Download Operating Systems - Computer Society Of India

Document related concepts

Distributed operating system wikipedia , lookup

Copland (operating system) wikipedia , lookup

Unix security wikipedia , lookup

VS/9 wikipedia , lookup

CP/M wikipedia , lookup

Mobile operating system wikipedia , lookup

Security-focused operating system wikipedia , lookup

Transcript
55 pages including cover
Knowledge Digest for IT Community
ISSN 0970-647X
Volume No. 40 | Issue No. 11 | February 2017
` 50/-
Operating
Systems
www.csi-india.org
Cover Story
Computer Operating Systems:
From every palm to the entire cosmos
in the 21st Century Lifestyle 5
TECHNICAL TRENDS
Blockchain : A Disruptive Innovation 9
SECURITY CORNER
Cyber Threat Analysis with
Memory Forensics 17
research front
Customized Linux Distributions for
Bioinformatics Applications 14
Article
Top Ten Alternative Operating
Systems You Should Try Out 20
CSI CALENDAR 2016-17
Sanjay Mohapatra, Vice President, CSI & Chairman, Conf. Committee, Email: [email protected]
Date
Event Details & Contact Information
MARCH
01-03, 2017
INDIACOM 2017, Organized by Bharati Vidyapeeth’s Institute of Computer Applications and Management (BVICAM), New
Delhi http://bvicam.ac.in/indiacom/
Contact : Prof. M. N. Hoda, [email protected], [email protected], Tel.: 011-25275055
0​3-04, 2017
I International Conference on ​Smart Computing and Informatics (SCI -2017), venue : Anil Neerukonda Institute of
Technology & Sciences Sangivalasa, Bheemunipatnam (Mandal), Visakhapatnam, Andhra Pradesh, http://anits.edu.in/
sci2017/, Contact: Prof. Suresh Chandra Satapathy. Mob.: 9000249712
04, 2017
Trends & Innovations for Next Generation ICT (TINICT) - International Summit-2017
Website digit organized by Hyderabad Chapter http://csihyderabad.org/Contact 040-24306345, 9490751639
Email id [email protected] ; [email protected]
24-25, 2017
First International Conference on “Computational Intelligence, Communications, and Business Analytics (CICBA 2017)” at Calcutta Business School, Kolkata, India. Contact: [email protected]; (M) 94754 13463 / (O) 033 24205209
International Conference on Computational Intelligence, Communications, and Business Analytics (CICBA - 2017)
at Calcutta Business School, Kolkata, India. Contact (M) 9475413463 / (O) 03324205209, Email id : [email protected];
www.cicba-2017.in
APRIL
15-16, 2017
1st International Conference on Smart Systems, Innovations & Computing (SSIC-2017) at Manipal University Jaipur,
Jaipur, Rajasthan. http://www.ssic2017.com
Contact : Mr. Ankit Mundra, Mob.: 9667604115, [email protected]
MAY
08-10, 2017
ICSE 2017 - International Conference on Soft Computing in Engineering, Organized by : JECRC, Jaipur, www.icsc2017.com
Contact : Prof. K. S. Raghuwanshi, [email protected], Mobile : 9166016670
JUNE
05-30, 2017
Workshop on LAMP (Linux, Apache, My SQL, Perl/Python)​, Jaypee University of Engineering and Technology, Raghogarh,
Guna - MP, www.juet.ac.in​ Dr. Shishir Kumar ([email protected]) 9479772915
OCTOBER
28-29, 2017
International conference on Data Engineering and Applications-2017 (IDEA-17) at Bhopal (M.P.),
http://www.ideaconference.in Contact : [email protected]
DECEMBER
21-23, 2017
Fourth International Conference on Image Information Processing (ICIIP-2017), at Jaypee University of Information
Technology (JUIT), Solan, India, (http://www.juit.ac.in/iciip_2017/) Contact : Dr. P. K. Gupta ([email protected])
(O) +91-1792-239341 Prof. Vipin Tyagi ([email protected])
CSI Adhyayan
A tri-monthly publication for students
Articles are invited for Oct-Dec. 2016 issue of CSI Adhyayan from student members authored as original text. Plagiarism is
strictly prohibited. Besides, the other contents of the magazine shall be Cross word, Brain Teaser, Programming Tips, News
Items related to IT etc.
Please note that CSI Adhyayan is a magazine for student members at large and not a research journal for publishing fullfledged research papers. Therefore, we expect articles should be written for the Bachelor and Master level students of
Computer Science and IT and other related areas. Include a brief biography of Four to Five lines, indicating CSI Membership
no., and for each author a high resolution photograph.
Please send your article to [email protected].
On behalf of CSI Publication Committee
Prof. A. K. Nayak
Chief Editor
2
C S I C o m m u n ic a t i o n s | F E B R UA R Y 2 0 1 7
www.csi-india.org
CSI Communications
Volume No. 40 • Issue No. 11 • FEBRUARY 2017
Chief Editor
Prof. A. K. NAYAK
Editor
DR. DURGESH MISHRA
Associate Editor
PROF. Prashant Nair
Contents
Cover Story
5
Computer Operating Systems:
From every palm to the entire cosmos in the 21st Century Lifestyle
Subrata Ganguli
Technical Trends
9
Blockchain : A Disruptive Innovation
KVN Rajesh & KVN Ramesh
Published by
Mr. Sanjay Mohapatra
For Computer Society of India
Design, Print and
Dispatch by
GP Offset Pvt. Ltd.
Research Front
Customized Linux Distributions for Bioinformatics Applications
Khalid Raza & Sahar Qazi
Security Corner
Cyber Threat Analysis with Memory Forensics
Hardik Gohel & Himanshu Upadhyay
17
Articles
Top Ten Alternative Operating Systems You Should Try Out
20
Operating Systems
22
The battle for the Best Smartphone OS
24
Operating Systems : Mass transit for the future
26
RSOS: Reliable and Secure Operating System
27
Deepu Benson
Simran
S. N. Kakarwal
R. Gobi
Ashutosh Saxena
Please note:
CSI Communications is published by Computer
Society of India, a non-profit organization.
Views and opinions expressed in the CSI
Communications are those of individual
authors, contributors and advertisers and they
may differ from policies and official statements
of CSI. These should not be construed as legal
or professional advice. The CSI, the publisher,
the editors and the contributors are not
responsible for any decisions taken by readers
on the basis of these views and opinions.
Although every care is being taken to ensure
genuineness of the writings in this publication,
CSI Communications does not attest to the
originality of the respective authors’ content.
© 2012 CSI. All rights reserved.
Instructors are permitted to photocopy isolated
articles for non-commercial classroom use
without fee. For any other copying, reprint or
republication, permission must be obtained
in writing from the Society. Copying for other
than personal use or internal reference, or of
articles or columns not owned by the Society
without explicit permission of the Society or
the copyright owner is strictly prohibited.
14
PLUS
Call for Papers for April Issue of the CSI Journal of Computing
21
CSI Nihilent eGovernance Awards 2015-16 – A Report
30
CSI 2016 – A Report
31
CSI-IEEE Computer Society Joint Education Award 2016 – A Report
33
CSI Meeting with Myanmar Delegates
34
Citation of Life Time Achievement, Honorary Fellowship & Fellowship Award
35
Brain Teaser
46
CSI Reports
48
Student Branches News
50
Printed and Published by Mr. Sanjay Mohapatra on Behalf of Computer Society of India, Printed at G.P. Offset Pvt. Ltd.
Unit-81, Plot-14, Marol Co-Op. Industrial Estate, off Andheri Kurla Road, Andheri (East), Mumbai 400059 and Published from
Computer Society of India, Samruddhi Venture Park, Unit-3, 4th Floor, Marol Industrial Area, Andheri (East), Mumbai 400 093.
Tel. : 022-2926 1700 • Fax : 022-2830 2133 • Email : [email protected] Chief Editor: Prof. A. K. Nayak
3
C S I C o m m u n ic a t i o n s | F E B R UA R Y 2 0 1 7
Editorial
Dear Fellow CSI Members,
“One of my big regrets is that Facebook hasn’t had a major chance to shape the mobile operating system ecosystem.”
– Mark Zuckerberg
The theme for the Computer Society of India (CSI) Communications (The Knowledge Digest for IT Community) February, 2017
issue is Operating Systems, a technology that each one of use either in our computer, smart phone or intelligent device.
In this issue, Cover Story article is “Computer Operating Systems (OS): From every palm to the entire cosmos in the 21st century
lifestyle” by Subrata Ganguli. The author has provided an overview as also shed light on the global market share of various popular
OS. The Research front is titled, “Customized Linux Distributions for Bioinformatics Applications” by Khalid Raza & Sahar Qazi.
Here, most popular customized Linux tailored for bioinformatics and computational biology applications have been highlighted.
KVN Rajesh and KVN Ramesh have contributed to Technical Trends through the article, “Blockchain: A Disruptive Innovation”,
which focuses on how Blockchain, the technology behind bitcoin is of great relevance in the context of demonetization. The
Security Corner has Hardik Gohel and Himanshu Upadhyay giving us new insights on on Cyber Threat Analysis with Memory
Forensics.
We have several articles which provide us information on various OS available in the market; “Top Ten Alternative Operating
Systems You Should Try Out” by Deepu Benson; OS by Simran Saini and Understanding OS by Mahek Golchha. Ashutosh Saxena
in his article highlights, “RSOS: Reliable and Secure Operating System”. Also S. N. Kakarwal has give insights on the battle for
the best smartphone OS. R. Gobi in the article, “Operating Systems: Mass transit for the future” provides a futuristic view of
the technology.
This issue also contains Crossword, CSI activity reports from chapters, student branches and Calendar of events.
This issue covers the historic CSI 2016 Convention at Coimbatore on 23, 24 and 25 January, 2017 with special focus on other
activities held in conjunction like the e-governance awards, MoU signed and CSI-IEEE award. The inspirtational citations of the
honorary fellowship, fellowship and lifetime achievement awardees of CSI 2016 are also reproduced here
We are thankful to Chair-Publication Committee and entire ExecCom for their continuous support in bringing this issue
successfully.
We wish to express our sincere gratitude to all authors and reviewers for their contributions and support to this issue.
The next issue of CSI Communications will be on the theme “Software Engineering”. We invite the contributions from all CSI
members and researchers on this theme. We also look forward to receive constructive feedback and suggestions from our
esteemed members and readers at [email protected].
With kind regards,
Editorial Team, CSI Communications
Kind Attention
Prospective Contributors of CSI Communications
Please note that Cover Theme for March 2017 issue is
Software Engineering. Articles may be submitted in the
categories such as: Cover Story, Research Front, Technical
Trends and Article. Please send your contributions by 1st
March, 2017.
The articles should be authored in as original text. Plagiarism
is strictly prohibited.
Please note that CSI Communications is a magazine for
members at large and not a research journal for publishing
full-fledged research papers. Therefore, we expect articles
written at the level of general audience of varied member
categories. Equations and mathematical expressions within
articles are not recommended and, if absolutely necessary,
should be minimum. Include a brief biography of four to six
lines, indicating CSI Membership no., for each author with
high resolution author photograph.
Please send your article in MS-Word format to Associate
Editor, Prof. Prashant R. Nair in the email ids [email protected] with cc to [email protected]
(Issued on the behalf of Editorial Board CSI Communications)
Prof. A. K. Nayak
Chief Editor
4
C S I C o m m u n ic a t i o n s | F E B R UA R Y 2 0 1 7
www.csi-india.org
COVER STORY
Computer Operating Systems:
From every palm to the entire cosmos in the 21st Century Lifestyle
Subrata Ganguli
Formerly Asst. Prof., Department of Biotechnology, MVJ College of Engineering, Channasandra, Bangaluru, Karnataka
The operating system software is ubiquitous as the part and parcel of every computer in the age of
information technology. One needs the operating systems far out in the cosmos inside the communication
equipments used by the NASA and the ISRO in their shuttles and spacecraft, as well as in the palmed
mobile sets so near to us that had changed everyday life in this 21st Century. Operating systems are
required in the department of defense in their submarines operating outside the territory of the home
government, as well as in the department of atomic energy in their nuclear projects secured in a safe
location. Whether present inside the computers required for meteorological forecast and computations
or in the computers associated with the World Wide Web and the Human Genome projects or inside
the cheapest possible tablets in each backpack, they are the master software required for the running
of the computers, however large or small. The niche and the operating conditions of the operating
system software are thus as diverse as the computers themselves. This article describes and refers to
the well known operating systems running the desk top computers and mobile cellular phones, their
market shares and some projections for the future directions, hinting that the non-US economies such
as Russia, China and India would assume a more domineering role in the global market for information
technology beyond the year 2020.
Key Words: Operating systems, mobile operating systems, market share of operating systems, future projections.
Introduction:
Advent of high speed computation
and the associated phenomenal growth
in mobile technologies had impacted
our daily living enhancing our ability
to communicate with another object
or individual in unthought-of ways.
Mobile platforms are also being
encouraged in research to avail the
benefits of Digital India projects. The
authors group had explored possible
use of distributed systems and mobile
technologies in learning and research
that could possibly reduce the load on
hard copy printing and in- built memory
storage(1), an amateurish approach that
had been validated as ‘cloud computing’
by computer professionals . Goal of this
article is to draw attention to the various
mobile, desktop and other computer
operating systems available and their
respective market share, that being
considered an indirect measure of
changes in life style.
All computer programs and the
computational environment depend on
a functional operating system (OS) that
manages hardware, other software,
services and the users. It is the software
when loaded onto the hardware that
runs the environment of the machine,
without which both the computer and
the users are rendered useless. The
operating system (OS) also can be
directly accessed by the user through
a command line or a graphical user
interface (GUI) whereas the other
programs, called applications or
application programs, can make use of
the OS through an application program
interface (API) designed for specific
applications
Silberschatz, Galvin and Peter (2)
had described the computers being
made up of four components – namely
the hardware, the operating system, the
application software and the users. The
authors defined the operating system as
“A program that acts as an intermediary
between a user of a computer and the
computer hardware”. The goals of the
operating systems, according to these
authors in the year 2008, are to execute
user programs, to make solving user
problems easier, thirdly, to make the
computer system more convenient to
use and finally, to use the computer
hardware in an efficient manner. The
vast majority of the OS programs are
usually written in C and C++ languages
by experienced system programmers.
Some of the OS source codes are open
access and free, others are proprietary
information of the companies that
market them.
Degree level courses on computer
science and information technology
require familiarity in handling the
OS programs. One can look into
the curriculum of the established
foreign institutions for example, the
University of Illinois (https://www.
cs.uic.edu/~jbell/CourseNotes/
OperatingSystems/), the MIT (https://
o c w. m i t . e d u / co u r s e s / e l e c t r i c a l engineering-and-computer-science/6828-operating-system-engineeringfall-2012/), the Imperial College
(http://www.imperial.ac.uk/computing/
5
C S I C o m m u n ic a t i o n s | F E B R UA R Y 2 0 1 7
COVER STORY
current-students/courses/211/),
and
the Stanford University (http://www.scs.
stanford.edu/09wi-cs140/).
Types of OS Currently Popular:
The various operating systems
had been popularly named by the
companies that developed them (e.g.
Windows, Android etc.) During technical
discussion, OS’s are also referred to
pointing out the functional features,
or the size, structure and architecture
of the computers they are housed in.
Windows are maintaining the lion’s
share in the field of desk top operating
systems, whereas majority of mobile
handsets use Android as the OS. The
details of various operating systems are
discussed in this issue of the Computer
Society of India Communications, and
elsewhere
(https://en.wikipedia.org/
wiki/Operating_system). A succinct and
comparative discussion on various types
is available from the Wikipedia (https://
en.wikipedia.org/wiki/Comparison_of_
operating_systems).
There are several ways of
classifying the OS. They had been
traditionally described as batch, time
sharing, distributed, network and real
time OS depending on the type of the
computers and the tasks they perform.
Services performed by an operating
system include: multitasking, internal
memory sharing, handling input and
output devices, reporting system status
and error messages, scheduling to
offload batch jobs and also parallel
processing when the programs run on
more than one processors. The name of
the OS may also reflect the size of the
computer e.g. main frame, handheld
mobiles, personal computers, mini
and microcomputers etc.. The three
major desk top computer operating
systems are Windows, Mac Os and
Linux; with the Windows taking about
85% of the market share in August 2016,
Mac taking little over 6% and Linux
about 2%. The popularity of handheld
systems that changed our lives are
referred to as mobile operating systems
(MOS) running in smart phones,
tablets and other similar devices. The
familiar brand names are Android,
iOS, Blackberry, Windows phone etc.
The day-to-day life in the digital age
abounds with examples of embedded
systems present in the ATM’s, cars,
PoS, digital cameras etc. Interest in
web-based computing environments
also had developed the field of cloud
computation (https://en.wikipedia.org/
wiki/Cloud_(operating_system)).
The
Table 1 shows a summary of the usage
of various operating systems in terms of
global market share.
There had also been discussions
on alternate or future OS programs like
business operating systems, AMOGAO,
HAIKU, SKYOS, MORPHOS, DEXOS
etc. that have not been commercially
as competitive as the few main
brand names (http://royal.pingdom.
com/2008/09/26/10-amazinglyalternative-operating-systems-andwhat-they-could-mean-for-the-future/)
Non-Us Operating Systems:
Currently Windows for PC is
overwhelming the market for OS.
However several countries with large
domestic markets (e.g. India, Russia,
China etc.) had followed the approach
to replace Windows software, and even
hardware, to indigenize the computer
industry and information technology.
A few of the relevant examples are
described below. The summary is
presented in Table 2.
Russian OS:
The Moscow Times (https://
themoscowtimes.com/articles/russianoperating-system-to-launch-in-nextdecade-50052 accessed on Dec 16,
2016) quoted Russian Government
sources informing the decision of the
government to replace the Windows
based software and even computer
hardware with domestic Russian
products, the target remaining to
substitute Windows software at all
government agencies and strategic
enterprises by the period 2025--2030.
Currently the Windows enjoy virtual
monopoly in the PC systems; and
among the mobiles 35% Apple iOS and
27% Android OS software are in use.
The Russian plan also aims at building
its own hardware by that time replacing
Microsoft and Apple products and the
associated application software.
Currently Astra-linux and Phantom
OS are being developed as the Russian
substitute. The former is Linux- like
that intends to meet the needs of the
Russian defense industries (www.astra-
linux.com). It’s developed by RusBitTech
available in English and Russian. The
latter, the Phantom, is developed by
the Russian programmers. It’s objectoriented and not Unix-like; it is available
through Digital Zone (www.dz.ru/en).
Amidst the indigenization drive
for the mobile platforms, Russian
company Open Mobile Platform is hiring
developers to use Android and iOS
compatible applications to adapt to the
non-US MOS platforms. The Sailfish OS
had been an independent alternative.
The open source software is developed
by the Finish mobile company Jolla Ltd.
and Sailfish OS community (https://
sailfishos.org).
Chinese, German and Indian OS:
China had also made efforts to
develop non-US operating systems. Its
product Kylin (later versions named
neo-kylin and Ubuntu kylin) is Unix-like
and available in about 60 languages
(www.kylinos.com.cn). The product had
been developed in the National Univ. Of
Defence Technology.
Germany had developed the RTOS
embedded system for the German
Aerospace Center for applications
that require high dependability. It is
named Rodos Operating System (Real
time On board Dependable Operating
System) written in C, C++ and assembly
languages. (www.Dlr.de/rodos)
India had reported, originally on
Jan 10, 2007, the Bharat Operating
System Solutions (BOSS) as an
alternative operating system developed
by the National Resource Centre for
Free Open Source Software (NRCFOSS/
CDAC, India). It is Linux-like and with
multilingual ability to work with at least
18 languages and is boasting to replace
Windows in India (www.bosslinux.in)
Japanese OS:
The home grown computer
operating system from Japan, TRON,
(http://web-japan.org/trends/science/
sci030522.html) is credited to the
work by Professor Ken Sakamura of
the University of Tokyo in 1984, who
had advocated the idea of “ubiquitous
computing,” in which tiny semiconductor
chips are invariably embedded in every
product. TRON stands for ‘The RealTime Operating System Nucleus’. The
features like free open access to the
6
C S I C o m m u n ic a t i o n s | F E B R UA R Y 2 0 1 7
www.csi-india.org
COVER STORY
source code and very high speed of
data processing had made TRON an
attractive choice in cellular phones and
a large number of domestic electronic
goods.
The
Japanese
business
organizations mean to utilize TRON
or Linux in all devices connected to
internet (info-appliances). It had been
once estimated that about half of all the
embedded chips run on TRON.
Mobile Operating Systems (MOS):
In the rest of this article that
follows, the author emphasizes more
details on the mobile technology
operating systems that have become
part of daily routine in the past decade
revolutionizing the way common
people think of action at a distance and
globalization. This topic is also timely
when the emphasis is being laid on the
Digital India projects.
The mobile systems were primarily
meant for use in the telephonic
conversations. Then they eventually
started competing in the internet
technology claiming its share in
e-commerce, e-banking and e-learning.
The trend became deciding after 2010.
The major mobile operating
systems include:
(i)
Android based on Linux kernel,
is free open source introduced by
Google. It had been popular in the
smart phones and also in some
desktops,
(ii)iOS is proprietary software from the
Apple Inc. and is based on MacOS;
(iii)
Windows Phone is a Windows
10 (and earlier versions) based
platform and is closed source
proprietary software;
(iv)
Blackberry is a product of
BlackBerry
Limited
(formerly
Research in Motion Limited) and
is a closed source proprietary
product.
Other MOS known to the consumers,
but not so popular now, include Bada
from Samsung Electronics, Symbian
from Nokia, Palm OS from Access
Company Ltd. etc.. In Q1 of 2016 the
total sale for smart phones was more
than 1 billion world over; and the global
market share was 84.1% for Android,
14.8% for iOS, 0.7% for Windows phone
and 0.2% for Blackberry.
The Wikipedia article lists the
links that guide the reader to the major
literature related to the mobile operating
systems (https://en.wikipedia.org/wiki/
Mobile_operating_system)
Changes in Lifestyle and Emerging
Trends:
The competition for capturing the
market for internet technology on the
mobile systems had been well studied
by many marketing research agencies
(see Table 3.). Appearance of the World
Wide Web really turned the globe into
a village within the reach of common
people from the privacy of one’s own
home. Though the World Wide Web is
only about a quarter of a century old,
its growth and impact in human life is
undeniable. According to a survey about
half a billion new users got connected
to the web in 2014 alone, bringing the
total number of surfers to 3 billion
world wide. In a review in January
2015 (http://www.mobileindustryreview.
co m / 2 0 1 5 / 0 1 / 3 - b i l l i o n - i n t e r n e t users-2015.html; accessed Dec 20,
2016) more than 80% of the population
in Western Europe and the USA had
access to the internet compared to
about 19% in South Asian population.
According to one survey people were
spending on an average almost 4.5
hours daily in 2015 in comparison with
the 2 hours they used to spend about 10
years ago in this world that typified the
change on lifestyle adjusting to the age
of information technology. The number
of mobile broadband (3G and 4G) in UK
is 89% of population while the same
figure for India is merely 8% in the year
2015. These figures only speak of the
potential for the market of broad band
internet (mobile) technology when India
adjusts to the modern lifestyle after
digital penetration, especially in the
business sector. Average world wide
speed of the internet was 3.8 Mbps in
2013, whereas it had enhanced to 4.5
Mbps in 2015 world over. In UK 27%
of the web pages served to mobile
devices. Smart phones accounted for
38% of mobile connections worldwide,
and 40% of the world mobiles are
broadband enabled. New research
from leading analysts finds that over
1 billion mobile phone users will have
used their devices for banking purposes
by the end of this year. This global user
base is forecast to reach 2 billion by
2020, by which time it will represent
37% of the global adult population.
(https://www.juniperresearch.com/
press/press-releases/mobile-bankingusers-to-exceed-1-bn-this-year). The
mobile technology scenario in UK
is comparable to the USA in relative
terms, but India is falling behind China.
