Escolar Documentos
Profissional Documentos
Cultura Documentos
C
O
NT
E
NT My Heartiest Greetings to all..!
We embarked and carried on...till the horizon and now beyond
With the satisfaction of what we have achieved and with the
NEWS 01
aspiration to go beyond it ;.we have propelled so far. The year
2010 which marks the First Anniversary of our Departmental
magazine TELEBLITZ..till today, it has been a voyage of
phenomenal learning experiences. It is a tremendous
opportunity for both celebration and look ahead towards a
ZZ
MOBILE ZONE bright future.We appreciate the interest that students have
Windows Phone 7 Series do not support Flash Access), which will be auctioned next month,
Newly launched reports PTI.
Microsoft's
Windows Phone 7 Nokia unveils N8, its new flagship phone
Series won't
support Adobe's Nokia, the cellphone maker unveiled its flagship
Flash multimedia N 8
We b g r a p h i c s smartphon
software, nor will e, after the
it allow users to last high-
perform simple end hit
cut-and-paste p h o n e
procedures on N 9 5 ,
applications and which was
messages. The unveiled in
company said that 2006. N8
it did not feel it will have
worth delaying the a d d e d
l a u n c h o f features
Windows Phone 7 to include features it doesn't like the new Symbian 3 software and it looks like
believe are deal breakers. The company is hoping the Motorola Devour and has a 3.5-inch OLED,
to get Windows Phone 7 devices into the market in capacitive touch screen, a 12 megapixel camera
time for the 2010 holiday season. with Carl Zeiss optics, Xenon flash and a large
According to the various reports, the company is sensor that rivals those found in compact digital
planning to add support for Flash and cut-and- cameras and HD-quality video with Dolby Digital
paste in later updates to the Windows Phone 7 OS. Plus surround
s o u n d b y
Motorola in plugging into
talks with top home theatre
telcos for system.
WiMax deals
F o r t h e
deployment of BlackBerry
W i M a x unveils new
technology that Bold and Pearl
has potential to smartphones
offer data BlackBerry
downloads at maker Research
speed twice as In Motion (RIM) Monday launched another
fast as 3G, smartphone - called BlackBerry Bold 9650 - to
Motorola is in add another device to its premier Bold brand .
talks with top The company also unveiled the new BlackBerry
cellular service Pearl 3G, its smallest smartphone yet.
providers. Whether at work or at play, the new BlackBerry
Telecom firms, including Bharti, Vodafone, Idea, Bold 9650 offers a truly impressive
RCom and the Tatas, along with other new players communications, multimedia and connectivity
have put in applications to acquire experience,'' he said at the launch of the latest
spectrum (air waves) for WiMax smartphones.
03 (known as Broadband Wireless
Motorola Backflip
Motorola introduced its latest Google Android smartphone to
the world, the Motorola Backflip. Scheduled for a global
release at the beginning of Q1 2010, Motorola CEO Sanjay Jha
said the device would be available in Europe, Asia, Latin
America, and North America but would not disclose any
carriers
Baby mosquito came back after its 1st flying. His dad asked him- How do
you feel? he replied .It was wonderful, everyone was clapping 4 me! 04
That' s Attitude
MEG
6TH HNA
GADGETRONICS SEM
So..thats it !! Finally that day has arrived which once I can't my child !They have to fight with the waves daily
believed will never ever come. But,it did and in the with courage and a belief that they'll touch back the
way far more splendid that what I dreamt of. The red shore.There is a plethora of magnificient pearls saved
carpet welcoming me with dazzling colourful lights,
flashy camera clicks on my face, maddening crowd in therir shells,waiting to be revealed.But do you
around…all make me feel like a princess walking really think that every time a diver dives he gets a
down the podium in a beautiful satin gown which any handful of them?Ceratainly not!But that doesn't stop
girl on earth will kill for. him from diving again and trying with new
…Hey, let me introduce the youngest winner ever of hopes.Then why did you stop?”She was quiet.He held
“National singing star hunt 2010”the most covetous her hand and said.”Losing a battle doesn't implies that
title of today's music world…and its me..Mahi you lost the war.Remember,you haven't lost until you
Sharma. fight.Failure is giving up.The losers of life are those
I have a story to share with you which might not be as who don't know how close they were to their
incredible or magical as a fairy tale but it does have a destination when the gave up.And I kno that my child
fairy tale ending and definitely its own spell hidden. has the courage to fight for her due share because she
Once upon a time there was young girl.A girl with knows that she can…I know that you can and you will
chocolates as her ultimate cuisine,who enjoyed do it..”……..And so she did it…I did it.My father's
shopping expeditions with her girl gang and gossiped every word imbued with a sense of belief propelled me
hours on phone about the neighbours next door.She through those tides to get me beyond horizon.My
was a usual teenager like any other but with an unusual passion added the magic which turned my story into a
dream.Every night before hitting the sheets and with fairy tale.Today infront of a million
every first ray on her face she promised to herself that spectators,holding this trophy in my hand I realized
one day she'll be THAT.She aspired to carve her dream that I require only one hand to hold it.Though I miss
out of her destiny but perhaps destiny had something my left hand even today but what I don't miss
else stored for her…. anymore is the real ME.The absence of my hand or the
The tragic scenes of the car accident she met with were presence of the burn marks on my half face though
hazy now in her memories but the agony that came reminds me of the unfortunate trafedy but could not
with it never faded away.With that what she lost in the stop me from living up to my dreams.What I learned is
accident,she lost the audacity to face the old world that theres is nothing like losing or winning..but all
with the new HER.No matter how hard she tried she what matthers is how you comprehend your life.I did
could not be happy.No matter how much the way exactly I wanted with a belief that “I can and
inconspicuous she wanted to be people's I will”
disdain,cynicism and sympathetic look chased
her.Either ways she felt obnoxious and her dream
seemed just a far fetched desire now.But even
today,she remembers that very evening walk on the
beach with her father.That was the first time she came
Jokes:-
out of her dark room after the accident but the open Sardar went to bank for
ambience felt more suffocating.The waves at the account opening. He took one
horizon always inculcated in her the passion to go form & went to Delhi for filling
beyond it but today they were just the threatening up the form.
