Sunday 29 May 2016

I B.Tech I Semester
S.NoName of the SubjectYoutube linksOnline ResourcesYoutube
1Computer Programming
C link

I B.Tech II Semester
S.NoName of the Subject
Online ResourcesYoutube
1 Data Structures
DS link

II B.Tech I Semester
S.NoName of the Subject
Online ResourcesYoutube
1Mathematical Foundations of Computer MFCS link 
2Advanced  Programming in C++ and Java
C++ link
JAVA link
 

II B.Tech II-Semester
S.NoName of the Subject
Online ResourcesYoutube
1Digital Logic Design & Computer Organization
DLD Link
CO link

2Database Management Systems
DBMS link
DBMS link

3OOPS Through PYTHON
PP link
4Operating Systems
OS link
5Design and Analysis of Algorithms
DAA link

III B.Tech I-Semester
S.NoName of the Subject
Online ResourcesYoutube
1Principles of Programming Languages
PPL link 
2SOFTWARE ENGINEERING
SE link 
3OPERATING SYSTEM
  
4DATA COMUNICATION &COMPUTER NETWORK DCN Link 
5COMPUTER FORENSICS
CF Link 
6MICROPROCESSOR&INTERFACE   


III B.Tech II-Semester
S.NoName of the Subject
Online ResourcesYoutube
1Object Oriented Analysis & Design
OOAD link
2Compiler Design
CD link
3Network Security
NS Link
4Web Technologies
WT link1
WT link2
WT link3

5MANAGERIAL ECO.&FINANCIAL ANA.
 
6VLSI Design
 


IV B.Tech I-Semester
S.NoName of the Subject
Online ResourcesYoutube
1SOFTWARE TESTING METHODOLOGY
SE link 
2LINUX PROGRAMMING
  
3COMPUTER GRAGHICS
CG link 
4CLOUD COMPUTING CC Link 
5DATA WAREHOUSING &DATA MINING
DWDM link 
6INFORMATION RETRIVAL SYSTEM
  


IV B.Tech II-Semester
S.NoName of the Subject
Online ResourcesYoutube
1Scripting Languages
SL Link1
SL Link2

2Storage Area Network
SAN Link



Friday 20 May 2016

Physicist Can Predict Wars Using Mathematical Algorithms

Wars can often seem like series of random events and attacks without any pattern or reason behind them. Surprisingly, physicist Sean Gourley and a team of researchers have found a mathematical equation that can be used to not only model past wars perfectly, but that can predict the trends of attacks in future and ongoing conflicts. Sean began the project hoping to create a database from various sources, to accurately collect every piece of news that occurs. What his team didn’t expect to find was a pattern in the attacks of wars, all related down to one very simple equation. This TED talk is incredibly fascinating, and as it turns out, all wars actually follow the exact same trend.
Gourley reports that the path, leading up to the conclusion he and his interdisciplinary team drew, was not an easy one. Finding trends within warfare and insurgency overlaps many academic disciplines, so many in academia created a lot of friction to the project as it didn’t really have a home in one subject. Gourley claims that he was criticized for not focusing fully on the discipline he was good at, but also learning about other disciplines which he didn’t know enough about, according toOzy.
His research on warfare found that all conflicts had a downward trend with a slope around 2.5. This related the number of people killed in an attack to the number of attacks for a given death toll. At first this data seemed random, but they found that when plotted on a logarithmic scale, it resulted in an almost perfect descending trend.
Iraq was the first conflict they looked into, but as they began digging deeper into past conflicts, they found that nearly every war in history yielded the same exact results. As they plotted more and more wars, all of the data clustered around a slope of 2.5, meaning that there was some kind of similarity between every known human conflict. The equation is as follows:

P(x)=Cx

P is the probability of the event, x is the number killed, C is a constant, and α is the slope of the conflict’s trend line. This is a surprisingly simple equation that in theory describes every human conflict that will ever take place, or has ever taken place.
[Image Source: TED]
As they thought about these numbers more, they determined that α is really the structure of the insurgency in a war. Using this formula, Gourley claims that governments and military organizations should be able to develop strategies all based around how to change the α value, therefore potentially ending a war. A conflict that will continue, maintains a slope of around 2.5, so the key is to find some way to push that trend either higher or lower. Pushing α higher would mean fragmenting the insurgent groups and making them weaker, eventually leading to a cease fire in conflict. Pushing α lower would mean pushing groups together, making them stronger and more robust, but capable of being defeated.
For the most part, this research has yet to be adopted by military powers to predict and organize attacks, but through further study, it could become a driving factor in war strategy. The goal should ultimately be to end conflicts, and through mathematical planning and calculations, finding the pathways to those “cease fires” may just become a little easier.