In essence the expansion in India is
likely to be faster beyond the year 2016.
The American lifestyle is taken as a
typical pattern of the rich and advanced
country that had adjusted to the mobile
and internet technology over a short
period of time, utilizing its existing
infrastructure of the PC, the main frame
computers and the e-mail presence.
According to a survey conducted during
2014, 90% of American adults own a
cell phone; 42% of American adults own
a tablet computer; 32% of American
adults own an e-reader. The utilization
of the mobile time pattern had been
described as follows: 81% of the cell
owners send and receive text, 60%
access internet, 52% receive e-mail,
50% download Apps as part of their
daily use (http://www.pewinternet.org/
fact-sheets/mobile-technology-factsheet/)).
Another survey cites that the
number of smart phone users
worldwide will surpass 2 billion in 2016,
(world population 7.4 billion in Aug 2016)
representing over a quarter of the global
population and that number is expected
to grow to more than 2.56 billion people,
or a third of the world’s population, in
2018. The vast amount of growth in the
use of smart phones will come from
China, the global leader in the market for
smart phone users. India is to become
the second largest, surpassing the USA,
in registered users of smart phone.
Alongside Russia is likely to surpass
Japan to become the fourth largest
smart phone user population. The
projected number of smart phone users
in the UK is 46 millions in 2018, and one
should compare this number with the
US population of about 325 millions in
December 2016 and the UK population
of about 65 millions in December 2016.
In conclusion the three countries, China,
India and Russia, are going to dominate
in the market capitalization of smart
phones by 2018 and beyond. (http://
7
C S I C o m m u n ic a t i o n s | F E B R UA R Y 2 0 1 7
COVER STORY
www.telegraph.co.uk/technology/
mobile-phones/11287659/Quarter-ofthe-world-will-be-using-smartphonesin-2016.html).
Conclusion:
The general discussion had
been on the hundreds of handsets
available from commercial vendors
and the salient features of their inbuilt operating systems [for example
see Wikipedia page] The private
communication in the 21st century
information technology had opened
up myriads of opportunities in day-today dealing of data including images
and voice. The upcoming technology
with its various applications software
running on the handsets has changed
the financial budgetary patterns in
many families and offices. Emphasis on
online and e-governance and availability
of such services on mobile systems can
appropriately be called m-commerce,
m-government and m-learning. In
addition to the routine use of mobile
platform to every customer, the author’s
group had used such opportunities for
furthering knowledge and research
as described earlier. This particular
article reviews the salient features of
the software behind that charming
looks of ‘consumable’ handsets rightly
called the ‘mobile operating system’,
and the changes in the ‘mobile’ lifestyle.
In addition the article distinguishes the
emerging markets for the computer
and mobile technology outside the USA
to point out the fact that the Indian
economy is likely to become a global
decision maker beyond 2018.
No instruction is required to
introduce the reader to the computer
and the world; such habits are included
and inculcated in every one of us in
our daily routine. The purpose of this
article is to make ordinary public and
the corporate executives aware of the
various systems commercially available
and their trends so that the reader can
form a well-informed opinion. Moreover
the vast literature cited through the
website links would be an added benefit
to the students and teachers alike for
the classroom exercises.
References:
[1] Ganguli,
S.(2015)
“Bioinformatic
Analysis of Medicinal Plants” presented
to the 2nd International Congress of the
Society for Ethnopharmacology, India
(SFEC2015) held at Nagpur during
Table 2 : Non-Us Operating Systems
Country
Russia
Russia
Product Name Primary Source of Informtion
Astra-Linux
www.astra-linux.com
Phantom
www.dz.ru/en
Russia
China
Germany
India
Japan
Sailfish
kylin
Rodos
BOSS
TRON
https://sailfishos.org
www.kylinos.com.cn
www.Dlr.de/rodos
www.bosslinux.in
http://tronweb.super-nova.co.jp/
homepage.html
Note: The sites were last accessed on Dec 22, 2016.
Table 3 : Market Share For Internet Technology:
Operating System
Market Share
Windows 7
47.17%
Windows 10
23.72%
Windows XP
8.63%
Windows 8.1
8.01%
Linux
>2.31%
MacOS (many versions)
>6%
February 20-22, 2015.
[2] Silberschatz, Abraham; Galvin, Peter;
Gagne, Greg (2008). “Operating Systems
Concepts”. John Wiley and Sons . ISBN
0-470-12872-0.
Table 1 : Global Market Share of
Operating Systems (as on June 2016)
Operating System
Percentage
Win 7
38.21
Win 10
19.92
MacOSX
9.05
Win8.1
7.89
Win XP
5.92
iOS
5.79
Android
3.71
Win 8
3.19
Linux
2.95
Win Vista
1.25
Others
1.35
In Jan 2014 Win 7 held a global
market share of 50.27% The Apple is
more popular in the USA where the US
market is about 20%.
Source: Accessed from http://www.
global.market-share on Dec. 20, 2016.
The table was compiled from the site that reports
statistics for internet technology online. The search was made
for desktop systems only for the current month. Windows
accounted for over 90%, Linux about 2.3% and Mac OS about
6% in December 2016.
Source: h
ttps://www.netmarketshare.com/operating-systemmarket-share.aspx?qprid=10&qpcustomd=0&qptime
frame=M&qpct=5 (last accessed on Dec 20, 2016)
About the Author
Dr. Subrata Ganguli, a Life Member of the
Computer Society of India, was a faculty
member in the Departments of Biotechnology,
at the Shridevi Institute of Engineering
and Technology, Tumkuru, Karnataka; the
MVJ College of Engineering, Bangaluru,
Karnataka; and the Calcutta Institute of Pharmaceutical
Technology, Howrah, West Bengal . He was educated at
the IIT Kharagpur, IIT Delhi, and the University of Illinois at
Chicago. He was the top ranker in his B.Tech. (Hons.) class
in Chemical Engineering. He has more than ten years of
teaching experience to his credit.
8
C S I C o m m u n ic a t i o n s | F E B R UA R Y 2 0 1 7
www.csi-india.org
Technical Trends
Blockchain : A Disruptive Innovation
KVN Rajesh
KVN Ramesh
M.Tech in Computer Science and Technology from Andhra University M.E in Structural Engg. from Andhra University
Demonetisation
in
India
in
November-2016 has been the greatest
disrupter to Status quo in terms of
economy and finance in the history of
Post Independent India. Taking queue
from India, Venezuela too announced
on 11-Dec-2016 that its 100-bolivar big
note would cease to be legal tender
within 72 hours of the announcement.
There has been great discourse
and debate between Government,
Opposition and common public in
India about the merits and de-merits
of cash economy and the advantages
of move to a cashless digital economy.
Black money, fake currency, terrorism,
tackling money laundering and move
to cashless digital economy have been
projected by the Government as the
reasons for Demonetisation. The Indian
Government in no uncertain terms has
conveyed its intention that cashless or
less cash Digital economy is the way
forward and has announced a number
of incentives to promote cashless digital
transactions. The literacy rate in India
is around 75% and digital literacy rate
would be definitely much lower than
that. With lower digital literacy among
the population, the increase in digital
financial transactions is likely to lead
to increase in number of cyber financial
crimes. Even large financial institutions
with powerful and secure technical
infrastructure are not immune to the
attacks by hackers and cyber criminals.
When financial infrastructure is
concentrated and centralized in the
hands of few institutions, they are always
prone to attack from both inside and
outside of the respective organizations.
In this context, a technology which
is immune to tampering is bound to
be successful and find widespread
application. Blockchain is precisely
that kind of technology. The Blockchain
is a big buzzword now-a-days and is
being promoted as the next big thing
after the Internet. The Blockchain is
usually heard in conjunction with the
cryptocurrency named Bitcoin, since
Blockchain is the technology behind
Bitcoin. The author of this article,
K.V.N.Rajesh, had also written an
article titled “BITCOIN - An Overview
of the Popular Digital Cryptocurrency”
back in March 2014 in the same CSI
Communications. He commented in the
conclusion of that article that whether
Bitcoin will succeed or not, only time
can tell, but the concept behind Bitcoin
is here to stay. That has come exactly
true and Blockchain technology is
finding application at every place where
transactions between two or more
parties are involved. The terms like
Internet of Transactions, Internet of
Value and Internet of Trust are being
used in the context of Blockchain. The
objective of this article is to explain
the Blockchain technology and its
various applications. Since Bitcoin and
Blockchain are tightly intertwined, we
are at many times referring to Bitcoin in
this article to explain about Blockchain.
Origin of Blockchain
A Blockchain is a shared,
distributed, immutable, public ledger
of continuously growing and updated
list of transactions. A group of validated
transactions are aggregated into a
block and each block contains data
about the previous block thus creating
a chain of blocks in chronological order.
The origin of Blockchain and Bitcoin
is linked together. It all started with a
post titled “Bitocin P2P e-cash paper”
by an anonymous developer named
Satoshi Nakamoto on 01-Nov-2008 on
a cryptography mailing list at http://
www.metzdowd.com/mailman/listinfo/
cryptography. The original post is still
available at http://www.mail-archive.
com/[email protected]/
msg09959.html. The post contained
summary details of Bitcoin and a
link (https://bitcoin.org/bitcoin.pdf) to
the nine-page technical paper titled
“Bitcoin: A Peer-to-Peer Electronic
Cash System” authored by Satoshi
Nakamoto. The announcement of
the first release of the Bitcoin (v0.1)
happened on 09-Jan-2009 on the same
cryptography mailing list. The post
is still available at http://www.mailarchive.com/cryptography@metzdowd.
com/msg10142.html. Satoshi
Nakamoto also made a post titled
“Bitcoin open source implementation of
P2P currency” at http://p2pfoundation.
ning.com/forum/topics/bitcoin-opensource on 11-Feb-2009 about the
release of Bitcoin v0.1 at http://www.
bitcoin.org. The first transaction on
the Bitcoin Blockchain happened on
12-Jan-2009 when Satoshi Nakamoto
sent 10 bitcoins as a test to another
computer cryptographic programmer
named Hal Finney. The record of this
first Blockchain transaction in the Block
#170 of the Bitcoin Blockchain can be
seen at https://blockchain.info/blockindex/15019.
At the time of its release, Bitcoin
consisted of thirty-one thousand lines
of code. The latest executable version
of Bitcoin Core is available for download
at https://bitcoin.org/en/download
and it is available as a free software
project released under MIT License.
The Bitcoin source code is available at
https://github.com/bitcoin/bitcoin. It
can be seen in the source code that the
programming language predominantly
used is C++.
Understanding the concept of
Blockchain
The world financial crisis in the
late 2000s and systematic banking
collapses such as that of Lehman
Brothers, seems to be the motivation
behind Satoshi Nakamoto’s coming up
with the Bitcoin. The value of money in
the existing financial system is based
on the trust created by a third party
and intermediaries like Governments,
Central Banks and Financial systems.
Satoshi Nakamoto created a system
where the trust is based on nonhuman entity which is the code and
cryptography designed in such a way
that it is almost impossible to tamper
and manipulate. The design itself is
9
C S I C o m m u n ic a t i o n s | F E B R UA R Y 2 0 1 7
Technical Trends
such that it is more profitable to be
honest and play by the rules rather than
be dishonest and try to manipulate the
system. Any effort to beat the system
by the use of large scale computing
power is bound to be detected by
the other honest participants since
Blockchain is not centralized and is a
global distributed ledger. The attempt
is bound to fail and hence would lead
to a loss of investment in the dishonest
efforts. The same efforts when spent
to play by the rules of the system may
lead to the incentives and rewards given
the system. Thus the motivation would
be to play by the rules and be honest.
The subsequent part of this section
describes how the Blockchain has been
designed to establish trust.
Everybody must have heard of a
ledger. Ledger is a book or software
for record keeping of transactions of
companies, organizations, banks and
any other institution. Institutions use
many kinds of ledgers like Sales Ledger,
Purchase Ledger and General Ledger.
Blockchain
is
a
software
implementation of a distributed and
shared ledger based on cryptographic
concepts.
A
highly
simplified
explanation of the Blockchain is as
follows. A diagrammatic representation
of Blockchain is available in Fig 1 and
Fig 2. Whenever a transaction happens
between two parties, the transaction
is broadcast to the entire Blockchain
network. At intervals of time, the group
of transactions that happened after the
creation of last block are validated. Once
the validation is complete, a new block is
generated. The average interval of time
between creation of two blocks is 10
minutes. The new block is timestamped
and made immutable to tampering by
cryptographic and hashing algorithms.
The validation of the block is carried
out by people known as miners. Each
of the miner competes to complete
the validation faster than the others. In
case of Bitcoin Blockchain, the miner
who completes the validation first
and leads to the generation of a new
block receives the rewards in terms of
Bitcoin. Each of the blocks is connected
to its previous block by storing the hash
of the header of previous block. This
connection of one block to another
forms a virtual chain similar to a linked
list and thus the name Blockchain. This
Blockchain is distributed and stored on
all nodes of the Blockchain network.
The header of the Block also contains
something called a Merkle Tree which is
the summary of all the transactions in
the block. The Merkle Tree also called
a Binary Hash Tree, acts as a digital
fingerprint of all the transactions in the
block. Merkle Trees in Blockchain use a
cryptographic algorithm named doubleSHA256. SHA256 is the secure hash
algorithm designed by National Security
Agency. SHA256 is a set of cryptographic
hash functions whose key characteristic
is that no two different inputs can
produce the same hash output. Even
a slightly different input will produce a
vastly different hash output. To illustrate
this point, an online SHA256 generator
at http://www.timestampgenerator.
com/tools/sha256-generator/ is used.
The
SHA256
hash
output
for the
string “I am Rajesh” is
751d34e6ade738e0e60e063b3dfa1b76a
83f90af4e123b2c3e903c19e9c58fdd
Let us change the string a little bit
by adding a period at the end of the string
as “I am Rajesh.”. The SHA256 output
for the same is vastly different and is
f55ac225cc2442877d0fa51163c142c471
f870531edd802b60deb85752e4ce18
Any attempt to hack the Blockchain
would involve not just tampering
the current block but the history of
transactions in all the previous blocks.
Also, since this distributed ledger is
stored on all the nodes of network, the
tampering needs to be done on all the
nodes at the same time else there will
be disagreement between the nodes
and the tampering would get detected
and the block would not be validated
and included in the Blockchain. With the
day by day growth of the Blockchain and
the number of nodes in the network, the
level of difficulty of tampering would
keep on increasing exponentially. This
extreme resistance to tampering of
Blockchain by the virtue of its design
and code is the characteristic which
brings trust in the system. That is
the reason why Blockchain is finding
many applications in various systems
wherever transactions between various
parties are involved.
One of the main problems
associated with cryptocurrencies is
the problem of Double-Spending. In
normal cash transaction, when you
give a note or a coin to another person,
there is no way that you can give the
same note or coin to another person
since cash is a physical entity and
cannot have multiple presence by the
laws of physics as we know now. But
Double-Spending is a real problem
for the cryptocurrencies since there is
no physical entity involved. If you are
able to spend the same currency even
after giving it to another person, the
currency system is bound to collapse
within short time. The success of the
Blockchain technology is largely due to
it having solved this Double-Spending
problem. Every transaction added to
the block chain is verified to ensure that
the inputs to the transaction have not
already been spent. In other systems,
a trusted third party validates the rules
and confirms each transaction, but the
whole premise on which Bitcoin and
Blockchain is based, is not having a third
party. In Bitcoin, the need for various
nodes of the Blockchain network to
be in consensus prevents the DoubleSpending problem.
Genesis
Block
Header of
Block N
Header of
Block “N+1”
Header of
Block “N+2”
Previous
Block Hash
Previous
Block Hash
Previous
Block Hash
Timestamp
Timestamp
Timestamp
Merkle
Root
Merkle
Root
Merkle
Root
Transactions in
Block N
Transactions in
Block “N+1”
Transactions in
Block “N+2”
Transaction Blocks 1
to “N-1”
Fig. 1 : Simplified Representation of Blocks
in Blockchain
Variants of Blockchain
The two variants of Blockchain are
Public Chain and Private Blockchain.
Public Blockchains are the Blockchains
in which anyone in the world can
read, transact and participate in the
consensus process. Permissionless
Blockchains is another term frequently
used with regards to Public Blockchains
since anybody can use it and anybody
can become a miner in it without any
permission from any authority. Bitcoin
Blockchain is an example of Public
Blockchain. Private Blockchains are
10
C S I C o m m u n ic a t i o n s | F E B R UA R Y 2 0 1 7
www.csi-india.org
Technical Trends
Blockchain
Ledger
Blockchain
Ledger
Blockchain
Ledger
Node 2
Node 3
Node 1
Blockchain
Ledger
Blockchain
Ledger
Node N+1
Node N
Fig. 2 : Simplified Representation of Blockchain
the Blockchains where the users who
can read, transact and participate are
restricted. Private Blockchains are the
Blockchains which are of more interest
to the Businesses since they get all the
advantages of the Blockchain while
retaining a tight control on who does
what in the system. There are again
variants like Consortium Blockchains
and Fully Private Blockchains here.
Private Blockchains are also known
as Permissioned Blockchains since
users need permission to access the
Blockchain. One example of the Private
Blockchain is the distributed consensus
ledger system by a company named
Ripple for the banking and Financial
industry.
Hyperledger is another open
source collaborative project to advance
cross-industry Blockchain technologies
for various industries like Finance,
Banking, Internet of Things and Supply
Chain.
Advantages and Applications of
Blockchain
More than the Bitcoin, it is the other
possible applications of Blockchain that
is causing such hype and excitement
about this technology. Lesser costs and
unprecedented speed of transactions
due to absence of intermediaries is being
seen as one of the main advantages of
usage of Blockchain; Technology. Other
advantages that are being seen are
the ease of conducting transactions,
security,
efficiency,
transparency,
neutrality and traceability.
Any common man who has dealt in
real estate or is buying land or plot knows
how hard it is to trust about whether he
is buying from the correct legal owner
of the property and if the property has
not already been sold to somebody else.
Blockchain technology will bring great
transparency when applied to Land
Registry Systems. Sweden is conducting
tests to implement Blockchain in
its Land Registry and real estate
transactions. Central American country
named Honduras is taking help of a U.S.
Blockchain technology company named
Factom to apply Blockchain technology
in building a permanent and secure
land title record system.
Smart and self-executing contracts
are another area where Businesses
are evincing great interest to apply
and use Blockchain technology. Smart
contracts are contracts where the
contractual terms are written in special
computer programming languages.
In the current scenario, the contract
funds are deposited with a third party
escrow account. The third party does
verification and then releases funds
to the concerned party on completion
of contractual agreements. The third
party charges certain percentage of
the contractual amount for its services.
The Smart Contracts with Blockchain
as the underlying technology can
discard the Intermediary. The funds
could be deposited to a virtual account
and the Smart Contract Code can
automatically release the funds to the
concerned party on fulfillment of the
contractual agreements listed in the
computer language code. This would
be more transparent and can save the
money spent on the third party services.
The decentralized platform named
Ethereum developed by Ethereum
Foundation is one of the solutions which
runs smart contracts.
It is not uncommon to see the
political parties raising the issue of
vote tampering after elections. The
application of Blockchain in voting
in democracies is being visualized
to prevent the possibility of vote
tampering. This is to prevent rigging and
to secure the votes by recording them
in Blockchain database which is highly
immune to tampering. In December
2016, a Block chain voting project
named Votebook by three New York
University Students won the $10,000
prize in a challenge from Kaspersky
Lab.
Blockchain – Indian Perspective
Being at the forefront of Information
technology industry, India and Indians
are not the ones to be left behind on
something as path-breaking and as
disruptive as Blockchain. India’s top
Business group Mahindra is partnering
with IBM on applying Blockchain in the
supply chain finance business. They are
also working on integrating Blockchain
and Internet of Things solutions for
tracking truck movements and delivery
times of goods.
In June 2016, Reserve Bank
of India expressed its intention to
setup a committee to study usage of
Blockchain to reduce use of Paper
currency. The Sunrise State of Andhra
Pradesh has introduced the Blockchain
technologies to prevent cybercrimes.
It introduced Blockchain in some of its
departments to prevent its databases
from being hacked. Andhra Pradesh
is also planning to setup a Blockchain
Technology Institute in the port city of
11
C S I C o m m u n ic a t i o n s | F E B R UA R Y 2 0 1 7
Technical Trends
Visakhapatnam in collaboration with
University of California, Berkeley.
In October-2016, ICICI bank
announced that it carried out India’s
first Blockchain transactions for
fund remittance between its Mumbai
branch and Dubai branch of Emirates
NBD Bank. ICICI bank also carried
out a Blockchain network based pilot
transaction involving a Mumbai firm
and a supplier from Dubai for import
of steel scrap. Two other Indian Banks
named Kotak Mahindra and Axis Bank
are conducting pilot transactions using
Blockchain and are experimenting it in
various Business segments.
Kratos Innovation Labs, a Singapore
based startup founded by two Indians
named Satheesh Kumar Paddolker
and Rajiv Kaushik, has developed two
blockchain products named x-DeFraud
and Smart Contracts as a Service
(SCaaS). These products are related
to detecting fraud in trade finance and
customized Smart Contract solutions
for financial institutions.
An Infosys subsidiary named
EdgeVerve has released a Blockchain
Framework for Financial Services,
which is a shared distributed ledger
solution for payments, trade finance,
smart contracts and other transactions.
TCS is also investing in Blockchain
technology and is getting ready to
launch a core banking software based
on Blockchain. Cognizant entered into
an agreement with Japan based Mizuho
Financial Group to develop Blockchain
solutions for its customers and group
companies.
Learning Resources for Blockchain
As already mentioned, Bitcoin was
the first purpose for which Blockchain
technology was developed by Satoshi
Nakamoto, so learning about Blockchain
invariably involves understanding the
implementation of Bitcoin Blockchain.
To learn about Blockchain straight
from the horse’s mouth, we can refer
to Blockchain section of the bitcoin
developer guide at https://bitcoin.org/
en/developer-guide#block-chain. This
website https://bitcoin.org was originally
registered by Satoshi Nakamoto and
another developer named Martti
Malmi. A host of other documentation
is available at https://bitcoin.org/en/
developer-documentation.
The Bitcoin wiki at https://
en.bitcoin.it/wiki/Main_Page is another
one-stop shop for all things related
to Bitcoin and Blockchain. The main
interest now in Blockchain is due
to the various purposes other than
Bitcoin for which it can be applied to.
The following link https://en.bitcoin.it/
wiki/Alternative_chain at Bitcoin wiki
explains the same in detail.
One another accessible way to
learn about Blockchain is by enrolling
and attending the Free Massive Open
Online Course on Bitcoin at https://
www.coursera.org. There is a course
named “Bitcoin and Cryptocurrency
Technologies” created by Princeton
University and taught by Arvind
Narayanan, Assistant Professor in
Computer Science. It is available at the
following link:
https://www.coursera.org/learn/
cryptocurrency
There is a free self-paced online
course titled “IBM Blockchain for
developers” available at the following
l i n k : h t t p s : // d eve lo p e r. i b m . co m /
courses/all-courses/blockchain-fordevelopers/
Conclusion
In these times when the Government
has declared war on corruption and
people are demanding increasingly
fast, efficient and transparent services
from the Government and Businesses,
the Block chain technology is bound
to come into picture sooner than later.
Blockchain based identity management
and financial solutions can be used to
accelerate the move towards cashless
economy which the Government is
aiming for. Blockchain technology
can reduce the cost of cross-border
remittances which is fueling the
economies
of
many
developing
countries. More and more applications of
Blockchain to various systems involving
transactions are bound to be developed
and implemented across the world.
This is definitely going to have positive
impact on the Global Economy and also
going to provide a lot of opportunities to
people and organizations skilled in the
Blockchain technologies.
