than 70 Bio-informatics data analysis tools, which are based on published algorithms from fields of mathematical and computational biology. In additions to running these programs individually, GCG allows the data flow among them. By using these tools, scientists can accomplish the following tasks:

  • Sequence Comparison
  • Database Searching and Retrieval
  • DNA/RNA Secondary Structure Prediction
  • Editing and Publication
  • Evolution Analysis
  • Fragment Assembly
  • Gene Finding and Pattern Recognition
  • Importing and Exporting Files in Different Formats
  • Mapping
  • Primer Selection
  • Protein Analysis
  • Translation

ICBR maintains a GCG server and keeps updated with NCBI and EBI databases. We support command line GCG. It gives the users quick and reliable analysis results. Regular GCG workshops are held once every year.

Biocatalog :-

The Biocatalog is a software directory of general interest in molecular biology and genetics. lists the databases DNA, Proteins, Alignments, Genomes, Genetic, Mapping, Molecular Evolution, Molecular graphics, databases, server.

BioTools (GeneTool & PepTool) :-

BioTools Suite includes GeneTool and PepTool for nucleotide and peptide sequence analysis respectively. Compared to GCG, BioTools has the most user-friendly interface. It covers almost all routine Bio-informatics jobs while the analysis function is less powerful than GCG. However, we find BioTools is a very good software for Bio-informatics novices and basic analysis. It's much better developed and more reliable than those freeware you can get from the Internet. Here we list some features of BioTools.

  • Chromatogram Analysis and Sequence Assembly
  • Database Reference Search and BLAST Search
  • Multiple Alignment
  • Vector Construct
  • Primer Design
  • Biochemistry Statistics of Nucleotide & Protein Sequence
  • Translation
  • Restriction Map

BioEdit
    
In addition to a sequence alignment editor, BioEdit is also connected with a wide range of free Bio-informatics programs on the Internet. The topics cover from BLAST search to promoter prediction. If you want to get some freeware, BioEdit is a good one you may want to have a look at.


 


 

Real world applications of Bio-informatics:


 

1. Molecular medicine :--

At present all drugs on the market target only about 500 proteins. With an improved understanding of disease mechanisms and using computational tools to identify and validate new drug targets, more specific medicines that act on the cause, not merely the symptoms, of the disease can be developed. These highly specific drugs promise to have fewer side effects than many of today's medicines.

Clinical medicine will become more personalised with the development of the field of pharmacogenomics. This is the study of how an individual's genetic inheritence affects the body's response to drugs. At present, some drugs fail to make it to the market because a small percentage of the clinical patient population show adverse affects to a drug due to sequence variants in their DNA.

With the specific details of the genetic mechanisms of diseases being unravelled, the development of diagnostic tests to measure a persons susceptibility to different diseases may become a distinct reality. Preventative actions such as change of lifestyle or having treatment at the earliest possible stages when they are more likely to be successful, could result in huge advances in our struggle to conquer disease.

In the not too distant future, the potential for using genes themselves to treat disease may become a reality. Gene therapy is the approach used to treat, cure or even prevent disease by changing the expression of a persons genes. Currently, this field is in its infantile stage with clinical trials for many different types of cancer and other diseases ongoing.

2. Microbial genome applications :-

Deinococcus radiodurans is known as the world's toughest bacteria and it is the most radiation resistant organism known. Scientists are interested in this organism because of its potential usefulness in cleaning up waste sites that contain radiation and toxic chemicals.

Increasing levels of carbon dioxide emission, mainly through the expanding use of fossil fuels for energy, are thought to contribute to global climate change. Recently, the DOE (Department of Energy, USA) launched a program to decrease atmospheric carbon dioxide levels. One method of doing so is to study the genomes of microbes that use carbon dioxide as their sole carbon source.

