Monday, May 24, 2010
12th HSC std result for Mahrashtra state.
The results for the Higher Secondary Certificate (HSC) for Class XII or Std 12th held in Maharashtra will be declared on May 25th 2010 at 11AM.
Students who appeared for the Maharashtra HSC exams in 2010 will be able to check their results online after 11AM at the official Maharashtra Exam site. Maharashtra HSC results will be available at http://mahresult.nic.in/ after 11AM on Tuesday.
Students will require to have their hall ticket roll numbers in order to view their HSC exam results online. Students can also check their exam results by visiting http://results.maharashtraeducation.net/ or http://www.msbshse.ac.in/.
The HSC results will be declared for the Arts, Science and Commerce streams for students who appeared for the exams in February 2010. However, students will get their marksheets from their colleges only on May 31st after 3PM.
The online results are being declared a week earlier than the actual results is handed out in order to allow students to better plan out their future course of actions. We wish all the students best of luck for their exam results.
Friday, May 14, 2010
“NETWORK SECURITY”
ABSTRACT
Today's world is a networked world in which everyone is entering into outside world for mainly, for communication purpose. This is possible only due to the internet facility whose access is an immense source of information. Apart from being a source, we need to have secure communication channel through which the information passes. Loss of irreplaceable data is very real threat, especially for the business owners. They need to communicate with their vendors, employees, customers who are far away from each other. At this stage, Internet will be the easiest & fast source of information exchange for them. So, to keep this information safe & secure, a need felt to provide security to the Internet.
Network security is a complicated subject, historically only tackled by well-trained and experienced experts. Network, as it is vast, interconnected & complicated structure requires lot of understanding about each component, which is a part of it. So, Network Security tests our stamina about keeping the network as safe, secure as possible. As more and more people become ``wired'', an increasing number of people need to understand the basics of security in a networked world. Network Security ensures the reliability, flexibility of an network's working so as to make smooth communication through the network. Any organization, before taking Internet access, first think of firewall.
Some history of networking is included, as well as an introduction to TCP/IP and internetworking. Some points are also concerned to the types of threats, from which one should be aware of, & providing protection against it.
INDEX
1. INTRODUCTION
2. SECURED COMMUNICATION
3. NEED OF SECURITY
- THREATS TO SECURITY
4. MECHANISMS OF SECURITY
5. CRYPTOGRAPHY
- SECRET - KEY ENCRYPTION
- PUBLIC - KEY ENCRYPTION
- FIREWALL AND INTERNET ACCESS.
- FIREWALL ARCHITECTURE
- PACKET - LEVEL FILTERS.
- SECURITY AND PACKET FILTER MECHANISM.
- ACCESSING SERVICES THROUGH A FIREWALL.
- NETWORK SECURITY TOOLS
- CONCLUSION
- REFERENCES
INTRODUCTION
Network
A ``network'' has been defined as
``Any set of interlinking lines resembling a net, a network of roads || an
interconnected system, a network of alliances.''
This definition suits our purpose well:
A computer network is simply a system of interconnected computers.
Security
Security by the name itself is very important for any individual, a machine or also in a network like the locks to help tangible property secure, computers and data networks need provisions that help keep the information secure. Security in an Internet environment is both important and difficult. It is important because information has a significant value -information can be bought and sold directly or used indirectly to create new products and services that yield high profits. Security in an internet is difficult because involves understanding when and how participating users, computers, services and networks can trust one another, as well as understanding the technical details of network hardware and protocols.
As the Internet is becoming more complex day by day security administrators face the risk of being attacked by external intruders that may
- Read Access - Read or copy confidential information.
- Write Access - Write to network or perhaps infect the system with the system with viruses and Trojan horses.
- Denial of Service - Deny authorized users normal network services.
A single computer can compromise the security of entire network. To guard against such threats the security of distributed system, security
policies must be adapted and security mechanisms must be employed to implement security policies.
Threats
There are four classes of Security threats to computers systems. These are
- Leakage
- Tempering
- Resource stealing
- Vandalism
Thus to guard against threats to the security of distributed system, security policies as well as security mechanisms must be employed thereby providing a secure communication link for a data transmission between interconnected host computer systems of network.
SECURED COMMUNICATION
Suppose two persons A & B are communicating. Both of them make sure that contents delivered are not altered by an intruder and are being transferred between them only. The following considerations below reflect these desirable properties of secure communication.
SECRECY
Only the sender and the intended receiver should be able to understand the contents of the transmitted message. Because eavesdroppers may intercept the message been somehow "encrypted" so that an intercepted message can be "decrypted" by an interceptor. For example, A might also want the mere fact that she's communicating with B to be a secret.
AUTHENTICATION
Here both the sender and receiver need to confirm the identity of the other party involved in the communication- to confirm that the other party is indeed who or what they claim to be.
For example - If A receives mail from B, in order to know that it has been sent by the B only A needs some authentication; likewise in network there are authentication protocols.
MESSAGE INTEGRITY
Here the sender and receiver want to ensure that apart from authentication the content of their communication is not altered, either maliciously or by accident in transmissions.
NEED FOR NETWORK SECURITY
Most of the security problems are intentionally caused by malicious people trying to gain some benefit or harm some one enforcing the security administrators to keep network free from programming errors. Thus in turn involves out mastering often intelligent, dedicated and sometimes well-funded adversaries and hence need for security rises. The issue is that network security calls for protections against malicious attack by hackers and intruders, but security is also associated with controlling and authorization mechanisms and the prevention of the effects of errors and equipment failures.
All communication over Internet uses the transmission control protocol /Internet protocol (TCP/IP). TCP/IP allows information to be send from one computer to another computer through variety of intermediate computer and separate network before its destination.
The great flexibility of TCP/IP has led to its worldwide acceptance as the basic Internet and Intranet communications protocol. At the same time, the fact that TCP/IP allows information to pass through intermediate computers makes it possible for a third party to interface with communications in the following ways:
- Eavesdropping. Information remains intact, but its privacy is compromised .For example, someone could learn your credit card number, record a sensitive conversation, or intercept classified information.
- Tampering. Information in transit is changed or replaced and then sent on to the recipient. For example, someone could alter an order for goods or change a person's resume.
- Impersonation. Information passes to a person who poses as the indirect recipients. Impersonation can take two forms
- Spoofing: - A person can pretend to be someone else.