Quantum Computer Could Break any Encrypted Device

         [Image Source: Yuri Samoilov]
Scientists at MIT have successfully developed a scalable quantum computer that runs off of 5 atoms which successfully used Shors algorithm to correctly factor the number 15.
encryption
The factors of 15 are relatively simple: just 5 and 3. However, a slightly larger number like 93 will probably take a pen and paper to figure it out. An even larger number with 232 digits can (and has) taken scientists over two years to factor correctly, with the assistance of hundreds of classical computers operating in parallel.
Factoring large numbers is so incredibly hard, that it makes up the basis of many encryption schemes that are used to protect credit cards, state secrets, and other confidential information. The operation is made easy to check with the password that unlocks the algorithm, however, the password is made into a long string of random characters that make decrypting it to the original password practically impossible which would take a classical computer thousands of years to crack by brute force (essentially guessing until the code works).
encrypting
[Image Source: Jlandin]
In 1994, the Morss Professor of Applied Mathematics at MIT, Peter Shor, derived the quantum algorithm that can calculate all the prime factors of a large number, exponentially faster than a classical computer. However, the success of the algorithm comes from the number of quantum bits- the more bits, the better the algorithm will work. Although some scientists have implemented Shors algorithm in various quantum systems, none have the ability to be scaled up beyond more than a few quantum bits.
That, however, has changed. A paper published in the journal Science from researchers at MIT and the University of Innsbruck in Austria reported that they have successfully designed and built a quantum computer from 5 atoms held in place by an ionic trap. The computer is controlled by laser pulses which carry out Shor’s algorithm on each individual atom, which was able to correctly factor the number 15. The system was built in such a way that it can be expanded using more lasers and atoms to create a bigger and faster computer, that one day could factor much larger numbers (and crack all encryption methods). The results claim to represent the first implementation of Shor’s algorithm which has the ability to be scaled.
Quantum Trap
“We show that Shor’s algorithm, the most complex quantum algorithm known to date, is realizable in a way where, yes, all you have to do is go in the lab, apply more technology, and you should be able to make a bigger quantum computer.”
“It might still cost an enormous amount of money to build — you won’t be building a quantum computer and putting it on your desktop anytime soon — but now it’s much more an engineering effort, and not a basic physics question.” ~Isaac Chuang, professor  of physics and professor of electrical engineering and computer science at MIT
Classical computing involves a binary system where numbers are represented by either 0s or 1s. Calculations are then carried out according to the instructions of a predetermined algorithm which manipulate the 0s and 1s to create both an input and an output. A quantum computer makes use of a quantum property that relies on atomic-scale units, or “qubits”, that can represent 1 and 0 simultaneously- a property known as superposition.  An atom in this state (representing one qubit) can essentially carry out two calculations in parallel, making certain computations incredibly more efficient than a classical computer. Although a classic computer can carry out single operations faster, a quantum computer can arrive at the same answer with exponentially less steps.
The team kept the quantum system stable with an ion trap that held the atoms in place allowing them to remove one atom, therefore giving it a charge. The atoms were then held in place by an electric field
“That way, we know exactly where that atom is in space,”
Chuang explains.
“Then we do that with another atom, a few microns away — [a distance] about 100th the width of a human hair. By having a number of these atoms together, they can still interact with each other, because they’re charged. That interaction lets us perform logic gates, which allow us to realize the primitives of the Shor factoring algorithm. The gates we perform can work on any of these kinds of atoms, no matter how large we make the system.”
Chuang’s colleagues at the University of Innsbruck built the apparatus based on Chuang’s team’s design. The computer was directed to factor the number 15 – the smallest number necessary to demonstrate Shor’s algorithm. The system gave the correct factors without any prior knowledge of the answers to a degree of 99% certainty.
Chuang says:
“In future generations, we foresee it being straightforwardly scalable, once the apparatus can trap more atoms and more laser beams can control the pulses. We see no physical reason why that is not going to be in the cards.”
The completion of the apparatus is an astonishing feat that has great potential in cyber security and unlocking the secrets of the universe. However, a scaled computer could see the potential to crack every single encryption system on the planet. Fortunately for frequent users of the net, there are still many years (and billions of dollars) before a quantum computer could successfully crack any encryption method. Chuang and his colleagues have created an engineering marvel by first implementing a scalable quantum computer capable of successfully factoring small numbers.
As we progress through the 21st century, we are discovering more and greater things about the universe we live in. Perhaps one day we will be able to unlock the rest of the universe’s secrets by designing the universe inside a computer, then again, maybe we already have inside our own minds.

