The document provides a format for submitting project proposals to the Space Technology Cell (STC) for funding. It outlines 10 sections that a proposal should include: 1) project summary, 2) origin of the proposal, 3) problem definition, 4) objectives, 5) international and national status, 6) relevance to Indian/ISRO context, 7) available expertise, 8) work plan/methodology, 9) time schedule, and 10) budget including justification. The budget section should include estimates for manpower, other costs, and permanent equipment needed to complete the project over its duration, normally 3 years. The proposal must also include certificates signed by the investigators and head of the proposing institution.
Gate Diffusion Input Technology (Very Large Scale Integration)Ashwin Shroff
The aim of project is by using GDI technique the power consumption, delay, chip area and connection and parasitic capacitors is decreased. In this project, we are implementing the new T-flip flop using GDI technique for low power and high speed in order to achieve power delay product (PDP)
This presentation gives the information about introduction to control systems
Subject: Control Engineering as per VTU Syllabus of Aeronautical Engineering.
Notes Compiled By: Hareesha N Gowda, Assistant Professor, DSCE, Bengaluru-78.
Disclaimer:
The contents used in this presentation are taken from the text books mentioned in the references. I do not hold any copyrights for the contents. It has been prepared to use in the class lectures, not for commercial purpose.
This project will provides a detailed explanation about a smart traffic light controller using verilog code along with test bench and the working principle and simulation outputs are been attached.
Gate Diffusion Input Technology (Very Large Scale Integration)Ashwin Shroff
The aim of project is by using GDI technique the power consumption, delay, chip area and connection and parasitic capacitors is decreased. In this project, we are implementing the new T-flip flop using GDI technique for low power and high speed in order to achieve power delay product (PDP)
This presentation gives the information about introduction to control systems
Subject: Control Engineering as per VTU Syllabus of Aeronautical Engineering.
Notes Compiled By: Hareesha N Gowda, Assistant Professor, DSCE, Bengaluru-78.
Disclaimer:
The contents used in this presentation are taken from the text books mentioned in the references. I do not hold any copyrights for the contents. It has been prepared to use in the class lectures, not for commercial purpose.
This project will provides a detailed explanation about a smart traffic light controller using verilog code along with test bench and the working principle and simulation outputs are been attached.
In this presentation of mine, a basic Design approach of VLSI has been explained. The ppt explains the market level of VLSI and also the fabrication process and also its various applications. An integration of various switches, gates, etc on Ic's has also been showcased in the same.
This presentation explains about the introduction of Nyquist Stability criterion. It clearly shows advantages and disadvantages of Nyquist Stability criterion and also explains importance of Nyquist Stability criterion and steps required to sketch the Nyquist plot. It explains about the steps required to sketch Nyquist plot clearly. It also explains about sketching Nyquist plot and determines the stability by using Nyquist Stability criterion with an example.
For three decades, many mathematical programming methods have been developed to solve optimization problems. However, until now, there has not been a single totally efficient and robust method to coverall optimization problems that arise in the different engineering fields.Most engineering application design problems involve the choice of design variable values that better describe the behaviour of a system.At the same time, those results should cover the requirements and specifications imposed by the norms for that system. This last condition leads to predicting what the entrance parameter values should be whose design results comply with the norms and also present good performance, which describes the inverse problem.Generally, in design problems the variables are discreet from the mathematical point of view. However, most mathematical optimization applications are focused and developed for continuous variables. Presently, there are many research articles about optimization methods; the typical ones are based on calculus,numerical methods, and random methods.
The calculus-based methods have been intensely studied and are subdivided in two main classes: 1) the direct search methods find a local maximum moving a function over the relative local gradient directions and 2) the indirect methods usually find the local ends solving a set of non-linear equations, resultant of equating the gradient from the object function to zero, i.e., by means of multidimensional generalization of the notion of the function’s extreme points from elementary calculus given smooth function without restrictions to find a possible maximum which is to be restricted to those points whose slope is zero in all directions. The real world has many discontinuities and noisy spaces, which is why it is not surprising that the methods depending upon the restrictive requirements of continuity and existence of a derivative, are unsuitable for all, but a very limited problem domain. A number of schemes have been applied in many forms and sizes. The idea is quite direct inside a finite search space or a discrete infinite search space, where the algorithms can locate the object function values in each space point one at a time. The simplicity of this kind of algorithm is very attractive when the numbers of possibilities are very small. Nevertheless, these outlines are often inefficient, since they do not complete the requirements of robustness in big or highly-dimensional spaces, making it quite a hard task to find the optimal values. Given the shortcomings of the calculus-based techniques and the numerical ones the random methods have increased their popularity.
