Sunday, 13 November 2016

What is term policy

Generally there are two types of insurance cover provided by companies:
1)Term 
2)Permanent.

Term is coverage for a specific period time It is just pure insurance, meaning there is usually no cash value  benefit inside the policy, just a death benefit. That is if you take a term policy worth 10 lakhs for 30 years and pay the premium for 30 years and nothing happens to you in these 30 years you will not get any return. 

But the premium payed on a term policy will be less. 

Depending on the amount of coverage, you will most likely be required to take a physical/medical exam, the insurance company will possibly request your medical records from your physician(s)/ health providers and undergo an underwriting process by the insurance company. Once approved your coverage will be in effect as long as you pay your premium until the policy term expires 


New bank exam pattern

Hi friends, as you all know that the bank exam pattern for bank p.o's and clerk has been changes in the last year. There are two things
1) Prelims
2) Mains

Prelims is just an elimination process where lot applicants will be filtered. It contains aptitude, english and reasoning. People who clear the prelims will be taking the mains.

Mains is somewhat different for some bank P.O. General questions will be on english  aptitude reasoning and general and banking awareness plus the computer knowledge.

Some banks also have the online descriptive exam for P.O.

There are no interviews for most of them and a few have interviews.

Thank you....

Friday, 11 November 2016

HP Bypass unit

Hi,

         Hpbypass unit is the important area in thermal power plant where the steam from the main steam line can be provided an alternative path to enter the CRH line bypassing the steam from entering the turbine. As this is directly connected to main steam line the pressure present is very high.

           This unit is very helpful when the system is started up and while the system is being shutdown, because under these conditions the parameters for enetering the turbine will not be met. HPBypass unit works in normal mode and fast open mode. Fast open mode is in service when boiler is in live condition and turbine alone trips to momentarily bypass the steam from entering the turbine the valves will open in a small time and stay for 3-5 sec in complete open or 100% open after that gets back to normal condition.

          The operation of the HPbypass unit is done via Hydraulic oil unit which supplies the control oil for proper valve operation. The HPbypass unit also contains the spray station which supplies spray water to cool down the high temperatures in the line. These valves operate on the oil pressure supplied to them as these are very important valves.

The hpbypass line normally opens in the unit shut down and unit start up period, but during the operation if  pressure crosses the set point defined, then the valve will open to down the pressure.


Also view LPBYPASS




Job opportunities for B.tech freshers

Hi Friends,

Lot of b.tech students or fresh graduates when they come out of the college they have only one or two ideas about how to start a carrier. Look below for various types of job opportunities present

1) Join for Higher studies.
2) Join as a faculty in engineering college (Now m.tech is minimum)
3) software
4) Staff selection commissiom
5) Bank P.o's and clerks
6) Bank specialist officers
7) State government jobs.
8) P.S.U jobs through gate.
9) If u are willing u can start a business.
10) Learn some hardware training in your area and join in your core job.

There are a lot of jobs i will update this list.

Best objective books for govt jobs(B.tech ECE)

Hi friends,

There are a lot of students who have great knowledge in the subject but it only expands and gives them a chance to get to utmost accuracy by solving numerous types of questions. Below is some books i suggest for ECE people

JB Gupta Question Bank in Electronics & Communication Engineering

GATE Electronics & Communication Vol 6 Digital Electronics (GATE 2015 EC by R. K. Kanodia 10 Volume Set)

GATE Electronics & Communication Vol 9 Communication Systems (GATE 2015 EC by R. K. Kanodia 10 Volume Set)





All the RK kanodia books and


These may have some wrong answer markings where JB Gupta and galgotia  does not give solutions

Thanks all

PHD

PHD or Doctor of Philosophy is the considered as one of the highest educational degree that a person can get. It is just not given as a mere degree it tests the strength of a person in the area of research. It tests the subject knowledge of a person and how he applies all his knowledge in the subject he has been accustomed. It involves presenting lot of papers in technical journals, national and international. One has to take a particular research topic and start understanding it from the basic and they study what has been the work completed so far and understand all the stuff. Once you have your topic and know what has been the work completed so far and what is the work going on . Then you can have get an idea what else you can add to the existing work or how better you can implement it by improving its performance. Once has to be accustomed with the tools and softwares used. Once you have completed your research and it has to be sent to verification once it is done. You wil be a PHD holder.

Every profession have its own challenges...

Hi Friends,

People of some professions always look at other professions as if they are only working hard and others are just enjoying the leisure hours enjoying the life and getting salaries paid without working  hard. This may be the case only in few cases. For example let us take the case of a bank employee for outsiders the bank employee starts the work at 10:30 in the morning and evening 4 the working hours closes. They think only six hours or 5 hours they are working and they also complain that their work is getting late and the employee is very lazy and curse them. What do actually happen no one thinks. A single bank employee performs maximum possible services on a single day. The delay may be due to delay in loading the bank software, or there may be a introduction of new staff and they need to get accustomed with the banking system. There may be prior official engagements, they have to verify each and every transaction with utmost care so that the people will never get problems later.