MIT makes significant breakthrough in Nuclear Fusion

After running a series of complex experiments, MIT has finally made a breakthrough in one of the most baffling problems in nuclear fusion. Nuclear fusion is a nuclear reaction in which two or more atomic nuclei (in this case, Hydrogen atoms) combine to form an even bigger nucleus (in this case, Helium).
This reaction is important because when these two Hydrogen atoms combine to form Helium, they release an incredible amount of energy; energy that some scientists believe we can harness to provide power to the whole world for years and years to come.
nuclear fusion
Although quite an interesting idea, there have been difficulties in making it a reality. For one, combining two atomic nuclei requires an incredible amount of energy in itself, so that is one tricky part. The second part is that the energy released after the nuclei combine is lost due to the turbulence in the nuclear reactor. This second problem is what MIT looked into.
Ideally, scientists expected that the turbulence caused by ions and turbulence caused by electrons would cancel each other out, resulting in little or no turbulence in the reactor itself. At least that is what their model was based on. But after experiments, it happened that there was always turbulence in the reactor and no one could understand why it occurred or where it came from.
nuclear fusion reactor
[Image Source: Nerdist]
This was until researchers at MIT decided to run a simulation but this time, accounting for both types of turbulence. Due to the extra variables, the computation became much more complex than it was before. To give you an idea of just how complex it was, it took 17,000 processors and 37 days to complete the simulation. This makes it 15 million hours of computation!
Nevertheless, MIT did get the result they were looking for and with this, scientists should have a better understanding of the underlying process.

Square Tire From British Airways Plane Baffles Experts

According to the Daily Mail, Aviation experts were baffled when a British Airways plane from Hong Kong landed at Heathrow airport with a square tire. The aircraft was an Airbus A380 and it was reported that upon take-off, it had received a low-pressure tire warning. The airplane continued on its flight, disregarding the warning. An A380 is designed to be perfectly safe, even when one wheel isn’t working. But the pilot requested that a tow tug be available at the London airport in case the aircraft was unable to taxi to the gate by itself. The airplane, however, made a safe landing and was able to taxi itself to the gate. It was after it landed that the square tire was discovered.
A Civil Aviation Authority spokesman described the curious square tire as a “bit mysterious” and confessed that he’s never seen one like it.
aviation
[Image Source: Aviation Herald]
It seems that none of the aviation experts could explain why the deflated tire had become square in shape. According to author Patrick Smith, “The tire deflated and the subsequent rotation caused it to fold in on itself in four symmetrical segments.” Another expert said that the square shape was probably caused the way the weight was distributed onto the wheels of the A380. Still another aviation expert named Kumar Mysore went further in describing how a round tire could take on a square shape:
‘The deflated tyre would have been round when the aircraft touched down, it would not have rotated on four square edges as the picture would have us believe. The round wheel would have rotated on the flat ground, with the deflated tyre wobbling around the wheel. The tyre has taken this shape after the aircraft came to a halt.” ~ Daily Mail
So, when we consider that the square shape wasn’t there when the tire was deflated and was spinning around, this seems to make more sense. Also, think about rubber toys that change shape based on the amount of pressure you apply. When you squeeze a deflated rubber ball, you can change the shape easily with varying amounts of pressure. The tire is doing the same thing, changing shape due the lack of air pressure within it. So perhaps when a large weight is applied to a rotating, deflated round object, a square shape is the end result?
But this still doesn’t completely explain why the shape is square and not some other shape. Perhaps the rubber of the tire got overheated, and this heating changed the rubber material’s properties. If we look closely at the photo, we can see that the caved in areas contain the excess rubber material.  None of the explanations truly explain why the tire’s shape became square. Do you know the answer? If you do, please comment below and enlighten us.
Article written by Leah Stephens. She is a writer, artist, and experimenter. She recently self-published her first book, Un-Crap Your LifeYou can follow her on Twitter or Medium.