In this presentation of mine, a basic Design approach of VLSI has been explained. The ppt explains the market level of VLSI and also the fabrication process and also its various applications. An integration of various switches, gates, etc on Ic's has also been showcased in the same.
This presentation explains about the introduction of Nyquist Stability criterion. It clearly shows advantages and disadvantages of Nyquist Stability criterion and also explains importance of Nyquist Stability criterion and steps required to sketch the Nyquist plot. It explains about the steps required to sketch Nyquist plot clearly. It also explains about sketching Nyquist plot and determines the stability by using Nyquist Stability criterion with an example.
For three decades, many mathematical programming methods have been developed to solve optimization problems. However, until now, there has not been a single totally efficient and robust method to coverall optimization problems that arise in the different engineering fields.Most engineering application design problems involve the choice of design variable values that better describe the behaviour of a system.At the same time, those results should cover the requirements and specifications imposed by the norms for that system. This last condition leads to predicting what the entrance parameter values should be whose design results comply with the norms and also present good performance, which describes the inverse problem.Generally, in design problems the variables are discreet from the mathematical point of view. However, most mathematical optimization applications are focused and developed for continuous variables. Presently, there are many research articles about optimization methods; the typical ones are based on calculus,numerical methods, and random methods.
The calculus-based methods have been intensely studied and are subdivided in two main classes: 1) the direct search methods find a local maximum moving a function over the relative local gradient directions and 2) the indirect methods usually find the local ends solving a set of non-linear equations, resultant of equating the gradient from the object function to zero, i.e., by means of multidimensional generalization of the notion of the function’s extreme points from elementary calculus given smooth function without restrictions to find a possible maximum which is to be restricted to those points whose slope is zero in all directions. The real world has many discontinuities and noisy spaces, which is why it is not surprising that the methods depending upon the restrictive requirements of continuity and existence of a derivative, are unsuitable for all, but a very limited problem domain. A number of schemes have been applied in many forms and sizes. The idea is quite direct inside a finite search space or a discrete infinite search space, where the algorithms can locate the object function values in each space point one at a time. The simplicity of this kind of algorithm is very attractive when the numbers of possibilities are very small. Nevertheless, these outlines are often inefficient, since they do not complete the requirements of robustness in big or highly-dimensional spaces, making it quite a hard task to find the optimal values. Given the shortcomings of the calculus-based techniques and the numerical ones the random methods have increased their popularity.
A series of modules on project cycle, planning and the logical framework, aimed at team leaders of international NGOs in developing countries.
New improved version of Writing Project Proposals in February 2014.
RUNNING HEAD PROJECT SCHEDULE1PROJECT SCHEDULE5Instr.docxtoltonkendal
RUNNING HEAD: PROJECT SCHEDULE 1
PROJECT SCHEDULE 5
Instructions below. Paper that was submitted on next page
Using the results of your work from week two project Identify Overall Scope/ Analysis of Unexpected Results; two additional events will be introduced. You will again analyze the impact of these events to the final project.
In a 2-3 page Word document, discuss your analysis on the following events:
1. It is discovered the refrigerated module is too large for the designed refrigerated backpack pouch. What is your course of action?
2. The subcontractor assigned to build the radio module for the backpack has shut down. What is your course of action?
In your analysis, you should discuss four areas affected by these unexpected events. Three of the areas of the project affected by the events should include changes to budget, human capital, and impact to schedule, and identify one additional area affected by these events.
The project is all about the designing a backpack which will contain a refrigerated pouch and a radio module for the military of US to use during their daily tasks. After going through all the process of project implementation their will occur some unexpected results in one of the components in the project life cycle.