tides.The breeze no longer tickled her and the vista of
the melting sun in the sea could not make her dimpled
Do u know why?Because in
smile to float on her face.It was then that her father the form he saw the
spoke out,finally breaking the silence.He showed her
the boats tossing over the waves and
sentence
asked,”Honey,have you ever wondered that how these 'WRITE IN CAPITAL'
boats would manage to sail across the sea without 06
risking to step into the bizarre waves?”Befor her mind
could act to answer she was answered back.”They
NANO TECHNOLOGY MA
YYA
6TH SUNIL
GREEN TECHNOLOGY
SEM
THE COVER STORY
Many times we hear the word named Nanotechnology and most of us are clueless about what it is. So here we go with a
very simple and precise explanation of this latest and vastly spread topic.Nanotechnology deals with the study,
development and practical application of structures and devices at molecular scale (between 1 and 100 nanometres, one
nanometre is equivalent to 1 in 10-9 meters). "Nano" is a Greek prefix, which signifies a "billionth" (one billionth of a
meter is the unit of measure in the field of nanotechnology). An atom is smaller than a nanometre, but a molecule can be
larger. The first use of the concepts in 'nano-technology' was in "There's Plenty of Room at the Bottom," a talk given by
physicist Richard Feynman. Feynman described a process by which the ability to manipulate individual atoms and
molecules might be developed, using one set of precise tools to build and operate another proportionally smaller set, so
on down to the needed scale. In the course of this, he noted, scaling issues would arise from the changing magnitude of
various physical phenomena: gravity would become less important, surface tension and Vander Waals attraction would
become more important, etc. This basic idea appears plausible, and exponential assembly enhances it with parallelism
to produce a useful quantity of end products.
The term "nanotechnology" was first defined by Norio Taniguchi of the Tokyo Science University in 1974.
Nanotechnology is an emerging branch with vast and diverse area of application. It has wide range of applications such
as nanosensors, carbon nanotubes, micro-electromechanical systems, chemical sensors, nanorobotics etc.
APPLICATIONS
Energy
The most advanced nanotechnology projects related to energy are: storage, conversion, manufacturing improvements
by reducing materials and process rates, energy saving (by better thermal insulation for example), and enhanced
renewable energy sources
Reduction of energy consumption
Nanotechnological approaches like light-emitting diodes (LEDs) or quantum caged atoms (QCAs) could lead to a
strong reduction of energy consumption for illumination
Recycling of batteries
The use of batteries with higher energy content or the use of rechargeable batteries or supercapacitors with higher rate of
recharging using nanomaterials could be helpful for the battery disposal problem.
Information and communication
Current high-technology production processes are based on traditional top down strategies, where nanotechnology has
already been introduced silently. The critical length scale of integrated circuits is already at the nanoscale (50 nm and
below) regarding the gate length of transistors in CPUs or DRAM devices
Memory storage
Nantero which has developed a carbon nanotube based crossbar memory called Nano-RAM and Hewlett-Packard
which has proposed the use of memristor material as a future replacement of Flash memory
Displays
The production of displays with low energy consumption could be accomplished using carbon nanotubes (CNT).
Carbon nanotubes are electrically conductive and due to their small diameter of several nanometers
Quantum computers
Entirely new approaches for computing exploit the laws of quantum mechanics for novel quantum computers, which
enable the use of fast quantum algorithms.
Aerospace
Nanotechnology would help to reduce the size of equipment and thereby decrease fuel-consumption required to get it
airborne
Nano-foods
New consumer products Emerging Nanotechnologies (PEN), based on an inventory it has drawn up of 609 known or
claimed nano-products.
We are bound to see many nanotechnological applications within the electronic industry in the near
07 future. These will undoubtedly increase the quality of life of our society.
FUTURE ASPECTS OF RISH
I
4TH RAJ
SEM
NANOTECHNOLOGY
Nanorobot manufacturing will undoubtedly require Nanorobot Control Design (NCD) simulator is
development of breakthrough technologies in developed and used for the 3D investigation of stenos
fabrication, computation, sensing and manipulation. left anterior descending (LAD) coronary artery, in
Researching the requirements, anticipated behavior which we optimize the activating trigger for medical
and performance and design of control strategies will nanorobots. This trigger will turn the nanomachine
require simulation tools which will both model “on”, switching it from “seek mode” to “repair mode”.
foreseeable nanoscale technologies and in turn It may also cause other close nanorobots switch to a
influence the development of the same technologies. “higher awareness mode”. Having the previous
The simulation approach consists of adopting a multi- knowledge about the general localization of the steno
scale view of the scenario, which is comprised of: sis (in large, small or micro vessels), the appropriate
macro scale physical morphology and physiological nanorobot type can be injected, which is pre-
flow patterns and on the nanoscale, the nanorobot fluid programmed to be activated only at the pre-specified
dynamics, orientation and drive mechanisms, sensing target region.The NCD simulator consists of several
and control. Two simulations are used to achieve the modules that simulate the physical conditions, run the
most faithful modeling of nanorobots behavior in a real nanorobot control programs determining their actions,
physical context. These simulations (NCD for the and provide a visual display of the environment in 3D,
micro level, CFD for the macro level) are described in and record the history of nanorobot behaviours for later
the next paragraphs, starting with assumptions made analysis. The NCD simulation enables the nanorobot
for the nanorobot simulation. control programs to be tested using various strategies,
The nanorobot design is comprised of components e.g. based on neural network control, motion with low
such as molecular sorting rotors and a robot arm energy consumption, or any different predefined
(telescoping manipulator), derived from biological motion strategy. The virtual environment in the NCD
models. The nanorobot exterior shape consists of a simulator is inhabited by plasma, red blood cells,
diamonded material, to which may be attached an nanorobots, different molecules whose concentrations
artificial glycocalyx surface that minimizes fibrinogen are being monitored, and the blood vessel.