For example, a person can pretend to have the email address jdoe@mozilla.com <mailto:jdoe@mozilla.com>, or a computer can identify itself as a site called www.mozilla.com http://www.mozilla.com
when it is not. This type of impersonation is known as spoofing.
- Misrepresentation: - A person or organization can misrepresent itself. For example, suppose the site www.mozilla.com http://www.mozilla.com pretends to be a furniture store when it is really just a site that takes credit-card payments but never sends any goods.
- Packet Sniffing; - A packet snifter is a program running in a network-attached device that passively receives all data link layer frames passing by network device's interface. In broadcast environment like the Ethernet LAN the packet snifter receives all frames being transmitted from all hosts on the LAN. These frames can then be passed on to application programming that extract application level data.
MECHANISMS FOR NETWORK SECURITY
Internet security problems can be divided into three broad sets.
- AUTHENTICATION MECHANISMS
Authentication mechanisms solve the problem of verifying identification. In centralized multi-user systems, the user's identity can be authenticated by a password check at the start of each interactive session. In distributed systems, authentication is the means by which the identities of servers and clients are reliably established. The mechanism used to achieve this is based on possession of encryption keys.
- PRIVACY MECHANISMS
Encryption can also handle the problem of privacy. If a sender and receiver both use public key encryption scheme, the sender can guarantee that the intended receiver can read a message .To do so, the sender uses the receiver's public key to encode the message and the receiver uses its private key to decode the message. Because only the intended receiver has necessary private key, no other party can decode the message.
- ACCESS CONTROL MECHANISMS
Mechanisms that control Internet access handle problem of screening of particular network or an organization from an unwanted communication. Such mechanism can help to prevent outsiders from obtaining information, changing information, or disrupting communication on an organization 's internal Internet.
CRYPTOGRAPHY
INTRODUCTION
"The art of devising a ciphers i.e. converting the plaintext into coded format & then decoding it" refers to cryptography. Here message to be encrypted are known as plain text & are transformed by a function parameterized by a key. The output of encryption process is known as 'cipher text' and is often transmitted by a messenger .At the receiver its decrypted with help of decryption key and the original message is retrieved.
To encrypt information we transform it in such way that it cannot understand by anyone except the intended recipient who posses the means to reverse the transformation. Computer encryption techniques fall into two main classes-
- Secret-key method
- Public-key method
which useful implementation security, which can be used without much impact on the method of encryption.
- SECRET KEY ENCRYPTION
This method is used for transformation of secret information. In this method applying an agreed encryption function to the plain text with secret key encrypts a message. Decryption is achieved by applying inverse function to the cipher text using the same key, to produce the original plain text. Since the keys are kept secret, the encryption and decryption function need not be secret. Before communication can take place both the sender and receiver must acquire the secret key.
- PUBLIC KEY ENCRYPTION
In this method each potential recipient of message makes a pair of keys, Ke & Kd and keeps the decryption key Kd a secret. The encryption key Ke can be made known publicly for use by anyone who wants to communicate. This method is based on use of any-way function to define the relation between the two keys, so that it is very hard to determine Kd from knowledge of Ke. Thus it avoids the need for transmission of secret keys between principles.
FIREWALLS AND INTERNET ACCESS
The Firewalls defines as "a system or group of systems that enforces an access control policy between two networks." In the context of home networks, a firewall typically takes one of two forms:
- Software firewall - specialized software running on an individual computer,
or
- Network firewall - a dedicated device designed to protect one or more computers.
A single technique has emerged as the basis for Internet access control .The technique places a block known as Internet firewall at the entrance to the part of Internet to be produced .For example, an organization can place firewall at its connection to the global Internet to protect it from unwanted access .A firewall partition has two regions , Informally referred as inside & outside.
Firewall Architecture
There are lots of ways to structure your network to protect your systems using a firewall. If you have a dedicated connections to the Internet through a router, you could plug the router directly into your firewall system. Or, you could go through a hub to provide for full access servers outside your firewall.
- Dial-up Architecture
You may be using a dialup service like an ISDN line. In this case you might use a third network card to provide provide a filtered DMZ. This gives you full control over your Internet services and still separates them from your regular network.
Single Router Architecture
If there is a router or cable modem between you and the Internet. If you own the router you could setup some hard filter rules in the router. If this router is owned by your ISP so you may not the have the needed controls. You can ask your ISP to put in filters.
- Firewall with Proxy Server
If you need to monitor where users of your network are going and your network is small, you can intergrate a proxy server into your firewall. ISP's some times do this to create interest list of their users to resell to marketing agencies.
You can put the proxy server on your LAN as will. In this case the firewall should have rules to only allow the proxy server to connect to the Internet for the services it is providing. This way the users can get to the Internet only through the proxy.
Redundent Internet Configuration
If you are going to run a service like YAHOO or may be Slash Dot you may want to make your system by using redundant routers and firewalls. (Check out the High Availability HowTo.) By using a round-robin DNS techniques to provide access to multiple web servers from one URL and multiple ISP's, routers and firewalls using High Availability techniques you can create a 100% uptime service.
It is easy to let your network get out of hand. Keep control of every connection. It only takes a user with a modem to compromise your LAN.
- Packet-level filters:
Many commercial routers offer a mechanism tact augments normal routine and permits a manager to further control packet processing . Packet filters mechanism requires the manager to specify how the router should dispose of each datagram . When Datagram first arrives, the router passes the Datagram through its packet filter before performing any other processing . if the filter rejects the Datagram the router drops it immediately. Each router vender is free to choose the capabilities of their packet filter as well as the interface a manager use to configure the filter.
- Security and packet filter mechanism:
Packet filtering firewall consists of list of acceptance denial rules . These rules explicitly define which packets will and will not be allowed through the network interface. These rules are based on the specific network layer's source and destination addresses.
- Accessing service through a firewall:
An organization can only provide safe access to outside services through a secure computer . Instead of trying to make all computer system organizations secure,an organization usually associates one secure computer with each firewall. It is often called as bastion host.
Bastion host :
A general-purpose computer used to control access between the internal (private) network (intranet) and the Internet (or any other untrusted network). Typically, these are hosts running a flavor of the Unix operating system that has been customized in order to reduce its functionality to only what is necessary in order to support its functions. Many of the general-purpose features have been turned off, and in many cases, completely removed, in order to improve the security of the machine.