Take the case of a Faculty in a college 10 am to 4 Pm daily but how much time the faculty has to work to explain the students one hour class may be for one hour class one may prepare for 5-6 hours and also be ready to answer questions of the student.

Please do not just come to conclusion by just looking at there working hours or your work is not completed or delayed.
Thank You

Monday, 7 November 2016

WORKING OF A THERMAL POWER PLANT

Hi all,

     Thermal power plant involves a large number of equipment along with greater workforce. Let us look into the important areas of a thermal power plant. The basic building blocks of a thermal power plant includes the following.

  1. Boiler.
  2. Boiler auxillaries.
  3. Turbine.
  4. Turbine auxillaries.
  5. Generator
  6. Common auxillaries.
  7. PLC's .

     Initially during the startup or lightup of a thermal power plant the coal is not used as starting fuel as it does not have sufficient heat for combustion. So a thermal power plant is lightup using light oil which easily catches fire. After some time along with the light oil heavy oil is also burnt which is a bit less costly. Once sufficient temperature is reached  then coal is supplied to the boiler.(From the mills the coal is made into fine powder and transferred into the boiler using the primary air fan). The air required for the firing is supplied by the FD Fan. Before the lightup process actually takes place the boiler drum will be filled using the boiler feed pump. Once lightup is started the water from the drum is moved into the tubes present inside the boiler and starts to  get heated up. This heated water or steam will be using the main steam line to reach the turbine. But it will not be allowed into the turbine as the parameters will not be met. This line will be bypassed using the HPBypass system and the heated or partial steam will move into cold reheat line and moves into the boiler and gets heated again in the boiler and then comes back to IP turbine which is also bypassed using the LPBypass unit and then directly reaches the condenser.

     From the condenser the water is recycled using the Condensate extraction pumps and boiler feedpumps and reaches the boiler drum. Once sufficient parameters are reached for the steam to roll into the turbine the unit will be synchronised to the grid and steam is rolled into turbine.  The waste gas generated during this process is suck by the ID fan and released.

Thank You (Please click on individual links)


ADVANCE ENCRYPTION STANDARD

Hi 

                        ADVANCED ENCRYPTION STANDARD ALGORITHM
            The increasing need for protecting data communication in computer networks has led to development of several cryptography algorithms. The Advanced Encryption  Standard (AES) is a computer security standard issued by the National Institute of Standards and Technology (NIST) intended for protecting electronic data. Its specification is defined in Federal Information Processing Standards (FIPS) Publication 197.
Features of AES algorithm
·        The AES cryptography algorithm can be used to encrypt/decrypt blocks of 128 bits and is capable of using cipher keys of 128, 196 or 256 bits wide (AES128, AES196, and AES256).
·        Encryption consists of 10 rounds of processing for 128-bit keys, 12 rounds for 192-bit keys, and 14 rounds for 256-bit keys. Except for the last round in each case, all other rounds are identical. Each round of processing includes one single-byte based substitution step, a row-wise permutation step, a column-wise mixing step, and the addition of the round key.
·        The order in which these four steps are executed is different for encryption and decryption.
·        A 128-bit block as consisting of a 4 × 4 matrix of bytes, arranged as follows



Therefore, the first four bytes of a 128-bit input block occupy the first column in the 4 × 4 matrix of bytes. The next four bytes occupy the second column, and so on.
·        The 4 × 4 matrix of bytes is referred to as the state array.
·        AES also has the notion of a word. A word consists of four bytes, that is 32 bits. Therefore, each column of the state array is a word, as is each row.
·        Each round of processing works on the input state array and produces an output state array.
·        The output state array produced by the last round is rearranged into a 128-bit output block.
·        AES is a subset and slightly modified form of Rijndael algorithm.
·        AES requires the block size to be 128 bits, the original Rijndael cipher works with any block size  that is a multiple of 32 as long as it exceeds 128. The state array for the different block sizes still has only four rows in the Rijndael cipher.

The Encryption Key and its Expansion
·        Assuming a 128-bit key, the key is also arranged in the form of a matrix of 4 × 4 bytes. As with the input block, the first word from the key fills the first column of the matrix, and so on.
·        The four column words of the key matrix are expanded into a schedule of 44 words. Each round consumes four words from the key schedule.
·        The figure below depicts the arrangement of the encryption key in the form of 4-byte words and the expansion of the key into a key schedule consisting of 44 4-byte words.