(and other blood proteins) adsorption and bioactivity, The parameters generated from the CFD simulation,
ensuring sufficient biocompatibility to avoid immune namely velocities, temperature, signalling function
system attack. These sensors also detect obstacles values, pro-inflammatory cytokines and soluble
which might require a new trajectory planning. Some adhesion molecules concentrations, are transferred to
concepts provided from underwater robotics were the NCD simulator to serve as the nanorobots operating
applied for nanorobot locomotion. The nanorobot environment. As the nanorobot should perform a pre-
kinematics can be predicted using state equations, defined task in a specific target area, the trigger must be
positional constraints, inverse kinematics and activated when the nanorobot is as close as possible to
dynamics, while some individual directional the target. Taking advantage of the fact that the
component performance can be simulated using nanorobots flow mostly in a near-wall region, where
control system models of transient and steady-state the blood flow velocity profile dictates significantly
response. Plane surfaces and bi-directional propellers result in lower demand of energy. Optimization of
provide navigation, while two simultaneously counter- control algorithms and activating triggers is the key for
rotating screw drives provide the propulsion, enabling rapid behaviour response in minimal energy cost.
motion with six degrees of freedom. The nanorobots Thus, approaches for trigger strategies include
may use a macro transponder navigational system for analyzing time-gradients of the former mentioned
their positioning, which will allow high positional nanorobot measurable parameters, as they change
accuracy, independent of nanorobot orientation. Such a during nanorobot locomotion, and particularly in the
system could involve externally generated signals from neighbourhood of a lesion. By running the nanorobots
beacons placed at fixed positions outside the skin. The control programs optimal trigger values can be
nanorobots satisfy their energy requirements via the determined.
chemical reaction of oxygen and glucose, both of 10
which are plentiful in the human body.
an what
SALIL You are more th
4TH SEM you can do
It was always a busy day for Jack, all the call traffic really wore him down to the core. But today was different; he was more
scared than worn out. The recent recession in the market had caused more of a turbulent situation in the company and a direct
result was the fall in call traffic, which clearly spelt trouble. He wondered if the news was really true, was the company going to
reduce its liabilities by cutting on jobs. He wondered how many days he would last, then just a week later his worst fears had
been realized, he had been rendered unemployed along with a few hundred people. He could not imagine life thereon, he was
in shock. He had some money in the share market and that kept the family going. He tried at many places but in vain. He grew
more and more frustrated by the day on not being able to find a job.
Then came a day when he gave up all hope and just prayed for the nightmare to be over but it was not a dream, it was the
truth…
The money he had in the shares proved quite insufficient to keep up the family expenses and he wondered when God would
help him pull through. Then one day his little girl asked him for an ice cream, but he had no money. He could not imagine that he
had let such a situation arise in his life; it was as if the last nail in his coffin, he decided to fight against fate and get his dignity
back. That night he lay in his bed, wide awake, thinking of ways to get out of this mess. He went back in his head and saw himself
as a good student in college and a very good programmer indeed.
One who had been suspended twice for hacking into the mainframe computer of his college...!
There it was, he realized he had lost his focus and there he was back to his books. A week later he came up with a brilliant
program to prevent the hacking menace. He then went to one o the leading software companies and marketed his product. He
received an over whelming response and overnight he was the software security advisor of a leading firm.
He then realized that God only helps those who help themselves. He bought a new bungalow very soon, bought a car and lived
happily afterwards.
KAVI frog”
tiny
4TH SEM “A story of a
Once upon a time there was a bunch of tiny frogs, who arranged a running competition. The goal was to
reach the top of a very high tower. A big crowd had gathered around the tower to see the race and cheer on
the contestants.
The race began. Honestly, no one in the crowd really believed that the tiny frogs would reach the top of the
tower.
You could hear statements such as: “Oh, WAY too difficult!!” “They will NEVER make it to the top. “ “Not
a chance that they will succeed. The tower is too high!”
The tiny frog s began collapsing one by one, except for those, who in a fresh tempo, were climbing higher
and higher. The crowd continued to yell, “It is too difficult!!! No one will make it!” More tiny frogs got
tired and gave up. But ONE continued higher and higher and higher. This one wouldn't give up!
At the end everyone else had given up climbing the tower. Except for the one tiny frog who, after a big
effort, was the only one who reached the top! Then all of the other tiny frogs naturally wanted to know how
this one frog managed to do it? A contestant asked the tiny frog how he had found the strength to succeed
and reach the goal? It turned out that the winner was DEAF!!!!
The wisdom of this story is:
Never listen to other people's tendencies to be negative or pessimistic, because they take your most
wonderful dreams and wishes away from you—the ones you have in your heart!
Always think of the power words have because everything you hear, speak and read will influence your
actions!
Therefore: ALWAYS be POSITIVE! And above all, Be DEAF when people tell YOU that you cannot
fulfill your dreams! Always have a 'Can-Do' attitude!
11
RAVI ON E E T IQU ETTE T IPS
6TH SEM TELEPH
Many things have changed over the years, especially in the evolving world of business. One thing has not changed
though, and that is the need for proper telephone etiquette in the work place. Along with company downsizings
and layoffs has come a necessity for companies to merge jobs together in order to eliminate human resources and
save money. While that may be necessary, it is not necessary that the common element of etiquette, especially
telephone etiquette, be left to suffer. Since customers are the ones who infuse the profits into a business, they do
not appreciate being treated with rudeness in their dealings with a company. This includes any business that is
conducted on the telephone.
Proper telephone technique involves some basic common sense in which everyone who works for a company
should use. Here are some basic tips:
Incoming Calls: Tip 1- All incoming calls should be answered in a timely manner.
Tip 2- Business telephones should always be answered with a phrase like, "Good morning, ABC Company, Carol
speaking, may I help you?" In a busy office setting that fields hundreds of calls each day, this particular phrase may
be too much to say. If so, it can be shortened to a phrase that is less wordy. But the name of the company needs to
be stated as soon as the phone is answered along with the person's name who answered the phone. This lets the
caller know that they have indeed reached the right business, and lets them know with whom they are speaking.
Tip 3- Never put a caller on hold, but if you have to, be sure to check back with them every minute or so and ask if
they would like to continue to hold. This lets them know that they have not been forgotten, and that you are
attending to their call.
Tip 4- Speak clearly and slowly when you answer a business telephone. Do not slur or mumble your words. Speak
with confidence so the person on the other end has the feeling that you know what you are doing.
Tip 5- Never be rude to a caller, no matter how nasty they are. Always remember to handle yourself in a
professional, business-like manner. This includes handling the situation in a calm, cool manner.
Outgoing Calls: Tip 1- Same as Tip 4 above--Speak clearly and slowly when you make a business call. Time may be
money, but if the other party cannot understand what you are saying, then you might as well have saved your
breath and not made the call at all.
Tip 2- Same as Tip 5 above--All customers expect to work with a professional organization. One sign of a
professional organization is how they are treated by the people who work there.
