55 pages including cover

Knowledge Digest for IT Community

Volume No. 40 | Issue No. 11 | February 2017 ` 50/- Operating ISSN 0970-647X ISSN Systems

Cover Story Computer Operating Systems: From every palm to the entire cosmos in the 21st Century Lifestyle 5

TECHNICAL TRENDS SECURITY CORNER Blockchain : A Disruptive Innovation 9 Cyber Threat Analysis with Memory Forensics 17

www.csi-india.org research front Article Customized Distributions for Top Ten Alternative Operating Applications 14 Systems You Should Try Out 20 CSI CALENDAR 2016-17

Sanjay Mohapatra, Vice President, CSI & Chairman, Conf. Committee, Email: [email protected]

Date Event Details & Contact Information

MARCH INDIACOM 2017, Organized by Bharati Vidyapeeth’s Institute of Computer Applications and Management (BVICAM), New 01-03, 2017 Delhi http://bvicam.ac.in/indiacom/ Contact : Prof. M. N. Hoda, [email protected], [email protected], Tel.: 011-25275055 0​3-04, 2017 I International Conference on ​Smart Computing and Informatics (SCI -2017), venue : Anil Neerukonda Institute of Technology & Sciences Sangivalasa, Bheemunipatnam (Mandal), Visakhapatnam, Andhra Pradesh, http://anits.edu.in/ sci2017/, Contact: Prof. Suresh Chandra Satapathy. Mob.: 9000249712 04, 2017 Trends & Innovations for Next Generation ICT (TINICT) - International Summit-2017 Website digit organized by Hyderabad Chapter http://csihyderabad.org/Contact 040-24306345, 9490751639 Email id [email protected] ; [email protected] 24-25, 2017 First International Conference on “Computational Intelligence, Communications, and Business Analytics (CICBA - 2017)” Calcutta Business School, Kolkata, India. Contact: [email protected]; (M) 94754 13463 / (O) 033 24205209

International Conference on Computational Intelligence, Communications, and Business Analytics (CICBA - 2017) at Calcutta Business School, Kolkata, India. Contact (M) 9475413463 / (O) 03324205209, Email id : [email protected]; www.cicba-2017.in

APRIL 1st International Conference on Smart Systems, Innovations & Computing (SSIC-2017) at Manipal University Jaipur, 15-16, 2017 Jaipur, Rajasthan. http://www.ssic2017.com Contact : Mr. Ankit Mundra, Mob.: 9667604115, [email protected]

MAY ICSE 2017 - International Conference on Soft Computing in Engineering, Organized by : JECRC, Jaipur, www.icsc2017.com 08-10, 2017 Contact : Prof. K. S. Raghuwanshi, [email protected], Mobile : 9166016670

JUNE Workshop on LAMP (Linux, Apache, My SQL, /Python),​ Jaypee University of Engineering and Technology, Raghogarh, • Cover Story 05-30, 2017 Guna - MP, www.juet.ac.in​ Dr. Shishir Kumar ([email protected]) 9479772915 • Technical Trends OCTOBER International conference on Data Engineering and Applications-2017 (IDEA-17) at Bhopal (M.P.), • Research Front 28-29, 2017 http://www.ideaconference.in Contact : [email protected] • Articles DECEMBER Fourth International Conference on Image Information Processing (ICIIP-2017), at Jaypee University of Information • Innovations in IT 21-23, 2017 Technology (JUIT), Solan, India, (http://www.juit.ac.in/iciip_2017/) Contact : Dr. P. K. Gupta ([email protected]) • Security Corner (O) +91-1792-239341 Prof. Vipin Tyagi ([email protected]) • Practitioner Workbench • Brain Teaser • Chapter Reports CSI Adhyayan A tri-monthly publication for students • Student branch reports Articles are invited for Oct-Dec. 2016 issue of CSI Adhyayan from student members authored as original text. Plagiarism is strictly prohibited. Besides, the other contents of the magazine shall be Cross word, Brain Teaser, Programming Tips, News Items related to IT etc. Please note that CSI Adhyayan is a magazine for student members at large and not a research journal for publishing full- fledged research papers. Therefore, we expect articles should be written for the Bachelor and Master level students of Computer Science and IT and other related areas. Include a brief biography of Four to Five lines, indicating CSI Membership no., and for each author a high resolution photograph. Please send your article to [email protected]. On behalf of CSI Publication Committee

Prof. A. K. Nayak Chief Editor

www.csi-india.org 2 CSI Communications | FEBRUARY 2017 CSI Communications Volume No. 40 • Issue No. 11 • FEBRUARY 2017 Contents Chief Editor Prof. A. K. NAYAK Cover Story Computer Operating Systems: 5 Editor From every palm to the entire cosmos in the 21st Century Lifestyle DR. DURGESH MISHRA Subrata Ganguli

Associate Editor Technical Trends PROF. Prashant Nair Blockchain : A Disruptive Innovation 9 KVN Rajesh & KVN Ramesh

Published by Research Front Mr. Sanjay Mohapatra Customized Linux Distributions for Bioinformatics Applications 14 For Computer Society of India Khalid Raza & Sahar Qazi Security Corner Design, Print and Cyber Threat Analysis with Memory Forensics 17 Dispatch by Hardik Gohel & Himanshu Upadhyay GP Offset Pvt. Ltd. Articles Top Ten Alternative Operating Systems You Should Try Out 20 Deepu Benson Operating Systems 22 Simran The battle for the Best OS 24 S. N. Kakarwal Operating Systems : Mass transit for the future 26 R. Gobi RSOS: Reliable and Secure 27 Ashutosh Saxena

Please note: CSI Communications is published by Computer PLUS Society of India, a non-profit organization. Views and opinions expressed in the CSI Call for Papers for April Issue of the CSI Journal of Computing 21 Communications are those of individual authors, contributors and advertisers and they CSI Nihilent eGovernance Awards 2015-16 – A Report 30 may differ from policies and official statements of CSI. These should not be construed as legal CSI 2016 – A Report 31 or professional advice. The CSI, the publisher, the editors and the contributors are not CSI-IEEE Computer Society Joint Education Award 2016 – A Report 33 responsible for any decisions taken by readers on the basis of these views and opinions. CSI Meeting with Myanmar Delegates 34 Although every care is being taken to ensure genuineness of the writings in this publication, Citation of Life Time Achievement, Honorary Fellowship & Fellowship Award 35 CSI Communications does not attest to the originality of the respective authors’ content. Brain Teaser 46 © 2012 CSI. All rights reserved. CSI Reports 48 Instructors are permitted to photocopy isolated articles for non-commercial classroom use Student Branches News 50 without fee. For any other copying, reprint or republication, permission must be obtained in writing from the Society. Copying for other Printed and Published by Mr. Sanjay Mohapatra on Behalf of Computer Society of India, Printed at G.P. Offset Pvt. Ltd. than personal use or internal reference, or of Unit-81, Plot-14, Marol Co-Op. Industrial Estate, off Andheri Kurla Road, Andheri (East), Mumbai 400059 and Published from articles or columns not owned by the Society th without explicit permission of the Society or Computer Society of India, Samruddhi Venture Park, Unit-3, 4 Floor, Marol Industrial Area, Andheri (East), Mumbai 400 093. the copyright owner is strictly prohibited. Tel. : 022-2926 1700 • Fax : 022-2830 2133 • Email : [email protected] Chief Editor: Prof. A. K. Nayak

3 CSI Communications | FEBRUARY 2017 Editorial

Dear Fellow CSI Members, “One of my big regrets is that Facebook hasn’t had a major chance to shape the ecosystem.” – Mark Zuckerberg

The theme for the Computer Society of India (CSI) Communications (The Knowledge Digest for IT Community) February, 2017 issue is Operating Systems, a technology that each one of use either in our computer, smart phone or intelligent device. In this issue, Cover Story article is “Computer Operating Systems (OS): From every palm to the entire cosmos in the 21st century lifestyle” by Subrata Ganguli. The author has provided an overview as also shed light on the global market share of various popular OS. The Research front is titled, “Customized Linux Distributions for Bioinformatics Applications” by Khalid Raza & Sahar Qazi. Here, most popular customized Linux tailored for bioinformatics and computational biology applications have been highlighted. KVN Rajesh and KVN Ramesh have contributed to Technical Trends through the article, “Blockchain: A Disruptive Innovation”, which focuses on how Blockchain, the technology behind bitcoin is of great relevance in the context of demonetization. The Security Corner has Hardik Gohel and Himanshu Upadhyay giving us new insights on on Cyber Threat Analysis with Memory Forensics. We have several articles which provide us information on various OS available in the market; “Top Ten Alternative Operating Systems You Should Try Out” by Deepu Benson; OS by Simran Saini and Understanding OS by Mahek Golchha. Ashutosh Saxena in his article highlights, “RSOS: Reliable and Secure Operating System”. Also S. N. Kakarwal has give insights on the battle for the best smartphone OS. R. Gobi in the article, “Operating Systems: Mass transit for the future” provides a futuristic view of the technology. This issue also contains Crossword, CSI activity reports from chapters, student branches and Calendar of events. This issue covers the historic CSI 2016 Convention at Coimbatore on 23, 24 and 25 January, 2017 with special focus on other activities held in conjunction like the e-governance awards, MoU signed and CSI-IEEE award. The inspirtational citations of the honorary fellowship, fellowship and lifetime achievement awardees of CSI 2016 are also reproduced here • Cover Story We are thankful to Chair-Publication Committee and entire ExecCom for their continuous support in bringing this issue • Technical Trends successfully. • Research Front We wish to express our sincere gratitude to all authors and reviewers for their contributions and support to this issue. • Articles The next issue of CSI Communications will be on the theme “Software Engineering”. We invite the contributions from all CSI members and researchers on this theme. We also look forward to receive constructive feedback and suggestions from our • Innovations in IT esteemed members and readers at [email protected]. • Security Corner

• Practitioner Workbench With kind regards, • Brain Teaser Editorial Team, CSI Communications • Chapter Reports • Student branch reports Kind Attention

Prospective Contributors of CSI Communications categories. Equations and mathematical expressions within Please note that Cover Theme for March 2017 issue is articles are not recommended and, if absolutely necessary, Software Engineering. Articles may be submitted in the should be minimum. Include a brief biography of four to six categories such as: Cover Story, Research Front, Technical lines, indicating CSI Membership no., for each author with Trends and Article. Please send your contributions by 1st high resolution author photograph. March, 2017. Please send your article in MS-Word to Associate The articles should be authored in as original text. Plagiarism Editor, Prof. Prashant R. Nair in the email ids csic@csi- is strictly prohibited. india.org with cc to [email protected] Please note that CSI Communications is a magazine for (Issued on the behalf of Editorial Board CSI Communications) members at large and not a research journal for publishing full-fledged research papers. Therefore, we expect articles Prof. A. K. Nayak written at the level of general audience of varied member Chief Editor

www.csi-india.org 4 CSI Communications | FEBRUARY 2017 COVER STORY

Computer Operating Systems: From every palm to the entire cosmos in the 21st Century Lifestyle

Subrata Ganguli Formerly Asst. Prof., Department of Biotechnology, MVJ College of Engineering, Channasandra, Bangaluru, Karnataka

The operating system software is ubiquitous as the part and parcel of every computer in the age of information technology. One needs the operating systems far out in the cosmos inside the communication equipments used by the NASA and the ISRO in their shuttles and spacecraft, as well as in the palmed mobile sets so near to us that had changed everyday life in this 21st Century. Operating systems are required in the department of defense in their submarines operating outside the territory of the home government, as well as in the department of atomic energy in their nuclear projects secured in a safe location. Whether present inside the computers required for meteorological forecast and computations or in the computers associated with the World Wide Web and the Human Genome projects or inside the cheapest possible tablets in each backpack, they are the master software required for the running of the computers, however large or small. The niche and the operating conditions of the operating system software are thus as diverse as the computers themselves. This article describes and refers to the well known operating systems running the desk top computers and mobile cellular phones, their market shares and some projections for the future directions, hinting that the non-US economies such as , China and India would assume a domineering role in the global market for information technology beyond the year 2020.

Key Words: Operating systems, mobile operating systems, market share of operating systems, future projections.

Introduction: Advent of high speed computation manages hardware, other software, user programs, to make solving user and the associated phenomenal growth services and the users. It is the software problems easier, thirdly, to make the in mobile technologies had impacted when loaded onto the hardware that computer system more convenient to our daily living enhancing our ability runs the environment of the machine, use and finally, to use the computer to communicate with another object without which both the computer and hardware in an efficient manner. The or individual in unthought-of ways. the users are rendered useless. The vast majority of the OS programs are Mobile platforms are also being operating system (OS) also can be usually written in tag">C and C++ languages encouraged in research to avail the directly accessed by the user through by experienced system . benefits of Digital India projects. The a command line or a graphical user Some of the OS source codes are open authors group had explored possible interface (GUI) whereas the other access and free, others are proprietary use of distributed systems and mobile programs, called applications or information of the companies that technologies in learning and research application programs, can make use of market them. that could possibly reduce the load on the OS through an application program Degree level courses on computer hard printing and in- built memory interface (API) designed for specific science and information technology storage(1), an amateurish approach that applications require familiarity in handling the had been validated as ‘’ Silberschatz, Galvin and Peter (2) OS programs. One can look into by computer professionals . Goal of this had described the computers being the curriculum of the established article is to draw attention to the various made up of four components – namely foreign institutions for example, the mobile, desktop and other computer the hardware, the operating system, the University of Illinois (https://www. operating systems available and their and the users. The cs.uic.edu/~jbell/CourseNotes/ respective market share, that being authors defined the operating system as OperatingSystems/), the MIT (https:// considered an indirect measure of “A program that acts as an intermediary ocw.mit.edu/courses/electrical- changes in life style. between a user of a computer and the engineering-and-computer-science/6- All computer programs and the ”. The goals of the 828-operating-system-engineering- computational environment depend on operating systems, according to these fall-2012/), the Imperial College a functional operating system (OS) that authors in the year 2008, are to execute (http://www.imperial.ac.uk/computing/

5 CSI Communications | FEBRUARY 2017 COVER STORY

current-students/courses/211/), and PoS, digital cameras etc. Interest in linux.com). It’s developed by RusBitTech the Stanford University (http://www.scs. web-based computing environments available in English and Russian. The stanford.edu/09wi-cs140/). also had developed the field of cloud latter, the Phantom, is developed by Types of OS Currently Popular: computation (https://en.wikipedia.org/ the Russian programmers. It’s object- The various operating systems wiki/Cloud_(operating_system)). The oriented and not -like; it is available had been popularly named by the Table 1 shows a summary of the usage through Digital Zone (www.dz.ru/en). companies that developed them (e.g. of various operating systems in terms of Amidst the indigenization drive Windows, Android etc.) During technical global market share. for the mobile platforms, Russian discussion, OS’s are also referred to There had also been discussions company Open Mobile Platform is hiring pointing out the functional features, on alternate or future OS programs like developers to use Android and iOS or the size, structure and architecture business operating systems, AMOGAO, compatible applications to adapt to the of the computers they are housed in. , SKYOS, MORPHOS, DEXOS non-US MOS platforms. The Sailfish OS Windows are maintaining the lion’s etc. that have not been commercially had been an independent alternative. share in the field of desk top operating as competitive as the few main The software is developed systems, whereas majority of mobile brand names (http://royal.pingdom. by the Finish mobile company Jolla Ltd. handsets use Android as the OS. The com/2008/09/26/10-amazingly- and Sailfish OS community (https:// details of various operating systems are alternative-operating-systems-and- sailfishos.org). discussed in this issue of the Computer what-they-could-mean-for-the-future/) Chinese, German and Indian OS: Society of India Communications, and Non-Us Operating Systems: China had also made efforts to elsewhere (https://en.wikipedia.org/ Currently Windows for PC is develop non-US operating systems. Its wiki/Operating_system). A succinct and overwhelming the market for OS. product Kylin (later versions named comparative discussion on various types However several countries with large neo-kylin and kylin) is Unix-like is available from the Wikipedia (https:// domestic markets (e.g. India, Russia, and available in about 60 languages en.wikipedia.org/wiki/Comparison_of_ China etc.) had followed the approach (www.kylinos.com.cn). The product had operating_systems). to Windows software, and even been developed in the National Univ. Of There are several ways of hardware, to indigenize the computer Defence Technology. classifying the OS. They had been industry and information technology. Germany had developed the RTOS traditionally described as batch, A few of the relevant examples are for the German sharing, distributed, network and real • Cover Story described below. The summary is Aerospace Center for applications time OS depending on the of the • Technical Trends presented in Table 2. that require high dependability. It is computers and the tasks they perform. named Rodos Operating System (Real Russian OS: • Research Front Services performed by an operating time On board Dependable Operating The Moscow Times (https:// system include: multitasking, internal System) written in C, C++ and assembly • Articles themoscowtimes.com/articles/russian- memory sharing, handling input and languages. (www.Dlr.de/rodos) • Innovations in IT output devices, reporting system status operating-system-to-launch-in-next- India had reported, originally on and error messages, to decade-50052 accessed on Dec 16, • Security Corner Jan 10, 2007, the Bharat Operating offload batch jobs and also parallel 2016) quoted Russian Government System Solutions (BOSS) as an • Practitioner Workbench processing when the programs run on sources informing the decision of the alternative operating system developed more than one processors. The name of government to replace the Windows • Brain Teaser by the National Resource Centre for the OS may also reflect the size of the based software and even computer Free Open Source Software (NRCFOSS/ • Chapter Reports computer e.g. main frame, handheld hardware with domestic Russian CDAC, India). It is Linux-like and with • Student branch reports mobiles, personal computers, mini products, the target remaining to multilingual ability to work with at least and microcomputers etc.. The three substitute Windows software at all 18 languages and is boasting to replace major desk top computer operating government agencies and strategic Windows in India (www.bosslinux.in) systems are Windows, Mac Os and enterprises by the period 2025--2030. Linux; with the Windows taking about Currently the Windows enjoy virtual Japanese OS: 85% of the market share in August 2016, monopoly in the PC systems; and The home grown computer Mac taking little over 6% and Linux among the mobiles 35% Apple iOS and operating system from Japan, TRON, about 2%. The popularity of handheld 27% Android OS software are in use. (http://web-japan.org/trends/science/ systems that changed our lives are The Russian plan also aims at building sci030522.html) is credited to the referred to as mobile operating systems its own hardware by that time replacing work by Professor Ken Sakamura of (MOS) running in smart phones, and Apple products and the the University of Tokyo in 1984, who tablets and other similar devices. The associated application software. had advocated the idea of “ubiquitous familiar brand names are Android, Currently Astra-linux and Phantom computing,” in which tiny semiconductor iOS, Blackberry, Windows phone etc. OS are being developed as the Russian chips are invariably embedded in every The day-to-day life in the digital age substitute. The former is Linux- like product. TRON stands for ‘The Real- abounds with examples of embedded that intends to meet the needs of the Time Operating System Nucleus’. The systems present in the ATM’s, cars, Russian defense industries (www.astra- features like free open access to the

www.csi-india.org 6 CSI Communications | FEBRUARY 2017 COVER STORY

and very high speed of The Wikipedia article lists the base is forecast to reach 2 billion by data processing had made TRON an links that guide the reader to the major 2020, by which time it will represent attractive in cellular phones and literature related to the mobile operating 37% of the global adult population. a large number of domestic electronic systems (https://en.wikipedia.org/wiki/ (https://www.juniperresearch.com/ goods. The Japanese business Mobile_operating_system) press/press-releases/mobile-banking- organizations mean to utilize TRON Changes in Lifestyle and Emerging users-to-exceed-1-bn-this-year). The or Linux in all devices connected to Trends: mobile technology scenario in UK internet (info-appliances). It had been The competition for capturing the is comparable to the USA in relative once estimated that about half of all the market for internet technology on the terms, but India is falling behind China. embedded chips run on TRON. mobile systems had been well studied In essence the expansion in India is Mobile Operating Systems (MOS): by many marketing research agencies likely to be faster beyond the year 2016. In the rest of this article that (see Table 3.). Appearance of the World The American lifestyle is taken as a follows, the author emphasizes more Wide Web really turned the globe into typical pattern of the rich and advanced details on the mobile technology a village within the reach of common country that had adjusted to the mobile operating systems that have become people from the privacy of one’s own and internet technology over a short part of daily routine in the past decade home. Though the World Wide Web is period of time, utilizing its existing revolutionizing the way common only about a quarter of a century old, infrastructure of the PC, the main frame people think of action at a distance and its growth and impact in human life is computers and the e-mail presence. globalization. This topic is also timely undeniable. According to a survey about According to a survey conducted during when the emphasis is being laid on the half a billion new users got connected 2014, 90% of American adults own a Digital India projects. to the web in 2014 alone, bringing the cell phone; 42% of American adults own The mobile systems were primarily total number of surfers to 3 billion a ; 32% of American meant for use in the telephonic world wide. In a review in January adults own an e-reader. The utilization conversations. Then they eventually 2015 (http://www.mobileindustryreview. of the mobile time pattern had been started competing in the internet com/2015/01/3-billion-internet- described as follows: 81% of the cell technology claiming its share in users-2015.html; accessed Dec 20, owners send and receive text, 60% e-commerce, e-banking and e-learning. 2016) more than 80% of the population access internet, 52% receive e-mail, The trend became deciding after 2010. in Western Europe and the USA had 50% download Apps as part of their The major mobile operating access to the internet compared to daily use (http://www.pewinternet.org/ systems include: about 19% in South Asian population. fact-sheets/mobile-technology-fact- (i) Android based on Linux kernel, According to one survey people were sheet/)). is free open source introduced by spending on an average almost 4.5 Another survey cites that the Google. It had been popular in the hours daily in 2015 in comparison with number of smart phone users smart phones and also in some the 2 hours they used to spend about 10 worldwide will surpass 2 billion in 2016, desktops, years ago in this world that typified the (world population 7.4 billion in Aug 2016) change on lifestyle adjusting to the age representing over a quarter of the global (ii) iOS is from the of information technology. The number population and that number is expected Apple Inc. and is based on MacOS; of mobile broadband (3G and 4G) in UK to grow to more than 2.56 billion people, (iii) Windows Phone is a Windows is 89% of population while the same or a third of the world’s population, in 10 (and earlier versions) based figure for India is merely 8% in the year 2018. The vast amount of growth in the platform and is closed source 2015. These figures only speak of the use of smart phones will come from proprietary software; potential for the market of broad band China, the global leader in the market for internet (mobile) technology when India smart phone users. India is to become (iv) Blackberry is a product of adjusts to the modern lifestyle after the second largest, surpassing the USA, BlackBerry Limited (formerly digital penetration, especially in the in registered users of smart phone. Research in Motion Limited) and business sector. Average world wide Alongside Russia is likely to surpass is a closed source proprietary speed of the internet was 3.8 Mbps in Japan to become the fourth largest product. 2013, whereas it had enhanced to 4.5 smart phone user population. The Other MOS known to the consumers, Mbps in 2015 world over. In UK 27% projected number of smart phone users but not so popular now, include Bada of the web pages served to mobile in the UK is 46 millions in 2018, and one from Samsung Electronics, devices. Smart phones accounted for should compare this number with the from Nokia, Palm OS from Access 38% of mobile connections worldwide, US population of about 325 millions in Company Ltd. etc.. In Q1 of 2016 the and 40% of the world mobiles are December 2016 and the UK population total sale for smart phones was more broadband enabled. New research of about 65 millions in December 2016. than 1 billion world over; and the global from leading analysts finds that over In conclusion the three countries, China, market share was 84.1% for Android, 1 billion mobile phone users will have India and Russia, are going to dominate 14.8% for iOS, 0.7% for Windows phone used their devices for banking purposes in the market capitalization of smart and 0.2% for Blackberry. by the end of this year. This global user phones by 2018 and beyond. (http://

