Thursday, April 29, 2010

ARTICLE 17:trusciencetrutechnology 70th B;Day Volume of KLN: THE VISAKHAPATNAM ENVIRONMENTAL PROTECTION by Shri C S Rao (Retd.) Ind.Econ.Serv. GOI




70th Birth Day Volume Year 2009 to 2010 of Prof Dr Kotcherlakota Lakshmi Narayana
ARTICLE No.17: dated: 29th April 2009:19:00PM
ARTICLE No.17:
THE VISAKHAPATNAM ENVIRONMENTAL PROTECTION
By
C. S. Rao, (Retd.) Indian Economic Service (Government of India),
302, Sri Venkateswara Towers, D.No. 47-3-31, 5th Lane, Dwarakanagar, Visakhapatnam-530016:
Tel .No.0891-2534353.
ABSTRACT:
An Economic Model need to be developed to help the master planners of Visakhapatnam and the like Mega-cities of India, for avoidance of their considerate views of finance ready cash generation in the style of existing Municipality practices and expressively to avoid the imminent and concomitant creation of Health & Environmental Hazards by pavement sellers. Valiant efforts and unprecedented action plans might only save Visakhapatnam city from its hazards of environmental destruction and exploitation. Need of a Public park at the vacant land (of the X-Jail) in the middle of Mega City for relaxation, greenery and enjoyment for the aged, family members and the children..
Keywords: Environmentally clean Mega cities, High Court Order, Public Park, Econometrics, Urban development, Pollution Board, Member Secretary, Vintage Visakha President, PIL petition.
Preamble:
Valiant efforts and unprecedented action plans might only save Visakhapatnam city from its hazards of environmental destruction and exploitation. The natives of the city have become virtually a minority without any powers of expression or redressers. The attempts by various organizations have become sidestepped and the migrant populace have become the voting power. The dismal picture of the city, is that it is governed by people who have scant respect or appreciation of the city of Academic Excellence and of its’ Scenario Beauty. Every opportunity in the name of development projects is being made and opportunities are being deliberately created of the city’s exploitation by the greedy and in the name of so-called populous opinion. Prof A.R. Subrahmanium, President Visakha Vintage has also made a PIL petition in this context that was received and acknowledged.
the order of High Court:
The present author has spectacularly won “By the order of High Court petition dated 24 -2- 2005 in W. P. No. 3032/2005 his petition and the court while directing the registry to post the W..P on 28 -3- 2005 ordered that in the meanwhile, it is directed that status quo obtaining as on today shall continue to be maintained with respect to A.C.30.00 of land vacated by the x jail authorities and there shall not be any allotment of the said land except with prior approval of court.(Order Follows: High Court W.P. 3032/2005:Asst.Registrar, High Court of Andhra Pradesh)” Wire (1).to Principal Secretary, Municipal Administration and Urban development Dept., Sectt, Government of AP: (2).The Collector, Visakhapatnam District, Collectorate, Visakhapatnam 530002: (3) The Commissioner, Municipal Corporation of Visakhapatnam, Asilmetta, Visakhapatnam 530003: (4). The Member Secretary Pollution Control Board, Visakhapatnam Branch, Govt.of AP, VUDA administrative office, Siripuram Junction, Visakhapatnam 530003: (5). The Vice-Chairman and Managing Director, Visakhapatnam Urban Development authority, Visakhapatnam










News:
Ramesh Susarla has said in a report dt.Oct 17th, 2005 of The Hindu, Newspaper that there is a stiff resistance by Vizagites to convert the vacant land of the X-Jail to make it a concrete jungle and they have opted for maintenance of it with the natural green cover of hundreds of years old trees including that of the exceptionally powerful Neem trees. (These trees hold the oxygen in its photosynthetic process even during the night times- Prof Madam Maheswari, first D. Sc . (Botany) in India, Botany Professor of AU). Centuries old boundary wall has already been demolished in the name of road widening that eventually would help to promote illegal use of pavements by “gadda” goods and food sellers, making it an unbearable pollution hazard of waste, throw-away rubbish etc foul smelling and unhealthy material. The unscientific and uneducated argument of allowing these to flourish on the pavements is that they fetch daily income to Municipality, ready cash for the utilisation by Municipality, for its thoughtful enterprises of road building etc. works.
An Economic Model need to be developed to help the master planners of Visakhapatnam and the like Mega-cities of India,
i. For avoidance of their considerate views of finance ready cash generation in the style of existing Municipality practices, and
ii. Expressively to avoid the imminent and concominent creation of Health & Environmental Hazards by pavement sellers.
Picture of the Old Jail area is given below:










The Hindu on the 18th July 2009 brought out the welcoming specific news item of X-Jail vacant land to be made as an environmentally healthy public park for relaxation, greenery and enjoyment for the aged, family members and the children.






CONCLUSION :
The city dwellers need to have a rethinking on their healthy and environmentally clean surroundings’ in the city with the primary object of leading a life in a city of environmentally compatible public parks and natural relaxation centres for the aged, family groups, and especially the budding children for their Brain & Body healthy growth, instead of living in concrete jungles and in between the gigantic commercial exploiters’ complexes.
Visakhapatnam: Tuesday, 27 April 2010 Time: 10:26:01 A.M.
EDITOR'S NOTE: Both Shri C S Rao and Prof Maheswari of Visakhaptanm expressed their fond memories of late Prof, K,Rangadhama Rao D.Sc(Madras) D.Sc.(London) when they were students at the Andhra University during the decade of 1950s. Following is a picture of the ART's College Principal's Office.



Sunday, April 25, 2010

ARTICLE 27 trusciencetrutechnology 70th B'Day Volume 2009-2010 CRYPTOGRAPHY By PVPDeekshit
















ARTICLE 27: trusciencetrutechnology@blogspot.com 70th B’Day Voume.2009-2010
CRYPTOGRAPHY
By
Shri P. V. P. Deekshit M.Sc (Computer Science)
s/o Shri P. V. S. Sharma, 17-11-10,Official Colony,Maharanipeta.P.O,
Visakhapatnam-530002.

