Thursday, November 18, 2010

UNICEF Awaaz Do campaign


The landmark passing of the Right of Children to Free and Compulsory Education (RTE) Act 2009 marks a historic moment for the children of India.  For the first time in India’s history, children will be guaranteed their right to quality elementary education by the state with the help of families and communities.

Few countries in the world have such a national provision to ensure child-centered, child-friendly education to help all children develop to their fullest potential. There were an estimated eight million six to 14-year-olds in India out-of-school in 2009.

The world cannot reach its goal to have every child complete primary school by 2015 without India.
India’s education system over the past few decades has made significant progress. According to India’s Education For All Mid Decade Assessment, in just five years between 2000 and 2005, India increased primary school enrolment overall by 13.7 per cent and by 19.8 per cent for girls, reaching close to universal enrolment in Grade 1.

Even with these commendable efforts, one in four children left school before reaching Grade 5 and almost half before reaching Grade 8 in 2005. Learning assessments show the children who do remain in school are not learning the basics of literacy and numeracy or the additional skills necessary for their overall development. 
Fast Facts
Out-of-School Children: The number of out-of-school children has declined from 25 million in 2003 to 8.1 million in mid–2009. The most significant improvements have been in Bihar, Jharkhand, Manipur and Chhattisgarh. The percentage of out-of-school children in highly populated states like Uttar Pradesh, West Bengal, Orissa and Bihar remains a cause of concern.
Social Inclusion: Although there have been significant improvements in the proportion of children from socially disadvantaged groups in school, persistence gaps remain. Girls are still less likely to enroll in school than boys; in 2005, for upper primary school (Grades 6-8) girls’ enrolment was still 8.8 points lower than boys, for Scheduled Tribes (ST) the gender gap was 12.6 points and 16 points for Scheduled Castes (SC). 

In addition, ST and SC children are less likely to access their right to 8 years of schooling; the drop-out rate for ST children being 62.9% and 55.2% for SC children compared to a national average of 48.8% leaving school before completing Grade 8. 
Teachers: Children have the right to have at least 1 qualified and trained teacher for every 30 pupils. Currently, the national average is about 1 teacher to every 34 students, but in states such as Jharkhand, Madhya Pradesh and West Bengal 1 teacher works with more than 60 students. 

Approximately 1.2 million additional teachers need to be recruited to fill this gap. Currently, about 1 in 5 primary school teachers do not have the requisite minimum academic qualification to ensure children’s right to quality learning.

Sanitation: 84 out of 100 schools have drinking water facilities overall in India. But nearly half the schools in Arunachal Pradesh, Assam and Meghalaya do not. Sixty-five out of 100 schools have common toilets in India; however only one out of four schools in Arunachal Pradesh, Assam, Chandigarh, Delhi, Jammu & Kashmir, Jharkhand, Orissa and Rajasthan have this facility.

Fifty-four out of 100 schools have separate toilets for girls. On average, only one in nine schools in Assam, Meghalaya, Manipur have separate toilets and one in four schools in Bihar, Chhattisgarh, Jammu & Kashmir, Jharkhand and Orissa.
Key Issues
The RTE Act will be in force from 1 April. Draft Model Rules have been shared with states, which are required to formulate their state rules and have them notified as early as possible.

RTE provides a ripe platform to reach the unreached, with specific provisions for disadvantaged groups, such as child labourers, migrant children, children with special needs, or those who have a “disadvantage owing to social, cultural economical, geographical, linguistic, gender or such other factor.”

RTE focuses on the quality of teaching and learning, which requires accelerated efforts and substantial reforms. 
Creative and sustained initiatives are crucial to train more than one million new and untrained teachers within the next five years and to reinforce the skills of existing teachers to ensure child-friendly education.

Bringing eight million out-of-school children into classes at the age appropriate level with the support to stay in school and succeed poses a major challenge. Substantial efforts are essential to eliminate disparities and ensure quality with equity. For example, investing in preschool is a key strategy.
Families and communities also have a large role to play to ensure child-friendly education for each and every one of the estimated 190 million girls and boys in India who should be in elementary school today.