7 CSI Communications | FEBRUARY 2017 COVER STORY

www.telegraph.co.uk/technology/ the software behind that charming February 20-22, 2015. mobile-phones/11287659/Quarter-of- looks of ‘consumable’ handsets rightly [2] Silberschatz, Abraham; Galvin, Peter; the-world-will-be-using-- called the ‘mobile operating system’, Gagne, Greg (2008). “Operating Systems in-2016.html). and the changes in the ‘mobile’ lifestyle. Concepts”. John Wiley and Sons . ISBN Conclusion: In addition the article distinguishes the 0-470-12872-0. The general discussion had emerging markets for the computer Table 1 : Global Market Share of been on the hundreds of handsets and mobile technology outside the USA Operating Systems (as on June 2016) available from commercial vendors to point out the fact that the Indian and the salient features of their in- economy is likely to become a global Operating System Percentage built operating systems [for example decision maker beyond 2018. Win 7 38.21 see Wikipedia page] The private No instruction is required to Win 10 19.92 communication in the 21st century introduce the reader to the computer information technology had opened and the world; such habits are included MacOSX 9.05 up myriads of opportunities in day-to- and inculcated in every one of us in Win8.1 7.89 day dealing of data including images our daily routine. The purpose of this Win XP 5.92 and voice. The upcoming technology article is to make ordinary public and with its various applications software the corporate executives aware of the iOS 5.79 running on the handsets has changed various systems commercially available Android 3.71 the financial budgetary patterns in and their trends so that the reader can Win 8 3.19 many families and offices. Emphasis on form a well-informed opinion. Moreover online and e-governance and availability the vast literature cited through the Linux 2.95 of such services on mobile systems can website links would be an added benefit Win Vista 1.25 appropriately be called m-commerce, to the students and teachers alike for Others 1.35 m-government and m-learning. In the classroom exercises. addition to the routine use of mobile In Jan 2014 Win 7 held a global References: market share of 50.27% The Apple is platform to every customer, the author’s [1] Ganguli, S.(2015) “Bioinformatic group had used such opportunities for Analysis of Medicinal Plants” presented more popular in the USA where the US furthering knowledge and research to the 2nd International Congress of the market is about 20%. • Cover Story as described earlier. This particular Society for Ethnopharmacology, India Source: Accessed from http://www. article reviews the salient features of (SFEC2015) held at Nagpur during global.market-share on Dec. 20, 2016. • Technical Trends • Research Front Table 2 : Non-Us Operating Systems The table was compiled from the site that reports statistics for internet technology online. The search was made • Articles Country Product Name Primary Source of Informtion for desktop systems only for the current month. Windows • Innovations in IT Russia Astra-Linux www.astra-linux.com accounted for over 90%, Linux about 2.3% and Mac OS about Russia Phantom www.dz.ru/en • Security Corner 6% in December 2016. Russia Sailfish https://sailfishos.org Source: • Practitioner Workbench https://www.netmarketshare.com/operating-system- China kylin www.kylinos.com.cn market-share.aspx?qprid=10&qpcustomd=0&qptime • Brain Teaser Germany Rodos www.Dlr.de/rodos frame=M&qpct=5 (last accessed on Dec 20, 2016) • Chapter Reports India BOSS www.bosslinux.in About the Author • Student branch reports Japan TRON http://tronweb.super-nova.co.jp/ homepage.html Dr. Subrata Ganguli, a Life Member of the Note: The sites were last accessed on Dec 22, 2016. Computer Society of India, was a faculty member in the Departments of Biotechnology, Table 3 : Market Share For Internet Technology: at the Shridevi Institute of Engineering Operating System Market Share and Technology, Tumkuru, Karnataka; the 47.17% MVJ College of Engineering, Bangaluru, Karnataka; and the Calcutta Institute of Pharmaceutical Windows 10 23.72% Technology, Howrah, West Bengal . He was educated at Windows XP 8.63% the IIT Kharagpur, IIT Delhi, and the University of Illinois at Windows 8.1 8.01% Chicago. He was the top ranker in his B.Tech. (Hons.) class Linux >2.31% in Chemical Engineering. He has more than ten years of MacOS (many versions) >6% teaching experience to his credit.

www.csi-india.org 8 CSI Communications | FEBRUARY 2017 Technical Trends

Blockchain : A Disruptive Innovation

KVN Rajesh KVN Ramesh M.Tech in Computer Science and Technology from Andhra University M.E in Structural Engg. from Andhra University

Demonetisation in India in Blockchain is the technology behind happened on 09-Jan-2009 on the same November-2016 has been the greatest Bitcoin. The author of this article, cryptography mailing list. The post disrupter to Status quo in terms of K..N.Rajesh, had also written an is still available at http://www.mail- economy and finance in the of article titled “BITCOIN - An Overview archive.com/cryptography@metzdowd. Post Independent India. Taking queue of the Popular Digital Cryptocurrency” com/msg10142.html. Satoshi from India, Venezuela too announced back in March 2014 in the same CSI Nakamoto also made a post titled on 11-Dec-2016 that its 100-bolivar big Communications. He commented in the “Bitcoin open source implementation of note would cease to be legal tender conclusion of that article that whether P2P currency” at http://p2pfoundation. within 72 hours of the announcement. Bitcoin will succeed or not, only time ning.com/forum/topics/bitcoin-open- There has been great discourse can tell, but the concept behind Bitcoin source on 11-Feb-2009 about the and debate between Government, is here to stay. That has come exactly release of Bitcoin v0.1 at http://www. Opposition and common public in true and Blockchain technology is bitcoin.org. The first transaction on India about the merits and de-merits finding application at every place where the Bitcoin Blockchain happened on of cash economy and the advantages transactions between two or more 12-Jan-2009 when Satoshi Nakamoto of to a cashless digital economy. parties are involved. The terms like sent 10 bitcoins as a test to another Black money, fake currency, terrorism, Internet of Transactions, Internet of computer cryptographic tackling money laundering and move Value and Internet of Trust are being named Hal Finney. The record of this to cashless digital economy have been used in the context of Blockchain. The first Blockchain transaction in the Block projected by the Government as the objective of this article is to explain #170 of the Bitcoin Blockchain can be reasons for Demonetisation. The Indian the Blockchain technology and its seen at https://blockchain.info/block- Government in no uncertain terms has various applications. Since Bitcoin and index/15019. conveyed its intention that cashless or Blockchain are tightly intertwined, we At the time of its release, Bitcoin less cash Digital economy is the way are at many times referring to Bitcoin in consisted of thirty-one thousand lines forward and has announced a number this article to explain about Blockchain. of code. The latest executable version of incentives to promote cashless digital Origin of Blockchain of Bitcoin Core is available for download transactions. The literacy rate in India A Blockchain is a shared, at https://bitcoin.org/en/download is around 75% and digital literacy rate distributed, immutable, public ledger and it is available as a would be definitely much lower than of continuously growing and updated project released under MIT License. that. With lower digital literacy among list of transactions. A group of validated The Bitcoin source code is available at the population, the increase in digital transactions are aggregated into a https://github.com/bitcoin/bitcoin. It financial transactions is likely to lead block and each block contains data can be seen in the source code that the to increase in number of cyber financial about the previous block thus creating predominantly crimes. Even large financial institutions a chain of blocks in chronological order. used is C++. with powerful and secure technical The origin of Blockchain and Bitcoin Understanding the concept of infrastructure are not immune to the is linked together. It all started with a Blockchain attacks by hackers and cyber criminals. post titled “Bitocin P2P e-cash paper” The world financial crisis in the When financial infrastructure is by an anonymous developer named late 2000s and systematic banking concentrated and centralized in the Satoshi Nakamoto on 01-Nov-2008 on collapses such as that of Lehman hands of few institutions, they are always a cryptography mailing list at http:// Brothers, seems to be the motivation prone to attack from both inside and www.metzdowd.com/mailman/listinfo/ behind Satoshi Nakamoto’s coming up outside of the respective organizations. cryptography. The original post is still with the Bitcoin. The value of money in In this context, a technology which available at http://www.mail-archive. the existing financial system is based is immune to tampering is bound to com/[email protected]/ on the trust created by a third party be successful and widespread msg09959.html. The post contained and intermediaries like Governments, application. Blockchain is precisely summary details of Bitcoin and a Central Banks and Financial systems. that kind of technology. The Blockchain link (https://bitcoin.org/bitcoin.pdf) to Satoshi Nakamoto created a system is a big buzzword now-a-days and is the nine-page technical paper titled where the trust is based on non- being promoted as the next big thing “Bitcoin: A Peer-to-Peer Electronic human entity which is the code and after the Internet. The Blockchain is Cash System” authored by Satoshi cryptography designed in such a way usually heard in conjunction with the Nakamoto. The announcement of that it is almost impossible to tamper cryptocurrency named Bitcoin, since the first release of the Bitcoin (v0.1) and manipulate. The design itself is

9 CSI Communications | FEBRUARY 2017 Technical Trends

such that it is more profitable to be list and thus the name Blockchain. This the problem of Double-Spending. In honest and play by the rules rather than Blockchain is distributed and stored on normal cash transaction, when you be dishonest and try to manipulate the all nodes of the Blockchain network. give a note or a coin to another person, system. Any effort to beat the system The header of the Block also contains there is no way that you can give the by the use of large scale computing something called a Merkle which is same note or coin to another person power is bound to be detected by the summary of all the transactions in since cash is a physical entity and the other honest participants since the block. The Merkle Tree also called cannot have multiple presence by the Blockchain is not centralized and is a a Binary Hash Tree, acts as a digital laws of physics as we know now. But global distributed ledger. The attempt fingerprint of all the transactions in the Double-Spending is a real problem is bound to fail and hence would lead block. Merkle Trees in Blockchain use a for the cryptocurrencies since there is to a loss of investment in the dishonest cryptographic algorithm named double- no physical entity involved. If you are efforts. The same efforts when spent SHA256. SHA256 is the secure hash able to spend the same currency even to play by the rules of the system may algorithm designed by National Security after giving it to another person, the lead to the incentives and rewards given Agency. SHA256 is a set of cryptographic currency system is bound to collapse the system. Thus the motivation would hash functions whose key characteristic within short time. The success of the be to play by the rules and be honest. is that no two different inputs can Blockchain technology is largely due to The subsequent part of this section produce the same hash output. Even it having solved this Double-Spending describes how the Blockchain has been a slightly different input will produce a problem. Every transaction added to designed to establish trust. vastly different hash output. To illustrate the block chain is verified to ensure that Everybody must have heard of a this point, an online SHA256 generator the inputs to the transaction have not ledger. Ledger is a book or software at http://www.timestampgenerator. already been spent. In other systems, for record keeping of transactions of com/tools/sha256-generator/ is used. a trusted third party validates the rules companies, organizations, banks and The SHA256 hash output and confirms each transaction, but the any other institution. Institutions use for the string “I am Rajesh” is whole premise on which Bitcoin and many kinds of ledgers like Sales Ledger, 751d34e6ade738e0e60e063b3dfa1b76a Blockchain is based, is not having a third Purchase Ledger and General Ledger. 83f90af4e123b2c3e903c19e9c58fdd party. In Bitcoin, the need for various Blockchain is a software Let us change the string a little bit nodes of the Blockchain network to implementation of a distributed and by adding a period at the end of the string be in consensus prevents the Double- shared ledger based on cryptographic as “I am Rajesh.”. The SHA256 output Spending problem. • Cover Story concepts. A highly simplified for the same is vastly different and is

• Technical Trends explanation of the Blockchain is as f55ac225cc2442877d0fa51163c142c471 Header of Header of Header of follows. A diagrammatic representation f870531edd802b60deb85752e4ce18 Block N Block “N+1” Block “N+2” • Research Front Genesis Previous Previous Previous of Blockchain is available in Fig 1 and Any attempt to hack the Blockchain Block Block Hash Block Hash Block Hash • Articles Fig 2. Whenever a transaction happens would involve not just tampering Timestamp Timestamp Timestamp Merkle Merkle Merkle • Innovations in IT between two parties, the transaction the current block but the history of Root Root Root is broadcast to the entire Blockchain transactions in all the previous blocks.

• Security Corner network. At intervals of time, the group Also, since this distributed ledger is Transactions in Transactions in Transactions in Block N Block “N+1” Block “N+2” • Practitioner Workbench of transactions that happened after the stored on all the nodes of network, the creation of last block are validated. Once tampering needs to be done on all the Transaction Blocks 1 • Brain Teaser the validation is complete, a new block is nodes at the same time else there will to “N-1” • Chapter Reports generated. The average interval of time be disagreement between the nodes Fig. 1 : Simplified Representation of Blocks between creation of two blocks is 10 and the tampering would get detected • Student branch reports in Blockchain minutes. The new block is timestamped and the block would not be validated and made immutable to tampering by and included in the Blockchain. With the cryptographic and hashing algorithms. day by day growth of the Blockchain and Variants of Blockchain The validation of the block is carried the number of nodes in the network, the The two variants of Blockchain are out by people known as miners. Each level of difficulty of tampering would Public Chain and Private Blockchain. of the miner competes to complete keep on increasing exponentially. This Public Blockchains are the Blockchains the validation faster than the others. In extreme resistance to tampering of in which anyone in the world can case of Bitcoin Blockchain, the miner Blockchain by the virtue of its design read, transact and participate in the who completes the validation first and code is the characteristic which consensus . Permissionless and leads to the generation of a new brings trust in the system. That is Blockchains is another term frequently block receives the rewards in terms of the reason why Blockchain is finding used with regards to Public Blockchains Bitcoin. Each of the blocks is connected many applications in various systems since anybody can use it and anybody to its previous block by storing the hash wherever transactions between various can become a miner in it without any of the header of previous block. This parties are involved. permission from any authority. Bitcoin connection of one block to another One of the main problems Blockchain is an example of Public forms a virtual chain similar to a linked associated with cryptocurrencies is Blockchain. Private Blockchains are

www.csi-india.org 10 CSI Communications | FEBRUARY 2017 Technical Trends

of contractual agreements. The third party charges certain percentage of Blockchain the contractual amount for its services. Ledger The Smart Contracts with Blockchain as the underlying technology can discard the Intermediary. The funds Blockchain Blockchain Node 2 Ledger could be deposited to a virtual account Ledger and the Smart Contract Code can automatically release the funds to the concerned party on fulfillment of the Node 1 Node 3 contractual agreements listed in the computer language code. This would be more transparent and can save the money spent on the third party services. The decentralized platform named Ethereum developed by Ethereum Blockchain Ledger Blockchain Foundation is one of the solutions which Ledger runs smart contracts. It is not uncommon to see the political parties raising the issue of Node N+1 vote tampering after elections. The Node N application of Blockchain in voting Fig. 2 : Simplified Representation of Blockchain in democracies is being visualized to prevent the possibility of vote the Blockchains where the users who usage of Blockchain; Technology. Other tampering. This is to prevent rigging and to secure the votes by recording them can read, transact and participate are advantages that are being seen are in Blockchain database which is highly restricted. Private Blockchains are the the ease of conducting transactions, immune to tampering. In December Blockchains which are of more interest security, efficiency, transparency, 2016, a Block chain voting project to the Businesses since they get all the neutrality and traceability. named Votebook by three New York advantages of the Blockchain while Any common man who has dealt in University Students won the $10,000 retaining a tight control on who does real estate or is buying land or plot knows prize in a challenge from Kaspersky what in the system. There are again how hard it is to trust about whether he Lab. variants like Consortium Blockchains is buying from the correct legal owner and Fully Private Blockchains here. of the property and if the property has Blockchain – Indian Perspective Private Blockchains are also known not already been sold to somebody else. Being at the forefront of Information as Permissioned Blockchains since Blockchain technology will bring great technology industry, India and Indians users need permission to access the transparency when applied to Land are not the ones to be left behind on Blockchain. One example of the Private Registry Systems. Sweden is conducting something as -breaking and as Blockchain is the distributed consensus tests to implement Blockchain in disruptive as Blockchain. India’s top ledger system by a company named its Land Registry and real estate Business group Mahindra is partnering Ripple for the banking and Financial transactions. Central American country with IBM on applying Blockchain in the industry. named Honduras is taking of a U.S. supply chain finance business. They are Hyperledger is another open Blockchain technology company named also working on integrating Blockchain source collaborative project to advance Factom to apply Blockchain technology and Internet of Things solutions for tracking truck movements and delivery cross-industry Blockchain technologies in building a permanent and secure land record system. times of goods. for various industries like Finance, Smart and self-executing contracts In June 2016, Reserve Bank Banking, Internet of Things and Supply are another area where Businesses of India expressed its intention to Chain. are evincing great interest to apply setup a committee to study usage of Advantages and Applications of and use Blockchain technology. Smart Blockchain to reduce use of Paper Blockchain contracts are contracts where the currency. The Sunrise State of Andhra More than the Bitcoin, it is the other contractual terms are written in special Pradesh has introduced the Blockchain possible applications of Blockchain that computer programming languages. technologies to prevent cybercrimes. is causing such hype and excitement In the current scenario, the contract It introduced Blockchain in some of its about this technology. Lesser costs and funds are deposited with a third party departments to prevent its databases unprecedented speed of transactions escrow account. The third party does from being hacked. Andhra Pradesh due to absence of intermediaries is being verification and then releases funds is also planning to setup a Blockchain seen as one of the main advantages of to the concerned party on completion Technology Institute in the port city of

11 CSI Communications | FEBRUARY 2017 Technical Trends

Visakhapatnam in collaboration with is available at https://bitcoin.org/en/ References University of California, Berkeley. developer-documentation. [1] http://www.coindesk.com/ibm- In October-2016, ICICI bank The Bitcoin wiki at https:// blockchain-mahindra-supply- announced that it carried out India’s en.bitcoin.it/wiki/Main_Page is another chain/ first Blockchain transactions for one-stop shop for all things related [2] http://economictimes.indiatimes. fund remittance between its Mumbai to Bitcoin and Blockchain. The main com/small-biz/security-tech/ branch and Dubai branch of Emirates interest now in Blockchain is due technology/mahindra-drops-the- NBD Bank. ICICI bank also carried to the various purposes other than coin-on-blockchain-to-manage- out a Blockchain network based pilot Bitcoin for which it can be applied to. books/articleshow/55718325.cms transaction involving a Mumbai firm The following link https://en.bitcoin.it/ [3] http://indiatoday.intoday.in/story/ and a supplier from Dubai for import wiki/Alternative_chain at Bitcoin wiki andhra-pradesh-asia-blockchain- of steel scrap. Two other Indian Banks explains the same in detail. technology-cyber-crime- named Kotak Mahindra and Axis Bank One another accessible way to cashless/1/835037.html are conducting pilot transactions using learn about Blockchain is by enrolling [4] http://timesofindia.indiatimes. Blockchain and are experimenting it in and attending the Free Massive Open com/city/visakhapatnam/AP-govt- various Business segments. Online Course on Bitcoin at https:// plans-blockchain-tech-institute- Kratos Innovation Labs, a Singapore www.coursera.org. There is a course in-port-city/articleshow/55298937. based startup founded by two Indians named “Bitcoin and Cryptocurrency cms named Satheesh Kumar Paddolker Technologies” created by Princeton [5] http://www.thehindu.com/ and Rajiv Kaushik, has developed two University and taught by Arvind business/ICICI-Bank-executes- blockchain products named x-DeFraud Narayanan, Assistant Professor in India%E2%80%99s-first- and Smart Contracts as a Service Computer Science. It is available at the transaction-on-blockchain/ (SCaaS). These products are related following link: article15894311.ece to detecting fraud in trade finance and https://www.coursera.org/learn/ [6] http://www.livemint.com/Industry/ customized Smart Contract solutions cryptocurrency loztj0R98Ea6m58Ng8jUzM/ for financial institutions. There is a free self-paced online Blockchain-technology-catches- An Infosys subsidiary named course titled “IBM Blockchain for Axis-Kotak-Mahindras-fancy.html EdgeVerve has released a Blockchain developers” available at the following [7] http://www.livemint. Framework for Financial Services, link: https://developer.ibm.com/ com/Companies/ • Cover Story which is a shared distributed ledger courses/all-courses/blockchain-for- bXjPtlHZRK46FQVb2hxhyN/TCS- • Technical Trends solution for payments, trade finance, developers/ throws-weight-behind-blockchain. smart contracts and other transactions. • Research Front Conclusion html TCS is also investing in Blockchain In these times when the Government [8] https://www.washingtonpost.com/ • Articles technology and is getting ready to has declared war on corruption and news/the-switch/wp/2014/01/03/ • Innovations in IT launch a core banking software based people are demanding increasingly hal-finney-received-the-first- on Blockchain. Cognizant entered into fast, efficient and transparent services bitcoin-transaction-heres-how- • Security Corner an agreement with Japan based Mizuho from the Government and Businesses, he-describes-it/ • Practitioner Workbench Financial Group to develop Blockchain the Block chain technology is bound [9] http://economictimes. solutions for its customers and group • Brain Teaser to come into picture sooner than later. indiatimes.com/small-biz/ companies. Blockchain based identity management startups/fraud-proof-kratos- • Chapter Reports Learning Resources for Blockchain and financial solutions can be used to innovations-blockchain-tech- • Student branch reports As already mentioned, Bitcoin was accelerate the move towards cashless can-save-millions-for-banks/ the first purpose for which Blockchain economy which the Government is articleshow/55888342.cms technology was developed by Satoshi aiming for. Blockchain technology [10] https://www.edgeverve.com/ Nakamoto, so learning about Blockchain can reduce the cost of cross-border finacle/solutions/Documents/ invariably involves understanding the remittances which is fueling the edgeverve-blockchain-financial- implementation of Bitcoin Blockchain. economies of many developing services.pdf To learn about Blockchain straight countries. More and more applications of [11] http://www.newyorker.com/ from the horse’s mouth, we can refer Blockchain to various systems involving magazine/2011/10/10/the-crypto- to Blockchain section of the bitcoin transactions are bound to be developed currency developer guide at https://bitcoin.org/ and implemented across the world. [12] https://en.bitcoin.it/wiki/Double- en/developer-guide#block-chain. This This is definitely going to have positive spending website https://bitcoin.org was originally impact on the Global Economy and also [13] http://chimera.labs.oreilly.com/ registered by Satoshi Nakamoto and going to provide a lot of opportunities to books/1234000001802/ch07. another developer named Martti people and organizations skilled in the html#merkle_trees Malmi. A host of other documentation Blockchain technologies. [14] http://www.reuters.com/

www.csi-india.org 12 CSI Communications | FEBRUARY 2017 Technical Trends

article/us-sweden-blockchain- article/47589/nyu_students_ Ripple_(payment_protocol) idUSKCN0Z22KV win_award_solution_safeguard_ [22] https://www.hyperledger.org/ [15] http://in.reuters.com/article/ electron [23] http://timesofindia.indiatimes. usa-honduras-technology- [18] https://www.ethereum.org/ idINKBN0O01V720150515 [19] https://blog.ethereum. com/business/india-business/RBI- [16] http://www.itworldcanada.com/ org/2015/08/07/on-public-and- to-study-Blockchain-technology- article/how-blockchain-based- private-blockchains/ to-curtail-paper-currency/ smart-contracts-can-help-grow- [20] https://www.smithandcrown.com/ your-business/382611 permission-blockchains/ articleshow/52906383.cms [17] http://gsnmagazine.com/ [21] https://en.wikipedia.org/wiki/ [24] https://shocard.com/ n

About the Authors

Mr. K.V.N.Rajesh [CSI-I1503325] is M.Tech in Computer Science and Technology from Andhra University in 2010. He is the Head of the Department and Senior Assistant Professor in Department of information technology at Vignan’s Institute of Information Technology, Visakhapatnam since 2005. He is a member of Computer Society of India. His research interests include Business Intelligence, Location Intelligence and Big Data and he has published papers in the respective areas. He can be reached at [email protected].