ABSTRACT:
This project surveys the theory and applicationms of cryptographic has functions, such as MDS and SHA-I, HMAC and Whirlpool especially their resistence to collision-finding attacks. We review definitions, design principles, trace genealogy of standard hash functions, discuss generic attacks, attacks on iterative hash functions, and recent attacks on specific functions.The main contribution of this article lies in the study of practical constructions for hash functions. A general model for hash functions is proposed and a taxonomy for attacks is presented. Then all schemes in the literature are divided into three classes: hash functions based on block ciphers, hash functions based on modular arithematic and dedicated hash functions. An overview is that to compare the hash functions with the size of message digest and time complexity of hash functions:SHA-I,HMAC,WHIRLPOOL and MD5.
Keywords: Cryptography,SHA-1, HMAC,WHIRLPOOL, MD5, Sample Code, examples, implementation.
1.About Cryptography
Cryptography is the art and science of keeping messages secure. When a message is transferred from one place to another, it contents are readily available to an evesdropper.
In cryptography world the message that needs to be secured is called plaintext or clear text. The scranmbled form of the message is called cipher text. The process Cryptography is the science of writing in secret code and is an ancient art; the first documented use of cryptography in writing dates back to circa 1900 B.C. when an Egyptian scribe used non-standard hieroglyphs in an inscription. Some experts argue that cryptography appeared spontaneously sometime after writing was invented, with applications ranging from diplomatic missives to war-time battle plans. It is no surprise, then, that new forms of cryptography came soon after the widespread development of computer communications. In data and telecommunications, cryptography is necessary when communicating over any untrusted medium, which includes just about any network, particularly the Internet.
Within the context of any application-to-application communication, there are some specific security requirements, including:
Authentication: The process of proving one's identity. (The primary forms of host-to-host authentication on the Internet today are name-based or address-based, both of which are notoriously weak.)
Privacy/confidentiality: Ensuring that no one can read the message except the intended receiver.
· Integrity: Assuring the receiver that the received message has not been altered in any way from the original.
· Non-repudiation: A mechanism to prove that the sender really sent this message.
Cryptography, then, not only protects data from theft or alteration, but can also be used for user authentication. There are, in general, three types of cryptographic schemes typically used to accomplish these goals: secret key (or symmetric) cryptography, public-key (or asymmetric) cryptography, and hash functions, each of which is described below. In all cases, the initial unencrypted data is referred to as plaintext. It is encrypted into cipher text, which will in turn (usually) be decrypted into usable plaintext.
In many of the descriptions below, two communicating parties will be referred to as Alice and Bob; this is the common nomenclature in the crypto field and literature to make it easier to identify the communicating parties. If there is a third or fourth party to the communication, they will be referred to as Carol and Dave. Mallory is a malicious party, Eve is an eavesdropper, and Trent is a trusted third party.
TYPES OF CRYPTOGRAPHIC ALGORITHMS:
There are several ways of classifying cryptographic algorithms. For purposes of this they will be categorized based on the number of keys that are employed for encryption and decryption, and further defined by their application and use. The three types of algorithms that will be discussed are :
· Secret Key Cryptography (SKC): Uses a single key for both encryption and decryption
· Public Key Cryptography (PKC): Uses one key for encryption and another for decryption
· Hash Functions: Uses a mathematical transformation to irreversibly "encrypt" information.
Secret Key Cryptography
With secret key cryptography, a single key is used for both encryption and decryption. As shown in Figure 1A, the sender uses the key (or some set of rules) to encrypt the plaintext and sends the cipher text to the receiver. The receiver applies the same key (or rule set) to decrypt the message and recover the plaintext. Because a single key is used for both functions, secret key cryptography is also called symmetric encryption.
With this form of cryptography, it is obvious that the key must be known to both the sender and the receiver; that, in fact, is the secret. The biggest difficulty with this approach, of course, is the distribution of the key.
Secret key cryptography schemes are generally categorized as being either stream ciphers or block ciphers. Stream ciphers operate on a single bit (byte or computer word) at a time and implement some form of feedback mechanism so that the key is constantly changing. A block cipher is so-called because the scheme encrypts one block of data at a time using the same key on each block. In general, the same plaintext block will always encrypt to the same cipher text when using the same key in a block cipher whereas the same plaintext will encrypt to different cipher text in a stream cipher.
Stream ciphers come in several flavors but two are worth mentioning here. Self-synchronizing stream ciphers calculate each bit in the keystream as a function of the previous n bits in the keystream. It is termed "self-synchronizing" because the decryption process can stay synchronized with the encryption process merely by knowing how far into the n-bit keystream it is. One problem is error propagation; a garbled bit in transmission will result in n garbled bits at the receiving side. Synchronous stream ciphers generate the keystream in a fashion independent of the message stream but by using the same keystream generation function at sender and receiver. While stream ciphers do not propagate transmission errors, they are, by their nature, periodic so that the keystream will eventually repeat.
Block ciphers can operate in one of several modes; the following four are the most important:
· Electronic Codebook (ECB) mode is the simplest, most obvious application: the secret key is used to encrypt the plaintext block to form a cipher text block. Two identical plaintext blocks, then, will always generate the same cipher text block. Although this is the most common mode of block ciphers, it is susceptible to a variety of brute-force attacks.
· Cipher Block Chaining (CBC) mode adds a feedback mechanism to the encryption scheme. In CBC, the plaintext is exclusively-ORed (XORed) with the previous cipher text block prior to encryption. In this mode, two identical blocks of plaintext never encrypt to the same cipher text.
· Cipher Feedback (CFB) mode is a block cipher implementation as a self-synchronizing stream cipher. CFB mode allows data to be encrypted in units smaller than the block size, which might be useful in some applications such as encrypting interactive terminal input. If we were using 1-byte CFB mode, for example, each incoming character is placed into a shift register the same size as the block, encrypted, and the block transmitted. At the receiving side, the cipher text is decrypted and the extra bits in the block (i.e., everything above and beyond the one byte) are discarded.
· Output Feedback (OFB) mode is a block cipher implementation conceptually similar to a synchronous stream cipher. OFB prevents the same plaintext block from generating the same cipher text block by using an internal feedback mechanism that is independent of both the plaintext and cipher text bit streams.
· Data Encryption Standard (DES):
The most common SKC scheme used today, DES was designed by IBM in the 1970s and adopted by the National Bureau of Standards (NBS) [now the National Institute for Standards and Technology (NIST)] in 1977 for commercial and unclassified government applications. DES is a block-cipher employing a 56-bit key that operates on 64-bit blocks. DES has a complex set of rules and transformations that were designed specifically to yield fast hardware implementations and slow software implementations, although this latter point is becoming less significant today since the speed of computer processors is several orders of magnitude faster today than twenty years ago. IBM also proposed a 112-bit key for DES, which was rejected at the time by the government; the use of 112-bit keys was considered in the 1990s, however, conversion was never seriously considered.
2. About Hash functions:
Data integrity assurance and data origin authentication are essential security services in financial transactions, software distribution and data storage and so on. Message digest algorithms are extensively used in IP security and in Digital signature applications. The Digital signatures are used in electronic commerce, where the recipient of a message desires to verify the origin of the message and its integrity. A digital signature is computed using a set of rules and set of parameters such that the identity of the signatory and integrity of the data can be verified. The algorithm makes use of a private key to generate a digital signature. Signature verification makes use of a public key which corresponds to, but is not the same as, the private key. A hash function is used in the signature generation process to obtain a condensed version of data, called a message digest.
Hash algorithms, also known as message digest algorithms; generate a unique message digest for a message of arbitrary length. These algorithms are designed to have the following properties of easily computing the hash value; being very hard to compute the message from the digest and being hard to find another message, which has the same message, digest as the first message.
Hash functions are also used in producing a message authentication code that is referred to as HMAC. HMAC has been chosen as the mandatory to implements MAC for IP security and is used in SSL. HMAC is designed to use the available hash functions such as message digest5, secure hash algorithms etc
In this paper the popular hash algorithms SHA1, HMAC, WHIRLPOOL and MD5 are considered for implementing in software and programmable hardware. The performance of these algorithms is analyzed with respect to time complexity depending on the size of the data.
Hash functions, also called message digests and one-way encryption, are algorithms that, in some sense, use no key (Figure 1C). Instead, a fixed-length hash value is computed based upon the plaintext that makes it impossible for either the contents or length of the plaintext to be recovered. Hash algorithms are typically used to provide a digital fingerprint of a file's contents, often used to ensure that the file has not been altered by an intruder or virus. Hash functions are also commonly employed by many operating systems to encrypt passwords. Hash functions, then, provide a measure of the integrity of a file.
Hash algorithms that are in common use today include:
Message Digest (MD) algorithms: A series of byte-oriented algorithms that produce a 128-bit hash value from an arbitrary-length message.
MD2 (RFC 1319): Designed for systems with limited memory, such as smart cards. MD4 (RFC 1320): Developed by Rivest, similar to MD2 but designed specifically for fast processing in software.
MD5 (RFC 1321): Also developed by Rivest after potential weaknesses were reported in MD4; this scheme is similar to MD4 but is slower because more manipulation is made to the original data. MD5 has been implemented in a large number of products although several weaknesses in the algorithm were demonstrated by German cryptographer Hans Dobbertin in 1996.
Secure Hash Algorithm (SHA):
Algorithm for NIST's Secure Hash Standard (SHS). SHA-1 produces a 160-bit hash value and was originally published as FIPS 180-1 and RFC 3174. FIPS 180-2 describes five algorithms in the SHS: SHA-1 plus SHA-224, SHA-256, SHA-384, and SHA-512 which can produce hash values that are 224, 256, 384, or 512 bits in length, respectively. SHA-224, -256, -384, and -512 are also described in RFC 4634.
RIPEMD: A series of message digests that initially came from the RIPE (RACE Integrity Primitives Evaluation) project. RIPEMD-160 was designed by Hans Dobbertin, Antoon Bosselaers, and Bart Preneel, and optimized for 32-bit processors to replace the then-current 128-bit hash functions. Other versions include RIPEMD-256, RIPEMD-320, and RIPEMD-128.
HAVAL (HAsh of VAriable Length): Designed by Y. Zheng, J. Pieprzyk and J. Seberry, a hash algorithm with many levels of security. HAVAL can create hash values that are 128, 160, 192, 224, or 256 bits in length.
Whirlpool:
A relatively new hash function, designed by V. Rijmen and P.S.L.M. Barreto. Whirlpool operates on messages less than 2256 bits in length, and produces a message digest of 512 bits. The design of this has function is very different than that of MD5 and SHA-1, making it immune to the same attacks as on those hashes (see below).
· Tiger: Designed by Ross Anderson and Eli Biham, Tiger is designed to be secure, run efficiently on 64-bit processors, and easily replace MD4, MD5, SHA and SHA-1 in other applications. Tiger/192 produces a 192-bit output and is compatible with 64-bit architectures; Tiger/128 and Tiger/160 produce the first 128 and 160 bits, respectively, to provide compatibility with the other hash functions mentioned above.
Hash functions are sometimes misunderstood and some sources claim that no two files can have the same hash value. This is, in fact, not correct. Consider a hash function that provides a 128-bit hash value. There are, obviously, 2128 possible hash values. But there are a lot more than 2128 possible files. Therefore, there have to be multiple files — in fact, there have to be an infinite number of files! — that can have the same 128-bit hash value.
..+--./*797
Associations
Associations are relationships between classes and represent groups of links. Each end of an association can be labeled by a set of integers indicating the number of links that can legitimately originate form an instance of the class connected to the association end. Associations are used to represent a wide range of connections among a set of objects
User
Selection of algorithms
USER 1 ----------------> * Selection of Algorithm
One user can select more than one algorithm
Algorithms used in the project:
.HMAC :
H= embedded hash function(e.g., SHA-1)
M=message input to HMAC(including the padding specified in the embedded hash function)
Y= ith block of M,0<=i<=(L-1) L=number of blocks in M B=number of bits in a block N=length of hash code produced by embedded hash function K=secret Key; if key length is greater than b, the key is input to the hash function to produce an n-bit key; recommended length is>=n
K+=K Padded with zeros on the left so that the result is b in length
I pad=00110110 (36 in hexadecimal)
O pad=01011100(5C in hexadecimal)
Implementation of HMAC Algorithm
• Step1: Append zeros to the left end of K to create a b-bit string K+.
• Step2: XOR (bit wise exclusive-OR)K+ with ipad to produce the b-bit block Si
• Step3: Append M to Si
• Step4: Apply H to the stream generated in Step3.
• Step5: XOR K+ with Opad to produce the b bit block S0.
• Step6: Append the hash result from step 4 to S0.
• Step7: Apply H to the stream generated in step6 and output the result.