To permit safe access, firewall has two conceptual barriers which the figure shows. The outer barrer blocks all incoming traffic except :
- Datagrams destined for services on the bastion host that the organization choose
to make available externally,
- Datagrams destined for the clients on the bastion host .
The inner barrier blocks the incoming traffic excepts datagrams that originate on the
bastion host.
To understand how the bastion host operates ,consider the FTP service. Suppose a user in the organization needs to access an external FTP server to obtain copy of the file . Because the firewall prevents the user's computer from receiving incoming datagrams , the user cannot run FTP client software directly .Instead, the user must run the FTP clienton the bastion host. after the file has been copied to the bastion host,the user can run file transfer between the bastion host and their local computer .
NETWORK SECURITY TOOLS
Various Tools for the Network Security are existing in this world which can work better& provides reliable communication channel through which information can be safely transmitted from sender to the reciever. These tools are as follows:
- SATAN
SATAN, the System Administrator Tool for Analyzing Networks, is a network security analyzer designed by Dan Farmer and Wietse Venema. SATAN scans systems connected to the network noting the existence of well known, often exploited vulnerabilities. For each type of problem found, SATAN offers a tutorial that explains the problem and what can be done.
- ipacl
The ipacl package from Siemens. Forces all TCP and UDP packets to pass through an access control list facility. The configuration file allows packets to be accepted, rejected, conditionally accepted, and conditionally rejected based on characteristics such as source address, destination address, source port number, and destination port number. Should be portable to any system that uses System V STREAMS for its network code.
- TCP Wrappers
The tcp_wrapper package by Wietse Venema. Formerly called log_tcp. Allows monitoring and control over who connects to a hosts TFTP, EXEC, FTP, RSH, TELNET, RLOGIN, FINGER, and SYSTAT ports. Also includes a library so that other programs can be controlled and monitored in the same fashion.
Some more no. of tools are as follows:
- Logdaemon
- Portmap
- Rpcbind
- Sara
- Scanssh
- Securelib
- Rpcbind
CONCLUSION
Security is a very difficult topic. Everyone has a different idea of what ``security'' is, and what levels of risk are acceptable. The key for building a secure network is to define what security means to your organization . Once that has been defined, everything that goes on with the network can be evaluated with respect to that policy. Projects and systems can then be broken down into their components, and it becomes much simpler to decide whether what is proposed will conflict with your security policies and practices.
Many people pay great amounts of lip service to security, but do not want to be bothered with it when it gets in their way. It's important to build systems and networks in such a way that the user is not constantly reminded of the security system around him. Users who find security policies and systems too restrictive will find ways around them. It's important to get their feedback to understand what can be improved, and it's important to let them know why what's been done has been, the sorts of risks that are deemed unacceptable, and what has been done to minimize the organization's exposure to them.
Security is everybody's business, and only with everyone's cooperation, an intelligent policy, and consistent practices, will it be achievable.
REFERENCES
- Computer networks by Andrew Tannenbaum.
- Computer networking by John Martin.
- Internetworking with TCP/IP by Douglas E.Comer.
Bio-Informatics: A computational approach to molecular biology
What is Bio-informatics?
Bio-informatics is a newly emerging interdisciplinary research area which may be defined as the interface between biological and computational sciences. Thus, the people working in this field in most cases either have a training in biology or computer science, and they learned about the other field by dealing with problems or using the tools of the other one. And although the term 'Bio-informatics' is not really well-defined, you could say that this scientific field deals with the computational management of all kinds of biological information, whether it may be about genes and their products, whole organisms or even ecological systems. Most of the Bio-informatics work that is being done deals can be described as analyzing biological data, although a growing number of projects deal with the organization of biological information. As a consequence of the large amount of data produced in the field of molecular biology, most of the current Bio-informatics projects deal with structural and functional aspects of genes and proteins. Many of these projects are related to the Human Genome Project.
First, the data produced by the thousands of research teams all over the world are collected and organized in databases specialized for particular subjects. Well-known examples are: GDB (Genome Data Base). , SWISS-PROT , GenBank , and PDB (Protein Data Bank). In the next step, computational tools are needed to analyse the collected data in the most efficient manner.
One example for such an integration effort is the GeneCards encyclopedia,. This resource contains data about human genes, their products and the diseases in which they are involved. (a process similar to "data mining").
Bio-Informatics: A computational approach to molecular biology
Bio-informatics has been the latest buzzword in the business and scientific community, the hype for this emerging field has been increasing day by day, more and more educational organizations have already added this name to their academic profiles.
If you were a computer-programmer, bio-informatics skills would enable you to make software for biological applications and if you were biologist, bio-informatics would probably be the best tool to speed up your work just by using a computer with an internet connection. On an over all, bio-informatics is a very important tool for any one who is serious about computing biological processes.
"Bio informatics is a science of solving biological problem using a mathematical and computational approach."
Many of us confuse Bio-informatics with that of Bio-computing; fundamentally it's a complete different field. Bio-computing or molecular computing is applying biology to solve complex and computationally almost impossible problems using biology, the best example is the famous 'Traveling sales man problem' which was treated computationally impossible to solve.// Bio-informatics a very new field, it has been hardly five years since this science has come into existence in a common man's life. It is a mathematical and computational approach, you need to know mathematics to actually understand bio-informatic application. Fundamental knowledge of molecular biology is also necessary to learn bio-informatics. Molecular biology is a branch of biology which primarily deals with functions, characteristics and structures of mainly three major macro-molecules DNA,RNA and Proteins.
Protecting Bio-informatics Tools :
Bio-informatics involves the use of computer software to gather, sort, and analyze biological data – often with a goal of finding "drug gable targets" for pharmaceutical R&D. It has not always been clear which form of legal protection (primarily, copyright or patents) provides the best value for a bio-informatics product, given, in particular, the considerable doubt and confusion in the European Union as to the validity of software patents. However, recent developments in the European Union with respect to software patents, coupled with industry trends in the US as well as Europe, suggest that bio-informatics companies should give patent protection a very close look.
Genomes to Life
The revolution in biology triggered by the Human Genome Project now promises far-reaching benefits.
