54
1

Completed Sovenir

Embed Size (px)

Citation preview

Page 1: Completed Sovenir

1

Page 2: Completed Sovenir

2

Message From The Chairman’s Desk

My hearty congratulations to the Department of Computer Application

for emerging successful in their National Level Technical Symposium

Heuriskein 10i. I am confident that the symposium would be a platform to

share knowledge, to learn and grow and also to bring forth technical

innovations.

It gives me immense pleasure to see the post-graduate students

successfully advancing in all aspects. My best wishes to the faculty and the

students for their contribution towards the success of the event. I also wish

the participants success in all their endeavors.

Best Wishes

Shri M. V. Muthuramalingam

Page 3: Completed Sovenir

3

Message From the CEO’S Desk

I am indeed delighted to note that the Department of Computer

Application is coming out with their National Level Technical Symposium,

HEURISKEIN 10i, which has been organized to show case the talents of

young software professionals. ”Nothing is too small to know and known, too

big to attempt”, is an anonymous statement that is unanimously greeted by

everyone. The innovation and technical break thought of the future are more

likely to emerge from convergence of different disciplines. So it is essential

that the students of Management science and technology adopt a multi-

discipline approach.

I would like to congratulate the HOD, Staff Members and our

industrious students for the efforts they have put in to bring out this technical

masterpiece. I hope that Heuriskein’10i will open new vistas in Computer

Science and Technology and thus set new standards for others to explore and

emulate.

Best wishes,

Shri, M.V.M. Velmurugan

Page 4: Completed Sovenir

4

Message From The Principal’s Desk

It is gratifying to know that the Department of Computer Applications

is launching a souvenir in the occasion of the inaugural of Heuriskein10i. I

wish that Heuriskein10i will be a meaningful opportunity to exhibit your

talents and academic excellence. The Symposium offers many opportunities

to discover new arenas and innovations among the youth of today.

I hope all the competitions, presentations and discussion in various

events will be useful to each participant. These efforts will undoubtedly

benefit all of us, enabling us to explore new fields and attain excellence in the

pursuit of our technical innovative measures.

Best Wishes,

Dr. K. Thirunavukkarasu

Page 5: Completed Sovenir

5

Message From The HoD’s Desk

I am personally thankful to the management of Velammal Engineering

College for having consented for “HEURIKEIN 10i”. I also congratulate the

faculty and students of the department for making this event a memorable

one and systematically planning every detail to perfection.

The expansion of technical education is evident everywhere in our

society and there are great challenges to be met in maintaining the quality of

the system. Any step taken towards facing and accomplishing these challenges

deserves apt recognition. I strongly believe that the Souvenir, which is a sign

of quality technical work, could not have been made possible without the

effective contribution and dedication of the students of the Department.

I wish every participant of this event success in their future endeavors

and I am sure they will carry with them lingering memories of the rich

knowledge and experience acquired through this talent show.

Best wishes,

Dr. E.R. Naganathan

Page 6: Completed Sovenir

6

ORGANIZING COMMITTEE

Chief Patron : Shri.M.V.Muthuramalingam ,Chairman

Patron : Shri.M.V.M.Velmurugan, CEO

Dr.K.Tirunavukkarasu , Principal

Shri.M.Jaganathan, Advisor

Convenor : Dr.E.R.Naganathan, Prof. & Head of the Department

Staff Co-Ordinators

Steering Chair:

Mr. Bhupathiraju Asst. Prof.

Ms. P. Usha Madhuri Asst. Prof.

Finance Chairs:

Ms.Madhumidha, Asst. Prof L3

Mr R.Senthil kumar, Asst. Prof

Mr.Bupathiraju, Asst. Prof L1

Program Chairs:

Mr V. Jeyabalaraja, Prof

Ms. M. Shanthi, Asst. Prof

Ms. V.S. Abbirami, Asst. Prof

Ms. S. Augustina Mary Asst. Prof

Ms. G. Malathi Asst. Prof

Ms.R.M.Chamundeeswari,Asst.Prof

Ms. B. Kavitha Asst. Prof L2

Mr. R. Boopathy Asst. Prof

Publicity Chairs:

Ms. A. Priya, Asst. Prof L2

Mr K.M. Parthiban, Asst. Prof

Mr B. Muralidharan, Asst. Prof

Local Arrangements:

Mr. P. Deivendran, Asst. Prof

Mr. R. Naranaya Swamy, Asst. Prof

Technical Assistants : Mr.V.Suresh

Ms. P.Pushpa

Page 7: Completed Sovenir

7

Student Co-Ordinators

President: T.N Deepak Kumar

Sakthivel

M.Sc (CT)-Vyr:

K.Naresh A.Praveen Periyasamy K.S.Jeyakavya V.PooranaSoundari S.Priya S.Thenmozhi

S.Sowmya

M.Sc (CT)-IVyr:

K.Vilasni

Sonali malthkar

P. Deepika

S.Karthik

S. Benin Stephen

R. Kamaleshwaran

V.Priya

M.Asha

Aashlesh M. Rao

D. Sudharsan

K.S.Ashwin kumar

R. Poongulazhi

L. Saranya

M.Sc (CT)-IIIyr:

Rajalakshmi

Dinesh

M.Sc (CT)-IIyr:

Swathy Lakshmi K.Balaji

MCA –III yr

Vijayalakshmi

S.Anand

K.V .Yogaraj

Prabushankar

Vivekanandan

D.Praveen Kumar

A.Lokesh Kumar

MCA - II yr

Anu priya

B.Rajeev

K.Ganesh

D.P.Jegan Kumar

K.Paneer Selvam

R.Niranjana

V.B.Arun Anandraj

And peoples behind the screen. . . . .

Page 8: Completed Sovenir

HEURISKEIN‘10i 8

Contents

Technical

Microsoft crazy facts 9

The Amazing Facts of the Letter ‗A‘ 11

Green Computing 13

Technology Facts 15

Puzzles 16

Using Java to view System Properties 20

As Long As 23

How to Make Computer Operating System 24

Riddles 28

Quotations in White House 31

Computer Facts 33

Windows Shortcut Keys 34

Bot and Botnet 37

Dreams 39

Some Facts 40

Interesting but Little known Facts about Google 42

vl;lhtJ gpwtp 44

Page 9: Completed Sovenir

HEURISKEIN‘10i 9

MICROSOFT CRAZY FACTS

MAGIC #1

Nobody can create a FOLDER anywhere on the computer which can be named as

"CON".