Implementation of SHA-1 Algorithm

The Algorithm takes as input a message with a maximum length of less than of 264 bits and produce as output as 160 bit message digest.

• Step1- Appending Bits:
The Message is padded like a single 1 bit is added into the end of message, after which 0-bits are added until the length of ‘M ‘ is congruent to 448 modulo 512 (length=448mod512).

• Step2: Appending Length:
A block of 64=bit representation of b is appended to the result of above step. Thus resulted message is a multiple of 512 bits.

• Step3- Buffer Initialization:
A 160 bit buffer is used to hold intermediate and final results of the hash function.
This buffer can be represented as five 32 bit registers as A,B,C,D,E.








• After all L-512 bit blocks have been processed, the out put from the Lth stage is the 160-bit message digest.







Implementation of MD5 Algorithm :


The algorithm takes as input a message of arbitrary length and produces as output a 128-bit message digest of the input.

The processing involves the following steps.
• Step1: Padding
The message is padded to ensure that its length in bits. 64 is divisible by 512. That is, its length is congruent to 448 modulo 512.
Step2: Appending length
A 64-bit binary representation of the original length of the message is concatenated to the result of step (1).
Let the expanded message be represented as a sequence of L 512-bit blocks Y0, Y1,..,Yq,..,YL-1.







• Step:3 Initialize the MD buffer
The variables IV and CV are represented by a four–word buffer (ABCD) used to compute the message digest. Here each A, B, C, D is a 32-bit register and they are initialized as IV to the following values in hexadecimal. Low-order bytes are put first.
Word A: 01 23 45 67
Word B: 89 AB CD EF
Word C: FE DC BA 98
Word D: 76 54 32 10
4. Compression function MD5 :
The output of the fourth round is added to the input of the first round (CVq) to produce CVq+1




Step5: Output
After all L 512-bit blocks have been processed, the
output from Lth stage is the 128-bit message digest.

Implementation of WHIRLPOOL Algorithm:
The message digest is produced in four steps
Step 1: Padding
Message is padded to multiple of 256 bits. In the case where the unpadded message is already of that length it is padded with 512 bits (2x256), which is the maximum padding length.
Step 2: Message length
The length of the unpadded message is appended to the message. The length is expressed as a 256 bit unsigned integer, with the most significant byte being the leftmost.
After this step the message length is n x 512 bits (n=1, 2, …).
Step 3: Hash matrix initialization
The results of the hash function (both intermediate and final) and stored in an 8x8 matrix. Each element of the matrix is 8 bits (a byte) of the message, thus the hash matrix holds 512 bits in total and the first matrix H0 is initialized with zeros (each byte is 0000 0000)
Step 4: Block cipher
The block cipher processes the message in 512-bit blocks.













Structure of Whirlpool :











Algorithms Used in Project:
Source Code:

