Professional Documents
Culture Documents
UNIVERSITY OF RAJASTAHN
JAIPUR-302004 INDIA
Prof S.
Prof. S L.
L Kothari Tel/Fax: +91-2700370
+91 2700370
Ph.D., FNAAS, FNASc,
Director
Dear students,
Centre for Converging Technologies(CCT) has entered into 4th year of its existence
and the joyous moment of celebrating the inauguration of the new premises has arrived.
This happy moment is being witnessed by all of us along with the very gracious presence and
blessings of his Excellency Hon
Hon’ble
ble Governor of Rajasthan Sh.
Sh S.
S K.
K Singh and Madam Manju
Singh.
Presence of the Hon'ble chief minister of Rajasthan on this occasion is a reassurance for the centre that it
will receive the support of the Government also.
This historic moment, we shall cherish forever. Our effort to bring out a glimpse of the Centre’s
activities
i i i ini the
h form
f off the
h first
fi issue
i off its
i magazine
i that
h we have
h d id d to collectively
decided ll i l callll as
the “CONVERGE” is with us.
I must congratulate you all and wish you all the best.
One thing that you should always remember is to excel atleast in one area of Scientic Research and
creativity that I leave on you to decide.
DIRECTOR
Preface
According to a famous quotation by Robyn Davidson, “the
most difficult part of an endeavor is taking the first step, making the first
technologies to preserve the memories of all the events that have occurred
over the course of time since the department was established. This
magazine is an initiative to cherish the dried roses of the past between the
center and how it came into existence. To continue with, we have tried to jot
down all the academic happenings that have made an impact in our lives. The
magazine proceeds with the cultural activities that were performed in the
premises. But as we say, sports do not build character, they reveal it. The
episodes of the sports week have also been traced down the memory lane.
We have also tried to include and acknowledge all the renowned personalities
and scientists that have visited the center and contributed in some way to
the development going on here. The department has been remarked as the
the very beginning the most difficult part of an endeavor is the first step,
thus the magazine concludes by giving a brief mention to all those who have
EDITORIAL BOARD
Dr. Sumita Kachhwaha
Rohit Jain
Sachin Dubey
Vinay Sharma
Sahil Tahiliani
Ramesh Chaudhary
Kumud Agarwal
Sankalp Sharma
Shiv dutt Purohit
UGC team for XI five year plan visited CCT on 22nd July,
2008. Prof. Panjab Singh (Chairman of the visiting team and
former DG, ICAR), Prof. Somaya Raju (Osmania University),
Prof. S.C. Gupta (Delhi University) all appreciated the concept
of Converging Technologies and course structure of the CCT.
They spent about an hour at the centre and interacted with the
Director, faculty and students at CCT. They assured every
possible help from U.G.C. for this centre.
Converge 2009
Why? The concept? The idea
HIGHLIGHTS
Converge 2009
Centre for Converging Technologies
University of Rajasthan, Jaipur
VISION:
=> Creating and maintaining a critical mass of Converging Technology specialists who
can effectively contribute to the needs of the industry and society. It focuses on research
in Nanotechnology, Bioinformatics, Biotechnology, Information and Communication
Technology.
=> Founding a strong training and research base in academia to make an attractive
international training ground for Converging Technologies ; Generating, designing, and
applying new technologies in an innovative way.
=>Developing laboratories and facilities to efficiently engineer and design new products.
=> Promoting global level research in allied Theoretical Science (logic, data structures
and algorithms, computational complexity, database systems, knowledge representation,
constraint satisfactions, artificial intelligence, intelligent agents, theoretical computer
science and quantum computing), Systems Biology and Metabolomics.
=> Making special provisions to attract post-doctoral researcher in Converging
Technologies to uplift the capacity for research.
=> Imparting postgraduate education in Converging Technologies.
=> Collaborating with Industry, National and International Institutes/Universities to
augment research and achieve its objectives.
Technologies”
Converge 2009
The Magnificent New Building……
The Library spans across an area of 2200 sq. ft., fully air-
conditioned and well modernized with all the essential
literature.