Today, scientists have in hand the complete DNA sequences of genomes for many organisms — from microbes to plants to humans. The U.S. Department of Energy's Genomes to Life program will use the new genomic data and high-throughput technologies for studying the proteins encoded by the genome to explore the amazingly diverse natural capabilities in microbes. These can be exploited to help solve DOE mission challenges in
- Underlying goals of the Genomes to Life program that will enable these benefits are to Identify the protein machines that carry out critical life functions,
- Characterize the gene regulatory networks that control these machines,
- Explore the functional repertoire of complex microbial communities in their natural environments to provide a foundation for understanding and using their remarkably diverse capabilities to address DOE missions, and Develop the computational capabilities to integrate and understand these data and begin to model complex biological systems.
Features
- Data Integration
- Data export to excel and other formats
- Import and integration from diverse sources:
- Sequence data: Genbank, FASTA formatted files, Swissprot format
- Gene Ontology
- PDB
- KEGG
- Method Integration
- Methods from various disciplines for analysis of
- Sequence
- Structure
- Expression data
- Taxonomy and Phylogeny
- Metabolic pathways
- Workflows
- Automatic checking of data compatibility
- Background execution of workflows
- Available methods:
- Bio-informatics
- Blast and Psi-Blast
- Sequence repeat detection
- Function analysis for cluster of sequences
- Match sequence profiles and regular expressions
- Expression matrix processing: Completion, Normalization, Filtering and Masking
- Mapping of expression data to metabolic pathways, Gene Ontology
- Metabolic pathway reconstruction
- General
- Vector operations
- Sorting
- Shuffling
- Statistics (average, mean, etc.)
- Visual Orientation
- Graphical workflow representation
- Drag n drop workflow construction
- Hierarchical tabular viewers
- Diverse graphical viewers for biological data and workflow results
- Advantages
- Shallow learning curve thanks to visual programming
- Unified data structure
- Expandability through script language (python)
- Scalability from desktop to corporation
- Company-wide sharing of results and methods
The Daphnia Genomics Consortium (DGC) is an international network of investigators committed to mounting the freshwater crustacean Daphnia as a model system for evolutionary / ecological genetics and genomics
Dictyostelium discoideum genome annotation and analysis portal; specialized Dictyostelium sequence and function annotaton database.
Website, MySQL server and perl API access to software system which produces and maintains automatic annotation on eukaryotic genomes.
- MIPS:
Munich Information Centre for Protein Sequences projects include: fungal genome analysis, plant genome Bio-informatics, structural genomics, proteomics and genome annotation; databases include: Sputnik, MosDB, and PEDANT.
Parasite genome databases and genome research resources.
Genomic and cDNA library screening (human, mouse, dog, pig) is provided free to Canadian academic researchers with a nominal clone retrieval fee; includes Research Genetics, NIA/NIH and RIKEN cDNAs.
Provides a rapid and reliable display of any requested portion of the SARS genome at any scale, together with dozens of aligned annotation tracks.
Integrated Bio-informatics Software
GCG :-
GCG is one of the earliest integrated Bio-informatics system. It maintains more than 70 Bio-informatics data analysis tools, which are based on published algorithms from fields of mathematical and computational biology. In additions to running these programs individually, GCG allows the data flow among them. By using these tools, scientists can accomplish the following tasks:
- Sequence Comparison
- Database Searching and Retrieval
- DNA/RNA Secondary Structure Prediction
- Editing and Publication
- Evolution Analysis
- Fragment Assembly
- Gene Finding and Pattern Recognition
- Importing and Exporting Files in Different Formats
- Mapping
- Primer Selection
- Protein Analysis
- Translation
ICBR maintains a GCG server and keeps updated with NCBI and EBI databases. We support command line GCG. It gives the users quick and reliable analysis results. Regular GCG workshops are held once every year.
Biocatalog :-
The Biocatalog is a software directory of general interest in molecular biology and genetics. lists the databases DNA, Proteins, Alignments, Genomes, Genetic, Mapping, Molecular Evolution, Molecular graphics, databases, server.
BioTools (GeneTool & PepTool) :-
BioTools Suite includes GeneTool and PepTool for nucleotide and peptide sequence analysis respectively. Compared to GCG, BioTools has the most user-friendly interface. It covers almost all routine Bio-informatics jobs while the analysis function is less powerful than GCG. However, we find BioTools is a very good software for Bio-informatics novices and basic analysis. It's much better developed and more reliable than those freeware you can get from the Internet. Here we list some features of BioTools.
- Chromatogram Analysis and Sequence Assembly
- Database Reference Search and BLAST Search
- Multiple Alignment
- Vector Construct
- Primer Design
- Biochemistry Statistics of Nucleotide & Protein Sequence
- Translation
- Restriction Map
BioEdit
In addition to a sequence alignment editor, BioEdit is also connected with a wide range of free Bio-informatics programs on the Internet. The topics cover from BLAST search to promoter prediction. If you want to get some freeware, BioEdit is a good one you may want to have a look at.
Real world applications of Bio-informatics:
At present all drugs on the market target only about 500 proteins. With an improved understanding of disease mechanisms and using computational tools to identify and validate new drug targets, more specific medicines that act on the cause, not merely the symptoms, of the disease can be developed. These highly specific drugs promise to have fewer side effects than many of today's medicines.
Clinical medicine will become more personalised with the development of the field of pharmacogenomics. This is the study of how an individual's genetic inheritence affects the body's response to drugs. At present, some drugs fail to make it to the market because a small percentage of the clinical patient population show adverse affects to a drug due to sequence variants in their DNA.
With the specific details of the genetic mechanisms of diseases being unravelled, the development of diagnostic tests to measure a persons susceptibility to different diseases may become a distinct reality. Preventative actions such as change of lifestyle or having treatment at the earliest possible stages when they are more likely to be successful, could result in huge advances in our struggle to conquer disease.
In the not too distant future, the potential for using genes themselves to treat disease may become a reality. Gene therapy is the approach used to treat, cure or even prevent disease by changing the expression of a persons genes. Currently, this field is in its infantile stage with clinical trials for many different types of cancer and other diseases ongoing.
2. Microbial genome applications :-
Deinococcus radiodurans is known as the world's toughest bacteria and it is the most radiation resistant organism known. Scientists are interested in this organism because of its potential usefulness in cleaning up waste sites that contain radiation and toxic chemicals.
