Tuesday, November 23, 2010

Eiffel Tower facts......



History

      
 Eiffel Tower
Eiffel Tower and the
Trocadéro fountains
 
The Eiffel {y'-ful} Tower, an immense stucture of exposed latticework supports made of puddle iron, was erected for the Paris Exposition of 1889. The Prince of Wales (later King Edward VII of England) officiated at the ceremonial opening. Of the 700 proposals submitted in a design competition, one was unanimously chosen, a radical creation from the French structural engineer Alexandre Gustave Eiffel (b. Dec. 15, 1832, d. Dec. 28, 1923), who was assisted in the design by engineers Maurice Koechlin and Emile Nouguier, and architect Stephen Sauvestre.
However, the controversial tower elicited some strong reactions, and a petition of 300 names — including those of Guy de Maupassant, Émile Zola, Charles Garnier (architect of the Opéra Garnier), and Alexandre Dumas fils — was presented to the city government, protesting its construction. The petition read, "We, the writers, painters, sculptors, architects and lovers of the beauty of Paris, do protest with all our vigour and all our indignation, in the name of French taste and endangered French art and history, against the useless and monstrous Eiffel Tower."
Nature lovers thought that it would interfere with the flight of birds over Paris. But the Eiffel Tower was admired by Rousseau, Utrillo, Chagall, and Delaunay. It was almost torn down in 1909 at the expiration of its 20-year lease, but was saved because of its antenna — used for telegraphy at that time. Beginning in 1910 it became part of the International Time Service. French radio (since 1918), and French television (since 1957) have also made use of its stature. In the 1960s, it was the subject of a wonderful study by semiologist Roland Barthes.
      
Eiffel Tower
under construction

Eiffel Tower under construction, April 1888

April 1888

Eiffel Tower under construction, July 1888

July 1888

Eiffel Tower under construction, December 1888

December 1888

Eiffel Tower completed, May 1889

completed
May 1889
 
 
Built to celebrate the science and engineering achievements of its age, soaring 300m / 984 ft. (320.75m / 1,052 ft. including antenna) and weighing 7000 tons, the structure consists of two visibly distinct parts: a base composed of a platform resting on four separate supports (called pylons or bents) and, above this, a slender tower created as the bents taper upward, rising above a second platform to merge in a unified column.
This unprecedented work, the tallest structure in the world until the Empire State Building was built about 40 years later, had several antecedents. Among them were the iron-supported railway viaducts designed by Eiffel, an arch bridge over the Douro River in Portugal with a span of 160 m (525 ft), and a design for a circular, iron-frame tower proposed by the American engineers Clarke and Reeves for the Centennial Exposition of 1876. Eiffel knew and publicly acknowledged this influence; he was no stranger to the United States, having designed the wrought-iron pylon inside Frederic Bartholdi's Statue of Liberty in 1885. Later in the same year, he had also begun work on the cupola of the Nice observatory.
Eiffel was the leading European authority on the aerodynamics of high frames (he wrote "The Resistance of the Air" in 1913). In the construction of the Eiffel Tower, the curve of the base pylons was precisely calculated so that the bending and shearing forces of the wind were progressively transformed into forces of compression, which the bents could withstand more effectively. Such was Eiffel's engineering wizardry that even in the strongest winds his tower never sways more than 4-1/2 inches. The superskyscrapers erected since 1960, such as the World Trade Center, were constructed in much the same way.
However difficult its birth may have been, the Tour Eiffel is now completely accepted by French citizens, and is internationally recognized as one of the symbols of Paris itself.

Facilities and Views

In the basements of the eastern and western pillars, one can visit the gargantuan 1899 machinery which powers the elevators, an astonishing spectacle reminiscent of a Jules Verne novel. From the Tower's three platforms — especially the topmost — the view of Paris is superb. It is generally agreed that one hour before sunset, the panorama is at its best; don't forget to bring your camera, and experiment with the f-stop settings to capture a dazzling sunset on the Seine. If you can't be there in person, then check out a Live Aerial View of Paris with TF1's webcam online: from the top of the Eiffel Tower, you can see Paris in real time, 24 hours a day, whatever the weather conditions in the French capital. To get the most out of this view of Paris, we suggest you surf their web site between 7:00 AM and 9:00 PM GMT (1:00 AM and 3:00 PM Eastern Time in the U.S.), when the City of Light is at its best.
      