School Management Committees, made up of parents, local authorities, teachers and children themselves, will need support to form School Development Plans and monitoring. The inclusion of 50 per cent women and parents of children from disadvantaged groups in these committees should help overcome past disparities.
UNICEF in Action
India’s past achievements in education indicate it is possible to reach the goals set forth in RTE. Building on the achievements of Sarva Shiksha Abhiyan, UNICEF will continue to work with the government and other partners at community, state and national levels to promote child friendly schools and systems across the country through RTE.
UNICEF is committed to ensuring all children to have access to quality education and complete their schooling. UNICEF works with its partners to improve children’s developmental readiness to start primary school on time, especially for marginalized children.

Technical support on education quality, school retention and achievement rates are also given. UNICEF is also working to reduce gender and other disparities to increase access and completion of quality basic education. In emergencies, UNICEF helps to restore education to affected populations.

Monday, November 1, 2010

BIRTHDAYS CAN CHANGE THE WORLD

BIRTHDAYS CAN CHANGE THE WORLD.
There are a billion people living without clean water. Four Septembers ago, we had a crazy idea. We asked our friends to give up their birthdays and ask for donations instead of gifts. We used 100% of the money raised to build water projects. Every year, it got bigger. We've now helped over a million people get clean water. This September, join us again. Watch the Trailer. Start a campaign. Give up your birthday. It can change the world.


Right now, almost a billion people on the planet don’t have access to clean, safe drinking water. That’s one in eight of us.



Unsafe water and lack of basic sanitation cause 80% of diseases and kill more people every year than all forms of violence, including war. Children are especially vulnerable, as their bodies aren't strong enough to fight diarrhea, dysentery and other illnesses.

90% of the 42,000 deaths that occur every week from unsafe water and unhygienic living conditions are to children under five years old. Many of these diseases are preventable. The UN predicts that one tenth of the global disease burden can be prevented simply by improving water supply and sanitation.
charity: water is a non-profit organization bringing clean, safe drinking water to people in developing nations. We use 100% of public donations to directly fund sustainable water solutions in areas of greatest need. Just $20 can give one person clean water for 20 years.


charity: water 2010 September Campaign: Clean Water for the Bayaka from charity: water on Vimeo.

Saturday, October 30, 2010

Vote for Humanity



Once a rising star, chef now feeds hungry



STORY HIGHLIGHTS
  • Narayanan Krishnan has served more than 1.2 million meals to India's homeless, destitute
  • He founded nonprofit trust after seeing homeless man eating "his own human waste"
  • Krishnan had been a young, award-winning chef bound for five-star hotel group
  • Click Here to vote

Madurai, India  -- Narayanan Krishnan was a bright, young, award-winning chef with a five-star hotel group, short-listed for an elite job in Switzerland. But a quick family visit home before heading to Europe changed everything.
"I saw a very old man eating his own human waste for food," Krishnan said. "It really hurt me so much. I was literally shocked for a second. After that, I started feeding that man and decided this is what I should do the rest of my lifetime."

Krishnan was visiting a temple in the south Indian city of Madurai in 2002 when he saw the man under a bridge. Haunted by the image, Krishnan quit his job within the week and returned home for good, convinced of his new destiny.

"That spark and that inspiration is a driving force still inside me as a flame -- to serve all the mentally ill destitutes and people who cannot take care of themselves," Krishnan said.
Krishnan founded his nonprofit Akshaya Trust in 2003. Now 29, he has served more than 1.2 million meals -- breakfast, lunch and dinner -- to India's homeless and destitute, mostly elderly people abandoned by their families and often abused.


Krishnan said the name Akshaya is Sanskrit for "undecaying" or "imperishable," and was chosen "to signify [that] human compassion should never decay or perish. ... The spirit of helping others must prevail for ever." Also, in Hindu mythology, Goddess Annapoorani's "Akshaya bowl" fed the hungry endlessly, never depleting its resources.
Krishnan's day begins at 4 a.m. He and his team cover nearly 125 miles in a donated van, routinely working in temperatures topping 100 degrees Fahrenheit.