Tip 3- When calling another business, it is proper etiquette to give your name and the company's name you work
for to whomever answers the telephone. Do not make them guess who it is or make them pry it out of you.
Tip 4- If you get the wrong number, apologize to the person who answers the phone--do not just hang up. This is
especially important nowadays when people have Caller ID on their phone lines. All they have to do is to check
their device to find out who just rudely hung up on them.
Tip 5- When leaving a phone message
Basic Good Manners, Telephone Tips:
* Let the telephone ring a reasonable length of time. It is frustrating to just get to the telephone and hear a
dial tone.
* If you dial a number that is wrong, apologize, promptly and hang-up.
* Calling a business at or very near closing time is to say the least un-thoughtful. When it is time to go
home, after a long day, do not delay them.
* State your name when placing a call. The game of "guess who this is" may not play very well to a busy
friend.
* When speaking to anyone who is working and time is of the essence, make your call informative and
short. 12
ABH
ISHE
4TH K KEDI
INTRODUCTION TO VLSI TECHNOLOGY SEM A
As the name implies, VLSI systems involve the integration of various component systems. The VLSI technology
involves 10s of millions of CMOS transistors in microns on a silicon wafer of a few cm dimensions. The materials that
belong to 3rd and 5th group of periodic table find their prominent place in the VLSI chips are GaP, GaSB, InAs, and InP.
The other wafers used are quartz wafer, Pyrex wafer, apires silicon nitride wafers, germanium wafers, silicon GaAS,
fused silica and float zone silica. The technologies associated with VLSI systems, includes VLSI processors,
semiconductor technology, micromachining, microelectronics packaging, compound semiconductor digital IC's, and
multichip modules.
Different materials are replacing the conventional silicon wafers and aluminium metal interconnects to achieve more
density per chip to cope up with the miniaturization in the technology and it is believed that there might be a dead end to
the CMOS technology in future if we try to keep on going with this trend. Here we bring out the nanotechnology in
silicon world which invariably means shrinking geometry of CMOS devices to nano scale. Silicon wafers have been
replaced with the silicon-on-insulator and low k-dielectric cost of chip masks and next generation plants totally
replacing today's foundries and copper interconnects leading to the production of CMOS process with effective line
widths of less than 120nm. In spite of advances in this industry, a threat to economic issues holds as the continuing
scaling of silicon transistors brings about a new, exciting era of nano-scale technology to silicon foundries.
Chemically assembled electronic nanotechnology (CAEN) devices, a form of electronic nanotechnology (N) are a
promising alternative to CMOS-based devices particularly CMOS based reconfigurable devices. A few companies like
IBM and INTEL have launched a few chips using 65nm technology. At this stage, many of the device characteristics are
no longer a straightforward extension of past generation. Scaling is beyond simple shrinking of 3D physical dimensions
of devices and it involves the changing or straining of the
atomic spacing to alter the silicon electronic properties for
better performance. The research .the somewhat halts here to
look forward to a new world of nanotechnology to replace
silicon and metallic interconnects with carbon nano devices and
carbon nanotubes.
Stochastically assembled nanoscale architectures have the
potential to achieve device densities 100 times greater than
today's CMOS. A key challenge facing nanotechnologies is
controlling parallel sets of nanowires, such as those in
crossbars, using a moderate number mesoscale wires. There are
three ways to do this.
1.The first is based on NW (nanowires) differentiation during
manufacture.
2.The second makes random connection between NW's and
mesoscale wires.
3.The third, a mask-based approach, interposes high-k between dielectric region between NW's and mesoscale wires. It
shows that when compared to other two schemes, a large number of mesoscale wires are necessary for its realization. It
is also required to study on the carrier transport theory to understand the electron conduction behaviour in transistors
smaller than 20-nm.
In nano-scale transistors, the number of atoms in the active region is finite; the nature of random distribution of atoms in
the active region causes fluctuation in device property and detoriates the design margins for integration. The success of
producing such nano-scale devices in an ever increasing integration level on a bigger size wafer and at lower defect
density is the quiet side of the nano-electronics evolution. A seemly antiquated, 40-years old, silicon technology is now
threatened. This may be replaced by chemically engineered nano devices with all together different concepts leading to
dramatic size reduction. This further may lead to reinvestment in nano-foundries to the
challenges laid. The article reveals that present scaling of the CMOS technology to nano dimensions
will have to limit at some point and make further scaling may be impossible while retaining all the
13 electrical characteristics of the device.
ABH
ISHE
4TH K KEDI
AUDIO SPOTLIGHTING SEM A
Directional audio is a revolutionary new concept in frequency of 20Hz to 20 KHz. Therefore the audible
sound reproduction, that allows focusing of sound sound is mixture of signals with varying wavelength
anywhere it is needed and no place else. Imagine you between 2cm to 17m. Except for very low wavelength,
could point the same way you can point light with, say, just about the entire audible spectrum tends to spread
a flash light. Suppose speakers existed that could send out at 360 degrees. A large loudspeaker will focus
focused beams of sound where ever they pointed. You sound over a smaller area. If the source loudspeaker
could speak in to a megaphone and send the sound to a can be made several times bigger than the wavelength
single person. Or you could have five types of music of the sound transmitted, then a finely focused beam
playing on the same dance floor. You wouldn't have to can be created. The following are a brief list of
worry about turning the music down at night to keep the applications made possible by audio spotlighting:-
neighbors happy, so long as you didn't point it in their personalized messaging, discreet announcements,
direction. Thanks to recent advancement in audio audio/video conferencing, targeted advertising, home
engineering, the kinds of products may theater, realistic movies, paging
soon be a reality. Researchers have Audio spotlighting is a system, ventriloquist systems, ship to
discovered a way to project acoustic ship communication, shipboard
waves as thin beam of sound: step into
technology that creates announcement, military applications
the beam and projected sound fills focused beams of sound etc.
your ears. similar to the light beam Directional audio or the hypersonic
It uses a combination of non-linear coming out of a flashlight. sound technology is simply the most
acoustics and some complex revolutionary sound reproduction
mathematics in order to focus sound s y s t e m o f t h i s c e n t u r y. T h e
into a coherent and highly directional beam. The opportunities for applying this characteristic to the
audible portion of sound tends to spread out in all reproduction of sound are limitless. We will be able to
directions from the point of origin. The beam angle of reproduce sound just the way we experience it in the
audible sound is very wide, just about 360 degrees. real world. Over the next few years, the way we
This means the sound that you hear will be propagated experience sound is going to change dramatically. It is
through air equally, a true technological paradigm shift. These are just a
in all directions, which is why you don't need to be right few of the virtually limitless number of potential
in front of a radio to hear the music. In order to focus applications. Within the next 3to 5 years sound beam
sound into a narrow beam the requirement is: a low technology should begin to find its way many deferent
beam angle and large aperture size. The smaller the areas of our everyday lives. We should also begin those
wavelength, the lesser the beam angle and hence more new many applications in number of different areas.