Mr. K.V.N.Ramesh is M.E in Structural Engineering from Andhra University. He has 15 years of experience in IT industry with expertise in the area of Data Warehousing and Business Intelligence. He has worked on UNIX, Oracle, Sybase, Business Objects, OBIEE and Tableau during these years. He is an Oracle certified professional in Oracle DW and OBIEE. He is currently working as Project Manager at Tech Mahindra, Visakhapatnam. He can be reached at [email protected].

(ADVERTISING TARIFF) Rates effective from April, 2014 CSI Communications

COLOUR Colour Artwork (Soft copy format) or positives are MECHANICAL DATA required for colour advertisement Back Cover ` 50,000/- Full page with Bleed 28.6 cms x 22.1 cms Inside Covers ` 40,000/- Full Page 24.5 cms x 18.5 cms Full Page ` 35,000/- Double Spread with Bleed 28.6 cms x 43.6 cms Double Spread ` 65,000/- Double Spread 24.5 cms x 40.0 cms Centre Spread ` 70,000/- (Additional 10% for bleed advertisement) Special Incentive to any Individual/Organisation for getting sponsorship 15% of the advertisement value. Special Discount for any confirmed advertisement for 6 months 10%. Special Discount for any confirmed advertisement for 12 months 15%. All incentive payments will be made by cheque within 30 days of receipt of payment for advertisement. All advertisements are subject to acceptance by the editorial team. Material in the form of Artwork or Positive should reach latest by 20th of the month for insertion in the following month. All bookings should be addressed to : TM Computer Society of India Unit No. 3, 4th Floor, Samruddhi Venture Park, MIDC, Andheri (E), Mumbai-400 093. Tel. 91-22-2926 1700 • Fax: 91-22-2830 2133 | Email: [email protected]

13 CSI Communications | FEBRUARY 2017 Research front

Customized Linux Distributions for Bioinformatics Applications

Khalid Raza & Sahar Qazi Department of Computer Science, Jamia Millia Islamia (Central University), New Delhi-110025. Email: [email protected]

Introduction The creation of this beautiful Project and later in 1985 GNU Manifesto Consultative Expert Working Group for universe is the witness of the was published to outline the purpose Research and Development Financing systemization of everything. To better and importance of free and open source and Coordination has evaluated open understand this concept, we can have software. The biggest breakthrough of source drug discovery (Årdal et al., a look at our ‘Genome’. The genome is open source operating system began 2011). Pharmaceutical companies have said to be the “Blueprint” of an organism with the development and release contributed a lot to the discovery of since it is composed of the whole set of Linux by a Finnish student Linux drugs for many diseases. Few research of genes and gene products. It is the Torvalds in 1991; who developed a free based pharmaceutical industries have genome which is known to control and kernel of the operating system and also made commendable efforts to regulate the framework of an individual. released it under GNU General Public discovery drugs for T.B. Some of the Complex systems are defined as large Licence. Since then, there have been a customized Linux for bioinformatics numbers of interactions among various large number of , a list and computational biology applications constituents. The genome is the janitor of top 10 distributions is shown in Fig. 1. are described as follows and depicted of the living organisms managing in Fig. 2. everything; very similarly, we have the Ubuntu operating system which is the most Puppy Fedora essential part of any computer system Linux • Cover Story (Yan et al., 2010). The main purpose of an operating system is to provide a milieu Linux • Technical Trends where the user can interact and execute Top 10 Mint the programs in a very easy yet efficient Linux • Research Front distributions manner. Due to rapid advancement and • Articles Sabayon/ open applications of computational biology Gentoo SUSE • Innovations in IT and bioinformatics in biomedical and pharmaceutical industries, there • Security Corner Mandriva PCLinux has been a need for the creation OS Fig. 2 : Five popular customized Linux • Practitioner Workbench of operating system which suites tailored for bioinformatics applications • Brain Teaser the requirements of computational biologists and medical scientists. This • Chapter Reports Fig. 1 : Top 10 Linux distributions BioLinux: It is a free bioinformatics article focuses on operating system platform built on Ubuntu Linux LTS • Student branch reports customized for computational biology based, providing more than 250 and bioinformatics applications. Customized Linux for Bioinformatics & bioinformatics packages, 50 graphical Advent of open source operating Computational Biology Applications applications, and hundreds of command systems and Linux distributions The advent of open source line utilities. The recent Bio-Linux With the advent of free and open operating systems leads to the version 8.0 also incorporates Galaxy source software (FOSS), this movement development of customized operating environment for browser-based data has overtaken operating systems systems for various purposes analysis. The Bio-Linux is created and causing many of them to be made including computational biology and maintained by NERC Environmental available. Since the source code is bioinformatics applications (Årdal et Bioinformatics Centre (NEBC). It is not available freely under FOSS movement, al., 2011). Pharmaceuticals are an only available for but also the detailed study of operating systems often mentioned application area for on cloud architecture such as Amazon became quite easy. Some of the customized operating system for drug EC2 by using CloudBioLinux. It can also examples of open source operating discovery. Open source utilization in run directly from a DVD/USB without systems are Linux (1991), FreeBSD the field of pharmaceuticals paving, or installing analysis (Field et al., 2006). (1993), Ubuntu (2011), etc. The initial rather has already paved a way for the BioSLAX: It is also a customized effort for the movement was started by development of this prominent field operating system for bioinformatics Richard Stallman in 1983 under GNU known as Chemoinformatics. The WHO’s build on flavour of the www.csi-india.org 14 CSI Communications | FEBRUARY 2017 Research front

Linux, comprises of more than 300 platform for drug discovery. It allows made commendable contributions in bioinformatics tools. It directly runs universities, researchers, students, understanding the modern biology. from the DVD/USB without the need of organizations and pharmaceutical Bioinformatics software and tools installation, and let the user modularize industries world-wide on scientific packaged with Linux Operating system applications and plug it into the system projects to contribute for drug design to offer a better and cheaper way to on the fly. It was first released by Life and discovery. The OSDDLinux operating set up an influential for Sciences Institute (LSI), National systems capability is not just restricted computational biologists. Today, Linux University of Singapore in 2006. to drug designing, but encompasses operating system comes with attractive DNALinux: It is also a virtual various fields of bioinformatics analysis desktop environments, which are easier machine based on having lots and computational biology as well. to use without much training. Also, of bioinformatics tools including LXtoo: It is another customized Linux is virtually resistant to Trojans and AutodockSuite, Biopython, BLAST, Linux distribution for bioinformatics viruses, it is definitely a better choice ClustalX, EMBOSS, NCBI Toolkit, and research community, where “LX” stands for any life science researcher willing so on. Since its first release in 2007, for LiangXian and “too” indicates that it to perform biological computations. there is subsequence releases (Bassi & is based on Gentoo. It is distributed as Today’s research is open to computer Gonzalez, 2007). LiveCD/LiveUSB and run within VMware technology irrespective of the fact of OSDDLinux: The main objective of too for parallel execution with host what scientific background it belongs to. Open Source Drug Discovery (OSSD) operating system (Yu et al., 2012). Bioinformatics tools are available freely Linux is to create a novel open source Summary for all scientific backgrounds. Many computational and experimental The field of Bioinformatics has operating systems mentioned above

Table 1 : A summed up table presenting few most popular customized Linux tailored for bioinformatics and computational biology applications. Name Developer/ Year of first Current version Important bioinformatics tools available Distribution release BioLinux NERC Environmental 2006 BioLinux 8.0 ABYSS, Assembly-conversion-tools, axiome, Bioinformatics Centre BAMTools, Beam2, BedTools, Big-BLAST, BitSeq, BLAST2, Bowtie Tools, BWA, ClustalW/X, Cufflinks, Cytoscape, DiAlign, EMBOSS, FastQC, FastTree, Galaxy-Server, Geneious, GNX-Tools, HMMER, Jalview, Jellyfish, , BioJava , Muscle, MView, NRDB, Phylip, Pymol, R with several packages, Rasmol, SamTools, T-coffee, many more. BioSlax National University of 2006 BioSLAX 8.0 BLAST, BioGrep, ClustalW, EMBOSS, Genesplicer, Singapore HMMER, GlimmerHMM, Modeller, PamL, Phylip, Primer3, R & Bioconductor, T-Coffee, JAligner, Jalview, jEMBOSS, Jmol, NJPlot, Pymol, ReadSEQ, TreeView, Weka, etc. OSDDLinux CSIR - Institute of — No subsequent Tools for Genome and Proteome Annotation, Vaccine Microbial Technology, release and Drug Informatics, Biotherapeutics, NGS data India analysis, GPSR scripts & several third party software DNALinux Genes Digitales and 2007 No subsequent AutodockSuite, Biopython, BLAST, ClustalX, EMBOSS, Quilmes National release EMNU, ESIM, FinchTV, HMMER, University, Argentina IPRSCAN, Kalign, MIRA, NCBI Toolkit, Phylip, Primer, Pymol, Rasmol, Readseq, Sigma Align, TreeView, Vienna RNA, and many more. LXtoo Jinan University, China 2012 No subsequent NCBI tools, EMBOSS and SMS2 for sequence analysis, release Sequence alignment tools - ClustalW/X, Gene finder tools - qRNA, Glimmer; miRNA target prediction tool PITA; Vienna for RNA secondary structure prediction and comparison; Network analytical tools like Cytoscape and igraph library; GOSemSim for GO and DO semantic study; TM4 and bioconductor packages for Microarray analysis and many more.

15 CSI Communications | FEBRUARY 2017 Research front

contain bioinformatics tools, and thus, Røttingen, J. A. (2011). Common systems for drug design, http:// come under the ocean of FOSS (Free characteristics of open source osddlinux.osdd./ Accessed on and Open Source Software), making it software development and January 1, 2017. very easy for students & researchers applicability for drug discovery: a [5] Yan, K. K., Fang, G., Bhardwaj, to practice and to study biological systematic review. Health Research N., Alexander, R. P., & Gerstein, phenomenon in a new light. There is an Policy and Systems, 9(1), 1. M. (2010). Comparing genomes open choice for researchers to choose [2] Bassi, S. and Gonzalez, V. (2007). to computer operating systems from several fully loaded operating DNALinux Virtual Desktop Edition. in terms of the topology and systems, and this choice is increasing Available from Nature Precedings evolution of their regulatory day-by-day, with new technologies http://dx.doi.org/10.1038/ control networks. Proceedings coming in. The open-source operating npre.2007.670.1 of the National Academy of systems is very easy to work with and [3] Field, D., Tiwari, B., Booth, T., Sciences, 107(20), 9186-9191. without any doubts, has been proven to Houten, S., Swan, D., Bertrand, [6] Yu, G., Wang, L. G., Meng, X. yield successful results, thus, making it N. and Thurston, M.( 2006). Open H., & He, Q. Y. (2012). LXtoo: an a part-n-parcel of the modern biological Software for biologists: from famine integrated live Linux distribution laboratories. to feast. Nature Biotechnology 24, for the bioinformatics community. References 801 - 803. BMC Research Notes, 5(1), 360. [1] Årdal, C., Alstadsæter, A., & [4] OSDDLinux: a custom operating n

About the Authors

Dr. Khalid Raza (CSI Member ID 01060359) is an active researcher and working as an Assistant Professor at the Department of Computer Science, Jamia Millia Islamia, New Delhi. He has contributed one book, two book chapters, and over 25 research articles in refereed international journals and conference proceedings. His research interests lies in computational biology, Biological Data Analytics and Soft Computing.

• Cover Story Ms. Sahar Qazi is doing her Master of Science in Bioinformatics from Jamia Millia Islamia. Her research • Technical Trends interest lies in Biological Big Data Analytics and Bioinformatics. • Research Front • Articles • Innovations in IT • Security Corner • Practitioner Workbench • Brain Teaser • Chapter Reports an individual. CSI Headquarter : • Student branch reports Samruddhi Venture Park, Unit No. 3, 2 are friends. 4th Floor, MIDC, Andheri (E), Mumbai-400093, Maharashtra, India 3 is company. Phone : 91-22-29261700 Fax : 91-22-28302133 more than 3 makes a society. The Email : [email protected] arrangement of these elements makes the letter ‘C’ connoting ‘Computer CSI Education Directorate : CSI Registered Office : Society of India’. CIT Campus, 4th Cross Road, Taramani, 302, Archana Arcade, 10-3-190, Chennai-600 113, Tamilnadu, India St. Johns Road, the space inside the letter ‘C’ connotes Phone : 91-44-22541102 Secunderabad-500025, an arrow - the feeding-in of information Fax : 91-44-22541103 : 91-44-22542874 Telengana, India or receiving information from a computer. Email : [email protected] Phone : 91-40-27821998

www.csi-india.org 16 CSI Communications | FEBRUARY 2017 SECURITY CORNER

Cyber Threat Analysis with Memory Forensics

Hardik Gohel Himanshu Upadhyay Working in Cyber Security Research Project Management Professional

Introduction Memory forensics is about Virtual Disk In today’s world, the dependency CPU Cache Ram Memory Storage capturing the profile as well as on computers is growing extensively. the memory contents and can add Government agencies and private an invaluable resource to incident companies are attempting to protect Fig. 1 : Flow of Memory Storage response, malware analysis, and digital themselves from cyberattacks with forensics capabilities. Even though digital defense techniques like Memory Forensics inspection of network packet captures encryption, firewalls and heuristic or In the world of digital forensics, and hard disks can yield compelling memory forensics is arguably the most signature scanning, etc. Meanwhile, verification, it is often the contents of interesting and fruitful realm. Memory the number of attacks that include the computer memory that enables forensics involves analyzing the data infiltrating military data centers, the full reconstruction of events, stored in the physical memory at allowing an individual to determine targeting power grids and stealing trade operating system runtime. Its primary what has already happened, what is secrets from both private and public application is in the investigation of presently happening,and what would organizations continues to increase. advanced computer attacks which happen with further infection through The detection, response and reporting are stealthy enough to avoid leaving malware or an intrusion by advanced of these kinds of intrusions as well data on the computer hard drive. threat actors. For example, a piece of as other incidents involving computer Consequently, the memory (RAM) must evidence found in RAM could help to systems, are crucial for cyber security be analyzed for forensic information. associate typical forensic artifacts that professionals. Each and every function performed may appear different and allow for As these attacks continue to by an application or operating system an integration which could otherwise expand and the sophistication of the results in a special kind of change to remain unnoticed. adversaries grow, defenders must adapt the random access memory. These There are three reasons for in order to survive. If proof-of-damage changes often stay for a long time after gathering and analyzing the data is never written to secondary storage, completion of the operation, crucially contained in the physical memory. First, there is no way to rely on disk forensics. storing them. Furthermore, memory forensics provides unprecedented the physical memory contains real-time On the other hand, memory has a high visibility into the runtime state of the data related to the operating system potential to carry malicious code from system, such as which processes were environment, such as the currently- an infection, partially or completely, running, open network connections, mounted and the list of even though it’s never written to and recently executed commands. processes being operated. Second, secondary storage (e.g., a hard drive). Individuals can perform an extraction even the encrypted data is generally This is because the malicious code is of these artifacts that is totally decrypted when it is stored in the loaded into the memory to execute. independent of the machine being physical memory. Third, this method The random access memory of the investigated. It also reduces the chance adapts well to the characteristics of victimized system also contains the of rootkits or malware preventing the embedded systems. Since an embedded proof of the system resources allocated investigation process. Crucial data system is rarely turned off, the data by malicious code. may exist exclusively in memory, such contained in the physical memory is Just like that, if the data taken from as unencrypted e-mail messages, mostly persistent. Therefore, significant the organizationis encrypted across the disk encryption keys, non-cacheable information can be obtained if analysis network,to determine which sensitive internet history records, off-the-record is performed effectively on the physical files were stolen and that won’t be chat messages and memory-resident memory. injected code fragments. recognized by traditional packet capture The different types of information techniques. However, passwords and Context Analyze that can be extracted from memory Acquire encrypted keys can often be recovered ƒƒ Establish ƒƒ Analyze Data include processes, dynamic link ƒƒ Capture Raw Context for Significant by memory forensics, or even the file’s Memory ƒƒ Find Key Elements libraries (dll), process memory, image ƒƒ Hibernation Memory Offsets ƒƒ plain-text contents before they were File Evidence identification, kernel memory and encrypted, providing information to objects, networking, registry, malware understand the scope of an attack. Fig. 2 : Process of Memory Forensics and rootkits.

17 CSI Communications | FEBRUARY 2017 SECURITY CORNER

Why Memory Forensics? The major executive objects of Tools of Memory Forensics Everything in any type of operating Windows for memory forensics include While there are multiple types system traverses random access file, process, symbolic link, token, of tools available to perform memory memory, including processes and window station, , desktop, mutant, forensics, the Volatility framework and threads, rootkits and malware, IP types and keys. These executive objects Linux Memory Extractor (LiME) are the addresses, network sockets, URLs, are available with the corresponding most popular. open files, passwords, catches, name of the structure(e.g., file with LiME is one of the best memory clipboards and other user generated _FILE_OBJECT structure). There is at dump tools. It is a Linux kernel module content, encrypted keys, configurations least one Volatility plugin that analyzes (LKM) released by ShmooCon, which of hardware and software and windows each of the executive objects listed performs memory dumps for the registry keys and event logs. above. Linux system. It is the first tool that The types of artifacts found in Linux Forensics can perform entire memory dumps memory dumps share a common origin. In Linux memory forensics, the from Linux-based devices and from They all starts out as an allocation. fundamental approach is to begin Android. LiME is a powerful device that Why, when and how the regions of analyzing memory dumps of Linux. can perform memory dumps by loading memory were allocated sets them Specifically, one must be aware of modules immediately after compiling apart, in addition to the actual data traditional and modern memory without any other operations, such as a stored within and around them. As a acquisition techniques on Linux with change in kernel settings. Particularly part of memory forensics, the study their benefits and drawbacks. To in the case of Android, one can dump a of these behaviors could be helpful to perform Linux memory forensics, it file directly into external memory after make inferences about the allocation is required to create Linux profiles, inputting a pre-compiled module file of the content, leading to the ability which are archives and contain useful into the external memory and loading to find and specific types of data information that Volatility needs to the module through the command line. throughout a large memory dump. adequately find and intercept the data in LiME features provide full memory Additionally, the knowledge of allocation memory dumps of Linux. Furthermore, acquisition and acquisition over the and de-allocation of memory and their one should be aware of the challenges network interface with a minimal algorithms (i.e., First Fit, Best Fit, Next to deploy Linux memory forensics in an process footprint. Fit and Buddy System) could aid in enterprise environment, where critical The second popular memory understanding the context of the data. • Cover Story servers may not even have compilers forensic tool is the Volatility framework. For example, which block of memory is in C with other libraries which are It is a single, cohesive framework that • Technical Trends free or which one is allocated. found on and desktops of analyzes RAM dumps from Linux, 32- • Research Front standard Linux. and 64-bit windows, Mac, and Android systems. The modular design of Volatility • Articles Mobile OS Memory Forensics Various mobile operating system allows it to easily support new operating • Innovations in IT are currently in use,including Android, systems and architectures as they are released. So, all devices are targets. It • Security Corner iOS, Windows 10 mobile, Tizen, Sailfish and Ubuntu . The most popular doesn’t limit the forensic capabilities to • Practitioner Workbench mobile OSs are Android and iOS. The just Windows computers. Furthermore, • Brain Teaser rapid increase of systems running it is an open source written in Python and has extensible and scriptable API • Chapter Reports Android and Mac OS in both home and corporate environments has resulted in with unparalleled feature sets and • Student branch reports Android and Mac systems being a focus comprehensive coverage of file formats. Fig. 3 : Different OSs with Memory Forensics of targeted attacks. Because of these Benefits of Memory Forensics factors, cybersecurity experts have The benefits of memory forensics worked to develop tools for Android and include, but are not limited to: Windows Forensics iOS for robust investigative capabilities ƒƒ Memory forensics is an ideal Memory forensics for Windows for Linux and Windows systems. To analysis that includes physical involves finding and analyzing executive perform Android and Mac OS memory memory data (from RAM) as well objects. Windows is written in C and forensics, one has to create a Volatility as Page File (or SWAP space) data the data as well as the attributes profile for Android and Mac systems and ƒƒ Analysis of memory is the best organization heavily use C structures. can use one of the tools for acquisition place to identify malicious software Out of those, several of structures of memory. Furthermore, some of the activity are called executive objects. They are unique facets such as 64 bit addressing created, deleted and protected by the on 32 bit kernels, the typical userland ƒƒ Memory forensics helps to analyze object manager of Windows. The object and lay out of kernel address space, and and track recent activities of the manager is a component of the kernel the use of components are system in context with the user’s implemented by the NT module. also major considerations. profile and activities of attackers.