References
[1] http://www.coindesk.com/ibmblockchain-mahindra-supplychain/
[2] http://economictimes.indiatimes.
com/small-biz/security-tech/
technology/mahindra-drops-thecoin-on-blockchain-to-managebooks/articleshow/55718325.cms
[3] http://indiatoday.intoday.in/story/
andhra-pradesh-asia-blockchaintechnology-cyber-crimecashless/1/835037.html
[4] http://timesofindia.indiatimes.
com/city/visakhapatnam/AP-govtplans-blockchain-tech-institutein-port-city/articleshow/55298937.
cms
[5] h t t p : / / w w w . t h e h i n d u . c o m /
business/ICICI-Bank-executesIndia%E2%80%99s-firstt r a n s a c t i o n - o n - b l o c kc h a i n /
article15894311.ece
[6] http://www.livemint.com/Industry/
loztj0R98Ea6m58Ng8jUzM/
Blockchain-technology-catchesAxis-Kotak-Mahindras-fancy.html
[7] h t t p : / / w w w . l i v e m i n t .
c o m / C o m p a n i e s /
bXjPtlHZRK46FQVb2hxhyN/TCSthrows-weight-behind-blockchain.
html
[8] https://www.washingtonpost.com/
news/the-switch/wp/2014/01/03/
hal-finney-received-the-firstbitcoin-transaction-heres-howhe-describes-it/
[9] h t t p : / / e c o n o m i c t i m e s .
indiatimes.com/small-biz/
startups/fraud-proof-kratosinnovations-blockchain-techcan-save-millions-for-banks/
articleshow/55888342.cms
[10] h t t p s : // w w w. e d g e v e r v e . c o m /
finacle/solutions/Documents/
edgeverve-blockchain-financialservices.pdf
[11] h t t p : / / w w w. n e w y o r ke r. c o m /
magazine/2011/10/10/the-cryptocurrency
[12] https://en.bitcoin.it/wiki/Doublespending
[13] http://chimera.labs.oreilly.com/
b o o ks / 1 2 3 4 0 0 0 0 0 1 8 0 2 / c h 0 7 .
html#merkle_trees
[14] h t t p : / / w w w . r e u t e r s . c o m /
12
C S I C o m m u n ic a t i o n s | F E B R UA R Y 2 0 1 7
www.csi-india.org
Technical Trends
article/us-sweden-blockchainidUSKCN0Z22KV
[15] http://in.reuters.com/article/
usa-honduras-technologyidINKBN0O01V720150515
[16] http://www.itworldcanada.com/
article/how-blockchain-basedsmart-contracts-can-help-growyour-business/382611
[17] h t t p : / / g s n m a g a z i n e . c o m /
Ripple_(payment_protocol)
article/47589/nyu_students_
win_award_solution_safeguard_
electron
[18] https://www.ethereum.org/
[19] h t t p s : / / b l o g . e t h e r e u m .
org/2015/08/07/on-public-andprivate-blockchains/
[20] https://www.smithandcrown.com/
permission-blockchains/
[21] https://en.wikipedia.org/wiki/
[22] https://www.hyperledger.org/
[23] http://timesofindia.indiatimes.
com/business/india-business/RBIto-study-Blockchain-technologyto-curtail-paper-currency/
articleshow/52906383.cms
[24] https://shocard.com/ About the Authors
Mr. K.V.N.Rajesh [CSI-I1503325] is M.Tech in Computer Science and Technology from Andhra University in 2010.
He is the Head of the Department and Senior Assistant Professor in Department of information technology at
Vignan’s Institute of Information Technology, Visakhapatnam since 2005. He is a member of Computer Society
of India. His research interests include Business Intelligence, Location Intelligence and Big Data and he has
published papers in the respective areas. He can be reached at [email protected].
Mr. K.V.N.Ramesh is M.E in Structural Engineering from Andhra University. He has 15 years of experience in
IT industry with expertise in the area of Data Warehousing and Business Intelligence. He has worked on UNIX,
Oracle, Sybase, Business Objects, OBIEE and Tableau during these years. He is an Oracle certified professional
in Oracle DW and OBIEE. He is currently working as Project Manager at Tech Mahindra, Visakhapatnam. He
can be reached at [email protected].
(ADVERTISING TARIFF)
Rates effective from April, 2014
CSI Communications
COLOUR
Colour Artwork (Soft copy format) or positives are
required for colour advertisement
MECHANICAL DATA
Back Cover
` 50,000/-
Full page with Bleed
28.6 cms x 22.1 cms
Inside Covers
` 40,000/-
Full Page
24.5 cms x 18.5 cms
Full Page
` 35,000/-
Double Spread with Bleed
28.6 cms x 43.6 cms
Double Spread
` 65,000/-
Double Spread
24.5 cms x 40.0 cms
Centre Spread
(Additional 10% for bleed advertisement)
` 70,000/-
Special Incentive to any Individual/Organisation for getting sponsorship 15% of the advertisement value.
Special Discount for any confirmed advertisement for 6 months 10%.
Special Discount for any confirmed advertisement for 12 months 15%.
All incentive payments will be made by cheque within 30 days of receipt of payment for advertisement.
All advertisements are subject to acceptance by the editorial team.
Material in the form of Artwork or Positive should reach latest by 20th of the month for insertion in the following month.
All bookings should be addressed to :
Computer Society of India
TM
Unit No. 3, 4th Floor, Samruddhi Venture Park, MIDC, Andheri (E), Mumbai-400 093.
Tel. 91-22-2926 1700 • Fax: 91-22-2830 2133 | Email: [email protected]
13
C S I C o m m u n ic a t i o n s | F E B R UA R Y 2 0 1 7
n
R esearch front
Customized Linux Distributions for
Bioinformatics Applications
Khalid Raza & Sahar Qazi
Department of Computer Science, Jamia Millia Islamia (Central University), New Delhi-110025. Email: [email protected]
Introduction
The creation of this beautiful
universe is the witness of the
systemization of everything. To better
understand this concept, we can have
a look at our ‘Genome’. The genome is
said to be the “Blueprint” of an organism
since it is composed of the whole set
of genes and gene products. It is the
genome which is known to control and
regulate the framework of an individual.
Complex systems are defined as large
numbers of interactions among various
constituents. The genome is the janitor
of the living organisms managing
everything; very similarly, we have the
operating system which is the most
essential part of any computer system
(Yan et al., 2010). The main purpose of an
operating system is to provide a milieu
where the user can interact and execute
the programs in a very easy yet efficient
manner. Due to rapid advancement and
applications of computational biology
and bioinformatics in biomedical and
pharmaceutical
industries,
there
has been a need for the creation
of operating system which suites
the requirements of computational
biologists and medical scientists. This
article focuses on operating system
customized for computational biology
and bioinformatics applications.
Advent of open source operating
systems and Linux distributions
With the advent of free and open
source software (FOSS), this movement
has overtaken operating systems
causing many of them to be made
available. Since the source code is
available freely under FOSS movement,
the detailed study of operating systems
became quite easy. Some of the
examples of open source operating
systems are Linux (1991), FreeBSD
(1993), Ubuntu (2011), etc. The initial
effort for the movement was started by
Richard Stallman in 1983 under GNU
Project and later in 1985 GNU Manifesto
was published to outline the purpose
and importance of free and open source
software. The biggest breakthrough of
open source operating system began
with the development and release
of Linux by a Finnish student Linux
Torvalds in 1991; who developed a free
kernel of the operating system and
released it under GNU General Public
Licence. Since then, there have been a
large number of Linux distribution, a list
of top 10 distributions is shown in Fig. 1.
Puppy
Linux
Arch
Linux
Consultative Expert Working Group for
Research and Development Financing
and Coordination has evaluated open
source drug discovery (Årdal et al.,
2011). Pharmaceutical companies have
contributed a lot to the discovery of
drugs for many diseases. Few research
based pharmaceutical industries have
also made commendable efforts to
discovery drugs for T.B. Some of the
customized Linux for bioinformatics
and computational biology applications
are described as follows and depicted
in Fig. 2.
Ubuntu
Fedora
Linux
Mint
Top 10
Linux
distributions
open
SUSE
Sabayon/
Gentoo
Mandriva
Debian
PCLinux
OS
Fig. 1 : Top 10 Linux distributions
Customized Linux for Bioinformatics &
Computational Biology Applications
The advent of open source
operating systems leads to the
development of customized operating
systems
for
various
purposes
including computational biology and
bioinformatics applications (Årdal et
al., 2011). Pharmaceuticals are an
often mentioned application area for
customized operating system for drug
discovery. Open source utilization in
the field of pharmaceuticals paving, or
rather has already paved a way for the
development of this prominent field
known as Chemoinformatics. The WHO’s
Fig. 2 : Five popular customized Linux
tailored for bioinformatics applications
BioLinux: It is a free bioinformatics
platform built on Ubuntu Linux LTS
based, providing more than 250
bioinformatics packages, 50 graphical
applications, and hundreds of command
line utilities. The recent Bio-Linux
version 8.0 also incorporates Galaxy
environment for browser-based data
analysis. The Bio-Linux is created and
maintained by NERC Environmental
Bioinformatics Centre (NEBC). It is not
only available for workstation but also
on cloud architecture such as Amazon
EC2 by using CloudBioLinux. It can also
run directly from a DVD/USB without
installing analysis (Field et al., 2006).
BioSLAX: It is also a customized
operating system for bioinformatics
build on SLACKWARE flavour of the
14
C S I C o m m u n ic a t i o n s | F E B R UA R Y 2 0 1 7
www.csi-india.org
R esearch front
Linux, comprises of more than 300
bioinformatics tools. It directly runs
from the DVD/USB without the need of
installation, and let the user modularize
applications and plug it into the system
on the fly. It was first released by Life
Sciences Institute (LSI), National
University of Singapore in 2006.
DNALinux: It is also a virtual
machine based on SLAX having lots
of bioinformatics tools including
AutodockSuite, Biopython, BLAST,
ClustalX, EMBOSS, NCBI Toolkit, and
so on. Since its first release in 2007,
there is subsequence releases (Bassi &
Gonzalez, 2007).
OSDDLinux: The main objective of
Open Source Drug Discovery (OSSD)
Linux is to create a novel open source
computational
and
experimental
platform for drug discovery. It allows
universities, researchers, students,
organizations and pharmaceutical
industries world-wide on scientific
projects to contribute for drug design
and discovery. The OSDDLinux operating
systems capability is not just restricted
to drug designing, but encompasses
various fields of bioinformatics analysis
and computational biology as well.
LXtoo: It is another customized
Linux distribution for bioinformatics
research community, where “LX” stands
for LiangXian and “too” indicates that it
is based on Gentoo. It is distributed as
LiveCD/LiveUSB and run within VMware
too for parallel execution with host
operating system (Yu et al., 2012).
Summary
The field of Bioinformatics has
made commendable contributions in
understanding the modern biology.
Bioinformatics software and tools
packaged with Linux Operating system
to offer a better and cheaper way to
set up an influential workbench for
computational biologists. Today, Linux
operating system comes with attractive
desktop environments, which are easier
to use without much training. Also,
Linux is virtually resistant to Trojans and
viruses, it is definitely a better choice
for any life science researcher willing
to perform biological computations.
Today’s research is open to computer
technology irrespective of the fact of
what scientific background it belongs to.
Bioinformatics tools are available freely
for all scientific backgrounds. Many
operating systems mentioned above
Table 1 : A summed up table presenting few most popular customized Linux tailored for
bioinformatics and computational biology applications.
Name
Developer/
Distribution
Year of first Current version
release
BioLinux
NERC Environmental
Bioinformatics Centre
2006
BioLinux 8.0
ABYSS,
Assembly-conversion-tools,
axiome,
BAMTools, Beam2, BedTools, Big-BLAST, BitSeq,
BLAST2, Bowtie Tools, BWA, ClustalW/X, Cufflinks,
Cytoscape, DiAlign, EMBOSS, FastQC, FastTree,
Galaxy-Server, Geneious, GNX-Tools, HMMER, Jalview,
Jellyfish, , BioJava Library, Muscle, MView, NRDB,
Phylip, Pymol, R with several packages, Rasmol,
SamTools, T-coffee, many more.
BioSlax
National University of
Singapore
2006
BioSLAX 8.0
BLAST, BioGrep, ClustalW, EMBOSS, Genesplicer,
HMMER, GlimmerHMM, Modeller, PamL, Phylip,
Primer3, R & Bioconductor, T-Coffee, JAligner,
Jalview, jEMBOSS, Jmol, NJPlot, Pymol, ReadSEQ,
TreeView, Weka, etc.
No subsequent
release
Tools for Genome and Proteome Annotation, Vaccine
and Drug Informatics, Biotherapeutics, NGS data
analysis, GPSR basic scripts & several third party
software
OSDDLinux CSIR - Institute of
Microbial Technology,
India
—
Important bioinformatics tools available
DNALinux
Genes Digitales and
Quilmes
National
University, Argentina
2007
No subsequent AutodockSuite, Biopython, BLAST, ClustalX, EMBOSS,
release
EMNU, ESIM, FinchTV, HMMER,
IPRSCAN, Kalign, MIRA, NCBI Toolkit, Phylip, Primer,
Pymol, Rasmol, Readseq, Sigma Align, TreeView,
Vienna RNA, and many more.
LXtoo
Jinan University, China
2012
No subsequent NCBI tools, EMBOSS and SMS2 for sequence analysis,
release
Sequence alignment tools - ClustalW/X, Gene finder
tools - qRNA, Glimmer; miRNA target prediction tool
PITA; Vienna for RNA secondary structure prediction
and comparison; Network analytical tools like
Cytoscape and igraph library; GOSemSim for GO and
DO semantic study; TM4 and bioconductor packages
for Microarray analysis and many more.
15
C S I C o m m u n ic a t i o n s | F E B R UA R Y 2 0 1 7
R esearch front
contain bioinformatics tools, and thus,
come under the ocean of FOSS (Free
and Open Source Software), making it
very easy for students & researchers
to practice and to study biological
phenomenon in a new light. There is an
open choice for researchers to choose
from several fully loaded operating
systems, and this choice is increasing
day-by-day, with new technologies
coming in. The open-source operating
systems is very easy to work with and
without any doubts, has been proven to
yield successful results, thus, making it
a part-n-parcel of the modern biological
laboratories.
References
[1] Årdal, C.,
Alstadsæter,
A.,
&
Røttingen, J. A. (2011). Common
characteristics of open source
software
development
and
applicability for drug discovery: a
systematic review. Health Research
Policy and Systems, 9(1), 1.
[2] Bassi, S. and Gonzalez, V. (2007).
DNALinux Virtual Desktop Edition.
Available from Nature Precedings
http://dx.doi.org/10.1038/
npre.2007.670.1
[3] Field, D., Tiwari, B., Booth, T.,
Houten, S., Swan, D., Bertrand,
N. and Thurston, M.( 2006). Open
Software for biologists: from famine
to feast. Nature Biotechnology 24,
801 - 803.
[4] OSDDLinux: a custom operating
systems for drug design, http://
osddlinux.osdd.net/ Accessed on
January 1, 2017.
[5] Yan, K. K., Fang, G., Bhardwaj,
N., Alexander, R. P., & Gerstein,
M. (2010). Comparing genomes
to computer operating systems
in terms of the topology and
evolution of their regulatory
control networks. Proceedings
of the National Academy of
Sciences, 107(20), 9186-9191.
[6] Yu, G., Wang, L. G., Meng, X.
H., & He, Q. Y. (2012). LXtoo: an
integrated live Linux distribution
for the bioinformatics community.
BMC Research Notes, 5(1), 360.
n
About the Authors
Dr. Khalid Raza (CSI Member ID 01060359) is an active researcher and working as an Assistant Professor at
the Department of Computer Science, Jamia Millia Islamia, New Delhi. He has contributed one book, two book
chapters, and over 25 research articles in refereed international journals and conference proceedings. His
research interests lies in computational biology, Biological Data Analytics and Soft Computing.
Ms. Sahar Qazi is doing her Master of Science in Bioinformatics from Jamia Millia Islamia. Her research
interest lies in Biological Big Data Analytics and Bioinformatics.
an individual.
2 are friends.
3 is company.
more than 3 makes a society. The
arrangement of these elements makes
the letter ‘C’ connoting ‘Computer
Society of India’.
the space inside the letter ‘C’ connotes
an arrow - the feeding-in of information
or receiving information from a computer.
CSI Headquarter :
Samruddhi Venture Park, Unit No. 3,
4th Floor, MIDC, Andheri (E),
Mumbai-400093, Maharashtra, India
Phone : 91-22-29261700
Fax : 91-22-28302133
Email : [email protected]
CSI Education Directorate :
CIT Campus, 4th Cross Road, Taramani,
Chennai-600 113, Tamilnadu, India
Phone : 91-44-22541102
Fax : 91-44-22541103 : 91-44-22542874
Email : [email protected]
16
C S I C o m m u n ic a t i o n s | F E B R UA R Y 2 0 1 7
CSI Registered Office :
302, Archana Arcade, 10-3-190,
St. Johns Road,
Secunderabad-500025,
Telengana, India
Phone : 91-40-27821998
www.csi-india.org
SECURITY CORNER
Cyber Threat Analysis with
Memory Forensics
Hardik Gohel
Himanshu Upadhyay
Working in Cyber Security Research
Project Management Professional
Introduction
In today’s world, the dependency
on computers is growing extensively.
Government agencies and private
companies are attempting to protect
themselves from cyberattacks with
digital
defense
techniques
like
encryption, firewalls and heuristic or
signature scanning, etc. Meanwhile,
the number of attacks that include
infiltrating military data centers,
targeting power grids and stealing trade
secrets from both private and public
organizations continues to increase.
The detection, response and reporting
of these kinds of intrusions as well
as other incidents involving computer
systems, are crucial for cyber security
professionals.
As these attacks continue to
expand and the sophistication of the
adversaries grow, defenders must adapt
in order to survive. If proof-of-damage
is never written to secondary storage,
there is no way to rely on disk forensics.
On the other hand, memory has a high
potential to carry malicious code from
an infection, partially or completely,
even though it’s never written to
secondary storage (e.g., a hard drive).
This is because the malicious code is
loaded into the memory to execute.
The random access memory of the
victimized system also contains the
proof of the system resources allocated
by malicious code.
Just like that, if the data taken from
the organizationis encrypted across the
network,to determine which sensitive
files were stolen and that won’t be
recognized by traditional packet capture
techniques. However, passwords and
encrypted keys can often be recovered
by memory forensics, or even the file’s
plain-text contents before they were
encrypted, providing information to
understand the scope of an attack.
CPU
Cache
Ram
Virtual
Memory
Disk
Storage
Fig. 1 : Flow of Memory Storage
Memory Forensics
In the world of digital forensics,
memory forensics is arguably the most
interesting and fruitful realm. Memory
forensics involves analyzing the data
stored in the physical memory at
operating system runtime. Its primary
application is in the investigation of
advanced computer attacks which
are stealthy enough to avoid leaving
data on the computer hard drive.
Consequently, the memory (RAM) must
be analyzed for forensic information.
Each and every function performed
by an application or operating system
results in a special kind of change to
the random access memory. These
changes often stay for a long time after
completion of the operation, crucially
storing them. Furthermore, memory
forensics
provides
unprecedented
visibility into the runtime state of the
system, such as which processes were
running, open network connections,
and recently executed commands.
Individuals can perform an extraction
of these artifacts that is totally
independent of the machine being
investigated. It also reduces the chance
of rootkits or malware preventing the
investigation process. Crucial data
may exist exclusively in memory, such
as unencrypted e-mail messages,
disk encryption keys, non-cacheable
internet history records, off-the-record
chat messages and memory-resident
injected code fragments.
Acquire
ƒƒ Capture Raw
Memory
ƒƒ Hibernation
File
Context
Analyze
ƒƒ Establish
Context
ƒƒ Find Key
Memory Offsets
ƒƒ Analyze Data
for Significant
Elements
ƒƒ Recover
Evidence
Fig. 2 : Process of Memory Forensics
Memory
forensics
is
about
capturing the profile as well as
the memory contents and can add
an invaluable resource to incident
response, malware analysis, and digital
forensics capabilities. Even though
inspection of network packet captures
and hard disks can yield compelling
verification, it is often the contents of
the computer memory that enables
the full reconstruction of events,
allowing an individual to determine
what has already happened, what is
presently happening,and what would
happen with further infection through
malware or an intrusion by advanced
threat actors. For example, a piece of
evidence found in RAM could help to
associate typical forensic artifacts that
may appear different and allow for
an integration which could otherwise
remain unnoticed.
There are three reasons for
gathering and analyzing the data
contained in the physical memory. First,
the physical memory contains real-time
data related to the operating system
environment, such as the currentlymounted file system and the list of
processes being operated. Second,
even the encrypted data is generally
decrypted when it is stored in the
physical memory. Third, this method
adapts well to the characteristics of
embedded systems. Since an embedded
system is rarely turned off, the data
contained in the physical memory is
mostly persistent. Therefore, significant
information can be obtained if analysis
is performed effectively on the physical
memory.
The different types of information
that can be extracted from memory
include processes, dynamic link
libraries (dll), process memory, image
identification, kernel memory and
objects, networking, registry, malware
and rootkits.
17
C S I C o m m u n ic a t i o n s | F E B R UA R Y 2 0 1 7
SECURITY CORNER
Why Memory Forensics?
Everything in any type of operating
system traverses random access
memory, including processes and
threads, rootkits and malware, IP
addresses, network sockets, URLs,
open files, passwords, catches,
clipboards and other user generated
content, encrypted keys, configurations
of hardware and software and windows
registry keys and event logs.
The types of artifacts found in
memory dumps share a common origin.
They all starts out as an allocation.
Why, when and how the regions of
memory were allocated sets them
apart, in addition to the actual data
stored within and around them. As a
part of memory forensics, the study
of these behaviors could be helpful to
make inferences about the allocation
of the content, leading to the ability
to find and label specific types of data
throughout a large memory dump.
Additionally, the knowledge of allocation
and de-allocation of memory and their
algorithms (i.e., First Fit, Best Fit, Next
Fit and Buddy System) could aid in
understanding the context of the data.
For example, which block of memory is
free or which one is allocated.
Fig. 3 : Different OSs with Memory
Forensics
Windows Forensics
Memory forensics for Windows
involves finding and analyzing executive
objects. Windows is written in C and
the data as well as the attributes
organization heavily use C structures.
Out of those, several of structures
are called executive objects. They are
created, deleted and protected by the
object manager of Windows. The object
manager is a component of the kernel
implemented by the NT module.
The major executive objects of
Windows for memory forensics include
file, process, symbolic link, token,
window station, thread, desktop, mutant,
types and keys. These executive objects
are available with the corresponding
name of the structure(e.g., file with
_FILE_OBJECT structure). There is at
least one Volatility plugin that analyzes
each of the executive objects listed
above.
Linux Forensics
In Linux memory forensics, the
fundamental approach is to begin
analyzing memory dumps of Linux.
Specifically, one must be aware of
traditional and modern memory
acquisition techniques on Linux with
their benefits and drawbacks. To
perform Linux memory forensics, it
is required to create Linux profiles,
which are archives and contain useful
information that Volatility needs to
adequately find and intercept the data in
memory dumps of Linux. Furthermore,
one should be aware of the challenges
to deploy Linux memory forensics in an
enterprise environment, where critical
servers may not even have compilers
in C with other libraries which are
found on workstations and desktops of
standard Linux.
Mobile OS Memory Forensics
Various mobile operating system
are currently in use,including Android,
iOS, Windows 10 mobile, Tizen, Sailfish
and Ubuntu touch. The most popular
mobile OSs are Android and iOS. The
rapid increase of systems running
Android and Mac OS in both home and
corporate environments has resulted in
Android and Mac systems being a focus
of targeted attacks. Because of these
factors, cybersecurity experts have
worked to develop tools for Android and
iOS for robust investigative capabilities
for Linux and Windows systems. To
perform Android and Mac OS memory
forensics, one has to create a Volatility
profile for Android and Mac systems and
can use one of the tools for acquisition
of memory. Furthermore, some of the
unique facets such as 64 bit addressing
on 32 bit kernels, the typical userland
and lay out of kernel address space, and
the use of microkernel components are
also major considerations.