Increasing levels of carbon dioxide emission, mainly through the expanding use of fossil fuels for energy, are thought to contribute to global climate change. Recently, the DOE (Department of Energy, USA) launched a program to decrease atmospheric carbon dioxide levels. One method of doing so is to study the genomes of microbes that use carbon dioxide as their sole carbon source.
Scientists are studying the genome of the microbe Chlorobium tepidum which has an unusual capacity for generating energy from light
The archaeon Archaeoglobus fulgidus and the bacterium Thermotoga maritima have potential for practical applications in industry and government-funded environmental remediation. These microorganisms thrive in water temperatures above the boiling point and therefore may provide the DOE, the Department of Defence, and private companies with heat-stable enzymes suitable for use in industrial processes
Scientists have been examining the genome of Enterococcus faecalis-a leading cause of bacterial infection among hospital patients. They have discovered a virulence region made up of a number of antibiotic-resistant genes that may contribute to the bacterium's transformation from a harmless gut bacteria to a menacing invader. The discovery of the region, known as a pathogenicity island, could provide useful markers for detecting pathogenic strains and help to establish controls to prevent the spread of infection in wards.
The sequencing of the genomes of plants and animals should have enormous benefits for the agricultural community. Bioinformatic tools can be used to search for the genes within these genomes and to elucidate their functions. This specific genetic knowledge could then be used to produce stronger, more drought, disease and insect resistant crops and improve the quality of livestock making them healthier, more disease resistant and more productive.
Sequencing projects of many farm animals including cows, pigs and sheep are now well under way in the hope that a better understanding of the biology of these organisms will have huge impacts for improving the production and health of livestock and ultimately have benefits for human nutrition
Analysing and comparing the genetic material of different species is an important method for studying the functions of genes, the mechanisms of inherited diseases and species evolution. Bioinformatics tools can be used to make comparisons between the numbers, locations and biochemical functions of genes in different organisms.
Tuesday, May 11, 2010
ARTIFICIAL RAIN
दोनशे लिटर क्षमतेची रिकामी टाकी, तिच्या एका तोंडाला लावण्याची लोखंडी जाळी, तिच्या आत हवा जाण्यासाठी तयार केलेली नळी, तापमान-वारा-आर्द्रता मोजणारे मापक... कोठेही सहज उपलब्ध होणाऱ्या या साधनांद्वारे पुण्यातील एका अभियंत्याने कृत्रिम पाऊस पाडणारे यंत्र तयार केले आहे. या यंत्रात भुश्श्याच्या विटा किंवा गोवऱ्या किंवा लाकडे घालून पेटविले आणि नंतर त्यात मीठ टाकल्यास प्रयोगानंतरच्या २४ तासांत पाच मिलिमीटरपर्यंत पाऊस होतो, असा दावा त्यांनी केला आहे.
डॉ. राजा मराठे हे या अभियंत्याचे नाव. मुंबईमधील "इंडियन इन्स्टिट्यूट ऑफ टेक्नॉलॉजी'चे ते पदवीधर आहेत आणि अमेरिकेच्या राईस विद्यापीठातून पीएच. डी. मिळविली आहे. भारताने बनविलेल्या "परम' या पहिल्या महासंगणकाच्या विकासकार्यात त्यांचा सहभाग होता. सामाजिक कार्यातही अग्रेसर असलेल्या डॉ. मराठे यांनी गेल्या वर्षी नांदेड जिल्ह्यातील सुजलेगाव येथे कृत्रिम पावसाबाबतचे काही प्रयोग केले. अशा दहा प्रयोगांत नऊ वेळा पाऊस झाल्याचे ते सांगतात. सुजलेगाव परिसरातील अन्य गावांतही त्यांनी हा प्रयोग केला आहे.
असा करतात वरुणयंत्राचा कमी खर्चिक प्रयोग
पुणे - ""पावसाने दडी मारल्यास शेतीचे मोठे नुकसान होते. अर्थव्यवस्थेलाही त्याचा फटका बसतो. हे टाळण्यासाठी कृत्रिम पाऊस पाडण्यावर भर दिला पाहिजे,'' असे मत ज्येष्ठ अभियंते आणि कृत्रिम पाऊस पाडणाऱ्या "वरुण यंत्रा'ची निर्मिती करणाऱ्या डॉ. राजा मराठे यांनी व्यक्त केले आहे.
कृत्रिम पावसाचे अनेक प्रयोग जगभर होत असतात. त्यांपैकी सर्रास केला जाणारा प्रयोग म्हणजे विमानाद्वारे ढगात सिल्व्हर आयोडाईडची फवारणी करणे. या खेरीज खास बनविलेल्या रॉकेटद्वारा किंवा तोफांद्वाराही सिल्व्हर आयोडाईडची फवारणी केली जाते. बहुतेक ठिकाणी हे प्रयोग सरकारकडून केले जातात, शिवाय त्यांचा खर्चही अधिक असतो. महाराष्ट्रात काही वर्षांपूर्वी बारामतीमध्ये हा प्रयोग झाला आहे.
डॉ. मराठे यांनी "वरुण यंत्रा'चा छोटेखानी प्रयोग सुरू केला आहे. ते म्हणाले, ""कृत्रिम पावसाच्या कोणत्याही प्रयोगात ढगापर्यंत उत्प्रेरक नेले जाते. पाऊस पडण्यासाठी ढगा मधील पाण्याचे छोटे छोटे थेंब एकमेकांकडे आकर्षित होणे महत्त्वाचे असते. त्यासाठी उत्प्रेरकाची गरज असते. मिठाचे सूक्ष्म कण हे उत्प्रेरकासारखे काम करतात. ढगामध्ये विमानाने मिठाची फवारणी शक्य नसल्यास जमिनीवर भट्टी करून त्यात मिठाचे कण टाकल्यास ते ढगापर्यंत पोहोचू शकतात. हे तत्त्व वापरून मी प्रयोग केले आहेत. हा प्रयोग कोणालाही सहजगत्या करता येऊ शकतो. त्यामुळे प्रत्येक गावात तो होऊ शकेल. तसे झाल्यास पाऊस न पडण्याच्या अडचणीवर मात करता येईल.''