 Eiffel Tower (print)
 Eiffel Tower
 
First level: 57.63 meters (189 feet). Observatory from which to study the movements of the Eiffel Tower's summit. Kiosk presentation about the mythic painting of the Eiffel Tower. Space CINEIFFEL: offers an exceptional panorama of sights from the Tower. Souvenir shops (yes, every tourist MUST have a miniature replica). Restaurant "Altitude 95" (phone 01-45-55-20-04). Post office, with special stamps "Paris Eiffel Tower ". Panoramic gallery displaying the Monuments of Paris.
Second level: 115.73 meters (379 feet, 8 inches). Panorama of Paris. Telescopes, shops. Animated displays on the operation of the elevators. Jules Verne Restaurant (extremely expensive, reservations absolutely necessary; phone 01-45-55-61-44).
Third level: 276.13 meters (905 feet, 11 inches). Exceptional panoramic views, day or night, of Paris and its surroundings. Recently restored office, featuring wax reproductions of Gustave Eiffel and Thomas Edison in conversation (see photo. Panoramic guide displays to aid orientation. Dioramas presenting the history of this platform.
Probably the best approach to the tower is to take the Métro to the Trocadéro station and walk from the Palais de Chaillot to the Seine. Besides fabulous views, especially when the Trocadéro fountains are in full force, you get a free show from the dancers and acrobats who perform around the Palais de Chaillot. The vast green esplanade beneath the tower is the Parc du Champs-de-Mars, which extends all the way to the 18th-century École Militaire (Military Academy), at its southeast end. This formal lawn was once a parade ground for French troops.
The Eiffel Tower at night is one of the great sights of Paris and shouldn't be missed. The gold lighting highlights the delicacy of the steelwork in a way that is missed in daylight. Skip the tour buses and pickpockets on Trocadéro and head up to the École Militaire for a more tranquil view.

Interesting Facts


  • 300 steel workers, and 2 years (1887-1889) to construct it.
  • 15,000 iron pieces (excluding rivets).
  • 2.5 million rivets.
  • 40 tons of paint.
  • 1671 steps to the top.
  • Maximum sway at top caused by wind: 12 cm (4.75 inches).
  • Maximum sway at top caused by metal dilation: 18 cm (7 inches).
  • Total height in 1889: 300.51 meters (985 feet, 11 inches).
  • Total height with television antenna: 320.755 meters (1052 feet, 4 inches).
  • Height varies up to 15 cm depending on temperature.
  • Size of base area: 10,281.96 square meters (2.54 acres).
  • Weight of foundations: 277,602 kg (306 tons).
  • Weight of iron: 7.34 million kg (8092.2 tons).
  • Weight of elevator systems: 946,000 kg (1042.8 tons).
  • Total weight: 8.56 million kg (9441 tons).
  • Pressure on foundation: 4.1 to 4.5 kg per square centimeter, depending on pier (58.26 to 64 lbs. per square inch).
  • Dates of construction: January 26, 1887 to March 31, 1889.
  • Cost of construction: 7.8 million francs ($1.5 million).
  • Total number of visitors during 1889 Exposition: 1,968,287.
  • Total receipts during 1889 Exposition: 5,919,884 francs ($1.14 million).
  • Total number of visitors during 2007: 6,822,000.

    
Eiffel Tower (print) 
Eiffel Tower
 
 
During its lifetime, the Eiffel Tower has witnessed a few strange scenes, including being scaled by a mountaineer in 1954, and two Englishmen parachuting off it in 1984. In 1923, the journalist Pierre Labric (who was later to become mayor of Montmartre) rode a bicycle down from the first level; some accounts say he rode down the stairs, others suggest the exterior of one of the tower's four legs which slope outward.
Politics have also played a role in its life. During World War II, the Germans hung a sign on it that read: "Deutschland Siegt Auf Allen Fronten" ("Germany is victorious on all fronts"). In 1958, a few months before Fidel Castro's rise to power, Cuban revolutionaries hung their red-and-black flag from the first level, and, in 1979, an American from Greenpeace hung one that read: "Save the Seals". In 1989, the Tower celebrated its centennial with music and fireworks (the show lasted 89 minutes).

