14.06.2015 Views

ULAB AMPLIFIED

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>ULAB</strong> <strong>AMPLIFIED</strong><br />

<strong>ULAB</strong> <strong>AMPLIFIED</strong><br />

Draft<br />

Proposed outline<br />

S. M. Nadim Uddin<br />

Coordinator and Editor<br />

<strong>ULAB</strong> <strong>AMPLIFIED</strong><br />

Campus Science Magazine


Page formation of the magazine<br />

1. Cover Page<br />

2. Introductory page<br />

3. Index<br />

4. Greetings<br />

5. Faculty portion (Writing, article, reviews etc.)<br />

6. Student portion (Writing, article, reviews etc.)<br />

7. Language introduction (Programming)<br />

8. Project introduction (Engineering, physics, chemistry, mathematics, programming etc.)<br />

9. Science Academy<br />

10. Inspiration<br />

11. News from <strong>ULAB</strong> (Departments, clubs, individuals)<br />

12. Science Today<br />

13. What/Why/How<br />

14. Unsolved mystery


Faculty Portion<br />

Grid-connected solar power shines at DU campus<br />

Dr. Rezaul Karim Mazumder<br />

Dean,<br />

Electronics and Telecommunication Engineering Department<br />

Fig 1: Rooftop grid connected photovoltaic system at the Renewable Energy Research Centre (RERC), University of Dhaka.<br />

Fig 2: The author looks at the wiring diagram of the system.Photo: Anisur Rahman Dr. Rezaul Karim Mazumder<br />

Would you like to be a proud owner of an electric power generator? Would you like to produce clean and<br />

pollution-free green power without fuel at your home? Would you like to earn money by feeding your<br />

surplus power to the national grid from this system?<br />

Yes, you too can have it, if you have a bright sunny roof-top or a compound at your home.<br />

Our country is a low-economy country and per-capita energy consumption is one of the lowest in the<br />

world. The conventional resources in Bangladesh are inadequate for supplying the energy needs of our<br />

economy.<br />

The only dependable indigenous gas, which is the major source of primary energy in the country, is used<br />

mainly for the production of electricity and fertilizer. According to expert's opinion our gas reserves will<br />

be exhausted within 2020. Therefore, we must find alternative sources of energy to maintain the energy<br />

supply of our country.<br />

Renewable energy, which is environment friendly, inexhaustible and sustainable, can be considered as<br />

one of the important alternatives and it can play a significant role in the energy scene of the country. The<br />

most viable sources of renewable energy, in the country are solar, wind, biomass, and biogas. At present<br />

contribution of energy from solar and wind is only 0.1%.


It is encouraging that private organisations and NGOs have come forward by taking different projects to<br />

utilize solar devices and to provide photovoltaic (PV) electricity to villages in Bangladesh where national<br />

grid line has not yet reached.<br />

Today, Solar Home Systems (SHS) are gradually becoming popular in the rural areas in Bangladesh. But<br />

in cities, where the power supply is insufficient, fluctuating and failure is a regular event, grid-connected<br />

PV system can be a good power source if installed on the roof-tops of the building. In the remote areas if<br />

the supply of power in the existing grid is needed to be increased to keep pace with the increasing<br />

demand, this system can be a good solution as the system is modular and easy to install.<br />

The power produced by the roof-top grid-connected PV system can be used to supply local loads, with the<br />

excess energy fed into the local grid for use by other customers. At night, the local loads are simply<br />

supplied by the grid power. If the PV system is large enough, it can supply more energy into the grid than<br />

is used by local loads. Instead of receiving a bill every month from the utility supply office, the owner of<br />

the system would then be able to earn money by generating surplus electricity.<br />

Grid-connected PV power systems are being installed in cities in different countries of the world.<br />

Government policies are being framed to encourage and popularize this system by providing necessary<br />

regulations and incentives in many developed and developing countries. From the gradual decrease of<br />

prices and increased rate of installation of the systems in the cities all over the world it can be easily<br />

comprehended that this system will become an important source of electricity in a very short time in the<br />

urban areas.<br />

Roof-top grid-connected PV systems are also being installed in our neighbouring countries like India,<br />

Thailand and Indonesia. The future of PV-grid electricity in Bangladesh is also very bright as we have<br />

bright sun light throughout the year.<br />

Realizing the significant potential of this technology a model of 1.1kW rooftop grid connected<br />

photovoltaic system has been developed and successfully installed (Fig.1) at the roof-top of Renewable<br />

Energy Research Centre (RERC), Dhaka University under the financial assistance of the Ministry of<br />

Science and Information & Communication Technology. Wiring diagram of the system is shown in Fig.2.<br />

The installed system was run for several days in different weather conditions and the performance was<br />

found to be quite satisfactory.<br />

To understand the financial viability of the system, a preliminary economic analysis of the 1.1kW rooftop<br />

grid-connected PV systems along with various sizes (Table) has been made. In the analysis standard<br />

methods of economics have been utilized considering various factors, viz., capital cost, life-cycle of the<br />

system, interest rate, inflation rate, operation and maintenance cost with and without net metering benefit.<br />

The above estimation was made by considering an average demand of 3000kWh for a four-member<br />

family. It is also seen from the table that a system of 2kW power for a single house-hold can produce<br />

surplus energy that can be fed to the national grid.<br />

For 0% to 10% interest rates and 10% depreciation the unit-price of electricity with and without netmetering<br />

facilities will be respectively Tk.4.85-15.14 and Tk.4.85-15.14 only. As the system size<br />

becomes larger, the unit-price with net-metering decreases rapidly. The unit-price of electricity for the<br />

1.1kW system at the above interest rates and depreciation is from 6.18 to 19.32 taka only.


At present Bangladesh is going through severe electricity crisis. In this situation, this system can be a<br />

good alternative small-scale power source on the roof-top of the building in the cities that does not require<br />

any fuel. It is observed from the preliminary economic analysis that the system would be financially<br />

feasible if subsidy is given and net-metering regulation is framed by the government. Moreover, the<br />

impact of the system on the environment friendly issue should be considered as the system does not<br />

pollute the environment at all. From the performance study it is also found that the system works<br />

efficiently. For emergency power supply of multistoried building Rajuk should frame some incentive<br />

based building-acts to encourage the integration of solar PV system as a part of future design and<br />

implementation.<br />

The author was a Professor at the Dept. of Applied Physics, Electronics and Communication<br />

Engineering, University of Dhaka.Now he is the Dean of Electronics and Telecommunication<br />

Engineering Department of University of Liberal Arts, Bangladesh).<br />

(Accessed from http://archive.thedailystar.net/newDesign/news-details.php?nid=60011 and the writing<br />

was published at Friday, October 24, 2008 on StarTech,TechSpotlight, The Daily Star)<br />

_____________________________________________________________________________________<br />

Sajib Roy<br />

Faculty, ETE Department<br />

Three dimensional integrated circuits<br />

Integrated circuits are one the most essential part in modern day electronics. Each ICs nowadays<br />

contain billions of transistors. The technology behind designing and manufacturing has gone<br />

reached such a level that necessary parts of any system, Analog or Digital, can be packed and<br />

integrated in a single chip. Designers of today are constantly trying to fit more and more<br />

transistors in one chip without compromising performance. This leads to the recent attraction of<br />

many IC/chip designers toward 3-D ICs implementation. Many studies have been done on this<br />

sector, showing promising results (at simulation level) with performance boost over 60%<br />

compare to conventional 2D-ICs. The performance improvement mostly occur due to the fact in<br />

removal of long interconnects and reduction in power noise. Additionally 3D-ICs have multiple<br />

layer architecture which allows different components like digital system, analog system, RF<br />

modules, etc. in one single chip. Now, even with all these advantages there are significant<br />

amount of challenges associated with designing of 3D-ICs like thermal conductivity, power<br />

density, and heat dissipation. Also there is a lot complexity incorporated with physical level<br />

design due to its multi-layered structure.<br />

In short there is lot to explore in the field of 3D-IC design and new design automation tools are<br />

necessary to model and evaluate 3D-ICs along with its floor-planning, routing, interconnection,<br />

power supplies, heat dissipation, etc.