Tools of Memory Forensics
While there are multiple types
of tools available to perform memory
forensics, the Volatility framework and
Linux Memory Extractor (LiME) are the
most popular.
LiME is one of the best memory
dump tools. It is a Linux kernel module
(LKM) released by ShmooCon, which
performs memory dumps for the
Linux system. It is the first tool that
can perform entire memory dumps
from Linux-based devices and from
Android. LiME is a powerful device that
can perform memory dumps by loading
modules immediately after compiling
without any other operations, such as a
change in kernel settings. Particularly
in the case of Android, one can dump a
file directly into external memory after
inputting a pre-compiled module file
into the external memory and loading
the module through the command line.
LiME features provide full memory
acquisition and acquisition over the
network interface with a minimal
process footprint.
The second popular memory
forensic tool is the Volatility framework.
It is a single, cohesive framework that
analyzes RAM dumps from Linux, 32and 64-bit windows, Mac, and Android
systems. The modular design of Volatility
allows it to easily support new operating
systems and architectures as they are
released. So, all devices are targets. It
doesn’t limit the forensic capabilities to
just Windows computers. Furthermore,
it is an open source written in Python
and has extensible and scriptable API
with unparalleled feature sets and
comprehensive coverage of file formats.
Benefits of Memory Forensics
The benefits of memory forensics
include, but are not limited to:
ƒƒ Memory forensics is an ideal
analysis that includes physical
memory data (from RAM) as well
as Page File (or SWAP space) data
ƒƒ
Analysis of memory is the best
place to identify malicious software
activity
ƒƒ
Memory forensics helps to analyze
and track recent activities of the
system in context with the user’s
profile and activities of attackers.
18
C S I C o m m u n ic a t i o n s | F E B R UA R Y 2 0 1 7
www.csi-india.org
SECURITY CORNER
ƒƒ
Malicious code is not yet conducting
anti-forensics
within
random
access memory.
ƒƒ
Memory forensics is the only way
to collect evidence that cannotbe
found anywhere else, such as
chat threats, Internet activities,
memory-only malware, etc.
ƒƒ
Every bit of data being created,
viewed, or destroyed goes through
RAM. This includes all webbrowsing activity, document edits,
images, sending and receiving
of network data, execution of
applications,
and
essentially
anything that appears on the
monitor.
ƒƒ
RAM is effectively a “disk,” hence
it is necessaryto preserve and
investigate the memory in addition
to the hard disk.
Challenges in Memory Forensics
There are many challenges to
performing memory forensics, including
the following.
ƒƒ Evaluating the diverse memory
acquisition tools available, which
perform differently depending
on the operating system version,
installed hardware and the
configurations.
ƒƒ
If the termination character cannot
be found. Consider the situation
in which, analyzing the physical
address space of a system that
leverages paged virtual memory, a
string is encountered that crosses
a page boundary to a page that is
no longer memory resident, which
would require special processing
or heuristics to determine the
actual size of the string.
ƒƒ
The challenges faced during linked
list analysis also apply with the
analysis of memory trees.
ƒƒ
Memory evidence is often found
on non-volatile media and comes
in various shapes and sizes. As a
cyber security expert, one must be
aware of the different formats and
the procedure of converting one
format into another.
ƒƒ
When the system is powered off,
the whole disk, individual partition,
or virtual file-based containers
are encrypted. This protection
results in serious challenges for
investigators, even if they gain
access to the media
Research Directions & Conclusion
The major thrust area of operating
system memory forensic is to perform
Linux memory forensics. Government
offices and business organizations are
major Linux adopters. There are many
security issues with the Linux operating
system. The research direction should
focus on applied operations of memory
forensics in Linux machines and
advanced data analysis using machine
learning which will be very useful
to the Linux cyber society. This will
allow government agencies, business
organizations and also small-scale
industries to secure their system
operations. Antiviruses, which are one
of the alternatives, can prevent malware
from entering the system; however,
what if an antivirus becomes disabled by
admin access through the rootkit? So,
there is a need of research to provide
models and algorithms to increase
the security of the operating system
resulting in the cyber protection of the
users. Research focused on memory
forensics using machine learning
could be one of the key factor as it is
rarely addressed by anti-virus products
available in the market. In the cyber
community, such research may provide
the solution for many of the challenges.
& Cyber Security”, 2015
[2] M H Ligh, A Case, J Levy, A Walters.
“The Art of Memory Forensics”, 2014
[3] Mark Wade, “Memory Forensics: Where
to Start” at http://www.forensicmag.
com/
article/2011/06/
memoryforensics-where-start, 2011
[4] Gohel, Hardik. “Looking Back at
the Evolution of the Internet.” CSI
Communications - Knowledge Digest
for IT Community 38.6 (2014): 23-26
[5] Blackbag Team,”WINDOWS MEMORY
FORENSICS”,
at
https://www.
blackbagtech.com/ blog/ 2016 /03/07/
windows-memory-forensics/2016
[6] Baliga, A., Ganapathy, V. and Iftode, L.,
2011. Detecting kernel-level rootkits
using data structure invariants. IEEE
Transactions on Dependable and
Secure Computing, 8(5), pp.670-684.
[7] Hardik, Gohel. “Data Science Data, Tools & Technologies.” CSI
Communications Knowledge Digest for
IT Community 39.3(2015): 8-10
[8] Korkin, I. and Nesterov, I., 2015. Applying
memory forensics to rootkit detection.
arXiv preprint arXiv:1506.04129.
[9] Hal Pomeranz, “Detecting Malware
with Memory Forensics”, at http://
www.deer-run.com/~hal/ Detect_
Malware_w_Memory_Forensics.pdf,
2015
[10] H Gohel, P Sharma. “Study of Quantum
Computing with Significance of Machine
Learning.” CSI Communications Knowledge Digest for IT Community
38.11 (2015): 21-23
[11] Joe
Sylve
https://github.
com/504ensicsLabs/LiME
[12] Lime Forensics, https://code.google.
com/p/lime-forensics/
[13] Volatility framework, https://github.
com/volatilityfoundation/volatility/wiki
References
n
[1] Hardik Gohel. “Introduction to Network
About the Authors:
Dr. Hardik Gohel [CSI-I1500336] is working on cyber security
research. He has 8 years of experience in teaching and research in
the field of computer science and technology.
Dr. Himanshu Upadhyay is a Project Management Professional
and having over 25 years of experience in information technology,
management and engineering at USA. Dr. Upadhyay’s areas of
applied research include knowledge management, enterprise
systems for web and mobile platforms, penetration testing, digital
forensics and malware analysis.
19
C S I C o m m u n ic a t i o n s | F E B R UA R Y 2 0 1 7
A R T I C L E
Top Ten Alternative Operating Systems
You Should Try Out
Deepu Benson
Amal Jyothi College of Engineering
There are hundreds of operating
systems available in the market but
sadly our quest for operating systems
mostly end with Windows, Linux,
macOS or a mobile operating system
like Android. I am sure 99 percentage
of the people who read this article
have only used one or more of these
operating systems. If you are rich
enough to pay a substantial amount
for an operating system you mightbe
having some version of Windows from
Microsoft or macOS from Apple with
you, if you are geek enough to work with
Linux then some distribution of Linux
like Ubuntu, Fedora, Mint, Debian etc.
might be with you or if you have a smart
phone then a mobile operating system
like Android OS, iPhone OS, etc., might
be familiar to you. And by now you might
be wondering what else is remaining
to try out other than these popular
operating systems. In this article, I am
discussing about ten operating systems
you may not have used nevertheless
very important. The final list is prepared
after going through a lot of desktop,
mobile operating systems and single
board computer operating systems.
Since the ultimate aim of this article is
to persuade the readers to try out some
of these operating systems I haven’t
considered server operating systems
like macOS Server or super computer
operating systemslike CNK Operating
System requiring costly hardware.
UNIX
The very first operating system
we have to try out is UNIX. Before
discussing any further about UNIX I want
to clarify one popular misconception.
UNIX is not Linux. Linux distributions
can be called Unix-like but there are
many differences between UNIX and
Linux. Linux is an open source software
meaning you can freely get a copy, view
the source code, and modify Linux the
way you like. Unlike Linux, UNIX is not
an open source software and is owned
by a consortium called The Open Group.
Only those operating systems licensed
by The Open Group can be trade marked
as UNIX. AIX from IBM, HP-UX from
Hewlett Packard, Solaris from Sun
Micro Systems etc. are examples for
pure UNIX operating systems.
Raspbian
Raspbian is a Debian Linux based
operating system. If so why Raspbian
operating system is included in this
list? The first reason is that Raspbian
is an operating system for Raspberry
Pi, a single board computer provided
by the Raspberry Pi Foundation. This
single board computer is heavily
used in Internet of Things (IoT) based
applications. So, in the near future
you definitely will come across a lot
of systems working with Raspbian
operating system. Raspberry Pi has an
ARM processor which uses Reduced
Instruction Set Computing (RISC)
architecture. So, the instruction set
implemented by Raspbian is RISC
rather than CISC (Complex Instruction
Set Computing),the instruction set
implemented by operating systems like
Windows, macOS etc. Thus, Raspbian
being a RISC based operating system
is the second reason for its inclusion
in this list. Raspbian is an open source
software freely available for installation.
eComStation
eComStation is an operating
system based on the OS/2 operating
system. OS/2 is a very popular operating
system developed and maintained by
IBM. When IBM made the decision
not to develop OS/2 any further the
user community of OS/2 interfered
with the development of OS/2. A
community of users started developing
this operating system with the brand
name eComStation. eComStation is
very important because it is the last
functioning operating system belonging
to the OS/2 family of operating systems.
eComStation is a proprietary operating
system with open source components.
Chrome OS
Chrome OS is derived from the
Linux Kernel developed by Google. The
importance of Chrome OS lies in the
fact that the principle user interface of
the operating system is the Chrome web
browser. So, in simple terms Chrome
OS is a browser based operating system
distinct from all the other operating
systems included in this list. Chrome
OS primarily supports web applications.
Unlike the other web browser based
operating system Firefox OS, Chrome
OS is still operational and continually
produces newer versions with the latest
version released in 15th of December
2016. Chrome OS itself is not an open
source software but it has an open
source equivalent called Chromium OS.
ReactOS
We have heard the term Unix-like
a number of times in this article, now
it is time for us to discuss the term
Windows-like. ReactOS is an open
source software freely available for
installation which imitates Microsoft
Windows, just like Linux imitating UNIX.
ReactOS is binary-compatible with
computer programs and device drivers
made for Windows. In simple terms,
an executable file say program.exe
produced for Windows can be executed
in ReactOS. Remember the fact that you
cannot execute a Windows executable
file in Linux. The development started
as the Windows 95 clone project and
the latest clone available is for Windows
2003 Server. Yes, currently ReactOS
is far behind in development with
Microsoft Windows 10 in the markets.
But let us hope one day ReactOS will
catch up with Windows.
Tizen
Tizen is an operating system based
on the Linux kernel and the Gnu C
Library implementing the Linux API.
If Tizen is yet another free and open
source Linux clone what is so important
about it? Well, Tizen is not a desktop
operating system like most other
operating systems included in this list.
It is an operating system that works on a
wide range of devices like smartphones,
tablets, smart TVs, smart Cameras etc.
20
C S I C o m m u n ic a t i o n s | F E B R UA R Y 2 0 1 7
www.csi-india.org
A R T I C L E
Tizen operating system is developed
by the Tizen Association comprising
of companies like Fujitsu, Huawei,
Panasonic, Samsung, Vodafone etc.
JNode
JNode is a simple operating system
just like countless other operating
systems available in the market. What
makes it so special? Well, operating
system development is a world
dominated by C programming language
and Assembly languages. But here is an
operating system developed using Java.
Yes, fully developed using Java. JNode
is a simple to use and easy to install
Java operating system for personal
computers. JNode is an open source
software freely available for installation.
KolibriOS
Have you ever tried to download
an operating system from the Internet?
You might have waited for a long time to
download the whole operating system.
A typical operating system will have
size in the range of a few Giga Bytes.
But here we have an operating system
called KolibriOS of size around 1.44 MB.
Yes, the whole operating system can
be stored inside a floppy disc, if floppy
discs were still available. KolibriOS has
a Graphical User Interface (GUI) also.
So, it’s safe to assume that KolibriOS
is the smallest GUI operating system
available in the world unless someone
somewhere came up with an even
smaller operating system, the chances
of which looks very slim. KolibriOS is
written entirely in Assembly language
and this feature makes it extremely fast.
Moreover, KolibriOS is an open source
software freely available for installation.
AmigaOS
Of all the operating systems
discussed in this article AmigaOS is
the one with the least probability of
being used by a reader. There are many
reasons for making such an assumption.
AmigaOS being a proprietary software
itself is a very good reason for many
people to overlook it. The support and
development of AmigaOS is about to
finish in the near future and that is
another reason for its relative obscurity.
If so why is it included in this list? It is
the native operating system of the Amiga
and AmigaOne personal computers.
And what is so special about these
computers? Well, these computers
support the PowerPC architecture
and that makes AmigaOS one of the
last surviving operating system that
supports PowerPC architecture.
Visopsys
Finally, it is time to discuss
Visopsys or Visual Operating System. It
is a simple and fast operating system.
But we have already seen KolibriOS one
of the fastest available in the market.
So, what makes Visopsys so special?
When compared with most of the
modern standard operating systems
Visopsys don’t have many necessary
features. But what makes Visopsys
unique is the fact that it is developed
by a single person. Yes, a hobbyist
operating system developer called
Andy McLaughlin developed the whole
operating system all by himself. The
development started in 1997 and though
the operating system is functional by
now even supported with a GUI Andy
McLaughlin is still continuing with the
development of Visopsys by adding
more and more features. Frankly, it
took me some time to believe that a
single person can develop an operating
system. It is like a single person building
the whole of Taj Mahal all by himself.
Yet, Andy McLaughlin did it and more
over he was gracious enough to make
Visopsys an open source software so
that future generations will benefit from
it.
Now it is time to wind up this article.
But before we part ways I request you
to take the extra effort to download and
use one of these operating systems
mentioned in this article. I am sure
the effort taken will not go in vain. By
working with an operating system not
related to Windows, Linux, or macOS
your knowledge of computer science
will grow exponentially and who knows
who all are going to get benefitted by it.
n
About the Author
Mr. Deepu Benson has over 15 years of programming experience. He currently works as assistant professor
in Amal Jyothi College of Engineering, Kerala. He maintains a technical blog at www.computingforbeginners.
blogspot.in. He can be reached at [email protected].
Call for Paper for April Issue of the CSI Journal of Computing
(e-ISSN: 2277-7091)
Original Research Papers are invited for the CSI Journal of
Computing, published on line quarterly (e-ISSN: 2277-7091) by the
Computer Society of India (CSI). The Journal of Computing, offers
good visibility of online research content on computer science theory,
Languages & Systems, Databases, Internet Computing, Software
Engineering and Applications. The journal also covers all aspects
of Computational intelligence, Communications and Analytics in
computer science and engineering. Journal of Computing intended
for publication of truly original papers of interest to a wide audience
in Computer Science, Information Technology and boundary areas
between these and other fields. The articles must be written using
APA style in two columns format. The article should be typed,
double-spaced on standard-sized (8.5” x 11”) with 1” margins on all
sides using 12 pt. Times New Roman font and 8-12 pages in length.
The standard international policy regarding similarity with existing
articles will be followed prior to publication of articles. The paper is
to be sent to Prof. (Dr.) J. K. Mandal, Editor-in-Chief, CSI Journal of
Computing ([email protected]) within 20th March 2017.
Prof. A. K. Nayak
Hon. Secretary, CSI
21
C S I C o m m u n ic a t i o n s | F E B R UA R Y 2 0 1 7
A R T I C L E
Operating Systems
Simran
Chandigarh Group of Colleges, Landran, Mohali
An Operating system is the heart of computer. From IBM’s IBM System/360 Operating System to
Microsoft’s Windows 10 to Linux’s Fedora, there are lots of changes emerging in all the generations’
Operating Systems. There is always need of upgrading operating system from time to time so as to
meet user requirements and trends growing in the technology. Using an Operating system, it is easy to
use hardware resources, gaming, business applications, application programs and other development
IDEs. Whether it is open-source or closed-source operating system, all have their own features and
pros as well as some cons. It is necessary to use an operating system in an efficient and convenient
way for proper utilization of computing resources and hardware. With latest technology trends, there
is need to add some features like customizability, cloud services on one platform, ease of installation,
cost-effective, security, reliable anti-viruses, 24*7 technical support for customers etc.
Introduction
An Operating system is an interface
between the computer user, applications
and computer hardware. An operating
system provides the necessary platform
to users for using different application
programs,
executable
programs,
system software and utilizing computer
hardware efficiently. Operating systems
change the way to use application
softwares, networking, file sharing, user
control, authorization and many more.
An operating system in a computer
manages all the softwares installed,
applications, processes, memory and
hardware.
The most widely used operating
systems are Microsoft Windows, Linux,
Mac OS X and iOS, Android. As Windows,
Linux and Mac OS X are desktop based
operating systems, while iOS and
android are smartphone operating
systems. For desktop application
more than 85% users use Windows as
major operating system for running
their applications, games etc. After
windows, iOS and Mac OS X have large
market share among all these. The
open-source operating system, Linux
is now widely being used by developers,
programmers and individuals.
Each operating system come
with their pros and cons. The widely
and most spread operating systems
like Windows, MacOS X and Linux
are quite comparable to each other.
The features that separate Windows
from other operating systems include
compatibility for every software-all
kinds of applications, games, drivers,
IDEs can run on Windows, One product
for all, technical support for its users,
various networking functions, better
GUI interface, file sharing, flexibility
to use, more available software
products, anti-viruses etc. Apart from
all these huge number of advantages,
it has some cons also. For example
more hardware requirements due
to installation of anti-viruses and
malware, Lacking security system,
expensive, less portability- cannot be
used from one platform to another.
Windows is a closed-source operating
system, which means one cannot
modify or add any tools or features to
the operating system by their own.
Windows based operating systems are
less secure than open-source operating
systems due to the reason that later
ones do not have default administrator
access or root access, whereas
Windows provide Administration access
to all the applications and programs
downloaded. That’s why, windows is
more unsafe or vulnerable to viruses,
worms etc. Security features are also
lacking somewhere. Windows is more
vulnerable to cyber attacks, hacking
also. Therefore, anti-viruses need to
be installed and update from time to
time. On the same point, installing
antiviruses or malware takes computer
memory, disk space, CPU. Windows is
designed for general hardware such
that you can purchase it for either
32-bit processor or 64-bit processor.
Also, one demerit is that windows is
totally non-customizable. Almost every
program designed, can be installed
and run on windows. It does not use
any ‘live’ boot system unlike Linux.
You have to purchase the licensed
product and install it with only technical
knowledge for installation. Coming on
Cost-windows is quite expensive than
Linux. For large deployments, business
uses, industry work and for desktop
computing, Microsoft windows is best
one to be chosen.
The different versions of Windows
that are use, are- Windows 9x family,
Windows 2000 family, Windows XP,
Windows 7, Windows 8, Windows
8.1 and current version Windows
10. Each version incorporates with
distinguishable features.
Adding Mac OS X as the desktop
computing operating system, Mac OS
X is going with the latest trends and
other technologies. It was the first
successful Graphical User Interface
(GUI) before Windows. Putting light on
some features of Mac OS X, we have
no viruses unlike windows, better look
than windows, extensions. Macintosh
OS X is simple, powerful, advance and
more secure than windows. Mac OS
22
C S I C o m m u n ic a t i o n s | F E B R UA R Y 2 0 1 7
www.csi-india.org
A R T I C L E
X provides its hardware platform for
users. It is more user friendly but not
flexible. Being enough powerful, Mac
OS X command line tools seems to be
helpful in administrative tasks. As Mac
OS X is based on Linux, that’s why Mac
OS X is more secure than Windows.
Mac OS X doesn’t provide
portability. It is connected with the
machine which it was using. Mac OS X is
the most expensive Operating Systems,
including hardware cost too. A normal
user can easily get to know that there is
no functioning delete key in it. Mac OS
X’s Lion, home network, voiceover, video
chat services, Airdrop are nowadays
popular among users.
Linux is an Open-source operating
system which means the source code
of the operating system (kernel) can be
downloaded, installed, analyzed, modify
and used for creating applications by
developers. They make changes in
each new version of Linux operating
system and update this version as a new
version. Each version in Linux is called
‘Distribution’. Many new and different
distributions can be operated at no
cost. About hundreds of Linux versions
have been developed and thousands
of developers work upon it. Linux is
more secure than any other operating
systems. It provides security by providing
enough ‘privileges’ or ‘root’ access to
the users. Another merit is that being
open-source Linux is customizable and
has full control under user. Apart from
its less cost, another feature is ‘live boot
system’, so no technical knowledge or
more time is required for installation.
Any new user will surely find Linux
more interesting and customizable in
his own way. There is less numbers of
softwares which are available for Linux
desktop. While the standard programs
like searching the web, mail services,
editing, printing of documents can also
be easily done using Linux.
The current distribution of Linux
operating system is ‘fedora’ which
takes fewer amounts of disk space
and memory as compared to Windows
and Mac OS X. The open-source nature
of any operating systems makes it
user-friendly, customizable and more
secure from viruses. Linux is FREE
to use that means we can download
and alter it without paying any kind of
charges. Except all these, Linux is still
not a complete operating system, it
is just kernel, so additional software
are needed to be installed. This
corresponds to very few market shares
among laptop and desktop PCs. Leaving
all its advantages back, Linux is much
better in performance. There are many
other operating systems that are used
at low level among users.
Conclusion/Future Work
Among all these, which operating
system has to be chosen? This decision
solely depends on particular user’s
choice. All operating systems are
loaded with variety of features. For
gaming, we can use Windows, for
programmers and developers Linux and
Mac OS X for graphics/video producers.
But still, there are some requirements
which need to be noted. For example,
dealing with bugs in operating system
and application softwares, to deal with
viruses, worms etc. We could have
extensions like one point access for
applications and their tracking, checking
apps performance, portability of
applications on different environments.
Maintaining backup for all applications
is also necessary. Interchanging of data
among different applications needs to
facilitate. Moreover, an operating system
distinguishes different platforms and
focuses on bright future for innovation.
Every operating system has some
advantages and disadvantages, but
using which one, this depends on user’s
convenience. There is still innovative
technology coming in the field of
operating systems.
References
•http://www.itpro.co.uk/operatingsystems
•https://www.conversation.com/
what-to-expect-from-the-nextgeneration-of-windows-28763
•https://www.quora.com/Whatsthe-difference-between-Mac-OSWindows-and-Linux
•erence.com/technology/computerneed-operating-system3c7b0b66db6f2754
•https://www.linkedin.com/pulse/
comparison-between-windowsvs-linux-macintosh-os-dineshbhadane
•h t t p s : / / w w w . r e f e r e n c e .
com/technology/computerneed-operating-system3c7b0b66db6f2754
About the Author
Ms. Simran third year Engineering student and Pursuing Bachelors of Technology degree from Chandigarh
Group of Colleges, Landran, Mohali. I am interested in publishing papers and articles. My research interest
goes in cloud computing, networking, social-work, education for girls and more. In academics also, I am going
with good achievements in every field.
23
C S I C o m m u n ic a t i o n s | F E B R UA R Y 2 0 1 7
n
A R T I C L E
The battle for the Best Smartphone OS
S. N. Kakarwal
Professor in Department of Computer Science & Engineering of
P.E.S. College of Engineering, Aurangabad
Now a day’s rapidly emerging
technology is wireless mobile phone
technology in telecommunication zone.