Converge 2009
The Central Instrumentation Facility (CIF)
HPLC
The Central Instrumentation Facility (C.I.F.) has all the
requisite instruments for modern day research. The
facility is fully Air-Conditioned and has High Speed Wi-Fi
Internet Connection.
Nanodrop Spectrophotometer
-20o C Refrigerator
UV-Visible Spectrophotometer
Laminar Hoods,
Converge 2009
Bioinformatics Infrastructure Facility (B.I.F.)
Converge 2009
ICCMP
Converge 2009
Academic events trip to KApoor Chand Kulish Smriti Van
Converge 2009
workshop on nanotechnology
AND
Speakers:
Converge 2009
Spring fiesta
Converge 2009
SYNERGY 2008……
Converge 2009
sports@ cct
Badminton:
Table tennis
Cricket
Football
2006 batch
Volleyball
2006 batch
Converge 2009
[Type the document title]
Sports @ cct
-Cricket
-Football
-Volleyball
-Table Tennis
-Badminton
Converge 2009
Research Achivements
Improved micro propagation
protocol and enhancement in
biomass and chlorophyll content in Research and Development is the major need
Stevia rebaudiana (Bert.) Bertoni by
of Science as well as Converging Technologies.
using high copper levels in the
culture medium
The Director of the institute has the highest “H-
Authors: Index (11)” (Scientific Citation Index) in the stream
Pourvi Jain, Sumita Kachhwaha, of Life Sciences in the University for which he has
and S.L. Kothari
Journal: Scientia Horticulturae August been felicitated by Hon’ble Vice Chancellor of the
2008 University.
Department of Botany, University of
Rajasthan, Jaipur 302004, India He is the fellow of two national academies viz. a
b
Centre for Converging Technologies
(CCT), University of Rajasthan, Jaipur viz. National Academy of Sciences India and
302004, India
National Academy of Agricultural Sciences India.
Bacillus thuringiensis strain IS5 16S Students have enthralled their potentials in the
ribosomal RNA gene, partial sequence
reign of R & D.
Authors: Devenra Jain, and S.
Kachhwaha, S. L. Kothari Some of the students have been involved in the
JOURNAL Submitted (19-FEB-2009) research area of Life Sciences under the able
to NCBI guidance of Prof. S. L. Kothari.
Centre for Converging Technologies
(CCT), University of Rajasthan, JLN
Marg, Jaipur, India Students have published several research papers
in peer reviewed Journals.
Micropropagation of Withania coagulans
(Stocks) Dunal. : a critically endangered Eight Partial Gene sequences of Bacillus
medicinal herb
thuringiensis have been submitted to the
Authors: Rohit Jain, Arunima sinha
Sumita Kachhwaha, and S.L. Kothari International Genebank NCBI.
Journal of Plant Biochemistry and
Biotechnology; Vol. 18(2); July 2009
Converge 2009
PERSONAL ACHIEVEMENTS
“CCTians @ www.cctblog.sarsv.in”
Ramesh Chouhdary Preeti Kaushik Abhimanyu Sharma
Special Points of
Blog
Full standards compli-
ance
Cross-blog communica-
tion tools
Spam protection
Password Protected
Posts
IV Sem. 2007 Batch IV Sem. 2007 Batch IV Sem. 2007 Batch Easy installation and
upgrades
Typographical niceties
No Only CCT But Also SKIT, GIT, SARSV Groups Blog
Intelligent text format-
designed by CCTIans ting
Abhishek Lamba
Converge 2009
Technocrats Medal Tally……
Converge 2009
Rendezvous with Dr. John Reilly
John Reilly, assistant professor of chemistry at Coastal Carolina University, has been awarded a Fulbright-Nehru
grant to teach in India during the 2009-2010 academic year. He will teach physical chemistry with the addition of
an ethics and writing component at the University of Rajasthan in Jaipur, India. Reilly is one of 1,100 U.S.
educators and professionals who will travel abroad through the Fulbright Scholar Program.