Scientists are studying the genome of the microbe Chlorobium tepidum which has an unusual capacity for generating energy from light

The archaeon Archaeoglobus fulgidus and the bacterium Thermotoga maritima have potential for practical applications in industry and government-funded environmental remediation. These microorganisms thrive in water temperatures above the boiling point and therefore may provide the DOE, the Department of Defence, and private companies with heat-stable enzymes suitable for use in industrial processes

Scientists have been examining the genome of Enterococcus faecalis-a leading cause of bacterial infection among hospital patients. They have discovered a virulence region made up of a number of antibiotic-resistant genes that may contribute to the bacterium's transformation from a harmless gut bacteria to a menacing invader. The discovery of the region, known as a pathogenicity island, could provide useful markers for detecting pathogenic strains and help to establish controls to prevent the spread of infection in wards.

3. Agriculture :-

The sequencing of the genomes of plants and animals should have enormous benefits for the agricultural community. Bioinformatic tools can be used to search for the genes within these genomes and to elucidate their functions. This specific genetic knowledge could then be used to produce stronger, more drought, disease and insect resistant crops and improve the quality of livestock making them healthier, more disease resistant and more productive.

4. Animals

Sequencing projects of many farm animals including cows, pigs and sheep are now well under way in the hope that a better understanding of the biology of these organisms will have huge impacts for improving the production and health of livestock and ultimately have benefits for human nutrition

5. Comparative studies

Analysing and comparing the genetic material of different species is an important method for studying the functions of genes, the mechanisms of inherited diseases and species evolution. Bioinformatics tools can be used to make comparisons between the numbers, locations and biochemical functions of genes in different organisms.



 

Tuesday, May 11, 2010

ARTIFICIAL RAIN





दोनशे लिटर क्षमतेची रिकामी टाकी, तिच्या एका तोंडाला लावण्याची लोखंडी जाळी, तिच्या आत हवा जाण्यासाठी तयार केलेली नळी, तापमान-वारा-आर्द्रता मोजणारे मापक... कोठेही सहज उपलब्ध होणाऱ्या या साधनांद्वारे पुण्यातील एका अभियंत्याने कृत्रिम पाऊस पाडणारे यंत्र तयार केले आहे. या यंत्रात भुश्‍श्‍याच्या विटा किंवा गोवऱ्या किंवा लाकडे घालून पेटविले आणि नंतर त्यात मीठ टाकल्यास प्रयोगानंतरच्या २४ तासांत पाच मिलिमीटरपर्यंत पाऊस होतो, असा दावा त्यांनी केला आहे.

डॉ. राजा मराठे हे या अभियंत्याचे नाव. मुंबईमधील "इंडियन इन्स्टिट्यूट ऑफ टेक्‍नॉलॉजी'चे ते पदवीधर आहेत आणि अमेरिकेच्या राईस विद्यापीठातून पीएच. डी. मिळविली आहे. भारताने बनविलेल्या "परम' या पहिल्या महासंगणकाच्या विकासकार्यात त्यांचा सहभाग होता. सामाजिक कार्यातही अग्रेसर असलेल्या डॉ. मराठे यांनी गेल्या वर्षी नांदेड जिल्ह्यातील सुजलेगाव येथे कृत्रिम पावसाबाबतचे काही प्रयोग केले. अशा दहा प्रयोगांत नऊ वेळा पाऊस झाल्याचे ते सांगतात. सुजलेगाव परिसरातील अन्य गावांतही त्यांनी हा प्रयोग केला आहे.


असा करतात वरुणयंत्राचा कमी खर्चिक प्रयोग
पुणे - ""पावसाने दडी मारल्यास शेतीचे मोठे नुकसान होते. अर्थव्यवस्थेलाही त्याचा फटका बसतो. हे टाळण्यासाठी कृत्रिम पाऊस पाडण्यावर भर दिला पाहिजे,'' असे मत ज्येष्ठ अभियंते आणि कृत्रिम पाऊस पाडणाऱ्या "वरुण यंत्रा'ची निर्मिती करणाऱ्या डॉ. राजा मराठे यांनी व्यक्त केले आहे.