This mobile device has great impact on
everyone’s life. Consequently, when we
wanted to purchase a mobile device we
consider two criteria before selecting
a mobile device. Firstly, we study is the
details of devices such as the appealing
look of the device, its performance,
hardware details such as camera type,
its pixel resolution, etc. Secondarily,
we study the type of mobile operating
system used by the device.
A mobile operating system
is software stack used by mobile
devices such as smartphones, tablets,
laptops to manage their resources
and to run applications and programs.
Mobile operating systems example
includes Apple iOS, Google Android,
BlackBerry OS, Nokia’s Symbian and
Microsoft’s Windows Phone OS.
In this article, we make assessment
of emerging mobile OS, Android OS and
iPhone OS and finally compares the
recent versions of them, viz., Android
7.0 Nougat with Apple iOS 10.
Android OS
Android is open source OS which
isgrounded on Linux kernel designed for
mobile devices such as smart phones
and tablet PCs. Android OS is owned by
Google, Inc. in July 2005 and becomes a
key for Google to jump into the wireless
technology. Latest version of Android is
Android 7 released in October 16.
Structural design of Android OS
Four layers of Android OS are Linux
Kernel, System libraries, Application
framework and user interface layer
(as in figure 1). At the bottom most
layer of Android OS Architecture is the
Linux kernel copes with virtual memory
management, power management
and networking management and
basic communication management.
System libraries integrated with SQLite
framework which provides storage of
data. System libraries include 2D and
3Dgraphics API. SGL is 2D graphics
engine and open GL/ES provides 3D
graphics API. System libraries packaged
with Webkit engine for rendering web
pages in mobile browser. Android
run time is rooted with Dalvik Virtual
Machine (DVM), which gives power to the
applications. The application framework
includes android SDK which provides
libraries for building applications. At top
most layer of Android OS architecture is
the User interface layer which provides
contacts. Also Widgets are included
to truly customize your home screen
to your needs, by presenting live,
continually updating information.
Disadvantages of Android OS:
ƒƒ Battery backup is poor since large
number of daemon processes
increases the usage of RAM.
ƒƒ
While updating applications some
of applications might have bugs
which can be misused by hackers.
iPhone OS
iOS is Apple’s closed (with open
source components) operating system
developed for iPhone, but later extended
to support for iPad and Apple TV. It is
Unix based OS as iOS root comes from
Mac OS. Latest version of iPhone is
iPhone 10 released in June 16.
Structural design of iPhone OS
User Interface
Cocoa Touch
Application Framework
Media
Libraries
Core Services
Linux Kernel
Core OS
Fig. 1 : Android OS Architecture
Fig. 2 : iPhone OS Architecture
Advantages of Android OS:
ƒƒ Easy access for latest public
standard like social media sites,
Google search engines, etc.
ƒƒ
Enables the programmers to make
changes in Linux kernel to modify
original applications.
ƒƒ
Availability of More than 2.6 million
Apps in play store.
ƒƒ
Easy access to best apps from play
store.
ƒƒ
Supports execution of multiple
applications concurrently.
ƒƒ
Supports reliable and enhanced
storage of data (using SQLite
framework).
ƒƒ
Supports Bluetooth connectivity.
At the bottom most layer of iPhone
OS architecture, there is Core OS
layer. The Core OS layer copes with
the file handling, low level networking,
memory management, inter process
communication
and
security
management. Core services layer
includes fundamental system services
for apps as well as framework for
networking. Media layer incorporates
several frameworks to deal with 2D and
3D graphics, audio, video functionality,
and animations. At the top most is the
Cocoa Touch layer based on Cocoa API
to develop graphical applications and
used by application developer.
Advantages of iOS:
ƒƒ Easy access for latest public
24
C S I C o m m u n ic a t i o n s | F E B R UA R Y 2 0 1 7
www.csi-india.org
A R T I C L E
standard like social media sites,
Google search engines, etc.
ƒƒ
Supports for cloud storage.
ƒƒ
Availability of More than
millionApps in App Store.
ƒƒ
Easy access to best apps from App
store.
ƒƒ
Reduces the risk of infection from
malicious software since Apple
does not allow people to load thirdparty programs on the device.
ƒƒ
2.2
10 and Android 7.0 Nougat, respectively.
This is major news since most of the
smartphones today either run on
Android or iOS.
Some notable features of iOS 10 and
Android 7.0 Nougat Notifications
ƒƒ In iOS 10, 3D Touch is immersed,
permitting to expand notifications
and initiate quick responses and
other actions.
ƒƒ
Beautifully designed desktop and
app icons with the fabulous looks
of Apple devices.
Disadvantages of iOS:
ƒƒ Supports only Apple Hardware.
ƒƒ
Not an open source OS.
ƒƒ
Very costly Apps.
Comparative Study of Android OS and
iOS
The table1 depicts the comparison
table of Android OS and iOS
Apple and Google just released iOS
Android Nougat’s notifications
now take up more of the screen
which, combined with a change of
font, provides more information as
standard.
Messaging
ƒƒ In iOS 10, your messages threads
can be plastered with icons and
animations. More ever, iMessage
can implement its own type of
third-party apps into it.
ƒƒ
Android Nougat came with
WhatsApp-like messaging app
known as Allo to incorporate search
and machine learning technology.
Personal Assistants
ƒƒ In iOS 10, Siri has greatly enhanced.
Apart from getting, the personal
assistant
enhanced
features,
it is opened up to third-party
developers so they can link into
Siri—making her usefulness grows
exponentially.
ƒƒ
Siri’s big competitor on Android is
Google Now.
Though, Apple and Google have
started with different ways to design
their effective and efficient mobile OS,
iOS 10 and Android Nougat have shown
they are gradually uniting. Apple is
attempting to close the gap on Google
in terms of widgets and third-party
app, while Google is attempting to
implement app icon shortcuts and app
notification groupings like Apple.In the
battle of the OS, the winner will depend
on your preference. Android is more
customizable but Apple is more refined
in terms of security and system. n
Table 1 : Comparison of Android OS and iOS
Feature
Android OS
iPhone OS
Developer
Google
Apple Inc.
Model
Open Source OS
Closed (with open source components) OS
File Transfer
Easier than iOS.
More difficult.
Video Chat
Google Hangouts and third party apps.
FaceTime(Apple devices only) and other third part apps.
Widgets
Available.
Noavailability, except in Notification Center.
Internet Browser
By default Google Chrome browser.
Mobile Safari browser.
Voice Commands
Google Now.
Siri.
Maps
Google Maps.
Apple Maps.
File Manager
By default one available
Unavailable.
Cloud Services
Naive Integration with Google cloud.
Naive Integration with icloud.
Videos and Photos backup Unlimited back up for video and photos
backups
Restricted back up of 5 GB for video and photos backups.
About the Author
Dr. S. N. Kakarwal [CSI-F8000602] is presently working as Professor in Department of Computer Science & Engineering of
P.E.S. College of Engineering, Aurangabad, MS-India. Her research interests include Image Processing, Pattern Recognition.
She has published 13 papers in International Journals, 25 papers in International Conference and 11 papers in National
Conferences. She has published two articles in CSI magazine. She can be reached at [email protected]
25
C S I C o m m u n ic a t i o n s | F E B R UA R Y 2 0 1 7
A R T I C L E
Operating Systems :
Mass transit for the future
R. Gobi
Faculty in Computer Applications, National Institute of Technology, Trichy
Operating system has been
changing since every generation or era
that we have had so far, and we can
expect it to change even more in the
near future to come. Mobile operating
systems especially have never failed
to surprise techies with the incredible
features they provide. In the future,
approximately in 10 years from now, we
can expect a mobile or a smartphone
capable of doing the unexpected. A
mobile phone is now considered a part
of every human being; every individual
is observed owning a smartphone,
and some even own more than one.
The day begins with one checking out
the notifications early in the morning,
even before they get off their beds,
and it ends with the same thing in the
night, just before they go to sleep. In
the future, this mobile phone is going
to be more of a personal assistant to a
particular owner. We are going to see
significant innovation from developers
in this space.
The operating system of the
future would connect every device
the user wants to connect to from
their mobile phones– starting from
personal computers at homes or
offices, cameras, cars and even the
home security systems. Everything can
be controlled from any location just by
one click on the mobile device. This is
something that the current technology
is already leading us to. In the years
to come, we can expect the concept of
Internet of Things to be a reality more
than an idea or an experiment. The
mobile OS of the future is going to be an
implementation of the same.
In the future, we would not require
a personal computer or a desktop as
much as we do today; with the mobile
operating system to arrive. Every task
that can be done on a computer will
be done on the mobile phone. It is
going to be an integration of Artificial
intelligence, networking and connecting
to the society. The hand held devices
will consist of an interface with the user
in which, the smartphone can detect
body temperature of the user holding
the device, and from previously acquired
data, it would recommend a doctor’s
appointment if it found the temperature
was not within the normal limits.
The operating system of the mobile
device will identify if it is in the wrong
hands, and this it will find out from
usage statistics, pattern, and an in-built
polygraph that would detect the user’s
authenticity. If in any case it identifies
any suspicious or abnormal use of the
smart device, it will lock itself which
could then only be unlocked externally
by the original user, through a bio
metric key.
The trend of the future is going to
be of a wearable device. The mobile
operating system would also consist of
a system which connects to a wearable
device like a watch, so one need not
constantly remove their mobile phones
to check for updates. The possibilities
with devices that you wear on your body
are endless. There will be a time in which
people can receive calls on something
known as a fingertip technology. A
person would make and receive calls
without touching the mobile phone. This
can be done by a click on the wearable
device and the voice signals will be
transmitted through the person’s body,
so one can listen to the other person,
by just keeping the forefinger near his
or her ear. A microphone fitted to the
wearable device would complete the
communication so that the person
on the other side of the phone can
hear you well. It would offer these and
many other features keeping in mind,
low battery consumption and efficient
usage of the memory.
The mobile operating system of
the future is going to be a wonderland
in itself. It would offer a plethora of
features. But, simultaneously, it would
detect over use of the device. With the
increasing amounts of complaints
from the traditional Luddites and other
rational thinkers who believe that
technology is deteriorating people’s
health, it would be taken care of in the
operating system. The system would
lock itself out for a particular amount of
time or keep popping up a notification,
where the user of the smartphone is
expected to do some physical activity,
or any other activity which does not
involve use of the mobile phones.
Every technology ages; the only thing
that doesn’t get old is connecting with
people.
n
About the Author
Dr. R Gobi [CSI-1161613] is currently working as Faculty in the Department of Computer Applications,
National Institute of Technology, Trichy. His area of specializations are Mobile Computing, Mobile Governance
and Internet of Things. He can be reached at [email protected] and [email protected]
26
C S I C o m m u n ic a t i o n s | F E B R UA R Y 2 0 1 7
www.csi-india.org
A R T I C L E
RSOS: Reliable and Secure Operating System
Ashutosh Saxena
Adjunct Professor CS, Email: [email protected]
Did you recollect when your
landline phone got hanged, probably
you do not remember either it really did
not happened or you are using smart
mobile phone for a long time. Then,
did you remember when your elegant
smart phone got hanged while you were
running few applications? Probably
last month!!. Let me extend the query:
when was your TV stuck while you were
watching favourate show or movie, in
contrast, how many times your laptop
got hanged while you were playing the
DVD? All are electronics devices with
processors, several interfaces, I/O
ports and an operating system (OS)
running for you to provide the desired
functionality. It is the OS on computers/
smart phones that provides flexibility,
where you can load, install and execute
external software, whereas on the TV
you may not enjoy that level of freedom,
reason being a very small with focussed
functionality OS is being embedded
in TV sets which does not fall in prey
hands.
The popular operating systems
have two characteristics which makes
them unreliable and insecure 1) they are
very large in size and 2) they have very
poor fault isolation. The Linux kernel
has over 2.5 million lines of code and
Windows XP is twice more than Linux. A
study [1] of software reliability conveys
it contains 6-16 bugs per 1000 lines
of executable code while a different
one [2] states that the fault density at
2-75 bugs per 1000 lines of executable
code. To be on a conservative end one
can estimate of 6 bugs per 1000 lines
of code the Linux kernel probably has
something like 15,000 bugs, Windows
has as at least double, not sure mobile
OS for smart phones!! Further, to
make matters worse, typically about
70% of the operating system consists
of device drivers, and they have error
rates 3 to 7 times higher than ordinary
code [3]. It is also true that finding and
correcting all these bugs is simply not
always feasible, and bug fixes frequently
introduce new bugs. Any modern
operating system contains hundreds
or thousands of procedures linked
together as a single binary program
running in kernel mode. Any one line
from the millions of lines of kernel code
can overwrite key data structures used
by an unrelated component and crash
the system which is difficult to detect.
In addition, if a virus or worm manages
to infect one kernel procedure, there
is no way to keep it away from rapidly
spreading to others and taking control
of the whole machine. The challenge in
developing operating systems security
is to design security mechanisms that
protect process execution and their
generated data in an environment with
such complex interactions. However,
these mechanisms do not account or
only partially account for the complexity
of practical systems. The current state
of operating systems security takes
two forms: (1) constrained systems
that can enforce security goals with
a high degree of assurance and (2)
general-purpose systems that can
enforce limited security goals with a
low to medium degree of assurance. An
ideal secure operating system provides
security mechanisms that ensure that
the system’s security goals are enforced
despite the threats faced by the system.
Thus the basic security mechanism
improves the reliability of system
software by protecting it from the most
obvious source of unreliability; namely,
user programming errors.
Reliability
Reliable software provides services
that are adequate for the intended
application with respect to being:
usable, correct, and trustworthy.
Usable means that the user
receives services that are effective
for his application. Correct means
that the software meets its functional
specifications. If the specifications are
incomplete, then correct software may
not be usable. Trustworthy means that
there is a minimum level of services
that is provided correctly, and there is
an effective way to evaluate or measure
the performance of the software with
respect to the minimum level of service.
Software may be correct even if there
is no effective way to demonstrate its
correctness; however, trustworthy
software must be structured so that
testing, auditing, and/or proofs of
correctness can be used to achieve a
reasonable level of confidence in the
software.
Security
Security goals describe how the
system implements accesses to system
resources that satisfy the following:
secrecy, integrity, and availability. A
system access is traditionally stated in
terms of which subjects (e.g., processes
and users) can perform which
operations (e.g., read and write) on
which objects (e.g., files and sockets).
Secrecy requirements limit the objects
that individual subjects can read
because objects may contain secrets
that not all subjects are permitted to
know. Integrity requirements limit the
objects that subjects can write because
objects may contain information that
other subjects depend on for their
correct operation. Some subjects
may not be trusted to modify those
objects.
Availability
requirements
limit the system resources (e.g.,
storage and CPU) that subjects may
consume because they may exhaust
these resources. Much of the focus in
secure operating systems is on secrecy
and integrity requirements, although
availability may indirectly impact these
goals as well.
In general, security provisions
must be as simple and rigid as possible
in order to minimize the danger
of oversights and of human error.
Nevertheless, for security in a computer
operating system, the flexibility is
desirable for the following reasons:
(1)
System security will be attacked
at its weakest point. It makes little
sense to build extremely rigorous
27
C S I C o m m u n ic a t i o n s | F E B R UA R Y 2 0 1 7
A R T I C L E
security barriers if there is a back
door into the system that is left
open.
(2)A serious danger to security arises
whenever the need for flexible
protection is underestimated. If
protection mechanisms are so
rigid that they prevent efficient
processing of information, then the
protection is usually circumvented.
A single general protection
mechanism that is used without
exception is better than a rigid one
that has many exceptions.
(3)
Flexible and efficient switching
between protection domains makes
it more feasible to build redundant
security controls. As long as the
basic protection mechanism itself
is extremely reliable, redundant
security checks incorporated in
software can provide very rigorous
security control.
While security and reliability
requirements vary greatly from one
application to another, the protection
mechanisms that are built into the
hardware and basic software of the
computer operating system cannot be
redesigned to meet the needs of each
application. Thus it is desirable to have
a basic set of protection mechanisms
that are versatile enough to meet the
requirements of many diverse computer
applications. Small protection domains
are one of the most promising ways to
achieve the goal of reliable and secure
operating system in reducing the
complexity of large system. As it is quite
clear that it is far more difficult to build
a 50,000 line program than it is to write
1,000 programs that are each 50 lines
long. This phenomenon leads to rapidly
escalating costs for the development
and maintenance of large software
systems, and it leads to serious
reliability problems due to the difficulty
of adequately debugging and testing a
large program. Both the reliability and
the cost of software could be greatly
improved if the complexity of large
programs could be kept more in line
with the size of the program. However,
when a large system is decomposed into
interacting subsystems, it is important
to have limits on the interaction of the
subsystems. These limits should not be
dependent on the proper functioning
of all of the subsystems. Othen, the
subsystem interactions may change
precisely when one of the subsystems
fails, thus causing the whole system
to crash. It is not feasible to eliminate
all
malfunctions
from
software
subsystems. On a case-by-case basis,
careful defensive programming can limit
the effects of potential malfunctions. A
more general solution is possible by
introducing a protection mechanism
which is distinct from the proper design
and functionality of the subsystems.
The role of the protection mechanism is
precisely to prevent malfunctions from
spreading beyond the subsystem where
they occurred. To achieve the desired
protection, almost every procedure
should be run in protection domain that
gives it access to exactly what it needs
to accomplish its function and nothing
more, on the principle of least privilege.
A protection mechanism will not
prevent every error from propagating
outside of the erroneous module. Many
erroneous results of a module will
appear to be normal results, and the
protection mechanism will have no way
of distinguishing these from correct
results. However, with good system
design, erroneous results that look like
expected results should not cause other
modules to behave in unpredictable
ways. As long as other modules continue
to behave in predictable ways, there is a
much better chance of finding the origin
of the error. The protection mechanism
will guard mostly against the errors that
result from unexpected interactions of
the modules and are usually the hardest
to trace.
Trojan Horse Problem
Most
access
controls
only
guarantee that one user’s information
is protected from access by other users.
Unfortunately, it is often not realistic
for a user to trust all the programs that
execute as part of his own processing.
Most users make calls to a large number
of service routines and other programs
that the user has not written· himself.
On most systems, all these routines and
programs execute with the full access
privileges of the user. It is possible for
these programs to perform completely
unrelated actions e.g. they may access
any file accessible, by the user, and on
one or many systems and they can even
give away access rights to these files.
Daniel Edwards has given it the very
descriptive name “Trojan Horse” as it
involves a foreign or gift program that is
brought within the walls of a protection
domain. The gift program can then
subvert the security of everything
accessible from that protection domain.
Programmers and systems personnel
routinely try out new programs that
play games, print pictures, or aid in
the development of better programs.
The most acute danger from the Trojan
Horse problem occurs when someone
executing with system privileges runs
a program given to him by “a friend”.
This includes support programs such
as editors, compilers, and library
routines. A user may choose to believe
that programs supplied with the system
are unlikely to act like a Trojan Horse-but this should be recognized as a
calculated risk.
It might seem that the Trojan
Horse problem should be solved by
administrative
controls.
Systems
personnel and anyone who has very
sensitive data should never run a
program in their protection environment
unless they trust it. Unfortunately, this
administrative solution is often not
practical unless the system makes
it easy to run untrusted programs in
a restricted protection environment
where they can do little harm. Finding
a reasonable solution to the Trojan
Horse problem is probably the most
challenging aspect of developing an
adequate set of system security controls.
Three distinct aspects of the Trojan
Horse problem must be distinguished
when a foreign or untrusted program is
to be run on a system:
(1)
The foreign program is expected
to modify sensitive data. In this
case the foreign program must
be thoroughly examined so that it
can be trusted. If the program is to
alter data, then it must be trusted
with respect to that data.
(2)
The foreign program is expected
to read sensitive data but not
disclose its contents except to the
calling program. This is called the
confinement problem. It is difficult
enough to prevent a program
from hiding the information in
a file or other form of storage;
28
C S I C o m m u n ic a t i o n s | F E B R UA R Y 2 0 1 7
www.csi-india.org
A R T I C L E
however, it is even more difficult to
prevent it from communicating the
information via a covert channel.
Covert communications channels
can be created by encoding the
information in the program’s
resource utilization. For example,
a program might communicate one
bit to another program by using
10 minutes of CPU time if the bit
is 1, and only using a fraction of
a second if the bit is 0. The other
program has to be able to detect or
estimate the execution time of the
first program, possibly by simply
observing the performance of the
system. Much higher data rates
can be achieved by encoding the
information in paging rates, disk
utilization, or in the locking and
unlocking of files.
(3)
The foreign program is run on
behalf of a user who has access to
sensitive data, but the untrusted
program is not expected to access
any sensitive data. This problem
should be easy to solve; however,
the solution is difficult to enforce
with the protection mechanisms
available
on
most
existing
computer systems.
If security depends in part on the
compilers, then the compilers would
also have to be validated for security.
While it may be easier to validate a
compiler than to validate an operating
system, the validation of several
compilers in addition to the validation
of parts of the operating system would
make security validation more difficult. If
the operating system is written in a high
level language, then the correctness
of the compiler for that language is a
security concern.
Conclusion
In an attempt to design OS that is
reliable and support rigorous security,
narrow and short term focus is not
advisable. Many security controls might
not be cost-effective if they were not
needed to improve the reliability and
the overall performance, in particular
: 1) the complexity of most existing
OS make it very difficult to achieve
security. To guarantee security OS
must be structured so that interactions
between system modules are more
clearly defined and closely controlled
which will also ensure the reliability
and may improve the performance. 2)
the protection mechanisms needed for
security can also be used to enforce
s/w modularity. Such modularity would
improve the reliability and correctness
of the s/w. In particular, debugging
and testing would be easier to the
extent that the effects of an error can
be confined within the module where
the error occurs. Since the debugging
and testing of the account for half
of the project cost these protection
mechanisms amy help in reducing the
overall cost. It is an ambitious goal to
design an OS that satisfies rigorous
security
requirements,
supports
reliable software and at the same time
meets the performance, flexibility,
sharing, and compatibility requirements
that are needed to make a computer
competitive in the marketplace.
Decreasing hardware costs are making
these goals much more feasible. The
recent demonitarization in the country
along with ever-growing connectivity
and e-commerce over the Internet,
application security is an ultimate
goal for millions of merchants and
consumers who turn their business
and service electronic and to the public
world of cyberspace. On the other
hand, efforts to achieve total security
of such systems continue to be based
on the flawed promise that adequate
security can be achieved in applications
with the current security mechanisms
of mainstream operating system [4].
The reality is that secure applications
demand secure operating systems, and
tackling application compromises at
the OS level by kernel-enforced controls
should probably be considered as an
attractive and effective approach.
References:
[1] V.R. Basili and B.T. Perricone, ‘‘Software
Errors and Complexity: an Empirical
Investigation,’’ Commun. of the ACM,
vol. 27, Jan. 1984, pp. 42-52.
[2] T. J. Ostrand and E. J. Weyuker, ‘‘The
distribution of faults in a large industrial
software system,’’ Proc. Int’l Symp. on
Software Testing and Analysis, ACM,
2002, pp. 55-64.
[3] A. Chou, J. Yang, B. Chelf, S. Hallem,
and D. Engler, ‘‘An Empirical Study of
Operating System Errors,’’ Proc. 18th
ACM Symp. On Operating Syst. Prin.,
ACM, pp. 73-88, 2001.
[4] P. A. Loscocco, S. D. Smalley, P. A.
Muckelbauer, R. C. Taylor, S. J. Turner,
and J. F. Farrell, “The Inevitability
of Failure: The Flawed Assumption
of Security in Modern Computing
Environments”, Proceedings of the
21st National Information Systems
Security Conference, pp. 303-314, Oct.
1998, http://www.nsa.gov/selinux/doc/
inevitability.pdf.
n
About the Author
Ashutosh Saxena is an industry expert and academician with over two decades of experience, 100+ international
publications, 30+ filled patents out of which 16 are USPTO granted patents, and a book on PKI: Concept, Design
and Deployment (Tata McGraw Hill 2003) to his credit. Has served as a member of the review board for many
international journals, conferences and committees. Research interest is in the areas of information security and
privacy.