www.csi-india.org 18 CSI Communications | FEBRUARY 2017 SECURITY CORNER

ƒƒ Malicious code is not yet conducting the whole disk, individual partition, & Cyber Security”, 2015 anti-forensics within random or virtual file-based containers [2] M H Ligh, A Case, J Levy, A Walters. access memory. are encrypted. This protection “The Art of Memory Forensics”, 2014 results in serious challenges for [3] Mark Wade, “Memory Forensics: Where ƒƒ Memory forensics is the only way to ” at http://www.forensicmag. investigators, even if they gain to collect evidence that cannotbe com/ article/2011/06/ memory- found anywhere else, such as access to the media forensics-where-start, 2011 [4] Gohel, Hardik. “Looking Back at chat threats, Internet activities, Research Directions & Conclusion memory-only malware, etc. the Evolution of the Internet.” CSI The major thrust area of operating Communications - Knowledge Digest ƒƒ Every bit of data being created, system memory forensic is to perform for IT Community 38.6 (2014): 23-26 viewed, or destroyed goes through Linux memory forensics. Government [5] Blackbag Team,”WINDOWS MEMORY RAM. This includes all web- offices and business organizations are FORENSICS”, at https://www. browsing activity, document edits, major Linux adopters. There are many blackbagtech.com/ blog/ 2016 /03/07/ windows-memory-forensics/2016 images, sending and receiving security issues with the Linux operating [6] Baliga, A., Ganapathy, V. and Iftode, L., system. The research direction should of network data, execution of 2011. Detecting kernel-level rootkits applications, and essentially focus on applied operations of memory using data structure invariants. IEEE anything that appears on the forensics in Linux machines and Transactions on Dependable and monitor. advanced data analysis using machine Secure Computing, 8(5), pp.670-684. learning which will be very useful [7] Hardik, Gohel. “Data Science - ƒƒ RAM is effectively a “disk,” hence to the Linux cyber society. This will Data, Tools & Technologies.” CSI it is necessaryto preserve and allow government agencies, business Communications Knowledge Digest for investigate the memory in addition organizations and also small-scale IT Community 39.3(2015): 8-10 to the hard disk. [8] Korkin, I. and Nesterov, I., 2015. Applying industries to secure their system memory forensics to rootkit detection. Challenges in Memory Forensics operations. Antiviruses, which are one arXiv preprint arXiv:1506.04129. There are many challenges to of the alternatives, can prevent malware [9] Hal Pomeranz, “Detecting Malware performing memory forensics, including from entering the system; however, with Memory Forensics”, at http:// the following. what if an antivirus becomes disabled by www.deer-run.com/~hal/ Detect_ ƒƒ Evaluating the diverse memory admin access through the rootkit? So, Malware_w_Memory_Forensics.pdf, 2015 acquisition tools available, which there is a need of research to provide models and algorithms to increase [10] H Gohel, P Sharma. “Study of Quantum perform differently depending Computing with Significance of Machine the security of the operating system on the operating system version, Learning.” CSI Communications - installed hardware and the resulting in the cyber protection of the Knowledge Digest for IT Community configurations. users. Research focused on memory 38.11 (2015): 21-23 forensics using machine learning [11] Joe Sylve https://github. ƒƒ If the termination character cannot could be one of the key factor as it is com/504ensicsLabs/LiME be found. Consider the situation rarely addressed by anti-virus products [12] Lime Forensics, https://code.google. in which, analyzing the physical available in the market. In the cyber com/p/lime-forensics/ address space of a system that community, such research may provide [13] Volatility framework, https://github. com/volatilityfoundation/volatility/wiki leverages paged , a the solution for many of the challenges. string is encountered that crosses n a page boundary to a page that is References [1] Hardik Gohel. “Introduction to Network no longer memory resident, which would require special processing or heuristics to determine the About the Authors: actual size of the string. Dr. Hardik Gohel [CSI-I1500336] is working on cyber security ƒƒ The challenges faced during linked research. He has 8 years of experience in teaching and research in list analysis also apply with the the field of computer science and technology. analysis of memory trees. ƒƒ Memory evidence is often found on non-volatile media and comes Dr. Himanshu Upadhyay is a Project Management Professional in various shapes and sizes. As a and having over 25 years of experience in information technology, cyber security expert, one must be management and engineering at USA. Dr. Upadhyay’s areas of aware of the different formats and applied research include knowledge management, enterprise the procedure of converting one systems for web and mobile platforms, penetration testing, digital format into another. forensics and malware analysis. ƒƒ When the system is powered off,

19 CSI Communications | FEBRUARY 2017 ARTICLE Top Ten Alternative Operating Systems You Should Try Out Deepu Benson Amal Jyothi College of Engineering

There are hundreds of operating by The Open Group can be trade marked importance of Chrome OS lies in the systems available in the market but as UNIX. AIX from IBM, HP-UX from fact that the principle of sadly our quest for operating systems Hewlett Packard, Solaris from Sun the operating system is the Chrome web mostly end with Windows, Linux, Micro Systems etc. are examples for browser. So, in simple terms Chrome macOS or a mobile operating system pure UNIX operating systems. OS is a browser based operating system like Android. I am sure 99 percentage Raspbian distinct from all the other operating of the people who read this article Raspbian is a Debian Linux based systems included in this list. Chrome have only used one or more of these operating system. If so why Raspbian OS primarily supports web applications. operating systems. If you are rich operating system is included in this Unlike the other based enough to pay a substantial amount list? The first reason is that Raspbian operating system OS, Chrome for an operating system you mightbe is an operating system for Raspberry OS is still operational and continually having some version of Windows from Pi, a single board computer provided produces newer versions with the latest th Microsoft or macOS from Apple with by the Raspberry Pi Foundation. This version released in 15 of December you, if you are geek enough to work with single board computer is heavily 2016. Chrome OS itself is not an open Linux then some distribution of Linux used in Internet of Things (IoT) based source software but it has an open like Ubuntu, Fedora, Mint, Debian etc. applications. So, in the near future source equivalent called Chromium OS. might be with you or if you have a smart you definitely will come across a lot ReactOS phone then a mobile operating system of systems working with Raspbian We have heard the term Unix-like like Android OS, iPhone OS, etc., might operating system. Raspberry Pi has an a number of times in this article, now be familiar to you. And by now you might ARM processor which uses Reduced it is time for us to discuss the term be wondering what else is remaining Instruction Set Computing (RISC) Windows-like. ReactOS is an open to try out other than these popular architecture. So, the instruction set source software freely available for • Cover Story operating systems. In this article, I am implemented by Raspbian is RISC installation which imitates Microsoft • Technical Trends discussing about ten operating systems rather than CISC (Complex Instruction Windows, just like Linux imitating UNIX. you may not have used nevertheless Set Computing),the instruction set ReactOS is binary-compatible with • Research Front very important. The final list is prepared implemented by operating systems like computer programs and device drivers • Articles after going through a lot of desktop, Windows, macOS etc. Thus, Raspbian made for Windows. In simple terms, being a RISC based operating system • Innovations in IT mobile operating systems and single an executable file say program.exe board computer operating systems. is the second reason for its inclusion produced for Windows can be executed • Security Corner Since the ultimate aim of this article is in this list. Raspbian is an open source in ReactOS. Remember the fact that you • Practitioner Workbench to persuade the readers to try out some software freely available for installation. cannot execute a Windows executable of these operating systems I haven’t file in Linux. The development started • Brain Teaser eComStation considered server operating systems eComStation is an operating as the project and • Chapter Reports like macOS Server or super computer system based on the OS/2 operating the latest clone available is for Windows • Student branch reports operating systemslike CNK Operating system. OS/2 is a very popular operating 2003 Server. Yes, currently ReactOS System requiring costly hardware. system developed and maintained by is far behind in development with UNIX IBM. When IBM made the decision 10 in the markets. The very first operating system not to develop OS/2 any further the But let us hope one day ReactOS will we have to try out is UNIX. Before user community of OS/2 interfered catch up with Windows. discussing any further about UNIX I want with the development of OS/2. A Tizen to clarify one popular misconception. community of users started developing Tizen is an operating system based UNIX is not Linux. Linux distributions this operating system with the brand on the Linux kernel and the Gnu C can be called Unix-like but there are name eComStation. eComStation is Library implementing the Linux API. many differences between UNIX and very important because it is the last If Tizen is yet another free and open Linux. Linux is an open source software functioning operating system belonging source Linux clone what is so important meaning you can freely get a copy, view to the OS/2 family of operating systems. about it? Well, Tizen is not a desktop the source code, and modify Linux the eComStation is a proprietary operating operating system like most other way you like. Unlike Linux, UNIX is not system with open source components. operating systems included in this list. an open source software and is owned Chrome OS It is an operating system that works on a by a consortium called The Open Group. Chrome OS is derived from the wide range of devices like smartphones, Only those operating systems licensed Linux Kernel developed by Google. The tablets, smart TVs, smart Cameras etc. www.csi-india.org 20 CSI Communications | FEBRUARY 2017 ARTICLE

Tizen operating system is developed smaller operating system, the chances modern standard operating systems by the Tizen Association comprising of which looks very slim. KolibriOS is Visopsys don’t have many necessary Top Ten Alternative Operating Systems of companies like Fujitsu, , written entirely in features. But what makes Visopsys Panasonic, Samsung, Vodafone etc. and this feature makes it extremely fast. unique is the fact that it is developed You Should Try Out JNode Moreover, KolibriOS is an open source by a single person. Yes, a hobbyist JNode is a simple operating system software freely available for installation. operating system developer called Deepu Benson Andy McLaughlin developed the whole Amal Jyothi College of Engineering just like countless other operating AmigaOS systems available in the market. What Of all the operating systems operating system all by himself. The makes it so special? Well, operating discussed in this article AmigaOS is development started in 1997 and though system development is a world the one with the least probability of the operating system is functional by dominated by C programming language being used by a reader. There are many now even supported with a GUI Andy and Assembly languages. But here is an reasons for making such an assumption. McLaughlin is still continuing with the operating system developed using . AmigaOS being a proprietary software development of Visopsys by adding Yes, fully developed using Java. JNode itself is a very good reason for many more and more features. Frankly, it is a simple to use and easy to install people to overlook it. The support and took me some time to believe that a Java operating system for personal development of AmigaOS is about to single person can develop an operating computers. JNode is an open source finish in the near future and that is system. It is like a single person building software freely available for installation. another reason for its relative obscurity. the whole of Taj Mahal all by himself. If so why is it included in this list? It is Yet, Andy McLaughlin did it and more KolibriOS over he was gracious enough to make Have you ever tried to download the native operating system of the and AmigaOne personal computers. Visopsys an open source software so an operating system from the Internet? that future generations will benefit from You might have waited for a long time to And what is so special about these computers? Well, these computers it. download the whole operating system. Now it is time to wind up this article. A typical operating system will have support the PowerPC architecture and that makes AmigaOS one of the But before we part ways I request you size in the range of a few Giga Bytes. to take the extra effort to download and But here we have an operating system last surviving operating system that supports PowerPC architecture. use one of these operating systems called KolibriOS of size around 1.44 MB. mentioned in this article. I am sure Yes, the whole operating system can Visopsys the effort taken will not go in vain. By be stored inside a floppy disc, if floppy Finally, it is time to discuss working with an operating system not discs were still available. KolibriOS has Visopsys or Visual Operating System. It related to Windows, Linux, or macOS a (GUI) also. is a simple and fast operating system. your knowledge of computer science So, it’s safe to assume that KolibriOS But we have already seen KolibriOS one will grow exponentially and who knows is the smallest GUI operating system of the fastest available in the market. who all are going to get benefitted by it. available in the world unless someone So, what makes Visopsys so special? n somewhere came up with an even When compared with most of the

About the Author

Mr. Deepu Benson has over 15 years of programming experience. He currently works as assistant professor in Amal Jyothi College of Engineering, Kerala. He maintains a technical blog at www.computingforbeginners. blogspot.in. He can be reached at [email protected].

Call for Paper for April Issue of the CSI Journal of Computing (e-ISSN: 2277-7091)

Original Research Papers are invited for the CSI Journal of APA style in two columns format. The article should be typed, Computing, published on line quarterly (e-ISSN: 2277-7091) by the double-spaced on standard-sized (8.5” x 11”) with 1” margins on all Computer Society of India (CSI). The Journal of Computing, offers sides using 12 pt. Times New Roman font and 8-12 pages in length. good visibility of online research content on computer science theory, The standard international policy regarding similarity with existing Languages & Systems, Databases, Internet Computing, Software articles will be followed prior to publication of articles. The paper is Engineering and Applications. The journal also covers all aspects to be sent to Prof. (Dr.) J. K. Mandal, Editor-in-Chief, CSI Journal of of Computational intelligence, Communications and Analytics in Computing ([email protected]) within 20th March 2017. computer science and engineering. Journal of Computing intended for publication of truly original papers of interest to a wide audience Prof. A. K. Nayak in Computer Science, Information Technology and boundary areas Hon. Secretary, CSI between these and other fields. The articles must be written using

21 CSI Communications | FEBRUARY 2017 ARTICLE

Operating Systems

Simran Chandigarh Group of Colleges, Landran, Mohali

An Operating system is the heart of computer. From IBM’s IBM System/360 Operating System to Microsoft’s Windows 10 to Linux’s Fedora, there are lots of changes emerging in all the generations’ Operating Systems. There is always need of upgrading operating system from time to time so as to meet user requirements and trends growing in the technology. Using an Operating system, it is easy to use hardware resources, gaming, business applications, application programs and other development IDEs. Whether it is open-source or closed-source operating system, all have their own features and pros as well as some cons. It is necessary to use an operating system in an efficient and convenient way for proper utilization of computing resources and hardware. With latest technology trends, there is need to add some features like customizability, cloud services on one platform, ease of installation, cost-effective, security, reliable anti-viruses, 24*7 technical support for customers etc.

Introduction The features that separate Windows antiviruses or malware takes computer An Operating system is an interface from other operating systems include memory, disk space, CPU. Windows is between the computer user, applications compatibility for every software-all designed for general hardware such and computer hardware. An operating kinds of applications, games, drivers, that you can purchase it for either system provides the necessary platform IDEs can run on Windows, One product 32-bit processor or 64-bit processor. to users for using different application for all, technical support for its users, Also, one demerit is that windows is programs, executable programs, various networking functions, better totally non-customizable. Almost every • Cover Story system software and utilizing computer GUI interface, file sharing, flexibility program designed, can be installed • Technical Trends hardware efficiently. Operating systems to use, more available software and run on windows. It does not use • Research Front change the way to use application products, anti-viruses etc. Apart from any ‘live’ boot system unlike Linux. softwares, networking, file sharing, user all these huge number of advantages, You have to purchase the licensed • Articles control, authorization and many more. it has some cons also. For example product and install it with only technical • Innovations in IT An operating system in a computer more hardware requirements due knowledge for installation. Coming on manages all the softwares installed, to installation of anti-viruses and Cost-windows is quite expensive than • Security Corner applications, processes, memory and malware, Lacking security system, Linux. For large deployments, business • Practitioner Workbench hardware. expensive, less portability- cannot be uses, industry work and for desktop • Brain Teaser The most widely used operating used from one platform to another. computing, Microsoft windows is best systems are Microsoft Windows, Linux, Windows is a closed-source operating one to be chosen. • Chapter Reports Mac OS X and iOS, Android. As Windows, system, which means one cannot The different versions of Windows • Student branch reports Linux and Mac OS X are desktop based modify or add any tools or features to that are use, are- Windows 9x family, operating systems, while iOS and the operating system by their own. Windows 2000 family, Windows XP, android are smartphone operating Windows based operating systems are Windows 7, Windows 8, Windows systems. For desktop application less secure than open-source operating 8.1 and current version Windows more than 85% users use Windows as systems due to the reason that later 10. Each version incorporates with major operating system for running ones do not have default administrator distinguishable features. their applications, games etc. After access or root access, whereas Adding Mac OS X as the desktop windows, iOS and Mac OS X have large Windows provide Administration access computing operating system, Mac OS market share among all these. The to all the applications and programs X is going with the latest trends and open-source operating system, Linux downloaded. That’s why, windows is other technologies. It was the first is now widely being used by developers, more unsafe or vulnerable to viruses, successful Graphical User Interface programmers and individuals. worms etc. Security features are also (GUI) before Windows. Putting light on Each operating system come lacking somewhere. Windows is more some features of Mac OS X, we have with their pros and cons. The widely vulnerable to cyber attacks, hacking no viruses unlike windows, better look and most spread operating systems also. Therefore, anti-viruses need to than windows, extensions. Macintosh like Windows, MacOS X and Linux be installed and update from time to OS X is simple, powerful, advance and are quite comparable to each other. time. On the same point, installing more secure than windows. Mac OS www.csi-india.org 22 CSI Communications | FEBRUARY 2017 ARTICLE

X provides its hardware platform for more interesting and customizable in viruses, worms etc. We could have users. It is more user friendly but not his own way. There is less numbers of extensions like one point access for flexible. Being enough powerful, Mac softwares which are available for Linux applications and their tracking, checking OS X command line tools seems to be desktop. While the standard programs apps performance, portability of helpful in administrative tasks. As Mac like searching the web, mail services, applications on different environments. OS X is based on Linux, that’s why Mac editing, printing of documents can also Maintaining backup for all applications OS X is more secure than Windows. be easily done using Linux. is also necessary. Interchanging of data Mac OS X doesn’t provide The current distribution of Linux among different applications needs to portability. It is connected with the operating system is ‘fedora’ which facilitate. Moreover, an operating system machine which it was using. Mac OS X is takes fewer amounts of disk space distinguishes different platforms and the most expensive Operating Systems, and memory as compared to Windows focuses on bright future for innovation. including hardware cost too. A normal and Mac OS X. The open-source nature Every operating system has some user can easily get to know that there is of any operating systems makes it advantages and disadvantages, but no functioning delete key in it. Mac OS user-friendly, customizable and more using which one, this depends on user’s X’s Lion, home network, voiceover, video secure from viruses. Linux is FREE convenience. There is still innovative chat services, Airdrop are nowadays to use that means we can download technology coming in the field of popular among users. and alter it without paying any kind of operating systems. Linux is an Open-source operating charges. Except all these, Linux is still system which means the source code not a complete operating system, it References of the operating system (kernel) can be is just kernel, so additional software • http://www.itpro.co.uk/operating- downloaded, installed, analyzed, modify are needed to be installed. This systems and used for creating applications by corresponds to very few market shares • https://www.conversation.com/ developers. They make changes in among laptop and desktop PCs. Leaving what-to-expect-from-the-next- each new version of Linux operating all its advantages back, Linux is much generation-of-windows-28763 system and update this version as a new better in performance. There are many • https://www.quora.com/Whats- version. Each version in Linux is called other operating systems that are used the-difference-between-Mac-OS- ‘Distribution’. Many new and different at low level among users. Windows-and-Linux distributions can be operated at no cost. About hundreds of Linux versions Conclusion/Future Work • erence.com/technology/computer- have been developed and thousands Among all these, which operating need-operating-system- of developers work upon it. Linux is system has to be chosen? This decision 3c7b0b66db6f2754 more secure than any other operating solely depends on particular user’s • https://www.linkedin.com/pulse/ systems. It provides security by providing choice. All operating systems are comparison-between-windows- enough ‘privileges’ or ‘root’ access to loaded with variety of features. For vs-linux-macintosh-os-dinesh- the users. Another merit is that being gaming, we can use Windows, for bhadane open-source Linux is customizable and programmers and developers Linux and • https://www.reference. has full control under user. Apart from Mac OS X for graphics/video producers. com/technology/computer- its less cost, another feature is ‘live boot But still, there are some requirements need-operating-system- system’, so no technical knowledge or which need to be noted. For example, 3c7b0b66db6f2754 more time is required for installation. dealing with bugs in operating system Any new user will surely find Linux and application softwares, to deal with n

About the Author

Ms. Simran third year Engineering student and Pursuing Bachelors of Technology degree from Chandigarh Group of Colleges, Landran, Mohali. I am interested in publishing papers and articles. My research interest goes in cloud computing, networking, social-work, education for girls and more. In academics also, I am going with good achievements in every field.