कृत्रिम पावसाचे अनेक प्रयोग जगभर होत असतात. त्यांपैकी सर्रास केला जाणारा प्रयोग म्हणजे विमानाद्वारे ढगात सिल्व्हर आयोडाईडची फवारणी करणे. या खेरीज खास बनविलेल्या रॉकेटद्वारा किंवा तोफांद्वाराही सिल्व्हर आयोडाईडची फवारणी केली जाते. बहुतेक ठिकाणी हे प्रयोग सरकारकडून केले जातात, शिवाय त्यांचा खर्चही अधिक असतो. महाराष्ट्रात काही वर्षांपूर्वी बारामतीमध्ये हा प्रयोग झाला आहे.

डॉ. मराठे यांनी "वरुण यंत्रा'चा छोटेखानी प्रयोग सुरू केला आहे. ते म्हणाले, ""कृत्रिम पावसाच्या कोणत्याही प्रयोगात ढगापर्यंत उत्प्रेरक नेले जाते. पाऊस पडण्यासाठी ढगा मधील पाण्याचे छोटे छोटे थेंब एकमेकांकडे आकर्षित होणे महत्त्वाचे असते. त्यासाठी उत्प्रेरकाची गरज असते. मिठाचे सूक्ष्म कण हे उत्प्रेरकासारखे काम करतात. ढगामध्ये विमानाने मिठाची फवारणी शक्‍य नसल्यास जमिनीवर भट्टी करून त्यात मिठाचे कण टाकल्यास ते ढगापर्यंत पोहोचू शकतात. हे तत्त्व वापरून मी प्रयोग केले आहेत. हा प्रयोग कोणालाही सहजगत्या करता येऊ शकतो. त्यामुळे प्रत्येक गावात तो होऊ शकेल. तसे झाल्यास पाऊस न पडण्याच्या अडचणीवर मात करता येईल.''

हा प्रयोग करण्यासाठी वातावरण ढगाळ असणे आवश्‍यक आहे. शिवाय प्रयोगाच्या वेळी हवेत चांगला ओलावा (आर्द्रता) असायला हवा आणि वारे नसावेत. पहाटेची किंवा सायंकाळची वेळ प्रयोगासाठी चांगली असल्याचे डॉ. मराठे यांनी सांगितले. या प्रयोगासाठी "आयआयटी'मधील आजी-माजी सहकाऱ्यांनी; तसेच रोहिणी नीलेकणी यांनी मदत केल्याचे त्यांनी सांगितले.

वरुण यंत्राचा प्रयोग कसा करावा?
"वरुण यंत्रा'चे नमुने डॉ. राजा मराठे यांनी तयार केले आहेत. त्याची किंमत २२५० रुपये आहे. सुजलेगाव (ता. नायगाव, जि. नांदेड) येथून ती मिळतील.

हे यंत्र म्हणजे दोनशे लीटर क्षमतेची लोखंडी टाकी आहे. तिच्या दोन्ही बाजूंकडील पत्रे नसतात. त्यामुळे पोकळ असलेल्या या टाकीच्या एका बाजूला लोखंडी गजांची जाळी बसवतात. याच जाळीवर एक सच्छिद्र आडवी नळी बसविली असते. तिच्या मध्यभागी काटकोनातून दुसरी नळी बसवून ती बाहेर काढतात. या नळीला "ब्लोअर' किंवा भाता जोडला जातो. विजेवर चालणारे "ब्लोअर' चालू केल्यास टाकीमध्ये ऑक्‍सिजनचा पुरवठा वाढतो. वीज नसल्यास भाता वापरला तरी चालतो.

यंत्र वापरण्याची कृती
या टाकीत जळण म्हणून लाकडे, गोवऱ्या, भुश्‍श्‍याच्या विटा सहा इंचापर्यंत रचून ठेवाव्यात. त्यानंतर त्यात रॉकेल टाकून पेटवावे. चांगला जाळ पेटल्यानंतर भुश्‍श्‍याच्या गोवऱ्या किंवा लाकडाच्या ढिपल्या दोन फुटांपर्यंत टाकीत टाकाव्यात. त्यानंतर "ब्लोअर'ने किंवा भात्याने जोरात हवा द्यावी. भट्टी चांगली पेटवून वर आगीचा जाळ यायला लागल्या की त्यात सुमारे सहा किलो मीठ (बारीक) थोडे-थोडे टाकत राहावे.