Imports System.Data
Imports System.Data.OleDb
Public Class Form2
Public message, hashmsg As String
Dim str As String
Dim ch As Char
Dim a1, b1, c1, d1, e1, f1 As Char
Dim r, n, l, j, msglen As Integer
Dim l1, t, y, j2 As Integer
Dim bin0, bin, bin1, bin2, bin3, bin4, bin5 As String
Dim bin10, bin11, bin21, bin31, bin41 As String
Dim h(4), k(3), hash(4), w(15) As String
Dim hdec(4), kdec(3), w1(79) As UInt64
Dim hd(4) As UInt32
Dim a, b, c, d, x, f, p1, temp As UInt64
Dim key, key0 As String
Dim r1, r2, r3 As String
Dim bs, k0 As Integer
Dim ipad, opad, ipad0, opad0, ch1, ch2 As String
Dim len As Integer = 0
Dim txt, wbin0, wbin1, wbin2, wbin3, wstr As String
Dim wch As Char
Dim wr, wl, wtxtlen, wn, wc As Integer
Dim cstate(7, 7), kstate(7, 7), kstate1(7, 7), dsbox(15, 15) As Integer
Dim ak(7, 7), sc(7, 7), mr(7, 7), drc(9, 7, 7), dkeys(9, 7, 7), dmds(7, 7) As Integer
Function generatesha(ByVal msg As String) As String
bin10 = msg
bin11 = ""
ch1 = ""
l = (bin10.Length)
For i As Integer = 0 To l - 1
ch = bin10.Substring(i, 1)
n = Convert.ToInt16(ch, 16)
ch1 = Convert.ToString(n, 2)
r = ch1.Length()
If r < r =" 4" integer =" 0" ch1 =" 0" bin11 =" bin11" l =" bin11.Length()" msglen =" l" bin11 =" bin11" l =" 448" l =" 960" l =" 1472" l =" 1984" integer =" 0" bin11 =" bin11" bin21 = "" bin21 =" (Convert.ToString(msglen," n =" 64" integer =" 0" bin21 =" 0" bin31 = "" bin31 =" bin11.ToString()" l =" bin31.Length()" n =" (l" l =" l" integer =" 0" j =" 0" bin41 = "" integer =" 0" a =" q(j).ToString()" a1 = "A" bin41 =" bin41" b =" q(j).ToString()" b1 = "B" bin41 =" bin41" c =" q(j).ToString()" c1 = "C" bin41 =" bin41" d =" q(j).ToString()" d1 = "D" bin41 =" bin41" x =" q(j).ToString()" e1 = "E" bin41 =" bin41" f =" q(j).ToString()" f1 = "F" bin41 =" bin41" bin41 =" bin41" j =" j" j =" j" integer =" 0" integer =" 0" l =" bin41.Length()" l1 =" l" l1 =" l1" y =" 0" j2 =" 0" p1 =" Math.Pow(2," integer =" 0" j2 =" j2" integer =" 0" y =" y" integer =" 16">> 31)
Next i
a = hdec(0)
b = hdec(1)
c = hdec(2)
d = hdec(3)
x = hdec(4)
For i As Integer = 0 To 79
If i >= 0 And i <= 19 Then f = (b And c) Or ((Not b) And d) t = 0 ElseIf i >= 20 And i <= 39 Then f = b Xor c Xor d t = 1 ElseIf i >= 40 And i <= 59 Then f = (b And c) Or (b And d) Or (c And d) t = 2 ElseIf i >= 6 And i <= 79 Then f = b Xor c Xor d t = 3 End If temp = (((a <<>> 27)) + f + x + kdec(t) + w1(i)) Mod p1
x = d
d = c
c = ((b <<>> 2)) Mod p1
b = a
a = temp
Next i
hdec(0) = (hdec(0) + a) Mod p1
hdec(1) = (hdec(1) + b) Mod p1
hdec(2) = (hdec(2) + c) Mod p1
hdec(3) = (hdec(3) + d) Mod p1
hdec(4) = (hdec(4) + x) Mod p1
Next k1
bin5 = ""
For i As Integer = 0 To 4
hd(i) = Convert.ToUInt32(hdec(i))
hash(i) = Convert.ToString(hd(i), 16)
'TextBox2.Text = TextBox2.Text & hash(i).ToString() & " "
bin5 = bin5 & hash(i).ToString() & " "
Next i
Return bin5
End Function
Private Sub Form2_Load(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles MyBase.Load
GroupBox1.Enabled = False
GroupBox2.Enabled = False
End Sub
Private Sub Button1_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Button1.Click
Dim con As New OleDbConnection(MyKit.getconstr())
Dim cmd As New OleDbCommand()
cmd.Connection = con
Dim size As Integer = message.Length
If CheckBox1.Checked Then
GroupBox1.Enabled = True
Dim dt As Long = Date.Now.Ticks
MsgBox("Start Time : " + Date.Now.Ticks.ToString, MsgBoxStyle.Information, "SHA1")
'message = Form1.TextBox1.Text
If message = "" Then
MsgBox("Start Time : " + Date.Now.Ticks.ToString, MsgBoxStyle.Information, "SHA1")
TextBox2.Text = " "
Else
For i As Integer = 0 To (Form1.TextBox1.Text.Length - 1)
ch = message(i)
r = CInt(Asc(ch))
bin = (Convert.ToString(r, 16))
str = str & bin.ToString()
Next i
End If
hashmsg = generatesha(str)
TextBox2.Text = hashmsg.ToString()
MsgBox("End Time : " + Date.Now.Ticks.ToString, MsgBoxStyle.Information, "SHA1")
dt = Date.Now.Ticks - dt
MsgBox("Execution Time : " + dt.ToString, MsgBoxStyle.Information, "SHA1")
con.Open()
cmd.CommandText = "delete from sha1 "
cmd.ExecuteNonQuery()
con.Close()
con.Open()
cmd.CommandText = "insert into sha1 values(" & size & "," & dt & ")"
cmd.ExecuteNonQuery()
con.Close()
End If
CONCLUSIONS

This project implements the four hash algorithms which are most sophisticated algorithms in hashing messages. This project gives the algorithm which is most best in time complexity and messaged digest size.Finally it concludes the best algorithm according to their size and time complexity.

11. Bibliography/References
Books:
Federal Information Processing Standards (FIPS) Publication 180-1, Secure Hash Standard (SHS), U.S. DoC/NIST, April 17, 1995.
[HAC] A. Menezes, P. van Oorschot, and S. Vanstone. Handbook of Applied
Cryptography, CRC Press, Inc., October 1997.
References:
1. Barreto, Paulo S.L.M. and Rijmen, Vincent (2003) (PDF). The WHIRLPOOL Hashing Function
2. http://planeta.terra.com.br/informatica/paulobarreto/whirlpool.zip. Retrieved on 2007-11-21.
3. Kyoji, Shibutani and Shirai, Taizo (2003) (PDF). On the diffusion matrix employed in the whirlpool hashing function
4. http://www.cosic.esat.kuleuven.be/nessie/reports/phase2/whirlpool-20030311.pdf. Retrieved on 2007-11-21.
5. American Bankers Association, Keyed Hash Message Authentication Code, ANSI
6. H. Krawczyk, M. Bellare, and R. Canetti, HMAC: Keyed-Hashing for Message Authentication, Internet Engineering Task Force, Request for Comments (RFC)
7. National Institute of Standards and Technology, Secure Hash Standard (SHS), Federal Information processing Standards Publication 180-1, 17

Wednesday, March 31, 2010

Weather Pattern of March 2010 at Visakhapatnam

trusciencetrutechnology@blogspot.com Vol.2010, Issue No.3: Dated 31st March 2010
On the Weather pattern & the 30th March 2010 an earthquake tremors at Visakhapatnam from 10:23 PM to 10:35 PM
By
Professor Kotcherlakota Lakshmi Narayana,
(Retd. Prof. of Phys, SU) 17-11-10, Narasimha Ashram, Official Colony, Maharanipeta.P.O. Visakhapatnam-530002: Mobile: 9491902867.

ABSTRACT:

The weather of March 2010 of Visakhapatnam has been one of a great theoretical interest. The plain analysis of the Earth tremor that rocked the city and various parts of the Andhra Pradesh coastal areas seems very perplexing and intriguing. The author concludes that the tremor waves are a complex superposition of different thrusts and indicates the source of the earthquake itself was a composite event. Whether the origin of it is a simple upsurge of the mantle or the involved pattern of sequence and consequent events at the crust and mantle boundary is very intriguing. The evidence that the precursor signals of the deep earthquake have been found as much as fifteen to twenty days earlier is very significant finding. The continued study of the weather pattern by the present author has added new dimensions of analysis of this composite event earthquake. The present article summarises several events that have occurred in the Month of March 2010. No cohesive picture could however be drawn due to the diverse aspects of the atmosphere and the stratosphere interactions and the injection of new entities into the local atmosphere by varied and a variety of source physical events.

Keywords: tremors, complex waves composite event, earthquake of a diverse nature, meteorology, geophysics, stratosphere, multitude flowers, natural spectrums.