I think it is a unique place in India and perhaps the world. As far as I know it has not been replicated anywhere
else, at least not at the undergraduate level. It is a exciting place to teach. I find the students to be excellent and
I look forward to hearing about the success of CCT in the future.
I’m certain the administration at CCT is continually monitoring and improving CCT. It is important to keep a close
watch on the progress for such a unique and exciting endeavor. I have full confidence in Dr. Kothari and his
colleagues to make this a renowned centre for study.
1
CCT Blog
Just Creativity of CCTians
RAMESH CHOUDHARY
Www.cctblog.sarsv.in
CCTBlog Pages — Pages allow you to manage non-blog content easily, so for example you Do something Different in
could have a static "About" page that you manage through CCTBlog. For an idea of how powerful cloud of people
this is, the entire CCTBlog.org site could be run off CCTBlog alone. (We don't for technical mir-
roring reasons.)
CCTBlog Links -- Links allows you to create, maintain, and update any number of blogrolls
through your administration interface. This is much faster than calling an external blogroll man-
ager.
Cross-blog communication tools— CCTBlog fully supports both the Trackback and Ping-
back standards, and we are committed to supporting future standards as they develop.
Comments — Visitors to your site can leave comments on individual entries, and through
Trackback or Pingback can comment on their own site. You can enable or disable comments on a
Flush out the writer in
per-post basis. children. Blogging could draw
out a young writer and open
Spam protection — Out of the box CCTBlog comes with very robust tools such as an inte- doors to their future.
grated blacklist and open proxy checker to manage and eliminate comment spam on your blog,
and there is also a rich array of plug-ins that can take this functionality a step further. Consider encouraging your
child to start blogging!
Full user registration — CCTBlog has a built-in user registration system that (if you
choose) can allow people to register and maintain profiles and leave authenticated comments on
your blog. You can optionally close comments for non-registered users. There are also plugins
that hide posts from lower level users.
Password Protected Posts — You can give passwords to individual posts to hide them from
the public. You can also have private posts which are viewable only by their author.
Easy installation and upgrades — Installing CCTBlog and upgrading from previous ver- To Join
sions and other software is a piece of cake. Try it and you'll wonder why all web software
isn't this easy. CCTSMSBlog
Workflow — You can have types of users that can only post drafts, not publish to the front Send SMS
page. On cctsmsblog
At
Typographical niceties — CCTBlog uses the Texturize engine to intelligently convert plain
ASCII into typographically correct XHTML entities. This includes quotes, apostrophes, ellipses, 9870807070
em and en dashes, multiplication symbols, and ampersands. For information about the proper use (Toll Free)
of such entities see Peter Sheerin's article The Trouble With Em ’n En.
on the support forums and there's a good chance someone will whip it up for you.
Intelligent text formatting — If you've dealt with systems that
convert new lines to line breaks before you know why they have a bad
name: if you have any sort of HTML they butcher it by putting tags
after every new line indiscriminately, breaking your formatting and
validation. Our function for this intelligently avoids places where you
already have breaks and block-level HTML tags, so you can leave it on
without worrying about it breaking your code.
A weblog is a hier-
archy of text, im-
ages, media objects
and data, arranged
chronologically,
that can be viewed
in an HTML
browser. (source ...
harvard)
-Preeti Kaushik
Special points of in- In the new world more and more people are getting involved in the cyber world so to overcome
terest:
their problems.
First Cybercrime
But these people are unknown of the future menace they'll face in the future.
Secure Me
My Parts Though it makes our lives easier and comfortable but comfort and ease always cost something, big
128-bit SSL
My Introduction
In essence cybercrime is crime committed in virtual space and a virtual space is
fashioned in a way that information about persons, objects, facts ,event phenomena or
A Story processes are represented as mathematical symbol or any other way and transferred
On September 20 ,Bannadevi
Police station in Aligarh re- Secure Me
ceived a complaint from
"DO's"
Prashant Enterprises (PE) ac-
cusing unidentified persons of
Ensure using a security program that gives you control over cookies that send information back to
posting a video clip on PE's
YouTube by the title “Save Web sites.