―This is something pretty cool...and unbelievable...At Microsoft the

whole Team, couldn’t answer why this happened!”

TRY IT NOW, IT WILL NOT CREATE "CON" FOLDER

Reason: In windows the folder name and the special system variables share

the same interface, so when you create a folder with a system variable name it will

consider that folder already exist!!

these special system variables are available irrespective of path

You cannot create a folder with these names also:

CON, NUL, COM1, COM2, COM3, LPT1, LPT2, LPT3,COM1 to COM9

and LPT1 to LPT9....

CON means console, COM1 means serial port 1, and LPT1 means parallel port 1

MAGIC #2

Try it out.

Open Microsoft Word and type

‖=rand (200, 99)‖

and then press ENTER

―This is something pretty cool and neat...and unbelievable...At

Microsoft the whole Team, including Bill Gates, couldn’t answer why

this happened!”

Reason: Its not just =rand(200,99), in ms word u type same command and

replace 99 with any number below 100, u will get the result. 99 stands for Column,

how many times the sentence must be repeated in each line. that‘s it.. 200 is a

Page 10: Completed Sovenir

HEURISKEIN‘10i 10

code, call for FONT demo sentence, specially used for testing printers.

Type =rand(200,0) u will get only 5 blank pages...

MAGIC #3

For those of you using Windows, do the following:

1. Open an empty notepad file

2. Type "Bush hid the facts" (without the quotes)

3. Save it as whatever you want.

4. Close it, and re-open it.

is it just a really weird bug?

You can try the same thing above with another sentence "this app can break.

V. Pooranasoundari

(M.Sc.CT v yr)

S.P. Chandra sekar(Charted eng M I E)

C.V. Krishna Kumar(M.S, Phd)

WCT/// WEAR COTE TECHNOLOGIES

Speciality Heat Treaters Nitridium, Boron zing, Vandalizing, Chromizing, Antifriction Coating, Thermal

Coating

Wear coat technologies

No.60, SIDCO Industrial Estate

Kakalur, Thiruvallur- 602 103

Mobile: +91(0) 94441 76414/93813 82404

E-mail: [email protected]

Page 11: Completed Sovenir

HEURISKEIN‘10i 11

THE AMAZING FACTS OF THE LETTER “A”

You have to be at least 58.5 inches to be an astronaut.

Unique animals. Hippopotami cannot swim, whales can't swim backwards,

tarantulas can't spin webs, crocodiles can't chew and hummingbirds can't

walk.

Ants

Ants make up 1/10 of the total world animal tissue.

An ant can survive for up to two days underwater.

The animal with the largest brain in proportion to its size is the ant.

Ants dont sleep.

Ants taste like sweet tarts.

Americans on average eat 18 acres of pizza every day.

The weight of air in a milk glass is about the same as the weight of one

aspirin.

The gases emitted from a banana or an apple can help an orange ripen.

Adolph Hitler was a vegetarian, and had only 1, and i repeat, ONE,

testicle.

Al Gore and Tommy Lee Jones were once roommates. Thanx Rebecca

Australia has no native monkeys.

Australia's box jellyfish has toxins more potent than the venom in cobras,

and is one of the most dangerous jellyfish in the world.

Apparently 1/3 of people with alarm clocks hit the 'snooze' button every

morning, and from 25-34 age group, it is over 1/2.

Hans Christian Anderson, creater of fairy tales, was word-blind. He never

learned to spell correctly, and his publishers always had errors.

On average, Americans spend about 6 months of their lives waiting at red

traffic lights.

Page 12: Completed Sovenir

HEURISKEIN‘10i 12

There is air in space, but very little of it. In fact, it is equivalent to a

marble in a box 5 miles wide. Most of the gas is captured by the

gravitational pull of other celestial bodies.

Abdul Kassam Ismael, Grand Vizier of Persia in the tenth century, carried

his library with him wherever he went. Four hundred camels carried the

117,000 volumes.

N.R.KALAIVANI&

R.D.THIRIVENI

(M.Sc. CT V yr)

V. Nandakumar

(Director)

MILLENNIUM

Millennium Soft-Tech (India) Pvt. Ltd.

No. A-3, Nand Kishore Indl Estate,

Off- Mahakali Caves Road, Andheri (East), Mumbai – 4000093

Call: (+91 22) 2687 0202 mobile: (+91) 9841022773

e-mail: [email protected]

Page 13: Completed Sovenir

HEURISKEIN‘10i 13

GREEN COMPUTING

Green computing or green IT, refers to environmentally sustainable

computing or IT. The field of green computing is “the study and practice of

designing, manufacturing, using, and disposing of computers, servers, and

associated subsystems—such as monitors, printers, storage devices, and

networking and communications systems—efficiently and effectively with

minimal or no impact on the environment."

OPERATING SYSTEM SUPPORT

The dominant desktop operating system, Microsoft Windows, has included

limited PC power management features since Windows 95. These initially

provided for stand-by (suspend-to-RAM) and a monitor low power state. Further

iterations of Windows added hibernate (suspend-to-disk) and support for the ACPI

standard. Windows 2000 was the first NT based operation system to include

power management. This required major changes to the underlying operating

system architecture and a new hardware driver model. Windows 2000 also

introduced Group Policy, a technology which allowed administrators to centrally

configure most Windows features. However, power management was not one of

those features. This is probably because the power management settings design

relied upon a connected set of per-user and per-machine binary registry values,

effectively leaving it up to each user to configure their own power management

settings.

This approach, which is not compatible with Windows Group Policy, was

repeated in Windows XP. The reasons for this design decision by Microsoft are

not known, and it has resulted in heavy criticism Microsoft significantly improved

this in Windows Vista by redesigning the power management system to allow

basic configuration by Group Policy. The support offered is limited to a single per-

Page 14: Completed Sovenir

HEURISKEIN‘10i 14

computer policy. The most recent release, Windows 7 retains these limitations but

does include refinements for more efficient user of operating system timers,

processor power management, and display panel brightness. The most significant

change in Windows 7 is in the user experience.

MATERIALS RECYCLING

Recycling computing equipment can keep harmful materials such as lead,

mercury, and hexavalent chromium out of landfills, and can also replace

equipment that otherwise would need to be manufactured, saving further energy

and emissions. Computer systems that have outlived their particular function can

be re-purposed, or donated to various charities and non-profit organizations.

Computing supplies, such as printer cartridges, paper, and batteries may be

recycled as well.