A SUMMARY REPORT:

The onset of high temperatures throughout Andhra Pradesh and the pleasant and windy atmosphere at Visakhapatnam were contrasting features that went unnoticed by many an experts of weather and the geo-meteorological scientists. The trees and other living organisms can perceive the weather, in much more subtle way than a human being geared with his ultra-modern sensitive CCD and Silicon chip gadgets. From the 1st March 2010 onwards certain areas of Andhra Pradesh have been experience very hot summer weather with temperatures above 2 to 3 degrees above the averages. The Algona district has been damaged by Hailstorms extending over an area of 300 acres of land by 60% and another 200acres by 50%. There was a hailstorm that divested Srikakulum town and neighbouring places for about an hour.
>



The occurrence of the earth tremors at Visakhapatnam has been preceded by the shrieking hauling of the stray dogs on the street and especially on the 29th March 2010 at 4.02AM. The author has made successful sound recordings of the stray dogs on the 27th March 2010 at 23hrs 41m night time and again at 23h44m as well on the 28th March 2010 at 0017am i.e. the morning of 29th March 2010. Surprisingly the onset of earth tremor experienced at Visakhapatnam has been preceded by the shrieking hauling of dogs on the 3rd March 2010 at 01 00 hrs and followed by just 15 minutes again. These sound records made at the author’s residence are available for no-profit price from the author.
Visakhapatnam on the Tuesday, 30th March 2010 at 10:25.p.m experienced two slight tremors of 6.8R that lasted for a few seconds. Some say at 10:23 PM and others at 10:30PM. There was a failure of current supply for nearly 10 minutes in official colony. The earth tremor was felt dispersed over a wide area extending from Srikakulum in A.P. to Tamil Nadu coast. The AU Girls Hostel situated on the top of hill and the AU Campus residents have felt the tremors. The neighbouring people near the collectors claim to have felt it while surprisingly the people residing in the Official Colony Maharanipeta haven’t experienced it at all. But people in Simhachalam, Gurudwara, Sitampeta, Seethmadara, Pendurthy, Parwada (thanam village) Murali Nagar, Airport area, assert that tremor was more intensive than the earlier experienced a few years ago. Alert-wise it is important to note that the tremor moved the earth at the RK beach and moved over to the Siripuram junction hilly area affecting the AU HOSTEL for Girls. Also it moved over Madugulu, Chodavaram and Paderu. The intensity was more than that experienced about four months ago.
A volcano erupted beside a glacier in southern Iceland, Iceland’s civil protection agency said on Sunday. The eruption occurred around 11:30 p.m. on Saturday (1930 EDT) beside the Eyjafjallajokull glacier, the fifth largest in Iceland. Scientists can see lava flows in the half—mile (1—kilometer) long fissure, and authorities are watching for further activity. It did not occur below ice, lessening the chances of flooding from a glacier melt. Evacuees in the village of Hella have been provided shelters.
On the Saturday 27th March 2010 3tons weighing fish of various kinds, about 50, have been caught by the local fisher men an event of unusual nature since they are usual catch of fish is only about half a ton. The variety of fish caught was amazing and consist of octopus, jelly fish, power fish, devil fish, glowfil, sebial, veligo, vatic bulls and apart from ’pitalu and royyalu’. They were washed driven to the near shore by the cold sea water currents and due to the dredging operations.

On this fateful Tuesday the North-East India had heavy rain and the weather marker trough ran down from Bihar to North West Bengal even as facilitating the western disturbances of weather in Jammu & Kashmir. Thunderstorms in the Himalayan region and its foot hills would experience till the April 6th over on to the North East. Rain in Kerala, Karnataka, and Andaman & Nicobar Island would last due to the remnant easterlies. But the heat-wave is persisting in Rajasthan, South Utter Pradesh, North Madhya Pradesh, with maximum temperatures well above the normal by 3 to 4 degrees Celsius. Over Maharashtra and part of extreme peninsular India the temperatures are 2 to 3 degrees above the normal. Also on March 27th, 2010 at the residence of Dubai Ramulu in Dhanwad, a sunflower plant of three months old bloomed with 14 flowers. This Saturday the many coastal towns especially the Visakhapatnam port and other areas plunged into a fog. This lasted from 6AM to 7.30AM and people in white dress found their clothes turned black. On the 17th March 2010 the rare Olive Ridley tortoise laid eggs on the sea/river mouth at Berhampur. Many more haven’t ventured to lay the eggs. March 17th report states that the underwater wells have become dry and the 300acres of maize, 150 acres of sesame and 200 acres of flowers and vegetables practically went dry with no supply of water. The villages affected were bani, kusulawada, vallali, peddapuram, anandapuram, jaganadhapuram, gutupalli, bakurpalem, butupalli, podugupalem etc.Turkey experienced an earthquake jolt of 6R that lasted a minute, on Monday 8th March 2010, at 4:30 AM. Ananthapuram and Nandhyal had a heat wave since 8th March 2010 and people were afraid to move out after even 8.A.M.






Given in the above figure are the Weather patterns of Visakhapatnam sky in the evenings of 14th March 2010 and 28th March 2010 at 17:42p.m & 18:24:57 respectively. Also the Figure depicts the evening sky views at 17:24 p.m of 28th March 2010 and 17:26.p.m of 28th March 2010 reflecting the dust scattering on the Bronze statue at the Beach. More fascinating and evidently obvious of the loaded sky with the debris of the onset of an earth tremor in The pictures of the moon light excellently recorded on the evening of 28th March 2010 respectively at 17:51.p.m; 18:08 .p.m and at 17:53.p.m. Of these the one taken at 17:53.p.m vividly portraits the fine dust of the earth tremor on set. It may be regarded as one of the prize worthy photo from purely a scientific view point.
The dust clouds at low levels and the dust spread dispersed at the higher levels of the atmosphere extending over to the stratosphere height is obvious. Weather pattern at Visakhapatnam in the month of March 2010 was one of a twisted temperature profile, with the sky completely engulfed by the deep earth quake features of the Andaman & Nicobar Islands epicentre. On the 27th March 2010 night the moon was engulfed in both white and dark cloud entities. The clouds have passed over the moon at 21 17 pm. The cloud thickness and density was yet times so much as to absorb the entire moon light.
******


Saturday, March 27, 2010

Colour Phase Transformation of Sri Rama Kalyana Maho Ustavamu by Peri Venkata Someswara Sharma

trusciencetrutechnolgy@blogspot.com
70th B’Day Volume 2009-2010 of Professor Kotcherlakota Lakshmi Narayana.
ARTICLE 19:
Srimachandramurthi Marriage
& about its’ A Physical Significance

By
Peri Venkata Someswara Sharma,
MA (TELUGU-AU),Bhasha Praveena,
MVD HIgh SChool Telugu Pundit,Dandu Bazaar,M.P.O,Visakhaptnam-2:
17-11-10, Narasimha Ashram, Official Colony, Maharanipeta.P.O.
Visakhapatnam-530002.
trusciencetrutechnolgy@blogspot.com
70th B’Day Volume 2009-2010 of Professor Kotcherlakota Lakshmi Narayana.
ARTICLE 19:
Srimachandramurthi Marriage
& about its’ A Physical Significance
Peri Venkata Someswara Sharma,
SUMMARY:
In Sanskrit there is no specific mention of the colour NEELAMU. It is only a combination of SHETA & ASHETA. This means that only WHITE and BLACK exist and the combination of the two is NEELAMU. All the gods like Siva, Vishnu, Krishna and Sri Rama have been described in terms of their bodily colour as NEELAMU. The colour shouldn’t be regarded as pure (for example the sky blue). The born poetess Arukuri Molla and as well earlier poet Pothana described Sri Rama’s bodily colour as NEELAMU. Molla preferred to describe as ‘NEELA MEGHA SHYAMA’. Pothana described Sri Rama as Nallanivadu. (here the meaning is of course NEELAMU since the colloquial Telugu at that time of Pothan, was one of a mixture of Pali and Sanskrit Language.) It should be noted that DARKNESS is not NALLUPU (i.e. Black as usually understood.). The sloka describing the blessings of Sita with thalambralu on the Head of Sri Rama is one of profound meaning that perhaps wouldn’t be very easily evident. The article attempts to give the right explanation of the event process of the Phase Colour Transformations of the blessings by Goddess Sita on the Mahapurusha Sri Rama, the Vishnu avatar

VYKHYANA (Explanatory Exposition):

It is unusual that the Sri Rama Navami fell on the March 24th of the year 2010, and as per Telugu calendar in the Vikruthi Nam Samvastara i.e. Vikruti year of Ancient traditional reckoning of 60 years of time. The Sri Rama Nava usually occurs on the 24th April or so of every year!!. A full life of human being in India as per the sages should actually be 120 years and Mahatma Gandhi sought to live for the full period of 120 years but died earlier. The most important and significant event of this day of Sri Rama Nava that occurs every year, is to celebrate the marriage of Sri Rama and Sita Devi. They are both supposed to be incarnations of the Universal Purusha and the Primordial Srishakti. (in the form of Bhudevi).
The following sloka recited by the author details the event process of the Phase Colour Transformations of the blessings by Goddess Sita, Adishakti on Mahapurusha Sri Rama, and the Vishnu avatar. The sloka describing the blessings of Sita with thalambralu on the Head of Sri Rama is one of profound meaning that perhaps wouldn’t be very easily evident.