23 CSI Communications | FEBRUARY 2017 ARTICLE

The battle for the Best Smartphone OS

S. N. Kakarwal Professor in Department of Computer Science & Engineering of P.E.S. College of Engineering, Aurangabad

Now a day’s rapidly emerging data. System libraries include 2D and Disadvantages of Android OS: technology is wireless mobile phone 3Dgraphics API. SGL is 2D graphics ƒƒ Battery backup is poor since large technology in telecommunication zone. engine and open GL/ES provides 3D number of daemon processes This has great impact on graphics API. System libraries packaged increases the usage of RAM. with Webkit engine for rendering web everyone’s life. Consequently, when we ƒƒ While updating applications some pages in mobile browser. Android wanted to purchase a mobile device we of applications might have bugs run time is rooted with Dalvik Virtual consider two criteria before selecting which can be misused by hackers. a mobile device. Firstly, we study is the Machine (DVM), which gives power to the details of devices such as the appealing applications. The application framework iPhone OS look of the device, its performance, includes android SDK which provides iOS is Apple’s closed (with open hardware details such as camera type, libraries for building applications. At top source components) operating system its pixel resolution, etc. Secondarily, most layer of Android OS architecture is developed for iPhone, but later extended we study the type of mobile operating the User interface layer which provides to support for iPad and Apple TV. It is system used by the device. contacts. Also Widgets are included Unix based OS as iOS root comes from A mobile operating system to truly customize your home screen Mac OS. Latest version of iPhone is is software stack used by mobile to your needs, by presenting live, iPhone 10 released in June 16. continually updating information. devices such as smartphones, tablets, Structural design of iPhone OS laptops to manage their resources and to run applications and programs. User Interface Mobile operating systems example Cocoa Touch • Cover Story includes Apple iOS, Google Android, Application Framework BlackBerry OS, Nokia’s Symbian and • Technical Trends Microsoft’s Windows Phone OS. Media • Research Front In this article, we make assessment Libraries of emerging mobile OS, Android OS and • Articles Core Services iPhone OS and finally compares the Linux Kernel • Innovations in IT recent versions of them, viz., Android • Security Corner 7.0 Nougat with Apple iOS 10. Core OS Fig. 1 : Android OS Architecture • Practitioner Workbench Android OS Android is open source OS which Fig. 2 : iPhone OS Architecture • Brain Teaser isgrounded on Linux kernel designed for Advantages of Android OS: • Chapter Reports mobile devices such as smart phones ƒƒ Easy access for latest public At the bottom most layer of iPhone • Student branch reports and tablet PCs. Android OS is owned by standard like social media sites, OS architecture, there is Core OS Google, Inc. in July 2005 and becomes a Google search engines, etc. layer. The Core OS layer copes with key for Google to jump into the wireless ƒƒ Enables the programmers to make the file handling, low level networking, technology. Latest version of Android is changes in Linux kernel to modify , inter process Android 7 released in October 16. original applications. communication and security Structural design of Android OS management. Core services layer ƒƒ Availability of More than 2.6 million Four layers of Android OS are Linux includes fundamental system services Apps in play store. Kernel, System libraries, Application for apps as well as framework for framework and user interface layer ƒƒ Easy access to best apps from play networking. Media layer incorporates (as in figure 1). At the bottom most store. several frameworks to deal with 2D and 3D graphics, audio, video functionality, layer of Android OS Architecture is the ƒƒ Supports execution of multiple and animations. At the top most is the Linux kernel copes with virtual memory applications concurrently. management, power management Cocoa Touch layer based on Cocoa API and networking management and ƒƒ Supports reliable and enhanced to develop graphical applications and basic communication management. storage of data (using SQLite used by application developer. framework). System libraries integrated with SQLite Advantages of iOS: framework which provides storage of ƒƒ Supports Bluetooth connectivity. ƒƒ Easy access for latest public www.csi-india.org 24 CSI Communications | FEBRUARY 2017 ARTICLE

standard like social media sites, 10 and Android 7.0 Nougat, respectively. Personal Assistants Google search engines, etc. This is major news since most of the ƒƒ In iOS 10, Siri has greatly enhanced. smartphones today either run on ƒƒ Supports for cloud storage. Apart from getting, the personal Android or iOS. assistant enhanced features, ƒƒ Availability of More than 2.2 Some notable features of iOS 10 and it is opened up to third-party millionApps in App Store. Android 7.0 Nougat developers so they can link into ƒƒ Easy access to best apps from App Notifications Siri—making her usefulness grows store. ƒƒ In iOS 10, 3D Touch is immersed, exponentially. permitting to expand notifications ƒƒ Reduces the risk of infection from ƒƒ Siri’s big competitor on Android is malicious software since Apple and initiate quick responses and Google Now. does not allow people to load third- other actions. party programs on the device. ƒƒ Android Nougat’s notifications Though, Apple and Google have now take up more of the screen started with different ways to design ƒƒ Beautifully designed desktop and which, combined with a change of app icons with the fabulous looks their effective and efficient mobile OS, font, provides more information as of Apple devices. iOS 10 and Android Nougat have shown standard. they are gradually uniting. Apple is Disadvantages of iOS: Messaging attempting to close the gap on Google ƒƒ Supports only Apple Hardware. ƒƒ In iOS 10, your messages threads in terms of widgets and third-party ƒƒ Not an open source OS. can be plastered with icons and app, while Google is attempting to animations. More ever, iMessage implement app shortcuts and app ƒƒ Very costly Apps. can implement its own type of notification groupings like Apple.In the Comparative Study of Android OS and third-party apps into it. battle of the OS, the winner will depend iOS ƒƒ Android Nougat came with on your preference. Android is more The table1 depicts the comparison WhatsApp-like messaging app customizable but Apple is more refined table of Android OS and iOS known as Allo to incorporate search in terms of security and system. Apple and Google just released iOS and machine learning technology. n

Table 1 : Comparison of Android OS and iOS

Feature Android OS iPhone OS Developer Google Apple Inc. Model Open Source OS Closed (with open source components) OS File Transfer Easier than iOS. More difficult. Video Chat Google Hangouts and third party apps. FaceTime(Apple devices only) and other third part apps. Widgets Available. Noavailability, except in Notification Center. Internet Browser By default Google Chrome browser. Mobile Safari browser. Voice Commands Google Now. Siri. Maps Google Maps. Apple Maps. By default one available Unavailable. Cloud Services Naive Integration with Google cloud. Naive Integration with icloud. Videos and Photos backup Unlimited back up for video and photos Restricted back up of 5 GB for video and photos backups. backups

About the Author

Dr. S. N. Kakarwal [CSI-F8000602] is presently working as Professor in Department of Computer Science & Engineering of P.E.S. College of Engineering, Aurangabad, MS-India. Her research interests include Image Processing, Pattern Recognition. She has published 13 papers in International Journals, 25 papers in International Conference and 11 papers in National Conferences. She has published two articles in CSI magazine. She can be reached at [email protected]

25 CSI Communications | FEBRUARY 2017 ARTICLE

Operating Systems : Mass transit for the future

R. Gobi Faculty in Computer Applications, National Institute of Technology, Trichy

Operating system has been than an idea or an experiment. The are endless. There will be a time in which changing since every generation or era mobile OS of the future is going to be an people can receive calls on something that we have had so far, and we can implementation of the same. known as a fingertip technology. A expect it to change even more in the In the future, we would not require person would make and receive calls near future to come. Mobile operating a or a desktop as without touching the mobile phone. This systems especially have never failed much as we do today; with the mobile can be done by a click on the wearable to surprise techies with the incredible operating system to arrive. Every task device and the voice signals will be features they provide. In the future, that can be done on a computer will transmitted through the person’s body, approximately in 10 years from now, we be done on the mobile phone. It is so one can listen to the other person, can expect a mobile or a smartphone going to be an integration of Artificial by just keeping the forefinger near his capable of doing the unexpected. A intelligence, networking and connecting or her ear. A microphone fitted to the mobile phone is now considered a part to the society. The hand held devices wearable device would complete the of every human being; every individual will consist of an interface with the user communication so that the person is observed owning a smartphone, in which, the smartphone can detect on the other side of the phone can and some even own more than one. body temperature of the user holding hear you well. It would offer these and The day begins with one checking out the device, and from previously acquired many other features keeping in mind, the notifications early in the morning, data, it would recommend a doctor’s low battery consumption and efficient even before they get off their beds, appointment if it found the temperature usage of the memory. • Cover Story and it ends with the same thing in the was not within the normal limits. The mobile operating system of • Technical Trends night, just before they go to . In The operating system of the mobile the future is going to be a wonderland • Research Front the future, this mobile phone is going device will identify if it is in the wrong in itself. It would offer a plethora of to be more of a personal assistant to a hands, and this it will find out from features. But, simultaneously, it would • Articles particular owner. We are going to see usage statistics, pattern, and an in-built detect over use of the device. With the • Innovations in IT significant innovation from developers polygraph that would detect the user’s increasing amounts of complaints in this space. authenticity. If in any case it identifies from the traditional Luddites and other • Security Corner The operating system of the any suspicious or abnormal use of the rational thinkers who believe that • Practitioner Workbench future would connect every device smart device, it will lock itself which technology is deteriorating people’s the user wants to connect to from could then only be unlocked externally health, it would be taken care of in the • Brain Teaser their mobile phones– starting from by the original user, through a bio operating system. The system would • Chapter Reports personal computers at homes or metric key. lock itself out for a particular amount of • Student branch reports offices, cameras, cars and even the The trend of the future is going to time or keep popping up a notification, home security systems. Everything can be of a wearable device. The mobile where the user of the smartphone is be controlled from any location just by operating system would also consist of expected to do some physical activity, one click on the mobile device. This is a system which connects to a wearable or any other activity which does not something that the current technology device like a watch, so one need not involve use of the mobile phones. is already leading us to. In the years constantly remove their mobile phones Every technology ages; the only thing to come, we can expect the concept of to check for updates. The possibilities that doesn’t get old is connecting with Internet of Things to be a reality more with devices that you wear on your body people. n About the Author

Dr. R Gobi [CSI-1161613] is currently working as Faculty in the Department of Computer Applications, National Institute of Technology, Trichy. His area of specializations are Mobile Computing, Mobile Governance and Internet of Things. He can be reached at [email protected] and [email protected]

www.csi-india.org 26 CSI Communications | FEBRUARY 2017 ARTICLE

RSOS: Reliable and Secure Operating System

Ashutosh Saxena Adjunct Professor CS, Email: [email protected]

Did you recollect when your introduce new bugs. Any modern that is provided correctly, and there is landline phone got hanged, probably operating system contains hundreds an effective way to evaluate or measure you do not remember either it really did or thousands of procedures linked the performance of the software with not happened or you are using smart together as a single binary program respect to the minimum level of service. mobile phone for a long time. Then, running in kernel mode. Any one line Software may be correct even if there did you remember when your elegant from the millions of lines of kernel code is no effective way to demonstrate its smart phone got hanged while you were can overwrite key data structures used correctness; however, trustworthy running few applications? Probably by an unrelated component and crash software must be structured so that last month!!. Let me extend the query: the system which is difficult to detect. testing, auditing, and/or proofs of when was your TV stuck while you were In addition, if a virus or worm manages correctness can be used to achieve a watching favourate show or movie, in to infect one kernel procedure, there reasonable level of confidence in the contrast, how many times your laptop is no way to keep it away from rapidly software. got hanged while you were playing the spreading to others and taking control Security DVD? All are electronics devices with of the whole machine. The challenge in Security goals describe how the processors, several interfaces, I/O developing operating systems security system implements accesses to system ports and an operating system (OS) is to design security mechanisms that resources that satisfy the following: running for you to provide the desired protect process execution and their secrecy, integrity, and availability. A functionality. It is the OS on computers/ generated data in an environment with system access is traditionally stated in smart phones that provides flexibility, such complex interactions. However, terms of which subjects (e.g., processes where you can load, install and execute these mechanisms do not account or and users) can perform which external software, whereas on the TV only partially account for the complexity operations (e.g., read and write) on you may not enjoy that level of freedom, of practical systems. The current state which objects (e.g., files and sockets). reason being a very small with focussed of operating systems security takes Secrecy requirements limit the objects functionality OS is being embedded two forms: (1) constrained systems that individual subjects can read in TV sets which does not fall in prey that can enforce security goals with because objects may contain secrets hands. a high degree of assurance and (2) that not all subjects are permitted to The popular operating systems general-purpose systems that can know. Integrity requirements limit the have two characteristics which makes enforce limited security goals with a objects that subjects can write because them unreliable and insecure 1) they are low to medium degree of assurance. An objects may contain information that very large in size and 2) they have very ideal secure operating system provides other subjects depend on for their poor fault isolation. The Linux kernel security mechanisms that ensure that correct operation. Some subjects has over 2.5 million lines of code and the system’s security goals are enforced may not be trusted to modify those Windows XP is twice more than Linux. A despite the threats faced by the system. objects. Availability requirements study [1] of software reliability conveys Thus the basic security mechanism limit the system resources (e.g., it contains 6-16 bugs per 1000 lines improves the reliability of system storage and CPU) that subjects may of executable code while a different software by protecting it from the most consume because they may exhaust one [2] states that the fault density at obvious source of unreliability; namely, these resources. Much of the focus in 2-75 bugs per 1000 lines of executable user programming errors. secure operating systems is on secrecy code. To be on a conservative end one Reliability and integrity requirements, although can estimate of 6 bugs per 1000 lines Reliable software provides services availability may indirectly impact these of code the Linux kernel probably has that are adequate for the intended goals as well. something like 15,000 bugs, Windows application with respect to being: In general, security provisions has as at least double, not sure mobile usable, correct, and trustworthy. must be as simple and rigid as possible OS for smart phones!! Further, to Usable means that the user in order to minimize the danger make matters worse, typically about receives services that are effective of oversights and of human error. 70% of the operating system consists for his application. Correct means Nevertheless, for security in a computer of device drivers, and they have error that the software meets its functional operating system, the flexibility is rates 3 to 7 times higher than ordinary specifications. If the specifications are desirable for the following reasons: code [3]. It is also true that finding and incomplete, then correct software may (1) System security will be attacked correcting all these bugs is simply not not be usable. Trustworthy means that at its weakest point. It makes little always feasible, and bug fixes frequently there is a minimum level of services sense to build extremely rigorous

27 CSI Communications | FEBRUARY 2017 ARTICLE

security barriers if there is a back of all of the subsystems. Othen, the give away access rights to these files. door into the system that is left subsystem interactions may change Daniel Edwards has given it the very open. precisely when one of the subsystems descriptive name “Trojan Horse” as it (2) A serious danger to security arises fails, thus causing the whole system involves a foreign or gift program that is whenever the need for flexible to crash. It is not feasible to eliminate brought within the walls of a protection protection is underestimated. If all malfunctions from software domain. The gift program can then protection mechanisms are so subsystems. On a case-by-case basis, subvert the security of everything rigid that they prevent efficient careful defensive programming can limit accessible from that protection domain. processing of information, then the the effects of potential malfunctions. A Programmers and systems personnel protection is usually circumvented. more general solution is possible by routinely try out new programs that A single general protection introducing a protection mechanism play games, pictures, or aid in mechanism that is used without which is distinct from the proper design the development of better programs. exception is better than a rigid one and functionality of the subsystems. The most acute danger from the Trojan that has many exceptions. The role of the protection mechanism is Horse problem occurs when someone (3) Flexible and efficient switching precisely to prevent malfunctions from executing with system privileges runs between protection domains makes spreading beyond the subsystem where a program given to him by “a friend”. it more feasible to build redundant they occurred. To achieve the desired This includes support programs such security controls. As long as the protection, almost every procedure as editors, compilers, and library basic protection mechanism itself should be run in protection domain that routines. A user may choose to believe is extremely reliable, redundant gives it access to exactly what it needs that programs supplied with the system security checks incorporated in to accomplish its function and nothing are unlikely to act like a Trojan Horse- software can provide very rigorous more, on the principle of least privilege. -but this should be recognized as a security control. A protection mechanism will not calculated risk. While security and reliability prevent every error from propagating It might seem that the Trojan requirements vary greatly from one outside of the erroneous module. Many Horse problem should be solved by application to another, the protection erroneous results of a module will administrative controls. Systems mechanisms that are built into the appear to be normal results, and the personnel and anyone who has very hardware and basic software of the protection mechanism will have no way sensitive data should never run a of distinguishing these from correct program in their protection environment • Cover Story computer operating system cannot be redesigned to meet the needs of each results. However, with good system unless they trust it. Unfortunately, this • Technical Trends application. Thus it is desirable to have design, erroneous results that look like administrative solution is often not expected results should not cause other practical unless the system makes • Research Front a basic set of protection mechanisms that are versatile enough to meet the modules to behave in unpredictable it easy to run untrusted programs in • Articles requirements of many diverse computer ways. As long as other modules continue a restricted protection environment • Innovations in IT applications. Small protection domains to behave in predictable ways, there is a where they can do little harm. Finding much better chance of finding the origin a reasonable solution to the Trojan • Security Corner are one of the most promising ways to achieve the goal of reliable and secure of the error. The protection mechanism Horse problem is probably the most • Practitioner Workbench operating system in reducing the will guard mostly against the errors that challenging aspect of developing an result from unexpected interactions of adequate set of system security controls. • Brain Teaser complexity of large system. As it is quite that it is far more difficult to build the modules and are usually the hardest Three distinct aspects of the Trojan • Chapter Reports a 50,000 line program than it is to write to trace. Horse problem must be distinguished when a foreign or untrusted program is • Student branch reports 1,000 programs that are each 50 lines Trojan Horse Problem long. This phenomenon leads to rapidly Most access controls only to be run on a system: escalating costs for the development guarantee that one user’s information (1) The foreign program is expected and maintenance of large software is protected from access by other users. to modify sensitive data. In this systems, and it leads to serious Unfortunately, it is often not realistic case the foreign program must reliability problems due to the difficulty for a user to trust all the programs that be thoroughly examined so that it of adequately debugging and testing a execute as part of his own processing. can be trusted. If the program is to large program. Both the reliability and Most users make calls to a large number alter data, then it must be trusted the cost of software could be greatly of service routines and other programs with respect to that data. improved if the complexity of large that the user has not written· himself. (2) The foreign program is expected programs could be kept more in line On most systems, all these routines and to read sensitive data but not with the size of the program. However, programs execute with the full access disclose its contents except to the when a large system is decomposed into privileges of the user. It is possible for calling program. This is called the interacting subsystems, it is important these programs to perform completely confinement problem. It is difficult to have limits on the interaction of the unrelated actions e.g. they may access enough to prevent a program subsystems. These limits should not be any file accessible, by the user, and on from hiding the information in dependent on the proper functioning one or many systems and they can even a file or other form of storage;

www.csi-india.org 28 CSI Communications | FEBRUARY 2017 ARTICLE

however, it is even more difficult to level language, then the correctness along with ever-growing connectivity prevent it from communicating the of the compiler for that language is a and e-commerce over the Internet, information via a covert channel. security concern. application security is an ultimate Covert communications channels Conclusion goal for millions of merchants and can be created by encoding the In an attempt to design OS that is consumers who turn their business information in the program’s reliable and support rigorous security, and service electronic and to the public resource utilization. For example, narrow and short term focus is not world of cyberspace. On the other a program might communicate one advisable. Many security controls might hand, efforts to achieve total security bit to another program by using not be cost-effective if they were not of such systems continue to be based 10 minutes of CPU time if the bit needed to improve the reliability and on the flawed promise that adequate is 1, and only using a fraction of the overall performance, in particular security can be achieved in applications a second if the bit is 0. The other : 1) the complexity of most existing with the current security mechanisms program has to be able to detect or OS make it very difficult to achieve of mainstream operating system [4]. estimate the execution time of the security. To guarantee security OS The reality is that secure applications first program, possibly by simply must be structured so that interactions demand secure operating systems, and observing the performance of the between system modules are more tackling application compromises at system. Much higher data rates clearly defined and closely controlled the OS level by kernel-enforced controls can be achieved by encoding the which will also ensure the reliability should probably be considered as an information in paging rates, disk and may improve the performance. 2) attractive and effective approach. utilization, or in the locking and the protection mechanisms needed for References: unlocking of files. security can also be used to enforce [1] V.R. Basili and B.T. Perricone, ‘‘Software (3) The foreign program is run on s/w modularity. Such modularity would Errors and Complexity: an Empirical behalf of a user who has access to improve the reliability and correctness Investigation,’’ Commun. of the ACM, sensitive data, but the untrusted of the s/w. In particular, debugging . 27, Jan. 1984, pp. 42-52. program is not expected to access and testing would be easier to the [2] T. J. Ostrand and E. J. Weyuker, ‘‘The distribution of faults in a large industrial any sensitive data. This problem that the effects of an error can be confined within the module where software system,’’ Proc. Int’l Symp. on should be easy to solve; however, Software Testing and Analysis, ACM, the error occurs. Since the debugging the solution is difficult to enforce 2002, pp. 55-64. with the protection mechanisms and testing of the account for half [3] A. Chou, J. Yang, B. Chelf, S. Hallem, available on most existing of the project cost these protection and D. Engler, ‘‘An Empirical Study of computer systems. mechanisms amy help in reducing the Operating System Errors,’’ Proc. 18th overall cost. It is an ambitious goal to ACM Symp. On Operating Syst. Prin., If security depends in part on the design an OS that satisfies rigorous ACM, pp. 73-88, 2001. compilers, then the compilers would security requirements, supports [4] P. A. Loscocco, S. D. Smalley, P. A. also have to be validated for security. reliable software and at the same time Muckelbauer, R. C. Taylor, S. J. Turner, While it may be easier to validate a meets the performance, flexibility, and J. F. Farrell, “The Inevitability compiler than to validate an operating sharing, and compatibility requirements of Failure: The Flawed Assumption of Security in Modern Computing system, the validation of several that are needed to make a computer Environments”, Proceedings of the compilers in addition to the validation competitive in the marketplace. 21st National Information Systems of parts of the operating system would Decreasing hardware costs are making Security Conference, pp. 303-314, Oct. make security validation more difficult. If these goals much more feasible. The 1998, http://www.nsa.gov/selinux/doc/ the operating system is written in a high recent demonitarization in the country inevitability.pdf. n

About the Author Ashutosh Saxena is an industry expert and academician with over two decades of experience, 100+ international publications, 30+ filled patents out of which 16 are USPTO granted patents, and a book on PKI: Concept, Design and Deployment (Tata McGraw Hill 2003) to his credit. Has served as a member of the review board for many international journals, conferences and committees. Research interest is in the areas of information security and privacy. Began career as a lecturer and computer engineer in the university and IUC-DAE facilities at Indore Centre. Also worked as faculty at the Institute for Development and Research in Banking Technology (established by RBI), Hyderabad, for eight years, supervised TWO PhD. Worked at Infosys from 2006 – 2016 as AVP, Principal Research Scientist, Infosys Labs, Hyderabad where he lead security research as part of the Security Center of . Membership of Professional Associations: • Life Member of Computer Society of India (membership # 00075062 ) • Life Member of Cryptology Research Society of India • Senior Member of IEEE Computer Society.