In any project implementation the people undertaking it is given a timeframe so that the equipment will be completed on the required time. This might be an issue because; the people implementing the project may run out of time before finishing up the given task on time. This will bring in inconveniences to the US army crew and it will require them to be a little bit patient.
Impacts of the events
Delay may occur due to more time used to determine the designed and technology to be put in so that the backpack would be able to accommodate all the required components. The backpack should have enough space to take in both the radio module and the refrigerator pack. Also delay of the materials used to implement the project is another issue in that the suppliers take longer period to bring the required materials on time. (Institute, 2008)
The pack back may occur to be smaller in that it will not accommodate the two equipment’s so it will be advisable for the team to dismantle the bag and think of making it bigger enough to accommodate the two and also ensure that the temperatures are regulated without any problem. Before going about the implementation it is good for the team to design the backpack taking into account all the aspects which will be encountered during implementation.
On the other hand, the other issue is the closure of the company which was given to design and manufacture the backpack. This will lead to waste of the resources which had been allocated for the task implementation.
It is therefore advisable for the subcontractor to refund part of the money which had been paid, so that another company will take the task from where it was left by the other subcontracto ...
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
Proposal format
1. Format for submitting project proposal
Section 1: project summary
Give project title, PI name, Co-PI from the Institute and Co-PI from ISRO side
(mandatory to speed up the process of project sanction), name of Institution (s) involved
before writing the summery.
Written in telegraphic language, the summery should give an account of (a)
research objectives (b) methodology to be adopted and (c) expected outcome of the
project. This summery may be published in the list of on-going projects and will be
widely circulated amongst scientists/scientific institutions interested in the subject. In
order to facilitate the circulation, a list of potentially interested individuals/institutions
(with addresses) is required to be furnished along with the proposal.
Section 2: Origin of the Proposal
Identify the stimuli, which prompted preparations and submission of the project
proposal to the STC. The source of stimuli could be other reports published by STC,
proceedings of a special workshop/ seminar, announcements by ISRO on Thrust Area
Programmes, earlier project etc. In all such cases, give specific details so that the source
is clearly identifiable. If the project has no such origin, please state so.
Section 3: Definition of the Problem
Please give precise technical statement of only those problems which the project
is expected to cover with the specified duration (normally 3 years). Do not include
statement, instead, a straightforward definition of the problem.
Section 4: Objectives
Instead of an essay, it is suggested that the objectives be spelled out point by point
in telegraphic language keeping in view the definition of the problem outlined in section
3.
Section 5: International Status & National Status
Please indicate the recent development in the proposed field of work, both in the
country and in the other part of the world. This should be in 2 separate parts (namely
Indian and international situations) and based on literature survey, inclusion of list of
important review articles, if available, is recommended. The section will enable the
referees to appreciate the effort that has been put in preparing the project proposal.
1
2. Section 6: Relevance of the proposal in Indian/ISRO context
The importance of the project should be brought out in this section in the light of
the Indian/ISRO context. If the proposal is prepared in consultation with ISRO
Scientists/Engineers please indicate the presenter’s name and address. (It is advised that
the project proposal be discussed with ISRO before submitting for funds)
Please indicate the matters relating to scientific and technical advancement of
knowledge, issues concerning application of the new knowledge to the needs of ISRO for
promoting Space Technology in the country.
Section 7: Review of the available expertise within the investigation group/
institution
The section is essentially to summarize the background of the investigators. Bio-
data of the Principal Investigators who are already in position and available for the
project are to be given here, to establish credential for undertaking the project and to
highlight relevance of the project to the research already going on in the sponsoring
institution.
While providing the list of publications include (a) names of journal/Publisher etc.
Summery details of the projects (completed/on-going or proposed) with different
Investigators may be given.
Section 8: Work plan/ Methodology
It is essential that from this statement the other experts in the field should get a
clear understanding of the research technique to be employed in the project as distinct
from data/sample collection activities and routine activities. Further, the description
should indicate precisely how the stated objectives will be achieved. Discuss different
methods of approach in order of priority.