Operation

The Eiffel Tower is owned by the City of Paris, which has subcontracted its maintenance and daily operations since 2005 to SETE (Société d'Exploitation de la Tour Eiffel), a public utility.
More than 500 people bring the Eiffel Tower to life each day. About one half are employed by SETE, the others are concessionaires (souvenir boutiques, restaurants, telescope operations, ATMs, behind-the-scene tours) and civil service employees (police, fire personnel, post office, weather).

Thursday, September 30, 2010

temprature sensitive fan

                         A Project  Synopsis on
Temperature Sensitive Fan"                                        
                


                   ACKNOWLEDGEMENT

We express our deep sense of gratitude to Mr. Z and Z  Project Incharge & Lecturer, Department of Electrical & Electronics Engg., for his fruitful guidance, supervision, constructive criticism and constant encouragement throughout this project.
                                         Lastly, We would like to acknowledge our Department staff and all of our college Colleagues.
                                                                                                                
Date:                                        
                                                                                                     



                        

 



                                CONTENTS
             
·       Aim
·       Feasibility Study
·       Block Diagram
·       Circuit Diagram & Circuit Operation
·       Design Issues
·       Overview Image of Project
·       Advantages








                                                    
                                                 
                                        AIM
                    Automating the on/off state of a fan is useful in many ways - it prevents the waste of energy when it's not hot enough for a fan to be needed; it also makes it possible to monitor environments that are not comfortable, or possible, for humans to monitor, especially for extended periods of time. By connecting a temperature sensor to a PolyBlock in Compare Mode, it's quite simple to turn on a fan when the value from the temperature sensor exceeds a given threshold.        

                 Connecting the necessary components for a Temperature Controlled Fan is straightforward. The idea is that the temperature sensor produces a voltage that is proportional to the temperature in degrees fahrenheit. The voltage is just the temperature divided by 100, so when it's 0 degrees fahrenheit, it outputs 0V, when it's 70 degrees the sensor outputs 0.70V, and so on. The idea is to use the Poly Block to compare the incoming voltage with a reference voltage of its own. This reference voltage can be set by using the trimpot dial on the Poly Block.   
                            Feasibility  Study

                 For this project, we want to activate a fan, so we connect the +V of the Poly Block to one side of the Fan, and the other side to the S1 output. When the Poly Block activates its Greater outputs (the low power O1 and the higher current S1), the fan is switched on and starts to run.
                 By setting the trimpot correctly, the fan can be made to come on at any temperature, and turn off again when the temperature falls below the reference point.
                 This set up assumes that the sensor will be located very close to the PolyBlock. If it is necessary to have the temperature sensor far away from the PolyBlock, consider using the Line Block to extend the signal range.
                 If the selected fan draws more than 2A at the voltage supplied, you may want to consider using the Switch Block, which takes would take a weak logical signal from the O1 output and use it to switch much higher currents (up to around 10A).
                 To connect an AC household fan with a standard power outlet, you could use the AC Switch Block connected to the O1 output, although this is more dangerous since AC voltages are present.





















Block Diagram












                                      Circuit Diagram






Circuit operation:

R3-R4 and P1-R1 are wired as a Wheatstone bridge in which R3-R4 generates a fixed two-thirds-supply "reference" voltage, P1-R1 generates a temperature-sensitive "variable" voltage, and Q1 is used as a bridge balance detector.
P1 is adjusted so that the "reference" and "variable" voltages are equal at a temperature just below the required trigger value, and under this condition Q1 Base and Emitter are at equal voltages and Q1 is cut off. When the R1 temperature goes above this "balance" value the P1-R1 voltage falls below the "reference" value, so Q1 becomes forward biased, pulse-charging C1.
This occurs because the whole circuit is supplied by a 100Hz half-wave voltage obtained from mains supply by means of D3-D6 diode bridge without a smoothing capacitor and fixed to 18V by R9 and Zener diode D1. Therefore the 18V supply of the circuit is not true DC but has a rather trapezoidal shape. C1 provides a variable phase-delay pulse-train related to temperature and synchronous with the mains supply "zero voltage" point of each half cycle, thus producing minimal switching RFI from the SCR. Q2 and Q3 form a trigger device, generating a short pulse suitable to drive the SCR.
Design Issues
1) Temperature Sensor :-
     The temperature sensor is a powered sensor, and has three wires - one for   the +5V supply, a 0V or ground supply and a signal.
     Sensors include thermistors Hall-effect sensors, and chip-on-board thermal-controller devices, and each fan comes with a linear ramp control featuring two temperature set points.   
2) Poly Block :-
    Poly Block is used to compare the incoming voltage with a reference voltage of its own. This reference voltage can be set by using the trimpot dial on the Poly Block.
3) Power Supply :-
    A power supply is a device that supplies electrical energy to one or more electric loads.
     Every power supply must obtain the energy it supplies to its load, as well as any energy it consumes while performing that task, from an energy source.

     AC/DC supply :-

      In the past, mains electricity was supplied as DC in some regions, AC in others. Transformers cannot be used for DC, but a simple, cheap unregulated power supply could run directly from either AC or DC mains without using a transformer. The power supply consisted of a rectifier and a filter capacitor. When operating from DC the rectifier was essentially a conductor, having no effect; it was included to allow operation from AC or DC without modification.

                               Overview Image of the Project





                                             Advantages

1) More Powerful Cooling :-
AC Switch Block can be used to control a household fan instead of one of its smaller relatives.
2) Oxygen Flow :-
Substitute a carbon dioxide (or other gas) sensor for the temperature sensor to allow the fan to turn on automatically when there's not enough oxygen in a room.
3) Temperature Monitor :-
Substitute a small alarm for the fan to create an alert that lets you know when the temperature has exceeded (or dropped below) a certain threshold.