Aligarh, Save Child” showing
child laborers engaged purport- Use the latest anti-virus software, operating systems, Web browsers and email programs.
edly by the PE. After initial
inquiries a case was registered If your Web site serves up dynamic content from a database, consider putting that database behind
with Police under sections of a second interface on your firewall, with tighter access rules than the interface to your server.
Information Technology Act
(IT Act). In the first step of "DON'T"
probe, investigators managed to • Forget to check out the site you are doing business with thoroughly.
establish that the sites where
child laborers were shown at • Forget to make sure web servers running your public site are physically separate and individually
work in video clip , did not protected from your internal corporate network.
belong to PE and were shot
elsewhere. Investigations also Share your password with other people
revealed that the children and
their parents interviewed in clip • Tell others about personal or private information about your friends or family members
were actually school going
children and were mislead to •Use obsolete / pirated anti-virus software, operating systems, Web browsers and email programs.
use tools and equipments for
"Saileshkumar Zarkar, technical advisor and network security consultant to the Mumbai Police
shooting a video clip.
Cyber crime Cell, advocates the 5 P mantra for online security:
Page 2 “ Precaution, Prevention, Protection, Many wireless networks are not encrypted, so
Preservation and Perseverance." anyone with little knowledge could eavesdrop.
Use anti-spyware software to protect against 13.Keep your device in non-discoverable mode
when you are not using Wi-Fi or Bluetooth and
Spyware and Trojan software. Also, set your use personal identification number (PIN) to
browser preferences only to accept cookies you keep the device secure.
recognize and wish to install. Many cookies are
quite legitimate but others can act as spyware Don't connect into non-secure access points in
or Trojans– you can often tell from the name, public places.
"Before clicking on the which might contain words such as access, ad,
tracker, backdoor, burrow or exe. Microsoft Office programs such as Word, Excel
web site which may be
and PowerPoint can contain a lot of hidden
spam we must first
Only use Wi-Fi or Bluetooth in places, and with information that you had no intention of shar-
disable our active con-
devices, you trust. ing with other people.
tent.”
My Parts
Email bombing- Salami attacks- Virus / worm attacks-
This kind of activity refers to This kind of crime is nor- Viruses are programs that
sending large numbers of mally prevalent in the finan- attach themselves to a com-
mail to the victim, which may cial institutions or for the puter or a file and then circu-
be an individual or a com- late themselves to other files
pany or even mail servers purpose of committing finan- and to other computers on a
there by ultimately resulting cial crimes. An important network. They usually affect
Prevention is better than feature of this type of
into crashing. the data on a computer, ei-
cure’ is not only meant
ther by altering or deleting it.
for human health but for Trojan attacks- offence is that the alteration
Worms, unlike viruses do not
computers as well. It is is so small that it would nor-
need the host to attach them-
always better to take This term has its origin in the mally go unnoticed.
selves to. They merely make
necessary steps to word ‘Trojan horse’ . In
functional copies of them-
prevent cyber crimes. The software field this means an
selves and do this repeatedly
following Don’t’ are some unauthorized programs,
till they eat up all the avail-
of the useful tips to which passively gains control
able space on a computer's
prevent cyber crimes to over another’s system by
memory.
some extent. representing itself as an au-
thorized programs. The most
common form of installing a
Trojan is through e-mail.
Security
128-bit SSL
SSL stands for "Secure Sockets Layer". It is a protocol designed to enable applications to transmit
information back and forth securely.
SSL is accepted on the world wide web for authenticated and encrypted communication between
Downloading Tips
*Read the privacy statements and licensing agreements of the software you download.
CCT FAMILY
(2006 BATCH)
SARSV Group
I AM TALKING ABOUT...