हा प्रयोग करण्यासाठी वातावरण ढगाळ असणे आवश्यक आहे. शिवाय प्रयोगाच्या वेळी हवेत चांगला ओलावा (आर्द्रता) असायला हवा आणि वारे नसावेत. पहाटेची किंवा सायंकाळची वेळ प्रयोगासाठी चांगली असल्याचे डॉ. मराठे यांनी सांगितले. या प्रयोगासाठी "आयआयटी'मधील आजी-माजी सहकाऱ्यांनी; तसेच रोहिणी नीलेकणी यांनी मदत केल्याचे त्यांनी सांगितले.
वरुण यंत्राचा प्रयोग कसा करावा?
"वरुण यंत्रा'चे नमुने डॉ. राजा मराठे यांनी तयार केले आहेत. त्याची किंमत २२५० रुपये आहे. सुजलेगाव (ता. नायगाव, जि. नांदेड) येथून ती मिळतील.
हे यंत्र म्हणजे दोनशे लीटर क्षमतेची लोखंडी टाकी आहे. तिच्या दोन्ही बाजूंकडील पत्रे नसतात. त्यामुळे पोकळ असलेल्या या टाकीच्या एका बाजूला लोखंडी गजांची जाळी बसवतात. याच जाळीवर एक सच्छिद्र आडवी नळी बसविली असते. तिच्या मध्यभागी काटकोनातून दुसरी नळी बसवून ती बाहेर काढतात. या नळीला "ब्लोअर' किंवा भाता जोडला जातो. विजेवर चालणारे "ब्लोअर' चालू केल्यास टाकीमध्ये ऑक्सिजनचा पुरवठा वाढतो. वीज नसल्यास भाता वापरला तरी चालतो.
यंत्र वापरण्याची कृती
या टाकीत जळण म्हणून लाकडे, गोवऱ्या, भुश्श्याच्या विटा सहा इंचापर्यंत रचून ठेवाव्यात. त्यानंतर त्यात रॉकेल टाकून पेटवावे. चांगला जाळ पेटल्यानंतर भुश्श्याच्या गोवऱ्या किंवा लाकडाच्या ढिपल्या दोन फुटांपर्यंत टाकीत टाकाव्यात. त्यानंतर "ब्लोअर'ने किंवा भात्याने जोरात हवा द्यावी. भट्टी चांगली पेटवून वर आगीचा जाळ यायला लागल्या की त्यात सुमारे सहा किलो मीठ (बारीक) थोडे-थोडे टाकत राहावे.
हा प्रयोग करण्यासाठी आकाश ढगाळ असणे, आर्द्रता अधिक असणे आणि वारा नसणे आवश्यक आहे. आर्द्रता मापक यंत्र कोणत्याही शाळेत वा कनिष्ठ महाविद्यालयात उपलब्ध असते.
वरुण यंत्राचे तंत्रज्ञान खुले असल्याचे डॉ. मराठे यांनी सांगितले. या यंत्राची नक्कल करण्यास सर्वांना परवानगी असल्याचे त्यांनी सांगितले.
पाऊस पाडा..
पावसासाठी निसर्गाच्या भरवशावरच बसण्यापेक्षा कृत्रिम पावसाचे प्रयोग सर्वांनी करावेत, असे आवाहन डॉ. राजा मराठे यांनी केले आहे. "पाऊस पाडा, पाणी अडवा, पाणी जिरवा' हे धोरण अवलंबले तरच पाण्याबाबत आपण स्वयंपूर्ण होऊ, असे त्यांचे म्हणणे आहे. त्यांनी "राष्ट्रसंत तुकडोजी महाराज स्वय ंपूर्णता केंद्र' स्थापन केले आहे.
अधिक माहितीसाठी संपर्क ः डॉ. राजा मराठे ९९७०४३५७४०, उमाकांत देशपांडे नावंदीकर ९९२२७२४१०३, संतोष देशमुख सुजलेगावकर ९९७०४६३९०२.
लहरी हवामानावर चीनने अशी केली मात
पुणे - चीनच्या शास्त्रज्ञांनी संशोधनाच्या साह्याने आसमानी संकटावर मात केली आहे. गेल्या पन्नास वर्षांहून अधिक काळ चीनचा वायव्य प्रांत कायम दुष्काळाच्या छायेत असे, तर देशाच्या दुसऱ्या भागात पुराचे थैमान येई, अचानक होणाऱ्या गारपिटीमुळे कोट्यवधीचे नुकसान होई, अशा सर्व अस्मानी संकटावर चिनी वैज्ञानिकांनी तोफा आणि रॉकेटचा मारा करून नियंत्रणाची पद्धत शोधली आहे.
चीनमध्ये गेल्या पन्नास वर्षांत हवामान संशोधनासाठी पंचवार्षिक योजना राबविण्यात येतात. १९९० ते २००० या दहा वर्षांत चीनमध्ये सतरा लाख हेक्टर जमिनीवरील पिकांचे गारपिटीमुळे नुकसान झाले होते. तर एकट्या बीजिंग शहरात ३१ मे २००५ला झालेल्या गारपिटीमुळे ८७८७ मोटारींचे नुकसान झाले होते. चीनच्या वायव्य प्रांतात अत्यंत तीव्र दुष्काळ असे तर दुसरीकडे आग्नेय चीनमध्ये पुराचे थैमान असे. तर अनेक शहरातील जनजीवन अत्यंत गडद धुक्यामुळे विस्कळित होई, या सर्व अस्मानी संकटाचा चीनच्या अर्थव्यवस्थेवर खूप परिणाम होत असे, म्हणूनच हवामानाच्या लहरीपणावर नियंत्रण मिळविणे चीनला अत्यंत गरजेचे झाले होते.
कृत्रिम पाऊस पाडण्यासाठी चीनमध्ये तोफा, रॉकेट लॉंचर आणि विमानाचा वापर करण्यात येतो. जमिनीवरूनच तोफा आणि रॉकेट लॉंचरच्या साह्याने ढगांचे रोपण (क्लाऊड सिडींग) केले जाते. याच पद्धतीने १९५२ जिल्ह्यांमध्ये तोफा आणि रॉकेट लॉंचरचा वापर करून पावसाचे प्रमाण वाढविले तर मोठी गारपीट रोखण्यात यश मिळविले. चीनमध्ये हवामानावरील अभ्यासासाठी २००५ या एका वर्षात ३७२१० शास्त्रज्ञ आणि कर्मचारी कार्यरत होते. त्याचबरोबर कृत्रिम पाऊस पाडण्यासाठी ३७ मानवरहित विमाने, ७०७१ तोफा (३७ इंची) आणि ४६८७ रॉकेट लॉंचरचा वापर करण्यात आला. चीनमधील मोठ्या धरणात सतत पाणीसाठा राहावा, त्याचबरोबर दुष्काळी वायव्य चीनमध्ये पावसाचे प्रमाण वाढविण्यासाठी सुमारे दहा लाख विशिष्ट पद्धतीने तयार केलेले तोफगोळे, ८४, ४१६ रॉकेट, सुमारे सातशे किलो सिल्व्हर आयोडाईडचा वापर करण्यात आला. हवामानाच्या अभ्यासासाठी चीनमध्ये २६८ डॉप्लर रडार कार्यरत आहेत.