A drawback to many of these schemes is that computers gathered through

recycling drives are often shipped to developing countries where environmental

standards are less strict than in North America and Europe.

The recycling of old computers raises an important privacy issue. The old

storage devices still hold private information, such as emails, passwords and credit

card numbers, which can be recovered simply by someone using software that is

available freely on the Internet. Deletion of a file does not actually remove the file

from the hard drive. Before recycling a computer, users should remove the hard

drive,and physically destroy it or store it somewhere safe. There are some

authorized hardware recycling companies to whom the computer may be given for

recycling, and they typically sign a non-disclosure agreement.

- S.THENMOZHI,

S.SOWMYA

(MSc CT V yr)

Page 15: Completed Sovenir

HEURISKEIN‘10i 15

TECHNOLOGY FACTS

A small airplane can fly backwards.

A car operates at maximum economy, gas-wise, at speeds between 25 and

35 miles per hour.

About 39,000 gallons of water are used to produce the average car.

Any modern jet is capable of breaking the sound barrier.

Castor oil is used as a lubricant in jet planes.

Contrary to popular belief, putting sugar in a car's gas tank will NOT ruin

its engine.

It takes six months to build a Rolls Royce and 13 hours to build a Toyota.

Kleenex tissues were originally used as filters in gas masks.

More steel in the United States is used to make bottle caps than to

manufacture automobile bodies.

Originally, BMW was an airplane engine manufacturer.

The average car produces a pound of pollution every 25 miles.

The cigarette lighter was invented before the match.

The electric chair was invented by a dentist.

The first alarm clock could only ring at 4 a.m.

To have your picture taken by the very first camera you would have had to

sit still for 8 hours.

Windmills always turn anti-clockwise. Except for the windmills in Ireland.

B.RAJEEV

(IIMCA)

Page 16: Completed Sovenir

HEURISKEIN‘10i 16

PUZZLES

1. THE OLDEST PLAYS THE PIANO:

Two MIT math grads bump into each other while shopping at Fry‘s. They

haven't seen each other in over 20 years.

First grad to the second: "How have you been?"

Second: "Great! I got married and I have three daughters now."

First: "Really? How old are they?"

Second: "Well, the product of their ages is 72, and the sum of their ages is the

same as the number on that building over there..."

First: "Right, ok... Oh wait... Hmm, I still don't know."

Second: "Oh sorry, the oldest one just started to play the piano."

First: "Wonderful! My oldest is the same age!"

How old was the first grad‘s daughter?

2. THE ROPE BRIDGE:

Four people need to cross a rickety rope bridge to get back to their camp at

night. Unfortunately, they only have one flashlight and it only has enough light

left for seventeen minutes. The bridge is too dangerous to cross without a

flashlight, and it‘s only strong enough to support two people at any given time.

Each of the camper‘s walks at a different speed. One can cross the bridge in 1

minute, another in 2 minutes, the third in 5 minutes, and the slow poke takes 10

minutes to cross. How do the campers make it across in 17 minutes?

3. ANTS ON A TRIANGLE:

There are three ants on a triangle, one at each corner. At a given moment in

time, they all set off for a different corner at random. What is the probability that

they don't collide

4. 100 DOORS IN A ROW:

You have 100 doors in a row that are all initially closed. you make 100

passes by the doors starting with the first door every time. the first time through

you visit every door and toggle the door (if the door is closed, you open it, if its

open, you close it). The second time you only visit every 2nd door (door #2, #4,

Page 17: Completed Sovenir

HEURISKEIN‘10i 17

#6). The third time, every 3rd door (door #3, #6, #9), etc, until you only visit the

100th door. What state are the doors in after the last pass? Which are open which

are closed?

ANSWERS:

SOLUTION 1:

The possible ages (factors of 72) and their sums are shown below:

Ages: Sum of ages:

1 1 72 74

1 2 36 39

1 3 24 28

1 4 18 23

1 6 12 19

1 8 9 18

2 2 18 22

2 3 12 17

2 4 9 15

2 6 6 14

3 3 8 14

3 4 6 13

We can deduce from the man‘s confusion over the building number that

this wasn‘t enough information to solve the problem. The chart shows the sum 14

twice for two different age possibilities, which would explain how knowing the

building number alone would not have given him the answer. The clue that the

―oldest one‖ started to play the piano rules out ―2 6 6‖ as an answer, because there

is no ―oldest‖. Since the first grad was certain with the piano clue, the first grad‘s

oldest daughter is 8. I‘ll leave it up to the reader to figure out why this doesn‘t

necessarily mean the second grad‘s oldest daughter was also 8.

SOLUTION 2:

To get everyone across in 17 minutes, we need get the two slowest people

across together; otherwise we are wasting too much time. Once we get them

across, how do we not make one of them walk back with the flashlight? Just have

one of the faster people already there waiting to sprint the flashlight back across.

Page 18: Completed Sovenir

HEURISKEIN‘10i 18

person A: 1 minute

person B: 2 minutes

person C: 5 minutes

person D:10 minutes

1. A & B cross. total time: 2 minutes.

C |==========================| A

D | | B

|==========================| flashlight

2. B comes back. total time: 4 minutes.

C |==========================| A

D | |

B |==========================| flashlight

3. C & D cross. total time: 14 minutes.

B |==========================| A

| | C

|==========================| D flashlight

4. A comes back. total time: 15 minutes.

A |==========================| C

B | | D

|==========================| flashlight

5. A & B cross. total time: 17 minutes.

|==========================| A

| | B

|==========================| C D flashlight

Page 19: Completed Sovenir

HEURISKEIN‘10i 19

SOLUTION 3:

Consider the triangle ABC. We assume that the ants move towards different

corners along the edges of the triangle.

Total no. of movements: 8 A->B, B->C, C->A A->B, B->A, C->A A->B, B->A,

C->B A->B, B->C, C->B A->C, B->C, C->A A->C, B->A, C->A A->C, B->A, C-

>B A->C, B->C, C->B .Non-colliding movements: 2 A->B, B->C, C->A A->C,

B->A, C->B (i.e. the all ants move either in the clockwise or anti-clockwise

direction at the same time) P(not colliding) = 2/8 = 0.25

SOLUTION 4:

You can figure out that for any given door, say door #42, you will visit it

for every divisor it has. So 42 have 1 & 42, 2 & 21, 3 & 14, 6 & 7. so on pass 1 i

will open the door, pass 2 I will close it, pass 3 open, pass 6 close, pass 7 open,

pass 14 close, pass 21 open, pass 42 close. For every pair of divisors the door will

just end up back in its initial state. So you might think that every door will end up

closed? Well what about door #9. 9 have the divisors 1 & 9, 3 & 3. but 3 is

repeated because 9 is a perfect square, so you will only visit door #9, on pass 1, 3,

and 9... leaving it open at the end. Only perfect square doors will be open at the

end.