Student Portion<br />

Ifrat Rahman<br />

133014029<br />

DNA<br />

DNA, or deoxyribonucleic acid, is the hereditary material in humans and almost all other<br />

organisms. Nearly every cell in a person’s body has the same DNA. Most DNA is located in the<br />

cell nucleus (where it is called nuclear DNA), but a small amount of DNA can also be found in<br />

the mitochondria (where it is called mitochondrial DNA or mtDNA).<br />

The DNA backbone is a polymer with an alternating sugar-phosphate sequence. The deoxyribose<br />

sugars are joined at both the 3'-hydroxyl and 5'-hydroxyl groups to phosphate groups in ester<br />

links, also known as "Phosphodiester" bonds.<br />

DNA is a polymer. The monomer units of DNA are nucleotides, and the polymer is known as a<br />

"polynucleotide." Each nucleotide consists of a 5-carbon sugar (deoxyribose), a nitrogen<br />

containing base attached to the sugar, and a phosphate group. There are four different types of<br />

nucleotides found in DNA, differing only in the nitrogenous base. The four nucleotides are given<br />

one letter abbreviations as shorthand for the four bases.<br />

<br />

<br />

<br />

<br />

A is for Adenine<br />

G is for Guanine<br />

C is for Cytosine<br />

T is for Thymine<br />

The information in DNA is stored as a code made up of four chemical bases: Adenine (A),<br />

Guanine (G), Cytosine (C), and Thymine (T). Human DNA consists of about 3 billion bases, and<br />

more than 99 percent of those bases are the same in all people. The order, or sequence, of these<br />

bases determines the information available for building and maintaining an organism, similar to<br />

the way in which letters of the alphabet appear in a certain order to form words and sentences.<br />

DNA bases pair up with each other, A with T and C with G, to form units called base pairs. Each<br />

base is also attached to a sugar molecule and a phosphate molecule. Together, a base, sugar, and<br />

phosphate are called a nucleotide. Nucleotides are arranged in two long strands that form a spiral<br />

called a double helix. The structure of the double helix is somewhat like a ladder, with the base


pairs forming the ladder’s rungs and the sugar and phosphate molecules forming the vertical<br />

sidepieces of the ladder.<br />

An important property of DNA is that it can replicate, or make copies of itself. Each strand of<br />

DNA in the double helix can serve as a pattern for duplicating the sequence of bases. This is<br />

critical when cells divide because each new cell needs to have an exact copy of the DNA present<br />

in the old cell.<br />

What is mitochondrial DNA?<br />

Mitochondria are structures within cells that convert the energy from food into a form<br />

that cells can use. Although most DNA is packaged in chromosomes within the nucleus,<br />

mitochondria also have a small amount of their own DNA. This genetic material is<br />

known as mitochondrial DNA or mtDNA. In humans, mitochondrial DNA spans about<br />

16,500 DNA building blocks (base pairs), representing a small fraction of the total DNA<br />

in cells.<br />

Mitochondrial DNA contains 37 genes, all of which are essential for normal<br />

mitochondrial function. Thirteen of these genes provide instructions for making enzymes<br />

involved in oxidative phosphorylation. Oxidative phosphorylation is a process that uses<br />

oxygen and simple sugars to create adenosine triphosphate (ATP), the cell's main energy<br />

source. The remaining genes provide instructions for making molecules called transfer<br />

RNA (tRNA) and ribosomal RNA (rRNA), which are chemical cousins of DNA. These<br />

types of RNA help assemble protein building blocks (amino acids) into functioning<br />

proteins.<br />

Mitochondrial DNA is among the estimated 20,000 to 25,000 total genes in the human<br />

genome.<br />

______________________________________________________________________________<br />

A Z M Shamshuddin<br />

133014024<br />

Freeware & Free Software – Are They Same!!!<br />

Freeware and Free Software; these two words are quiet common in our day to day<br />

computing life. Most of the people think that they are just synonyms of each other. Is it right?<br />

The answer is “NO”. Freeware and Free Software are different. They are different in permission<br />

of modifying the codes, copying the codes, deleting the codes, publishing the modified version<br />

and so on.<br />

The real free thing among them is Free Software. GNU Compiler Collection and C Library,<br />

Linux Kernel, MySQL, the GIMP raster drawing and image editor, the LibreOffice etc are Free<br />

Software. In 1985 Richard Stallman established the term “Free Software” by founding the GNU<br />

project and the Free Software Foundation. You do not need to pay to use this kind of software.


Even you can see the source code. You can also change them and distribute the modified version.<br />

Programmers often develop Free Software. That is why they are also called “Open Source”. The<br />

maker of the software gets least opportunity to make money. So if there is anything free in the<br />

world of software, this is it. You don’t only use this kind of software, you own them.<br />

Freeware is the kind of software that you can download and use without directly paying any<br />

money. Software like Adobe Reader, Adobe Flash Player, Piriform CCleaner, Avast Free<br />

Antivirus, AVG Free Edition and many more are examples of Freeware. Andrew Fluegelman<br />

showed us the term named “Shareware”. He wanted to sell communication software named PC –<br />

Talk in 1982. He chose the process now we call shareware. The term “Freeware” came from<br />

shareware with changes in concepts. Software belonging to Freeware has different types of<br />

license agreements. Agreements like “for personal use only”, “non – commercial use”,<br />

“educational use” and many more. It is also restrictions to see the source code, to modify it, to<br />

copy it etc. You will face these facts which are absent in Free Software. It is like you have a<br />

cornfield where you can only grow up corns. Nothing else. So do you think that you actually<br />

own the corn field? Of course not. You are only lending the software to use. It is not your.<br />

Besides the maker can earn a lot of money by Freeware. To know how just stay with us. See you<br />

all in the next sequel of the magazine. Until then stay safe and happy.<br />

Nahid Hasan<br />

Internet hacking and its omnious society<br />

“Now a day’s internet hacking has become a burning question in modern world and turned a<br />

serious work in cyber crime.”<br />

What is Internet?<br />

The internet is an integral part of our everyday lives. It is a global computer network providing a<br />

variety of information and communication facilities, consisting of interconnected networks using<br />

standardized communication protocols. It is an international network of networks that consists of<br />

millions of private, public, academic, business and government packet switched networks, linked<br />

by a broad array of electronic, wireless, and optical networking technologies.<br />