३७ इंची तोफा आणि रॉकेट लॉंचरचा वापर करून जमिनीवरूनच ढगांचे रोपण करण्याचे तंत्रज्ञान चीनच्या शास्त्रज्ञांनी शोधले आहे. तोफेतून सोडलेला गोळा आकाशात सहा किलोमीटरपर्यंत मारा करू शकतो आणि ढगांची उंची ही तीन ते सात किलोमीटर अशी असते. तर रॉकेट लॉंचर आकाशात आठ किलोमीटर पर्यंत मारा करतो. तोफगोळ्यामध्ये एक ते चार ग्रॅम सिल्व्हर आयोडाईड असते (रॉकेटमध्ये आठ ग्रॅम) ते जेव्हा गोळ्याचा ढगांत स्फोट होतो, तेव्हा तेथे टाकले जाते. तेथे रासायनिक क्रिया होऊन काही वेळातच पाऊस पडण्यास सुरवात होते. चीनच्या उत्तर आणि वायव्य प्रांतात अधिक शंभर टीएमसी पाणी मिळविण्याची योजना आखली होती. दीड लाख चौरस किलोमीटर परिसरातील यलो नदीच्या ९८ हजार चौरस किलोमीटर पाणलोट क्षेत्रात हा पाऊस पाडण्यात आला.
सुजलेगावनजीकच्या आमच्या नावंदी गावात गेल्या वर्षी एके दुपारी डॉ.मराठे तंत्राने कृत्रिम पावसाचा प्रयोग केला. संध्याकाळी साडेसहाच्या सुमारास तीन किलोमीटर परिसरात पाऊस सुरू झाला, तो दीड तास पडला. सोयाबीन, कपाशीच्या पिकांना २० दिवसांपासून पावसाचा ताण पडला होता, कृत्रिम पावसामुळे या पिकांना जीवदान मिळाले.
- उमाकांत देशपांडे- नावंदीकर, सरपंच
जमिनीवर भट्टी पेटवून ढगांपर्यंत क्षार पाठवण्याची पद्धत जगात अनेक ठिकाणी वापरली जाते. या पद्धतीतील पदार्थांचा अभ्यास होणे आवश्यक आहे. या पद्धतीबाबत आजही अनेक प्रश्न अनुत्तरीत आहेत. "वरुण यंत्राची'ही उपयुक्तता तपासण्यासाठी तांत्रिक सहकार्य आवश्यक असल्यास आम्ही ते देऊ.
Sunday, May 9, 2010
Indian engineering service
Category
|
Section
|
Subject
|
Duration
|
Maximum Marks
|
I-CIVIL ENGINEERING
|
I-Objective Papers
|
General Ability Test (Part A: General English)(Part B: General Studies)
|
2 Hrs
|
200
|
Civil Engineering Paper I
|
2Hrs
|
200
| ||
Civil Engineering Paper II
|
2Hrs
|
200
| ||
II-Conventional Papers
|
Civil Engineering Paper I
|
3Hrs
|
200
| |
Civil Engineering Paper II
|
3Hrs
|
200
| ||
Total
|
1000
| |||
I-Mechanical ENGINEERING
|
I-Objective Papers
|
General Ability Test (Part A: General English)(Part B: General Studies)
|
2 Hrs
|
200
|
Mechanical Engineering Paper I
|
2Hrs
|
200
| ||
Mechanical Engineering Paper II
|
2Hrs
|
200
| ||
II-Conventional Papers
|
Mechanical Engineering Paper I
|
3Hrs
|
200
| |
Mechanical Engineering Paper II
|
3Hrs
|
200
| ||
Total
|
1000
| |||
III-Electrical ENGINEERING
|
I-Objective Papers
|
General Ability Test (Part A: General English)(Part B: General Studies)
|
2 Hrs
|
200
|
Electrical Engineering Paper I
|
2Hrs
|
200
| ||
Electrical Engineering Paper II
|
2Hrs
|
200
| ||
II-Conventional Papers
|
Electrical Engineering Paper I
|
3Hrs
|
200
| |
Electrical Engineering Paper II
|
3Hrs
|
200
| ||
Total
|
1000
| |||
IV-Electronics & Telecommunication ENGINEERING
|
I-Objective Papers
|
General Ability Test (Part A: General English)(Part B: General Studies)
|
2 Hrs
|
200
|
Electronics & Telecommunication Engineering Paper I
|
2Hrs
|
200
| ||
Electronics & Telecommunication Engineering Paper II
|
2Hrs
|
200
| ||
II-Conventional Papers
|
Electronics & Telecommunication Engineering Paper I
|
3Hrs
|
200
| |
Electronics & Telecommunication Engineering Paper II
|
3Hrs
|
200
| ||
Total
|
1000
|
1. Thermodynamics, Cycles and IC Engines, Basic concepts, Open and Closed systems. Heat and work. Zeroth, First and Second Law, Application to non-Flow and Flow processes. Entropy, Availability, Irreversibility and Tds relations. Claperyron and real gas equations, Properties of ideal gases and vapours. Standard vapour, Gas power and Refrigeration cycles. Two stage compressor. C-I and S.I. Engines. Pre-ignition, Detonation and Diesel-knock, Fuel injection and Carburation, Supercharging. Turbo-prop and Rocket engines, Engine Cooling, Emission & Control, Flue gas analysis, Measurement of Calorific values. Conventional and Nuclear fuels, Elements of Nuclear power production.