हा प्रयोग करण्यासाठी आकाश ढगाळ असणे, आर्द्रता अधिक असणे आणि वारा नसणे आवश्‍यक आहे. आर्द्रता मापक यंत्र कोणत्याही शाळेत वा कनिष्ठ महाविद्यालयात उपलब्ध असते.

वरुण यंत्राचे तंत्रज्ञान खुले असल्याचे डॉ. मराठे यांनी सांगितले. या यंत्राची नक्कल करण्यास सर्वांना परवानगी असल्याचे त्यांनी सांगितले.

पाऊस पाडा..
पावसासाठी निसर्गाच्या भरवशावरच बसण्यापेक्षा कृत्रिम पावसाचे प्रयोग सर्वांनी करावेत, असे आवाहन डॉ. राजा मराठे यांनी केले आहे. "पाऊस पाडा, पाणी अडवा, पाणी जिरवा' हे धोरण अवलंबले तरच पाण्याबाबत आपण स्वयंपूर्ण होऊ, असे त्यांचे म्हणणे आहे. त्यांनी "राष्ट्रसंत तुकडोजी महाराज स्वय ंपूर्णता केंद्र' स्थापन केले आहे.

अधिक माहितीसाठी संपर्क ः डॉ. राजा मराठे ९९७०४३५७४०, उमाकांत देशपांडे नावंदीकर ९९२२७२४१०३, संतोष देशमुख सुजलेगावकर ९९७०४६३९०२.

लहरी हवामानावर चीनने अशी केली मात
पुणे - चीनच्या शास्त्रज्ञांनी संशोधनाच्या साह्याने आसमानी संकटावर मात केली आहे. गेल्या पन्नास वर्षांहून अधिक काळ चीनचा वायव्य प्रांत कायम दुष्काळाच्या छायेत असे, तर देशाच्या दुसऱ्या भागात पुराचे थैमान येई, अचानक होणाऱ्या गारपिटीमुळे कोट्यवधीचे नुकसान होई, अशा सर्व अस्मानी संकटावर चिनी वैज्ञानिकांनी तोफा आणि रॉकेटचा मारा करून नियंत्रणाची पद्धत शोधली आहे.

चीनमध्ये गेल्या पन्नास वर्षांत हवामान संशोधनासाठी पंचवार्षिक योजना राबविण्यात येतात. १९९० ते २००० या दहा वर्षांत चीनमध्ये सतरा लाख हेक्‍टर जमिनीवरील पिकांचे गारपिटीमुळे नुकसान झाले होते. तर एकट्या बीजिंग शहरात ३१ मे २००५ला झालेल्या गारपिटीमुळे ८७८७ मोटारींचे नुकसान झाले होते. चीनच्या वायव्य प्रांतात अत्यंत तीव्र दुष्काळ असे तर दुसरीकडे आग्नेय चीनमध्ये पुराचे थैमान असे. तर अनेक शहरातील जनजीवन अत्यंत गडद धुक्‍यामुळे विस्कळित होई, या सर्व अस्मानी संकटाचा चीनच्या अर्थव्यवस्थेवर खूप परिणाम होत असे, म्हणूनच हवामानाच्या लहरीपणावर नियंत्रण मिळविणे चीनला अत्यंत गरजेचे झाले होते.