S.PRIYA

(M.Sc.CT V yr)

Page 20: Completed Sovenir

HEURISKEIN‘10i 20

USING JAVA TO VIEW SYSTEM PROPERTIES.

import java.io.*;

class sample

{

public static void main(String arp[])

{

System.out.println("Getting the system properties using JAVA code");

System.out.println("---------------------------------------------");

String ss=System.getProperty("user.dir");

System.out.println("\nCurrent User Directory\t\t"+ss);

ss=System.getProperty("user.home");

System.out.println("\nCurrent User Home Directory\t\t"+ss);

ss=System.getProperty("awt.toolkit");

System.out.println("\nJava awt tool kit Details\t\t"+ss);

ss=System.getProperty("file.encoding");

System.out.println("\nJava Encoding Details\t\t"+ss);

ss=System.getProperty("file.encoding.pkg");

System.out.println("\nJava File Encoding Packages\t\t"+ss);

ss=System.getProperty("java.class.path");

System.out.println("\nJava Class Path Environment\n"+ss);

}

}

Page 21: Completed Sovenir

HEURISKEIN‘10i 21

OUTPUT

Other System Properties:

The following table lists the Java system properties for the supported versions of

the Java 2 Software Development Kit (J2SDK), Standard Edition:

J2SDK, version 1.3

J2SDK, version 1.4

"file.separator"

Character that separates components of

a file path. This is "/" on UNIX and

"\" on Windows.

"java.class.path"

Path used to find directories and JAR

archives containing class files.

Elements of the class path are

separated by a platform-specific

character specified in the

Page 22: Completed Sovenir

HEURISKEIN‘10i 22

path.separator property.

"java.home" Installation directory for Java Runtime

Environment (JRE)

"java.vendor" JRE vendor name

"java.vendor.url" JRE vender URL

"java.version" JRE version number

"line.separator" Sequence used by operating system to

separate lines in text files

"os.arch" Operating system architecture

"os.name" Operating system name

"os.version" Operating system version

"path.separator" Path separator character used in

java.class.path

"user.dir" User working directory

"user.home" User home directory

"user.name" User account name

YOGARAJ

(III MCA)

Page 23: Completed Sovenir

HEURISKEIN‘10i 23

AS LONG AS

Words are long as long as

dictionaries are known.....

God is long as long as

faith persist......

Age is long as long as

we count.....

Dreams are long as long as

we sleep....

Womb is strong as long as

the fetus grows.......

Earth is strong as long as

calamities occurs.....

Life is long as long as

we breathe.....

Love is long as long as

we feel......

Tears are strong as long as

the heart melts.....

Rivers are long as long as

they merge into ocean........

Thorns are long as long as

flowers are blossomed.....

Day is long as long as

sun shines.......

Night is long as long as

moon is visible.......

Every wishes are long as long as

Page 24: Completed Sovenir

HEURISKEIN‘10i 24

they are satisfied......

Journeys are long as long as

destination is known......

Problems are long as long as

solutions are found.....

Emotions are long as long as

weak heart persist.......

Heart is strong as long as

they are particle.......

Conscious is meaningful as long as

they are truthful.....

Soul is potentialised as long as

they know the stuff of life......

Death is long as long as

the soul rest........

This page is long as long as

you read ...............

R.G.SARANYA

(M.Sc.CT V yr)

HOW TO MAKE A COMPUTER OPERATING SYSTEM

An Operating System tells the computer what to do. Whether the ones you have

found don't measure up, or if you are a hobbyist wanting to have a creation to call

your own, it can be a daunting task and it may take years to get your own

operating system to be of any use. Remastering an existing Linux distro can also

be straight forward and easy. An operating system is a piece of software to

Page 25: Completed Sovenir

HEURISKEIN‘10i 25

manage and interact with the hardware effectively and provides a shell for other

programs to run on.

STEPS:

STEP 1: Decide what you want your OS to do: Whether it is a fully capable OS

with a GUI or something a bit more minimalistic, you'll need to know what

direction you are taking it before beginning.

STEP 2: Target what processor platform your operating system will support. If

you are not sure, your best bet is to target the X 86 (32 bit) processor platforms as

most computers use X86 platform processors.

STEP 3: Decide if you would rather do it all yourself from the ground up, or if

there is an existing kernel you would like to build on top of. Linux from Scratch is

a project for those that would like to build their own Linux distro.

STEP 4: Decide if you're going to create your own bootloader or a pre-created one

such as GRUB. While coding your own bootloader will give a lot of knowledge of

the hardware and the BIOS, it may set you back on the programming of the actual

kernel.

STEP 5: While it is possible to create an operating system in a language such as

Pascal or BASIC you will be better off using C or Assembly. Assembly is

absolutely necessary as some vital parts of an operating system require it. C++

contains keywords that need another fully built OS to run. Don't use it.

STEP 6: Start small. Begin with small things such as displaying text and

interrupts before moving on to things such as memory management and

multitasking.

Page 26: Completed Sovenir

HEURISKEIN‘10i 26

STEP 7: Decide on your API. While this is a long way off it is a good idea to plan

ahead. A good API to choose is POSIX, which is well documented. All Unices

have at least partial support for POSIX, so it would be trivial to port Unix

programs to your OS.

STEP 8: Decide on your design. There are monolithic kernels and microkernels.

Monolithic kernels implement all the services in the kernel, while microkernels

have a small kernel combined with user daemons implementing services. In

general, monolithic kernels are faster, but microkernels have better fault isolation

and reliability.

STEP 9: If you want an easy way. Consider Ubuntu remastersys, Fedora Revisor,

Custom NimbleX, Puppy Remaster, PCLinuxOS mklivecd, SuSE Studio[1] and

SuSE KIWI. However, the operating system you create belongs to the company

who started the service first. Although you have rights to distribute it freely,

change it and run it however you like (under the GPL).

Warnings

• Having your operating system carelessly written to the hard drive can

corrupt it completely. Be careful.

• Be sure to implement security features as your top priority if you ever want

to use it for anything.

• If you do something really stupid, like write random bytes to random I/O

ports, you *will* crash your OS, and (in theory) can fry your hardware. For

a demonstration, execute 'cat /dev/port' on Linux as root. Your computer

*will* crash.