focused the sound. The human hearing ranges from a
Performance and productivity has been increasing their level of interconnect hierarchy at the global
continuously over more than four decades due to the (package), intermediate (bond pad) and local
enormous advances in lithography and device (transistor) level. While schemes at the global level
technology. However, today it has become have been in production for some time using traditional
questionable if this so-called “More Moore”
methods of interconnect such as wire bond and flip
development alone will overcome the predicted
performance and cost problems of future ICs. Moore's chip, the next-generation of 3D integration proposes to
law will encounter the “red brick wall” somewhere in incorporate through-silicon via (TSV) technology as
the 32 - 22 nm nodes. On one hand there are simply cost the primary method ofinterconnect.
concerns e.g. related to extreme UV lithography. On the 3D chip integration research at IBM
other hand, one of the fundamental issues of advanced IBM's Zurich research team and its partners are talking
devices is RC delay caused by the on-chip wiring. This about progress on 3D integration as a path for
objective leads to a major challenge for future IC
continuing the Moore's law growth of transistors. The
fabrication requiring e.g. implementation of ultra low-k
dielectrics for multilevel metallization. argument is that they won't be able to stay on the
3D integration is a key solution to the predicted Moore's law density curve for another 15 years by
performance problems of future ICs as well as it offers virtue of diminishing feature size alone thus the
extreme miniaturization and cost-effective fabrication research in new packaging and cooling technologies.
of More than Moore products (e.g. e- IBM, École Polytechnique Fédérale de Lausanne
CUBES®).Through Silicon Via (TSV) technologies (EPFL) and the Swiss Federal Institute of Technology
enable high interconnect performance at relatively high Zurich (ETH) signed a four-year collaborative project
fabrication cost compared to 3D packaging. called CMOSAIC to understand how the latest chip
3D Integration is a promising technology for extending cooling techniques can support a 3D chip architecture.
Moore's momentum in the next decennium, offering Unlike current processors, the CMOSAIC project
higher transistor density, faster interconnects, considers a 3D stack-architecture of multiple cores
heterogeneous technology integration, and potentially with a interconnect density from 100 to 10,000
lower cost and time-to-market. But before 3D chips can connections per millimeter square. Researchers believe
be produced, new capabilities are needed: process that these tiny connections and the use of hair-thin,
technology, architectures, design methods and tools, liquid cooling microchannels measuring only 50
and manufacturing test solutions. microns in diameter between the active chips are the
WHAT IS 3 D INTEGRATION:- missing links to achieving high-performance
3D integration is generally defined as fabrication of computing with future 3D chip stacks.
stacked and vertically interconnected device layers.
The large spectrum of 3D integration technologies can
be reasonably classified mainly in three categories:
1. Stacking of packages (or substrates)
2. Die stacking (without TSVs)
3. TSV technology
In more than two decades, great research efforts were
made in the area of 3D integration, starting in the
1980´s by e.g. IBM, NEC, Siemens and Fraunhofer.
Since the early 90's Fraunhofer Munich has worked on
stacking technologies using vertical inter-chip vias -
ICVs (today´s common term: through silicon vias -
TSVs), focusing on 3D integration concepts which take
advantage of wafer level processing to achieve the
highest miniaturization degree, excellent
electrical performance and enable high
15 volume cost-effective fabrication.
3D integration schemes can be classified by
SON
AM
4TH SHUKL
COMPARISION BETWEEN PROCESSORS SEM A
? Alexander Graham Bell originally wanted the greeting for the telephone to be "Ahoy"
but Thomas Edison voted for "Hello," a word he coined in 1877.
? The original name of the telephone was the harmonic telegraph.
? It took a year to connect the first line from New York to San Francisco. 14,000 miles of
copper wire and 130,000 telephone poles were needed to make the link.
? The annual revenue for the telephone industry is $350 billion, almost 10 times that of
television and 23 times the revenue of radio.
? Cellular phone service has accounted for a third of the telephone industry's growth for
the last four years.
? Globally, about $2 trillion is spent annually on telecommunications products and services.
? One million threads of fiber optic cable can fit in a tube of 1/2"diameter.
? The telephone is the most used piece of communication equipment in the world.
? The busiest organization in the world is the Pentagon, which has 34,500 lines and gets 1
million calls a day. It received over 1.5 million phone calls on The 50th Anniversary of D-
Day.
? Sweden is the country with the greatest penetration of telephones. It has 229 phones
for every 1,000 people.
? The longest phone cable is a submarine cable called FLAG (Fiber-Optic Link Around the
Globe). It spans 16,800 miles from Japan to the United Kingdom and can carry 600,000
calls at a time.
Metal detectors the difference between different types of metals and the
A metal detector is a specially designed device that can depth at which they are located.
detect metals lying deep in the ground or water. Since its
invention, the device has found a wide range of Pulse Induction (PI) Technology
applications in the human society. Most commonly, they Pulse induction technology can use a single coil, which can
are used for security screening and for locating mines. be used both as the transmitter and receiver. Sometimes, it
However, occasionally you can find many people using can also use two to three coils. The metal detectors
electronic metal detectors for treasure hunting and coin working on this technology send short bursts or pulses of
shooting as well. current through the coils, each of which generate a short
magnetic field. At the end of each pulse, the magnetic field
Working generated reverses its polarity suddenly and then collapses.