Section 9: Time schedule
On the basis of work elements identified earlier, the time schedule should be
drawn. Here specific indications of milestone will help in periodic evaluation of the
progress of the project. It is once again cleared here that lead-time for creation of
infrastructural facilities be computed on realistic basis.
Section 10: Budget
Summery of the budget (year wise) may be prepared after filling on Budget for
manpower and Budget for permanent equipment. Give realistic estimate of costs of
2
3. different items involved. While doing so, please ensure that all the constraints have been
taken note of and time of different activities properly estimated.
All costs are to be expressed in rupees only.
Section10.1.
A : Budget for manpower
While major part of the project work is to be carried out by the principal
Investigator and Co-Investigators. Some additional Scientific and technical personnel
may be asked for working full time on the project. Please assess you’re your additional
requirements carefully taking into account the level of personnel required and their likely
availability for working on the project. You may like to select your requirement from
amongst the following categories of personnel.
(i) Post-doctoral or equivalent ( scientist/professor)
(ii) Personnel with two to three years of research experience
(iii) Fresh Post-graduates or equivalent
(iv) Technical staff
(v) Secretariat
Salaries payable are to be expressed in lump-sum indicating the regular scale of
pay. “Full-time” personnel are those who would be recruited fresh or employed from
existing staff of the institute full time for the project (and their salaries /wages debited to
project account). People who are already in position and whose honorarium/ job-rate
payment/over-time allowance/ part of salary is to be debited to project account, may be
classified under part-time personnel. For both categories of personnel, the extent of
involvement, especially for computation of budget estimates, may be expressed in terms
of man-months per year.
Please prepare the list in descending order of salary. Personnel with same
designation but with different salary are to be shown separately.
B: Justification for salaries & wages
Justification for number and level of stuff to be recruited, their year of
deployment and comments on whether personnel from institutions will be deployed on
deputation basis.
3
4. Section 10.2.
A : Budget for other costs
Some projects may have special requirements not covered under section 9.1 costs
for such requirements are to be indicated in this section specifying the item under i & ii.
Contingencies are meant to cover incidental and other miscellaneous expenditure.
B: Justification for other costs
Please specify the special requirements. These requirements could be of
computer time, payments for using specialized instrumentation facilities etc. The basis of
calculating the costs should be clearly stated.
Section 10.3.
A: Budget for permanent equipment
Specifically list all items of permanent equipment costing RS. 1000/- or above, or
requiring import. Other minor items may be clubbed.
Be as specific as possible while naming, the equipment. Indication of the make
and model will help identifying the exact nature of the equipment better. Include
provisions for installation charge, inland transport insurance etc. in the estimated cost.
B: Justification for permanent equipment
Justification for each item of equipment (including their accessories, specific
characteristics, resolution etc. in relation to specific experiments/measurements/tests)
contemplated in the project is to be given.
State what efforts will be made to utilize existing equipment in your department,
other departments of the institution, other institutions in the neighbourhood.
In case of a demand for import of equipment, give reasons why indigenous
models, if available cannot be used.
General Terms and Conditions:
The project investigator may submit;
4
5. CERTIFICATE FROM THE INVESTIGATORS
Certified that the project proposal entitled
----------------------------------------------------------------------------------- will be carried out
in -------------------------------- (name of the department) subject to approval of the
proposal for funding from IRO-IIT(B), Space Technology Cell. The proposal is not
currently under consideration for financial support from any other agency.
Name and Date Signature
1. Principal Investigator
2. Co-investigator
5
6. CERTIFICATE FROM PROPOSING INSTITUTION
Certified that -------------------------- (name of the department) welcomes the
participation of -------------------------------( PI) and ------------------------------ (Co-PI)
in the project entitled
---------------------------------------------------------------------------------to be taken up by the
----------------------------- (Dept.) subject to funding by ISRO-IIT(B), Space Technology
Cell and that the necessary facilities for carrying out the work will be made available to
the investigators of the project.
Head of the Department
Date :
1. Certificate from the Investigator
2. Endorsement from the Head of the Institution
Convener of the ISRO-IIT(B) Space Technology Cell
6