To Make the Department of Computer Science and Engineering the unique of its kind in the field of Research and Development activities in this part of world.
To impart highly innovative and technical knowledge to the urban and unreachable rural student folks in Computer Science and Engineering through "Total Quality Education".
Dr. M.Indra Devi, HOD/CSE
Mrs. A.Periya Nayaki, Assistant Professor/CSE
1) Internet Security
2) Prime Air
3) Importance of Data Analytics
4) Smart Contact Lens
5) Green Technology
6) Calm Technology
7) Department Activities
8) First Internal Toppers
Six ways hackers can attack you and how to stay safe
Phishing is a fake email masquerading as legitimate. Hackers create phishing emails through which they intend to steal your confidential information like passwords and bank account details.
How to stay safe
Look for spelling or grammatical errors in domain names or email addresses.
Malware is a malicious software that is written with the intent of compromising a system and stealing the data available on the system.
How to stay safe
Use a legitimate anti-virus software.
Do not download any fake software as there are chances it may contain malware.
3. Malicious mobile apps
There is a big misconception that every app available on Google Playstore or Apple store is safe and legitimate.Some of these apps may contain malicious code that can put your privacy at risk.
How to stay safe
Always check the permissions before downloading an app.
Check reviews and ratings.
Avoid downloading an app if it has less than 50,000 downloads.
Smishing is a form of phishing in which someone tries to trick you into giving them your private information via a phone call or SMS message.
How to stay safe
Don't share any critical information over a phone call or SMS.
Always verify the identity of the message before clicking links in it.
5.Physical security threats
A physical threat is any threat to your sensitive information that results from other people having a direct physical access to your devices like laptops, hard drives and mobile devices.
How to stay safe
Be careful how you store confidential information. Use encrypted computer hard drives, USBs, etc if they contain sensitive information.
Never write your passwords on a post-it or notepad.
Never leave your system unattended. Always protect it with a strong password.
Connecting your system or device to an insecure network can create the possibility of a hacker gaining access to all the files on your system and monitoring your activity online.
How to stay safe
Never connect to open Wi-Fi networks that you can't trust..
Use strong encryption like WPA2 on your home and office WiFi router instead of Open or WEP security as these can easily be hacked.
Amazon's Prime Service
A delivery system from Amazon designed to safely get packages to customers in 30 minutes or less using unmanned aerial vehicles, also called drones. Prime Air has great potential to enhance the services we already provide to millions of customers by providing rapid parcel delivery that will also increase the overall safety and efficiency of the transportation system.
Is this science fiction or is this real?
It looks like science fiction, but it's real. One day, seeing Prime Air vehicles will be as normal as seeing mail trucks on the road.
How will it work?
Amazon Prime Air is a service that will deliver packages up to five pounds in 30 minutes or less using small drones.
How are you going to ensure safety?
Safety is our top priority. Our vehicles will be built with multiple redundancies, as well as sophisticated "sense and avoid" technology. Additionally, through our private trial in the UK, we will gather data to continue improving the safety and reliability of our systems and operations.
When will I be able to choose Prime Air as a delivery option?
We will deploy when and where we have the regulatory support needed to safely realize our vision. We're excited about this technology and one day using it to deliver packages to customers around the world in 30 minutes or less.
Importance of Data Analytics
How Data Analytics helps with Mental Issues
When humans first started writing some 5,000 years ago, few could have imagined quite how banal it could get. Over the last twenty years though, the internet has unleashed a sluice of inane drivel into the world, with Twitter, in particular, providing a platform for people to express their opinions on every single thing, no matter how stupid they may be. However, while it may be tiresome, Twitter has fundamentally changed our conception of what it means to communicate using text. It has also enabled analysis of our written communication that is providing some tremendously beneficial insights around mental health.
According to a recent study published in Translational Psychiatry, more than 36% of teenaged girls in America are depressed or have suffered a recent major depressive episode, as have 13.6% of boys.