He seeks out the homeless under bridges and in the nooks and crannies between the city's temples. The hot meals he delivers are simple, tasty vegetarian fare he personally prepares, packs and often hand-feeds to nearly 400 clients each day.

Krishnan carries a comb, scissors and razor and is trained in eight haircut styles that, along with a fresh shave, provide extra dignity to those he serves.

He says many of the homeless seldom know their names or origins, and none has the capacity to beg, ask for help or offer thanks. They may be paranoid and hostile because of their conditions, but Krishnan says this only steadies his resolve to offer help.

"The panic, suffering of the human hunger is the driving force of me and my team members of Akshaya," he said. "I get this energy from the people. The food which I cook ... the enjoyment which they get is the energy. I see the soul. I want to save my people."


Note:Voting continues until Thursday November 18, 2010 (6 a.m. ET).The CNN Hero of the Year will be revealed Thanksgiving night, November 25, during "CNN Heroes: An All-Star Tribute."

Thursday, August 19, 2010

SAGESSE 2K10

DMI COLLEGE OF ENGINEERING

DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING


SAGESSE 2K10 is a national level technical symposium organized by the department of Computer Science and Engineering Of DMI College of Engineering. It has been a platform for the students to exhibit their knowledge, creativity and teamwork.

 SAGESSE 2k10 is the annual technical fest of the CSE and provides a common platform for students to exhibit their technical caliber. It witnesses massive participation every time with students pouring across from all over nation to take part in what one could call the celebration of electronics. 




           

  This technical extravaganza has been meticulously planned, well in advance and on a large scale, with over 7 events spread across technical and non technical domains. SAGESSE caters to the varied interests of students, having diverse events to fulfill the wishes of the technically inclined and also the non technical which will add to the pizzazz of the hour.





LIST OF EVENTS:
v      PAPER PRESENTATION
v      DEBUGGING
v      PROGRAMMING RELAY
v      TECHNICAL QUIZ
v      ADZAP
v      GAMING
v      WEB DESGINING
v      JAM (JUST A MINUTE)

RULES FOR THE FOR THE EVENTS:
v      GENERAL RULES:
·         PER PARTICIPANT CAN PARTICIPATE ONLY IN 3 EVENTS.
·         REGISTRATION NEEDED FOR ALL THE EVENTS TO PARTAKE.
·         ALL THOSE WHO PARTICIAPTE WILL RECEIVE A PARTICIPATION CERTIFICATE.

v      APRESENTACAO -PAPER PRESENTAION- VENUE: (AUDITORIUM) apresentaĆ§Ć£o
·         The topic for the paper presentation should abide with the given topics/ topics of their interest.
·         The format for the abstract should be in IEEE format with
Font-Times new Roman
Font size-12 pt
Line Spacing-1.5 pt
All margins-1”
Text Alignment- Justified                                                                                                 ·       The time for presenting the paper is 8mins + 2mins for cross questioning.
·        The abstract should be intimated before a week of the symposium commencement. 2 hard copies and a soft copy to be mailed.
·       Team: only 3 members are permitted

v      BUG ‘O’ BUG-DEBUGGING: VENUE (Class II CSE A)
·         Prelims will be conducted with no choices and the duration will be 20mins for 15questions.
·         Finals will be conducted with questions of no choices and the time duration will be 30mins for 40 questions.
·         Questions will be from C, Embedded Systems, Java and logic gates.
·         Team: only 2 permitted
  
v      PROGRAMMING TURNO- PROGRAMMING RELAY : VENUE (II CSE B)
·         Prelims will be conducted with outputs of a program and participant must write the exact code for it. 5 outputs for 20mins.
·         Finals will be conducted with 10 outputs to be constructed to code within 40mins.
·         Team: only two permitted.