What is Internet Hacking?<br />

Internet hacking means accessing a secure<br />

computer system by disabling or bypassing<br />

the security.<br />

Some hackers will steal data or destroy data,<br />

or use the system to hide their tracks as they<br />

hack into a different system.<br />

Who is a Hacker?<br />

‘Hacker' refers to computer enthusiasts who<br />

enjoy learning everything about a computer<br />

system, pushing the system to its highest<br />

possible level of performance. Some use<br />

their skills for business, developing<br />

penetration tools to analyze a customer's<br />

networks for security vulnerabilities.<br />

Why Do Hackers Attack Us?<br />

For some, hacking may just be a hobby to<br />

see how many computers or networks they<br />

can crack.<br />

For others, there is malicious intent behind<br />

their escapades, like stealing...<br />

Client or customer information or<br />

other business data<br />

Credit card details and social<br />

security numbers, for identity fraud<br />

or theft<br />

Passwords for access to our online<br />

bank, ISP or web services


Email addresses, which may be used<br />

for spamming<br />

<br />

Children's names, photographs, ages<br />

or other of their personal details held<br />

on the computer<br />

Classifications of Internet Hacker:<br />

There are many kinds of internet hacker. Such as white hat, grey hat, black hat and script<br />

kiddies’ etc.<br />

White hat<br />

A white hat hacker breaks security for nonmalicious<br />

reasons, perhaps to test their own<br />

security system or while working for a<br />

security company which makes security<br />

software. The term "white hat" in Internet<br />

slang refers to an ethical hacker. This<br />

classification also includes individuals who<br />

perform penetration tests and vulnerability<br />

assessments within a contractual agreement.<br />

The EC-Council, also known as the<br />

International Council of Electronic<br />

Commerce Consultants, is one of those<br />

organizations that have developed<br />

certifications, courseware, classes, and<br />

online training covering the diverse arena of<br />

Ethical Hacking.<br />

Black hat<br />

A "black hat" hacker is a hacker who<br />

"violates computer security for little reason<br />

beyond maliciousness or for personal gain"<br />

(Moore, 2005). Black hat hackers form the<br />

stereotypical, illegal hacking groups often<br />

portrayed in popular culture, and are "the<br />

epitome of all that the public fears in a<br />

computer criminal". Black hat hackers break<br />

into secure networks to destroy, modify, or<br />

steal data; or to make the network unusable<br />

for those who are authorized to use the<br />

network. Black hat hackers are also referred<br />

to as the "crackers" within the security<br />

industry and by modern programmers..<br />

Grey hat<br />

A grey hat hacker is a combination of a<br />

black hat and a white hat hacker. A grey hat<br />

hacker may surf the Internet and hack into a<br />

computer system for the sole purpose of<br />

notifying the administrator that their system<br />

has a security defect, for example. They may<br />

then offer to correct the defect for a fee.<br />

Elite hacker<br />

A social status among hackers, elite is used<br />

to describe the most skilled. Newly<br />

discovered exploits circulate among these<br />

hackers. Elite groups such as Masters of<br />

Deception conferred a kind of credibility on<br />

their members.<br />

Script kiddie<br />

A script kiddie (also known as a skid or<br />

skiddie) is an unskilled hacker who breaks<br />

into computer systems by using automated<br />

tools written by others (usually by other<br />

black hat hackers), hence the term script (i.e.<br />

a prearranged plan or set of activities) kiddie<br />

(i.e. kid, child—an individual lacking<br />

knowledge and experience, immature),<br />

usually with little understanding of the<br />

underlying concept.<br />

Neophyte<br />

A neophyte is someone who is new to<br />

hacking and has almost no knowledge or<br />

experience of the workings of technology<br />

and hacking.<br />

Blue Hat<br />

A blue hat hacker is someone outside<br />

computer security consulting firms who is<br />

used to bug-test a system prior to its launch,<br />

looking for exploits so they can be closed.<br />

Microsoft also uses the term Blue Hat to<br />

represent a series of security briefing events.<br />

Hacktivist<br />

A hacktivist is a hacker who utilizes<br />

technology to publicize a social, ideological,<br />

religious or political message.


<strong>ULAB</strong> <strong>AMPLIFIED</strong><br />

Techniques and Effects of internet hacking:<br />

Vulnerability scanner:<br />

A vulnerability scanner is a tool used to<br />

quickly check computers on a network for<br />

known weaknesses. Hackers also commonly<br />

use port scanners. These check to see which<br />

ports on a specified computer are "open" or<br />

available to access the computer, and<br />

sometimes will detect what program or<br />

service is listening on that port, and its<br />

version number.<br />

Brute-force attack:<br />

Password guessing<br />

This method is very fast when used to<br />

check all short passwords, but for longer<br />

passwords other methods such as the<br />

dictionary attack are used, because of the<br />

time a brute-force search takes.<br />

Password cracking<br />

It is the process of recovering<br />

passwords from data that has been stored in<br />

or transmitted by a computer system. A<br />

common approach is to repeatedly try<br />

guesses for the password.<br />

Packet analyzer<br />

A packet analyzer is an application that<br />

captures data packets, which can be used to<br />

capture passwords and other data in transit<br />

over the network.<br />

Spoofing attack<br />

A spoofing attack involves one program,<br />

system or website that successfully<br />

masquerades as another by falsifying data<br />

and is thereby treated as a trusted system by<br />

a user or another program — usually to fool<br />

programs, systems or users into revealing<br />

confidential information, such as user names<br />

and passwords.<br />

Root kit<br />

A root kit is a program that uses low-level,<br />

hard-to-detect methods to subvert control of<br />

an operating system from its legitimate<br />

operators. Root kits usually obscure their<br />

installation and attempt to prevent their<br />

removal through a subversion of standard<br />

system security. They may include<br />

replacements for system binaries, making it<br />

virtually impossible for them to be detected<br />

by checking process tables.<br />

Social engineering<br />

In the second stage of the targeting process,<br />

hackers often use Social engineering tactics<br />

to get enough information to access the<br />

network. They may contact the system<br />

administrator and pose as a user who cannot<br />

get access to his or her system.<br />

Hackers who use this technique must have<br />

cool personalities, and be familiar with their<br />

target's security practices, in order to trick<br />

the system administrator into giving them<br />

information. In some cases, a help-desk<br />

employee with limited security experience<br />

will answer the phone and be relatively easy<br />

to trick. Another approach is for the hacker<br />

to pose as an angry supervisor, and when<br />

his/her authority is questioned, threaten to<br />

fire the help-desk worker. Social<br />

engineering is very effective, because users<br />

are the most vulnerable part of an<br />

organization. No security devices or<br />

programs can keep an organization safe if an<br />

employee reveals a password to an<br />

unauthorized person.<br />

Social engineering can be broken down into<br />

four sub-groups:<br />

Intimidation: As in the "angry<br />

supervisor" technique above, the<br />

hacker convinces the person who<br />

answers the phone that their job is in


danger unless they help them. At this<br />

point, many people accept that the<br />

hacker is a supervisor and give them<br />

the information they seek.<br />

Helpfulness: The opposite of<br />

intimidation, helpfulness exploits<br />

many people's natural instinct to help<br />

others solve problems. Rather than<br />

acting angry, the hacker acts<br />

distressed and concerned. The help<br />

desk is the most vulnerable to this<br />

type of social engineering, as (a.) its<br />

general purpose is to help people;<br />

and (b.) it usually has the authority to<br />

change or reset passwords, which is<br />

exactly what the hacker wants.<br />

Name-dropping: The hacker uses<br />

names of authorized users to<br />

<br />

convince the person who answers the<br />

phone that the hacker is a legitimate<br />

user him or herself. Some of these<br />

names, such as those of webpage<br />

owners or company officers, can<br />

easily be obtained online. Hackers<br />

have also been known to obtain<br />

names by examining discarded<br />

documents.<br />

Technical: Using technology is also<br />

a way to get information. A hacker<br />

can send a fax or email to a<br />

legitimate user, seeking a response<br />

that contains vital information. The<br />

hacker may claim that he or she is<br />

involved in law enforcement and<br />

needs certain data for an<br />

investigation, or for record-keeping<br />

purposes.<br />

Techniques of Cyber attacks:<br />

.Trojan horses<br />

A Trojan horse is a program that seems to be<br />

doing one thing but is actually doing<br />

another. It can be used to set up a back door<br />

in a computer system, enabling the intruder<br />

to gain access later. (The name refers to the<br />

horse from the Trojan War, with the<br />

conceptually similar function of deceiving<br />

defenders into bringing an intruder into a<br />

protected area.)<br />

Computer virus<br />

A virus is a self-replicating program that<br />

spreads by inserting copies of itself into<br />

other executable code or documents. By<br />

doing this, it behaves similarly to a<br />

biological virus, which spreads by inserting<br />

itself into living cells. While some viruses<br />

are harmless or mere hoaxes, most are<br />

considered malicious.<br />

Computer worm<br />

Like a virus, a worm is also a selfreplicating<br />

program. It differs from a virus<br />

in that (a.) it propagates through computer<br />

networks without user intervention; and (b.)<br />

does not need to attach itself to an existing<br />

program. Nonetheless, many people use the<br />

terms "virus" and "worm" interchangeably<br />

to describe any self-propagating program.<br />

How Do We Protect Ourselves?<br />

Preventative measures are the first steps towards safeguarding our system and network. Here are<br />