                                      Applications


Used as CPU Fan to control the Computer Processor Temperature










THANX GUYS








pervasive computing


Summary: What is pervasive computing all about? What kind of scenarios can we
envisage in the future where pervasive technologies will be put to use? Read more..
"Things that think want to link", Nicholas Negraponte of MIT Media Labs is quoted as saying.
This is the doctrine on which pervasive computing is based!
Talking about pervasive computing raises many questions - Will pervasive computing simulate
the super-intelligent HAL in 2001: A Space Odyssey, written by Arthur C. Clarke? HAL seemed
an affectionate and intelligent fellow at the outset, but then morphed into a sinister and powerful
controlling intelligence with a hidden agenda. Will pervasive computing impinge on our privacy
or be a harbinger of 'convenience and convergence'. And will we have to make a choice or can we
marry the two in a rational manner?
What Pervasive?
Let's take a look at what pervasive computing means and what it portends for human kind in the
next few years. To put it simply it is computation that's freely available everywhere. A scenario
where all devices are networked, human-centric, communicate and interact with each other
without any hiccups; their primary objective being to bestow quality life to the user. What's so
beautiful about pervasive computing is that it is an important part of our lives even now, but in
ways that we don't really notice. Earlier, television used to be a source for entertainment while the
computer was used for work-related functions only. But, today, their functions don't adhere to any
rigid boundaries anymore. What this suggests is that pervasive computing is soon going to be
invisible. The way it interfaces with users will also become intuitive. Progress has continued up
to a point where the greatest innovations transcend our personal notions of personal computing.
Pervasive speak
The underlying premise of pervasive computing is compelling: simplicity of use, and the user
spending time completing the task, not learning the application and how to configure and
troubleshoot it. The user experience is the message that the brands of pervasive computing
devices will promote.
The "authorized access to anytime-anywhere-any device-any network-any data", the 6As model
of pervasive computing propounds a new paradigm in convergence and networking. Apart from
making a user's life more easy and convenient, the global nature of these applications, their 7*24
ubiquitous access on a PC or a Palm/PDA or cell phone of email, Internet and other data makes
them an imperative requirement that will increase revenues, improve customer service and
decrease costs in any application.
Nomadic computing
What pervasive devices do is to connect nomadic users. They can access different locations,
URLs that point to specific content through barcodes, electronic tags, optical recognition methods
and infrared and radio frequency transceivers available on PDAs (personal digital assistants) and
laptops through direct or indirect sensing methods.
Any user can monitor his household utility consumption through reports on how the household
generates electricity. Data are analyzed by time, appliance and weather conditions to discover
trends and generate suggestions about efficiency levels, etc. Even the refrigerator knows when it's
running out of lemonade and sends an alert to a system that can tell the grocer to supply
lemonade. When returning home from work, the user can remotely switch on the air-conditioner
while in his car and create the desired ambience/temperature even before he reaches home. A web
tablet that moves from car to home and office and helps a continuum of devices interact and
communicate effectively helps achieve this.
Old age home residents and babies in a day-care center can be tracked through a radio-frequency
infrared badge that the residents wear. When the button is pressed, an alert is conveyed and the
request is relayed to the concerned people at their respective locations. Even the tossing and
turning of a child can be tracked effectively.
Pervasive and embedded software
In it's essence, pervasive computing uses web technology, portable devices, wireless
communications and nomadic or ubiquitous computing systems. The web and the simple standard
HTTP protocol that it is based on, facilitate this kind of ubiquitous access. This can be
implemented on a variety of devices - PDAs, laptops, information appliances such as digital
cameras and printers. Mobile users get transparent access to resources outside their current
environment.
New environments can be accessed without requiring a global wireless connection like a cell
phone and even without networking with the immediate surroundings. In other words, the
infrastructure needed to interact with local users can be minimized to a great extent. Or even
made invisible!
A pervasive system is unobtrusively embedded in the environment. The emerging technologies
that will prevail in a pervasive environment of the future are wearable computers, smart homes
(that can control temperature gauges, control lighting, program a home theatre system and
indulge in other activities of home automation), speech and gesture recognition sensors, optical
switching devices and imbedded sensors.
For example, a mobile user should be able to print a document at a nearby printer without
necessarily having to contact a global service. All they may need is a local web server that helps
them discover these local resources without having to reconfigure their devices as they move
from place to place.
Lets talk about a few emerging technologies.
Emerging Pervasive (ubiquitous) Technologies
1. Peer-to-Peer (P2P) networking
Napster popularized the application of P2P (peer-to-peer networking) products and now the same
technology has begun to sing a business melody. The basic idea behind it being the sharing of
files and programs and communicating directly with people over the Internet, without having to
rely on a centralized server. What it does is to create private workspaces for sharing files,
exchanging information, creating databases and communication instantly. Companies can now
participate in B2B marketplaces, cut out intermediaries and instead collaborate directly with
suppliers. Peers on desktop PCs can share files directly over a network. Renting computing power
can solve resource problems in smaller companies, thus improving the power of web applications.
2. Nano technology
We've seen science fiction flicks where miniature machines get into the human body and track
cell patterns and behavior like those of cancer cells and exterminate them. Molecule sized
computers can be manufactured to create new materials that can replace steel in all its properties
and even withstand temperatures of 6,500 degree Fahrenheit. It is predicted that these materials
will soon be used to build automobiles and office buildings. 'A la' - an invisible infrastructure!
3. Chips and the Net
Net-ready chips are a low cost method of getting on to the Internet. They follow all the necessary
Internet Protocols and can be embedded in home appliances that can then be easily connected to
the Internet. They function as tags that possess comprehensive information about the object that it
is tagged on to and include details like the date and place it was manufactured.
4. Wireless technology
Wireless Internet connection helps access the Net through cellular phones, Personal Digital
Assistants (PDAs) and Wireless laptops and this technology proposes enormous business
opportunities. The sales force can avail real-time access to inventory records; price lists, order
and customer account status and can book a sale almost instantaneously. Constant communication
with wireless gadgets (that cost many degrees lesser than a laptop) can ensure that there is a
constant feedback loop thus ensuring a new way of reaching customers.
5. The tapestry of distributed computing
Distributed computing is the processing power of thousands of PCs aggregated to create a super
computer. A centralized server subsidizes a large computing task in to smaller bits. It then assigns
those bits to thousands of desktop computers, each of which does a small task and returns the
results to the server. Specialists in content delivery, pharmaceuticals, biotechnology and financial
services will see the use of distributed computing capabilities soon. A classic example of how it is
being used today is in the SETI@home project. This project is about searching for extraterrestrial
using radar arrays that look for intelligent patterns of radio waves among the background
radiation. Thousands of volunteers have downloaded the SETI@home screen saver and when
their machines are sitting idle, they get data from the project and do some data crunching and
send it back for analysis.
6. Voice computing: Tell your computer to switch on!
Voice recognition software will soon allow users to switch on their computers by just talking to
them. Even documents can be edited through voice commands. We'll finally be reaching out to
the frontier where man will be able to talk to all his machines and command them to do as he
wishes.
In effect, we are talking about an e-web or the embedded web where the Internet's role as content
provider and shopping assistant morphs into that of companion and advisor. The embedded web
with its swarm of sensors and appliances (an insect colony with worker bees) places machines at
our beck and call and will take us to the ultimate end in convenience or render all our lives to
become a real-life version of The Truman Show.
IBM's pervasive computing lab:
This is a futuristic playground where IBM tests and shows off technology that connects devices in
a seamless computing environment. The entire lab and all its rooms are a prime example of a web
site. The digital images on display in the picture frames on the living room wall can be controlled
remotely. Intelligent countertops in the kitchen recognize bar code labeled stuff and react
accordingly.
E-web:
Embedded devices in cars, refrigerators, shop floors, hospital rooms extend the Internet's role
beyond content providers and shopping assistants to companion and advisors. The Next-Gen web
will be more interactive with a swarm of specialized devices like sensors, and other appliances,
all with Internet access and the ability to communicate.
Pervasive computing illustrates a world that we are moving towards, quite rapidly. The promise
of 'convenience' implies that islands of technologies will soon converge and simplify life even
further. We will finally be witness to the long promised shift to convergence. Computing will no
longer be a monopolizing activity that shackles us to our desktops. Basically easier computing
that's available everywhere as needed, devices that are going to be easy to use, as simple as
calculators and telephones or ATMs. With an extensive range like mobile commerce to home
automation, and from the well-connected car to the convenience of small devices, pervasive
computing exemplifies a vision beyond the PC. Agreed that some of the technologies behind
these devices are in their infancy or evolutionary stages, so it may just be a question of time
before all that is promised is achieved.

