For page specific messages
For page author info

[LECS/CM-06001] cattering of Two Particles --- Basic Definitions

What horrible things we allow our children to be taught --- A Sample!!

Here is a sample of horrible Physics and Mathematics our children learn from  established centers.
We pay them for our children to learn horrible "Physics and Mathematics".

Snap shot taken from


Refresh the page, if you do not see the body of this page

A reason why Internet is not recommended for beginners


I could not get, withinh the time I spent a nice short description or a video explaining the scalar and vector potentials from scratch.

Here I reproduce two examples I stumbled upon, while searching for suitable page/video for a quick reminder of scalr and vector potentials. These videos on You Tube show hazards of learning from internet. I have reproduced only the relevant parts of the videos.

What is a gauge? A lively discussion by experts on Face-book

Sudhir Raniwala
Yesterday at 10:16 ·

A student asked a question that I do not have an answer to, and need an answer that satisfies me.

It is never too late to learn: Green A short biography

Green function are imprtotant tools part of every physicists arsenal. They appear every where fron electrodynamics to optics and fluid dynamics andto quantum field theory. Here is an extract  briefly describing his times. He entered Cambridge as graduate student at the age of 40.

Machine Learning Vs Deep Learning with examples and use case

What is Machine Learning?

Definition of Machine learning by Tom Mitchell best explains machine learning :

“A computer program is said to learn from experience E with respect to some class of tasks T and performance measure P if its performance at tasks in T, as measured by P, improves with experience E


Short Notes on Computer Science topics

These are single line facts on the various topic of Computer Science. Might be useful for revision.

Security vulnerabilities and their solutions (Struts 2.0)

Hi friends, once again I am here. I am the part of development team of e-aushadhi (A complete supply chain management system). Presently, we deployed this system for two state Meghalaya and Manipur. Before deployment, we faced securities audit for these websites. 

During the security audit, we found vulnerabilities and resolved them. I am listing those vulnerabilities with their solutions below.


Session ID Fingerprinting


Digital Signature