Thursday, September 29, 2011

Automatic Identification and Data Capture (AIDC) Technology

ave you ever noticed a black magnetic stripe at the backside of our credit card? A number of thoughts run through your mind. For what purpose magnetic stripe is used? What information this stripe contains? Is the information only being read or the encoded information is copied? And, if information is saved, what could be the consequences?

A thought like this inspire us to take a closer look at the card technologies and the family to which they belong- Automatic Identification and Data Capture technologies (AIDC).
Answers to all these above mentioned questions are simple. The purpose for using magnetic stripe technology and in general, AIDC technologies, is to identify people or objects through machine automated process.
Now again the question arises, why are these technologies cropping up in the most routine tasks of our everyday lives?
This machine automated reading of magnetic stripe makes the job easier and, therefore, more efficient. The clerk does not have to tally the information needed, all by himself, a machine quickly does it for him. It also helps in making fraudulent IDs easier to detect. Both efficiency and fraud prevention ultimately save the business money.

What is AIDC?
Automatic identification and data capturing is a method of automatically identifying objects, collecting data about them and entering data directly into the computer system. All this process is done automatically without any human involvement. Human involvement is confined to a user scanning an AIDC equipped item which is bar coded.
The information associated with the object is called identification data. This data may be in the form of images, sounds or videos. Before feeding the data into the computer system, this data is converted into a digital file. Hence, a transducer is employed to fulfill this task i.e. to convert actual data into digital file. Now, in computer system a database is fed. The stored data file is analyzed by a computer or is compared with other files in a database to verify or to provide authentication to enter in a secured system.
AIDC technologies mainly consist of three principle components namely-
Data encoding- alphanumeric characters are translated into the form that can be read by machine.
Machine scanning- scanner reads the encoded data and converts in electric signals.
Data decoding- electrical signals is transformed into digital data and then finally into alphanumeric characters.
AIDC Technologies:
Following are the various AIDC technologies:
· Barcodes
· Radio Frequency Identification (RFID)
· Biometrics
· Magnetic Stripes
· Optical Character Recognition (OCR)
· Smart Cards
· Voice Recognition
· Electronic Article Surveillance (EAS)
· Real Time Locating Systems (RTLS)
1. Barcodes:
You must have seen bar-coded items in supermarkets. There are about 250 types of barcodes that have been designed till now. They may be 1D or 2D. Those which you observed on the goods are referred to as linear barcode. Standard of these barcode are published by AIM and are currently in progress at ISO.
Barcodes consist of small images of lines (bars) and spaces affixed to retail store items, ID cards and postal mail to identify a particular product number, person or location. A barcode reader uses a laser beam that is sensitive to the reflections from the line and space thickness and variation. The reader translates information from the image to digital data and sends it to the computer for further process.
2. Radio Frequency Identification (RFID):
This technology acts as the base in automated data collection, identification and analysis systems worldwide. RFID obtains information on an item without making direct contact with the item. Depending on the technology variation used, reading and writing distances can vary from few millimeters to several meters.
RFID systems comprises of three components: an antenna, a transceiver and a transponder (the tag). The application area of RFID includes livestock identification and Automated Vehicle Identification (AVI) because of its capability to track moving objects.
3.Biometrics:
Biometrics system consists of a scanning device or a reader, software that converts the scanned biological data, like finger prints, voice characteristics etc, into digital format and compares captured biological data with the stored data of that individual.
Application of biometric verification in corporate and public security systems, consumer electronics and point of sale is becoming increasingly common.
4.Magnetic Stripes:
Almost every individual carry cards like credit cards, IDs, ATM cards etc. All these cards are cropped with magnetic stripe. The technology has been with us for many years. These stripes contain information about the owner of the respective card. The information in magnetic stripes is read by magnetic stripe reader.