Began career as a lecturer and computer engineer in the university and IUC-DAE facilities at Indore Centre. Also
worked as faculty at the Institute for Development and Research in Banking Technology (established by RBI),
Hyderabad, for eight years, supervised TWO PhD. Worked at Infosys from 2006 – 2016 as AVP, Principal Research
Scientist, Infosys Labs, Hyderabad where he lead security research as part of the Security Center of Excellence.
Membership of Professional Associations:
• Life Member of Computer Society of India (membership # 00075062 )
• Life Member of Cryptology Research Society of India
• Senior Member of IEEE Computer Society.
29
C S I C o m m u n ic a t i o n s | F E B R UA R Y 2 0 1 7
A REPORT
CSI Nihilent eGovernance Awards 2015-16
GSN Prabhu & K S Vijaya Sekhar
Convener’s Team CNEA 2015-16
The Special Interest Group on
eGovernance of Computer Society of India
(CSI-SIGeGov), successfully conducted the
14th edition of CSI Nihilent eGovernance
Awards (CNEA) ceremony on 24th Jan 2017
in
Coimbatore. The awards ceremony
is a culmination of an elaborate awards
process spread over 9 months starting
with nominations and ending with awards
presentation to the successful entries.
Sponsored by Nihilent Technologies Ltd,
since the year 2002, the awards ceremony
has become integral part of the CSI Annual
Convention. This year’s event took place at
Hotel Le Meridien, Coimbatore.
To make the event rewarding, an
eGovernance track has been included as
part of the CSI 2016 program. This session
was inaugurated by Shri. Sanjay Mohaptra,
VP CSI, in the presence of Shri. Rangaswami,
OC Chair CSI 2016, Prof. M N Hoda,
Chairman Division I-CSI, Shri. Lalit Sawhney,
Ex President-CSI and Shri. Surendra Kapoor,
Convener, CSI-SIGeGov. The first panel
discussion was on ‘Digital Transformation–
Issues and Challenges’ and the second
session was on ‘eGovernance Initiatives –
Emerging Drivers’. The panel sessions were
well attended by the award winners and
accompanying teams. Shri. Lalit Sawhney
and Shri. Satish Babu, past Presidents of CSI
chaired the sessions. Panelists for both the
sessions were Award winners from State and
Projects category.
The much awaited, Awards ceremony
took place in the convention hall. Well
attended with over 100 participants
consisting of 40+ awardees teams and other
invitees, the entire program has been well
received and appreciated for the ambience
and the professional way it got conducted.
The highlight of this year’s ceremony was
the august presence of Dr. Ajay Kumar,
Additional Secretary, Ministry of Electronics
and Information Technology (MeitY), Govt.
of India, as Chief Guest, who distributed the
awards.
While presenting ‘Convener Report’
Shri. GSN Prabhu, Convener CNEA 2016
stated that the Selection Committee has
received over 180 nominations and that
identifying the best from the list has been
very tough task but for the able support and
participation of the Selection Committee.
The Chief Guest, Dr. Ajay Kumar, IAS
illustrated the importance of Digital IndiaSkill India-Make in India-Clean India (DiSi-Mi-Ci) and dwelled on the important role
the e-Governance practitioners need to play
in sustaining and bringing innovation in
whatever they are doing which will drive and
bring success to the eGovernance initiatives.
He even recalled his association with the
CSI Nihilent eGovernance Awards as one
of the recipients of the award earlier and
complimented the CSI-Nihilent team for ably
sustaining the recognition efforts for 14 long
years.
Shri. Surendra Kapoor, Convener,
CSI-SIGeGov welcomed the Chief Guest,
awardees and the invitees and thanked the
CSI 2016 Organization team for excellent
support, He also thanked all the nominees for
continued patronage and participation in the
CSI Nihilent eGovernance awards process
and complemented the award winners.
Shri. Shohel Noor, General Manager at
Nihilent Technologies had this to say, “In its
14th year since inception, the Awards assume
more significance than ever before, with the
intensive focus by the Government on Digital
India, we anticipate a manifold increase in
these initiatives in the country in the days
to come, which makes the CSI Nihilent
eGovernance Awards, all the more relevant
to our growth story. We are indeed proud to
be associated with the awards program”. Mr.
Anoop Bharadwaj who is coordinating CNEA
from Nihilent for the past four years also
attended the event.
Dr. Anirban Basu, President-CSI
opined that the foot print of participation is
from all the States and Central Government
departments. He hoped that CSI would be
able to play constructive and complimentary
role in bringing ‘Digital Transformation’ in
the country.
A compendium in the form of a
book
titled
“Leveraging
Technology
Towards Digital Transformation - Selected
eGovernance Initiatives” was released along
with a ‘Souvenir’ by the Chief Guest on the
occasion. The book edited by Prof. G P Sahu
of MNNIT, Alllahabad; Dr. K S Vijaya Sekhar
of IIIT Hyderabad and Shri. Prabhu Gollamudi
of CSI-SIGeGov and it consists of 500 pages
of selected nominations showcasing projects
across the country.
The awards were presented by the Chief
Guest, assisted by Dr. Anirban Basu, Shri.
P R Rangaswami, Chair OC, CSI-2016 and
others on the dais.
Dr. K S Vijaya Sekhar, presented vote
of thanks and profusely thanked the award
winners for their participation and also
thanked the CSI-2016 OC team for immense
assistance to make the event memorable.
Prof. Harish P Iyer played an important role
in the awards ceremony and added a special
touch as an anchor.
Chief Guest of the Awards Ceremony - Dr. Ajay
Kumar, IAS, Additional Secretary, MeitY, GoI.
Dr. Anirban Basu, President – CSI
Releasing Book ‘Leveraging Technology Towards
Digital Transformation’ by Chief Guest.
CSI-SIGeGov team with Chief Guest and OC Chair,
CSI-2016.
CSI Nihilent eGovernance Awardees 2015-16
and their teams
State Category Award Winners
Project Category Award winners
Award of Excellence: Rajasthan and
Telangana
Award of Recognition
[Progressive State]: Odisha
Award of Recognition (NE States): Nagaland
Award of Excellence13 Projects
Award of Appreciation
11 Projects
Award of Recognition
10 Projects
Award of Recognition
2 Projects
(Sustenance)
More Details are available at www.csinihilent-egovernanceawards.org
30
C S I C o m m u n ic a t i o n s | F E B R UA R Y 2 0 1 7
www.csi-india.org
A REPORT
CSI 2016
The 51st Annual Convention of CSI
was hosted by Coimbatore Chapter and
was held on 23rd – 25th January 2017 at
Hotel Le Meriden on the theme “DIGITAL
CONNECTIVITY - SOCIAL IMPACT”. The
theme was chosen keeping in mind the
thrust of the Government of India in
ushering a Digital India and ensuring
technology is an enabler in improving
the life of every citizen of the country.
The convention had the main aim of
drawing the attention of academicians,
professionals, corporate, research
scholars, Government and all stake
holders to the hugely anticipated
expansion of Digital Connectivity that
could viably impact the economy,
touch the lives of citizens and enable
in building societies that are Happy
Societies to live in.
The curtain raiser to the event was
a well attended Pre Convention Tutorial
conducted at PSG College of Technology
on the 22nd Jan 2017. This had close to
300 participants and was inaugurated
by Dr. R. Rudramoorthy, Principal,
PSG College of Technology who
highlighted the role played by bodies
like CSI in nation building The tutorial
was organized in two tracks keeping in
mind current trends in both industry
and academia., one handling Deep
Learning & Game Theory while the
other was dedicated to Data Science.
Experts from IIT Hyderabad, IIT Madras,
Hike Messenger handled the highly
interesting sessions through the day.
The convention was off to a
colourful start on the 23rd morning with
a lecture by Mr. Anand Ramamoorthy,
Intel Security Inc. The Inaugural which
followed had a galaxy of delegates
including CSI Fellows, Past Presidents,
leading Industrialists from Coimbatore
among others. Mr. P R Rangaswami,
Chair Organizing Committee welcomed,
Dr. Anirban Basu, President CSI
delivered the Presidential address and
Dr. S Subramanian, Chair Program
Committee elaborated the proceedings
planned. In his inaugural speech
the Chief Guest, Dr. B. K. Krishnaraj
Vanavarayar,
Chairman,
Bharatiya
Vidhya Bhavan, Coimbatore Kendra,
applauded CSI Coimbatore chapter for
having put up such a stellar show and
highlighted the importance of culture
in the Indian context and the need for
integrating technology and culture. The
theme talk that followed by the Guest
of Honour, Mr. S. Premkumar, Vice
Chairman and Managing Director, HCL
Infosystems Ltd, was well received. He
spoke at length about how technology
is an enabler in bringing about social
good. He cited the example of the
recent success of youth in Tamil
Nadu using technology to bring about
unprecedented public support for
their cause of “Jallikattu” in a highly
democratically manner. Mr. Sanjay
Mohapatra, Conference Chair/Vice
President CSI and Prof. A K. Nayak
Hon. Secretary CSI also participated in
the proceedings. Thereafter Life Time
Achievement Awards and Fellowship
Awards of CSI were presented to
eminent persons for their noteworthy
contribution. The “Springer Ccis Series
Proceedings” and the Conference
Souvenir were also released.
The post lunch session witnessed
keynote talks by Mr. Sanjay Podder,
Accenture Labs and Dr. Anupam Basu
from IIT, Kharagpur. This was followed by
an interesting Panel Discussion on the
Theme of the Convention moderated by
Mr. S. Mahalingam, Former CFO, TCS
with Dr. K. Ganapathy, Apollo Hospitals,
Dr. D. B. Phatak, IIT, Mumbai and Ms.
Nancy Anabel, MSSRF as the panelists.
The day ended with a Think Tank
meeting which was well attended by
Fellows and Execom members.
The sessions on the second day
were held in 6 halls which included
lectures, paper presentations and panel
discussions. In Three Parallel Tracks,
speakers from leading organizations
including Deloitte Consulting, Amazon,
Nokia, TCS, IBM, Adobe, IISc, Vodafone,
Tech
Mahindra,
NICE
delivered
impactful lectures. Apart from this,
interesting
PANEL
DISCUSSIONS
were held on “How to Leverage the
Latest IT Solutions to thrive in the
Digital Economy” and “Innovation and
Startups” having panelists from Adobe,
Thoughtworks, HCL, Flipkart, Microsoft,
Mobichip, Infibeam among others.
The e-Governance Track had
two panel discussions on “Digital
transformation: issues and challenges”
and “e-Governance initiatives-emerging
drivers”. The e-Governance awards
ceremony was graced by Dr. Ajay Kumar,
I.A.S, Additional Secretary, IT, Govt. of
India and had close to 85 participants
from State Government departments
from across the country. He spoke about
the thrust of the Government on driving
the digital economy and appreciated
the efforts of CSI-SIG e-Governance
in identifying and recognizing the best
projects Pan India.
While 23 high quality peer reviewed
Springer Paper publications were
presented in one track, a parallel
“Research’s Track” was organized
to provide budding researchers an
opportunity to present their work
which was published in the conference
souvenir. Other statutory meetings
including
the
National
Council
meeting, Regional/Divisional meeting,
Membership committee meeting and
Auditor’s meeting chaired by Hon
Treasurer Mr. R K Vyas were held.
The evening saw the delegates being
entertained to a cultural program which
showcased the traditional music, dance
and folk art forms of Tamil Nadu. This
was followed by the convention dinner.
On the concluding day, speakers
from Micosoft, Cisco Systems, Fortinet
shared their technical expertise with
the audience. A Panel Discussion
showcasing few “Successful Startups
From Coimbatore” was conducted to
showcase local talent. A well attended
“Research
Conclave”
provided
researchers an opportunity to listen
to experts on contemporary trends in
Computer Sciences Research.
The Annual General Meeting (AGM)
was also held with good participation by
all members. In the post lunch session,
an interactive session was held with
all Student coordinators and Student
branch counselors to seek their inputs
and suggestions. The CSI Annual
awards to recognize the contribution
of chapters, individuals and institutions
was a well attended affair with over 250
awards presented in various categories.
31
C S I C o m m u n ic a t i o n s | F E B R UA R Y 2 0 1 7
A REPORT
The entire event was attended
by close to 1000 delegates who had
travelled from all parts of the country.
The proceedings of all three days were
WEBCAST to 12 Colleges who were
academic partners thereby reaching
out to a large audience of faculty and
students. Another highlight of the
event was that close to 50 students
selected based on a National Online
Programming Contest were provided
complementary
registration
and
hospitality by the organizers, a first by
any CSI chapter. CSI 2016 concluded
on a very promising and satisfying note
demonstrating to all the technically rich
content that CSI conventions are known
for and went on to set new standards
and benchmarks for forthcoming
conventions.
32
C S I C o m m u n ic a t i o n s | F E B R UA R Y 2 0 1 7
www.csi-india.org
A REPORT
CSI-IEEE Computer Society Joint Education Award 2016
The 51st CSI Annual Convention 2016
at Coimbatore presented for the first
time the CSI – IEEE CS Joint Education
Award 2016 under the Awards category.
This award is a co-ordinated effort
between the IEEE, the IEEE Computer
Society and the Computer Society of
India. The objective of this award is to
recognize educators who have made
significant contributions to computer
science and engineering education. The
award will increase the visibility and
knowledge of both CSI and IEEE CS to
the technical community and public of
India and further promote additional
co-operative initiatives and better
understanding among the members of
the CSI and the IEEE CS.
The Award Jury Panel consisted
of Mr. Satish Babu (Fellow - CSI &
Past President) as Chair, and Prof. M
N Hoda as Vice Chair, supported by
Dr. S S Sane, Dr. Narendra Chaudhari,
Prof. GRC Reddy and Prof. A K Nayak
(Hony. Secretary & Fellow-CSI). Support
from the notable academicians is
appreciated.
A total of 44 entries were received
from all over India, out of which the
panel finalized 8 entries after the
initial screening. In the final round,
the Jury ranked all participants on a
set of criteria such as Contributions
to Course Materials, Contributions to
Papers on Education, Industry linkages,
Contributions to Inspirational Teaching,
Contributions to Writing Influential
Texts, Contributions to Innovative
Development
of
Curriculum
or
Methodology, and Overall Significance
of Contributions to Computer Science &
Engineering Education.
We
honour
the
eminent
academic, Dr. S Thamarai Selvi, as
the first recipient—and indeed the
first woman recipient—of this award.
She is also the First Woman Dean of
the prestigious institute the Madras
Institute of Technology, the Alma Mater
of His Excellency the Late Dr A. P. J
Abdul Kalam, the Former President
of India. She also received an award
from the Chief Minister of Tamil Nadu
for Social Work in Rescue Operation
in Moulivakkam (Chennai) building
collapse using UAV and Thermal
Imaging Technology during July 2014.
CSI is grateful to Dr. Anirban Basu,
President, CSI, and Mr. Roger U Fujii,
President, IEEE Computer Society,
for their joint effort between IEEE, the
IEEE Computer Society and the CSI, for
making this award a grand success.
We look forward to recognizing more
eminent educationists with this award
in the coming years.
MoU with iB Hubs for the benefit of CSI Student Branches
In line with the Start-up India initiative of the Government
of India, during the CSI National Convention inaugural at
Coimbatore on 23rd January, 2017, CSI has signed an MoU
with iB Hubs, a pan-India Start-up and innovation hub for the
benefit of the CSI Student branches and students. The MoU
exchange was by CSI National President, Dr. Anirban Basu
and CEO, iB Hubs, Ms. Radha Alekhya K in the presence of
the CSI National Office Bearers, Mr. Sanjay Mahapatra, CSI
Vice-President; Prof. A. K. Nayak, CSI Secretary and Mr. R. K.
Vyas, Treasurer, CSI. iB Hubs assists young entrepreneurs by
providing support in incubation, mentoring, funding and skill
development. This collaboration initiated by CSI National
Student Coordinator, Prof. Prashant R. Nair will focus on
Entrepreneurship & Skill Development for CSI student
members. iB Hubs which has start-up hubs in 5 cities plans to expand to 500 centres by 2020. Recently, the CEO of NITI
Aayog, Mr. Amitabh Kant launched their hub in New Delhi.
33
C S I C o m m u n ic a t i o n s | F E B R UA R Y 2 0 1 7
A REPORT
CSI Meeting with Myanmar Delegates
The CSI Meeting with Myanmar Delegates was a gathering
of all principal stakeholders of CSI Hyderabad chapter,
Members of various SIGs of CSI and Members from Computer
Federation of Myanmar to brainstorm and seek solutions that
would benefit the Computer and IT related societies in South
Asia. The meeting was organized by Dr. Gautam Mahapatra,
Scientist-G, RCI, DRDO, Former Chairman of CSI Hyderabad
and Chairman, TINICT-Organizing Committee at DAC centre,
RCI Campus, DRDO.
CSI President Dr. Anirban Basu chaired the meeting
which began at about 12.30 PM and ended by 2.30 PM same
day. Office bearers of CSI Hyderabad Chapter, former chair
persons of CSI Hyderabad Chapter and members of various
SIGs of CSI were gathered to address issues, generate new
ideas and approaches as well as chart a road map for India
and Myanmar’s ICT space.
The Welcome Address & Introduction was given by
Dr. Gautam Mahapatra and CSI President Prof. Anirban
Basu gave a presentation about CSI and its future directions.
Myanmar Delegation Leader also shared his organization’s
ideas about ICT development in their country. Then Curtain
Raiser for International Summit on Trends & Innovations for
Next Generation ICT (TINICT)-2017 was held with a grand
success and finally Expression of Gratitude was given by Mr. K
Mohan Raidu, Vice Chairman, CSI Hyderabad.
The leaders and attendees discussed common ICT policy
related issues, affirm shared values and commit to concerted
actions at the national and international level to address
continuing and new challenges faced in the field of ICT.
CSI deliberated on various avenues for collaboration with
Myanmar Computer federation. It was agreed that both the
stake holders will form sub-committees leading to signing of
MoU between two societies.
Book Title: The class of JAVA
Author: Pravin M. Jain
ISBN: 978-81-317-5544-0
Price: Not Available
Publisher: Pearson
As its title implies, this book teaches class in Java
Programming. By now, nearly everyone in the computing
field knows what Java is: an object-oriented, Internetaware
language with the potential to revolutionize programming.
The book is divided into 23 chapters starting with OOPS
introductory to class,
exceptions, multithreading, networking, GUI – swing
and MVC, Applets, JDBC, interaction with database,
annotations and many more. The Indic characters in
Unicode are one of unique quality in the book. It has a good
emphasis on object orientated design; class diagrams are
used extensively throughout the book to make it easy to
understand how examples work. Working through the book
will teach you how to program - not just how to write simple
applets.
Examples in the book teach a wide range of topics, from
simple concepts to high level. The approach taken by the
book introduces topics gradually, and makes it easy to pick
up the skills needed to program in Java.
The book is easy to read and understand by the student
community. The book will serve as useful textbook for
students in computer science, information technology,
computer applications and students who wish to learn
object oriented programming using Java.
Review by:
Dr. Kanhaiya Lal
HOD
Department of Computer Science & Engineering
Birla Institute of Technology Mesra, Patna Campus
34
C S I C o m m u n ic a t i o n s | F E B R UA R Y 2 0 1 7
www.csi-india.org
Life Time Achievement Award
Dr. M. L. Goyal
Dr. M. L. Goyal did his B.E. (Hons.) in Electrical Engg. from MREC, Jaipur; M.E. (Distinction) in Electrical Engg. from
BITS, Pilani; M.A.Sc. in Computer Science from University of Toronto, Canada; and Ph. D. in Computer Science from
Jawaharlal Nehru University, New Delhi.
He Worked in CMC Limited in different Regions, SBUs and functions for more than 31 years (1977-2008). He was
associated with the management of software development & implementation, systems support; consultancy, quality &
excellence processes, marketing, education & training and General Management. During 1991-93, on deputation from
CMC limited, he worked as an Adviser to the Govt. of Mauritius and Head, Central Informatics Bureau at Port Louis.
He superannuated from CMC Limited after serving as General Manager at Chennai and New Delhi. While working in
CMC Limited, he received several appreciation and special contribution awards. In October 1998, he was given the
Outstanding Recognition Award for his significant contribution for the growth of IT Education and Applications & for
achieving professional excellence.
After superannuation from CMC Limited, in September 2008, he joined Maharaja Agrasen Institute of Technology, Delhi
as its Director and continued up to May 2016. Many innovations were introduced in the working of the institute and the
institute grew at a rapid pace during this period. Since, May 2016, he is working as Director General at this institute.
He served the Computer Society of India as its Divisional Chairmen, Honorary Secretary, Vice President, & President.
He was a Member of the Executive Council of the South East Asia Regional Computer Confederation (SEARCC) during
1994-96 and the Indian Representative to the International Federation of Information Processing (IFIP) during 1996-98.
His contribution to CSI has been very significant. During his CSI President-ship, a Committee was set up to prepare
a draft national IT Policy. The Committee brought out a document “INTENT – Information Technology for National
Transformation” and the same was released to the press in October, 1995 and presented to the Planning Commission
and various Govt. Departments. First time in CSI, 2 National IT Application Awards of Rs. 50,000/- each were instituted
in the year 1996. The original CSI logo was expanded by adding to it, the Society’s name, year of its registration and CSI’s
motto “Sarve Bhavantu Sukinah”. His association with CSI started in 1973 when he presented a technical paper based
on his M.E. thesis at the CSI-73 Annual Convention at Delhi. In September 1998, CSI conferred on him its Fellowship
Award.
He was the President – Computer Science Section of the Indian Science Congress Association during 1999 – 2000
and Hon. Treasurer; Chairman, Board of Examination and Council Member of the Institution of Electronics and
Telecommunication Engineers (IETE) during 2006-09. He has been the Chairman, Institution of Engineers, Delhi State
Centre, during 2013-14.
He served as a member in various Committees formed by the Department of Information Technology, Ministry of
Communication and Information Technology, Govt. of India; All India Council of Technical Education, Confederation
of Indian Industry, Technology Information and Assessment Council of Department of Science & Technology, National
Board of Accreditation and Bureau of Indian Standards. He was also a member of the Governing Council of DOEACC
Society during 1994-96.
He is a Fellow of the Institution of Engineers (India) and the Institution of Electronics & Telecommunication Engineers.
On the occasion of the 46th Engineers’ Day on September 15, 2013, The Institution of Engineers (India) Delhi State Centre
conferred on him the Eminent Engineer Award for his significant contribution to the advancement and application of
practice of Engineering in India.
In grateful recognition of his services to the Computer Society of India and his outstanding contribution as an IT
professional to IT Industry and Education, CSI has decided to confer on him the Life Time Achievement Award. The
Society takes pride and pleasure in presenting him this citation on the occasion of its 51st Annual Convention held at
Coimbatore on 23rd January 2017.
35
C S I C o m m u n ic a t i o n s | F E B R UA R Y 2 0 1 7
www.csi-india.org
Life Time Achievement Award
Dr. R. Srinivasan
Dr. R. Srinivasan had contributed extensively for promotion of High quality Research, Computer Education, IT
Industry, Resesearch and Computer Society of India.
Dr. Srnivasan is one of the co-founders of the CSI Bangalore Chapter- inaugurated in 1973/74. Seved CSI-BC
as Vice Chairman and Chairman. He has been the Regional vice-President for the South, Vice President and
President of CSI.
His flagship initiative has been the CSI Karnataka Student Convention in 1987 which is still continuing every
year for the last 29 years!!
His lectures on “Success story of Indian Software Industry and the Lesson for Developing Nations”, Beijing,
China, in the year 2000 and “ Computer Society of India, its Structure and Activities”, Milan, Italy, in the year
1999 had helped CSI to reach new destinations
Dr. Srinivasan has been a member of the Committee on IT Task Force constituted by the then Prime Minister
of India, Shri Atal Bihari Vajpayee and contributed for developing new strategies
He has introduced Video lecture programs in CSI from eminent personalities including Sir Arthur C. Clark.