                        Expansion of encryption into 44- 4 Byte word





Complete Structure of AES

·        The number of rounds are 10, is for the case when the encryption key is 128 bit long.
·        Before any round-based processing for encryption can begin, the input state array is do ne XOR with the first four words of the key schedule. The same thing happens during decryption — except that now we XOR the ciphertext state array with the last four words of the key schedule.
·        For encryption, each round consists of the following four steps
            1) Substitute bytes
                        This step consists of using a 16 × 16 lookup table to find a        replacement                             byte for a given byte in the input state array. The entries in the lookup table                are created by using the notions of multiplicative inverses in GF (28) and bit                        scrambling to destroy the bit-level correlations inside each byte.
            2) Shift rows
                        For shifting the rows of the state array during the forward process
            3) Mix columns
                        For mixing up of the bytes in each column separately during the forward                                     process
            4) Add round key.
                        For adding the round key to the output of the previous step during the                            forward process
·        The last step consists of XOR the output of the previous three steps with four words from the key schedule.
·        For decryption, each round consists of the following four steps
            1) Inverse shift rows
            2) Inverse substitute bytes
            3) Add round key        
            4) Inverse mix columns.
·        The third step consists of XOR the output of the previous two steps with four words from the key schedule.
·        The last round for encryption does not involve the “Mix columns” step. The last round for decryption does not involve the “Inverse mix columns” step.


 Thank You





Affiliate marketing

Hi,

Affiliate marketing is a type of performance oriented marketing in which a business rewards one or more affiliates- a person who is affiliated to market their product, for each visitor or customer brought by the affiliate's own marketing efforts. The industry has four core players: the merchant (also known as 'retailer' or 'brand'), the network (that contains offers for the affiliate to choose from and also takes care of the payments), the publisher (also known as 'the affiliate'), and the customer. The market has grown in complexity, resulting in the emergence of a secondary tier of players, including affiliate management agencies, super-affiliates and specialized third party vendors.

Affiliate marketing overlaps with other Internet marketing methods to some degree, because affiliates often use regular advertising methods. Those methods include organic search engine optimization (SEO), paid search engine marketing (PPC - Pay Per Click), e-mail marketing, content marketing and in some sense display advertising. On the other hand, affiliates sometimes use less orthodox techniques, such as publishing reviews of products or services offered by a partner.

Affiliate marketing is commonly confused with referral marketing, as both forms of marketing use third parties to drive sales to the retailer. However, both are distinct forms of marketing and the main difference between them is that affiliate marketing relies purely on financial motivations to drive sales while referral marketing relies on trust and personal relationships to drive sales.

Affiliate marketing is frequently overlooked by advertisers.While search engines, e-mail, and website syndication capture much of the attention of online retailers, affiliate marketing carries a much lower profile. Still, affiliates continue to play a significant role in e-retailers' marketing strategies.


Affiliate marketing

Source : wiki
Thanks all

Tuesday, 1 November 2016

My views on Hidden Economic potential of India

Hi All,

     I always have some views on the tremendous economic potential in India which is hidden in its culture and is still laid untapped for decades. India a country which has Unity in diversity , where people of various sects live together amicably celebrating their festivals which has tremendous economic potential to provide jobs for lot of people and also adding to the Indian Economy.

     Some others have recognised this potential and are providing jobs, People of our country also recognised this but are trying in their individual capacity and not on a larger scale. People in our country celebrate a lot of rituals which include various materials. For example Deewali has crackers associated with it, Sankranthi comes with flying Kites especially in AP/Telangana and Holy with colours.

     Like the above there are number of  festivals which has its own importance but also brings with  it a great economic potential that is left untouched.

Thanks all

Short Channel effects and remedies

Hi ,

         Since the fabrication of MOSFET, the minimum channel length has been shrinking continuously. The motivation behind this decrease has been an increasing interest in high speed devices and in very large scale integrated circuits. The sustained scaling of conventional bulk device requires innovations to circumvent the barriers of fundamental physics constraining the conventional MOSFET device structure. The limits most often cited are control of the density and location of dopants providing high I on /I off ratio and finite subthreshold slope and quantum-mechanical tunneling of carriers through thin gate from drain to source and from drain to body. The channel depletion width must scale with the channel length to contain the off-state leakage I off. This leads to high doping concentration, which degrade the carrier mobility and causes junction edge leakage due to tunneling. Furthermore, the dopant profile control, in terms of depth and steepness, becomes much more difficult. The gate oxide thickness tox must also scale with the channel length to maintain gate control, proper threshold voltage VT and performance. The thinning of the gate dielectric results in gate tunneling leakage, degrading the circuit performance, power and noise margin.

           Now as the gate  channel is still reduced the effects which are not dominant while the channel is long come into picture and these affect the device functionality . These are known as the short channel effects. There are various short channel effects which are present as the channel is shrinking down.  In electronics, a short-channel effect is an effect whereby a MOSFET in which the channel length is the same order of magnitude as the depletion-layer widths (xdD, xdS) of the source and drain junction, behaves differently from other MOSFETs as the channel length L is reduced to increase both the operation speed and the number of components per chip, the so-called short-channel effects arise.

 The short-channel effects are attributed to two physical phenomena:
  1. The limitation imposed on electron drift characteristics in the channel,
  2. The modification of the threshold voltage due to the shortening channel length.

In particular five different short-channel effects can be distinguished:
  1.  drain-induced barrier lowering and punch through
  2.  surface scattering
  3.  velocity saturation
  4.  impact ionization
  5.  hot electron effect
            To minimize these effects and make further scaling down first SOI MOSFET is developed and then the FINFET has come into picture