Tuesday, July 17, 2012

Durgapur Football League:

Football has always remained a passionate sport for the people of West Bengal. We witness a lot of enthusiasm for football in the daily evening matches in the neighbourhood as well as when we have World Cup.
One of the fastest developing Eastern Indian Cities, Durgapur, has experienced a lot capital investment on its demography and geography in terms of business. Industries like Steel Authority of India Limited (SAIL), Damodar Valley Corporation (DVC), Durgapur Projects Limited (DPL), etc have been making attempts to promote sports and culture events.
The plan of organising a tournament, which will be, by the youth, for the youth and of the youth, was conceptualized by a B-Tech student Sibendra Mallick. His idea was supported by his friends who are also college students and thus “Durgapur Football League” was born.
THE RISING: Durgapur Footbal League was held for the first time in the year 2010 in the “Nemai Adhikary Ground” (Beside Zoom International School) with 8 teams battling against each other for a decent prize money. The tournament was organized by and dedicated to collegiates. The league became a very popular one and received support and appreciation from various corners of the society.
The 2010 chapter was a humble beginning with a few volunteers, few spectators and few teams which happened to be both registered and unregistered. Thus, a platform was created in order to lift up the inherent talents of players who did not get opportunities to play in the registered tournaments held held under the supervision of registered clubs.  The 200 Champion was D.N.B, followed by the first runner up G.H.Y.C. (Bidhannagar), and the third position was secured by Tarun Sangha from C.M.E.R.I. Colony.
THE FIGHT AGAINST  CRISIS:
After the massive success and popularity of “Durgapur Football League”  in 2010, the league was again organized in 2011 by the same college students at the same venue. This time it grew bigger and was much better organized and systematic. “The Telegraph” supported the organizers by featuring the tournament in the regional newsletter “WAVE” which was a milestone achievement for the Tournament. 2011 version features 12 teams, not only from Durgapur alone, but also from the outskirts like Ukhra and Chatimtala. Well known teams, such as Tansen, Sector 2C and Dishari Sangha also participated in the league. The champion position of 2011 was bagged by Sector 2C (Bidhannagar). The first runner up was once again bagged by G.H.Y.C. and the third position was grabbed by “Red Devils”.
July 2012 will witness yet another spectacular version of the “Durgapur Football League”. This year will be a much bigger and much better event with 16 teams participating from various towns of the district of Burdwan. The price money is Jackpot for the Champions and the 2 runners up. 1st to 8 th July, 2012 will be a bonanza for the football lovers of Durgapur and a time segment for the young talents of the city to come up and showcase their skills and potential to the senior players and veterans. We believe that it will be a successful tournament.
What So Special about 2012? 2012 has got a lot of things for you. Those college students have now registered themselves under the name of “PlayTrack Public Charitable Trust” and now have an entity and an identity in the society.
Teams for “DURGAPUR FOOTBALL LEAGUE” 2012 are as under:
  1. Vivek Sangha:B-Zone
  2. Derozio Athletic Boys: Bidhannagar.
  3. Third Street
    : Panagarh
  4. Soccer Maniacs: Gandhimore
  5. Insane Vipers:
    Dayananda Avenue
  6. Hostel Avenue (A) : A-Zone
  7. Hostel Avenue (B): A-Zone
  8. Tansen (A) : B-Zone
  9. Tansen (B) : B-Zone
  10. Srijani: City Centre
  11. Young Benga: Benachity
  12. Dishari : A-Zone

2012 will not only witness “Durgapur Football League” but also “Verve”: a rock concert to be held on the 12th of July at the Srijoni Auditorium, featuring 5 bands from various regions of West Bengal and Sikkim.  




 

Thursday, March 15, 2012

Railway Budget 2012.
A very progressive budget keeping in view for the future of the railways. The increase in fare after nine years is quite estimated. To maintain safeety and security of the passengers, to maintain the progress of the railways in the coming years and also to make it a profitable organisation is what Dinesh Trivedi has done. Indian Railways reqires more staff to maintain its organisational requirement, so they are going to recruit about one lakh staff in the comming year. Besides the aspiration from various states for there share from the Railways, conversion of one line to two liners and two to three lines are what require a lot of finances.  Better safety, better Security, more trains, more lines, more jobs but no fare increase will be a miracle. Moreover the increase is quite marginal after nine years compared with the increase in each and every commodities price in the past nine years.    
Give your own views about the Railway Budget 2012 in the comments.