some important steps to take:<br />

1. Install A Firewall:<br />

Firewalls prevent access to our computer from the outside, so that only those that we give<br />

permission to can connect to our system from the Internet. The more effective and secure<br />

firewalls also ensure outbound control, watching for and preventing a Trojan, spyware or


any other program from communicating out of our computer, unless we provide<br />

permission.<br />

2. Change Passwords:<br />

To counter password cracking or sniffing, change default passwords in your software<br />

programs as soon as possible. Use complex passwords and make sure to change them on<br />

a regular basis.<br />

3. Keep Patches Up-To-Date:<br />

our operating system and other software should be patched as soon as updates are<br />

released. Maintaining the most recent versions of software and operating systems will<br />

help block hackers from getting through any vulnerability.<br />

4. Install Antivirus Software:<br />

All our computers should be running the most recent version of an anti-virus program.<br />

The program should be set for automatic updates to ensure the latest virus, worm and<br />

Trojan definitions.<br />

Afrin Akter Bithy<br />

133014022<br />

Alfred Nobel's Will<br />

On November 27, 1895, Alfred Nobel signed his third and last will at the Swedish-<br />

Norwegian Club in Paris. When it was opened and read after his death, the will caused a<br />

lot of controversy both in Sweden and internationally, as Nobel had left much of his<br />

wealth for the establishment of a prize. His family opposed the establishment of the<br />

Nobel Prize, and the prize awarders he named refused to do what he had requested in his<br />

will. It was five years before the first Nobel Prize could be awarded in 1901.<br />

The Establishment of the Nobel Prize<br />

In this excerpt of the will, Alfred Nobel dictates that his entire remaining estate should be<br />

used to endow "prizes to those who, during the preceding year, shall have conferred the<br />

greatest benefit on mankind."


"The whole of my remaining realizable estate shall be dealt with in the following way:<br />

the capital, invested in safe securities by my executors, shall constitute a fund, the interest<br />

on which shall be annually distributed in the form of prizes to those who, during the<br />

preceding year, shall have conferred the greatest benefit on mankind. The said interest<br />

shall be divided into five equal parts, which shall be apportioned as follows: one part to<br />

the person who shall have made the most important discovery or invention within the<br />

field of physics; one part to the person who shall have made the most important chemical<br />

discovery or improvement; one part to the person who shall have made the most<br />

important discovery within the domain of physiology or medicine; one part to the person<br />

who shall have produced in the field of literature the most outstanding work in an ideal<br />

direction; and one part to the person who shall have done the most or the best work for<br />

fraternity between nations, for the abolition or reduction of standing armies and for the<br />

holding and promotion of peace congresses. The prizes for physics and chemistry shall be<br />

awarded by the Swedish Academy of Sciences; that for physiology or medical works by<br />

the Karolinska Institute in Stockholm; that for literature by the Academy in Stockholm,<br />

and that for champions of peace by a committee of five persons to be elected by the<br />

Norwegian Storting. It is my express wish that in awarding the prizes no consideration be<br />

given to the nationality of the candidates, but that the most worthy shall receive the prize,<br />

whether he be Scandinavian or not."<br />

Nobel Prizes 2014<br />

The Nobel Prize in Physics 2014<br />

Isamu Akasaki, Hiroshi Amano and Shuji Nakamura<br />

for the invention of efficient blue light-emitting diodes which has enabled bright and<br />

energy-saving white light sources"<br />

The Nobel Prize in Chemistry 2014<br />

Eric Betzig, Stefan W. Hell and William E. Moerner<br />

"for the development of super-resolved fluorescence microscopy"<br />

The Nobel Prize in Physiology or Medicine 2014<br />

John O'Keefe, May-Britt Moser and Edvard I. Moser


"for their discoveries of cells that constitute a positioning system in the brain"<br />

The Nobel Prize in Literature 2014<br />

Patrick Modiano<br />

"for the art of memory with which he has evoked the most ungraspable human destinies<br />

and uncovered the life-world of the occupation"<br />

The Nobel Peace Prize 2014<br />

Kailash Satyarthi and Malala Yousafzai<br />

"for their struggle against the suppression of children and young people and for the right<br />

of all children to education"<br />

The Sveriges Riksbank Prize in Economic Sciences in Memory of Alfred Nobel 2014<br />

Jean Tirole<br />

"for his analysis of market power and regulation"<br />

<br />

<br />

Source :<br />

http://www.nobelprize.org/nobel_prizes/lists/year<br />

http://www.nobelprize.org/alfred_nobel/will/<br />

Md. Sudipto Hasan Hejol<br />

Id: 133 014 032<br />

Formation<br />

Here we are happily talking about the solar system being 4.5 billion years old, but how do we<br />

KNOW that the solar system is this old? What is the scientific evidence? The main evidence<br />

comes from radioactivity. A few elements are unstable and are likely to "decay" - that is, emit a<br />

particle and become a different element. For example, an isotope of potassium (potassium-40)<br />

decays to an isotope of argon (argon-40) with a half-life of 1.3 billion years. This means that 1<br />

kilogram of pure potassium-40 would, over 1.3 billion years, turn into 1/2 a kilogram of argon-<br />

40 and 1/2 kilogram of remaining potassium-40. Then, another 1.3 billion years later, the 1/2<br />

kilogram of potassium-40 reduces to 1/4 kilogram and another 1/4 kilogram of argon-40.<br />

Therefore, we can find out the age of a lump of rock by measuring the ratio of potassium-40 to<br />

argon-40.<br />

The oldest rocks on Earth are about 3.9 billion’s years old. There are not very many of such old<br />

rocks around since the surface of the Earth has been thoroughly resurfaced. The oldest lunar<br />

rocks are about 4.4 billion years old. The oldest rocks ever encountered are meteorites, some of<br />

which are as old as 4.6 billion years. These meteorite rocks are thought to have formed during<br />

the early condensation of the solar nebula. The planets formed about 0.1 billion (100 million)<br />

years later. So, the age of the Earth is probably close to about 4.5 billion years.<br />

Science Today<br />

The 50 most influential scientists in the world now (Natural and applied)