v      TECH-WIZ –TECHNICAL QUIZ: VENUE (Prelims : IV CSE B) FINALS (AUDITORIUM)
·         Prelims will be conducted with 20 questions of no choices.
·         No discussion with other teams during prelims.
·         Finals will be conducted with 4 rounds of questions.
·         Team: 3 only permitted per team.

v      ZAP4WIN- ADZAP VENUE (Prelims : IV CSE A) FINALS (AUDITORIUM)
·         Prelims will be conducted. Performance time will be 3mins.
·         Vernacular allowed but with no abuse of any sort.
·         Abusive and sarcastic actions are in grounds to disqualification.
·         Finals will be conducted with a stage performance of 6mins + 3mins for preparation.
·         Team: only 4 permitted per team.

v      ARMAGEDDON-GAMING: VENUE ( Computer Lab 1)
·        Prelims will be conducted in NFS and Encounter Strike simultaneously.
·        Based on best timings participants will be selected.
·        Finals will be conducted only in one game.
·        No cheat codes are allowed, if found they can be disqualified irrespective of their progress in the game.
·        Team: only 2 permitted on a team

v      CYBER DESIGN-WEB DESIGNING: VENUE (Computer Lab 2)
·        Web presentations should be composed at the spot using any platform of their choice (for instance: Dream Weaver, Flash, ADOBE Photoshop)
·        No prelims. Best page will be selected.
·        Preparation time will be 20mins.
·        Team: only 2 permitted per team

v      JAM (Just A Minute): VENUE (III CSE A) FINALS (AUDITORIUM)
·          Prelims will be save your soul round/mock interview.
·         Finals will be block and tackle.
                              ·         Team: Individual participation. 



Follow Us: Twitter

Tuesday, August 10, 2010

Anna University Revaluation Results

Anna University Revaluation Results

anna Anna University Revaluation Results

Anna University

Anna University is one of India’s premier engineering universities. Established in 1978, it offers higher education in Engineering, Technology and Allied Sciences.
Anna University Revaluation Results for UG/PG May – June 2010 has been announced.

Sunday, July 11, 2010

Morning Ring Around the Sun





The unusual phenomenon of a ring around the Sun could be seen, which seems to have first been sighted and officially called in by a dawn-treading sailor.

Some people who have viewed the rings, mock suns, sun dogs, or other related atmospheric phenomena have wondered if there were "some strange rays" being given off by the Sun or the Moon.

NOAA tells us that the Sun-ring, typically a harbinger of forthcoming rains, is a ring of colored or white light seen to be encircling the Sun, or at other times colorful arcs or spots, when viewed through the lens of an ice crystal cloud formed of high-atmosphere cirrus occurring at least 25,000 feet above the surface of the Earth. The angle of observation needed is about 22°.

The Sun-rings can be formed of the refraction of either solar or lunar light and occur regularly on a global scale.

While a Sun-ring (or Moon-ring) does not have much to do with predicting snowfall in the Winter, in the Spring and Summer it is an accurate predictor of rains to arrive in approximately 12 to 18 hours. The cirrus clouds in question usually come before a warm front. The rain that is "predicted" to fall is usually going to be a long, slow rainfall.

There can occur, however, a different ring called a "great halo", and the great halo is much more rare, appearing at an angle of observation of 46° from the Sun or Moon. With the great halo, the refracted light enters the top of the ice crystals to emerge from one of the sides; it can also enter through the sides of the crystals and then emerge from their bottom sides.

The sun was surrounded by an extraordinarily bright, rainbow-colored halo. Flanking it both left and right were two brilliant, comet-shaped rainbow-colored sun dogs or mock suns (technically known as parhelia from Greek words meaning "beside the sun").

Tuesday, July 6, 2010

computer science Question papers

Anna University, Computer science
7th SEM Question Papers

Degree /Branch: B.E. Computer Science and Engineering

Internet Programming QUESTION PAPER
Download

Cryptography & Network Security QUESTION PAPER
Download

Object Oriented & Analysis Design QUESTION PAPER


Total Quality Management 
QUESTION PAPER





C# & .Net  QUESTION PAPER
Download

Digital Signal Processing 
QUESTION PAPER

Thursday, July 1, 2010

Antivirus List

The free antivirus are: AVG, Avira, Spyware Terminator, PC Tools AntiVirus, BitDefender 10, Rising, DriveSentry, avsat, Comodo, Moon Secure and Blink.