Thursday 19 May 2016

Microsoft dumping data centers into the Pacific Ocean?

In case you didn’t already know, dumping computer equipment into water is generally not a very good idea. This fact is mainly the reason why Microsoft’s dumping of data centers is so interesting. Data centers are basically buildings containing various computer equipment that process all of the internet we use. With the increase in the usage of cloud-based services and various other internet provisions, data centers are in such a high demand right now. But the problem that comes with them is that they are so expensive to maintain. Not only do they consume a lot of energy, most of the energy they consume is spent on the cooling system that prevents the components from overheating.
microsoft data centers researchers
Given these pieces of information, Microsoft’s idea of putting data centers into the ocean is starting to make much more sense. The idea behind this is that by doing so, Microsoft should be able to capitalize on the low temperatures of the bottom at the ocean. Since the mass of the ocean is practically limitless compared to that of the data centers, there will be virtually no harm in doing so.
microsoft data centers
Last year, Microsoft initiated Project Natick. In this project, they put a prototype called Leona Philpot into the the Pacific Ocean for 90 days and tested its ability to endure the harsh underwater conditions. It is said that the prototype performed better than expected.
Microsoft thinks this is a good idea because not only does the ocean ensure zero maintenance of data centers for very long periods of time, but they also think that setting up data centers will become much easier by doing so. This is based on the fact up to 4.5 billion people live within 125 miles of a shoreline. This will not only make it much easier to set up data centers for people nearby, but it will also save up a lot of space on the land, which can be now be used for other purposes.

Wednesday 11 May 2016

QOS in OLSR

MP-OLSR is a multipath routing protocol based on OLSR. The Multipath Dijkstra Algorithm is proposed to obtain multiple paths. The algorithm gains great flexibility and extensibility by employing different link metrics and cost functions. In addition, route recovery and loop detection are implemented in MP-OLSR in order to improve quality of service regarding OLSR. The backward compatibility with OLSR based on IP source routing is also supported. 

MP-OLSR implementaion for Qualnet simulator

The MP-OLSR is implemented for Qualnet simulations. It is an extension of nOLSRv2. It exsits as an "add-on" in the Qualnet simulator.
About adding a new routing protocol in Qualnet, please refer to Qualnet Programmer's Guide.
MP-OLSR is an application-layer routing protocol based on OLSRv2, but it need to receive the data packet to read/modify the source routing packet header. To enable the application layer routing protocol MP-OLSR can handle the data packet, an MPOLSRRouterFunction is defined. And NetworkIpSetRouterFunction is used to register MPOLSRRouterFunction. This enables IP to directly call MPOLSRRouterFunction to determine the route for a packet if MP-OLSR is running at that interface.
Source code available:
Reference information:

MP-OLSR implementation for NS2 simulator

The MP-OLSR is implemented for NS2 simulations. It is an extension of um-OLSR.
About adding a new routing protocol in NS2, please refer to "Implementing a New Manet Unicast Routing Protocol in ns2",
Source code available:
Reference information:
The code is implemented based on v2.29. For those who have problem in installing the code, can try to downloadthe whole ns2 folder.
A sample of the tcl script is also available here.