This creates electrical spikes, that can last for a very brief
Metal detectors generally work on the basic principle that, period. As the spikes and the pulse's magnetic field
electric current when passes through a coil produces a collapse, another current, known as reflected pulse runs
magnetic field around it. Metal detectors usually consist of through the coil. The reflected pulse lasts for an extremely
an oscillator, which produces alternating current. When short period.
alternating electric current passes through the transmit coil But, when the metal detector encounters a metallic or
present in the metal detector, a magnetic field is produced conductive object, the reflective pulse lasts for a longer
around it. Now, if an electrically conductive metallic object time period. This is because, the pulse sent by the metal
is present near the coil, then eddy currents will be detector produces an opposite magnetic field in the object
generated in the object, which will produce another and this magnetic field causes the reflective pulse to last
magnetic field around it. Metal detectors contain another longer. The metal detectors contain a sampling circuit that
coil in its loop, called receiver coil, which can detect the closely monitors the spikes and the reflected pulses and
changes in the magnetic field, due to the presence of the sends these signals to the device, called integrator. The
metal or the metallic object. The modern day metal integrator reads, amplifies and then converts the signals to
detectors usually use one of the three technologies, which direct current. The audio circuit connected with the direct
are known as VLF or very low frequency, PI or pulse current's voltage produces a tone, which indicates the
induction and BFO or beat-frequency oscillation. presence of a metal or metallic object.
Very Low Frequency (VLF) Technology Beat Frequency Oscillator (BFO) Technology
VLF is the most commonly used technology in metal Like very low frequency technology, beat frequency
detectors. Metal detectors working on this technology oscillator uses two coils of wire. One coil is present in the
contain two sets of coil, transmitter coil and receiver coil. control box of the device, while the other is located in the
Transmitter coil is the coil along which electricity is sent to search head. The coil which is in the control box is usually
create a magnetic field, that constantly pushes down into smaller than the one present in the search head. Both the
the ground and then pulls back. The magnetic field coils however, remain connected to the oscillators that
generated in the metal detectors interact with any metallic sends out thousands of electric pulses in a single second.
or conductive object that comes in its way. If any such Radio waves are created when pulses pass through each
object is encountered, then eddy currents and subsequently coil of wire, which are then collected by a receiver located
a magnetic field is created around the conductive object. within the control box.
The receiver then creates audible tones on the basis of the
The receiver coil on the other hand is shielded from any frequency of the radio waves. But, when the metal detector
influence of the magnetic filed produced by the transmitter pass over metals or metallic objects, the electric current
coil, so that it is affected only by the magnetic field of the running through the coil of the search head creates a
conductive or metallic object. Electric current runs through magnetic field, which in turn creates another magnetic
this receiver coil, whenever the metal detector passes over filed around the metallic objects. The magnetic field
a conductive object that is producing a weak magnetic created around the metallic objects interferes with the radio
field. The coil in turn amplifies and sends the frequency of waves created by the coil in the search head. This brings
the current (which is same with the frequency of the about a change in the tones produced by the receiver and
magnetic field generated by the metal) to the control box the change helps to detect the targeted object.
for analysis. In this way, metal detectors working on a very
low frequency technology can detect metals and determine
COMPUTING
The idea of a computational device based on quantum the efficient retrieval of this information.
mechanics was explored already in the 1970s by
physicists and computer scientists. As early as 1969 The recent excitement in this lively and speculative
Steven Wiesner suggested quantum information domain of research was triggered by Peter Shor (1994)
processing as a possible way to better accomplish who showed how a quantum algorithm could
cryptologic tasks. But the first four published papers on exponentially “speed-up” classical computation and
quantum information (Wiesner published his only in factor large numbers into primes much more rapidly (at
1983) belong to Alexander Holevo (1973), R.P. least in terms of the number of computational steps
Poplavskii (1975), Roman Ingarden (1976) and Yuri involved) than any known classical algorithm. Shor's
Manin (1980). Better known are contributions made in algorithm was soon followed by several other
the early 1980s by Charles H. Bennett of the IBM algorithms that aimed to solve combinatorial and
Thomas J. Watson Research Center, Paul A. Benioff of algebraic problems, and in the last few years theoretical
Argonne National Laboratory in Illinois, David study of quantum systems serving as computational
Deutsch of the University of Oxford, and the late devices has achieved tremendous progress. Common
Richard P. Feynman of the California Institute of belief has it that the implementation of Shor's algorithm
Technology. The idea emerged when scientists were on a large scale quantum computer would have
investigating the fundamental physical limits of devastating consequences for current cryptography
computation. If technology continued to abide by protocols which rely on the premise that all known
“Moore's Law” (the observation made in 1965 by classical worst-case algorithms for factoring take time
Gordon Moore, co-founder of Intel, that the number of exponential in the length of their input (see, e.g.,
transistors per square inch on integrated circuits had Preskill 2005). Consequently, experimentalists around
doubled every 18 months since the integrated circuit the world are engaged in tremendous attempts to tackle
was invented), then the continually shrinking size of the technological difficulties that await the realization
circuitry packed onto silicon chips would eventually of such a large scale quantum computer. But regardless
reach a point where individual elements would be no whether these technological problems can be overcome
larger than a few atoms. But since the physical laws that (Unruh 1995, Ekert and Jozsa 1996, Haroche and
govern the behaviour and properties of the computative Raimond 1996); it is noteworthy that no proof exists yet
circuit at the atomic scale are inherently quantum for the general superiority of quantum computers over
mechanical in nature, not classical, the natural question their classical counterparts.
arose whether a new kind of computer could be devised
based on the principles of quantum physics. The philosophical interest in quantum computing is
threefold: First, from a social-historical perspective,
Feynman was among the first to attempt to provide an quantum computing is a domain where
answer to this question by producing an abstract model experimentalists find themselves ahead of their fellow
in 1982 that showed how a quantum system could be theorists. Indeed, quantum mysteries such as
used to do computations. He also explained how such a entanglement and nonlocality were historically
machine would be able to act as a simulator for considered a philosophical quibble, until physicists
quantum physics. Feynman also conjectured that any discovered that these mysteries might be harnessed to
classical computer that will be harnessed for this task devise new efficient algorithms. But while the
will do so only inefficiently, incurring an exponential technology for isolating 5 or even 7 qubits (the basic
slowdown in computation time. In 1985 David Deutsch unit of information in the quantum computer) is now
proposed the first universal quantum Turing machine within reach (Schrader et al. 2004, Knill et al. 2000),
and paved the way to the quantum circuit model. The only a handful of quantum algorithms exist, and the
young and thriving domain also attracted philosophers' question whether these can solve classically intractable
attention. In 1983 David Albert showed how a quantum computational problems is still open. Next, from a
mechanical automaton behaves remarkably differently more philosophical perspective, advances in quantum
from a classical automaton, and in 1990 Itamar computing may yield foundational benefits. It may turn
Pitowsky raised the question whether the superposition out that the technological capabilities that allow us to
principle will allow quantum computers to solve NP isolate quantum systems by shielding them from the
(non-deterministic polynomials)-complete effects of decoherence for a period of time long enough
problems. He also stressed that although one to manipulate them will also allow us to make progress
could in principle 'squeeze' information of in some fundamental problems in the foundations of
21 exponential complexity into polynomially quantum theory itself. Indeed, the development and the
13 many quantum states, the real problem lay in implementation of efficient quantum algorithms may
18
Y
upta A REAL STOR
Pallavi das g
Sara was an only child, the apple of her daddy's could never become; she was completely in awe
eye. She was never refused anything. A little nag of her elder sister.
