Save 3 million people - Rebuild Mullaperiyar DAM
Save Mullaperiyar Dam from disaster.
Save millions who are gonna drown due dam burst.
Think of the poor animals in the forest reserve area.

History & Current Situation:

Mullaperiyar Dam is constructed over the headwaters of the Periyar River in Kerala, India. The Periyar National Park, Thekkady is located around the Periyar reservoir formed by the backwaters of this dam. It is operated by the Government of Tamil Nadu according to a 999-year lease agreement made during erstwhile British colonial rule. The name is derived from a portmanteau of Mullaiyar and Periyar. As the dam is located after the confluence of the Mullayar and Periyar Rivers, the river and hence the dam came to be called Mullaperiyar.

The Main purpose of building the Dam was to serve as an irrigation source for the some districts in TamilNadu. No One seems to have a question on that. The Dispute started when the leaks started to show in 110 year old dam. The Dam is made of lime and surki which were the best of construction materials available over a century ago. But how long can a Dam built on lime and surki can survive that took on an earthquake prone area. The British Engineer Colonel John Pennycuick who builds the dam predicted only a life span of 50 years for the Dam.

A Studies suggest a raise in the level of water will increase the water pressure and would end up i breakage of Dam walls. Studies conducted by IIT suggest the area where the dam is located is prone to earthquake as strong as 6.5 in ritcher scale. And the result would be a complete destruction of the dam built in lime and surki. The videos of leakage in the Dam had been out in the visual Medias many times and it clearly suggests there is lot of weak points in the Dam. The Kerala water resources said only a new dam could avert the impending disaster. Kerala chief minister Oommen Chandy said the state’s prime concern was safety of the people and that Kerala was ready to bear the expense for building a new dam.

This dam has a height of 54 meters (177 feet) and a basement of 44.2 meters (145 feet). It is built with a mixture of Lime stone and mortar. When it was built, there was no reinforced concrete or similar techniques. The engineer who built this dam calculated that this dam will stand for 50 years. After building the dam there was an agreement between princely state of Travancore and then Madras presidency. It was purely an unfair dealing. The agreement says of leasing out the land area of reservoir for 999 years.

(Content extracted from Web)
 
 
Picture
Bio-CryptographyBio-cryptography or Bioencryption is a next generation security mechanism, storing almost a million gigabytes of data inside bacteria. Research from two prominent universities indicates that it is not only possible but also practical to store digital data in the genome of a living organism and retrieve that data hundreds or even thousands of years later, after the organism has reproduced its genetic material through hundreds of generations.

Note: A milliliter of liquid can contain up to 1 billion bacteria, and you can see that the potential capacity of bacteria-based memory is enormous. The idea of storing data inside bacteria has been around for about a decade. Even very simple bacteria have long strands of DNA with tons of bases available for data encryption, and bacteria are by their nature far more resilient to damage than more traditional electronic storage. Bacteria are nature's hardiest survivors, capable of surviving just about any disaster that would finish off a regular hard drive. Besides, bacteria's natural reproduction would create lots of redundant copies of the data, which would help preserve the integrity of the information and make retrieval easier.

Preparing traditional data for storage inside bacteria is simple enough. There are four DNA bases that can be used to make up the DNA strings: adenine, cytosine, guanine, and thymine. That basically means we're working with a four number system, also known as quaternary numbers.

In a presentation on their breakthrough, the Hong Kong researchers showed how to change the word "iGEM" into DNA-ready code. They used the ASCII table to convert each of the individual letters into a numerical value (i=105, G=71, etc.), which can then be changed from base-10 to base-4 (105=1221, 71=0113, etc.). Finally, those numbers can be changed into their DNA base equivalents, with 0, 1, 2, and 3 replaced with A, T, C, and G. And so iGEM becomes ATCTATTGATTTATGT.


Picture
Once the raw data is ready, the researchers say a few algorithms can be used to weed out redundant and repetitive information. That doesn't just save a ton of space - lots of repetition in the DNA sequence can actually be biologically harmful to the wellbeing of the DNA and bacteria, so this step rather neatly solves two problems at once.

DNA strands aren't long enough to store complicated information like a photograph or a book, so the best available solution is to fragment the data into lots of little pieces and spread it among the different cells. To make that work, the researchers have to create a system that allows the fragments to identified and ultimately put back in the right order. So they created a three-part structure for all the DNA: header, message, and checksum.

The header is an 8-base-long sequence that is divided into four levels of identifying information - zone, region, area and district - which allows each fragment to be put back in the right order. After the message carries the actual usable data, the checksum provides a repetition of the original header, which is useful in controlling for minor mutations to the bacteria.

So, let's say the information has been encrypted and placed in lots of different cells of bacteria. How then does someone retrieve the data on the other end? The decrypter would take the DNA and run it through what's known as next-generation high-throughput sequencing, or NGS. This particular type of sequencing analyzes and compares multiple copies of the same sequence and then uses majority-voting to figure out which bases are correct if parts of the data have decayed. Then the compression algorithms could be reversed to restore the raw data to its original form.

The last step would be snapping the fragments back together in the correct order so that the DNA strands could be translated back into useful data. This is where we go from just data storage to data encryption. The person trying to read the data needs a formula that will reveal the right order of the headers and checksums - without that formula, the data remains meaningless.

Now, there does seem like one potential concern with using E. coli to store data: isn't E. coli dangerous? It appears there's not too much to worry about there - the researchers used non-virulent strains of the bacteria, and the bacteria can't do much more than store the data and reproduce. The DNA sequences that represent the data are total gibberish when it comes to encoding potentially dangerous proteins.   

(Content extracted from Web) 

Picture
 
 
Summer is the warmest of the four temperate seasons, between spring and autumn. The most common problem across the world during this period is water scarcity. Many birds and animals die due to water scarcity. Do your best that you can do.
Please see the picture below and help the birds as a start.
Picture