29 CSI Communications | FEBRUARY 2017 A REPORT

CSI Nihilent eGovernance Awards 2015-16 GSN Prabhu & K S Vijaya Sekhar Convener’s Team CNEA 2015-16

The Special Interest Group on bring success to the eGovernance initiatives. of thanks and profusely thanked the award eGovernance of Computer Society of India He even recalled his association with the winners for their participation and also (CSI-SIGeGov), successfully conducted the CSI Nihilent eGovernance Awards as one thanked the CSI-2016 OC team for immense 14th edition of CSI Nihilent eGovernance of the recipients of the award earlier and assistance to make the event memorable. Awards (CNEA) ceremony on 24th Jan 2017 complimented the CSI-Nihilent team for ably Prof. Harish P Iyer played an important role in Coimbatore. The awards ceremony sustaining the recognition efforts for 14 long in the awards ceremony and added a special is a culmination of an elaborate awards years. touch as an anchor. process spread over 9 months starting Shri. Surendra Kapoor, Convener, with nominations and ending with awards CSI-SIGeGov welcomed the Chief Guest, presentation to the successful entries. awardees and the invitees and thanked the Sponsored by Nihilent Technologies Ltd, CSI 2016 Organization team for excellent since the year 2002, the awards ceremony support, He also thanked all the nominees for has become integral part of the CSI Annual continued patronage and participation in the Convention. This year’s event took place at CSI Nihilent eGovernance awards process Hotel Le Meridien, Coimbatore. and complemented the award winners. To make the event rewarding, an Shri. Shohel Noor, General Manager at eGovernance track has been included as Nihilent Technologies had this to say, “In its part of the CSI 2016 program. This session 14th year since inception, the Awards assume Chief Guest of the Awards Ceremony - Dr. Ajay was inaugurated by Shri. Sanjay Mohaptra, more significance than ever before, with the Kumar, IAS, Additional Secretary, MeitY, GoI. VP CSI, in the presence of Shri. Rangaswami, intensive focus by the Government on Digital OC Chair CSI 2016, Prof. M N Hoda, India, we anticipate a manifold increase in Chairman Division I-CSI, Shri. Lalit Sawhney, these initiatives in the country in the days Ex President-CSI and Shri. Surendra Kapoor, to come, which makes the CSI Nihilent Convener, CSI-SIGeGov. The first panel eGovernance Awards, all the more relevant discussion was on ‘Digital Transformation– to our growth story. We are indeed proud to Issues and Challenges’ and the second be associated with the awards program”. Mr. session was on ‘eGovernance Initiatives – Anoop Bharadwaj who is coordinating CNEA Emerging Drivers’. The panel sessions were from Nihilent for the past four years also • Cover Story well attended by the award winners and attended the event. Dr. Anirban Basu, President – CSI • Technical Trends accompanying teams. Shri. Lalit Sawhney Dr. Anirban Basu, President-CSI and Shri. Satish Babu, past Presidents of CSI opined that the foot print of participation is • Research Front chaired the sessions. Panelists for both the from all the States and Central Government sessions were Award winners from State and departments. He hoped that CSI would be • Articles Projects category. able to play constructive and complimentary • Innovations in IT The much awaited, Awards ceremony role in bringing ‘Digital Transformation’ in took place in the convention hall. Well the country. • Security Corner attended with over 100 participants A compendium in the form of a • Practitioner Workbench consisting of 40+ awardees teams and other book titled “Leveraging Technology invitees, the entire program has been well Towards Digital Transformation - Selected Releasing Book ‘Leveraging Technology Towards • Brain Teaser received and appreciated for the ambience eGovernance Initiatives” was released along Digital Transformation’ by Chief Guest. and the professional way it got conducted. with a ‘Souvenir’ by the Chief Guest on the CSI-SIGeGov team with Chief Guest and OC Chair, • Chapter Reports The highlight of this year’s ceremony was occasion. The book edited by Prof. G P Sahu CSI-2016. • Student branch reports the august presence of Dr. Ajay Kumar, of MNNIT, Alllahabad; Dr. K S Vijaya Sekhar Additional Secretary, Ministry of Electronics of IIIT Hyderabad and Shri. Prabhu Gollamudi and Information Technology (MeitY), Govt. of CSI-SIGeGov and it consists of 500 pages of India, as Chief Guest, who distributed the of selected nominations showcasing projects awards. across the country. While presenting ‘Convener Report’ The awards were presented by the Chief Shri. GSN Prabhu, Convener CNEA 2016 Guest, assisted by Dr. Anirban Basu, Shri. stated that the Selection Committee has P R Rangaswami, Chair OC, CSI-2016 and received over 180 nominations and that others on the dais. CSI Nihilent eGovernance Awardees 2015-16 identifying the best from the list has been Dr. K S Vijaya Sekhar, presented vote and their teams very tough task but for the able support and participation of the Selection Committee. State Category Award Winners Project Category Award winners The Chief Guest, Dr. Ajay Kumar, IAS Award of Excellence: Rajasthan and Award of Excellence 13 Projects illustrated the importance of Digital India- Telangana Award of Appreciation 11 Projects Skill India-Make in India-Clean India (Di- Award of Recognition Award of Recognition 10 Projects Si-Mi-Ci) and dwelled on the important role [Progressive State]: Odisha Award of Recognition 2 Projects the e-Governance practitioners need to play Award of Recognition (NE States): Nagaland (Sustenance) in sustaining and bringing innovation in whatever they are doing which will drive and More Details are available at www.csinihilent-egovernanceawards.org

www.csi-india.org 30 CSI Communications | FEBRUARY 2017 A REPORT

CSI 2016

The 51st Annual Convention of CSI having put up such a stellar show and The e-Governance Track had was hosted by Coimbatore Chapter and highlighted the importance of culture two panel discussions on “Digital was held on 23rd – 25th January 2017 at in the Indian context and the need for transformation: issues and challenges” Hotel Le Meriden on the theme “DIGITAL integrating technology and culture. The and “e-Governance initiatives-emerging CONNECTIVITY - SOCIAL IMPACT”. The theme talk that followed by the Guest drivers”. The e-Governance awards theme was chosen keeping in mind the of Honour, Mr. S. Premkumar, Vice ceremony was graced by Dr. Ajay Kumar, thrust of the Government of India in Chairman and Managing Director, HCL I.A.S, Additional Secretary, IT, Govt. of ushering a Digital India and ensuring Infosystems Ltd, was well received. He India and had close to 85 participants technology is an enabler in improving spoke at length about how technology from State Government departments the life of every citizen of the country. is an enabler in bringing about social from across the country. He spoke about The convention had the main aim of good. He cited the example of the the thrust of the Government on driving drawing the attention of academicians, recent success of youth in Tamil the digital economy and appreciated professionals, corporate, research Nadu using technology to bring about the efforts of CSI-SIG e-Governance scholars, Government and all stake unprecedented public support for in identifying and recognizing the best holders to the hugely anticipated their cause of “Jallikattu” in a highly projects Pan India. expansion of Digital Connectivity that democratically manner. Mr. Sanjay While 23 high quality peer reviewed could viably impact the economy, Mohapatra, Conference Chair/Vice Springer Paper publications were touch the lives of citizens and enable President CSI and Prof. A K. Nayak presented in one track, a parallel in building societies that are Happy Hon. Secretary CSI also participated in “Research’s Track” was organized Societies to live in. the proceedings. Thereafter Life Time to provide budding researchers an The curtain raiser to the event was Achievement Awards and Fellowship opportunity to present their work a well attended Pre Convention Tutorial Awards of CSI were presented to which was published in the conference conducted at PSG College of Technology eminent persons for their noteworthy souvenir. Other statutory meetings on the 22nd Jan 2017. This had close to contribution. The “Springer Ccis Series including the National Council 300 participants and was inaugurated Proceedings” and the Conference meeting, Regional/Divisional meeting, by Dr. R. Rudramoorthy, Principal, Souvenir were also released. Membership committee meeting and PSG College of Technology who The post lunch session witnessed Auditor’s meeting chaired by Hon highlighted the role played by bodies keynote talks by Mr. Sanjay Podder, Treasurer Mr. R K Vyas were held. like CSI in nation building The tutorial Accenture Labs and Dr. Anupam Basu The evening saw the delegates being was organized in two tracks keeping in from IIT, Kharagpur. This was followed by entertained to a cultural program which mind current trends in both industry an interesting Panel Discussion on the showcased the traditional music, dance and academia., one handling Deep Theme of the Convention moderated by and folk art forms of Tamil Nadu. This Learning & Game Theory while the Mr. S. Mahalingam, Former CFO, TCS was followed by the convention dinner. other was dedicated to Data Science. with Dr. K. Ganapathy, Apollo Hospitals, On the concluding day, speakers Experts from IIT Hyderabad, IIT Madras, Dr. D. B. Phatak, IIT, Mumbai and Ms. from Micosoft, Cisco Systems, Fortinet Hike Messenger handled the highly Nancy Anabel, MSSRF as the panelists. shared their technical expertise with interesting sessions through the day. The day ended with a Think Tank the audience. A Panel Discussion The convention was off to a meeting which was well attended by showcasing few “Successful Startups colourful start on the 23rd morning with Fellows and Execom members. From Coimbatore” was conducted to a lecture by Mr. Anand Ramamoorthy, The sessions on the second day showcase local talent. A well attended Security Inc. The Inaugural which were held in 6 halls which included “Research Conclave” provided followed had a galaxy of delegates lectures, paper presentations and panel researchers an opportunity to listen including CSI Fellows, Past Presidents, discussions. In Three Parallel Tracks, to experts on contemporary trends in leading Industrialists from Coimbatore speakers from leading organizations Computer Sciences Research. among others. Mr. P R Rangaswami, including Deloitte Consulting, Amazon, The Annual General Meeting (AGM) Chair Organizing Committee welcomed, Nokia, TCS, IBM, Adobe, IISc, Vodafone, was also held with good participation by Dr. Anirban Basu, President CSI Tech Mahindra, NICE delivered all members. In the post lunch session, delivered the Presidential address and impactful lectures. Apart from this, an interactive session was held with Dr. S Subramanian, Chair Program interesting PANEL DISCUSSIONS all Student coordinators and Student Committee elaborated the proceedings were held on “How to Leverage the branch counselors to seek their inputs planned. In his inaugural speech Latest IT Solutions to thrive in the and suggestions. The CSI Annual the Chief Guest, Dr. B. K. Krishnaraj Digital Economy” and “Innovation and awards to recognize the contribution Vanavarayar, Chairman, Bharatiya Startups” having panelists from Adobe, of chapters, individuals and institutions Vidhya Bhavan, Coimbatore Kendra, Thoughtworks, HCL, Flipkart, Microsoft, was a well attended affair with over 250 applauded CSI Coimbatore chapter for Mobichip, Infibeam among others. awards presented in various categories.

31 CSI Communications | FEBRUARY 2017 A REPORT

The entire event was attended students. Another highlight of the on a very promising and satisfying note by close to 1000 delegates who had event was that close to 50 students demonstrating to all the technically rich travelled from all parts of the country. selected based on a National Online content that CSI conventions are known The proceedings of all three days were Programming Contest were provided WEBCAST to 12 Colleges who were complementary registration and for and went on to set new standards academic partners thereby reaching hospitality by the organizers, a first by and benchmarks for forthcoming out to a large audience of faculty and any CSI chapter. CSI 2016 concluded conventions.

• Cover Story • Technical Trends • Research Front • Articles • Innovations in IT • Security Corner • Practitioner Workbench • Brain Teaser • Chapter Reports • Student branch reports

www.csi-india.org 32 CSI Communications | FEBRUARY 2017 A REPORT

CSI-IEEE Computer Society Joint Education Award 2016

Papers on Education, Industry linkages, Contributions to Inspirational Teaching, Contributions to Writing Influential Texts, Contributions to Innovative Development of Curriculum or Methodology, and Overall Significance of Contributions to Computer Science & Engineering Education. We honour the eminent academic, Dr. S Thamarai Selvi, as the first recipient—and indeed the first woman recipient—of this award. She is also the First Woman Dean of the prestigious institute the Madras Institute of Technology, the Alma Mater of His Excellency the Late Dr A. P. J The 51st CSI Annual Convention 2016 the CSI and the IEEE CS. Abdul Kalam, the Former President at Coimbatore presented for the first The Award Jury Panel consisted of India. She also received an award time the CSI – IEEE CS Joint Education of Mr. Satish Babu (Fellow - CSI & Award 2016 under the Awards category. Past President) as Chair, and Prof. M from the Chief Minister of Tamil Nadu This award is a co-ordinated effort N Hoda as Vice Chair, supported by for Social Work in Rescue Operation between the IEEE, the IEEE Computer Dr. S S Sane, Dr. Narendra Chaudhari, in Moulivakkam (Chennai) building Society and the Computer Society of Prof. GRC Reddy and Prof. A K Nayak collapse using UAV and Thermal India. The objective of this award is to (Hony. Secretary & Fellow-CSI). Support Imaging Technology during July 2014. recognize educators who have made from the notable academicians is CSI is grateful to Dr. Anirban Basu, significant contributions to computer appreciated. President, CSI, and Mr. Roger U Fujii, science and engineering education. The A total of 44 entries were received President, IEEE Computer Society, award will increase the visibility and from all over India, out of which the for their joint effort between IEEE, the knowledge of both CSI and IEEE CS to panel finalized 8 entries after the IEEE Computer Society and the CSI, for the technical community and public of initial screening. In the final round, making this award a grand success. India and further promote additional the Jury ranked all participants on a We look forward to recognizing more co-operative initiatives and better set of criteria such as Contributions eminent educationists with this award understanding among the members of to Course Materials, Contributions to in the coming years.

MoU with iB Hubs for the benefit of CSI Student Branches

In line with the Start-up India initiative of the Government of India, during the CSI National Convention inaugural at Coimbatore on 23rd January, 2017, CSI has signed an MoU with iB Hubs, a pan-India Start-up and innovation hub for the benefit of the CSI Student branches and students. The MoU exchange was by CSI National President, Dr. Anirban Basu and CEO, iB Hubs, Ms. Radha Alekhya K in the presence of the CSI National Office Bearers, Mr. Sanjay Mahapatra, CSI Vice-President; Prof. A. K. Nayak, CSI Secretary and Mr. R. K. Vyas, Treasurer, CSI. iB Hubs assists young entrepreneurs by providing support in incubation, mentoring, funding and skill development. This collaboration initiated by CSI National Student Coordinator, Prof. Prashant R. Nair will focus on Entrepreneurship & Skill Development for CSI student members. iB Hubs which has start-up hubs in 5 cities plans to expand to 500 centres by 2020. Recently, the CEO of NITI Aayog, Mr. Amitabh Kant launched their hub in New Delhi.

33 CSI Communications | FEBRUARY 2017 A REPORT

CSI Meeting with Myanmar Delegates

day. Office bearers of CSI Hyderabad Chapter, former chair persons of CSI Hyderabad Chapter and members of various SIGs of CSI were gathered to address issues, generate new ideas and approaches as well as chart a road map for India and Myanmar’s ICT space. The Welcome Address & Introduction was given by Dr. Gautam Mahapatra and CSI President Prof. Anirban Basu gave a presentation about CSI and its future directions. Myanmar Delegation Leader also shared his organization’s ideas about ICT development in their country. Then Curtain Raiser for International Summit on Trends & Innovations for The CSI Meeting with Myanmar Delegates was a gathering Next Generation ICT (TINICT)-2017 was held with a grand of all principal stakeholders of CSI Hyderabad chapter, success and finally Expression of Gratitude was given by Mr. K Members of various SIGs of CSI and Members from Computer Mohan Raidu, Vice Chairman, CSI Hyderabad. Federation of Myanmar to brainstorm and seek solutions that The leaders and attendees discussed common ICT policy would benefit the Computer and IT related societies in South related issues, affirm shared values and commit to concerted Asia. The meeting was organized by Dr. Gautam Mahapatra, actions at the national and international level to address Scientist-G, RCI, DRDO, Former Chairman of CSI Hyderabad continuing and new challenges faced in the field of ICT. and Chairman, TINICT-Organizing Committee at DAC centre, CSI deliberated on various avenues for collaboration with RCI Campus, DRDO. Myanmar Computer federation. It was agreed that both the CSI President Dr. Anirban Basu chaired the meeting stake holders will form sub-committees leading to signing of which began at about 12.30 PM and ended by 2.30 PM same MoU between two societies.

• Cover Story • Technical Trends • Research Front Book Title : The class of JAVA • Articles Author : Pravin M. Jain • Innovations in IT ISBN : 978-81-317-5544-0 • Security Corner Price : Not Available • Practitioner Workbench Publisher : Pearson • Brain Teaser As its title implies, this book teaches class in Java Examples in the book teach a wide range of topics, from • Chapter Reports Programming. By now, nearly everyone in the computing simple concepts to high level. The approach taken by the • Student branch reports field knows what Java is: an object-oriented, Internetaware book introduces topics gradually, and makes it easy to pick language with the potential to revolutionize programming. up the skills needed to program in Java. The book is divided into 23 chapters starting with OOPS The book is easy to read and understand by the student introductory to class, community. The book will serve as useful textbook for exceptions, multithreading, networking, GUI – students in computer science, information technology, and MVC, Applets, JDBC, interaction with database, computer applications and students who wish to learn annotations and many more. The Indic characters in object oriented programming using Java. Unicode are one of unique quality in the book. It has a good emphasis on object orientated design; class diagrams are Review by: used extensively throughout the book to make it easy to Dr. Kanhaiya Lal understand how examples work. Working through the book HOD will teach you how to program - not just how to write simple Department of Computer Science & Engineering applets. Birla Institute of Technology Mesra, Patna Campus

www.csi-india.org 34 CSI Communications | FEBRUARY 2017 Life Time Achievement Award Dr. M. L. Goyal

Dr. M. L. Goyal did his B.E. (Hons.) in Electrical Engg. from MREC, Jaipur; M.E. (Distinction) in Electrical Engg. from BITS, Pilani; M.A.Sc. in Computer Science from University of Toronto, Canada; and Ph. D. in Computer Science from Jawaharlal Nehru University, New Delhi.

He Worked in CMC Limited in different Regions, SBUs and functions for more than 31 years (1977-2008). He was associated with the management of software development & implementation, systems support; consultancy, quality & excellence processes, marketing, education & training and General Management. During 1991-93, on deputation from CMC limited, he worked as an Adviser to the Govt. of Mauritius and Head, Central Informatics Bureau at Port Louis. He superannuated from CMC Limited after serving as General Manager at Chennai and New Delhi. While working in CMC Limited, he received several appreciation and special contribution awards. In October 1998, he was given the Outstanding Recognition Award for his significant contribution for the growth of IT Education and Applications & for achieving professional excellence.

After superannuation from CMC Limited, in September 2008, he joined Maharaja Agrasen Institute of Technology, Delhi as its Director and continued up to May 2016. Many innovations were introduced in the working of the institute and the institute grew at a rapid pace during this period. Since, May 2016, he is working as Director General at this institute.

He served the Computer Society of India as its Divisional Chairmen, Honorary Secretary, Vice President, & President. He was a Member of the Executive Council of the South East Asia Regional Computer Confederation (SEARCC) during 1994-96 and the Indian Representative to the International Federation of Information Processing (IFIP) during 1996-98. His contribution to CSI has been very significant. During his CSI President-ship, a Committee was set up to prepare a draft national IT Policy. The Committee brought out a document “INTENT – Information Technology for National Transformation” and the same was released to the press in October, 1995 and presented to the Planning Commission and various Govt. Departments. First time in CSI, 2 National IT Application Awards of Rs. 50,000/- each were instituted in the year 1996. The original CSI logo was expanded by adding to it, the Society’s name, year of its registration and CSI’s motto “Sarve Bhavantu Sukinah”. His association with CSI started in 1973 when he presented a technical paper based on his M.E. thesis at the CSI-73 Annual Convention at Delhi. In September 1998, CSI conferred on him its Fellowship Award.

He was the President – Computer Science Section of the Indian Science Congress Association during 1999 – 2000 and Hon. Treasurer; Chairman, Board of Examination and Council Member of the Institution of Electronics and Telecommunication Engineers (IETE) during 2006-09. He has been the Chairman, Institution of Engineers, Delhi State Centre, during 2013-14.

He served as a member in various Committees formed by the Department of Information Technology, Ministry of Communication and Information Technology, Govt. of India; All India Council of Technical Education, Confederation of Indian Industry, Technology Information and Assessment Council of Department of Science & Technology, National Board of Accreditation and Bureau of Indian Standards. He was also a member of the Governing Council of DOEACC Society during 1994-96.

He is a Fellow of the Institution of Engineers (India) and the Institution of Electronics & Telecommunication Engineers. On the occasion of the 46th Engineers’ Day on September 15, 2013, The Institution of Engineers (India) Delhi State Centre conferred on him the Eminent Engineer Award for his significant contribution to the advancement and application of practice of Engineering in India.

In grateful recognition of his services to the Computer Society of India and his outstanding contribution as an IT professional to IT Industry and Education, CSI has decided to confer on him the Life Time Achievement Award. The Society takes pride and pleasure in presenting him this citation on the occasion of its 51st Annual Convention held at Coimbatore on 23rd January 2017.

www.csi-india.org 35 CSI Communications | FEBRUARY 2017 Life Time Achievement Award

Dr. R. Srinivasan

Dr. R. Srinivasan had contributed extensively for promotion of High quality Research, Computer Education, IT Industry, Resesearch and Computer Society of India.

Dr. Srnivasan is one of the co-founders of the CSI Bangalore Chapter- inaugurated in 1973/74. Seved CSI-BC as Vice Chairman and Chairman. He has been the Regional vice-President for the South, Vice President and President of CSI.

His flagship initiative has been the CSI Karnataka Student Convention in 1987 which is still continuing every year for the last 29 years!!

His lectures on “Success story of Indian Software Industry and the Lesson for Developing Nations”, Beijing, China, in the year 2000 and “ Computer Society of India, its Structure and Activities”, Milan, Italy, in the year 1999 had helped CSI to reach new destinations

Dr. Srinivasan has been a member of the Committee on IT Task Force constituted by the then Prime Minister of India, Shri Atal Bihari Vajpayee and contributed for developing new strategies

He has introduced Video lecture programs in CSI from eminent personalities including Sir Arthur C. Clark.

Dr. Srinivasan served as a Scientist in National Aerospace laboratories for 35 years. He played a major role in the accession and establishment of NAL Computer Centre housing a mainframe UNIVAC 1100-H1 Computer.

Dr. Srinivasan has been in the Committee Chaired by Dr. Abdul Kalam for the design and development of parallel computer in DRDO. He has been a member of the Expert Committee to procure computers for ADA, Bangalore and SERC, Ghaziabad.

Dr. Srinivasan has worked in IT Industry for about 8 years; as CTO in Tata Elxsi, in BFL Software, and as CTO in iCMG, Bangalore.

Dr. Srinivasan has been a very good teacher and a researcher. He at the age of 78 now, he is working as Emeritus Professor in M. S. Ramiah Institute of Technology, Banglaore. He has produced 8 Ph.D’s and published 27 papers in the last four years - has guided more than 100 BE and M.Tech projects.

In grateful recognition of his services to the Computer Society of India and his outstanding contribution as an IT professional to IT Industry and Education, CSI has decided to confer on him the Life Time Achievement Award. The Society takes pride and pleasure in presenting him this citation on the occasion of its 51st Annual Convention held at Coimbatore on 23rd January 2017.