At the time of marriage first the yellow coloured Thalambralu became Animuthyalu (Kempulu, of Red colour) in the Padma Flower like in (the Padma Anjali) hands of Sita. When she blessed Sri Rama with the showering of these on the head of Sri Rama they became kudumulu i.e. Blossoming Jasmine (Shobillu Malle Mogallu) buds.


When these have flown down to his Thanuvulu i.e. the skin covering of his shoulders they became NEELUMULU. They thus reflected his colour a mixture of white and black. The specific mention of Indra Neelalu is very significant.
In Sanskrit there is no specific mention of the colour NEELAMU. It is only a combination of SHETA & ASHETA. This means that only WHITE and BLACK exist and the combination of the two is NEELAMU. All the gods like Siva, Vishnu, Krishna and Sri Rama have been described in terms of their bodily colour as NEELAMU. The colour shouldn’t be regarded as pure (for example the sky blue). The born poetess Arukuri Molla and as well earlier poet Pothana described Sri Rama’s bodily colour as NEELAMU. Molla preferred to describe as ‘NEELA MEGHA SHYAMA’. Pothana described Sri Rama as Nallanivadu. (Here the meaning is of course NEELAMU since the colloquial Telugu at that time of Pothan, was one of a mixture of Pali and Sanskrit Language.) It should be noted that DARKNESS is not NALLUPU (i.e. Black as usually understood.).
ACKNOWLEDGEMENT:
The first time I have been invited by UPDHRASHTA SARMA an aged Kavi at a public function suddenly while entering the pandal, to give a vykhyana of the above sloka which he recited in a very musical and poetic style. Sudden handing over the mike and announcement in public of his invocation for me to give the vyakhyana has first created in me a hesitation but in his presence I have succeeded to present the explanation as detailed above.

EDITOR’NOTE:
The Asheta and Sheta may also be explained in terms of Vidhya and Avidhya or Lightening (Merupu) and the Darkness etc. and so on. The Sanskrit and other Indian Languages are profoundly rich in their Scientific and Cultural presentations endowed hidden with an unsurpassed enlightment of the Human intellect or the Soul.
ADDENDUM:
MUDHRA NEELAMU CORRESPONDS TO POSSIBLY EXTREME ULTRAVIOLET AND COSMOLOGICAL MODELS HAVE A VIEW HOW THAT THE DEMISE OF SOME UNIVERSES IS IN TERMS OF ULTRAVIOLET RING FORMATIONS.
THE ONLY INDIAN SCIENTIST WHO HAS INVESTIGATED THE SPECTRA IN THE EXTREME ULTRA VIOLET AND THE VIOLET RANGE BY A VERY HIGH ORDER ACCURACY USING 21 foot grating is the late Professor K.Rangadhama Rao D.Sc.(Madras). D.Sc.(London). during the years 1921 to 1930 at Tiruchinopoly, Visakhapatnam, Viziyanagaram, London


Tuesday, March 16, 2010

ARTICLE 28 trusciencetrutechnology B'Day Vol. 2009-2010 An Applied Technology Marvel

ARTICLE No. 28: trusciencetrutechnology@blogspot.com


70th B’Day Volume 2009-2010 of Prof. Kotcherlakota Lakshmi Narayana


Dated:16th March 2010




AN APPLIED PSYCHOLOGY MARVEL AND ON THE SYNTHESIS OF A NOVEL TECHNOLOGY


by



YVSRMoorty,
Flat No. 101, D.No. 45-55-3/2, Abid Nagar, BRAVES Bhavan,


Abid Nagar, Akkayya Palem, Visakhaptnam-530 016(AP) INDIA


Mobile No. 9849591216 email: myechury@yahoo.com



ABSTRACT


The children and parents association during the birth and immediately after and as well late in the life of the kids and the aged parents has been portrayed to suggest at the marvels of Applied Psychology thoughts and an attempt made reveal a possible novel technology that might challenge the exercise of human intellect. To support the discovery I have enlisted certain observations made by me during the last few decades. Case studies of the kind presented in this article could easily be articulated by a many researchers just for the sport of it and to nurture human thought in the modern era of new technologies.


INTRODUCTION:


I have been observing the birth of the child and the mother’s longevity of life since 1965. For the last few decades my studies have revealed on a statistical basis of even Astrology, that if the fourth house in the horoscope of a child is strong then the mother survives. The weakness of it even causes the death to the mother. Fourth in a horoscope is the sign of mother’s house. The living being in the womb will try to extract as much as possible the life and longevity element or system whatever it may be called / or termed from the mother. In the process more extract below the critical level the mother may not survive long. Sometimes the process may be otherwise knowingly or unknowingly. Energy is more it conserves otherwise it would extract. Either way this aspect of energy extraction applies.


OBSERVATIONS:


As an example my wife became ill after the marriage with typhoid etc for more than six months. After recovery she became pregnant, while her mother worried a lot about this naturally since the first wife died in pregnancy, so the people concerned were worried. The baby born was underweight almost a little more than the palm size. Soon he grew so fast that people wondered how that could happen. I have observed that whenever the boy is beside her the mother seems to become very active and healthy. It became obvious that the baby boy needs to be at her bedside.


Due to this I often give a micro-advise of Applied Psychology that the children to be at the bedside of their parents. The life vibrations probably get transferred to the mother. When she falls sick the children’s presence at her bedside gives enormous strength.


Why that is my grandson was able to pronounce certain words that I have used in my childhood. How could use specifically those words? Is it a fact that a kind of certain sufficiently analytical brain evolved in them? What sort of a synthesis need to be made in order to understand this phenomenon in terms of Applied Psychology? Why is that my grandson prefers occasionally to press his head to my head sideways affectionately, is to have the energetic waves transmitted to him from my brain?


I am of the strong discovery that the natural instinct for the offspring is to extract as much energy as possible and survive in the best possible way and as long as possible. Of course, it cannot survive in infinite time since it must eventually die. This finding has involved aspects of sharing energy, sharing the talents, sharing the qualities and especially the sharing of character.


As an example I wish to quote that one son of a drunkard may wish to become like that of his father but the other son may be not wish to become a drunkard! Whether a pundit’s (learned man) son becomes a foolish fellow (shunta) is it a consequence of the Birth? How is that Rabindhranath Tagore the fourteenth son became a wise man of the East and could present view surpassing the ideas of the General Theory of Relativity?(see his three famous lectures booklet that hardly costs Rs.15/- at the Andhra University Press . A Japanese visitor purchased 50 copies of that booklet).


EPISODES OF THE EPICS:


Speaking about character, the episode of the birth of Pandava brothers of Mahabharata epic may be mentioned as follows:


Kunthi the mother of Pandava brother’s has mastered the use of a Mantra taught by Maharshi Durvasa. She used that Manthra invoking Surya (Son God) become pregnant and gave birth to Karna. After marrying King Pandu she came to know that he is a Sapagrastha (Cursed) and invoked Yamadhrama Raja, Vayu Deva, and Indra during three different years and gave birth to Dharma Raja, Bhima & Arjuna respectively. She then taught the Manthra to Madri (The 2nd. Wife of Kong Pandu) {since the Mantra’s power was of only to bear the four children]. Madri invoked Aswini Devathas and gave birth to Nakula and Shadeva. She kept the child (Karna) in a box and left it in the Yamuna river. What are of interest in this story are the widely differing characters of the Heroic Pndava Brothers (as well as Karna)? The conception in the womb of Kunthi obviously resulted in the Mantra being pronounced in slightly different clarification to have the four children of the different characters.Even conception that can occur by a mere look at the female has also been mentioned in the Hindu Epics. How is that the epics and Vedas have given every conceivable thought of a perfect human brain could ever surmise with wisdom and unsurpassed consciousness?