Saturday, February 18, 2012

A thief in your PC

A software program enters a computer uninvited and unannounced, to spy on the web-surfing habits of the user and download email contacts. Another program hijacks a mobile phone to dial fee-based mobile services, the phone owner oblivious to what’s going on-until the bill comes in. yet another invades a home computer and uses it as a tool to steal something from a company’s database on the other side of the world.
Now, they’re coming without warning. Malicious turns 25 this year- has quietly changed in its origins, character and intent. The first computer virus, written by a high-school student in the US in 1982, simply copied itself and unleashed poetry on its target computers. Similarly, virtually all the early computer viruses during the 1980s were the creation of enthusiastic hackers whose primary intention was thrill-seeking rather that doing serious harm or earning wealth. But computer security specialists warn that computer viruses, worms, and Trojan horses- each with different tasks but all classified as malicious software, or mal ware-have become insidious and acquired new roles.  “We’re already starting to see a switch toward much more stealthy mal ware,” says Richard Ford, research professor in computer sciences at the Florida Institute of Technology in the US.
                                     “The threats (form insidious mal ware) are a reality, not just a possibility. Those who trying to use mal ware for financial in staying under the radar,”

                                                             Underground Economy
 In a perspective paper published in the US journal science last week, Ford and co-author Eugene Spafford, professor of computer science at Purdue University, have warned that the development of malware has become a supports an underground economy.
“If the viruses and worms of the past decade were the online equivalent of graffiti artists malware is now like criminals who wish to steal your wallet and forge your checks,” they wrote.
                   “Much of the mal wart today is designed to may facilitate financial gain for someone, somewhere,” says Sanjay Katkar, the chief technology officer of Quick Heal, an Indian company involved in developing anti-mal ware technology, mainly for homes and small and medium enterprises. “The nature of mal ware attacks is also changing.”
                Earlier there were mass attacks with a virus spreading across the continents. The last time this was expected to happen was in February 2006 when a virus named Kamasutra has threatened to disrupt computers. But it was detected several days ahead of its attack date, and a major outbreak was averted.

“ However, the malware of today  is increasingly silent, difficult to trace, and often picks on selected target computers,” says Katkar.
 Some security  researchers believe that data theft is a major emerging threat. “The data theft threat is real. The bad guys are learning fast, they are investing and building attack tools,” Cesar Cerrudo,the founder and CEO of Argeniss Information Security, a Buenos Aires-based company, and his colleague Esteban Martinez Fayo warned in a paper presented in March this year at a computer security conference in Amsterdam.

    “Data about people have more value than people think” Cerrudo and Fayo wrote in their paper. For instance, there might be organizations or individuals willing to pay for the addresses, mobile phone numbers, education details, and any other information that might be stored in a database.
MALWARE   MENACE
Virus:  A program designed to enter a computer to achieve a specific task- perhaps just introduce a harmless message or delete files or even reformat the hard disk.
Worm: A program designed to merely replicate and spread to other computers. A worm-virus hybrid may be used to deliver a virus. Such a hybrid would look at all email addresses in a computer and deliver the virus to those computers
Types of attacks
According to information security experts, it is no longer as difficult to write malware today as it would have been a few years ago. “There are now special tools available on the Internet for developing malware with a lot less effort than it would have taken in the late 1990s,” says Jagannath Patnaik, vice-president of sales at QuickHeal.
       A computer user may not even be aware when he or she becomes the target of malware. 

 

Get the Best out of Google

Google: We use it to search for articles, images or even to find the best bargains on the Internet. Whenever I see a computer with Google logo and the search box. You know something- you are missing out on load of goodies form the search engine mammoth with this basic Google page.