Dr. D. D. Sarma

Dr. Dhavala Dattatreya Sarma, born to Venkataratmma and Jagannadha Sastry earned his Graduation, Masters level Degrees in Arts and Sciences and Ph.D from Andhra University

Dr. Sarma was Chief Scientist (Scientist G) at National Geophysical Research Institute (Council of Scientific and Industrial Research, India) and extensively worked on Stochastic and Computer Modeling. Dr. Sarma

36 CSI Communications | FEBRUARY 2017 Life Time Achievement Award was a Post Doctoral Research Associate at the University of Georgia (USA). He had received intensive training in Computer Methods and signal processing at IIT-K and University of Roorkee, Roorkee (U.P-India). He had received intensive training in Computer Methods and Operations Research at the Imperial College of Science & Technology (London) and the University of Leeds, Leeds, U.K. He was a visiting Scientist at the world famous Centre de Geostatique, Fontainebleau, France. Presently, he is working as Professor and Director, Guru Nanak Institutions Technical Campus, Hyderabad,

Dr. Sarma has promoted research and produced several Ph.D. Holderrs. He had published over seventy five research papers and Three books He has organized a number of national and international conferences on various aspects of computers, e-learning and entrepreneurship education. Over the years, he has held leadership positions in various high profile scientific/educational institutions. . Among others, Dr. Sarma is a Fellow, Computer Society of India, Fellow, A.P. Akademi of Sciences, Fellow, Telangana Academy of Sciences, Indian Society for Probability and Statistics, Fellow Geological Society of India. He was Regional Respresentative for Asia of the International Geostatistics Association (France) from 1992 - 2000. He is presently the Chairman IT & CSE Section of A.P. Akademi of Sciences.

Dr. Sarma became member of CSI in 1968 and was associated with the Regd. Office of CSI, Hyderabad since its formation He was Regional Representative of CSI during 1979- 83 and organized Four regional conferences. He was member, Publication Committee of CSI from 1996 -1998 and during 2004. Dr. Sarma had served as Chairman, CSI Hyderabad Chapter from 1986-88, Chairman, Finance Committee of CSI- 95 held at Hyderabad (1995), Chairman Div. VIII (Micro Computers), during 1994-1998. He was member, awards committee of CSI during 1998 and 2004 and member, Publication Committee of CSI from 1996 -1998 and during 2004. As Divisional Chairman he organized a number of workshops and conferences on various aspects of computer methods and modeling.

He was Regional Academic Auditor for Aptech for their NCC-Aptech Educational Programme for a number of years. Dr. Sarma is the Editor, International Journal of Computer Science and Engineering being brought by Guru Nanak Institutions.

In grateful recognition of his services to the Computer Society of India and his outstanding contribution as an IT professional to IT Industry and Education, CSI has decided to confer on him the Life Time Achievement Award. The Society takes pride and pleasure in presenting him this citation on the occasion of its 51st Annual Convention held at Coimbatore on 23rd January 2017.

Mr. G. Ramachandran

Mr. G. Ramachandran obtained M.Sc degree in Mathematics from Madras University and M.Stat from Indian Statistical Institute, Kolkata. He is a member of Computer Society of India from 1965 and currently a Fellow life member.

Mr. G. Ramachandran has made outstanding contribution in the field of Information Technology for Indian Industry for more than five decades. He has developed and implemented more than 150 Information Technology Projects, covering many domains. He has developed Strategic Plan for computerisation for many enterprises. He was a member of the group constituted to have an appraisal of EDP facilities available in Public Sector Undertakings under the ministry of Heavy Engineering Industries. He was a pioneer in introducing bar codes for retail stores billing. He has worked with both Public and Private enterprises. As an entrepreneur he has set up two companies, one on software development and the other on software training. He has represented our country and presented

www.csi-india.org 37 CSI Communications | FEBRUARY 2017 Life Time Achievement Award country paper in Asian Productivity Council, Tokyo and Computer Conferences at Singapore, Hong Kong and Tokyo. He has trained more than 400 Information Technology professionals, who are now contributing for the advancement of Indian Information Technology Industries. He was a member of the first MCA Syllabus committee of the Madras University.

Mr. G. Ramachandran was committed and his contribution to Computer Society of India is outstanding. He played a major role in acquiring own premises for many chapters. He has organised many national and international conferences on behalf of Computer Society of India. He was the convener of the first National Students Convention of Computer Society of India and the first DOEACC Chairman. He was a member of the group constituted to start the Education Directorate at Chennai. He started the Visakhapatnam Chapter and held various positions in CSI Executive Committee as Regional Vice President (South), Honorary Secretary, Past Secretary and Vice President.

Mr. G. Ramachandran excelled in the sports field also. He was a member of the Madras University, Madras State, West Bengal State Basket Ball team. He captained West Bengal State Basket Ball team and was selected to represent Indian Basket Ball team.

In grateful recognition of his services to Computer Society of India, Information Technology Industry and Society, Computer Society of India is pleased to confer on Mr. G. Ramachandran Life Time Achievement Award. The Society takes pride and pleasure in recognising him with this citation on the occasion of the 51st Annual Convention held at Coimbatore on 23rd January 2017.

Prof. U. K. Singh

Prof. Uttam Kumar Singh, Founder Director General of Indian Institute of Business Management & Dr. Zakir Husain Institute, Patna completed B.Sc. and MBA (MIS) from Bihar University, Muzaffarpur in 1972 & 1974 and further obtained PhD, Master of Public Administration (MPA) and BNYS Degree. After completion of academic pursuits, Prof. Singh entered into Institution Building and established several technical and vocational Institutes of national repute at Patna, Ranchi, New Delhi, Kolkata, Pune, Bhubaneswar including two universities in Nagaland and Arunachal Pradesh. Since the Year 1979, Prof. U. K. Singh, initiated Computers & IT Education in the State of Bihar & Jharkhand. He is the first academician to start P. G. Diploma in Computer Applications, BIT, MIT, BCA & MCA in undivided Bihar and Jharkhand. As a pioneer personality in the areas of Computers & IT Education in India. Prof. Singh was instrumental in initiating computer science for Women, School Teachers and Govt. officials in 1984 with financial support from Department of Electronics, Govt. of India under IT Awareness Programme (ITAP). Under his guidance, Govt. of India established the National Centre for IT Instructional Materials Development, National Centre for Research and Training for Professionals and Administrators with funding from Govt. of India, Department of Electronics, Prof. Singh introduced Computer Aided Education in Non-formal Education in the Year 1985.

Prof. U. K. Singh is Fellow of Computer Society of India and was Founder Vice Chairman of CSI, Patna Chapter. Later, he served CSI as Chairman, CSI Patna Chapter, Divisional Chairman (Data Communication), Regional Vice President (East), twice member of Nominations Committee at National Level. He was nominated as TC Member (Education) to the International Federation of Information Processing (IFIP) Vienna, Austria. He activity organized various Regional, Divisional and National Conferences at various locations in India. CSI conferred Fellowship on Prof. U. K. Singh during 2011 for his contributions on the objectives of CSI.

Prof. Singh was also elected President of Computer & IT section of 100th Indian Science Congress. As prolific writer on Computers & IT, Prof. Singh has published several Books and Articles. Prof. Singh is also associated with Institution of Electronics & Tele-Communication Engineers, All India Management Association, Indian Society for

38 CSI Communications | FEBRUARY 2017 Life Time Achievement Award

Technical Education, Indian Commerce Association and also Executive Member of All India Council for Technical Education (AICTE) for five years. Presently, Prof. Singh has been nominated TC Member (Education) to IFIP, Austria by CSI.

In grateful recognition of his services to the Computer Society of India and his outstanding contribution as an IT professional to IT Industry and Education, CSI has decided to confer on him the Life Time Achievement Award. The Society takes pride and pleasure in presenting him this citation on the occasion of its 51st Annual Convention held at Coimbatore on 23rd January 2017

Honorary Fellowship Award

Dr. Thangam Meganathan

Dr. Thangam Meganathan is the Chairperson of the Rajalakshmi Educational Trust based out of Chennai. She has close to 20 years of experience in the field of Educational Administration.

Dr. Thangam Meganathan completed her Graduate and Post Graduate degrees in Public Administration from the Madras Christian College, Chennai. She obtained her Doctorate from Madras University for her research work on Technical Education in Tamil Nadu. She also holds an International Diploma for Teachers and Trainers offered by Cambridge.

As Chairperson of the Rajalakshmi Group of Institutions, she is primarily responsible for providing vision and strategy for all the educational Institutions run by the Trust. Under her transformational leadership, the Institutions have emerged as some of the best Institutions in the country offering high quality Technical Education.

Dr. Thangam Meganathan has provided an inspirational vision to the group which has put the Institutions on a high growth trajectory. She has also set herself as a role model for high performance and encourages the same from all the faculty members and staff. As a strong believer in Quality, she has ensured that Quality is a culture inside the Institutions run by the Trust.

Dr. Thangam Meganathan strongly believes that Innovation is a key change agent that can bring about transformation in the lives of young students. She has also been responsible for the implementation of several path breaking innovative practices.

She has worked closely with the Computer Society of India to help CSI improve the programming & problem solving skills of young students. Through her erudite inputs and sponsorship, CSI had organized programming contests for school children at the regional, National and International levels.

Dr. Thangam Meganathan has also been serving as a Member of the CII Tamil Nadu Education Panel for the past four years and headed the CII Tamil Nadu Education Panel for 2 continuous terms. She is presently a member in the CII- Southern Region Education Subcommittee. She is also a part of the national initiative of CII in Primary Education responsible for policy advocacy. Besides these, she has served in several other committees of CII and ASSOCHAM and was instrumental in organizing several high impact conferences.

She also serves as a Member of the Bouncing Board Initiative of the CII Panel on ‘Women Empowerment and Leadership’ through the Indian Women Network (IWN). She has been the Vice Chairperson of this initiative in the

www.csi-india.org 39 CSI Communications | FEBRUARY 2017 Honorary Fellowship Award year 2014-15 and spearheaded several initiatives for women welfare. She is also actively involved in initiatives to bring awareness about the Indian tradition and culture among the youth pursuing school and higher education.

In a nutshell, Dr. Thangam through her thoughtfulness and actions has left an indelible impact on students and the youth at large.

In recognition of her outstanding accomplishments and memorable services to the Computer Society of India and academia, CSI is pleased to confer upon Dr. Thangam Meganathan the HONORARY FELLOW of the society award. The Computer Society of India takes pride and pleasure in presenting this citation to Dr. Thangam Meganthan on the occasion of its 51st Annual Convention held at Coimbatore on 23rd January 2017.

Mr. Koneru Satyanarayana Er Koneru Satyanarayana, President of Koneru Lakshmaiah Education Foundation is an educationist of eminence, philanthropist and an industrialist of great repute. He co-founded Koneru Lakshmaiah College of Engineering (KLCE) in 1980. KLCE was the first private engineering college in AP to introduce Computer Science and Engineering (CSE) and Information Science & Technology (IST) courses foreseeing its requirement for the nation immense potential of providing challenging and lucrative jobs. KLCE has the unique distinction of becoming the No. 1 private engineering institution as evidenced by the NAAC rating of 3.76 in 4.0 scale in all India basis under his leadership. He was instrumental in transforming the institution to attain Deemed to be University status in 2009, which is now academic heaven for 12000 UG/PG students and 1400 Phd scholars supported by 800 teaching faculty out of which 300 are doctorates. The University is offering 42 academic programs as on date with an intake of 3500. The intrinsic strength of both KLCE and KLU is excellent human resource generation reflecting in 100% placement during the past one decade. So far KLCE and KLU have provided employment to about 36000 students in reputed Industries. Number of students has become entrepreneurs. Born on 20th October 1954 to Sri Koneru Lakshmaiah and Smt. Chittemma, he graduated in Electronics and Communication Engineering from BMS College of Engineering, Bangalore in 1977. He has distinctive prestigious fellowships & memberships like FIE, FIETE, MIEEE and CII. Mr.Satyanarayana put his heart and soul to make KLU as gem of institutions by encouraging and implementing many innovations and best practices in learning. He ensured that the institution develops research environment to enable the teaching faculty to strive and secure doctorates and transfer the technology to the society. He is the positive influence behind the University in accomplishing an enviable feat of being ranked 59th in the country and No.1 in Andhra Pradesh State as certified by NIRF, MHRD. His discipline, honesty and integrity in managing the institution made KLU become the most sought after technical institution in the State of Andhra Pradesh. He is not only a champion of education but also nurtures education by granting substantial sums towards scholarships for the underprivileged students. Some of the beneficiaries of his generous donations include the UNICEF, Leper patients at leprosy home at Pudukottai, Tamil Nadu, Aadarana, an NGO based in the backward region of Mangalagiri helping the poor people in health and education. Computer Society of India (CSI) has been inextricably entwined with K L University with his passion to meet the objectives of CSI. Sri Koneru Satyanarayana became the founder chairman of the Koneru Chapter of CSI (2003) and initiated several programs for the society at large. Promoted CSI Student branches in Andhra Pradesh and to carry out the professional development of students and teachers by sponsoring and arranging related CSI events. Encouraged School Children with CSI-FUN Quiz programs by sponsoring them in the combined Andhra Pradesh since 2011 on wards through CSI-K L University Student Branch. Mr. Satyanarayana established 15 different companies, which are spread across different sectors that include Aqua, Transport, IT, Real Estate, Hospitality, Estate Management and Film Industry. As a strong practitioner and advocate of human values and professional ethics, Mr. Satyanarayana ensured that Human Values is included on KLU’s undergraduate curriculum as a compulsory course for all students to help them imbibe and reflect values in everything they do. Today, human values are the

40 CSI Communications | FEBRUARY 2017 Honorary Fellowship Award hallmark of both KLU’s education and work culture. Mr. Satyanarayana is an ardent champion of social service and rural uplift. He has been serving the society by adopting neighboring villages. Recently, he initiated the program of converting 8 villages as smart villages. He ensured that the roads of the surrounding village are improved by granting copious donations. Many surrounding villages were adopted for improving their sanitation hygiene. Hon’ble Prime Minister Narendra Modi’s Swacha Bharat campaign was taken up by Er. Koneru Satyanarayana in rural Andhra Pradesh. He sponsored and arranged regular DIGITAL literacy programs for the society at large and initiated Skill Development Programs for establishing different professions and sectors. Under his stewardship in recently concluded Krishna Pushkaralu, KLU gave technology support to Government of AP. KLU has sponsored and conducted several training programs on e-governance for AP Government Officials, Ministers and Policy makers. In grateful recognition for his outstanding services to engineering education, IT Industry and society at large CSI has great pleasure to confer him the HONORARY FELLOW of the society. The Computer Society of India takes pride and pleasure in presenting this citation to Er. Koneru Satyanarayana on the occasion of its 51st Annual Convention held at Coimbatore on 23rd January 2017.

Fellowship Award Dr. R Nadarajan

Dr. R Nadarajan, an accomplished teacher with great vision and hard work earned recognition from students, parents, academicians and IT industry executives for introducing Three FIVE YEAR integrated Masters programme in Software Engineering, Theoretical Computer Science and Data Science. Right from the inception of the Software Engineering programme in 1997 at PSG College of Technology, where he is a Professor in the Department of Applied Mathematics and Computational Sciences, the value of these programmes with the industry has only grown in geometric proportions and his students have been placed in enviable positions. “Teaching is Reaching” is the DNA of Professor Nadarajan and he is widely esteemed by students for his inspirational teaching which led students to understand the inter-connectedness of ideas, facts and skills from areas of knowledge perceived as independent. Dr. R Nadarajan has guided 25 Ph.D scholars and has published around 60 research papers in International journals. Besides receiving research funding from several Government funding agencies, he has set up a Centre for Excellence in Software Engineering funded by TCS. He has organized 6 International conferences on Mathematical and Computational models by bringing distinguished speakers from top notch institutions and industries. He has contributed significantly for the automation of the entire administration functions of PSG College of Technology. His association with CSI spans more than three decades since BIG 86. He has held several positions in the Coimbatore chapter and as National ExecCom member. He has given many lectures in many CSI chapters and student branches about research and innovation for students and faculty. In grateful recognition of his services to Computer Society of India, and his outstanding accomplishment as an IT professional, the CSI has decided to name him FELLOW of the society. The society takes pride and pleasure in presenting him with citation on the occasion of its 51st Annual Convention held at Coimbatore on 23rd January 2017.

www.csi-india.org 41 CSI Communications | FEBRUARY 2017 Fellowship Award

Prof. P. S. Grover

Professor P. S. Grover had obtained his Masters and Doctorate from Delhi University and started his teaching & research career in the same university. Dr. Grover was In-charge of the first IBM 1620 Computer System and later became Director of IBM 360 Computer Centre, at Delhi University. He has been among the founding members of Computer Science Department at Delhi University and for starting MCA & Ph.D. Programmes in C.Sc.. He has been Adviser, Consultant and member of academic bodies and research boards for several institutes in North India. Prof. Grover has been associated with UGC, AICTE, MICT, DOEACC, NIELIT, CBSE, National Board of Accreditation, National Assessment and Accreditation (NAAC) and contributing to the advancement and spread of computer science and engineering education. He had won Nehru Memorial Award and was Post-doctoral Fellow at Bristol University, England, Research Associate at National Research Council, Canada and ICTP, Italy. He has been a Visiting Scientist at many prestigious institutes/universities in UK, Canada, USA, Singapore, Malaysia, Nepal, Iraq, and Kuwait and delivered invited talks/seminars. Prof. Grover served Computer Society of India as Chairman of Delhi Chapter, Divisional Chairman (twice), National Vice President (twice), Member – Nomination and Awards Committee, and represented CSI in IFIP and SEARCC Forums. He was invited to be Editor of Special Edition of CSI Journal on ‘Software Engineering’. He is on the Editorial Boards of International Journals and Reviewer of prestigious Conferences. He was Chairman – Computer Science and Communications, Indian Science Congress. He has been a consultant and associated with IT Industries which include TCS, IIS Infotech, DCM Technologies.

He has been an active researcher, guide, teacher and author – written 9 books in the field of computer science and published over 150 research papers. He has promoted in developing new institutions and has contributed to the setting-up of new universities/engineering institutes and entrepreneurial campuses. Prof. Grover is deeply involved in improving the quality of higher education by implementing and spreading modern teaching/ learning processes/practices.

In grateful recognition of his services to Computer Society of India, and his outstanding accomplishment as an IT professional, the CSI has decided to name him FELLOW of the society. The society takes pride and pleasure in presenting him with citation on the occasion of its 51st Annual Convention held at Coimbatore on 23rd January 2017.

Dr. P. K. Sinha

Dr. Pradeep Kumar Sinha, an engineer turned academician, is the Vice Chancellor & Director of International Institute of Information Technology (IIIT), Naya Raipur. Earlier he was with the Centre for Development of Advanced Computing (C-DAC).

Technical contributions of Dr. Sinha include national projects, supercomputing systems and facilities, healthcare products and solutions, international patents, a number of technical papers and six books in the area of Computer Science & Engineering. On public demand, books authored by him have been translated in local languages like Japanese and Hindi.

42 CSI Communications | FEBRUARY 2017 Fellowship Award

Dr. Sinha was instrumental in commissioning the first national super computing facility at C-DAC in 1998 and led C-DAC team to design and engineer the facility. Under his leadership, his team developed models, mechanisms and policies for usage, remote access, security, and round-the-clock operation of such facilities to enable offering of super computing services to the users. With the capabilities developed, his team also commissioned many such facilities in several academic and research institutions. Super computing systems being a powerful tool for high-end R&D in all domains of science and engineering, these initiatives helped several researchers from various disciplines to carry out their research more efficiently and effectively.

Dr. Sinha also led C-DAC’s team in designing and commissioning the PARAM Yuva II supercomputer in 2013, which ranked 69th among the world’s Top 500 Supercomputers in June 2013 list. The system ranked 44th in the world, 9th in Asia Pacific and Number One in India as per the November 2013 list of world’s Green 500 supercomputers.

Recognizing Dr. Sinha’s expertise in supercomputing, Government of India selected him in 2013 as a member of a committee of four scientists from the Department of Science & Technology (DST) and the Department of Electronics and information Technology (DeitY) to prepare a project proposal for the Next Generation Supercomputing activities of India. The National Supercomputing Mission (NSM) proposal finalized by the committee was subsequently approved by the Cabinet Committee on Economic Affairs in 2014. The proposal, having an outlay of 4500/- Crores, forms the basis of uplifting Indian Science & Engineering research to a much higher level than now.

He is bestowed with ACM Distinguished Engineer for his significant accomplishments in the field of computing and its impact thereon. The Institute of Electrical and Electronics Engineers (IEEE), USA named him IEEE Fellow, for his demonstrated leadership in Distributed and Parallel Processing systems.

In grateful recognition of Dr. Pradeep Kumar Sinha’s significant contributions to the area of Computer Science and Engineering at National and International levels, the Computer Society of India is proud to name him a FELLOW of the Society. The Society is pleased to present him with this citation on the occasion of its 51st Annual Convention held at Coimbatore on 23rd January 2017.

Prof. P. S. Avadhani

Prof. P. S. Avadhani, obtained his M.Tech (Computer Science), Ph.D from IIT, Kanpur and F.I.E. from the Institute of Engineers (India) in 2014. He has more than 30 years of teaching and research experience.

Prof. P. S. Avadhani presently serving as the Principal, AU College of Engineering (Autonomous), Andhra University, held number of Offices in various capacities viz., honorary member and Life Member in several National and International Bodies, Vice-Chairman, Computer Society of India (2014-15), Chairman, Computer Society of India (2015-16) Chairman Board of Studies of number of Institutions, Convener, APEPDCL Test-2014 -2015 etc. to name a few. His extensive relations with Industry and entrepreneurs helped the Institution in placing number of young Techies into jobs.

www.csi-india.org 43 CSI Communications | FEBRUARY 2017 Fellowship Award

He has commendable knowledge in Sanskrit, Hindi, English and Telugu and a notable poet and orator. Prof. Avadhani has been honored with Best Researcher Award from Andhra University in 2005-06 and State Best Teacher from the government of Andhra Pradesh in 2015, Chapter Patron Award from Computer Society of India and distinguished Academician Award-2011 from Pentagan Research Centre, Hyderabad.

Prof. P. S. Avadhani authored Books on Data Structures, Data Management Systems, Discrete Mathematical Structures and Computer Graphics etc., Prof. Avadhani authored and co-authored more than 200 research papers/Articles.