5.Optical Character Recognition (OCR):
Optical character recognition is the electronic or mechanical translation of scanned images of text that may be handwritten, typewritten or printed, into machine encoded text.
Use of OCR is to digitize documents and books, publish text on website, sort mails, and process checks and mail based payments by credit cards to computerize so that a record can be maintained in an office, instead of bulks of papers.
OCR is a field of research in pattern recognition, artificial intelligence and computer vision.
6.Smart Cards:
A smart card, a chip card or integrated circuit card (ICC), is any pocket-sized plastic card with embedded integrated circuits. It is an electronic recording device. Most smart cards looks like a credit or debit card, but smart cards can function on at least three levels (credit-debit-personal information).
Smart cards may provide strong security authentication for single sign on (SSO) within large organizations. Information such as withdrawals, sales, and bills can be processed immediately and if/when necessary; those records can be transmitted to a central computer file updating.
7.Voice Recognition:
Voice or speech recognition is the ability of a machine or program to receive and interpret dictation or to understand spoken commands. Voice based security systems store a record of speech traits and patterns, which are difficult to counterfeit. Applications of voice recognition include voice user interfaces such as voice dialing, call routing, search, simple data entry, preparation of structured documents etc.
8.Electronic Article Surveillance (EAS):
When you go to any showroom in malls or library, you have to pass through gated area. This is where Electronic Article Identification technology is used.
EAS is a technology used to identify items as they pass through a gated area. Mainly this identification is used to alert someone of the unauthorized removal of items from a store, library or a data center. When an item is purchased, the EAS tag is deactivated. The gate is able to sense if the tag is active or de-active when the item is passed through it and sounds an alarm if necessary. Hence, theft can be countered.
9.Real Time Locating Systems (RTLS):
RTLS is a wireless radio frequency solution that continuously monitors and reports real time locations of tracked resources. RTLS tags transmit IDs and status information at frequent intervals via low power radio signal to a central processor which computes the location of up to thousand of tagged assets within yards and remote sites. The result is completely automated inventory of all tagged yard equipment all the time.
Top
Sensors:
Sensors play a key role in any automation and control systems. Sensor is a device that measures a physical quantity and converts into a signal that can be easily read by the instrument used. It gives a detailed description of the given object. There are uncountable application of sensors which includes aerospace, medicine, manufacturing, robotics, machine and cars.
Newly designed sensors utilize advanced techniques making it more efficient and smaller in size. In addition to this, these sensors collect information much more than the capability of traditional sensors. Traditional sensors were wired but these newly designed sensors are wireless which adds one more key feature of such sensors.
Benefits of AIDC:
Through automation you can save valuable time and resources by reducing dependency on manual labor. By utilizing AIDC technologies, identification of objects or people has become much more efficient and accurate.The correctness in identification reduces the need for repeated verifications for assurance.
In industries like banking and insurance, by automating the documents, accurate processing of paperwork is achieved.
Utilizing the biometric data in AIDC system will ensure access to restricted facilities are granted to the right person and access rights are not easily transferred to other unauthorized person.
In mobile telecommunication industry, international mobile equipment identity served the purpose to protect the consumers from stolen mobile phones by disallowing stolen mobile phone to utilize mobile network services.
In retail industry, workers are often being equipped with mobile computing devices that function both as electronic readers and basic computing devices to process data before channeling it to backend system for processing.
Conclusion:
Automatic Identification and Data Capture technology comprises a diverse group of technologies and systems that capture the item related data for use within system context. It encompasses a wide range of data carrier technologies including barcodes, magnetic stripe cards, smart cards and the rapidly expanding technology such as RFID. Feature extraction technologies are also an important part of AIDC, where biometric techniques such as finger print scanning, retinal scanning, face or voice recognition techniques can be used to identify individuals.
AIDC has advanced greatly over the years and it is now possible for users around the world to interact with millions of business processes and systems using AIDC equipped electronic devices. AIDC is no doubt a competitive threat to those who tend to avoid it and are unaware of its potential. AIDC is most important because it saves great amount of time when entering digital data and its accuracy which ultimately results in reliability.
Other digital data entry keyboard methods do not always work for image, video or audio data, which make AIDC the only method of entering data for further digital processing.