These numbers have risen dramatically in recent years, and while there are many factors that impact an individual's mental health, by identifying the traits most commonly associated with depression and any indicators that they could be moving to that state of mind, it is possible to intervene with therapies, even small ones you can do at home, that can counter it in some way.
In order to better understand these characteristics, it is first and foremost important to use psychology to understand whether what you are trying to assess through your analytics efforts is psychologically valuable.
Smart Contact Lens
Lenses that monitor eye health are on the way
THE next time you gaze deep into someone's eyes, you might be shocked at what you see: tiny circuits ringing their irises, their pupils dancing with pinpricks of light. These smart contact lenses aren't intended to improve vision. Instead, they will monitor blood sugar levels in people with diabetes or look for signs of glaucoma.
The lenses could also map images directly onto the field of view, creating head-up displays for the ultimate augmented reality experience, without wearing glasses or a headset. To produce such lenses, researchers are merging transparent, eye-friendly materials with microelectronics.
"The idea is to map images onto the field of view,
creating head-up displays for augmented reality"
In 2008, as a proof of concept,Babak Parviz at the University of Washington in Seattle created a prototype contact lens containing a single red LED. Using the same technology, he has now created a lens capable of monitoring glucose levels in people with diabetes.
It works because glucose levels in tear fluid correspond directly to those found in the blood, making continuous measurement possible without the need for thumb pricks, he says. Parviz's design calls for the contact lens to send this information wirelessly to a portable device worn by diabetics, allowing them to manage their diet and medication more accurately.
"There's still a lot more testing we have to do," says Parviz. In the meantime, his lab has made progress with contact lens displays. They have developed both red and blue miniature LEDs - leaving only green for full colour - and have separately built lenses with 3D optics that resemble the head-up visors used to view movies in 3D.
What is green technolgy?
Green Technology is identified not by a connected supply chain but by the objectives of the products and services that are developed within this industry,Lowering greenhouse gas emissions,Increasing the efficient use of natural resources, and improving air and water quality.From a workforce perspective Green Technology spans all levels of education and skill sets including those used for,Research & Development of alternative energies,Building new efficient homes and facilities, and Operating cleaner more efficient utilities.
GROWTH OF GREEN TECHNOLOGY:
Green Technology's growth is being driven by -
1.Legislation and government policies providing incentives and requirements for cleaner development and green technology.
2.Demand for sustainable energy sources & materials due to advances in technology and increased costs of traditional energy and commodities.
3.The opportunity for economic development and profit.
Green building is defined as an organized effort to design, Construct and maintain buildings and facilities using Processes and materials which promote sustainability.
In LA, Green Construction (GC) firms make up about 28% of the construction industry .GC firms expect to increase employment at more than twice the rate of all other construction firms.More GC firms are experiencing difficulty finding and recruiting qualified entry-level employees (70%).
Calm technology or calm designis a type of information technology where the interaction between the technology and its user is designed to occur in the user's periphery rather than constantly at the center of attention. Information from the technology smoothly shifts to the user's attention when needed but otherwise stays calmly in the user's periphery.Mark weiser and John Seely describe calm technology as "that which informs but doesn't demand our focus or attention. The use of calm technology is paired with ubiquitous computing as a way to minimize the perceptible invasiveness of computers in everyday life.
The phrase "calm technology" was first published in the article "Designing Calm Technology", written by Mark Weiser and John Seely Brown in 1995.
Video conferences are an example of calm technology. Information conveyed such as through gestures and facial expressions can be gathered, as opposed to telephone conferences which do not provide this peripheral information. Another frequently named example is a simple water kettle that we fill up, put on a stove and then can be out of our attention till the water boils and it whistles. Smart homes are an extension of calm technology due to their emphasis on awareness and adaptability to the user's needs.
Due to mobile technology trends towards pervasive computing, ambient technology, and miniaturization, calm technology is becoming a more integral part of these devices. Another development of calm technology is its transformation into unattended technology, where the technology always exists in the periphery and never requires central attention from the user.