You can customize your Google page to do a whole lot of things and find information in a jiffy. This feature has been around for a number of year, but very few people use it. I will show you how can get the best out of Google in a few  simple steps.
First, get hold of a Google account. The best way to do this is to type www.google.com/ig on your browser and then click on sign in. you will be asked to sign up for a new account. Then you will be offered a selection of items which you can display on your home page. I suggest you take BBC and CNN you will always be the first to know of any news break anywhere in the world. If you are a technology freak try engadget, Slashdot or Wired. Macheads should choose. The Unofficial Apple Weblog, also known as TUAW. Of course, don’t forget to add your Gmail account on your customized home page. You have the option to hide the preview of your mails if you are wary of others seeing your massages. Also, when you use its labels facility. It’s much better than keeping emails in folders.
Google Reader
Next, try out the Google Reader and add it to your home page. This is basically a personalized reading list. It is your own online RSS reader. You can keep adding feeds that you can read at your leisure.
Google Apps
Google introduce something called Google Apps. It is expected to be a Microsoft Office killer. With Google Apps your company can get Google’s nifty Gmail with 10Gb of space, an online equivalent of Microsoft word and Excel. All this comes for just a fraction of the cost of Microsoft Office. The best part of Google Apps is that it can be accessed from any computer anywhere in the world. Plus you get your online calendar where you can keep a tab your appointments. Added to this is a simple web page creator. The cost of the entire Google package is around $5o a year.
Microsoft, too, has some thing called Microsoft Office Live, but I think Google beats it hollow because of its much better email service. But Google’s drawback is that it still dose not have anything that is a good as Microsoft’s Powerpoint. But these applications are not for those who are wary of storing their data in a server in some unknown country. The next things you must get hold of is Google’s Desktop search. It indexes your files on your computer and you will be able to find emails, pictures, music and videos in no time at all. It is imfunction that comes with Windows. Get it from www.desktop.google.com.
Gadgets
Google has also borrowed an original called Widgets which has been available in Macs for years. Google calls them Gadgets. My favourite ones are those that give the TV timings of HBO, Star Movies and zee cinema. There is also a pretty little flower that will give you a real kick if you look after well with a few mouse strokes daily. These gadgets are basically visual objects on the screen that can be manipulated with the mouse and keyboard. You will find loads Gadgets at www.desktop.google.com/plugins/.
Google notebook
Finally, get yourself Google Notebook. As you browse sites you just select portions of text and keep adding them to the notebook. Google Notebook lives in your browser you will not have to tear your hear trying to find where you kept a piece of information.


Tuesday, January 31, 2012

CMERI's AUV

Autonomous underwater robotic systens, designated AUVs, developed by the Central Mechanical Engineering Institute (CMERI), Durgapur are gaining importance owing to their embedded advantages for applications like seabed mapping, costal surveillance, mine countermeasure and ocenographic measurements during adverse wether conditions. With no physical cable connection to the surface control station and possessing onboard intelligence and energy supply, an AUV carries payload for carrying out a specific task. The configuration and payload of an AUV depends on mission requirement. The communication is hybrid in nature - RF while on surface and acoustic while underwater. The objective of the present project is to develop an operational AUV capable of operating up to a depth of 150m in the sea as per specification.  The developed system is capable of mapping sea floor and sensor based data collection. AUV can perform various jobs related to underwater inspection with camera, surveying etc. The project is sponsored by Ministry of Earth Sciences, Govt. of India.
The Vechile is programmed with a set of instructions that enable it to carry out an underwater mission without assistance from an operator on the surface. For autonomous free movement under water, the AUV determines its own geographical position with the help of navigational sensors and with navigational algorithms avoid collision with obstacles after their detection through forward looking sonar. The onboard software (preprogrammed) makes the vechile smart. The onboard intelligence helps it to take its own decisions and re-plans the mission accordingly.
The various issues considered during design are as follows.
a) Configuration, b) Modularity, c) Degrees of freedom, d) Stability, e) Near neutral buoyancy, f) Hydrodynamic modelling, g) Pressure Hull design, h) Energy system, i)Navigational Sensors, j) Communications, k) Payload sensors Thrusters are used to propel and maneuver the AUV. 5 thruststers are mounted on the AUV for generating motion in different directions to control surge, sway, heave, pitch and yaw. Lithium polymer batteries are used as power source considering its higher energy density, light weight, higher life and safety. For autonomous operation AUV is interfaced with obstacle avoidance sonar. The AUV is equipped with a number of navigational (Inertial Navigational System, Depth Sensor, Altimeter, Doopler Velocity Log, Forward Looking sonar, Global positioning system, APOS and payload sensors( side scan sonar, camera CTD) for execution of its peration successfully.
Three successfull testing were carried out near the chennai seacoast, in the Ldukki lake of cochin, and at the CMERI waterbody since past one year.

Saturday, January 21, 2012

Best Tea Shops, Phuchkawals, Dhosa and other foods in Durgapur

We Durgapurians are food lovers like the Bengalis are all.  This platform is to collect and provide information about the various Chai Stall - Tea shops, Phuchkawals of Durgapur. Do present your opinion about them.
                                                                                                      Thamks.