Dr. Srinivasan served as a Scientist in National Aerospace laboratories for 35 years. He played a major role in
the accession and establishment of NAL Computer Centre housing a mainframe UNIVAC 1100-H1 Computer.
Dr. Srinivasan has been in the Committee Chaired by Dr. Abdul Kalam for the design and development of
parallel computer in DRDO. He has been a member of the Expert Committee to procure computers for ADA,
Bangalore and SERC, Ghaziabad.
Dr. Srinivasan has worked in IT Industry for about 8 years; as CTO in Tata Elxsi, in BFL Software, and as CTO
in iCMG, Bangalore.
Dr. Srinivasan has been a very good teacher and a researcher. He at the age of 78 now, he is working as
Emeritus Professor in M. S. Ramiah Institute of Technology, Banglaore. He has produced 8 Ph.D’s and
published 27 papers in the last four years - has guided more than 100 BE and M.Tech projects.
In grateful recognition of his services to the Computer Society of India and his outstanding contribution as
an IT professional to IT Industry and Education, CSI has decided to confer on him the Life Time Achievement
Award. The Society takes pride and pleasure in presenting him this citation on the occasion of its 51st Annual
Convention held at Coimbatore on 23rd January 2017.
Dr. D. D. Sarma
Dr. Dhavala Dattatreya Sarma, born to Venkataratmma and Jagannadha Sastry earned his Graduation, Masters
level Degrees in Arts and Sciences and Ph.D from Andhra University
Dr. Sarma was Chief Scientist (Scientist G) at National Geophysical Research Institute (Council of Scientific
and Industrial Research, India) and extensively worked on Stochastic and Computer Modeling. Dr. Sarma
36
C S I C o m m u n ic a t i o n s | F E B R UA R Y 2 0 1 7
Life Time Achievement Award
was a Post Doctoral Research Associate at the University of Georgia (USA). He had received intensive training in
Computer Methods and signal processing at IIT-K and University of Roorkee, Roorkee (U.P-India). He had received
intensive training in Computer Methods and Operations Research at the Imperial College of Science & Technology
(London) and the University of Leeds, Leeds, U.K. He was a visiting Scientist at the world famous Centre de
Geostatique, Fontainebleau, France. Presently, he is working as Professor and Director, Guru Nanak Institutions
Technical Campus, Hyderabad,
Dr. Sarma has promoted research and produced several Ph.D. Holderrs. He had published over seventy five
research papers and Three books He has organized a number of national and international conferences on various
aspects of computers, e-learning and entrepreneurship education. Over the years, he has held leadership positions
in various high profile scientific/educational institutions. . Among others, Dr. Sarma is a Fellow, Computer Society
of India, Fellow, A.P. Akademi of Sciences, Fellow, Telangana Academy of Sciences, Indian Society for Probability
and Statistics, Fellow Geological Society of India. He was Regional Respresentative for Asia of the International
Geostatistics Association (France) from 1992 - 2000. He is presently the Chairman IT & CSE Section of A.P. Akademi
of Sciences.
Dr. Sarma became member of CSI in 1968 and was associated with the Regd. Office of CSI, Hyderabad since its
formation He was Regional Representative of CSI during 1979- 83 and organized Four regional conferences.
He was member, Publication Committee of CSI from 1996 -1998 and during 2004. Dr. Sarma had served as
Chairman, CSI Hyderabad Chapter from 1986-88, Chairman, Finance Committee of CSI- 95 held at Hyderabad
(1995), Chairman Div. VIII (Micro Computers), during 1994-1998. He was member, awards committee of CSI during
1998 and 2004 and member, Publication Committee of CSI from 1996 -1998 and during 2004. As Divisional
Chairman he organized a number of workshops and conferences on various aspects of computer methods and
modeling.
He was Regional Academic Auditor for Aptech for their NCC-Aptech Educational Programme for a number of
years. Dr. Sarma is the Editor, International Journal of Computer Science and Engineering being brought by Guru
Nanak Institutions.
In grateful recognition of his services to the Computer Society of India and his outstanding contribution as an IT
professional to IT Industry and Education, CSI has decided to confer on him the Life Time Achievement Award. The
Society takes pride and pleasure in presenting him this citation on the occasion of its 51st Annual Convention held
at Coimbatore on 23rd January 2017.
Mr. G. Ramachandran
Mr. G. Ramachandran obtained M.Sc degree in Mathematics from Madras University and M.Stat from Indian
Statistical Institute, Kolkata. He is a member of Computer Society of India from 1965 and currently a Fellow life
member.
Mr. G. Ramachandran has made outstanding contribution in the field of Information Technology for Indian Industry
for more than five decades. He has developed and implemented more than 150 Information Technology Projects,
covering many domains. He has developed Strategic Plan for computerisation for many enterprises. He was a
member of the group constituted to have an appraisal of EDP facilities available in Public Sector Undertakings
under the ministry of Heavy Engineering Industries. He was a pioneer in introducing bar codes for retail stores
billing. He has worked with both Public and Private enterprises. As an entrepreneur he has set up two companies,
one on software development and the other on software training. He has represented our country and presented
37
C S I C o m m u n ic a t i o n s | F E B R UA R Y 2 0 1 7
www.csi-india.org
Life Time Achievement Award
country paper in Asian Productivity Council, Tokyo and Computer Conferences at Singapore, Hong Kong and Tokyo.
He has trained more than 400 Information Technology professionals, who are now contributing for the advancement
of Indian Information Technology Industries. He was a member of the first MCA Syllabus committee of the Madras
University.
Mr. G. Ramachandran was committed and his contribution to Computer Society of India is outstanding. He played
a major role in acquiring own premises for many chapters. He has organised many national and international
conferences on behalf of Computer Society of India. He was the convener of the first National Students Convention
of Computer Society of India and the first DOEACC Chairman. He was a member of the group constituted to start
the Education Directorate at Chennai. He started the Visakhapatnam Chapter and held various positions in CSI
Executive Committee as Regional Vice President (South), Honorary Secretary, Past Secretary and Vice President.
Mr. G. Ramachandran excelled in the sports field also. He was a member of the Madras University, Madras State,
West Bengal State Basket Ball team. He captained West Bengal State Basket Ball team and was selected to
represent Indian Basket Ball team.
In grateful recognition of his services to Computer Society of India, Information Technology Industry and Society,
Computer Society of India is pleased to confer on Mr. G. Ramachandran Life Time Achievement Award. The Society
takes pride and pleasure in recognising him with this citation on the occasion of the 51st Annual Convention held
at Coimbatore on 23rd January 2017.
Prof. U. K. Singh
Prof. Uttam Kumar Singh, Founder Director General of Indian Institute of Business Management & Dr. Zakir
Husain Institute, Patna completed B.Sc. and MBA (MIS) from Bihar University, Muzaffarpur in 1972 & 1974 and
further obtained PhD, Master of Public Administration (MPA) and BNYS Degree. After completion of academic
pursuits, Prof. Singh entered into Institution Building and established several technical and vocational Institutes of
national repute at Patna, Ranchi, New Delhi, Kolkata, Pune, Bhubaneswar including two universities in Nagaland
and Arunachal Pradesh. Since the Year 1979, Prof. U. K. Singh, initiated Computers & IT Education in the State of
Bihar & Jharkhand. He is the first academician to start P. G. Diploma in Computer Applications, BIT, MIT, BCA &
MCA in undivided Bihar and Jharkhand. As a pioneer personality in the areas of Computers & IT Education in India.
Prof. Singh was instrumental in initiating computer science for Women, School Teachers and Govt. officials in
1984 with financial support from Department of Electronics, Govt. of India under IT Awareness Programme (ITAP).
Under his guidance, Govt. of India established the National Centre for IT Instructional Materials Development,
National Centre for Research and Training for Professionals and Administrators with funding from Govt. of India,
Department of Electronics, Prof. Singh introduced Computer Aided Education in Non-formal Education in the Year
1985.
Prof. U. K. Singh is Fellow of Computer Society of India and was Founder Vice Chairman of CSI, Patna Chapter.
Later, he served CSI as Chairman, CSI Patna Chapter, Divisional Chairman (Data Communication), Regional Vice
President (East), twice member of Nominations Committee at National Level. He was nominated as TC Member
(Education) to the International Federation of Information Processing (IFIP) Vienna, Austria. He activity organized
various Regional, Divisional and National Conferences at various locations in India. CSI conferred Fellowship on
Prof. U. K. Singh during 2011 for his contributions on the objectives of CSI.
Prof. Singh was also elected President of Computer & IT section of 100th Indian Science Congress. As prolific
writer on Computers & IT, Prof. Singh has published several Books and Articles. Prof. Singh is also associated with
Institution of Electronics & Tele-Communication Engineers, All India Management Association, Indian Society for
38
C S I C o m m u n ic a t i o n s | F E B R UA R Y 2 0 1 7
Life Time Achievement Award
Technical Education, Indian Commerce Association and also Executive Member of All India Council for Technical
Education (AICTE) for five years. Presently, Prof. Singh has been nominated TC Member (Education) to IFIP, Austria
by CSI.
In grateful recognition of his services to the Computer Society of India and his outstanding contribution as an IT
professional to IT Industry and Education, CSI has decided to confer on him the Life Time Achievement Award. The
Society takes pride and pleasure in presenting him this citation on the occasion of its 51st Annual Convention held
at Coimbatore on 23rd January 2017
Honorary Fellowship Award
Dr. Thangam Meganathan
Dr. Thangam Meganathan is the Chairperson of the Rajalakshmi Educational Trust based out of Chennai. She has
close to 20 years of experience in the field of Educational Administration.
Dr. Thangam Meganathan completed her Graduate and Post Graduate degrees in Public Administration from the
Madras Christian College, Chennai. She obtained her Doctorate from Madras University for her research work on
Technical Education in Tamil Nadu. She also holds an International Diploma for Teachers and Trainers offered by
Cambridge.
As Chairperson of the Rajalakshmi Group of Institutions, she is primarily responsible for providing vision and
strategy for all the educational Institutions run by the Trust. Under her transformational leadership, the Institutions
have emerged as some of the best Institutions in the country offering high quality Technical Education.
Dr. Thangam Meganathan has provided an inspirational vision to the group which has put the Institutions on a high
growth trajectory. She has also set herself as a role model for high performance and encourages the same from
all the faculty members and staff. As a strong believer in Quality, she has ensured that Quality is a culture inside
the Institutions run by the Trust.
Dr. Thangam Meganathan strongly believes that Innovation is a key change agent that can bring about transformation
in the lives of young students. She has also been responsible for the implementation of several path breaking
innovative practices.
She has worked closely with the Computer Society of India to help CSI improve the programming & problem solving
skills of young students. Through her erudite inputs and sponsorship, CSI had organized programming contests for
school children at the regional, National and International levels.
Dr. Thangam Meganathan has also been serving as a Member of the CII Tamil Nadu Education Panel for the past
four years and headed the CII Tamil Nadu Education Panel for 2 continuous terms. She is presently a member in
the CII- Southern Region Education Subcommittee. She is also a part of the national initiative of CII in Primary
Education responsible for policy advocacy. Besides these, she has served in several other committees of CII and
ASSOCHAM and was instrumental in organizing several high impact conferences.
She also serves as a Member of the Bouncing Board Initiative of the CII Panel on ‘Women Empowerment and
Leadership’ through the Indian Women Network (IWN). She has been the Vice Chairperson of this initiative in the
39
C S I C o m m u n ic a t i o n s | F E B R UA R Y 2 0 1 7
www.csi-india.org
Honorary Fellowship Award
year 2014-15 and spearheaded several initiatives for women welfare. She is also actively involved in initiatives to
bring awareness about the Indian tradition and culture among the youth pursuing school and higher education.
In a nutshell, Dr. Thangam through her thoughtfulness and actions has left an indelible impact on students and
the youth at large.
In recognition of her outstanding accomplishments and memorable services to the Computer Society of India and
academia, CSI is pleased to confer upon Dr. Thangam Meganathan the HONORARY FELLOW of the society award.
The Computer Society of India takes pride and pleasure in presenting this citation to Dr. Thangam Meganthan on
the occasion of its 51st Annual Convention held at Coimbatore on 23rd January 2017.
Mr. Koneru Satyanarayana
Er Koneru Satyanarayana, President of Koneru Lakshmaiah Education Foundation is an educationist of eminence, philanthropist
and an industrialist of great repute. He co-founded Koneru Lakshmaiah College of Engineering (KLCE) in 1980. KLCE was
the first private engineering college in AP to introduce Computer Science and Engineering (CSE) and Information Science &
Technology (IST) courses foreseeing its requirement for the nation immense potential of providing challenging and lucrative
jobs. KLCE has the unique distinction of becoming the No. 1 private engineering institution as evidenced by the NAAC rating of
3.76 in 4.0 scale in all India basis under his leadership.
He was instrumental in transforming the institution to attain Deemed to be University status in 2009, which is now academic
heaven for 12000 UG/PG students and 1400 Phd scholars supported by 800 teaching faculty out of which 300 are doctorates.
The University is offering 42 academic programs as on date with an intake of 3500. The intrinsic strength of both KLCE and KLU
is excellent human resource generation reflecting in 100% placement during the past one decade. So far KLCE and KLU have
provided employment to about 36000 students in reputed Industries. Number of students has become entrepreneurs.
Born on 20th October 1954 to Sri Koneru Lakshmaiah and Smt. Chittemma, he graduated in Electronics and Communication
Engineering from BMS College of Engineering, Bangalore in 1977. He has distinctive prestigious fellowships & memberships
like FIE, FIETE, MIEEE and CII.
Mr.Satyanarayana put his heart and soul to make KLU as gem of institutions by encouraging and implementing many innovations
and best practices in learning. He ensured that the institution develops research environment to enable the teaching faculty
to strive and secure doctorates and transfer the technology to the society. He is the positive influence behind the University
in accomplishing an enviable feat of being ranked 59th in the country and No.1 in Andhra Pradesh State as certified by NIRF,
MHRD. His discipline, honesty and integrity in managing the institution made KLU become the most sought after technical
institution in the State of Andhra Pradesh.
He is not only a champion of education but also nurtures education by granting substantial sums towards scholarships for the
underprivileged students. Some of the beneficiaries of his generous donations include the UNICEF, Leper patients at leprosy
home at Pudukottai, Tamil Nadu, Aadarana, an NGO based in the backward region of Mangalagiri helping the poor people in
health and education.
Computer Society of India (CSI) has been inextricably entwined with K L University with his passion to meet the objectives of CSI.
Sri Koneru Satyanarayana became the founder chairman of the Koneru Chapter of CSI (2003) and initiated several programs
for the society at large. Promoted CSI Student branches in Andhra Pradesh and to carry out the professional development
of students and teachers by sponsoring and arranging related CSI events. Encouraged School Children with CSI-FUN Quiz
programs by sponsoring them in the combined Andhra Pradesh since 2011 on wards through CSI-K L University Student Branch.
Mr. Satyanarayana established 15 different companies, which are spread across different sectors that include Aqua, Transport,
IT, Real Estate, Hospitality, Estate Management and Film Industry. As a strong practitioner and advocate of human values
and professional ethics, Mr. Satyanarayana ensured that Human Values is included on KLU’s undergraduate curriculum as a
compulsory course for all students to help them imbibe and reflect values in everything they do. Today, human values are the
40
C S I C o m m u n ic a t i o n s | F E B R UA R Y 2 0 1 7
Honorary Fellowship Award
hallmark of both KLU’s education and work culture.
Mr. Satyanarayana is an ardent champion of social service and rural uplift. He has been serving the society by adopting
neighboring villages. Recently, he initiated the program of converting 8 villages as smart villages. He ensured that the roads
of the surrounding village are improved by granting copious donations. Many surrounding villages were adopted for improving
their sanitation hygiene. Hon’ble Prime Minister Narendra Modi’s Swacha Bharat campaign was taken up by Er. Koneru
Satyanarayana in rural Andhra Pradesh.
He sponsored and arranged regular DIGITAL literacy programs for the society at large and initiated Skill Development Programs
for establishing different professions and sectors. Under his stewardship in recently concluded Krishna Pushkaralu, KLU gave
technology support to Government of AP. KLU has sponsored and conducted several training programs on e-governance for AP
Government Officials, Ministers and Policy makers.
In grateful recognition for his outstanding services to engineering education, IT Industry and society at large CSI has great
pleasure to confer him the HONORARY FELLOW of the society. The Computer Society of India takes pride and pleasure in
presenting this citation to Er. Koneru Satyanarayana on the occasion of its 51st Annual Convention held at Coimbatore on 23rd
January 2017.
Fellowship Award
Dr. R Nadarajan
Dr. R Nadarajan, an accomplished teacher with great vision and hard work earned recognition from students,
parents, academicians and IT industry executives for introducing Three FIVE YEAR integrated Masters programme
in Software Engineering, Theoretical Computer Science and Data Science. Right from the inception of the Software
Engineering programme in 1997 at PSG College of Technology, where he is a Professor in the Department of
Applied Mathematics and Computational Sciences, the value of these programmes with the industry has only
grown in geometric proportions and his students have been placed in enviable positions. “Teaching is Reaching”
is the DNA of Professor Nadarajan and he is widely esteemed by students for his inspirational teaching which led
students to understand the inter-connectedness of ideas, facts and skills from areas of knowledge perceived as
independent.
Dr. R Nadarajan has guided 25 Ph.D scholars and has published around 60 research papers in International
journals. Besides receiving research funding from several Government funding agencies, he has set up a Centre for
Excellence in Software Engineering funded by TCS. He has organized 6 International conferences on Mathematical
and Computational models by bringing distinguished speakers from top notch institutions and industries.
He has contributed significantly for the automation of the entire administration functions of PSG College of
Technology.
His association with CSI spans more than three decades since BIG 86. He has held several positions in the
Coimbatore chapter and as National ExecCom member. He has given many lectures in many CSI chapters and
student branches about research and innovation for students and faculty.
In grateful recognition of his services to Computer Society of India, and his outstanding accomplishment as an
IT professional, the CSI has decided to name him FELLOW of the society. The society takes pride and pleasure in
presenting him with citation on the occasion of its 51st Annual Convention held at Coimbatore on 23rd January
2017.
41
C S I C o m m u n ic a t i o n s | F E B R UA R Y 2 0 1 7
www.csi-india.org
Fellowship Award
Prof. P. S. Grover
Professor P. S. Grover had obtained his Masters and Doctorate from Delhi University and started his teaching
& research career in the same university. Dr. Grover was In-charge of the first IBM 1620 Computer System
and later became Director of IBM 360 Computer Centre, at Delhi University. He has been among the founding
members of Computer Science Department at Delhi University and for starting MCA & Ph.D. Programmes
in C.Sc.. He has been Adviser, Consultant and member of academic bodies and research boards for several
institutes in North India. Prof. Grover has been associated with UGC, AICTE, MICT, DOEACC, NIELIT, CBSE,
National Board of Accreditation, National Assessment and Accreditation (NAAC) and contributing to the
advancement and spread of computer science and engineering education.
He had won Nehru Memorial Award and was Post-doctoral Fellow at Bristol University, England, Research
Associate at National Research Council, Canada and ICTP, Italy. He has been a Visiting Scientist at many
prestigious institutes/universities in UK, Canada, USA, Singapore, Malaysia, Nepal, Iraq, and Kuwait and
delivered invited talks/seminars.
Prof. Grover served Computer Society of India as Chairman of Delhi Chapter, Divisional Chairman (twice),
National Vice President (twice), Member – Nomination and Awards Committee, and represented CSI in IFIP
and SEARCC Forums. He was invited to be Editor of Special Edition of CSI Journal on ‘Software Engineering’.
He is on the Editorial Boards of International Journals and Reviewer of prestigious Conferences. He was
Chairman – Computer Science and Communications, Indian Science Congress. He has been a consultant and
associated with IT Industries which include TCS, IIS Infotech, DCM Technologies.
He has been an active researcher, guide, teacher and author – written 9 books in the field of computer science
and published over 150 research papers. He has promoted in developing new institutions and has contributed
to the setting-up of new universities/engineering institutes and entrepreneurial campuses. Prof. Grover is
deeply involved in improving the quality of higher education by implementing and spreading modern teaching/
learning processes/practices.
In grateful recognition of his services to Computer Society of India, and his outstanding accomplishment as an
IT professional, the CSI has decided to name him FELLOW of the society. The society takes pride and pleasure
in presenting him with citation on the occasion of its 51st Annual Convention held at Coimbatore on 23rd
January 2017.
Dr. P. K. Sinha
Dr. Pradeep Kumar Sinha, an engineer turned academician, is the Vice Chancellor & Director of International
Institute of Information Technology (IIIT), Naya Raipur. Earlier he was with the Centre for Development of
Advanced Computing (C-DAC).
Technical contributions of Dr. Sinha include national projects, supercomputing systems and facilities,
healthcare products and solutions, international patents, a number of technical papers and six books in the
area of Computer Science & Engineering. On public demand, books authored by him have been translated in
local languages like Japanese and Hindi.
42
C S I C o m m u n ic a t i o n s | F E B R UA R Y 2 0 1 7
Fellowship Award
Dr. Sinha was instrumental in commissioning the first national super computing facility at C-DAC in 1998
and led C-DAC team to design and engineer the facility. Under his leadership, his team developed models,
mechanisms and policies for usage, remote access, security, and round-the-clock operation of such facilities
to enable offering of super computing services to the users. With the capabilities developed, his team also
commissioned many such facilities in several academic and research institutions. Super computing systems
being a powerful tool for high-end R&D in all domains of science and engineering, these initiatives helped
several researchers from various disciplines to carry out their research more efficiently and effectively.
Dr. Sinha also led C-DAC’s team in designing and commissioning the PARAM Yuva II supercomputer in 2013,
which ranked 69th among the world’s Top 500 Supercomputers in June 2013 list. The system ranked 44th in
the world, 9th in Asia Pacific and Number One in India as per the November 2013 list of world’s Green 500
supercomputers.
Recognizing Dr. Sinha’s expertise in supercomputing, Government of India selected him in 2013 as a member
of a committee of four scientists from the Department of Science & Technology (DST) and the Department
of Electronics and information Technology (DeitY) to prepare a project proposal for the Next Generation
Supercomputing activities of India. The National Supercomputing Mission (NSM) proposal finalized by the
committee was subsequently approved by the Cabinet Committee on Economic Affairs in 2014. The proposal,
having an outlay of 4500/- Crores, forms the basis of uplifting Indian Science & Engineering research to a
much higher level than now.
He is bestowed with ACM Distinguished Engineer for his significant accomplishments in the field of computing
and its impact thereon. The Institute of Electrical and Electronics Engineers (IEEE), USA named him IEEE
Fellow, for his demonstrated leadership in Distributed and Parallel Processing systems.
In grateful recognition of Dr. Pradeep Kumar Sinha’s significant contributions to the area of Computer Science
and Engineering at National and International levels, the Computer Society of India is proud to name him a
FELLOW of the Society. The Society is pleased to present him with this citation on the occasion of its 51st
Annual Convention held at Coimbatore on 23rd January 2017.
Prof. P. S. Avadhani
Prof. P. S. Avadhani, obtained his M.Tech (Computer Science), Ph.D from IIT, Kanpur and F.I.E. from the
Institute of Engineers (India) in 2014. He has more than 30 years of teaching and research experience.
Prof. P. S. Avadhani presently serving as the Principal, AU College of Engineering (Autonomous), Andhra
University, held number of Offices in various capacities viz., honorary member and Life Member in several
National and International Bodies, Vice-Chairman, Computer Society of India (2014-15), Chairman, Computer
Society of India (2015-16) Chairman Board of Studies of number of Institutions, Convener, APEPDCL Test-2014
-2015 etc. to name a few. His extensive relations with Industry and entrepreneurs helped the Institution in
placing number of young Techies into jobs.