Thoughts are God’s representatives.


Truthful healthy and strong brain only can receive them in more number as well as in more precise way and in respectable way.When they come receive them, honour them, by symbolising (naming) and record it more precisely.



Refine those symbols codify them and classify in a standard way. This process should be done seven times. If this is not possible at least three times before they are they are introduced to the out-side world. Such those thoughts which are not in tune with our accepted use (even remotely), culture, demand and (or) policy should be allowed to pass through without any respect or disrespect.


APPLIED PSYCHOLOGY A NOVEL TECHNOLOGY:


I read in my childhood during 1955s that a living organism was confined to live in an iron box so tight that it could never had the possibility to escape out of it. The living organism had a strong desire to come out of that iron box and free to move in the world outside it. It evolved a method by which it could escape the Iron Box confinement! The process was ingenious. It used its energy to produce certain vibrations frequencies while tapping on the boundary walls of the Iron Box. It did so knowing full well that they cross the box walls and excite a dead or a similar cells organism, present outside or on the surface of the Iron Box. It did so continuously and with diligence that eventually it lost all its energy and practically became dead. But the outside dead organism of a similar structure aquired the living force of the inside dead living organism and suddenly sparing up to life to fly away from the surface of the Iron Box. This has mystified me of my Applied Psychology thoughts and evolved a possible understanding of viable novel technology.


The birth of Jarasandha (A human baby born into two halves for two different ladies at same time were thrown and a Jara (Rakshasi) joined them and made into a living baby.) of Mahabharata epic has an interesting explanation of his name. It seems when a fruit was offered to a king for the birth of an offspring he has cut it vertically in two pieces and gave to his two wives to eat it. Eventually they gave birth two parts of a human structure mystified they have thrown the two parts outside the king’s mansion. A passerby Jara rakshasi has joined the two parts and instantly the baby Jarasandha (out of the joining by Jara) sprang up with the baby cry.


CONCLUSION:


What is the value of these epic stories and accounts of unsurpassable events of the Universe, but just to nurture the Human Intellect into the aspects of Applied Psychology?


ACKNOWLEDGEMENT:
The author is grateful to Dr. (Er). D.N.SINHA F.I.E., Ph.D., M.B.A., AIII Qualified Auditor, Chartered Engineer & Registered Valuer ,Competent Engineer (Safety) under CCE Nagpur, Loss Assessor, Naroji Road, Visakhpatnam-530002 and Dr. D. V. N. Sarma D.Sc. (AU) Ph.D. (Chicago) for their valuable discussions and encouragement in educational endeavours.


REFERENCES:


Science. 1998 Apr 10;280(5361):295-8. The involvement of cell-to-cell signals in the development of a bacterial biofilm. Davies DG, Parsek MR, Pearson JP, Iglewski BH, Costerton JW, Greenberg EP.Center for Biofilm Engineering, Montana State University, Bozeman, MT 59717-3980, USA.




Wednesday, March 3, 2010

A NEW THEORY OF INTERPLAY OF RAO AND ANTI-RAO WITH GRAVITATIONAL FIELDS

trusciencetrutechnology@blogspot.com Vol.2010, Issue No.3, Dt: 01 March 2010: 10:12:04 AM
A new theory of interplay of Rao and Anti-Rao quanta with the gravitational fields
by Professor Kotcherlakota Lakshmi Narayana,
(Retd.Prof.ofPhysics, Shivaji University), 17-11-10, Official Colony, Maharanipeta.P.O, Visakhapatnam-530002. Mobile: 9491902867: Email ID: Kotcherlakota_l_n@hotmail.com

ABSTRACT:

A new theory of interplay of Rao and Anti Rao quanta with the gravitational fields has been formulated and modelled within the frame work of Einstein’s General Theory of Relativity. These quanta of ubiquitous occurrence in the universe are not massless but could as well exist with certain effective charge. The non-vanishing Ricci tensor has been utilized to arrive at the possible mass range of these quanta. This tensor yielded two sets of the rao and the antirao quanta masses ±2.85 & ±0.65 that justify their physical existence as massive quanta of both positive and negative energy. This is unlike the Dirac Sea of negative energy since we have both r and t variables to obtain the variable that portraits the mass magnitude. The non-vanishing diagonal components of Einstein Equations of General Relativity exhibit the pressure and the density features of the fluid of these quanta. A constraint has been made use of to simplify the only non-vanishing non-diagonal component of the Einstein Tensor to obtain an expression for a charge-like quantity as a function of the variables wt, r and t. The time dependent charge expression is a noteworthy departure from the static charge characteristic of Reissner-Nordstrom metric.

Keywords: Cosmology, Cylindrical symmetry, Time renormalization, Rao and anti-Rao quanta, mass values, General Theory of Relativity, Einstein Equations, Applied Mathematics, Relativity Physics, and Astrophysics.

INTRODUCTION:

The standard method of approach of considering the Ghost neutrinos in General Relativity [1] and consideration of interaction of neutrinos with gravitational fields [2] employs the massless neutrinos. They considered the mathematics of spin in curved space [3] and [4] also electron pairs creation studied, by earlier researchers [5] telltale sign at possible of generation of gravitational fields by neutrinos and the response of neutrinos to gravitational fields. Wheeler[2] went to the extent of suggesting the existence of a Geon, a physical entity entirely made up of neutrinos held by gravitational attractions.

The alternative explanation [6] of the Stokes and anti-Stokes shift of spectral lines (and Smekal spectroscopy observation of shifts) by Rao and Anti-Rao quanta is feasible. The exciting possibility for neutrino physics and astrophysics is the possibility of formation of a muon-like entity by means of the following association: μR -==>R - + antineutrino electron + neutrinorao with obviously the other possibility of association with R + of neutrino positron and the antineutrinorao giving μR + . The solar wind stream of energetic protons of energies 10GeV would definitely loosen the Rao and the Anti-Rao quanta within these crystalline and chemically bound structured Mars material. The X-irradiation, Ultra-violet and extream UV radiations of the mineral material of the surface of Moon and the Mars does indeed produce these new variety of fermion entities. The specific charge is very small (could it be fractional?) and masses involved are of the order of neutrino masses![7-9]. The X-Ray scattering broadening and the brightness features of the Earth’s terrestrial atmosphere and the ionosphere would have existed bathed with these quanta excited molecular structures. [7 to 9].

This has provided an excellent background to formulate a new theory of interplay of Rao and Anti Rao quanta with the gravitational fields. The difference being that no longer these quanta of essentially ubiquitous occurrence in the universe are not massless but could as well exist with certain effective charge. They in my model formulation participate with the protons or other Baryons to account for the density of the universe. Do they extend beyond the realm of the Big Bang or the Inflationary theory of origin of the universe is an open question, a subject matter for my next blogposts.

Under the title “Tunneling to the beginning of time” it’s reported in literature that “The LHC (Large Hadron Collider) is an international project, in which the UK has a leading role. Particles of light (known as photons) have no mass. Matter particles (such as electrons and quarks) do – and we’re not sure why. British physicist, Peter Higgs, proposed the existence of a field (the Higg’s Field), which pervades the entire Universe and interacts with some particles and this gives them mass. If the theory is right then the field should reveal itself as a particle (the Higg’s particle). The Higg’s particle is too heavy to be made in existing accelerators, but the high energies of the LHC should enable us to produce and detect it.” Also where is the antimatter? ask the leaders of the LHC project: They assert that the ” The Big Bang created equal amounts of matter and antimatter, but we only see matter now. What happened to the antimatter? Every fundamental matter particle has an antimatter partner with equal but opposite properties such as electric charge (for example, the negative electron has a positive antimatter partner called the positron). Equal amounts of matter and antimatter were created in the Big Bang, but antimatter then disappeared. So what happened to it? Experiments have already shown that some matter particles decay at different rates from their anti-particles, which could explain this. One of the LHC experiments will study these subtle differences between matter and antimatter particles.”