NAME<br />

FIELD OF<br />

INFLUENCE<br />

NAME<br />

FIELD OF<br />

INFLUENCE<br />

1. Alain Aspect Quantum Theory 26. Martin Karplus Quantum Chemistry<br />

2. David Baltimore Virology—HIV &<br />

Cancer<br />

27. Donald Knuth Computer Programming<br />

3. Allen Bard Electrochemistry 28. Robert Marks II Computational<br />

Intelligence<br />

4. Timothy Berners-<br />

Lee<br />

Computer Science<br />

(WWW)<br />

29. Craig Mello Molecular Medicine<br />

5. John Tyler Bonner Evolutionary Biology 30. Luc Montagnier Immunology—HIV<br />

6. Dennis Bray Molecular Biology 31. Gordon Moore Physicist—Intel Corp.<br />

7. Sydney Brenner Biology—Genetics 32. Kary Mullis DNA Chemist<br />

8. Pierre Chambon Genetics & Cellular<br />

Biology<br />

33. C. Nüsslein-<br />

Volhard<br />

Developmental Biology<br />

9. Simon Conway<br />

Morris<br />

Evolutionary<br />

Paleobiology<br />

34. Seiji Ogawa fMRI Technology<br />

10. Mildred<br />

Dresselhaus<br />

Carbon Science<br />

35. Jeremiah<br />

Ostriker<br />

Astrophysics<br />

11. Gerald M.<br />

Edelman<br />

Neuroscience 36. Roger Penrose Mathematics & Physics<br />

12. Ronald Evans Molecular Genetics 37. Stanley Prusiner Neurodegeneration<br />

13. Anthony Fauci Immunology—HIV 38. Henry F.<br />

Schaefer III<br />

Quantum Chemistry<br />

14. Anthony Fire Genetics—RNAi 39. Thomas Südhof Neurotransmission<br />

15. Jean Fréchet Biotechnology 40. Jack Szostak Genetics<br />

16. Margaret Geller Astronomy 41. James Tour Nanotechnology<br />

17. Jane Goodall Primatologist 42. Charles Townes Quantum Electronics<br />

18. Alan Guth Inflationary Cosmology 43. Harold Varmus Oncology<br />

19. Lene Vestergaard<br />

Hau<br />

Quantum Physics 44. Craig Venter Human Genetics


NAME<br />

FIELD OF<br />

INFLUENCE<br />

NAME<br />

FIELD OF<br />

INFLUENCE<br />

20. Stephen<br />

Hawking<br />

Physics & Cosmology 45. James Watson Molecular Biology—<br />

DNA<br />

21. Peter Higgs Physics—Higgs Boson 46. Steven<br />

Weinberg<br />

22. Leroy Hood Systems Biology 47. George<br />

Whitesides<br />

Theoretical Physics<br />

Chemistry—<br />

Spectroscopy<br />

23. Eric Kandel Neuroscience 48. Edward Wilson Biology—<br />

Myrmecology<br />

24. Andrew Knoll Paleontology 49. Edward Witten String Theory<br />

25. Charles Kao Fiber Optics 50. Shinya<br />

Yamanaka<br />

Stem Cell Research<br />

Inspiration<br />

Dr. Jamal Nazrul Islam


Dr. Jamal Nazrul Islam was at once a physicist, mathematician, astronomer, cosmologist and economist.<br />

He was famous for his research in the field of quantum cosmology, especially the birth, evolution and<br />

ultimate fate of the universe. He was the one who introduced black holes as krishno-bibor to Bengali<br />

readers and was the roommate and a very close friend of Stephen Hawking.<br />

Early Life & Education:<br />

Prof. Jamal Nazrul Islam was born on 24th February, 1939 in Jhinaidah. His father, Khan Bahadur Sirajul<br />

Islam was a sub-judge in undivided India. Due to his father's job Jamal Nazrul Islam spent his early<br />

school years in Kolkata. After finishing class four he came back to Chittagong and got admitted in<br />

Chittagong Collegiate School. He performed so well in the admission test that he was doubly promoted to<br />

class six. During his high school years he discovered his interest in mathematics and started solving the<br />

extra problems of geometry on his own.<br />

He studied in Chittagong Collegiate School till class ix, then went on to Lawrence College in West<br />

Pakistan where he passed the Senior Cambridge and Higher Senior Cambridge Exams. He studied BSc<br />

(Hons.) in Mathematics in St. Xavier’s College under University of Kolkata.<br />

In 1959, Jamal Nazrul Islam got his Honors in Functional Mathematics and Theoretical Physics from<br />

Cambridge University. He completed his Masters in 1960. A student of the famous Trinity College, he<br />

finished the Mathematical Tripos with brilliance. The Mathematical Tripos is reputed to be the most<br />

difficult exam in world mathematics history. After completing the final part of the Tripos (known as Part<br />

III) with distinction, Jamal N. Islam became a Ph.D. in 1964, and then a DSc (Doctor of Science) in 1982.<br />

Academic Career:<br />

Professor Islam was a theoretical physicist by profession. He worked as Post Doctoral Fellow in the<br />

University of Maryland, USA from 1963 to 1965. During 1967-1971 he worked at the Cambridge<br />

Institute of Theoretical Astronomy. He worked in the California Institute of Technology from 1971 to<br />

1972 and then joined Washington University as Senior Research Associate. Later, he joined London<br />

King’s College as Lecturer in Applied Mathematics. From 1975 to 1978 he worked as Fellow of Science<br />

Research Council, University College, Cardiff. He joined City University, London in 1978 and was soon<br />

promoted to Reader. He worked there until 1984. He also worked as a visiting member in the Institute of<br />

Advanced Studies, Princeton during this time.<br />

Upon his return to Bangladesh in 1984, he joined the Department of Mathematics, Chittagong University<br />

and founded the Research Center for Mathematical and Physical Sciences (RCMPS) of which he was the<br />

Director till his death. He was also a syndicate member of Chittagong University of Engineering and<br />

Technology (CUET).<br />

A Charismatic Personality:<br />

Dr. Islam was an extraordinary person. His distinct presence was enough to enliven the surroundings.<br />

Professor Islam had deep passion for music and painting. In gatherings of friends he liked to sing on the<br />

piano. He also took sitar lessons while studying in Cambridge. Once he learned a bandish from Ustad<br />

Bilayat Khan after a conference. He also learned a raga by Ustad Amjad Ali Khan. Later he learned to<br />

play it on the piano. One of his dreams was to play the raga on the piano for Ustad Amjad Ali Khan. He


was the president of Sadaranga Uchchanga Sangeet Parishad Bangladesh, which works to generate<br />

interest in classical music among the youths in Chittagong city.<br />

He used to love solving mathematical problems with his mind. He wasn't much interested in using a<br />

calculator.<br />

He was entirely committed to the country. In 1971 he wrote to many influential figures to help stop<br />

Pakistan’s barbarity on unarmed Bangladeshis. A true patriot, he brought his whole family back to<br />

Bangladesh, leaving behind a sophisticated life abroad. He chose his dear Chittagong University to<br />

promote the study of science among the youth of his country. He brought his teenage daughters to<br />

Bangladesh being perfectly aware of the huge cultural shock they would face, as they had grown up in<br />

England. But he did it because from the core of his heart, he wanted to instill patriotism in them, so that<br />

they could think about their own culture, own roots and the people of the country. The RCMPS he helped<br />

establish has given hundreds of students of Bangladesh the opportunity to conduct modern scientific<br />

research.<br />

He had good command over the Bengali language and actively promoted scientific study in Bengali. He<br />

wrote several books on the subject. As a teacher he was outstanding. In seminars and symposiums his<br />

presentations in Bengali often held the audience spell bound.<br />

Dr. Islam regularly contributed a part of his income for the education of poor students and consistently<br />

encouraged his students and companions to work for the country.<br />

In 2001, an apocalyptic prophesy started to spread around. Dr. J N Islam used mathematical calculation to<br />

prove it wrong. He proved that the world would survive even if all the planets were in a straight line.<br />

Publications:<br />

Dr. Islam authored, coauthored or edited more than 50 books and scientific articles. Some popular articles<br />

were published in various prestigious scientific journals. In 1977 he published an article on the ultimate<br />

fate of the universe in The Quarterly Journal of the Royal Astronomical Society. Later, in 1983, he turned<br />

that article into a book titled The Ultimate Fate of the Universe published by Cambridge University Press<br />

(CUP). Scientists across the globe were moved by the book. Based on some observations, scientists had<br />

concluded that the universe was expanding at an increasing rate. It appeared that the universe was indeed<br />

open and would go on to live forever. What was the ultimate fate of such an open universe? Professor<br />

Jamal Nazrul Islam was the first to address and give an answer to this very important physical question in<br />

his book. It was translated in Japanese, French, Portuguese and Yugoslav languages. In 1984 he edited<br />

Classical General Relativity jointly with W.B.Bono. Several other books were published from CUP,<br />

including Rotating Fields in General Relativity in 1985 and An Introduction to Mathematical Cosmology<br />

in 1992. Sky and Telescope, also published from Cambridge, was translated in Spanish, The Future of the<br />

Universe translated in German, Dutch and Italian.<br />

In the later years his interest spread to many different subjects including biology, microbiology and<br />

economics. He was fond of finding out the relationship between mathematics with subjects other than<br />

physics. His book Introduction to Mathematical Economics and Social Choice, also published from<br />

Cambridge, was a result of this expanding interest.<br />

He also wrote in Bengali. His noteworthy Bengali books are Krishna Bibor (Black Hole), the Mother<br />

Tongue, Scientific Research and Other Articles and Art, Literature and Society.