Air Multiplier Technology — Bladeless Fan

I was really amazed to see this technology, how the air is produced with out any blades!
Know how this technology works in detail below:

The latest Air Multiplier Technology is highly complex and draws on aeronautics and jet-engine technologies. It generally works by suction of air into its base with an impeller which is an improvement on the larger models built on today’s modern jet fighters. So here is how the Dyson air multiplier works:

Step 1:

Air drawn in by the machine

An energy efficient brushless 40 watt electric motor draws in up to a maximum of 27 litres per second through the little vents in the base of the air multiplier. The power consumption here is comparatively lower than the average power in conventional fans. This process is based on a blend of technologies made use of in jet engines and turbochargers producing a powerful flow of uninterrupted air.

Step 2:

Acceleration of Air via annular aperture

The air is then gradually forced upward into the ring at pretty high speeds. It then makes an exit within the ring via very narrow 1/16th of an inch wide slits. The air then moves over the ring’s inner edge which is, in actual the most revolutionary part of the fan. This essentially has been designed in the same way as that of the wing profile and functions pretty much in the same manner as the wing.

Step 3:

Inducement of Air

The air behind the air multiplier is then drawn right into the flow of air by a process known as inducement. The air comes out of a 3mm slit built in the frame at a speed of 55mph.

Step 4:

Entrainment of Air

The air then moves over a ramp which is shaped like an airfoil, which directs it outwards. This is the most important point as the surrounding air is gradually drawn into the flow of air that multiplies the original volume of air by about 15 times. As the fan does not have blades chopping the air, all the air which is propelled out is even compared to the conventional bladed fan which gives you irregular blasts to the face.

Amplification of Air by 15 times without chopping/buffeting

Overall the resulting air flow is really smooth and consistent without undesirable buffeting.

Story behind the Air Multipliers

Issues with traditional fans:

There has not been any marked improvement in the design and construction of electric fans since their invention in 1882, save for a few notable changes here and there including addition of grills, change of materials and integration of buttons for convenience. This said, traditional fans have not been able to do away with the fundamental problem of the blade chopping the air. And choppy air does cause annoyance and undesirable buffeting. Getting rid of the blades can put an end to buffeting and how on earth would you make a fan work without blades?

Behaviour of air at high speeds:

While engineers were developing the concept behind their Airblade hand dryer, they noted how air that is being accelerated at very high speeds through a narrow aperture led the surrounding air to be sucked in. And this phenomenon was later realized to be pretty useful, especially in a fan. Several number of tests followed to discover the ideal aperture width, dimensions of loop amplifier and ramp angle to come out with a fan with no blades.

Motor technology:

For generating a jet of air and making it powerful enough to function properly, the motor should be designed in a way so as to suck in more than 20 litres of air/second. The Dyson engineers were able to do this by designing a new sort of 3-dimensional impeller built with 9 fins that are asymmetrically aligned, blending technologies that are being employed in turbochargers and jet engines.

Testing airflow:

Next comes the testing of airflow smoothness, Engineers at Dyson made use of a technique known as the ‘Laser Doppler Anemometry’. Tiny particles in the count of millions were suitably injected into the flow of air for making flow patterns noticeable to laser technology. Totally 4 layers were made use of for tracking the direction and speed of the particles, consuming up to 2000 measurements/second. For creating a much detailed, comprehensive map of the air multiplier’s airflow, fluid dynamic engineers at Dyson had to carry about 4000000 velocity measurements. Though an engineer at Dyson had a bit of original idea in his mind, it took every little discipline from the manufacturer’s 350-solid and brilliant team of scientists and engineers to build the Air multiplier technology.

How do cellular phone towers work?

Cell phone base stations may be free standing towers or mounted on existing structures, such as trees, water tanks, or tall buildings. The antennas need to be located high enough so they can adequately cover the area. Base stations usually range in height from 50-200 feet.

Cell phones communicate with nearby cell towers mainly through radiofrequency (RF) waves, a form of energy in the electromagnetic spectrum between FM radio waves and microwaves. Like FM radio waves, microwaves, visible light, and heat, they are forms of non-ionizing radiation. This means they cannot cause cancer by directly damaging DNA. RF waves are different from stronger types of radiation such as x-rays, gamma rays, and ultraviolet (UV) light, which can break the chemical bonds in DNA.

At very high levels, RF waves can heat up body tissues. (This is the basis for how microwave ovens work.) But the levels of energy used by cell phones and towers are much lower.