Saturday 7 May 2016

Ciphers

Description for Ciphers

Symmetric Ciphers Online allows you to encrypt or decrypt arbitrary message using several well known symmetric encryption algorithms such as AES, 3DES, or BLOWFISH.
Symmetric ciphers use the same (or very similar from the algorithmic point of view) keys for both encryption and decryption of a message. They are designed to be easily computable and able to process even large messages in real time. Symmetric ciphers are thus convenient for usage by a single entity that knows the secret key used for the encryption and required for the decryption of its private data – for example file system encryption algorithms are based on symmetric ciphers. If symmetric ciphers are to be used for secure communication between two or more parties problems related to the management of symmetric keys arise. Such problems can be solved using a hybrid approach that includes using asymmetric ciphers. Symmetric ciphers are basic blocks of many cryptography systems and are often used with other cryptography mechanisms that compensate their shortcomings.
Symmetric ciphers can operate either in the block mode or in the stream mode. Some algorithms support both modes, others support only one mode. In the block mode, the cryptographic algorithm splits the input message into an array of small fixed-sized blocks and then encrypts or decrypts the blocks one by one. In the stream mode, every digit (usually one bit) of the input message is encrypted separately.
In the block mode processing, if the blocks were encrypted completely independently the encrypted message might be vulnerable to some trivial attacks. Obviously, if there were two identical blocks encrypted without any additional context and using the same function and key, the corresponding encrypted blocks would also be identical. This is why block ciphers are usually used in various modes of operation. Operation modes introduce an additional variable into the function that holds the state of the calculation. The state is changed during the encryption/decryption process and combined with the content of every block. This approach mitigates the problems with identical blocks and may also serve for other purposes. The initialization value of the additional variable is called the initialization vector. The differences between block ciphers operating modes are in the way they combine the state (initialization) vector with the input block and the way the vector value is changed during the calculation. The stream ciphers hold and change their internal state by design and usually do not support explicit input vector values on their input.
Security note: Data are transmitted over the network in an unencrypted form! Please do not enter any sensitive information into the form above as we cannot guarantee you that your data won't be compromised.

Usage

Using the Input type selection, choose the type of input – a text string or a file. In case of the text string input, enter your input into theInput text textarea1,2. Otherwise, use the "Browse" button to select the input file to upload. Then select the cryptographic function you want to use in the Function field. Depending on the selected function the Initialization vector (IV) field is shown or hidden. Initialization vector is always a sequence of bytes, each byte has to be represented in hexadecimal form.
Select the operation mode in the Mode field and enter a key in the Key field. The permitted lengths of keys for particular cryptographic functions are listed below. If you don't specify a key with permitted length the key is prolonged with the proper number of null bytes at the end. When the key is changed the prefix of sha1(key) function is automatically filled in the IV field. You still may change the IV. The feature is intended only for your convenience. Using the radio buttons under the Key input field, you can specify whether the entered key value should be interpreted as a plain text or a hexadecimal value.
Finally, click the "Encrypt!" button or the "Decrypt!" button depending on whether you want the input message to be encrypted or decrypted.
The output message is displayed in a hex view and can also be downloaded as a binary file. The format of output file is simply a dump of binary data. The initialization vector is added to the file name for convenience.
Cryptographic functionKey lengthsInitialization vector lengths (all modes)
In bytesIn bitsIn bytesIn bits
AES16, 24 or 32128, 192 or 25616128
DES1 to 8 bytes8 to 6416128
TRIPLEDES1 to 248 to 19216128
BLOWFISH1 to 568 to 44816128
BLOWFISH-compat1 to 568 to 44816128
RIJNDAEL-2561 to 328 to 25664512
R41 to 2568 to 2048--
SERPENT1 to 328 to 25632256
TWOFISH1 to 328 to 25632256

1 You can use only hexadecimal characters, newlines, tabulators and new line characters if you decrypt a string.
2 Input text has an autodetect feature at your disposal. The autodetect detects for you if the content of Input text field is in form of a plain text or a hexadecimal string. You can turn off the feature by clicking on 'OFF' or by changing current type of input under the Input textfield.

Limits

The maximal size of the the text string input is 131,072 characters. The maximal size of the input file is 2,097,152 bytes.
DES Encryption
https://www.tools4noobs.com/

JNTUH Syllabus R13

Syllabus R13 CSE JNTUH
 Download

Change of blog address

Dear Members The name of our blog will be changed to gnitcsehyd.blogspot..com with effective from 8-5-2015