Saturday, September 11, 2010

commonwealth games 2010

Delhi 2010 set to become largest Commonwealth Games in history


Date: Fri, 10 Sep 2010




NEW DELHI: Organising Committee Commonwealth Games 2010 Delhi today announced that around 7000 athletes and team officials from 71 nations and territories will make next month’s Games the biggest in the history of the Commonwealth Games. There were approximately 5,800 athletes and team officials in attendance in Melbourne.



“We are delighted to announce that Delhi 2010 is set to become the largest ever Commonwealth Games and are confident that it will be conducted smoothly,” said Organising Committee Commonwealth Games 2010 Delhi Secretary-General Dr. Lalit K. Bhanot. “This number is likely to go up as the Commonwealth Games Federation has a policy for accepting late entries and there are many requests.”



“More importantly, there are many World, Olympic, Commonwealth Games and continental champions among the participants,” he said. “We are sure that the paying spectators and the TV audiences across the world will enjoy watching these athletes perform in the world class facilities created here.



“Of course, we are confident that the athletes in 17 disciplines and four Para Sport events (150 athletes) will like the facilities here and deliver very good performances. They will also enjoy living in the Games Village, built to accommodate 7200 persons, and find that it the best they have experienced in multi-discipline events,” he said.



India will field the biggest contingent of more than 600 athletes and team officials while Bostwana will be the smallest with less than five athletes and officials.



Many nations are sending their largest contingents to a Commonwealth Games outside their home nations.



These include



Australia (550)

England (525)

Canada (400)

New Zealand (325)

Malaysia (325)

Scotland (300)

Wales (240)

With a 220-strong contingent, South Africa will be biggest team from Africa.