Awards:<br />

Bangladesh Academy of Science awarded Dr. Islam with a Gold Medal in 1985. In 1994, he received the<br />

National Science and Technology Medal. In 1998, he received the Medal Lecture Award in the 3rd World<br />

Academy of Science in the Abdus Salam Centre for Science and Theoretical Physics located in Italy. In<br />

2001, he was awarded the Ekushey Padak for his research in Bengali. He received the Bangladesh<br />

Science Academy Gold Medal in 1985. In 2011, in recognition of his contribution, Dhaka University<br />

awarded him with the Razzaq-Shamsun Lifetime Achievement Award in Physics.<br />

Celebrated physicist, cosmologist and mathematician Professor Emeritus Dr. Jamal Nazrul Islam passed<br />

away at the age of 74 on March 16, 2013 in a private hospital in Chittagong. He had been suffering from<br />

lung infection and heart disease.<br />

Science Academies<br />

Bangladesh Academy of Sciences (BAS)<br />

Bangladesh Academy of Sciences (BAS) was constituted in 1973 with 12 Foundation Fellows. It is the<br />

premier scientific body of the country unique in dimension and character as compared to such<br />

organization as Societies and Associations. The Academy currently consists of 55 distinguished<br />

Bangladeshi scientists as Elected Fellows, 15 as Expatriate Fellows and 13 eminent foreign scientists of<br />

international repute as Foreign Fellows. This resource of talent and expertise can be utilized in the<br />

broader public domain as a consultative and advisory body to the government on all scientific matters.<br />

This supreme scientific institution has been trying to enhance the efforts of promising scientists by<br />

recognizing high caliber scientific activities in Bangladesh.<br />

The Bangladesh Academy of Sciences came into being through registration under the Societies<br />

Registration Act, XXI of 1860. The Constitution and Regulations were adopted on June 27, 1978, and<br />

were amended on March 25, 1988, March 30, 1997 and were further amended on July 8, 2000.


Fellows are elected from among the distinguished scientists and technologists of the country. A<br />

Fellow/Expatriate Fellow of the Academy usually proposes the name of a renowned scientist of repute<br />

and achievement and the nominee is seconded by 2 Fellows of the Academy. The final selection is made<br />

by election through secret ballot. Election of distinguished Foreign Fellows in advisory capacities is also<br />

made on the basis of their world-wide recognition of eminence in their respective fields, and their<br />

contribution to the promotion of science in Bangladesh. At present, there are 55 Fellows, 15 Expatriate<br />

Fellows and 13 Foreign Fellows with the Academy.<br />

At present, there is no particular provision to induce young scientists below 40 years of age to the<br />

Academy, but any scientist irrespective of age having a unique, unprecedented and classical performance<br />

and achievement may be nominated to the Fellowship of BAS for election. However, the council of the<br />

BAS has taken a decision to make such a provision in the constitution of the BAS so that young and<br />

promising scientists under the age of 40 years may be induced in the Academy. At present there is no<br />

particular proactive measure to increase the number of female fellows, but the opportunity is equal<br />

irrespective of gender and age. Presently there are 4 women fellows out of 55 i.e. approximately 7.3%.<br />

As per constitution, the administration, direction and management of the affairs of the Academy is<br />

entrusted to a Council composed of the following officers and members: a) President; b) Two Vice-<br />

Presidents; c) Treasurer; d) Secretary; e) Associated Secretary; f) Immediate past Secretary (Ex-officio);<br />

and g) six ordinary members of the council. The officers and members of the Council shall be elected<br />

from amongst the Fellows of the Academy. No officer shall hold the same office continuously for more<br />

than two consecutive terms but he/she will be eligible for re-election to that after a lapse of one term<br />

thereafter. The election of officers and members of the Council shall take place every four years at the<br />

Annual General Meeting of the Academy on the basis of a simple majority.<br />

Project Introduction


What Is Graphene? 5 Incredible Facts About The 'Miracle Material' You<br />

Need To Know<br />

By Dave Smith @redletterdave on August 26 2013 2:18 PM EDT<br />

The extraordinary features and benefits of graphene make it sound like it was taken out of a<br />

comic book, but while the super material could change our world as we know it, graphene must<br />

overcome several obstacles related to viability before it’s ready for mass usage.<br />

“Graphene is a complicated technology to deliver,” Quentin Tannock, chairman of UK research<br />

firm Cambridge Intellectual Property, told The Wall Street Journal. “The race to find value is<br />

more of a marathon than a sprint.”<br />

It may be awhile until graphene is readily available to the public -- the material was finally<br />

isolated only a decade ago -- but scientific interest in graphene has exploded, leading to a “land<br />

rush of patents” filed by companies like Apple, IBM, Saab and Lockheed Martin. Here are five<br />

facts about graphene that may explain all the fuss about the so-called “miracle material.”<br />

1. It's super strong. Graphene is the thinnest material known to mankind, but it is also<br />

incredibly strong -- about 200 times stronger than steel. And yet, graphene can be made from<br />

graphite, also known as ordinary pencil lead.<br />

2. It's super thin. Described as a “one-atom thick layer of the layered mineral graphite,”<br />

graphene only has two dimensions, making it the thinnest but strongest material ever created.<br />

Researchers from Columbia University said it would take an elephant balanced on a pencil to<br />

puncture a graphene sheet with the same thickness as Saran Wrap (~12.7 microns, which is about<br />

one-half of one-thousandth of an inch).<br />

3. It's silicon 2.0. Graphene is an excellent conductor of heat and electricity like silicon, but<br />

unlike silicon, graphene is not brittle, highly flexible, and conducts electricity much more<br />

efficiently.<br />

4. It's expensive. Although graphene can be derived from pencil lead, the material is actually<br />

very expensive. Some U.S. vendors sell a layer of graphene on copper foil for roughly $60 per<br />

square inch. Many companies insist graphene needs to cost around $1 per square inch to be used<br />

for tech applications like transistors, and less than 10 cents an inch to be applied to touch-screen<br />

displays.<br />

5. It's versatile. Graphene is one of the most diverse materials known to mankind, given how<br />

many of its properties are only exploited when graphene is combined with other elements,<br />

including gases, metals, and sources of carbon. In 2011, Rice University’s Dr. Tour showed how<br />

graphene can be synthesized from unique carbon sources including Girl Scout cookies,<br />

cockroach legs, and grass.<br />

Researchers from companies big and small continue to investigate and patent graphene to learn<br />

its properties and applications. Graphene is currently being tested to be used as ink, transistors,<br />

airplane wings, computer chips, batteries, flexible touch screens, anti-rust coatings, tires, DNAsequencing<br />

devices, headphones, saltwater filters, tennis rackets, antennas, solar cells, paint,<br />

windows, and even living tissue applications such as bionic limbs. But before any of these


applications are ready for primetime, researchers will need to address the study from Brown<br />

University that says graphene exhibits toxic qualities towards humans.<br />

(Accessed from http://www.ibtimes.com/what-graphene-5-incredible-facts-about-miraclematerial-you-need-know-1399503<br />