In grateful recognition of his services to Computer Society of India, and his outstanding accomplishment as an IT professional, the CSI has decided to name him FELLOW of the society. The society takes pride and pleasure in presenting him with citation on the occasion of its 51st Annual Convention held at Coimbatore on 23rd January 2017.

Prof. C. T. Bhunia

Professor Chandan Tilak Bhunia is immediate past Director of National Institute of Technology (An institute of National Importance), Arunachal Pradesh. He completed his five years tenure on 31st October, 2016. Prof. Bhunia has about 31 years teaching and research experience at UG and PG level. He published more than 150 peer reviewed research papers in journals and guided 12 Ph D scholars. He authored 6 books including books on Information Technology and Quantum Computing. He widely visited foreign countries including USA, UK, Italy, Bhutan, Bangladesh, Singapore, China, Jordan on several academic assignments. He has been BOYSCAST FELLOW of DST, Govt of India at Durham University, UK; Senior Associate at ICTP, Italy and Visiting Consultant Professor at CST, Royal University of Bhutan.

Professor Bhunia has been a member of CSI since 1987. He established for the first time in whole of North Eastern Regional a Students chapter of CSI in North Eastern Regional Institute of Science and Technology, Arunachal Pradesh. This student branch was awarded twice the best eastern regional award in 1995 and 1996. He further established such chapters in many institute like Haldia Institute of Technology, Heritage Institute of Technology, Bengal Institute of Technology & Management etc. He enriched CSI communication by publishing more than 50 articles for which he was awarded twice best article awards in 1996. He also published several research papers in Informatics. He delivered several invited talks at CSI sponsored conferences and also organized several such conferences.

In grateful recognition of his services to the Computer Society of India, and his outstanding accomplishment as an IT professional, the CSI has decided to name him FELLOW of the society. The society takes pride and pleasure in presenting him with citation on the occasion of its 51st Annual Convention held at Coimbatore on 23rd January 2017.

44 CSI Communications | FEBRUARY 2017 Fellowship Award

Mr. M. L. Ravi

An innovative leader and the youngest president of CSI, Mr. M L Ravi holds a Bachelor of Engineering degree in Electronics and Communication from the University of Mysore and a Diploma in Management from the All India Management Association (AIMA), New Delhi. He has over three decades of experience in the computer and allied industry.

Mr. Ravi has been a member of the CSI since 1983 and is currently a life member. He has served as Treasurer, Secretary and Chairman of CSI Bangalore chapter during the years 1990-91, 1996-98 and 1998-00 respectively. He has contributed as an active core member of the organising committee in ‘CSI-1996’ and event manager of “CSI-2002” held in Bangalore. During his tenure in the management committee at the Bangalore Chapter, he organised a Top Management workshop on ERP, which was the first of its kind in India.

He played a stellar role in helping the CSI form new chapters in various parts of the country and focussed on improving its governance at the strategic level. As Vice-President in 2003-04 and President in 2004-05, he was instrumental in driving new initiatives by conducting workshops, seminars and conferences on rural development, faculty standards and student development programmes, resource mobilisation and sprucing up the Educational Directorate at Chennai. He galvanised the student community by actively engaging with engineering colleges and technical institutions across the country. He positioned CSI positively as a pro-active interface between academia, industry and Government.

Mr. Ravi was the Key Note Speaker at SEARCC, 2004 held at Kuala lumpur, Malaysia. He served on the consultative committee of CICC, Ministry of Export, Trade and Industry, Govt. of Japan on Human Resources and RFID technology from 2005 to 2007. He was an invited speaker at their conferences held in Cebu, Phillipines in 2005 and at Tokyo, Japan in 2006.

After having worked in the IT industry with Wipro Information Technology Ltd., Digitron Computers and Sunray Computers, he founded the Innovative Consulting Group (a division of Innovative Homes Pvt. Ltd.) in 1990, which was a true-blue ‘Startup’ of the pre-liberalisation era. The company showcased how IT can be leveraged in the fields of town planning, architecture, 3D animation and imaging. He was also actively involved in the project of preparing the photo-identity cards for the Election Commission of India.

Currently he mentors young entrepreneurs in areas of corporate planning and management and has keen interest in sports, travel and spirituality.

In grateful recognition of his services to Computer Society of India, and his outstanding accomplishment as an IT professional, the CSI has decided to name him FELLOW of the society. The society takes pride and pleasure in presenting him with citation on the occasion of its 51st Annual Convention held at Coimbatore on 23rd January 2017.

www.csi-india.org 45 CSI Communications | FEBRUARY 2017 Brain Teaser

Durgesh Kumar Mishra CrossWord Chairman CSI Division IV Communications Professor (CSE) and Director Microsoft Innovation Center, Sri Aurobindo Institute of Technology, Indore. Email – [email protected] Test your knowledge on Operating System Solution to the crossword with name of first all correct solution provider(s) will appear in the next issue. Send your answer to CSI Communications at email address [email protected] and cc to [email protected] with subject: Crossword Solution – CSIC February 2017 Issue.

1 Clues 2 3 Across 4. A small program for a particular device 4 6. An active program 7. Part of OS to manage resources 8. The process of loading OS 10. An OS for mobile 5 Down 6 1. A command line interface 2. The main circuit board of the computer 3. A variant of UNIX operating system 4. An automatically running program in the 7 background 5. Basic unit of communication on the network 8. A program installed on the computer to 8 start OS

• Cover Story 9 9. A state when the system does not respond to keyboard commands • Technical Trends 10 • Research Front Solution for January 2017 Crossword • Articles 1 2 A P • Innovations in IT 3 4 P R O T O C O L s

5 • Security Corner L I S P R n 6 • Practitioner Workbench T G i 7 We are overwhelmed by the response and solutions received from our h A A f

8 • Brain Teaser enthusiastic readers a p p L e T f • Chapter Reports d E e 9 10 11 t c o i n A f e r • Student branch reports b i W n o A

12 Congratulations! t s p a m Y All nearby Correct answers to January 2017 month’s crossword r 13 received from the following reader: a c t i v e x n

• Ms. Priyanshu Jadon, M.Tech., Sri Vishnav Vidhya Peeth, Indore e • Mr. Alok Tiwari, DAVV, Indore t

www.csi-india.org 46 CSI Communications | FEBRUARY 2017 Trends and Innovations for Next Gen ICT (TINICT)- International Summit 2017 Saturday March 4th, 2017 Hotel Novotel Airport , Hyderabad

Organized by CSI Hyderabad http://csihyderabad.org/ in collaboration with RCI(DRDO) Be in touch with us Welcome to TINICT-2017 ! Chief Guest This International Summit "Trends and Innovations for Next Gen ICT (TINICT)" intends to provide a forum to exchange ideas among Sri K.T. Rama Rao interested researchers, scientists, developers and practitioners in the areas Minister of Information Technology, of computing, communications and informatics. Government of Telangana The role of Information and Communication Technologies (ICT) as a tool for development and transparency has attracted the sustained Guest of Honour: attention of the entire world over recent years. ICT comprises a complex and heterogeneous set of goods, applications and services used to Dr. G. Satheesh Reddy Distinguished produce, process, distribute and transform information. Scientist, Scientific Adviser to Raksha Mantri The potential of ICT for stimulating economic growth, socioeconomic (SA to ) and Director General, Missiles development and effective governance is well recognized. But the benefits and Strategic system. of ICT have been unevenly distributed within and between countries. India has now gradually emerged as able participant in the workforce and have even advanced to hold important roles and positions. So there are strong needs to identify and recognize the trends and innovations of ICT for empowering our Nation. This initiative will mobilize all the stakeholders to focus on frontiers of ICT for the benefit of the entire society to bring the digital revolution leading to IT enablement of our Country. In this summit we are bringing subject experts from all spheres of ICT and related technologies namely- Cloud, Big Data, IoT, Cyber Space Defence, Disaster Recovery etc., who will work as a catalyst to initiate innovations in the entire ecosystem. This International Summit is being organized to celebrate the foundation day of Computer Society of India (CSI) which took birth on 6th March, 1965 at DRDO campus Hyderabad. As part of this celebration, Inspirational Speech by a famous and magnetic personality is also organized to ignite the minds of ICT Professionals.

Participants : Delegates including IT heads of Govt organizations, Private sector From: Industries , Public Sector Undertakings, Legal Authorities, Defence Shri. Gautam Mahapartra, Research Organizations, Faculties of Universities in India and the IT users of our country. Scientist -G, RCI(DRDO) Chairman, Organizing Committee TINICT-2017 Registration Fees and Deadlines Registration Includes: Keynotes, Plenaries and Technical Sessions, Industry Forum and Exhibition(IF&E). Registration Fees: For CSI Members Rs.10,000/- and For Non CSI Members Rs. 12000/- All payment to be made on: State Bank Of India, A/C No: 34200480145, IFSC Code: SBIN0007074 Registration will be done via online through http://csihyderabad.org/ Web site. Contact Details: Conference Sponsor 302, Archana Arcade, 10-3-190, St. Johns Road, Opposite Railway Reservation Complex, Secunderabad,Telangana; Pin code No: 500025 Phone: +91-040-24306644, +91-040-24306345, 9490751639 E-Mail: [email protected]; [email protected]

TINICT-2017 R.S.V.P: Mr. T. Satyanarayana, Mob: 9441242829

47 CSI Communications | FEBRUARY 2017 from chapters & divisions

AHMEDABAD CHAPTER

Inter College Quiz Competition - 2016 was organized Allahabad chapter along with Centre of computer Sciences, by Computer Society of India – Ahmedabad Chapter on Ewing Christian College Allahabad organized one week September 18, 2016 at UGC Conference Hall, HK College workshop on Android Application Development from 7th Campus, Ahmedabad. Event was divided in three different January, 2017. About 65 students were participated in the levels. Two levels were for Under Graduate students and event. third level was for the students of Post Graduate. Total of 38 teams participated. Each team contains 3 members. Mr Amravati Chapter Sujoy Pal, Managing Committee member, CSI-AC gave the presentation about CSI. Total two rounds were conducted; one was preliminary round and second was the final round. Three teams with highest score in preliminary round were selected for the final round. In the final round of first UG Level team from Swaminarayan Arts college was the winner. The winner team in the second UG was from the Navgujarat College of Computer Applications. Third and final round of for PG level was conducted between the teams from Chimanbhai Patel Institute, L. J. Institute of Computer Applications and L. D. Engineering College. Winner team was from the L J Institute of Computer Applications. All winner participants get the trophy along with certificate of A National Level 3 days workshop on “MACHINE LEARNING achievement. CSI Ahmedabad Chapter is heartily thankful to AND HANDS ON TRAINING USING MATLAB PROGRAMMING” the management of H K College for providing infrastructure. was conducted by Shri Sant Gajanan Maharaj College of Engineering, Shegaon Dist Buldhana , Maharashtra from ALLAHABAD Chapter 28th to 30th December 2016 with the technical sponsorship of CSI Amravati Chapter. Dr. R.K.Agrawal , JNU New Delhi was the main resourse person for the workshop. Prof N M Kandoi was the convenor, Prof D.R.Dhotre and Prof Vijay Mahalle were the coordinators.

CHENNAI Chapter

Allahabad chapter organized Annual General Meeting-2016 at Hotel Milam Palace on 30th December, 2016. Prof M M Gore, Chapter Chairman started the meeting by welcoming note. Annual meeting is started by presenting balance sheet and annual report by Mr Rajiv Gupta. Er. Mithlesh Mishra (Vice-chairman) presented a report of the activities held during the year. The senior members discussed the future agenda regarding CSI activities and all the other CSI One Day Workshop on Vedic Self-Management was held on members participated in the open discussion on the topic- 14th Dec 2016 by Dr. S Kannan. The presentation covered cashless and Digital payment. Dr. Shashank Srivastava, various aspects of Vedic management, specially relating to Chapter Secretary gave the votes of thanks. relationship between Body, Mind and Intellect. There was

www.csi-india.org 48 CSI Communications | FEBRUARY 2017 from chapters & divisions

a detailed reference to mapping of individual’s personality Noida on 30th Jan. to 4th Feb. 2017. The Introduction & based on Trigunas, Pancha Kosas and Chakras. The objective of the workshop was addressed by Prof. M K Rai, emphasis was always on achieving managerial excellence Registrar Gautam Budh University Greater Noida. Prof. M imbibing and adapting oneself to various principles of K Rai Registrar, Gautam Budh University has given welcome Management, as enunciated in our Vedas; Dr. Kannan speech and elaborated about the aims & objective of the interspersed his presentation with quotes from our Vedas. FDP. Prof. A K Gautam, Dean, GBU Greater Noida has talked At the end of his presentation, the audience was divided into about the FDP and its importance in the research field in six teams of 2 persons per team; Dr. Kannan gave six sets of the country. Prof. K K Aggrawal, Founder VC, GGSIPU Delhi, cases involving various managerial aspects and situations; Former President CSI & Chancellor K R Mangalam Univ, the teams were asked to workout their solutions and their Gurgaon was the Chief Guest in the inaugural session. In interpretations based on the principles covered in the Vedic his inaugural address he mentioned growth of Internet is Management sessions; the teams then presented the very rapid in the country in comparison to aviation sector. case studies with solutions and interpretations. The entire Internet of things (IOT) has made peoples life easy and it program of the day concluded with a 15 mins. of meditation. has applications in all the fields of life, including, medical, Mr. T R Vasudeva Rao proposed the vote of thanks. physics, research and academia. He has also said that Chennai Chapter organized presentation on Cyber Crimes in after 2020 mobile phones will no longer require charger for India : Emerging Trends & Computer security in India on 20th charging but will be self charged by using radiations. He December 2016 by Mr. V Rajendran. He cited many cases of has also said that IOT will enable all house hold electronic cyber crimes from real time instances. He differentiated the devices to communicate with other through networking. normal crimes vs cyber crimes in view of modus operandi, More than 300 participants from Delhi NCR & rest part of investigation process, process of trial and production of the country attended. E-evidence. The protection of information asset is basically dependent on the three aspects namely owner, custodian and UJJAIN CHAPTER the user. The speaker cited many real time scenarios where these three aspects could be or not to be at variance. The speaker finally touched the importance of IT-Act especially some of the Sections related to cyber crimes. Dr. P. Sakthivel thanked the speaker and the gathering.

A seminar on Image compression was held on 19-11- 2016 under CSI Ujjain chapter in MIT for all the technical professionals in ujjain. The Eminent speaker Dr. Vipin Tyagi, Regional Vice President, Region-III talked about the research areas in length. Prof. A K Nayak, Hon Secretary, Mr. R K Vyas, Hon Treasurer, Prof. P Thrimurthy, Past President were grace the occasion. Prof. Y Kelkar, NOIDA CHAPTER Coordinated and conducted the complete program. Prof Gangame presented the vote of thanks.

VELLORE Chapter

One Week FDP Program on Research Techniques in Information Communication Technologies Jointly organized by csi Noida Chapter & Gautam Budh University greater School of Information Technology & Engineering hosted

49 CSI Communications | FEBRUARY 2017 from chapters & divisions

two international conferences in VIT in association with the conference, around 120 members participated. CSI Vellore Chapter. 8th International conference on Soft CSI Vellore Chapter in association with SCOPE organized a Computing & Pattern Recognition and 8th International one day Guest Lecturer on “Big Data and Machine Learning” conference on computational aspects of social networks on 05/01/2010 at VIT University. Dr. M Viswanathan, from 19th to 21st Dec 2016. Dr. Gerardo Rubino, INRIA, Carnegie Mellon University, Australia explained introduction FRANCE was the chief guest for the conference and graced to big data, characterstics of big data and different issues his presence for this occasion. He also delivered the of big data is discussed followed by how machine learning keynote address on the topic “perceptual quality estimation: techniques can be applied to big data context, explained the Machine learning and Big data problems”. Dr. Ajith Abraham, research directions in big data, around 50 life members and Director of MIR Labs, USA served as the guest of honor for students participated in the seminar.

from student branches

Region-I The NorthCap University, Gurgaon SRM University, Ghaziabad

17-12-2016 - Workshops on Game development and 15-12-2016 - One day workshop on Internet of Things (IoT) Android Application Development Region-I Region-III Manav Rachna International University, Faridabad Manipal University, Jaipur

v 31-1-2017 - Dr. Wadhwa, VC, MRIU & Dr. M N Hoda, 28-1-2017 – Student Branch Inauguration Chairman, Division-1 inaugurating the CSI Student Branch

www.csi-india.org 50 CSI Communications | FEBRUARY 2017 from student branches

Region-IV Region-V Gandhi Institute for Education and Tech., Bhubaneswar K S Institute of Technology, Bangaluru

18-1-2017 – Student Branch Inauguration 18 to 21-1-2017 - FDP on Raspberry Pi and its Applications in IoT Region-V St. Claret College, Bangaluru Potti Sriramulu Chalavadi Mallikarjuna Rao College of Engineering & Technology, Vijayawada

21-1-2017 – Student Branch Inauguration 7-1-2017 – Sri Chalavadi Mallikarjuna Rao Lightening the Lamp during Student Branch inauguration Bharat Institute of Engineering and Technology, Ibrahimpatnam

16 & 17-12-2016 – Two days National Conference on Innovative 29-12-2016 – CSI Digital Life: Cashless Transactions Technologies In Big Data, Cloud, Mobile and Security (ITBCMS-2016) Awareness Program CMR Technical Campus, Hyderabad

29-12-2016 - Guest Lecture on Java programming 5-1-2017 - Workshop on Game Tools

51 CSI Communications | FEBRUARY 2017 from student branches

Region-V NBKR Institute of Science and Technology, Nellore

10-1-2017 - Dr Vijaya Kumar Reddy during Motivation Session 17-1-2017 – Participants during Technical Quiz

JSS Academy of Technical Education, Bangaluru

5-11-2016 - One day workshop on Learn to Code 11 & 12-11-2016 – Two day workshop on Programming in Python

Chalapathi institute of Engg. and Technology, Guntur Amrita Vishwa Vidyapeetham (University), Bangaluru

11 & 12-2-2017 - Second National Conference on Recent 20-1-2017 - Invited talk on Intentions in Inventions – Advances in Computer Science and Engineering Healthcare by Dr. Vishal Rao

GITAM University, Visakhapatnam GSSS Institute of Engineering and Technology for Women, Mysuru

5-2-2017 – Event on WALK-A-THON as a part of its National 20 to 23-1-2017 - Three Day Workshop Symposium on Challenges in Enterprise Network Environment

www.csi-india.org 52 CSI Communications | FEBRUARY 2017 from student branches

Region-VI Mukesh Patel School of Tech. Mgmt. & Engg., Shirpur Marathwada Mitra Mandal’s College of Engineering, Pune

27 & 28-12-2016 - International Conference on Artificial Intelligence 28-1-2017- Session on Agile- The Methodology You Must Know by in Health Care Mr. Prashant Pund

Late G N Sapkal College of Engineering Anjaneri, Nashik

27 & 28-12-2016 – Prof Wankhade & Mr Nikhil Shahane during 12-1-2017 – Dr. Bagal, Prof Wankhade & Mr. Vijay Mhaske Two Days Hands on Workshop on Android Appilication Development during National Youth Day Celebration

SNJB’s Late Sau Kantabai Bhavarlalji Jain College of Sandip Institute of Technology & Research Center, Engineering, Chandwad Nashik

23-1-2017 - Motivational and Patent Registration Seminar by 5 to 18-12-2016 - Two Weeks Industrial Training Program Mr Vijay Mhaske

Guru Gobind Singh Polytechnic, Nashik

2 & 3-1-2017 – Event on College to corporate 13-1-2017 - State Level Event on TECHNOCIA-2k17

53 CSI Communications | FEBRUARY 2017 Registered with Registrar of News Papers for India - RNI 31668/1978 If undelivered return to : Regd. No. MCN/222/20l5-2017 Samruddhi Venture Park, Unit No.3, from student branches Posting Date: 10 & 11 every month. Posted at Patrika Channel Mumbai-I 4th floor, MIDC, Andheri (E). Mumbai-400 093 Date of Publication: 10th of every month

Region-Vi Kavikulguru Institute of Technology and Science, Nagpur

20-1-2017 – Event on PRO-WEB 23-1-2017 – Guest Lecture on Android Technologies Region-ViI Shri S S Shasun Jain College for Women, Chennai Mepco Schlenk Engineering College, Sivakasi

16-12-2016 - Digital Awareness Programme 4-1-2017 - Mrs Blessa Binolin Pepsi explaining the basic Concepts of RTool during the workshop Nandha College of Technology, Erode

17-9-2016 - National Level Symposium on CRYOSAT’16 6-1-2017 - Awareness Workshop on Smart India ’17 Region-VII National Engineering College, Kovilpatti Sri Vidya College of Engg. & Technology, Virudhunagar

22 & 23-12-2016 – Mr Jerart Julus during the seminar on 29-12-2016 - Guest Lecture on Introduction to Vittiya Saksharta Abhiyan Android Mobile App Development

www.csi-india.org 54 CSI Communications | FEBRUARY 2017 Registered with Registrar of News Papers for India - RNI 31668/1978 If undelivered return to : Regd. No. MCN/222/20l5-2017 Samruddhi Venture Park, Unit No.3, Posting Date: 10 & 11 every month. Posted at Patrika Channel Mumbai-I 4th floor, MIDC, Andheri (E). Mumbai-400 093 Date of Publication: 10th of every month

Region-ViI Valliammai Engineering College, Kattankulathur

21-12-2016 – Mr Nagarajan handling the Staff Development 7-2-2017 - Mr. Muthuraj Durairaj handling the workshop on Training Programme on Programming in JAVA Data Analysis using HADOOP Jamal Mohamed College (Autonomous), Tiruchirappalli

2 & 3-9-2016 - Dr Khaja Nazeemudeen inaugurating the 8 & 9-9-2016 - Students from Thiagarajar College of International Workshop on Image Restoration Techniques Engineering receiving the overall championship award at with MATLAB Inter-Collegiate Technical Symposium SWAP-2K16 Sathyabama University, Chennai JCT College of Engineering and Technology, Coimbatore

9-2-2017 - Mr Vasudeva Rao, Vice Chairman, CSI-Chennai 8 & 9-2-2017 National Level Workshop on IoT Chapter inaugurated the CSI Student Branch (Internet of Things)

Student branches are requested to send their report to [email protected] with a copy to [email protected].

Chapters are requested to send their activity report to [email protected].

Kindly send high resolution photograph with the report.

55 CSI Communications | FEBRUARY 2017