Page 27: Completed Sovenir

HEURISKEIN‘10i 27

• Using your computer's physical drive is a BAD idea especially if you got 1

hard disk! You may damage your hard disk or destroy data that may be

valuable to you.

Things You'll Need

• A good computer

• A CPU for the Architecture you will be developing

• Enough memory (RAM) for a Virtual Machine

• A 'Host' OS, used to develop the Assembler (and others) source code, also

to build and package

it, while it is in its early stages, eventually your own OS can be its host.

• Syntax coloring code editor (use if you got no IDE)

• Most importantly, you need a compiler.

K.GANESH

(II MCA)

EAGLE EARTH MOVERS (Class I P.W.D., Railway &Pipe Line Contractor)

No.14 S.C.S. Complex,

South Car Street,

TIRUCHENGODU-637 211.

Namakkal District. Tamilnadu.

Ph:04288-253944.

E-mail: [email protected].

Page 28: Completed Sovenir

HEURISKEIN‘10i 28

RIDDLES

1. I am the beginning of the end, and the end of time and space. I am essential

to creation, and I surround every place. What am I?

2. I have as many brothers as sisters, but my brothers have twice the number

of sisters as brothers. How many of us are there?

3. Two friends were leaving the restaurant and as they passed the cashier, one

of them paid his bill but the other handed the cashier a slip of paper with

the number 1004180 written on it. The cashier studied the number for a

moment, and then let the friend pass by without paying. Why?

4. I give you a group of three. One is sitting down, and will never get up. The

second eats as much as is given to him, yet is always hungry. The third

goes away and never returns.

5. I am a box that holds keys without locks, yet they can unlock your soul.

What am I?

6. What lives in the corner but travels the world?

7. Can you think of a word that changes both number and gender when you

add the letter 'S'?

8. What do the numbers 11, 69, and 88 all have in common?

9. What word in the English language uses all five vowels plus Y in

alphabetical order and uses each one only once?

10. What is significant about the order of these numbers:

2 3 6 7 1 9 4 5 8

11. How many times can you subtract the number two from the number fifty?

12. What do you get if you add 2 to 200 four times?

13. I have as many brothers as sisters, but my brothers have twice the number

of sisters as brothers. How many of us are there?

14. After the autumn harvest there were nine ears of corn left in the farmer's

field. Each night a hungry rabbit sneaked into the field and took three ears

home with him. How many nights did it take to get all the corn?

Page 29: Completed Sovenir

HEURISKEIN‘10i 29

15. I drive at an average speed of 30 miles per hour to the railroad station each

morning and just catch my train. On a particular morning there was a lot of

traffic and at the halfway point I found I had averaged only 15 miles per

hour. How fast must I drive for the rest of the way to catch my train?

ANSWERS

1. The letter e. End, timE, spacE, Every place

2. Seven. The only possible solution is that the person talking is a woman and

there are four woman and three men.

3. The number 1004180: I owe nothing, for I ate nothing.

4. Stove, fire, smoke.

5. A piano

6. A postage stamp

7. Princes to Princess

8. They read the same backwards and forward.

9. Facetiously

10. They are in reverse alphabetical order.

11. You can subtract the number two from the number fifty only ONCE.

Because after that, the fifty becomes forty eight.

12. 202, 202, 202, 202

13. Seven. The only possible solution is that the person talking is a woman and

there are four woman and three men.

14. Nine nights. Two of the ears belonged to the rabbit.

15. The train is just about to leave the station and there is no way I will be able

to catch it this time.

K.S.JEYAKAVYA

(M. Sc. CT V yr)

Page 30: Completed Sovenir

HEURISKEIN‘10i 30

K. LOGANATHAN

NO.39, Perumalagaram,

Thiruverkadu,

Chennai- 600077

Page 31: Completed Sovenir

HEURISKEIN‘10i 31

QUOTATIONS IN WHITE HOUSE

– selected by BARACK HUSSEIN OBAMA.

“The Only Thing We Have to Fear Is Fear Itself”

– President Franklin D. Roosevelt.

“The Arc of the Moral Universe Is Long, But It Bends Towards

Justice”

– Martin Luther King Jr.

“Government of the People, By the People, For the People”

– President Abraham Lincoln.

“No Problem of Human Destiny Is Beyond Human Beings”

– President John F. Kennedy.

“The Welfare of Each of Us Is Dependent Fundamentally Upon the

Welfare of All of Us”

– President Theodore Roosevelt.

Chandra Kala. D

( III MCA)

Page 32: Completed Sovenir

HEURISKEIN‘10i 32

Page 33: Completed Sovenir

HEURISKEIN‘10i 33

COMPUTER FACTS

Bill Gates' house was designed using a Macintosh computer.

"Stewardesses" is the longest word that is typed with only the left hand.

Another name for a Microsoft Windows tutorial is 'Crash Course'!

The first computer mouse was invented by Doug Engelbart in around

1964 and was made of wood.

The world's first computer, called the Z1, was invented by Konrad Zuse

in 1936. His next invention, the Z2 was finished in 1939 and was the

first fully functioning electro-mechanical computer.

The average computer user blinks 7 times a minute, less than half the

normal rate of 20.

The first domain name ever registered was Symbolics.com.

On eBay, there is an average of $680 worth of transactions each second.

Domain names are being registered at a rate of more than one million

names every month.

The first banner advertising was used in 1994.

By the year 2012 there will be approximately 17 billion devices

connected to the Internet.

There are approximately 1,319,872,109 people on the Internet.

There are approximately 1.06 billion instant messaging accounts

worldwide.

While it took the radio 38 years and the television a short 13 years, it

took the World Wide Web only 4 years to reach 50 million users.

The first hard drive available for the Apple II had a capacity of only 5

megabytes.

B.RAJEEV

(II MCA)

Page 34: Completed Sovenir

HEURISKEIN‘10i 34

WINDOWS SHORTCUT KEY

How do I create a Windows shortcut key?

Create a shortcut

1. Open the folder or directory that contains the program you wish to create a

shortcut for.

2. Right-click on the program and click Create Shortcut.

3. This will create a shortcut named "Shortcut to <your program>" in the

directory you are in. If you wish to rename this shortcut, right-click the file

and click rename.

4. Once the above steps have been completed, you can copy or cut this

shortcut and paste it anywhere to execute this program.