I am thankful to Dr. K. V. N. Rao of Bedford (Mass), USA who has drawn my attention, in an email, to the published report on the internet "We thought a new astronomy had been born: charged particle astronomy," says Charles Dermer, a cosmic-ray astrophysicist at the US Naval Research Laboratory in Washington DC. As the team reports in a paper accepted for publication in Physical Review Letters The Pierre Auger Collaboration, preprint that they are seeing small air showers that are indicative of iron nuclei, rather than the larger showers that point to protons. Ultrahigh-energy cosmic rays made of iron nuclei would be harder to explain because such nuclei are less common than protons and are more likely to be broken down by the violent mechanisms thought to accelerate cosmic rays.

Whatever the gigantic experiments establish the time test validity of many cosmological theories of disappearing Black holes and the Dark Matter & the Dark Energy etc. it is the present author’s contention that the scope remains for the inquiring human mind to model new versions of the theory of General Relativity first proposed by Einstein.

THE PRESENT FORMULATION AND THE MODEL UNIVERSE:

The field equations of gravitation for the specific metric chosen [10] to enunciate the newly envisaged universe have been adopted as those given by Einstein but with the Energy-Momentum tensor for the Spinor Rao and anti-Rao quanta. The ψ for the description of the rao and antirao quanta has a non-vanishing expression given by γj ψ; j ≠ 0. An aim of the present work is to obtain the mass of the rao and antirao quanta from the non-vanishing Ricci expression of the universe described by the metric given by me [10].

The metric chosen yields the Einstein Tensor non-vanishing diagonal components in terms of the variables wt, r and t as

--------------------------(1)

--------------------------(2)

--------------------------(3)

The non-vanishing diagonal components of Einstein Equations of General Relativity exhibit the pressure and the density features of the fluid of these quanta. A constraint has been made use of to simplify the only non-vanishing non-diagonal component of the Einstein Tensor to obtain an expression for a charge-like quantity as a function of the variables wt, r and t. The time dependent charge expression is a noteworthy departure from the static charge characteristic of Reissner-Nordstrom metric.

The Equation of State:

The Equation of State formulated for the new universe enunciated in this research investigation is given below which, is akin to VOP equation but discernibly distinct from it:









The Equation of State solution is graphically illustrated below as KLNeq11 function with the dependence on the three variables of the model Viz., wt, r and t.




We need the kappa2p=2* Κ*p , which involves Κ = 8*Ï€*G/c^4 chosen as unity in terms of Newton’s G and p is the pressure of the fluid. The thought of the fluid is more appropriate in view that the rao and antirao quanta have negligible mass and endowed with effective charges of extremely small values.
The geometrical Ricci tensor may be used to obtain the mass of these quanta. In terms of the units adopted we get the mass magnitudes as 2.87 and 0.65 for both the sets of the values r= -1, t=1 and r=-1, t=-1. Like the Dirac Sea of negative energy we also got negative masses -2.87 and -0.65 for both the sets of the values r=1, t=1 and r=1, t=-1. The obtained values justify remarkably the consideration of rao and antirao quanta existence.
The geometrical Ricci tensor solution has been given illustrated in the figure below in a 3D-Graph of variables wt, r and t.




The model has obviously projected the competing role of both the variables r and t to ascertain the magnitudes of the variable wt. This is a significant departure from the conventional view of negative sea of electrons/protons envisaged by P. A. M. Dirac in his New formulation of Quantum mechanics.

RESULTS AND SIGNIFICANT FINDINGS:

A model of universe characterized by a metric with cylindrical symmetry geometry endowed with the time renormalization allows the interplay of rao and antirao quanta interaction with the gravitational fields. The geometrical Ricci tensor may be used to obtain the mass of theses quanta. This tensor yielded two sets of masses ±2.85 & ±0.65 for the rao and the antirao quanta justifying their physical existence as massive quanta of both positive and negative energy. This is unlike the Dirac Sea of negative energy since we have both r and t variables to obtain the entity wt. The non-vanishing diagonal components of Einstein Equations of General Relativity exhibit the pressure and the density features of the fluid of these quanta. A constraint has been made use of to simplify the only non-vanishing non-diagonal component of the Einstein Tensor to obtain an expression for a charge-like quantity as a function of the variables wt, r and t. The time dependent charge expression is a noteworthy departure from the static charge characteristic of Reissner-Nordstrom metric.

ACKNOWLEDGMENT:


The author is deeply indebted to late Professor K. Rangadhama Rao D.Sc.(Madras).D.Sc.(London) for the opportunity provided to work on the Nuclear Quadrupole Coupling constants at his laboratories in Andhra University, Waltair during the years 1960-1964 and again to work on Microwaves in 1965-1966. The school of The Professor achieved those Golden Days the International recognition. I was able to comprehend at his laboratories the significance of the Spectroscopy, Properties of Matter and Modern Physics concepts at research and fundamental level of both experimental and theoretical investigations.

REFERENCES:

1. T.M.Davies and J.R.Ray, Phys.Rev. Vol.D9, No.2, p.331-333,15th January 1974 and
trusciencetrutechnology@blogspot.com Vol.2009, No.7, Wednesday, 15 July 2009: 11:25:45 PM
On the nature and possible existence of Collapsing Gravitational Superconducting Currents of a Cosmic Entity and the generation of Bilinear Physical Entities of Ghost Fields. by Professor Dr. Kotcherlakota Lakshmi Narayana,
2. D.R.Brill and J.A.Wheeler, Rev.Mod.Phys.Vol.29, No.3, p.465-479, July 1957
3. F.J.Belinfante, Physica, Vol.7, p.305, 1940
4. G. Gamow & M. Schoenberg, Phys.Rev. Vol.59, p.539, 1941
5. G. Breit & J. A. Wheeler, Phys.Rev.Vol.46, p.1087, 1934)
6. trusciencetrutechnology@blogspot.com Volume 2010, Issue No.1,Dt.27/01/2010 10:02:59
Weather pattern at Visakhapatnam during 17th to 27th January 2010 by Professor Kotcherlakota Lakshmi Narayana.
7. K. L. Narayana, et al. Papers Nos B7, p.19; No. B8, p.19; No.B9, p.20; No.A20; No. D1, p.51; presented at Symposium on Luminescence and Allied Phenomena, Ind.Inst.Of Tech., Khargpur 1973. X-ray dosimeters development using the binary sulphate phosphors has also been specified.
8. K. L. Narayana et al.” Thermoluminescence of rare-earth activated (Ba: Sr)SO4 and (Ba: Cd) SO4 under X=irradiation”, Paper No. B14, p.119-129National Symposium on Thermoluminiscence and its Applications, Kalpakam Nuclear Research centre, Madras, Feb 1975
9. K. L. Narayana et al.””Optical micrographs and X-ray diffraction study of thin films of Al-Zr alloys”, 6th Materials Science Symposium on Phase transitions and Phase equilibria”, Paper No.37, Ind.Inst of Sci., Bangalore, October 17th, 1975. Also see Paper No. 38.
10. a). trusciencetrutechnology@blogspot.com Vol.2009, Issue No. 12, Dated 31st December 2009 9:02:06 PM "A PARTICLE CONSTRAINED TO MOVE ON A CONE UNDER A GRAVITATIONAL FIELD AND THE RENORMALIZATION PROCESS FOR THE TIME DEPENDENCE" By Professor Kotcherlakota Lakshmi Narayana.
b).The Pierre Auger Collaboration, preprint http://arxiv.org/abs/1002.0699 2010

********