India’s neighbours Pakistan and Sri Lanka will send contingents of around 125 each. Australia, Canada, England, New Zealand, Scotland and Wales will keep their record as the only nations to participate in all editions of the Commonwealth Games when they compete in Delhi 2010.



The exact number of athletes will be known only when the Delegation Registration Meetings (DRM) are held between September 16 and October 2, 2010. Until this process is complete, the Organising Committee is not allowed by the Commonwealth Games Federation to reveal the names of the individual athletes

but------behind this aal the thing is happen-----------"CORRUPTION"
 

Congress President Sonia Gandhi on Thursday said those found guilty of corruption in the upcoming Commonwealth Games will be punished once the event is over.



“The Prime Minister is looking into the corruption charges against the Commonwealth Games scheduled in the city from October 3-14 this year,” said Gandhi, at a eeting of the Congress Parliamentary Party (CPP) here today.



“The Commonwealth Games are not related to any political party or individual. It is a national pride and efforts should be made to hold them successfully,” she added.



The Congress has so far avoided backing Commonwealth Games Organising Committee Chairman Suresh Kalmadi, who is also a secretary.



In a report, the Times of India had claimed that it had procured enough evidence to prove that Kalmadi cleared payments due to London-based AM Films without securing a written contract or a proper tender process.



The newspaper report alleges that more emails and faxed documents point to Kalmadi’s involvement.



AM Films and AM Car and Van Hire reportedly received 247,000 pounds. Businessman Ashish Patel and Commonwealth Committee members, however, said that it was done for the 2009 Queen’s Baton ceremony.



“The report quotes an email dated October 24, 2009, on payments and with Kalmadi’s signature on it, saying “why so late…now there is no choice.” Publicly, Kalmadi claimed he didn’t know about the entire dealings with AM Films when the scandal first broke,” The NDTV earlier reported.



Moreover, the Central Vigilance Commission has alleged irregularities in several Commonwealth Games related-works being carried out by civic and construction agencies. (ANI)









Read more: Commonwealth Games Corruption: Guilty won’t be spared says Sonia
Bharat Chronicle http://www.bharatchronicle.com/commonwealth-games-corruption-guilty-wont-be-spared-says-sonia-8541#ixzz0zDN7FgVI

Thursday, August 19, 2010

Crime In India..........

CRIME IN INDIA

A. General
There were 61.8 million criminal cases
reported in 1998 with a rate of 6366 per
million population. 77.8% of cases
investigated were chargesheeted in a court
of law. There were 5.7 million cases
pending in courts of which trail was
completed in 15.8% of cases and of these,
37.4% cases ended in conviction. There are
41.6 police personnel per sq. kilometers and
1360 per million population. 634 police
personnel were killed on duty during 1998.

B. Organized Crime
In India, organized crime is at its worst
in the commercial capital of India, the city
of Mumbai. The first well-known organized
gang to emerge was that of Varadharaj
Mudaliar in the early sixties. His illegal
activities included illicit liquor, gold
smuggling, gambling, extortion and
contract murders. Three other gangs
emerged shortly thereafter namely, Haji
Mastan, Yusuf Patel and Karim Lala. Haji
Mastan and Yusuf Patel resorted to gold
smuggling whereas Karim Lala operated
in drugs. During Emergency in 1975 when
there was crackdown on the Mafia, new
gangs emerged. Dawood Ibrahim, the most
successful, came in conflict with the Pathan
gangs of Alamzeb and Amirzada which led
to bitter internecine gang warfare. The
Pathan gangs were liquidated to leave the
field free for Dawood Ibrahim. In 1985,
there was increased police pressure which
made Dawood Ibrahim to flee. In March
1993, Dawood Ibrahim was behind the
serial bomb blasts in Mumbai in which 257
persons died and 713 were maimed. Public
and private property worth several millions
of rupees was destroyed. Investigation
revealed transnational character of the
conspiracy the objective of which was to
cripple the economy, create communal
divide and spread terror in the commercial
capital of India. Dawood Ibrahim, Tiger
Memon and Mohammed Dosa are
operating from Dubai. Their field of
activity is to extort money from builders
and film producers, mediate in monetary
disputes, and undertake contract (Supari)
killings. There have been instances of
investment of the dirty money in business
with the result that unsuspecting
businessmen have fallen prey to the Mafia
warfare. The killings of Thaquiuddin
Wahid of East West Airlines in 1996, Sunil
Khatau of Khatau Mills in 1994, Om
Prakash Kukreja of Kukreja Builders in
1995 and Ramnath Payyade, a prominent
hotelier in 1995 are grim reminders of
Mafia in Mumbai.