Assign shortcut key to that Windows shortcut

Once the shortcut has been created to assign a shortcut key to that Windows

shortcut follow the below steps.

1. Right-click the shortcut and click Properties.

2. Click the Shortcut tab.

3. Click in the Shortcut key box and press a letter. For example, if you press

"p" the shortcut key will automatically be made Ctrl + Alt + P. Which

means if saved when pressing Ctrl and Alt and "P" all at the same time will

run that shortcut.

Windows key keyboard shortcuts

Below is a listing of Windows keys that can be used on computers running a

Microsoft Windows operating system and using a keyboard with a Windows

Page 35: Completed Sovenir

HEURISKEIN‘10i 35

key. In the below list of shortcuts, the Windows key is represented by

"WINKEY".

Shortcut Keys Description

WINKEY Pressing the Windows key alone will open Start.

WINKEY + F1 Opens the Microsoft Windows help and support center.

WINKEY + F3 Opens the Advanced find window in Microsoft Outlook.

WINKEY + D Brings the desktop to the top of all other windows.

WINKEY + M Minimizes all windows.

WINKEY +

SHIFT + M

Undo the minimize done by WINKEY + M and WINKEY +

D.

WINKEY + E Open Microsoft Explorer.

WINKEY + Tab Cycle through open programs through the taskbar.

WINKEY + F Display the Windows Search / Find feature.

WINKEY+ CTRL

+ F Display the search for computers window.

WINKEY + F1 Display the Microsoft Windows help.

WINKEY + R Open the run window.

WINKEY + Pause

/ Break key Open the system properties window.

WINKEY + U Open Utility Manager.

WINKEY + L Lock the computer (Windows XP and above only).

WINKEY + P Quickly change between monitor display types. (Windows 7)

Page 36: Completed Sovenir

HEURISKEIN‘10i 36

WINKEY+ LEFT

ARROW

Shrinks the window to 1/2 screen on the left side for side by

side viewing. (Windows 7 only)

WINKEY+

RIGHT ARROW

Shrinks the window to 1/2 screen on the right side for side by

side viewing. (Windows 7 only)

WINKEY+ UP

ARROW

When in the side by side viewing mode, this shortcut takes

the screen back to full size. (Windows 7 only)

WINKEY+

DOWN ARROW

Minimizes the screen. Also, when in the side by side

viewing mode, this shortcut takes the screen back to a

minimized size. (Windows 7 only)

M.REKHA

(MSc. CT V Year)

A.ARUMUGAM

COMPUTER OPERATOR

Government data centre

Guindy

Chennai-25

Page 37: Completed Sovenir

HEURISKEIN‘10i 37

BOTS AND BOTNET: A DISTRIBUTED THREAT

Introduction:

Bots are one of the most sophisticated and popular types of cybercrime

today. They allow hackers to take control of many computers at a time, and turn

them into "zombie" computers, which operate as part of a powerful "botnet" to

spread viruses, generate spam, and commit other types of online crime and fraud.

What is a BOT?

A "bot" is a type of malware that allows an attacker to take control over an

affected computer. Also known as ―Web robots‖, bots are usually part of a

network of infected machines, known as a “botnet‖, which is typically made up of

victim machines that stretch across the globe Since a bot infected computer does

the bidding of its master, many people refer to these victim machines as

―zombies.‖ The cybercriminals that control these bots are called botherders or

botmasters. Some botnets might have a few hundred or a couple thousand

computers, but others have tens and even hundreds of thousands of zombies at

their disposal. Many of these computers are infected without their owners'

knowledge. Some possible warning signs? A bot might cause your computer to

slow down, display mysterious messages, or even crash.

How Bots Work

Bots sneak onto a person‘s computer in many ways. Bots often spread

themselves across the Internet by searching for vulnerable, unprotected computers

to infect. When they find an exposed computer, they quickly infect the machine

and then report back to their master. Their goal is then to stay hidden until they are

instructed to carry out a task. After a computer is taken over by a bot, it can be

used to carry out a variety of automated tasks, including the following:

Sending ( spam, virus, software)

Page 38: Completed Sovenir

HEURISKEIN‘10i 38

Stealing (Credit card numbers, Bank credentials, other sensitive personal

information)

Denial of Service

Click Fraud

Protect Against Bots

To safeguard against malicious bots, security experts at Symantec offer the

following advice:

1. Install top-rated security software (such as Norton 360) and Norton

Internet Security.

2. Configure your software's settings to update automatically.

3. Increase the security settings on your browser.

4. Limit your user rights when online.

5. Never click on attachments unless you can verify the source.

6. Ensure that your system is patched with the most current Microsoft

Windows Update.

7. Set your computer‘s security settings to update automatically, to ensure

you always have the most current system patches.

Saranya. R

(III MCA)

Page 39: Completed Sovenir

HEURISKEIN‘10i 39

DREAMS

A dream is a succession of images, sounds or emotions that the mind experiences

during sleep. The content and purpose of dreams are not fully understood, though

they have been a topic of speculation and interest throughout recorded history. The

scientific study of dreams is known as oneirology.

We Only Dream of What We Know

Our dreams are frequently full of strangers who play out certain parts – did you

know that your mind is not inventing those faces – they are real faces of real

people that you have seen during your life but may not know or remember? The

evil killer in your latest dream may be the guy who pumped petrol in to your

Dad‘s car.when you were just a little kid. We have all seen hundreds of thousands

of faces through our lives, so we have an endless supply of characters for our brain

to utilize during our dreams.

Dreams Prevent Psychosis

In a recent sleep study, students who were awakened at the beginning of each

dream, but still allowed their 8 hours of sleep, all experienced difficulty in

concentration, irritability, hallucinations, and signs of psychosis after only 3 days.

When finally allowed their REM sleep the student‘s brains made up for lost time

by greatly increasing the percentage of sleep spent in the REM stage.

You Forget 90% of your Dreams

Within 5 minutes of waking, half of your dream if forgotten. Within 10, 90% is

gone. The famous poet, Samuel Taylor Coleridge, woke one morning having had a

fantastic dream (likely opium induced) – he put pen to paper and began to

describe his ―vision in a dream‖ in what has become one of English‘s most famous

poems: Kubla Khan. Part way through (54 lines in fact) he was interrupted by a

Page 40: Completed Sovenir

HEURISKEIN‘10i 40

―Person from Porlock―. Coleridge returned to his poem but could not remember

the rest of his dream. The poem was never completed.