and she had her way through. Her father took care When the vacations ended, Sara went back to
that she never had a dearth of things that she school, without even a word or wave of her hand
wanted to possess. Every time she broke a toy, it for Kimi. After Sara left, Kimi cried for days and
was replaced even before she could shed a tear. refused to eat. This happened every time Sara
Sara lived this dream life for six years, when her came home. Such was the contrast of emotions.
younger sister Kimi was born. The attention Years passed, Sara finished her schooling and
seemed to have shifted to the little angel came back home to find Kimi bed ridden. ”Who
overnight. She was fair and plump and had cheeks cares,” she thought,”She has enough people
like apples. Everyone seemed to be engrossed around her.”
with her. Even daddy seemed to be carrying the She would sometimes venture into Kimi's room.
baby in his arms all the time, Sara was now too old Her eyes lit up whenever she saw her elder sister.
to be cradled. She missed her old days when Kimi seemed to have grown much weaker. Sara
everyone had just one name to chant 'Sara'. felt bad for her but could not bring herself to love
Slowly as the months progressed, all her toys Kimi as a sibling.
were handed down to Kimi. This made Sara even One night Kimi silently passed away in her
more jealous. As if her parents were not enough, sleep. The child was just twelve years old. Sara
this new baby now wanted to take away all her was called into the room and found her father
toys. Sara cried herself to sleep almost every holding Kimi's limp hand and crying. Beside her
night. The sight of Kimi angered her. The more pillow were a thick bundle of papers. Sara picked
her parents wanted her to love her sister, the more them up. Her eyes filled with tears as soon as she
she was filled with hatred. opened them. Those were pictures that Kimi had
However, as Kimi grew older, it was figured out drawn each of them was her's holding Kimi's
that she had speech impairment. She would not be hand.
able to express herself like normal people. She If only she had tried to understand her once, if
needed special attention. only she had given love a chance…..
Sara's father decided to send her to a boarding
school. Kimi needed special attention and Sara's
studies were getting neglected. She threw
tantrums, refused to eat. However when her father
refused to listen, she had to give in. Sara left home
with a heavy heart, never to forgive Kimi for what
she had done.
Life was difficult in the boarding school. Sara
had been a thoroughly spoilt child and was not
used to the discipline that was expected from
students. However, she was egoistic enough
never to complain. She often wondered what
things were like at home. Had Kimi not been
there, she would have enjoyed her parents'
undivided attention. She would never be able to
forgive Kimi all her life for having separated her
from home.
When Sara went home during the vacations,
Kimi was the happiest of all. She would for hours
and watch her elder sister draw, read, talk to her
friends and play while Sara barely acknowledged 22
her presence. To Kimi, Sara was someone she
13
SAU
M
8TH IT DEY
RIG IT UP SEM
This circuit saves both time and buzzer. The Schmitt-trigger connected to the clock input
electricity for students. It helps NAND gate (IC1) is configured (pin 10) of IC2 through diode
to prevent them from dozing off as an astable multivibrator to D3, further counting stops and
while studying, by sounding a generate clock for the timer relay RL1 energizes to deactivate
beep at a fixed time interval, say, (IC2). The time period can be all the appliances. This state
30 minutes. If the student is calculated as T=1.38×R×C. If changes only when IC1 is reset by
awake during the beep, he can R=R1+VR1=15 kilo-ohms and pressing switch S1. Assemble the
reset the circuit to beep in the C=C2=10 ìF, you'll get 'T' as circuit on a general purpose PCB
next 30 minutes. If the timer is 0.21 second. Timer IC CD4020 and enclose it in a suitable
not reset during this time, it (IC2) is a 14-stage ripple cabinet. Mount switch S1 and the
means the student is in deep counter. Around half an hour buzzer on the front panel and
sleep or not in the room, and the after the reset of IC1, transistors the relay at the back side of the
circuit switches off the light and T1, T2 and T3 drive the buzzer to box. Place the 12V battery in the
fan in the room, thus preventing sound an intermediate beep. If cabinet for powering the circuit.
the wastage of electricity. The IC2 is not reset through S1 at that In place of the battery, you can
circuit is built around Schmit time, around one minute later also use a 12V DC adaptor.
ttrigger NAND gate IC CD4093 the output of gate N4 goes high
(IC1), timer IC CD4020 (IC2), and transistor T4 conducts. As
transistors BC547, relay RL1 and the output of gate N4 is
Some facts:
1. What percent of 11 year olds in the US have cell phones…36%
2. Average pencil (non-mechanical) can draw a continuous line that is how long?…35 miles
3. How many times does the average user blink a minute? …7 times
4. How many ATM's in Antarctica…1
5. For every non pornographic website, there are 5 pornographic websites!!! (WOW)
6. How many hours worth of video is uploaded to Youtube every minute?..10 hrs.
23
13
GAU
6TH RAV
SEM
BEYOND BASIC
How startling it is to witness data transmission and communication without ports and wires . The technical prowess
which lets us manifest such miracles are namely wi-fi,Bluetooth ,infrared and so on and so forth. But again the vital
query, how does it work??
How Bluetooth Creates a Connection??
Bluetooth takes small-area networking to the next level by removing the need for user intervention and keeping
transmission power extremely low to save battery power. The big draws of Bluetooth are that it is wireless,
inexpensive and automatic.Picture this: You're on your Bluetooth-enabled cell phone, standing outside the door to
your house. You tell the person on the other end of the line to call you back in five minutes so you can get in the house
and put your stuff away. As soon as you walk in the house, the map you received on your cell phone from your car's
Bluetooth-enabled GPS system is automatically sent to your Bluetooth-enabled computer, because your cell phone
picked up a Bluetooth signal from your PC and automatically sent the data you designated for transfer. Five minutes
later, when your friend calls you back, your Bluetooth-enabled home phone rings instead of your cell phone. The
person called the same number, but your home phone picked up the Bluetooth signal from your cell phone and
automatically re-routed the call because it realized you were home. And each transmission signal to and from your cell
phone consumes just 1 milliwatt of power, so your cell phone charge is virtually unaffected by all of this activity.