)<br />

Programming Language<br />

HAL/S, A Real-Time Language for Spaceflight<br />

HAL/S (High-order Assembly Language/Shuttle) is a real-time aerospace programming language, best<br />

known for its use in the Space Shuttle program. It was designed by Intermetrics in the 1970s for NASA.<br />

HAL/S is written in XPL, a dialect of PL/I. HAL/S is a high-level programming language commissioned<br />

by NASA in the late 1960s to meet the real-time programming needs of the Agency. At the time,<br />

programs used on board spacecraft were either written in assembly languages or in interpreted languages.<br />

The former make programs difficult to write and maintain, and the latter are insufficiently robust and<br />

slow. Also, future systems were expected to be much larger and more complex, and cost would be<br />

moderated by the use of a high-level language.<br />

The three key principles in designing the language were reliability, efficiency, and machineindependence.<br />

The language is designed to allow aerospace-related tasks (such<br />

as vector/matrix arithmetic) to be accomplished in a way that is easily understandable by people who have<br />

spaceflight knowledge, but may not necessarily have proficiency with computer programming.<br />

HAL/S was designed not to include some constructs that are thought to be the cause of errors. For<br />

instance, there is no support for dynamic memory allocation. The language provides special support<br />

for real-time execution environments.<br />

Some features, such as "GOTO" were provided chiefly to ease mechanical translations from other<br />

languages.<br />

On the Preface page of the HAL/S Language Specification, it says,<br />

Fundamental contributions to the concept and implementation of MAC were made by Dr. J. Holcombe<br />

Laning of the Draper Laboratory.<br />

"HAL" was suggested as the name of the new language by Ed Copps, a founding director of Intermetrics,<br />

to honor Hal Laning, a colleague at MIT.<br />

A proposal for a NASA standard ground-based version of HAL named HAL/G for "ground" was<br />

proposed, but the coming emergence of the soon to be named Ada programming language contributed to<br />

Intermetrics' lack of interest in continuing this work. Instead, Intermetrics would place emphasis on what<br />

would be the "Red" finalist which would not be selected.<br />

Syntax<br />

HAL/S is a mostly free-form language: statements may begin anywhere on a line and may spill over the<br />

next lines, and multiple statements may be fit onto the same line if required. However, non-space<br />

characters in the first column of a program line may have special significance. For instance, the letter 'C'<br />

in the first column indicates that the whole line is a comment and should be ignored by the compiler.<br />

One particularly interesting feature of HAL/S is that it supports, in addition to a normal single line text<br />

format, an optional three-line input format in which three source code lines are used for each statement. In<br />

this format, the first and third lines are usable for superscripts (exponents) and subscripts (indices). The<br />

multi-line format was designed to permit writing of HAL/S code that is similar to mathematical notation.<br />

As an example, the statement<br />

X = A ** 2 + B$(I) ** 2<br />

could be written in single-line format as:


Exponentiation is denoted by two asterisks, as in PL/I and FORTRAN. The subscript is denoted by<br />

a dollar sign, with the subscript expression enclosed in parentheses. The same code fragment could be<br />

written in multiple-line format as:<br />

M<br />

E = A 2 + B 2 i<br />

S<br />

In the example, the base line of the statement is indicated by an 'M' in the first column, the exponent line<br />

is indicated by an 'E', and the subscript line is indicated by an 'S'.<br />

Data types<br />

HAL/S has native support for integers, floating point scalars, vector, matrices, Booleans and strings of 8-<br />

bit characters, limited to a maximum length of 255. Structured types may be composed using<br />

a DECLARE STRUCT statement.<br />

Since NASA directed the development of the language from the start, it influenced the final form it took<br />

and specifically how it handled the special needs of real-time processing. Statements common to other<br />

high-level languages such as FORTRAN and PL/1 were put in HAL. These included decision statements<br />

such as IF and looping statements such as FOR, DO, and WHILE. NASA added to the list of statements<br />

several specifically designed to create real-time processes, such as WAIT, SCHEDULE, PRIORITY, and<br />

TERMINATE. The objective was to make HAL quickly understandable to any programmer who had<br />

worked in other languages and to give a variety of tools for developing the new real-time programs. To<br />

make the language more readable by engineers, HAL lists source in such a way as to retain traditional<br />

notation, with subscripts and superscripts in their correct position, as contrasted with other languages,<br />

which force such notation onto a single level.<br />

In addition to new statements, HAL provided for new types of program blocks. Two of these specific to<br />

real-time processing are COMPOOL and TASK. "Compools" are declarations of data to be kept in a<br />

common data area, thus making the data accessible to more than one process at a time. It was expected<br />

that several processes would be active at once and that many data items would need to he dynamically<br />

shared. Task blocks are programs nested within larger programs that execute as real-time processes<br />

dependent on one of the most powerful HAL statements, SCHEDULE.<br />

Scheduling the execution of specific tasks was simplified by the syntax of HAL. Fig. 1 shows the final<br />

page of the procedure STARTUP, written for use on the Galileo spacecraft attitude control computers,<br />

containing the master scheduling for the entire program. Note that the components of the SCHEDULE<br />

statement are the task name, start time, priority, and frequency. The statement "SCHEDULE ERROR0<br />

ON RUPT0 PRIORITY (22);" tells the operating system to execute the task ERROR0 when an interrupt<br />

named RUPT0 occurs with a relative priority of 22. A different form of the SCHEDULE statement is<br />

"SCHEDULE RGl PRIORITY (12), REPEAT EVERY 6.190," which initiates the task handling the<br />

highest frequency rate group and repeats it 15 times per second. The statement TERMINATE cancels a<br />

specified task upon a designated interrupt or time.<br />

HAL did not have the widespread use NASA had hoped for when the language was designed. Although<br />

the Shuttle on-board programs are exclusively in HAL, the Galileo attitude control system is the only<br />

other flight project to make significant use of the language. Other projects, though instructed to use HAL,<br />

found reasons to avoid it, although the Deep Space Network applied it to some ground software. In late<br />

1985, NASA announced that the language of choice for the upcoming Space Station project would be<br />

Ada. Commissioned by the Department of Defense in the late 1970s to serve as a standard for all<br />

contractor software development, Ada includes real-time constructs pioneered by HAL such as task


locks, scheduling, and common data. The announcement made NASA the first nonmilitary agency to use<br />

Ada. Ada was adopted because commercial compilers were available and because the DoD's insistence on<br />

its use meant that it would be around for a long time. It appears that HAL will be phased out, destined to<br />

join the hundreds of other dead computer languages.<br />

___________________________________________________________________________________<br />

What/Why/How<br />

What is Arduino<br />

Overview:<br />

Have you ever wanted to create a program that could literally make your coffee for you? If so, you might<br />

be interested in microcontroller development.<br />

Microcontrollers are notorious for being difficult to program; the goal of Arduino is to create an<br />

accessible way for software developers to enter the world of microcontroller programming. Arduino is a<br />

microcontroller interface built around an Atmel ATmega processor, coupled with a language and<br />

programming environment for creating logic on the chip.<br />

Software and Hardware:<br />

Arduino is open source, both in its software and hardware specification, so that hobbyists can assemble<br />

the simplest Arduino modules themselves by hand. More sophisticated pre-assembled Arduino modules


can be purchased and usually cost less than $50. The hardware comes in many format specifications, from<br />

a small wearable device, to larger surface mounted modules. The primary mode of computer connection<br />

is via USB, though Bluetooth, serial and ethernet form factors also exist.<br />

The Arduino software is free and open source. The programming platform is based on the popular Wiring<br />

language. The IDE is based on Processing, which is a well-known language among designers and<br />

prototypers. Unlike most microcontroller interfaces, Arduino is cross-platform; it can be run<br />

on Windows, Linux andMacintosh OS X.<br />

Applications:<br />

Arduino allows users a simple pathway to create interactive objects that can take input from switches and<br />

sensors, and control physical outputs like lights, motors or actuators. Because the language is based on<br />

well-used frameworks, Arduino can interact with other software on the computer like Flash or evenweb<br />