When a person makes a cell phone call, a signal is sent from the phone’s antenna to the nearest base station antenna. The base station responds to this signal by assigning it an available radiofrequency channel. RF waves transfer the voice information to the base station. The voice signals are then sent to a switching center, which transfers the call to its destination. Voice signals are then relayed back and forth during the call.

A cell-phone tower is typically a steel pole or lattice structure that rises hundreds of feet into the air. This cell-phone tower along I-85 near Greenville, SC, is typical in the United States:

Cell Tower (Loading..)

This is a modern tower with three different cell-phone providers riding on the same structure. If you look at the base of the tower, you can see that each provider has its own equipment, and you can also see how little equipment is involved today (older towers often have small buildings at the base):

Here is the equipment owned by one of the providers:

The box houses the radio transmitters and receivers that let the tower communicate with the phones. The radios connect with the antennae on the tower through a set of thick cables:

If you look closely, you will see that the tower and all of the cables and equipment at the base of the tower are heavily grounded. For example, the plate in this shot with the green wires bolting onto it is a solid copper grounding plate:

One sure sign that multiple providers share this tower is the amazing five-way latch on the gate. Any one of five people can unlock this gate to get in.

Cell-phone towers n all shapes and sizes, but I do believe this one in Morrisville, North Carolina, is one of the weirdest looking.
That is one tall, ugly tree!


Tuesday, September 13, 2011

Interesting Facts about Albert Einstein

Albert Einstein once said, "The important thing is to not stop questioning". It was this curiosity and questioning attitude that perhaps earned him the ultimate recognition in the form of a Nobel Prize. Albert Einstein is credited with the development of the theory of relativity and physical theory of gravity among other things.

Facts :

  • Albert Einstein was born on 14th March, 1879 in Ulm, Germany. When Albert Einstein was a child his mother actually thought he was deformed because he had rather large head. As a child Einstein spoke very little till the age of nine. Albert Einstein had a younger sister named Maja who he became good friends with in the later years of his life.
  • When Einstein was five years old his father gave him a pocket compass. It was this compass that sparked Einstein’s interest in science. The fact that the compass pointed in the same direction no matter how it was turned made him curious about understanding the force behind it.
  • In 1895 when Albert Einstein appeared for the University Entrance Exam he could only manage to pass in the math and science sections and failed in the rest of the subjects.
  • Albert Einstein published papers on theory of Special Relativity, Brownian motion and Photoelectric Effect in the year 1905. His paper on general relativity was published in the year 1916.
  • Albert Einstein could not find work after he graduated from the college and initially had to work as a technical assistant with the Swiss Patent Office. Between the year 1911 and 1912 he taught at a German speaking University in the city of Prague after which he returned to Zurich. In the year 1914 he started working as a professor at the University of Berlin and was also made the director in the Kaiser Wilhelm Institute for Physics.
  • Albert Einstein won the Nobel Prize for his work in the area of Photoelectric Effect in the year 1921. Einstein was not present to receive his Nobel Prize in December 1922 because he was on a trip to Japan.
  • In the year 1933 he started teaching at the Princeton University. In the year 1939 he wrote to President Roosevelt and pointed out the possibility of construction of a powerful bomb using atomic chain reactions in Uranium and he also suggested that Germany might be working on such a creation.
  • Einstein was offered the Presidency of Israel in 1952 but declined it. An element named einsteinium was discovered in 1952 and named in his honor.
  • Albert Einstein had an illegitimate child with Mileva Maric who was one of his former students. His daughter was named Lieserl and was born in 1902 and not much is known about his daughter. Some accounts indicate that his daughter was mentally challenged and lived with her mother’s family. Einstein eventually married Mileva and he had two sons Hans Albert and Eduard. However his relationship with his wife was largely strained. His relationship with his elder son Hans Albert was also quite rocky. Eventually Einstein divorced Mileva and married his cousin Elsa Lowenthal. He had numerous affairs with many women during his lifetime.
  • Albert Einstein was also not particularly concerned about being well dressed. He also stopped wearing socks because he found his big toe would make a hole in the sock. His favorite past time was sailing. Einstein also loved going for walks around the town and that was one of his favorite activities. He also loved music and used to play the violin.
  • After Albert Einstein’s death in 1955 his brain was removed without approval from his family and an autopsy was conducted. Thomas Harvey conducted this autopsy and eventually it was discovered that Einstein’s brain had large portion of glial cells in the region that synthesizes information. Other studies also indicated that Einstein’s brain did not have a particular kind of wrinkle and this allowed the neurons to communicate better with each other. At the time of his death, Albert Einstein’s final words died with him as they were in German and his nurse did not understand German.