The other gangs of Mumbai indulging
in organized crime are those of Chhota
Rajan (Drug Trafficking and Contract
Killings), Arun Gawli (Contract Killings
and Protection Money), Late Amar Naik
(Protection Money) and Chhota Shakeel.
State of Maharashtra has enacted
Maharashtra Control of Organized Crime
Act, 1999.Other forms of organized crime
in India are kidnappings for ransom, gun-
running, illicit trafficking in women and
children, money laundering etc.


Organized crime exists in other cities
too, though not to the same extent as in
Mumbai. Ahmedabad city has been the
hotbed of liquor mafia because of
Prohibition policy (Banning of liquor). The
Mafia became synonymous with the name
of Latif who started in mid seventies as a
small time bootlegger and grew up to set
up a 200 strong gang after eliminating
rivals with intimidation, extortion,
kidnappings and murders. He won
municipal elections from five different
constituencies with strong political
patronage. He was killed by police in an
encounter in 1997.

There are several gangs operating in
Delhi from neighbouring State of Uttar
Pradesh indulging in kidnapping for
ransom. The going rate was around Rupees
10-50 millions. Land Mafia has political
connections and indulges in land grabbing,
intimidation, forcible vacation etc. Of late,
the ganglords of Mumbai have started
using Delhi as a place for hiding and
transit. Chhota Rajan group is
strengthening its base in Delhi.

Boom in construction activities in
Bangalore city has provided fertile
breeding for the underworld. Builders are
used for laundering black money. Forcible
vacation of old disputed buildings is a
popular side business for the underworld.
The local gangsters in the State of
Karnataka have connections with the
underworld of Mumbai. One of the
Mumbai gang operating here is the Chhota
Rajan gang.

II. ILLICIT DRUG TRAFFICKING

India is geographically situated between
the countries of Golden Triangle and
Golden Crescent and is a transit point for
narcotic drugs produced in these regions
to the West. In India opium is grown under
official control of Narcotics Commissioner

in three states namely Uttar Pradesh,
Rajasthan and Madhya Pradesh. It is
exported to foreign countries for medicinal
purposes. Indian opium is considered best
in world. Turkey & Australia are the other
licit opium growing countries in the world.
A part of the licit opium enters the illicit
market in different forms. Besides, there
is illicit cultivation of opium in the hill
tracks of some states. There is a
moderately sized chemical industry
producing precursor materials for lawful
purposes. The illicit cultivation of opium
as well as the precursor chemicals can be
used for manufacture of heroin. However,
there is a great price differential between
India and the West. A Kilogram of Heroin
that goes for a hundred thousand Rupees
in India may fetch Rupees ten million in
the international market. Illicit drug trade
in India has centered around five major
substances, namely heroin, hashish,
opium, herbal cannabis and methaqualone.
The Indo-Pak border has traditionally been
most vulnerable to drug trafficking. Drugs
trafficking through India consists of
Hashish and Heroin from Pakistan,
Hashish from Nepal, White Heroin from
Myanmar and Heroin from Bangladesh. In
the early eighties, the Border State of
Punjab became affected with
narcoterrorism with the smuggling of
narcotic drugs and arms from across the
border. This was also the time when drug
Mafia emerged in Golden Crescent
countries. There were a number of seizures
of a mixed consignment of narcotic drugs
and arms in Punjab. In 1996, 64 % of the
heroin seized was from the Golden
Crescent. Although opium production is
strictly under Goverment control in India,
illicit poppy plantations have been reported
in some places.

Think about It-
Do Something For Save India