कृत्रिम पाऊस पाडण्यासाठी चीनमध्ये तोफा, रॉकेट लॉंचर आणि विमानाचा वापर करण्यात येतो. जमिनीवरूनच तोफा आणि रॉकेट लॉंचरच्या साह्याने ढगांचे रोपण (क्‍लाऊड सिडींग) केले जाते. याच पद्धतीने १९५२ जिल्ह्यांमध्ये तोफा आणि रॉकेट लॉंचरचा वापर करून पावसाचे प्रमाण वाढविले तर मोठी गारपीट रोखण्यात यश मिळविले. चीनमध्ये हवामानावरील अभ्यासासाठी २००५ या एका वर्षात ३७२१० शास्त्रज्ञ आणि कर्मचारी कार्यरत होते. त्याचबरोबर कृत्रिम पाऊस पाडण्यासाठी ३७ मानवरहित विमाने, ७०७१ तोफा (३७ इंची) आणि ४६८७ रॉकेट लॉंचरचा वापर करण्यात आला. चीनमधील मोठ्या धरणात सतत पाणीसाठा राहावा, त्याचबरोबर दुष्काळी वायव्य चीनमध्ये पावसाचे प्रमाण वाढविण्यासाठी सुमारे दहा लाख विशिष्ट पद्धतीने तयार केलेले तोफगोळे, ८४, ४१६ रॉकेट, सुमारे सातशे किलो सिल्व्हर आयोडाईडचा वापर करण्यात आला. हवामानाच्या अभ्यासासाठी चीनमध्ये २६८ डॉप्लर रडार कार्यरत आहेत.

३७ इंची तोफा आणि रॉकेट लॉंचरचा वापर करून जमिनीवरूनच ढगांचे रोपण करण्याचे तंत्रज्ञान चीनच्या शास्त्रज्ञांनी शोधले आहे. तोफेतून सोडलेला गोळा आकाशात सहा किलोमीटरपर्यंत मारा करू शकतो आणि ढगांची उंची ही तीन ते सात किलोमीटर अशी असते. तर रॉकेट लॉंचर आकाशात आठ किलोमीटर पर्यंत मारा करतो. तोफगोळ्यामध्ये एक ते चार ग्रॅम सिल्व्हर आयोडाईड असते (रॉकेटमध्ये आठ ग्रॅम) ते जेव्हा गोळ्याचा ढगांत स्फोट होतो, तेव्हा तेथे टाकले जाते. तेथे रासायनिक क्रिया होऊन काही वेळातच पाऊस पडण्यास सुरवात होते. चीनच्या उत्तर आणि वायव्य प्रांतात अधिक शंभर टीएमसी पाणी मिळविण्याची योजना आखली होती. दीड लाख चौरस किलोमीटर परिसरातील यलो नदीच्या ९८ हजार चौरस किलोमीटर पाणलोट क्षेत्रात हा पाऊस पाडण्यात आला.

सुजलेगावनजीकच्या आमच्या नावंदी गावात गेल्या वर्षी एके दुपारी डॉ.मराठे तंत्राने कृत्रिम पावसाचा प्रयोग केला. संध्याकाळी साडेसहाच्या सुमारास तीन किलोमीटर परिसरात पाऊस सुरू झाला, तो दीड तास पडला. सोयाबीन, कपाशीच्या पिकांना २० दिवसांपासून पावसाचा ताण पडला होता, कृत्रिम पावसामुळे या पिकांना जीवदान मिळाले.
- उमाकांत देशपांडे- नावंदीकर, सरपंच

जमिनीवर भट्टी पेटवून ढगांपर्यंत क्षार पाठवण्याची पद्धत जगात अनेक ठिकाणी वापरली जाते. या पद्धतीतील पदार्थांचा अभ्यास होणे आवश्‍यक आहे. या पद्धतीबाबत आजही अनेक प्रश्‍न अनुत्तरीत आहेत. "वरुण यंत्राची'ही उपयुक्तता तपासण्यासाठी तांत्रिक सहकार्य आवश्‍यक असल्यास आम्ही ते देऊ.