ಮನೆ, ಮನಸು ಬೆಳಗಲಿ ಶ್ರೀ ವರ ಮಹಾಲಕ್ಷ್ಮೀ

WD

ಕರಾಗ್ರೇ ವಸತೇ ಲಕ್ಷ್ಮೀ | ಕರಮಧ್ಯೇ ಸರಸ್ವತೀ
ಕರಮೂಲೇ ಸ್ಥಿತೇ ಗೌರಿ | ಪ್ರಭಾತೇ ಕರದರ್ಶನಂ ||
ಎಂಬ ಮಂತ್ರದೊಂದಿಗೆ ಹೆಚ್ಚಿನವರು ತಮ್ಮ ಕರಗಳೆರಡನ್ನೂ ಕಂಗಳಲ್ಲಿ ತುಂಬಿಕೊಂಡು ದಿನವನ್ನಾರಂಭಿಸುತ್ತಾರೆ. ಕರದ ಅಗ್ರ ಸ್ಥಾನದಲ್ಲಿರುವವಳಾದ್ದರಿಂದ ಪಡೆಯುವುದಕ್ಕಿಂತಲೂ ಕೊಡುವುದರಲ್ಲಿ ಸಂತೃಪ್ತಿ ಕಾಣುವ ಜನರೆಂದರೆ ಲಕ್ಷ್ಮೀದೇವಿಗೆ ಅಚ್ಚುಮೆಚ್ಚು. ನಾವೆಷ್ಟು ಕೊಡುತ್ತೇವೆಯೋ, ಅದಕ್ಕಿಂತ ದುಪ್ಪಟ್ಟನ್ನು ಶ್ರೀ ಮಹಾಲಕ್ಷ್ಮಿಯು ನಮಗೆ ಕರುಣಿಸುತ್ತಾಳೆ ಎಂಬುದು ಆಸ್ತಿಕರ ನಂಬಿಕೆ.

ಪ್ರತಿಯೊಬ್ಬ ಪುರುಷನ ಏಳಿಗೆಯ ಹಿಂದೆ ಒಬ್ಬಳು ಸ್ತ್ರೀ ಇರುತ್ತಾಳೆ ಎಂಬ ಮಾತಿಗನುಗುಣವಾಗಿ, ಸ್ಥಿತಿ ಕಾರಕನಾದ ಶ್ರೀ ಮಹಾವಿಷ್ಣುವಿನ ಶಕ್ತಿಯೇ ಆಗಿರುವ ಶ್ರೀ ಮಹಾಲಕ್ಷ್ಮಿಯನ್ನು ಒಲಿಸಿಕೊಂಡರೆ ಸಕಲ ಇಷ್ಟಾರ್ಥ ಸಿದ್ಧಿಸುತ್ತದೆ ಎಂಬುದು ಆಸ್ತಿಕರ ನಂಬುಗೆ. ಹೀಗಾಗಿ ಪರಮಾತ್ಮನ ಒಲುಮೆ ಗಳಿಸಲು ಮಹಾಲಕ್ಷ್ಮೀ ಪೂಜೆಯು ಸನ್ಮಾರ್ಗವಿದ್ದಂತೆ. ನಾಗರಪಂಚಮಿಯಿಂದ ಆರಂಭವಾಗುವ ಹಬ್ಬಗಳ ಸಾಲಿನಲ್ಲಿ ಪ್ರತಿ ವರುಷವೂ ಹೆಂಗಳೆಯರ ಮನಸ್ಸು ಉಬ್ಬಿಸುವ ಹಬ್ಬಗಳಲ್ಲೊಂದು ಇದು.