Blind People Dream

People who become blind after birth can see images in their dreams. People who

are born blind do not see any images, but have dreams equally vivid involving

their other senses of sound, smell, touch and emotion. It is hard for a seeing person

to imagine, but the body‘s need for sleep is so strong that it is able to handle

virtually all physical situations to make it happen.

A.SIVAGAMI

(M.Sc.CT V yr)

SOME FACTS

No piece of normal-size paper can be folded in half more than 7 times.

When cats are happy or pleased, they squeeze their eyes shut.

The elephant is the only animal with 4 knees.

Each year, about 500,000 detectable earthquakes occur in the world. About

100,000 of those can be felt and about 100 of them cause damage.

The tongue is the only body muscle that is attached from one end only.

We, as humans, forget 90% of our dreams.

The percentage of people dreaming in black and white started decreasing

after the spread of color TV.

Just days before the World Cup of 1966 in England, the trophy was stolen

and then later retrieved by a dog.

The city of Portland in Oregon was named after a coin toss in 1844. Heads

for Portland and tails for Boston.

The African cicada fly spends 17 years sleeping, then wakes up for two

weeks, mates and then die.

Page 41: Completed Sovenir

HEURISKEIN‘10i 41

Pumice is the only rock that floats in water.

The shrimp's heart is in its head.

It is impossible to sneeze with your eyes open.

Your foot is the same length as your forearm.

India never invaded any country in her history.

111,111,111 x 111,111,111 = 12,345,678,987,654,321.

Natural pearls melt in vinegar.

The earth is about 6,588,000,000,000,000,000 tons in weight.

A goldfish has a memory span of about 3 months.

There are 86,400 seconds in day.

Ants never sleep.

The human brain is 80% water.

If you keep a Goldfish in the dark room, it will eventually turn white.

Chewing gum while peeling onions will reduce your tears.

There are 318,979,564,000 possible combinations of the first four moves in

Chess.

If you are right handed, you will tend to chew food on your right side. If

you are left handed, you likely to chew food on your left side.

A snail can slide over a razor blade without being hurt by producing slime

that helps it slide harmlessly.

2,520 can be divided by 1, 2, 3, 4, 5, 6, 7, 8, 9, and 10 without having a

fractional leftover.

The world record for time without sleep is 264 hours ( ~11 days) by Randy

Gardner in 1965.

February 1865 is the only month in recorded history not to have a full

moon.

B.RAJEEV

( MCA II yr)

Page 42: Completed Sovenir

HEURISKEIN‘10i 42

INTERESTING BUT LITTLE KNOWN FACTS

ABOUT GOOGLE

1. In 1997, Google’s prototype was named ―BackRub‖.

2. The name ‗Google‘ was an accident. A spelling mistake made by the original

founders who thought they were going for ‗Googol‘.

3. Google.com – The domain was registered on 15 September 1997.

4. The first ever review of the Google Search Engine was done by Danny

Sullivan of Search Engine Watch on August 4, 1998.

5. The prime reason the Google home page is so bare is due to the fact that the

founders didn’t know HTML and just wanted a quick interface. In fact it was

noted that the submit button was a long time coming and hitting the RETURN key

was the only way to burst Google into life.

6. Due to the sparseness of the homepage, in early user tests they noted people just

sitting looking at the screen. After a minute of nothingness, the tester intervened

and asked ‗What’s up?‘ to which they replied ―We are waiting for the rest of it‖.

To solve that particular problem the Google Copyright message was inserted to

act as a crude end of page marker.

7. One of the biggest leap in search usage came about when Google introduced

their much improved spell checker giving birth to the ―Did you mean…‖

feature. This instantly doubled their traffic, but they had some interesting

discussions on how best to place that information, as most people simply tuned

that out. But they discovered the placement at the bottom of the results was the

most effective area.

8. The infamous ―I feel lucky‖ is nearly never used. However, in trials it was

found that removing it would somehow reduce the Google experience. Users

wanted it kept. It was a comfort button. I’m Feeling Lucky Costs Google $110

Million a Year.

9. There are no restrictions on Googler’s dress code in the office, in which

pajama, ugly sweater and even super hero costume were on the records.

Page 43: Completed Sovenir

HEURISKEIN‘10i 43

10. Google started off its first operations in a rented Garage.

11. Google publishes variety of logos commemorating holidays and events.

The first one on the books being a self-made ―Burning Man‖ logo by the founders

themselves.

12. Google products appear in 117 type of languages, including 5 “fake”

languages like Elmer Fudd and Swedish Chef. Spanish, German, French and

Japanese are the most used search language besides English.

13. Google won the prestigious award for Technical Achievement in 2000. In

the nominees list there were no search engines at all.

14. The Google logo was never centered (as it appears today). It only appeared

centered in March 2001. It was aligned to the left earlier. (And there were a lot

more distractions then).

15. In 1999, when Google moved to their Paolo Alto office, there were only 19

employees in the company. Today there are 0ver 2,700 Googlers.

16. It will take Google 300 years to put the entire world’s information online.

17. Google reckons only 10% of the world’s information is online.

18. Google believes up to 20% of the online content changes every month.

19. According to Google, 20-25% of the search queries are unique.

20. The index of Google is 3 times larger than Yahoo’s index or MSN’s index.

21. In Google, thousands of computers are involved in processing a single

search query.

JEGANKUMAR

(MCA II YR)

Page 44: Completed Sovenir

HEURISKEIN‘10i 44

vl;lhtJ gpwtp

vLj;Jr; nry;y VJk; ,y;iy ,t;Tyfpy;

nfhLj;Jr; nry;y vy;yhk; cs;sJ ek; clypy;

,!q;F tho;e;njd;d nra;Jtpl;Nlhk;

,q;Nf tPo;e;Jk; gadha; khwpLNthk;

VO gpwtp cz;ikahdhy; gilj;jpLNthk;

GJik vl;lhtJ gpwtp

ehk; kz; kPJ Mir nfhs;s

kz; ek; kPJ Mir nfhs;s

,Wjpapy; kz;Nz ntw;wp nfhs;s

mk;kz;Zk; ek;kplk; Njhy;tp nfhs;s

kUj;Jtj;jpw;F gadha; ek; nghd;Dly;

nra;jpLNthk; cly; jhdk;.

gh. uh[Pt;

,uz;lhk; Mz;L vk;.rp.V

?

?

!

?....

Page 45: Completed Sovenir

HEURISKEIN‘10i 45

?...

??....

??

??

!

! ??....

!

!

!!

??...

!

!

!....

! !

!

!

!