Bluetooth is essentially a networking standard that works at two levels: I
I t provides agreement at the physical level -- Bluetooth is a radio-frequency standard.
It provides agreement at the protocol level, where products have to agree on when bits are sent, how many will be
sent at a time, and how the parties in a conversation can be sure that the message received is the same as the message
sent.
Why not infrared??
There are other ways to get around using wires, including infrared communication. Infrared (IR) refers to light waves
of a lower frequency than human eyes can receive and interpret. Infrared is used in most television remote control
systems. Infrared communications are fairly reliable and don't cost very much to build into a device, but there are a
couple of drawbacks. First, infrared is a "line of sight" technology. For example, you have to point the remote control at
the television or DVD player to make things happen. The second drawback is that infrared is almost always a "one to
one" technology. You can send data between your desktop computer and your laptop computer, but not your laptop
computer and your PDA at the same time.
What Is Wi-Fi???
A WI-FI is wireless fidelity, where fidelity means to regenerate(data) faithfully.A wireless network uses radio waves,
just like cell phones, televisions and radios do. In fact, communication across a wireless network is a lot like two-way
radio communication. Here's what happens: A computer's wireless adapter translates data into a radio signal and
transmits it using an antenna. A wireless router receives the signal and decodes it. The router sends the information to
the Internet using a physical, wired Ethernet connection. The process also works in reverse, with the router receiving
information from the Internet, translating it into a radio signal and sending it to the computer's wireless adapter. The
radios used for WiFi communication are very similar to the radios used for walkie-talkies, cell phones and other
devices. They can transmit and receive radio waves, and they can convert 1s and 0s into radio waves and convert the
radio waves back into 1s and 0s. But WiFi radios have a few notable differences from other radios: This is a single unit
that contains: A port to connect to your cable or DSL modem ,A router ,An Ethernet hub ,A firewall, A wireless access
point
The process:
Each of the above system contains a transmitter. This consists of a source of electrical energy, producing alternating
current of a desired frequency of oscillation. The transmitter contains a system to modulate (change) some property
of the energy produced to impress a signal on it. This modulation might be as simple as turning the energy on and off,
or altering more subtle properties such as amplitude, frequency, phase, or combinations of these properties. The
transmitter sends the modulated electrical energy to an antenna; this structure converts the rapidly-
changing alternating current into an electromagnetic wave that can move through free space. 24
Theelectromagnetic wave is intercepted by a receiving antenna; this structure captures some of the 13
24
SATHYA
TEP
8TH SEM YOUR NEXT S
Did you know that YouTube has a clever feature which allows users to create
red/blue 3D movies. And all that one need for this is a pair of (preferably
identical) camcorders, any video editing software and 3D glasses to watch the
results.
Step 1
Set up a scene to be recorded on two cameras simultaneously, arranging them
like a pair of perfectly level eyes. Any difference in angle will reduce the effect.
Step 2
Sync the resulting footage in your video editing program, placing the two shots side by side in the same frame. The “left-
eye” camera shot should go on the right-hand side and vice-versa .
Step 3
When you upload the video, add the tag yt3d:enable=true. If it's in widescreen, you also need to add yt3d:aspect=16:9.
Step 4
YouTube will then analyse the video and make a composite of both sides. When viewed through your 3D specs it should
jump out at you.
27 Lucky: One who gets the opportunity. Brilliant: One who creates the
opportunity. Winner: One who uses the opportunity. Be a winner always.
13
27
BID ADIEU
Something told the wild geese
It was time to go
Though the fields lay golden
Something whispered,”Snow”
-Rachel Feld
Heyy, helloo, Sasriya kal, asalaam walekum ……I know all these greetings are very cliché….
but still friends this is indeed INDIA and here “old is gold” still holds good. Friends coming
this June we, the most…..what people say “vivacious, rocking, vibrant batch of 2010”(Oh
come on! every other batch feels that their batch is the coolest)……..will bid adieu to this
college, campus, fun……..LIFE forever and remember how we used to complain about our
long and hectic days,assignments,late labs……phewww… but now as the countdown has
started …the feelings are simply inverse…..kinda crazy ..rite…..Now, I perhaps feel that
where ever we go…..and plunge in the corporate sea….. our heart would always crave for
these jolly days……never know, it might even skip a beat whenever the merry days of our
college life would sway by our thoughts….alas… Whilst reminiscing over the past years ,
the pioneer of all thoughts is that of the 1st of Sept 2006 …….the very day which embarked
our foray into this institution. I can almost post-view the well organized invitation
ceremony, the multicolored decorated stage, the rhetoric speeches by the director,
principal and our most respectable Swamiji. There was a cloud of excitement and tint of
apprehension gleaming in each student's eyes and an eagerness and zeal to explore. From
the next day onwards started our panoramic journey which consisted of the confused
circuits,non debugging codes,brain teasing derivations,the very reliable CRO's with the
unreliable outputs,the care of the teachers,the night outs,the aimless wandering with
friends,the unity in the call for bunking, the gossiping in the class rooms,, the last minute
preparation before the exams and most importantly our 3rd Sem's “D STRIKE DAY” which I
know everyone knows what I am referring to. Our 1st year went away by simply getting to
know each other,our 2nd year went away in making friends(as of….),our third year started
with a boom and bang which I personally feel was the the toughest and horrific year of my
life and finally the final year in panicking for job.Now that we all are almost done it
suddenly struck me how speedy those years went by and how strongly I want them
back.We all have been waiting to become graduates and hit the next level but honestly
don't we all at this point of time just want to play “Pause” and feel this farewell taking our
very own sweet time.So many words are left unsaid…….so many deeds are left undone but
I still want this incompleteness to leave behind a trail which shall be carried on by the next
expected batch. Hoping that every day turns to be a timeless memory and sweet
remembrance for the coming batches which they will cherish throughout their lives. Best of
luck and good bye.
On behalf of the entire fourth year signing off.