ಪ್ರತಿ ವರ್ಷ ಶ್ರಾವಣ ಮಾಸದ ಎರಡನೇ ಶುಕ್ರವಾರ ವರಮಹಾಲಕ್ಷ್ಮೀ ವ್ರತ ಆಚರಿಸುವ ಮೂಲಕ ದೀರ್ಘ ಮಾಂಗಲ್ಯ ಭಾಗ್ಯವನ್ನು ಕೋರುವುದಲ್ಲದೆ, ತಮ್ಮ ಕುಟುಂಬಕ್ಕೆ ಸಂಪತ್ತು, ಸುಖ ಸಮೃದ್ಧಿ ಕೋರುವ ಸುಮಂಗಳೆಯರು, ಪುರೋಹಿತರ ಅಗತ್ಯವಿಲ್ಲದೆ ಮಾಡಬಹುದಾದ ವ್ರತವಿದು. ಹೀಗಾಗಿ, ತಾವೇ ಮಾಡುವ ಪೂಜೆ ಎಂಬ ಹೆಮ್ಮೆ ಈ ಹೆಂಗಳೆಯರಿಗೆ. ಜ್ಯೋತಿಷ್ಯದ ಪ್ರಕಾರ ಸಂಪತ್ತಿನ ಅಧಿಪತಿಯಾದ ಶುಕ್ರ ಗ್ರಹದ (ಶುಕ್ರ ದೆಸೆ ಎಂದರೆ ಶ್ರೀಮಂತಿಕೆ ಬಂದಿದೆ ಎಂಬ ವಾದ ಕೇಳಿದ್ದೀರಲ್ಲ...) ವಾರದಲ್ಲಿಯೇ ಈ ವ್ರತಾಚರಣೆ ನಡೆಯುತ್ತದೆ.

ಇನ್ನು ಹಬ್ಬದಾಚರಣೆಗೆ ನೆಪಗಳು ಬೇಕೇ? ದಿನಗಳೆದಂತೆ ಸಂಬಂಧಗಳು ಯಾಂತ್ರಿಕವಾಗುತ್ತಿರುವ ಈ ದಿನಗಳಲ್ಲಿ, ವರಮಹಾಲಕ್ಷ್ಮೀ ವ್ರತವು ಇತ್ತೀಚೆಗೆ ಸಾಮೂಹಿಕ ಆಚರಣೆಯಾಗುತ್ತಿರುವುದು, ಕಳೆದು ಹೋದ ಮಾನವೀಯ ಬಾಂಧವ್ಯಗಳ ಬೆಸುಗೆಗೂ ಪೂರಕವಾಗುತ್ತದೆ ಎಂಬುದರಲ್ಲಿ ಎರಡು ಮಾತಿಲ್ಲ. ಹಬ್ಬಗಳ ಸಾರ್ವತ್ರಿಕ ಆಚರಣೆಯ ಧ್ಯೇಯವೂ ಇದೇ ಅಲ್ಲವೇ...?

ಯಾವುದೇ ಧಾರ್ಮಿಕ ಆಚರಣೆಗಳಲ್ಲೂ ಒಂದು ಸಂದೇಶವಂತೂ ಸುಸ್ಪಷ್ಟ. ಅದೆಂದರೆ ಮನೆಯು ಚಿಕ್ಕದಾಗಿದ್ದರೂ, ಮನಸು ದೊಡ್ಡದಾಗಿರಬೇಕು. ಮನಸ್ಸು ಶುಭ್ರವಾಗಿರಬೇಕು, ಶುದ್ಧಿಯಾಗಿರಬೇಕು. ಆಗಲೇ ಮಾನವ ಧರ್ಮಕ್ಕೆ ಬೆಲೆ.

ಅದಕ್ಕೇ ಅಲ್ಲವೇ ದಾಸರು ಹೇಳಿದ್ದು - "ತನುವೆಂಬ ಭಾಂಡವ ತೊಳೆದು, ಕೆಟ್ಟ ಮನದ ಚಂಚಲವೆಂಬ ಮುಸುರೆಯ ಕಳೆದು; ಘನವಾಗಿ ಮನೆಯನ್ನು ಬಳಿದು, ಅಲ್ಲಿ ಮಿನುಗುವ ತ್ರಿಗುಣದ ಒಲೆಗುಂಡ ನೆಡೆದು" ಅಂತ?