APIs like Twitter.<br />

Projects:<br />

The platform has already fostered a community of developers who are sharing a lot of open-source work.<br />

Enthusiasts have used it to create a wide range of innovative projects, from software thermostat<br />

controllers, to baby monitors that send SMS alerts, to a toy gun that fires every time a certain hash tag is<br />

used on Twitter. And yes, there's even a whole page of Arduino projects for controlling coffee appliances.<br />

Importance of Arduino:<br />

While some of these Arduino projects may seem frivolous, the technology actually taps into a number of<br />

trends that will make it a potentially important force in the industry. "The Internet of Things" is a popular<br />

phrase used in the tech community to describe everyday items that are connected to the Internet and able<br />

to share information. Smart energy meters are an often-used example, which could regulate appliance<br />

usage to save money on energy. Many consider the Internet of things to be an important part of the<br />

loosely defined phenomenon called Web 3.0<br />

Also, the concept of ubiquitous computing is fast becoming a cultural norm. Public perception and<br />

comfort level is shifting towards integrating technology into the fabric of everyday life. The small form


factor of Arduino allows it to be applied in all kinds of everyday objects. In fact, the Arduino LilyPad<br />

form factor allows for wearable Arduino devices.<br />

Tool for Innovation:<br />

Open source projects like Arduino lower the barrier of entry for developers that are looking to experiment<br />

with interactive objects. This will create an opportunity for a new wave of energy and startups in creating<br />

the Internet of things. These innovators will be able to rapidly prototype and experiment with interactive<br />

devices by using the Arduino platform, before creating a production-ready offering. The next Mark<br />

Zuckerberg or Steve Jobs may one day be found creating new ways for computers to interface with the<br />

physical world. It would be wise to pay attention to this space, and Arduino is a great way to “dip your<br />

toes” into the possibilities of interactive objects.<br />

Unsolved /Solved<br />

Student mistakes examples of unsolved math problems for homework assignment and solves them.<br />

One day in 1939, George Bernard Dantzig, a doctoral candidate at the University of California, Berkeley,<br />

arrived late for a graduate-level statistics class and found two problems written on the board. Not<br />

knowing they were examples of unsolved statistics problems, he mistook them for part of a homework<br />

assignment, jotted them down, and solved them. (The equations Dantzig tackled are more accurately<br />

described not as unsolvable problems, but as unproved statistical theorems for which he worked out<br />

proofs.) Six weeks later, Dantzig's statistic professor notified him that he had prepared one of his two<br />

"homework" proofs for publication, and Dantzig was given co-author credit on another paper several<br />

years later when another mathematician independently worked out the same solution to the second<br />

problem.<br />

George Dantzig recounted his feat in a 1986 interview for the College Mathematics Journal:<br />

It happened because during my first year at Berkeley I arrived late one day at one of [Jerzy] Neyman's<br />

classes. On the blackboard there were two problems that I assumed had been assigned for homework. I<br />

copied them down. A few days later I apologized to Neyman for taking so long to do the homework —<br />

the problems seemed to be a little harder than usual. I asked him if he still wanted it. He told me to throw<br />

it on his desk. I did so reluctantly because his desk was covered with such a heap of papers that I feared<br />

my homework would be lost there forever. About six weeks later, one Sunday morning about eight<br />

o'clock, [my wife] Anne and I were awakened by someone banging on our front door. It was Neyman. He<br />

rushed in with papers in hand, all excited: "I've just written an introduction to one of your papers. Read it<br />

so I can send it out right away for publication." For a minute I had no idea what he was talking about. To<br />

make a long story short, the problems on the blackboard that I had solved thinking they were homework<br />

were in fact two famous unsolved problems in statistics. That was the first inkling I had that there was<br />

anything special about them.<br />

A year later, when I began to worry about a thesis topic, Neyman just shrugged and told me to wrap the<br />

two problems in a binder and he would accept them as my thesis.<br />

The second of the two problems, however, was not published until after World War II. It happened this<br />

way. Around 1950 I received a letter from Abraham Wald enclosing the final galley proofs of a paper of<br />

his about to go to press in the Annals of Mathematical Statistics. Someone had just pointed out to him that<br />

the main result in his paper was the same as the second "homework" problem solved in my thesis. I wrote<br />

back suggesting we publish jointly. He simply inserted my name as coauthor into the galley proof.


Dr. Dantzig also explained how his story passed into the realm of urban legendry:<br />

The other day, as I was taking an early morning walk, I was hailed by Don Knuth as he rode by on his<br />

bicycle. He is a colleague at Stanford. He stopped and said, "Hey, George — I was visiting in Indiana<br />

recently and heard a sermon about you in church. Do you know that you are an influence on Christians of<br />

Middle America?" I looked at him, amazed. "After the sermon," he went on, "the minister came over and<br />

asked me if I knew a George Dantzig at Stanford, because that was the name of the person his sermon<br />

was about."<br />

The origin of that minister's sermon can be traced to another Lutheran minister, the Reverend Schuler<br />

[sic] of the Crystal Cathedral in Los Angeles. He told me his ideas about thinking positively, and I told<br />

him my story about the homework problems and my thesis. A few months later I received a letter from<br />

him asking permission to include my story in a book he was writing on the power of positive thinking.<br />

Schuler's published version was a bit garbled and exaggerated but essentially correct. The moral of his<br />

sermon was this: If I had known that the problem were not homework but were in fact two famous<br />

unsolved problems in statistics, I probably would not have thought positively, would have become<br />

discouraged, and would never have solved them.<br />

The version of Dantzig's story published by Robert Schuller contained a good deal of embellishment and<br />

misinformation which has since been propagated in urban legend-like forms of the tale such as the one<br />

quoted at the head of this page: Schuller converted the mistaken homework assignment into a "final<br />

exam" with ten problems (eight of which were real and two of which were "unsolvable"), claimed that<br />

"even Einstein was unable to unlock the secrets" of the two extra problems, and erroneously stated that<br />

Dantzig's professor was so impressed that he "gave Dantzig a job as his assistant, and Dantzig has been at<br />

Stanford ever since."<br />

George Dantzig (himself the son of a mathematician) received a Bachelor's degree from University of<br />

Maryland in 1936 and a Master's from the University of Michigan in 1937 before completing his<br />

Doctorate (interrupted by World War II) at UC Berkeley in 1946. He later worked for the Air Force, took<br />

a position with the RAND Corporation as a research mathematician in 1952, became professor of<br />

operations research at Berkeley in 1960, and joined the faculty of Stanford University in 1966, where he<br />

taught and published as a professor of operations research until the 1990s. In 1975, Dr. Dantzig was<br />

awarded the National Medal of Science by President Gerald Ford.<br />

George Bernard Dantzig (November 8, 1914 – May 13, 2005) was an American mathematical<br />

scientist who made important contributions to operations research, computer science, economics,<br />

and statistics.


Dantzig is known for his development of the simplex algorithm, an algorithm for solving linear<br />

programming problems, and his work with linear programming. In statistics, Dantzig solved two open<br />

problems in statistical theory, which he had mistaken for homework after arriving late to a lecture of Jerzy<br />

Neyman.<br />

Dantzig was the Professor Emeritus of Transportation Sciences and Professor of Operations Research and<br />

of Computer Science at Stanford.<br />

George Dantzig passed away at his Stanford home at age 90 on 13 May 2005.<br />

Sightings: This legend is used as the setup of the plot in the 1997 movie Good Will Hunting. As well,<br />

one of the early scenes in the 1999 film Rushmore shows the main character daydreaming about solving<br />

the impossible question and winning approbation from all.<br />

_____________________________________________________________________________________

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!