2. Heat Transfer and Refrigeration and Airconditioning. Modes of heat transfer. One dimensional steady and unsteady conduction. Composite slab and Equivalent Resistance. Heat dissipation from extended surfaces, Heat exchangers, Overall heat transfer coefficient, Empirical correlations for heat transfer in laminar and turbulent flows and for free and forced Convection, Thermal boundary layer over a flat plate. Fundamentals of diffusive and connective mass transfer, Black body and basic concepts in Radiation, Enclosure theory, Shape factor, Net work analysis. Heat pump and Refrigeration cycles and systems, Refrigerants. Condensers, Evaporates and Expansion devices, Psychrometry, Charts and application to air conditioning, Sensible heating and cooling, Effective temperature, comfort indices, Load calculations, Solar refrigeration, controls, Duct design.
3. Fluid Mechanics.
Properties and classification of fluids, Manometry, forces on immersed surfaces, Center of pressure, Buoyancy, Elements of stability of floating bodies. Kinematics and Dynamics.
Irrotational and incompressible. Inviscid flow. Velocity potential, Pressure field and Forces on immersed bodies. Bernoulli’s equation, Fully developed flow through pipes, Pressure drop calculations, Measurement of flow rate and Pressure drop. Elements of boundary layer theory, Integral approach, Laminar and tubulent flows, Separations. Flow over weirs and notches. Open channel flow, Hydraulic jump. Dimensionless numbers, Dimensional analysis, Similitude and modelling. One-dimensional isentropic flow, Normal shock wave, Flow through convergent - divergent ducts, Oblique shock-wave, Rayleigh and Fanno lines.
4. Fluid Machinery and Steam Generators.
Performance, Operation and control of hydraulic Pump and impulse and reaction Turbines, Specific speed, Classification. Energy transfer, Coupling, Power transmission, Steam generators Fire-tube and water-tube boilers. Flow of steam through Nozzles and Diffusers, Wetness and condensation. Various types of steam and gas Turbines, Velocity diagrams. Partial admission. Reciprocating, Centrifugal and axial flow Compressors, Multistage compression, role of Mach Number, Reheat, Regeneration, Efficiency, Governance.
MECHANICAL ENGINEERING PAPER – II
(For both objective and conventional type papers)
5. THEORY OF MACHINES:
Kinematic and dynamic analysis of planer mechanisms. Cams. Gears and gear trains. Flywheels. Governors. Balancing of rigid rotors and field balancing. Balancing of single and multicylinder engines, Linear vibration analysis of mechanical systems. Critical speeds and whirling of shafts Automatic controls.
6. MACHINE DESIGN :
Design of Joints : cotters, keys, splines, welded joints, threaded fasteners, joints formed by interference fits. Design of friction drives : couplings and clutches, belt and chain drives, power screws.
Design of Power transmission systems : gears and gear drives shaft and axle, wire ropes.
Design of bearings : hydrodynamics bearings and rolling element bearings.
7. STRENGTH OF MATERIALS
Stress and strain in two dimensions, Principal stresses and strains, Mohr’s construction, linear elastic materials, isotropy and anisotropy, stress-strain relations, uniaxial loading, thermal stresses. Beams : Bending moment and shear force diagram, bending stresses and deflection of beams. Shear stress distribution. Torsion of shafts, helical springs. Combined stresses, thick-and thin-walled pressure vessels. Struts and columns. Strain energy concepts and theories of failure.
8. ENGINEERING MATERIALS :
Basic concepts on structure of solids. Crystalline maferials. Detects in crystalline materials. Alloys and binary phase diagrams. Structure and properties of common engineering materials. Heat treatment of steels. Plastics, Ceramics and composite materials. Common applications of various materials.
9. PRODUCTION ENGINEERING :
Metal Forming : Basic Principles of forging, drawing and extrusion; High energy rate forming; Powder metallurgy.
Metal Casting : Die casting, investment casting, Shall Moulding, Centrifugal Casting, Gating & Riser design; melting furnaces.
Fabrication Processes : Principles of Gas, Arc, Shielded arc Welding; Advanced Welding Processes, Weldability: Metallurgy of Welding.
Metal Cutting : Turning, Methods of Screw Production, Drilling, Boring, Milling, Gear Manufacturing, Production of flat surfaces, Grinding & Finishing Processes. Computer Controlled Manufacturing Systems-CNC, DNC, FMS, Automation and Robotics.
Cutting Tools Materials, Tool Geometry, Mechanism of Tool Wear, Tool Life & Machinability; Measurement of cutting forces. Economics of Machining. Unconventional Machining Processes. Jigs and Fixtures. Fits and tolerances, Measurement of surface texture, Comparators Alignment tests and reconditioning of Machine Tools.
10. INDUSTRIAL ENGINEERING :
Production Planning and Control : Forecasting - Moving average, exponential smoothing, Operations, scheduling; assembly line balancing, Product development, Break-even analysis, Capacity planning, PERT and CPM.
Control Operations : Inventory control ABC analysis, EOQ model, Materials requirement planning. Job design, Job standards, Work measurement, Quality Management - Quality analysis and control. Operations Research : Linear Programming - Graphical and Simplex methods, Transportation and assignment models. Single server queueing model.
Value Engineering : Value analysis for cost/value.
11. ELEMENTS OF COMPUTATION :
Computer Organisation, Flow charting, Features of Common computer Languages - FORTRAN, d Base III, Lotus 1-2-3, C and elementary Programming.
SUBJECT
|
AUTHOR
|
Engineering Thermodynamics
|
PK Nag
|
IC Engine
|
ML Mathur and RP Sharma
|
Gas Turbine and Propulsive Systems
|
PR Khajuria & SP Dubey
|
Fluid Mechanics
|
Modi & Seth RK Bansal
|
Compressible Flow
|
SM Yahya
|
Heat and Mass Transfer
|
JP Hollman
RC Sachdeva |
Refrigeration and Air Conditioning
|
CP Arora
Domkundwar |
Fluid Machinery
|
Jagdish Lal
RK Bansal |
Theory of Machines
|
RS Khurmi
Malik & Ghosh |
Mechanical Vibration
|
Grover
|
Machine Design
|
Shigley
VB Bhandari |
Material Science
|
WD Callister
IP Singh |
Production Engineering
|
Kalpkjian Schmid
Amitabh Ghosh & AK Malik |
Industrial Engineering
|
O P Khanna
Buffa & Sarin |
Operations Research
|
Kanti Swarup
|
Strength of Materials
|
Gere & Timoshenko
BC unamia Sadhu Singh |