ಅವರವರ ಧರ್ಮಾಚರಣೆಯು ಅವರವರಿಗೇ ಶ್ರೇಷ್ಠ. ಅನ್ಯ ಧರ್ಮವನ್ನು ನಿಂದಿಸುವುದಕ್ಕೆ ಯಾವುದೇ ಧರ್ಮವೂ ಬೋಧಿಸುವುದಿಲ್ಲ. ಪರಧರ್ಮ ನಿಂದಿಸುತ್ತಾರೆಂದರೆ, ತಮ್ಮದೇ ಧರ್ಮವನ್ನು ದೂಷಿಸಿದಂತೆ ಎಂಬ ಸಂದೇಶದೊಂದಿಗೆ, ಭಾರತೀಯರು ಪರಧರ್ಮ ಸಹಿಷ್ಣುಗಳು ಎಂಬ ಮಾತನ್ನು ಉಳಿಸಿಕೊಳ್ಳೋಣ, ನಾವೆಲ್ಲರೂ ಮೊದಲು ಭಾರತೀಯರಾಗೋಣ, ಭಾರತೀಯತೆಯನ್ನು ಮೆರೆಯೋಣ.

ಶ್ರೀ ಮಹಾಲಕ್ಷ್ಮೀ ಧ್ಯಾನ
ಲಕ್ಷ್ಮೀಂ ಕ್ಷೀರಸಮುದ್ರ ರಾಜ ತನಯಾಂ ಶ್ರೀರಂಗ ಧಾಮೇಶ್ವರೀಂ
ದಾಸೀಭೂತ ಸಮಸ್ತ ದೇವವನಿತಾಂ ಲೋಕೈಕ ದೀಪಾಂಕುರಾಂ|
ಶ್ರೀಮನ್ಮಂದ ಕಟಾಕ್ಷ ಲಬ್ಧ ವಿಭವ ಬ್ರಹ್ಮೇಂದ್ರ ಗಂಗಾಧರಾಂ
ತ್ವಾಂ ತ್ರೈಲೋಕ್ಯ ಕುಟುಂಬಿನೀಂ ಸರಸಿಜಾಂ ವಂದೇ ಮುಕುಂದಪ್ರಿಯಾಮ್|

10 Years of 9/11 Attacks: A Tribute


Pictures of 9/11:









Timeline of 9/11:


7:58 a.m.
- United Airlines Flight 175 departs Boston for Los Angeles,
carrying 56 passengers, two pilots, and seven flight attendants. The
Boeing 767 is hijacked after takeoff and diverted to New York.

7:59 a.m. - American Airlines Flight 11 departs Boston for Los
Angeles, carrying 81 passengers, two pilots, and nine flight
attendants. This Boeing 767 is also hijacked and diverted to New York.

8:01 a.m. - United Airlines Flight 93, a Boeing 757 carrying 38
passengers, two pilots, and five flight attendants, leaves Newark, N.J.,
for San Francisco.

8:10 a.m.
- American Airlines Flight 77 departs Washington's
Dulles International Airport for Los Angeles, carrying 58 passengers,
two pilots, and four flight attendants. The Boeing 757 is hijacked
after takeoff

8:46 a.m.
- American Flight 11 from Boston crashes into the North
Tower at the World Trade Center.

9:03 a.m.
- United Flight 175 from Boston crashes into the South
Tower at the World Trade Center.

- U.S. Federal Aviation Administration shuts down all New
York area airports.

9:21 a.m.
- Bridges and tunnels leading into New York City
are closed.

9:25 a.m.
- All domestic flights are grounded by U.S. Federal
Aviation Administration.

9:45 a.m.
- American Flight 77 crashes into The Pentagon.

10:05 a.m.
- The South Tower at the World Trade Center collapses.

10:05 a.m.
- The White House is evacuated.

10:10 a.m.
- A large section of one side of The Pentagon collapses.

10:10 a.m.
- United Flight 93 crashes in a wooded area in
Pennsylvania, after passengers confront hijackers.

10:28 a.m.
- The North Tower at the World Trade Center collapses.