“Children, once upon a time, man are using it . Our almost every means Inside this issue:
used to write his thoughts on a object of communication, whether conveying
called „paper‟.”, a school teacher told I AM TALKING ABOUT
messages, official/unofficial records
her pupils. “Ma‟am, what does paper
or books are all written on papers. We
mean? ”.
can store bundles of files and records WELCOME-TO-EXAM
Yes, this is the future. Paper DOT COM
is going to be a thing that people containing the data but we have a
have never heard before. It will be very little courage to think beyond it, to
PROBLEMS WITH
replaced by new technology called think to replace a tortoise walk by a
„PAPER‟ SYSTEM
computer or computer based pro- rapid rabbit running. How is it, if your
grams, which will help to reduce the central library will be converted into a DRAWBACKS OF
cost and man power. 4 by 4 room, without a labyrinth of SUBJECTIVE PA-
The discovery of paper was made shelves occupying only space equiva-
THUMBS UP WITH
around 105 AD and, since then we lent to tip of the pin.
ONLINE EXAMINA-
THUMBS UP WITH
WELCOME-TO-EXAM dot COM OBJECTIVE EXAMI-
Taking exams is a very hazard- The most faulty and unreliable
ous, long and time consuming steps are conduction of exami-
process for any university or nation and checking of copies.
institute. From the filling of the Checking of copies is most time
forms to the declaration of consuming phase and it needs
result , every step is itself a a involvement of number of
series of steps. It can be a mat- peoples. Sometimes, universi-
ter of chance that all these ties are not able to declare the
multistep processes have a examination results after a long
common way of communica- time. Sometimes institutes do
tion – paper. Lots of paper not conduct their internal ex-
work is done and a large num- amination because of the head
ber of records are maintained. -ache of copy checking.
Suppose a panel of 10 teachers is going to check the answer sheets. For the same answer, every
teacher will have his own ideas and opinion. So different students will get different marks for the
same answer.
DRAWBACKS OF SUBJECTIVE PAPER
No doubt that subjective pattern of paper improves the writing skills of the students, but it have some drawbacks too.
Knowledge of depth can not be achieved.
Students can estimate the paper.
OUR PROJECT
We will include the following points in our online examination project.
A well defined way to conduct a healthy examination.
During examination, it is important to deny the students not to access the internet. Student should not excess
the internet facilities. For this, a new internet browser is under construction. Some other parallel options are also
available.
Random question paper will be distributed among the students. Sequence of questions will be different.
Converge 2009
students@ cct sachin dubey, vi sem
Converge 2009
Here one thing is also admirable that We have lower income but lower morals
there is no importance of any product if it is not These are the time of world peace but domestic
available to a common man. So that the idea of warfare
CONVERGING TECHNOLOGIES comes in society
More leisure’s but less fun
which merges knowledge of several technical
These are the times of two incomes but more
fields and produces things at the common man
level. divorces
Have fancier houses but broken homes
“Multidimensional creativity &
It’s the time when theres much in show window but
Knowledge boosts the power of
less in stock room
technology and bursts the barrier across
We are always getting ready to live but never
development.”
LIVING…
Converge 2009
deepam jain & kumud agarwal,VIsem
Suddenly, the lost key was found-“Centre for ROHIT JAIN (Ph. D. Scholar)
Converging Technologies”. It brought new lquks !
excitement and feeling of happiness inside us. We
were ready to start for a fresh beginning, full of rqEgkjs ikl csgn gWl
a h gS]
enthusiasm, ready to accept new challenges; we are
,d vatfy Hkj eq>s ns nks!
a complete epitome of energy.
Ikj cnys esa eq>ls dqN uk ekaxuk
“Life’s challenges are not supposed to
paralyze you; they are supposed to help you esjs ikl flQZ mnklh gS
discover who you are.” tc lkou vkrk gS] rks lw[ks iRrs mxrs gS esjs Hkhrj
And this is what we felt after being a part of CCT. It
was a complete new atmosphere, new challenges in mu iRrksa dks gjk dj ldrh gS rqEgkjh gWl
a h!!!
path but were promising. Soon we realized that this lquks !
is what we desired for and aimed for and are moving
on a right path. Yes, we feel we are different from rqEgkjs ikl csgn gWl
a h gS]
the crowd, doing something real big and would
,d vatfy Hkj eq>s ns nks!
contribute to the TECHNOLOGY NEXT and the
near future.
Converge 2009
visitors @ cct