43
C S I C o m m u n ic a t i o n s | F E B R UA R Y 2 0 1 7
www.csi-india.org
Fellowship Award
He has commendable knowledge in Sanskrit, Hindi, English and Telugu and a notable poet and orator. Prof.
Avadhani has been honored with Best Researcher Award from Andhra University in 2005-06 and State Best
Teacher from the government of Andhra Pradesh in 2015, Chapter Patron Award from Computer Society of
India and distinguished Academician Award-2011 from Pentagan Research Centre, Hyderabad.
Prof. P. S. Avadhani authored Books on Data Structures, Data Management Systems, Discrete Mathematical
Structures and Computer Graphics etc., Prof. Avadhani authored and co-authored more than 200 research
papers/Articles.
In grateful recognition of his services to Computer Society of India, and his outstanding accomplishment as an
IT professional, the CSI has decided to name him FELLOW of the society. The society takes pride and pleasure
in presenting him with citation on the occasion of its 51st Annual Convention held at Coimbatore on 23rd
January 2017.
Prof. C. T. Bhunia
Professor Chandan Tilak Bhunia is immediate past Director of National Institute of Technology (An institute
of National Importance), Arunachal Pradesh. He completed his five years tenure on 31st October, 2016.
Prof. Bhunia has about 31 years teaching and research experience at UG and PG level. He published more than
150 peer reviewed research papers in journals and guided 12 Ph D scholars. He authored 6 books including
books on Information Technology and Quantum Computing. He widely visited foreign countries including USA,
UK, Italy, Bhutan, Bangladesh, Singapore, China, Jordan on several academic assignments. He has been
BOYSCAST FELLOW of DST, Govt of India at Durham University, UK; Senior Associate at ICTP, Italy and Visiting
Consultant Professor at CST, Royal University of Bhutan.
Professor Bhunia has been a member of CSI since 1987. He established for the first time in whole of North
Eastern Regional a Students chapter of CSI in North Eastern Regional Institute of Science and Technology,
Arunachal Pradesh. This student branch was awarded twice the best eastern regional award in 1995 and 1996.
He further established such chapters in many institute like Haldia Institute of Technology, Heritage Institute of
Technology, Bengal Institute of Technology & Management etc. He enriched CSI communication by publishing
more than 50 articles for which he was awarded twice best article awards in 1996. He also published several
research papers in Informatics. He delivered several invited talks at CSI sponsored conferences and also
organized several such conferences.
In grateful recognition of his services to the Computer Society of India, and his outstanding accomplishment
as an IT professional, the CSI has decided to name him FELLOW of the society. The society takes pride and
pleasure in presenting him with citation on the occasion of its 51st Annual Convention held at Coimbatore on
23rd January 2017.
44
C S I C o m m u n ic a t i o n s | F E B R UA R Y 2 0 1 7
Fellowship Award
Mr. M. L. Ravi
An innovative leader and the youngest president of CSI, Mr. M L Ravi holds a Bachelor of Engineering degree
in Electronics and Communication from the University of Mysore and a Diploma in Management from the All
India Management Association (AIMA), New Delhi. He has over three decades of experience in the computer
and allied industry.
Mr. Ravi has been a member of the CSI since 1983 and is currently a life member. He has served as Treasurer,
Secretary and Chairman of CSI Bangalore chapter during the years 1990-91, 1996-98 and 1998-00 respectively.
He has contributed as an active core member of the organising committee in ‘CSI-1996’ and event manager of
“CSI-2002” held in Bangalore. During his tenure in the management committee at the Bangalore Chapter, he
organised a Top Management workshop on ERP, which was the first of its kind in India.
He played a stellar role in helping the CSI form new chapters in various parts of the country and focussed
on improving its governance at the strategic level. As Vice-President in 2003-04 and President in 2004-05,
he was instrumental in driving new initiatives by conducting workshops, seminars and conferences on rural
development, faculty standards and student development programmes, resource mobilisation and sprucing
up the Educational Directorate at Chennai. He galvanised the student community by actively engaging with
engineering colleges and technical institutions across the country. He positioned CSI positively as a pro-active
interface between academia, industry and Government.
Mr. Ravi was the Key Note Speaker at SEARCC, 2004 held at Kuala lumpur, Malaysia. He served on the
consultative committee of CICC, Ministry of Export, Trade and Industry, Govt. of Japan on Human Resources and
RFID technology from 2005 to 2007. He was an invited speaker at their conferences held in Cebu, Phillipines
in 2005 and at Tokyo, Japan in 2006.
After having worked in the IT industry with Wipro Information Technology Ltd., Digitron Computers and Sunray
Computers, he founded the Innovative Consulting Group (a division of Innovative Homes Pvt. Ltd.) in 1990,
which was a true-blue ‘Startup’ of the pre-liberalisation era. The company showcased how IT can be leveraged
in the fields of town planning, architecture, 3D animation and imaging. He was also actively involved in the
project of preparing the photo-identity cards for the Election Commission of India.
Currently he mentors young entrepreneurs in areas of corporate planning and management and has keen
interest in sports, travel and spirituality.
In grateful recognition of his services to Computer Society of India, and his outstanding accomplishment as an
IT professional, the CSI has decided to name him FELLOW of the society. The society takes pride and pleasure
in presenting him with citation on the occasion of its 51st Annual Convention held at Coimbatore on 23rd
January 2017.
45
C S I C o m m u n ic a t i o n s | F E B R UA R Y 2 0 1 7
www.csi-india.org
Brain Teaser
CrossWord
Durgesh Kumar Mishra
Chairman CSI Division IV Communications
Professor (CSE) and Director Microsoft Innovation Center, Sri Aurobindo Institute of Technology,
Indore. Email – [email protected]
Test your knowledge on Operating System
Solution to the crossword with name of first all correct solution provider(s) will appear in the next issue. Send your answer to CSI
Communications at email address [email protected] and cc to [email protected] with subject: Crossword Solution –
CSIC February 2017 Issue.
1
2
3
4
5
6
7
8
9
Clues
Across
4. A small program for a particular device
6. An active program
7. Part of OS to manage resources
8. The process of loading OS
10.An OS for mobile
Down
1. A command line interface
2. The main circuit board of the computer
3. A variant of UNIX operating system
4. An automatically running program in the
background
5. Basic unit of communication on the
network
8. A program installed on the computer to
start OS
9. A state when the system does not respond
to keyboard commands
10
Solution for January 2017 Crossword
5
I
L
1
A
3
P
S
All nearby Correct answers to January 2017 month’s crossword
received from the following reader:
• Ms. Priyanshu Jadon, M.Tech., Sri Vishnav Vidhya Peeth, Indore
• Mr. Alok Tiwari, DAVV, Indore
R
O
T
P
P
O
C
O
7
8
6
A
h
a
p
p
L
b
10
i
t
c
n
o
i
e
11
n
o
12
t
s
n
d
9
4
L
R
T
We are overwhelmed by the response and solutions received from our
enthusiastic readers
Congratulations!
2
G
i
A
f
T
f
E
e
W
A
f
e
r
A
s
p
a
m
t
i
v
e
Y
r
13
a
c
x
n
e
t
46
C S I C o m m u n ic a t i o n s | F E B R UA R Y 2 0 1 7
www.csi-india.org
Trends and Innovations for
Next Gen ICT (TINICT)International Summit 2017
Saturday March 4th, 2017
Hotel Novotel Airport ,
Hyderabad
Organized by CSI Hyderabad
in collaboration with RCI(DRDO)
Welcome to TINICT-2017 !
This International Summit "Trends and Innovations for Next Gen ICT
(TINICT)" intends to provide a forum to exchange ideas among
interested researchers, scientists, developers and practitioners in the areas
of computing, communications and informatics.
The role of Information and Communication Technologies (ICT) as a
tool for development and transparency has attracted the sustained
attention of the entire world over recent years. ICT comprises a complex
and heterogeneous set of goods, applications and services used to
produce, process, distribute and transform information.
The potential of ICT for stimulating economic growth, socioeconomic
development and effective governance is well recognized. But the benefits
of ICT have been unevenly distributed within and between countries.
India has now gradually emerged as able participant in the workforce and
have even advanced to hold important roles and positions. So there are
strong needs to identify and recognize the trends and innovations of ICT
for empowering our Nation.
http://csihyderabad.org/
Be in touch with us
Chief Guest
Sri K.T. Rama Rao
Minister of Information Technology,
Government of Telangana
Guest of Honour:
Dr. G. Satheesh Reddy Distinguished
Scientist, Scientific Adviser to Raksha Mantri
(SA to RM) and Director General, Missiles
and Strategic system.
This initiative will mobilize all the stakeholders to focus on frontiers of
ICT for the benefit of the entire society to bring the digital revolution
leading to IT enablement of our Country. In this summit we are bringing
subject experts from all spheres of ICT and related technologies namelyCloud, Big Data, IoT, Cyber Space Defence, Disaster Recovery etc., who
will work as a catalyst to initiate innovations in the entire ecosystem.
This International Summit is being organized to celebrate the foundation
day of Computer Society of India (CSI) which took birth on 6th
March, 1965 at DRDO campus Hyderabad. As part of this
celebration, Inspirational Speech by a famous and magnetic
personality is also organized to ignite the minds of ICT Professionals.
Participants : Delegates including IT heads of Govt organizations, Private sector
Industries ,
Public
Sector
Undertakings,
Legal
Authorities,
Defence
Research Organizations, Faculties of Universities in India and the IT users of our country.
From:
Shri. Gautam Mahapartra,
Scientist -G, RCI(DRDO)
Chairman, Organizing Committee
TINICT-2017
Registration Fees and Deadlines
Registration Includes: Keynotes, Plenaries and Technical Sessions, Industry Forum and Exhibition(IF&E).
Registration Fees: For CSI Members Rs.10,000/- and For Non CSI Members Rs. 12000/All payment to be made on: State Bank Of India, A/C No: 34200480145, IFSC Code: SBIN0007074
Registration will be done via online through http://csihyderabad.org/ Web site.
Conference Sponsor
Contact Details:
302, Archana Arcade, 10-3-190, St. Johns Road, Opposite Railway Reservation Complex,
Secunderabad,Telangana; Pin code No: 500025
Phone: +91-040-24306644, +91-040-24306345, 9490751639
E-Mail: [email protected]; [email protected]
TINICT-2017
R.S.V.P: Mr. T. Satyanarayana, Mob: 9441242829
47
C S I C o m m u n ic a t i o n s | F E B R UA R Y 2 0 1 7
from chapters & di v isions
AHMEDABAD CHAPTER
Inter College Quiz Competition - 2016 was organized
by Computer Society of India – Ahmedabad Chapter on
September 18, 2016 at UGC Conference Hall, HK College
Campus, Ahmedabad. Event was divided in three different
levels. Two levels were for Under Graduate students and
third level was for the students of Post Graduate. Total of
38 teams participated. Each team contains 3 members. Mr
Sujoy Pal, Managing Committee member, CSI-AC gave the
presentation about CSI. Total two rounds were conducted;
one was preliminary round and second was the final round.
Three teams with highest score in preliminary round were
selected for the final round. In the final round of first UG
Level team from Swaminarayan Arts college was the
winner. The winner team in the second UG was from the
Navgujarat College of Computer Applications. Third and
final round of for PG level was conducted between the teams
from Chimanbhai Patel Institute, L. J. Institute of Computer
Applications and L. D. Engineering College. Winner team
was from the L J Institute of Computer Applications. All
winner participants get the trophy along with certificate of
achievement. CSI Ahmedabad Chapter is heartily thankful to
the management of H K College for providing infrastructure.
ALLAHABAD Chapter
Allahabad chapter along with Centre of computer Sciences,
Ewing Christian College Allahabad organized one week
workshop on Android Application Development from 7th
January, 2017. About 65 students were participated in the
event.
Amravati Chapter
A National Level 3 days workshop on “MACHINE LEARNING
AND HANDS ON TRAINING USING MATLAB PROGRAMMING”
was conducted by Shri Sant Gajanan Maharaj College of
Engineering, Shegaon Dist Buldhana , Maharashtra from
28th to 30th December 2016 with the technical sponsorship
of CSI Amravati Chapter. Dr. R.K.Agrawal , JNU New Delhi
was the main resourse person for the workshop. Prof N M
Kandoi was the convenor, Prof D.R.Dhotre and Prof Vijay
Mahalle were the coordinators.
CHENNAI Chapter
Allahabad chapter organized Annual General Meeting-2016
at Hotel Milam Palace on 30th December, 2016. Prof M M
Gore, Chapter Chairman started the meeting by welcoming
note. Annual meeting is started by presenting balance
sheet and annual report by Mr Rajiv Gupta. Er. Mithlesh
Mishra (Vice-chairman) presented a report of the activities
held during the year. The senior members discussed the
future agenda regarding CSI activities and all the other CSI
members participated in the open discussion on the topiccashless and Digital payment. Dr. Shashank Srivastava,
Chapter Secretary gave the votes of thanks.
One Day Workshop on Vedic Self-Management was held on
14th Dec 2016 by Dr. S Kannan. The presentation covered
various aspects of Vedic management, specially relating to
relationship between Body, Mind and Intellect. There was
48
C S I C o m m u n ic a t i o n s | F E B R UA R Y 2 0 1 7
www.csi-india.org
from chapters & di v isions
a detailed reference to mapping of individual’s personality
based on Trigunas, Pancha Kosas and Chakras. The
emphasis was always on achieving managerial excellence
imbibing and adapting oneself to various principles of
Management, as enunciated in our Vedas; Dr. Kannan
interspersed his presentation with quotes from our Vedas.
At the end of his presentation, the audience was divided into
six teams of 2 persons per team; Dr. Kannan gave six sets of
cases involving various managerial aspects and situations;
the teams were asked to workout their solutions and their
interpretations based on the principles covered in the Vedic
Management sessions; the teams then presented the
case studies with solutions and interpretations. The entire
program of the day concluded with a 15 mins. of meditation.
Mr. T R Vasudeva Rao proposed the vote of thanks.
Chennai Chapter organized presentation on Cyber Crimes in
India : Emerging Trends & Computer security in India on 20th
December 2016 by Mr. V Rajendran. He cited many cases of
cyber crimes from real time instances. He differentiated the
normal crimes vs cyber crimes in view of modus operandi,
investigation process, process of trial and production of
E-evidence. The protection of information asset is basically
dependent on the three aspects namely owner, custodian and
the user. The speaker cited many real time scenarios where
these three aspects could be or not to be at variance. The
speaker finally touched the importance of IT-Act especially
some of the Sections related to cyber crimes. Dr. P. Sakthivel
thanked the speaker and the gathering.
Noida on 30th Jan. to 4th Feb. 2017. The Introduction &
objective of the workshop was addressed by Prof. M K Rai,
Registrar Gautam Budh University Greater Noida. Prof. M
K Rai Registrar, Gautam Budh University has given welcome
speech and elaborated about the aims & objective of the
FDP. Prof. A K Gautam, Dean, GBU Greater Noida has talked
about the FDP and its importance in the research field in
the country. Prof. K K Aggrawal, Founder VC, GGSIPU Delhi,
Former President CSI & Chancellor K R Mangalam Univ,
Gurgaon was the Chief Guest in the inaugural session. In
his inaugural address he mentioned growth of Internet is
very rapid in the country in comparison to aviation sector.
Internet of things (IOT) has made peoples life easy and it
has applications in all the fields of life, including, medical,
physics, research and academia. He has also said that
after 2020 mobile phones will no longer require charger for
charging but will be self charged by using radiations. He
has also said that IOT will enable all house hold electronic
devices to communicate with other through networking.
More than 300 participants from Delhi NCR & rest part of
the country attended.
UJJAIN CHAPTER
A seminar on Image compression was held on 19-112016 under CSI Ujjain chapter in MIT for all the technical
professionals in ujjain. The Eminent speaker Dr. Vipin
Tyagi, Regional Vice President, Region-III talked about the
research areas in length. Prof. A K Nayak, Hon Secretary,
Mr. R K Vyas, Hon Treasurer, Prof. P Thrimurthy, Past
President were grace the occasion. Prof. Y Kelkar,
Coordinated and conducted the complete program. Prof
Gangame presented the vote of thanks.
NOIDA CHAPTER
VELLORE Chapter
One Week FDP Program on Research Techniques in
Information Communication Technologies Jointly organized
by csi Noida Chapter & Gautam Budh University greater
School of Information Technology & Engineering hosted
49
C S I C o m m u n ic a t i o n s | F E B R UA R Y 2 0 1 7
from chapters & di v isions
two international conferences in VIT in association with
CSI Vellore Chapter. 8th International conference on Soft
Computing & Pattern Recognition and 8th International
conference on computational aspects of social networks
from 19th to 21st Dec 2016. Dr. Gerardo Rubino, INRIA,
FRANCE was the chief guest for the conference and graced
his presence for this occasion. He also delivered the
keynote address on the topic “perceptual quality estimation:
Machine learning and Big data problems”. Dr. Ajith Abraham,
Director of MIR Labs, USA served as the guest of honor for
the conference, around 120 members participated.
CSI Vellore Chapter in association with SCOPE organized a
one day Guest Lecturer on “Big Data and Machine Learning”
on 05/01/2010 at VIT University. Dr. M Viswanathan,
Carnegie Mellon University, Australia explained introduction
to big data, characterstics of big data and different issues
of big data is discussed followed by how machine learning
techniques can be applied to big data context, explained the
research directions in big data, around 50 life members and
students participated in the seminar.
from student branches
Region-I
v
The NorthCap University, Gurgaon
SRM University, Ghaziabad
17-12-2016 - Workshops on Game development and
Internet of Things (IoT)
15-12-2016 - One day workshop on
Android Application Development
Region-I
Region-III
Manav Rachna International University, Faridabad
Manipal University, Jaipur
31-1-2017 - Dr. Wadhwa, VC, MRIU & Dr. M N Hoda,
Chairman, Division-1 inaugurating the CSI Student Branch
28-1-2017 – Student Branch Inauguration
50
C S I C o m m u n ic a t i o n s | F E B R UA R Y 2 0 1 7
www.csi-india.org
from student branches
Region-IV
Region-V
Gandhi Institute for Education and Tech., Bhubaneswar
K S Institute of Technology, Bangaluru
18-1-2017 – Student Branch Inauguration
18 to 21-1-2017 - FDP on Raspberry Pi and its Applications in IoT
Region-V
St. Claret College, Bangaluru
Potti Sriramulu Chalavadi Mallikarjuna Rao College of
Engineering & Technology, Vijayawada
21-1-2017 – Student Branch Inauguration
7-1-2017 – Sri Chalavadi Mallikarjuna Rao Lightening the
Lamp during Student Branch inauguration
Bharat Institute of Engineering and Technology, Ibrahimpatnam
16 & 17-12-2016 – Two days National Conference on Innovative
Technologies In Big Data, Cloud, Mobile and Security (ITBCMS-2016)
29-12-2016 – CSI Digital Life: Cashless Transactions
Awareness Program
CMR Technical Campus, Hyderabad
29-12-2016 - Guest Lecture on Java programming
5-1-2017 - Workshop on Game Tools
51
C S I C o m m u n ic a t i o n s | F E B R UA R Y 2 0 1 7
from student branches
Region-V
NBKR Institute of Science and Technology, Nellore
10-1-2017 - Dr Vijaya Kumar Reddy during Motivation Session
17-1-2017 – Participants during Technical Quiz
JSS Academy of Technical Education, Bangaluru
5-11-2016 - One day workshop on Learn to Code
11 & 12-11-2016 – Two day workshop on Programming in Python
Chalapathi institute of Engg. and Technology, Guntur
Amrita Vishwa Vidyapeetham (University), Bangaluru
11 & 12-2-2017 - Second National Conference on Recent
Advances in Computer Science and Engineering
20-1-2017 - Invited talk on Intentions in Inventions –
Healthcare by Dr. Vishal Rao
GITAM University, Visakhapatnam
GSSS Institute of Engineering and Technology for Women,
Mysuru
5-2-2017 – Event on WALK-A-THON as a part of its National
Symposium
20 to 23-1-2017 - Three Day Workshop
on Challenges in Enterprise Network Environment
52
C S I C o m m u n ic a t i o n s | F E B R UA R Y 2 0 1 7
www.csi-india.org
from student branches
Region-VI
Mukesh Patel School of Tech. Mgmt. & Engg., Shirpur
Marathwada Mitra Mandal’s College of Engineering, Pune
27 & 28-12-2016 - International Conference on Artificial Intelligence
in Health Care
28-1-2017- Session on Agile- The Methodology You Must Know by
Mr. Prashant Pund
Late G N Sapkal College of Engineering Anjaneri, Nashik
27 & 28-12-2016 – Prof Wankhade & Mr Nikhil Shahane during
Two Days Hands on Workshop on Android Appilication Development
12-1-2017 – Dr. Bagal, Prof Wankhade & Mr. Vijay Mhaske
during National Youth Day Celebration
SNJB’s Late Sau Kantabai Bhavarlalji Jain College of
Engineering, Chandwad
Sandip Institute of Technology & Research Center,
Nashik
23-1-2017 - Motivational and Patent Registration Seminar by
Mr Vijay Mhaske
5 to 18-12-2016 - Two Weeks Industrial Training Program
Guru Gobind Singh Polytechnic, Nashik
2 & 3-1-2017 – Event on College to corporate
13-1-2017 - State Level Event on TECHNOCIA-2k17
53
C S I C o m m u n ic a t i o n s | F E B R UA R Y 2 0 1 7
from student branches
Region-Vi
Kavikulguru Institute of Technology and Science, Nagpur
20-1-2017 – Event on PRO-WEB
23-1-2017 – Guest Lecture on Android Technologies
Region-ViI
Shri S S Shasun Jain College for Women, Chennai
Mepco Schlenk Engineering College, Sivakasi
16-12-2016 - Digital Awareness Programme
4-1-2017 - Mrs Blessa Binolin Pepsi explaining the basic
Concepts of RTool during the workshop
Nandha College of Technology, Erode
17-9-2016 - National Level Symposium on CRYOSAT’16
6-1-2017 - Awareness Workshop on Smart India
Hackathon’17
Region-VII
National Engineering College, Kovilpatti
Sri Vidya College of Engg. & Technology, Virudhunagar
22 & 23-12-2016 – Mr Jerart Julus during the seminar on
Vittiya Saksharta Abhiyan
29-12-2016 - Guest Lecture on Introduction to
Android Mobile App Development
54
C S I C o m m u n ic a t i o n s | F E B R UA R Y 2 0 1 7
www.csi-india.org
Registered with Registrar of News Papers for India - RNI 31668/1978
Regd. No. MCN/222/20l5-2017
Posting Date: 10 & 11 every month. Posted at Patrika Channel Mumbai-I
Date of Publication: 10th of every month
If undelivered return to :
Samruddhi Venture Park, Unit No.3,
4th floor, MIDC, Andheri (E). Mumbai-400 093
Region-ViI
Valliammai Engineering College, Kattankulathur
21-12-2016 – Mr Nagarajan handling the Staff Development
Training Programme on Programming in JAVA
7-2-2017 - Mr. Muthuraj Durairaj handling the workshop on
Data Analysis using HADOOP
Jamal Mohamed College (Autonomous), Tiruchirappalli
2 & 3-9-2016 - Dr Khaja Nazeemudeen inaugurating the
International Workshop on Image Restoration Techniques
with MATLAB
8 & 9-9-2016 - Students from Thiagarajar College of
Engineering receiving the overall championship award at
Inter-Collegiate Technical Symposium SWAP-2K16
Sathyabama University, Chennai
JCT College of Engineering and Technology, Coimbatore
9-2-2017 - Mr Vasudeva Rao, Vice Chairman, CSI-Chennai
Chapter inaugurated the CSI Student Branch
8 & 9-2-2017 National Level Workshop on IoT
(Internet of Things)
Student branches are requested to send their report to
[email protected] with a copy to [email protected].
Chapters are requested to send their activity report to [email protected].
Kindly send high resolution photograph with the report.
55
C S I C o m m u n ic a t i o n s | F E B R UA R Y 2 0 1 7