Sunday, May 9, 2010

Indian engineering service






1. The EXAMINATION shall be conducted according to the following plan:-
Part I-The written examination will comprise two sections-Section I consisting only of objective types of questions and Section II of conventional papers. Both Sections will cover the entire syllabus of the relevant engineering disciplines viz. Civil Engineering, Mechanical Engineering, Electrical Engineering and Electronics & Telecommunication Engineering. The standard and syllabi prescribed for these papers are given in Schedule to the Appendix. The details of the written examination i.e. subject, duration and maximum marks allotted to each subject are given in para 2 below.
Part II-Personality test carrying a maximum of 200 marks of such of the candidates who qualify on the basis of the written examination.
2. The following will be the subjects for the written examination:-
Note: Candidates are advised to read carefully special instruction to candidates for conventional type tests and objective type tests given in Appendix-IV (Part A & Part B) including the procedure regarding filling in the Answer Sheet of objective type tests in the Examination Hall.
3. In the Personality Test special attention will be paid to assessing the candidate's capacity for leadership, initiative and intellectual curiosity, tact and other social qualities, mental and physical energy, powers of practical application and integrity of character.
4. Conventional papers must be answered in English. Question papers will be set in English only.
5. Candidates must write the papers in their own hand. In no circumstances will they be allowed the help of a scribe to write the answers for them.
6. The Commission have discretion to fix minimum qualifying marks in any or all the papers of the examination. The Objective Type papers as contained in Section-I of the Plan of the Examination will be evaluated first and evaluation of the Conventional Type papers contained in Section-II of the Plan of Examination will be done only of those candidates who obtain the minimum qualifying marks in Objective types papers, as fixed by the Commission.
7. Marks will not be allotted for mere superficial knowledge.
8. Deduction up to 5 per cent of the maximum marks for the written papers will be made for illegible handwriting.
9. Credit will be given for orderly, effective and exact expression combined with due economy of words in the conventional papers of the examination.
10. In the question papers, wherever required, SI units will be used.
Category
Section
Subject
Duration
Maximum Marks
I-CIVIL ENGINEERING
I-Objective Papers
General Ability Test (Part A: General English)(Part B: General Studies)
2 Hrs
200
Civil Engineering Paper I
2Hrs
200
Civil Engineering Paper II
2Hrs
200
II-Conventional Papers
Civil Engineering Paper I
3Hrs
200
Civil Engineering Paper II
3Hrs
200
Total
1000
I-Mechanical ENGINEERING
I-Objective Papers
General Ability Test (Part A: General English)(Part B: General Studies)
2 Hrs
200
Mechanical Engineering Paper I
2Hrs
200
Mechanical Engineering Paper II
2Hrs
200
II-Conventional Papers
Mechanical Engineering Paper I
3Hrs
200
Mechanical Engineering Paper II
3Hrs
200
Total
1000
III-Electrical ENGINEERING
I-Objective Papers
General Ability Test (Part A: General English)(Part B: General Studies)
2 Hrs
200
Electrical Engineering Paper I
2Hrs
200
Electrical Engineering Paper II
2Hrs
200
II-Conventional Papers
Electrical Engineering Paper I
3Hrs
200
Electrical Engineering Paper II
3Hrs
200
Total
1000
IV-Electronics & Telecommunication ENGINEERING
I-Objective Papers
General Ability Test (Part A: General English)(Part B: General Studies)
2 Hrs
200
Electronics & Telecommunication Engineering Paper I
2Hrs
200
Electronics & Telecommunication Engineering Paper II
2Hrs
200
II-Conventional Papers
Electronics & Telecommunication Engineering Paper I
3Hrs
200
Electronics & Telecommunication Engineering Paper II
3Hrs
200
Total
1000
NOTE: Candidates will be supplied with standard tables/charts in SI units in the Examination hall for reference purpose, wherever considered necessary.
11. Candidates are permitted to bring and use battery operated pocket calculators for conventional (essay) type papers only. Loaning or inter-changing of calculators in the Examination hall is not permitted.
It is also important to note that candidates are not permitted to use calculators for answering objective type paper (Test book lets). They should not, therefore, bring the same inside the Examination Hall.
12. Candidates should use only International form of Indian numerals (e.g. 1,2,3,4,5,6 etc.) while answering question papers.
SCHEDULE TO APPENDIX I
Standard and Syllabi
The standard of paper in General Ability Test will be such as may be expected of a Engineering/Science Graduate. The standard of papers in other subjects will approximately be that of an Engineering Degree Examination of an Indian University. There will be no practical examination in any of the subjects.
GENERAL ABILITY TEST
Part A: General English. The question paper in General English will be designed to test the candidate's understanding of English and workmanlike use of words.
Part B: General Studies: The paper in General Studies will include knowledge of current events and of such matters as of everyday observation and experience in their scientific aspects as may be expected of an educated person. The paper will also include questions on History of India and Geography of a nature which candidates should be able to answer without special study.