The commercial antivirus: KAV, Bitdefender, Norton, CA, NOD32, Panda, McAfee, F-Secure, Trend Secure, TrustPort, G Data, Smart Security, ZoneAlarm, One LiveCare, KIS, Norman and QuickHeal.

1. PC Tools AntiVirus Free Edition 4.0.0.26 (freeware
Total memory usage during idle: 5680K
Total memory usage during scanning: 23948K
Cannot detect private trojan
Link: http://www.pctools.com/free-antivirus/
2. Norton Antivirus 2009 (shareware
Total memory usage during idle: 6000K
Total memory usage during scanning: 51312K
Cannot detect private trojan
Link: http://www.symantec.com/norton/antivirus
3. Kaspersky Antivirus 2009 v8.0.0.357 (shareware) 
Total memory usage during idle: 6565K
Total memory usage during scanning: 50892K
Detects private trojan through heuristic method, not through virus definition
Link: http://www.kaspersky.com/kaspersky_anti-virus
4. Spyware Terminator v2.2.3.444 (freeware) 
Total memory usage during idle: 7624K
Total memory usage during scanning: 64292K
Unable to detect virus with the built-in antivirus. However when tried to run the trojan, HIPS picks it up as a threat
Uses ClamAV for antivirus protection
Link: http://www.spywareterminator.com/
5. Norton AntiVirus 2008 (shareware) 
Total memory usage during idle: 8424K
Total memory usage during scanning: 78008K
Cannot detect private trojan
Link: http://www.symantec.com/norton/antivirus
6. BitDefender 10 Free Edition (freeware) 
Total memory usage during idle: 9668K
Total memory usage during scanning: 42492K
Cannot detect private trojan
Link:http://download.bitdefender.com/windows/desktop/free/final/en/bitdefender_free_v10.exe
7. Avira AntiVir Personal 8 (freeware) 
Total memory usage during idle: 10072K
Total memory usage during scanning: 70072K
Detects private trojan through heuristic method, not through virus definition
Link: http://www.free-av.com/
8. Kaspersky Internet Security 2009 v8.0.0.3578 (shareware) 
Total memory usage during idle: 16180K
Total memory usage during scanning: 44216K
Detects private trojan through heuristic method, not through virus definition
Link: http://www.kaspersky.com/kaspersky_internet_security
9. Rising Antivirus 20.44 (freeware) 
Total memory usage during idle: 16252K
Total memory usage during scanning: 59704K
Cannot detect private trojan through virus definition but blocks it from executing
Link: http://www.freerav.com/
10. DriveSentry 3.1 (freeware) 
Total memory usage during idle: 16992K
Total memory usage during scanning: 18504K
Cannot detect private trojan
Link: http://www.drivesentry.com/
11. avast! 4 Home Edition (freeware) 
Total memory usage during idle: 23100K
Total memory usage during scanning: 63416K
Cannot detect private trojan
Link: http://www.avast.com/eng/avast_4_home.html
12. CA Anti-Virus 2008 (shareware) 
Total memory usage during idle: 37756K
Total memory usage during scanning: 47556K
Cannot detect private trojan
Link: http://shop.ca.com/virus/antivirus.aspx
13. AVG Anti-Virus Free Edition 8.0.138 (freeware) 
Total memory usage during idle: 38244K
Total memory usage during scanning: 88244K
Detects private trojan through virus definition. Maybe they got a sample of the private trojan and added the detection to its virus definition
Link: http://free.avg.com/
14. ESET NOD32 Antivirus 3.0.669 (shareware) 
Total memory usage during idle: 40364K
Total memory usage during scanning: 46012K
Cannot detect private trojan
Link: http://www.eset.com/products/nod32.php
15. ESET Smart Security 3.0.669 (shareware) 
Total memory usage during idle: 42640K
Total memory usage during scanning: 39284K