!! –

Page 46: Completed Sovenir

HEURISKEIN‘10i 46

PAPERS FROM PARTICIPANTS

AUDIO STEGANOGRAPHY BY MODIFIED LSB ALGORITHM AND

STRONG ENCRYPTION KEY

POOSHPARAJ. P, IFET COLLEGE OF ENGINEERING

In the current internet community, secure data transfer is limited due to its

attack made on data communication. So more robust methods are chosen so

that they ensure secured data transfer. One of the solutions which came to the

rescue is the audio Steganography. But existing audio steganographic systems

have poor interface, very low level implementation, difficult to understand and

valid only for certain audio formats with restricted message size. Enhanced

Audio Steganography (EAS) is one proposed system which is based on audio

Steganography and cryptography, ensures secure data transfer between the

source and destination. EAS uses most powerful encryption algorithm

in the first level of security, which is very complex to break. In the second

level it uses a more powerful modified LSB (Least Significant Bit) Algorithm

to encode the message into audio. It performs bit level manipulation to encode

the message. The basic idea behind this paper is to provide a good, efficient

method for hiding the data from hackers and sent to the destination in a safer

manner. Though it is well modulated software it has been limited to certain

restrictions. The quality of sound depends on the size of the audio which the

user selects and length of the message. Though it shows bit level deviations in

the frequency chart, as a whole the change in the audio cannot be determined.

3G TECHNOLOGIES

A.Krithika S.Karunya Bannari Amman Institute of Technology

3G or the third-generation wireless refers to near future developments in

personal & business wireless technology, especially relating to mobile

communications. 3G or The Third Generation will usher in many benefits as

roaming capability, broad bandwidth and high speed communication (upwards

of 2Mbps).

Network operators & telecommunications service providers are embracing the

recently adopted global third generation (3G) wireless standards in order to

Page 47: Completed Sovenir

HEURISKEIN‘10i 47

cater to emerging user demands and to offer new services to their customers.3G

wireless technology represents a shift from voice-centricservices to

multimedia-oriented like video, voice, data, fax services.

As the telecommunication industry moves forward, the International

Telecommunication Union (ITU) has proposed 3G telecommunication

standards to ensure the cost-effective availability of high-bandwidth, high-

quality, wireless multimedia applications and the mobile communications.

Based on the International Telecommunication Union, 3G is a third generation

mobile phone technology and it is also referred UMTS (Universal Mobile

Telecommunications System). 3G offers more great features, services and

more capacity to the mobile phone operators. Today, approximately 200 3G

networks are operating in more than 40 countries of the world and there are

millions of the 3G subscribers in the world.

CLOUD COMPUTING

SHANMUGA PRABHU.J, VIVEKANANTHAN.V MADURAI KAMARAJ UNIVERSITY,

Cloud computing is a computing paradigm in which task are assigned to a

combination of connections, software‘s and services accessed over a network. The

term ―cloud‖ is the large collection of ATM Networks.

Cloud computing enables user to access super computing level using a

client or other access point like an iphone, laptops etc. user can reach in to the

cloud when they are in need of resources. For this reason cloud computing is also

called as ―on-demand computing‖.

Page 48: Completed Sovenir

HEURISKEIN‘10i 48

BRAIN CONTROLLED ARTIFICIAL LEGS

K.Jamunadevi,T.Lavanya, SENGUNTHAR ENGINEERING COLLEGE,

This paper describes a brain controlled robotic leg which is designed to

perform the normal operations of a human leg. After implanting this leg in a

human, the leg can be controlled with the help of user‘s brain signals alone.

This leg behaves similar to a normal human leg and it can perform operation

like walking, running, climbing stairs etc. The entire system is controlled with

the help of advanced digital signal processors. The signals are taken out from

the human brain with the help of electroencephalography technique.The person

can perform operations like walking, running etc just by their thought.

This system will be very much suitable for those who lost their legs in

accidents and the proposed system is hundred percent feasible in the real time

environment with the currently available technology. The Brain Controlled

Artificial Legs are very much cost effective when compared to the normal

Artificial legs which is available in the market. The reduction in cost of the

proposed system is found to be very high when compared to the existing

system. Moreover, the user can have full control over the artificial legs which is

not possible in the existing system.

Page 49: Completed Sovenir

HEURISKEIN‘10i 49

RAUNAQ STEELS TRADING PVT.LTD.

New No.45(24),Venkata maistry Street,

1st floor,Mannady,

Chennai-600001

KAPIL AGENCIES NO.72,Sembudoss street,Chennai-600001

Specialists In: Structurals like Angels, Channels, Beams, Rebars Etc.

KAPIL METAL PROCESSING INDUSTRIES PVT LTD UNIT I:126,MANALI,PONNERI ROAD

UNIT II:VELLIVAYAL CHAVADI

H.O:044-25225443/42163020.FAX:25224666

E-Mail:[email protected]

Page 50: Completed Sovenir

HEURISKEIN‘10i 50

WITH BEST COMPLIMENTS

FROM

P.S.KRISHNAMURTHY STEELS PVT LTD

DEALERS IN SAIL,VIZAK STEEL(RINL),JSW&ESSAR

TMT BARS|ANGELS|CHANNELS|JOIST|CR SHEETS |HR SHEETS

MS PLATES|MS ROUNDS|SPL.STEEL ROUNDS

PSK TMT STRONG . . .

OUR STEEL MANUFACTURING COMPANIES

THANGAM STEELS LTD, Gummidipoondi VAIBHAV MERCANTILE LTD, Gummidipoondi

PARAMESWARA MANGALAM STEELS PVT LTD, Trichy

Manufactures of PSK TMT ISI Roads &MS Rounds

#C 36, 3rd Floor, 2nd Avenue,

Anna Nagar,

Chennai - 600040.

E mail : [email protected]

Phone: 044 - 4289 9200 (59 lines)

Fax : 044 - 4289 9232

Mobile No: 98410 43851

Page 51: Completed Sovenir

HEURISKEIN‘10i 51

WITH BEST COMPLIMENTS

FROM

Y-213,

2nd Avenue,

Anna Nagar,

Chennai - 600 040.

Phone : + 91-044 42171512

Email : info@coremindtechnologies

Page 52: Completed Sovenir

HEURISKEIN‘10i 52

Page 53: Completed Sovenir

HEURISKEIN‘10i 53

Page 54: Completed Sovenir

HEURISKEIN‘10i 54

The strength of the team

is each individual member...

The strength of each member

is the team.

-Phil Jackson