MECHANICAL ENGINEERING
PAPER-I (For both objective and conventional type papers)

1. Thermodynamics, Cycles and IC Engines, Basic concepts, Open and Closed systems. Heat and work. Zeroth, First and Second Law, Application to non-Flow and Flow processes. Entropy, Availability, Irreversibility and Tds relations. Claperyron and real gas equations, Properties of ideal gases and vapours. Standard vapour, Gas power and Refrigeration cycles. Two stage compressor. C-I and S.I. Engines. Pre-ignition, Detonation and Diesel-knock, Fuel injection and Carburation, Supercharging. Turbo-prop and Rocket engines, Engine Cooling, Emission & Control, Flue gas analysis, Measurement of Calorific values. Conventional and Nuclear fuels, Elements of Nuclear power production.

2. Heat Transfer and Refrigeration and Airconditioning. Modes of heat transfer. One dimensional steady and unsteady conduction. Composite slab and Equivalent Resistance. Heat dissipation from extended surfaces, Heat exchangers, Overall heat transfer coefficient, Empirical correlations for heat transfer in laminar and turbulent flows and for free and forced Convection, Thermal boundary layer over a flat plate. Fundamentals of diffusive and connective mass transfer, Black body and basic concepts in Radiation, Enclosure theory, Shape factor, Net work analysis. Heat pump and Refrigeration cycles and systems, Refrigerants. Condensers, Evaporates and Expansion devices, Psychrometry, Charts and application to air conditioning, Sensible heating and cooling, Effective temperature, comfort indices, Load calculations, Solar refrigeration, controls, Duct design.

3. Fluid Mechanics.
Properties and classification of fluids, Manometry, forces on immersed surfaces, Center of pressure, Buoyancy, Elements of stability of floating bodies. Kinematics and Dynamics.
Irrotational and incompressible. Inviscid flow. Velocity potential, Pressure field and Forces on immersed bodies. Bernoulli’s equation, Fully developed flow through pipes, Pressure drop calculations, Measurement of flow rate and Pressure drop. Elements of boundary layer theory, Integral approach, Laminar and tubulent flows, Separations. Flow over weirs and notches. Open channel flow, Hydraulic jump. Dimensionless numbers, Dimensional analysis, Similitude and modelling. One-dimensional isentropic flow, Normal shock wave, Flow through convergent - divergent ducts, Oblique shock-wave, Rayleigh and Fanno lines.

4. Fluid Machinery and Steam Generators.
Performance, Operation and control of hydraulic Pump and impulse and reaction Turbines, Specific speed, Classification. Energy transfer, Coupling, Power transmission, Steam generators Fire-tube and water-tube boilers. Flow of steam through Nozzles and Diffusers, Wetness and condensation. Various types of steam and gas Turbines, Velocity diagrams. Partial admission. Reciprocating, Centrifugal and axial flow Compressors, Multistage compression, role of Mach Number, Reheat, Regeneration, Efficiency, Governance.

MECHANICAL ENGINEERING PAPER – II
(For both objective and conventional type papers)

5. THEORY OF MACHINES:
Kinematic and dynamic analysis of planer mechanisms. Cams. Gears and gear trains. Flywheels. Governors. Balancing of rigid rotors and field balancing. Balancing of single and multicylinder engines, Linear vibration analysis of mechanical systems. Critical speeds and whirling of shafts Automatic controls.