Cannot detect private trojan
Link: http://www.eset.com/smartsecurity/
16. Trend Micro AntiVirus plus AntiSpyware 2008 (shareware) 
Total memory usage during idle: 42608K
Total memory usage during scanning: 63704K
Able to detect private trojan as suspicious activity and blocked it from executing
Link: http://apac.trendmicro.com/apac/products/personal/antivirus-plus-anti-spyware/
17. ZoneAlarm Antivirus 7.0.483 (shareware) 
Total memory usage during idle: 52772K
Total memory usage during scanning: 97200K
Cannot detect private trojan
Link:http://www.zonealarm.com/store/content/catalog/products/zonealarm_antivirus.jsp
18. BitDefender Antivirus 2008 v11 (shareware) 
Total memory usage during idle: 56440K
Total memory usage during scanning: 73720K
Able to detect private trojan as threat
The free version uses BitDefender v10 and the shareware version uses the latest v11. So I had to make a comparison on both BitDefender products.
Link: http://www.bitdefender.com/PRODUCT-2194-en–BitDefender-Antivirus-2008.html
19. Comodo AntiVirus 2.0.17.58 (freeware) 
Total memory usage during idle: 56668K
Total memory usage during scanning: 76668K
Unable to detect virus through its virus definition. However when tried to run the trojan, HIPS picks it up as a threat.
Link: http://antivirus.comodo.com/
20. Trend Micro Internet Security 2008 (shareware) 
Total memory usage during idle: 59140k
Total memory usage during scanning: 79688K
Able to detect private trojan as suspicious activity and blocked it from executing
21. F-Secure Anti-Virus 2008 (shareware) 
Total memory usage during idle: 61972K
Total memory usage during scanning: 178824K
Cannot detect private trojan
Link: http://www.f-secure.com/home_user/products_a-z/fsav2008.html
22. Moon Secure Antivirus 2.2.2.163 (freeware) 
Total memory usage during idle: 71528K
Total memory usage during scanning: 71528K
Cannot detect private trojan
No changes in memory usage during idle and scanning
Uses Clam Antivirus engine and definition
Link: http://www.moonsecure.com/
23. Panda Antivirus 2008 (shareware) 
Total memory usage during idle: 76344K
Total memory usage during scanning: 101416K
Cannot detect private trojan
Link: http://www.pandasecurity.com/malaysia/homeusers/solutions/antivirus/
24. McAfee VirusScan Plus 2008 (shareware) 
Total memory usage during idle: 87632K
Total memory usage during scanning: 140484K
Detects private trojan as backdoor program
Link: http://us.mcafee.com/root/package.asp?pkgid=276
25. Norman Antivirus & Antispyware (shareware) 
Total memory usage during idle: 99856K
Total memory usage during scanning: 201660K
Cannot detect private trojan
Link: http://www.norman.com/Product/Home_Home_office/NVC/49922/
26. Windows One LiveCare 2.5 (shareware) 
Total memory usage during idle: 102868K
Total memory usage during scanning: 107868K
Cannot detect private trojan
Link: http://onecare.live.com/site/en-us/default.htm
27. eEye Blink 4.04 Personal Edition (shareware) 
Total memory usage during idle: 117972K
Total memory usage during scanning: 131412K
Cannot detect private trojan
Free 1 year license for US/Canada residents
Link: http://www.blinkfree.com/
28. G DATA AntiVirus 2008 (shareware) 
Total memory usage during idle: 130544K
Total memory usage during scanning: 175176K
Cannot detect private trojan
Link: http://www.gdata.de/trade/US/productview/819/16/
29. Quick Heal AntiVirus Plus 2008 v9.50 (shareware) 
Total memory usage during idle: 151660K
Total memory usage during scanning: 201660K
Cannot detect private trojan
Link: http://www.quickheal.co.in/small-desktop-edition-win.asp