6. MACHINE DESIGN :
Design of Joints : cotters, keys, splines, welded joints, threaded fasteners, joints formed by interference fits. Design of friction drives : couplings and clutches, belt and chain drives, power screws.
Design of Power transmission systems : gears and gear drives shaft and axle, wire ropes.
Design of bearings : hydrodynamics bearings and rolling element bearings.

7. STRENGTH OF MATERIALS
Stress and strain in two dimensions, Principal stresses and strains, Mohr’s construction, linear elastic materials, isotropy and anisotropy, stress-strain relations, uniaxial loading, thermal stresses. Beams : Bending moment and shear force diagram, bending stresses and deflection of beams. Shear stress distribution. Torsion of shafts, helical springs. Combined stresses, thick-and thin-walled pressure vessels. Struts and columns. Strain energy concepts and theories of failure.

8. ENGINEERING MATERIALS :
Basic concepts on structure of solids. Crystalline maferials. Detects in crystalline materials. Alloys and binary phase diagrams. Structure and properties of common engineering materials. Heat treatment of steels. Plastics, Ceramics and composite materials. Common applications of various materials.

9. PRODUCTION ENGINEERING :
Metal Forming : Basic Principles of forging, drawing and extrusion; High energy rate forming; Powder metallurgy.
Metal Casting : Die casting, investment casting, Shall Moulding, Centrifugal Casting, Gating & Riser design; melting furnaces.
Fabrication Processes : Principles of Gas, Arc, Shielded arc Welding; Advanced Welding Processes, Weldability: Metallurgy of Welding.
Metal Cutting : Turning, Methods of Screw Production, Drilling, Boring, Milling, Gear Manufacturing, Production of flat surfaces, Grinding & Finishing Processes. Computer Controlled Manufacturing Systems-CNC, DNC, FMS, Automation and Robotics.
Cutting Tools Materials, Tool Geometry, Mechanism of Tool Wear, Tool Life & Machinability; Measurement of cutting forces. Economics of Machining. Unconventional Machining Processes. Jigs and Fixtures. Fits and tolerances, Measurement of surface texture, Comparators Alignment tests and reconditioning of Machine Tools.

10. INDUSTRIAL ENGINEERING :
Production Planning and Control : Forecasting - Moving average, exponential smoothing, Operations, scheduling; assembly line balancing, Product development, Break-even analysis, Capacity planning, PERT and CPM.
Control Operations : Inventory control ABC analysis, EOQ model, Materials requirement planning. Job design, Job standards, Work measurement, Quality Management - Quality analysis and control. Operations Research : Linear Programming - Graphical and Simplex methods, Transportation and assignment models. Single server queueing model.
Value Engineering : Value analysis for cost/value.

11. ELEMENTS OF COMPUTATION :
Computer Organisation, Flow charting, Features of Common computer Languages - FORTRAN, d Base III, Lotus 1-2-3, C and elementary Programming. 

Book List for Mechanical Engineering IES Exam

SUBJECT
AUTHOR
Engineering Thermodynamics
PK Nag
IC Engine
ML Mathur and RP Sharma
Gas Turbine and Propulsive Systems
PR Khajuria & SP Dubey
Fluid Mechanics
Modi & Seth RK Bansal
Compressible Flow
SM Yahya
Heat and Mass Transfer
JP Hollman
RC Sachdeva
Refrigeration and Air Conditioning
CP Arora
Domkundwar
Fluid Machinery
Jagdish Lal
RK Bansal
Theory of Machines
RS Khurmi
Malik & Ghosh
Mechanical Vibration
Grover
Machine Design
Shigley
VB Bhandari
Material Science
WD Callister
IP Singh
Production Engineering
Kalpkjian Schmid
Amitabh Ghosh & AK Malik
Industrial Engineering
O P Khanna
Buffa & Sarin
Operations Research
Kanti Swarup
Strength of Materials
Gere & Timoshenko
BC unamia
Sadhu Singh