Tuesday 23 December 2014

Note !!!!!!!!!!!!Main Project Guidelines

Here is the Guideline for conducting the 6th Semester main project
Internal guide list will be displayed shortly

Guidelines : Download

Wednesday 17 December 2014

Making Computers That Don't Forget

The 2015 IEEE IEDM Conference (celebrating its 60th anniversary in 2014) as well as a Canon USA MRAM Forum this week gave interesting insights into the latest developments and expectations for solid state memory and storage technologies. Tom Coughlin is president of Coughlin Associates.
MRAM technology appears to be poised for adoption in discrete and embedded electronic products for many applications. According to a report this year by Coughlin Associates, the total available market for MRAM devices is projected to reach over $2 B by 2019.   MRAM technology would provide a non-volatile memory replacement for fast but volatile static and dynamic RAM (SRAM and DRAM). These products are geared for important discrete as well as embedded memory applications. There are several companies working on these MRAM products including Avalanche, Crocus, EverSpin, Samsung and Toshiba.

Monday 17 November 2014

Note !!!!

IA Marks will be finalized by Wednesday, so Check Your Internal Marks by 19/11/2014 ,

Thursday 13 November 2014

Mini Project Index !!!!

Mini Project Index : Download Link

.NET !!!

November 12, 2014 7:30 AM
Emil Protalinski

Microsoft today announced plans to open source .NET, the company’s software framework that primarily runs on Windows, and release it on GitHub. Microsoft also unveiled plans to take .NET cross-platform by targeting both Mac OS X and Linux.

In the next release, Microsoft plans to open source the entire .NET server stack, from ASP.NET 5 down to the Common Language Runtime and Base Class Libraries. The company will let developers build .NET cloud applications on multiple platforms; it is promising future support of the .NET Core server runtime and framework for Mac and Linux.


Note !!!!!!!!!! 10MCA58 - Mini Project

Covering Page Template : Download : Link

Certificate Page  Template : Download : Link

Wednesday 12 November 2014

New Research!!

New Research Shows Vulnerability in Mobile Phones' Applications Offering Voice Communication Security UAB News (11/05/14) Katherine Shonesy

Researchers at the University of Alabama at Birmingham (UAB) are studying the security vulnerabilities of video- and voice-over-Internet Protocol communications. The researchers developed attacks that uncovered vulnerabilities in a currently used security scheme, and once those weaknesses were identified, the team suggested alternatives that may protect against potential attacks, focusing on a peer-to-peer mechanism known as Crypto Phones. Crypto Phones is a security measure claiming to completely address the problem of wiretapping, in which users orally exchange information resulting from a cryptographic protocol employing Short Authenticated Strings to confirm each other's identity. The researchers found this security tool is vulnerable to automated voice mimicry attacks. One potential defense to these attacks could be the integration of an automated voice recognition or voice biometrics system into Crypto Phones, according to the researchers. "The results bring to light the threats of conceived voice privacy, and should serve as notice to users to pay careful attention to the potential security weaknesses in the future," says UAB Ph.D. student and project leader Maliheh Shirvanian. The researchers presented their findings this week at the 21st ACM Conference on Computer and Communications Security in Scottsdale, AZ.

Monday 10 November 2014

Computers Could Talk Themselves Into Giving Up Secrets

Technology Review (10/30/14) David Talbot

Researchers from the Georgia Institute of Technology say they have found numerous security flaws that could allow malicious hackers to seize control of PCs and smartphones through the use of voice-control features, including those designed to make the devices easier for disabled individuals to use. In research that will be presented at the 21st ACM Conference on Computer and Communications Security this week in Scottsdale, AZ, the researchers describe 12 methods of subverting devices running the Android, iOS, Windows, or Ubuntu Linux operating systems (OSes), in some cases using methods that would not require any physical contact with the device. One attack uses malware that leverages Windows Speech Recognition to talk its way into running commands that would normally require a higher level of privilege, while another involves subverting the voiceprint feature of Android's Google Now digital assistant to access a device and then using generic text-to-speech apps to issue commands as if it were the user. Lead researcher Wenke Lee says most of the vulnerabilities are the result of voice command features being added late in the development cycle, making them less likely to be vetted for security vulnerabilities. "These features were added after the OS had been implemented, so these features don't have the same kinds of security checks," Lee says.

Computer Game Could Help Visually-Impaired Children Live Independently


University of Lincoln (10/31/14) Cerri Evans
University of Lincoln researchers are developing Eyelander, a computer game they say could help visually-impaired children lead independent lives. The game focuses on improving the functional vision of children who have sight issues due to a brain injury rather than damage to the eye itself. "We are tapping into the brain's innate ability to adapt (also known as neuroplasticity), and because substantial changes in vision are possible even into adulthood, this could yield real results," says Lincoln computational neuroscientist Jonathan Waddington. He says the game combines scientific knowledge of neuroscience and psychology with expertise in game development. "Clinical trials will get under way this summer to evaluate whether the software could become a valuable new tool for the treatment of children and young adults with visual impairments," Waddington says. The game also features advanced options to adapt the difficulty to the specific cognitive and visual impairment of the person playing. "Research has already shown that this type of training can lead to significant recovery of sight following damage to visual centers of the brain in adults, so it is vital that those using it are motivated by something interesting and engaging," says Lincoln professor Timothy Hodgson.

Tuesday 4 November 2014

The Robot in the Cloud: A Conversation With Ken Goldberg



The New York Times (10/25/14) Quentin Hardy
University of California, Berkeley professor Ken Goldberg has spent three decades in the field of robotics and has published more than 170 peer-reviewed articles about robots. Goldberg, who currently is focused on cloud robotics and its potential applications in medical fields, is establishing a research center that will focus on developing surgical robots. He says cloud robotics is an application of the basic principles of cloud computing and storage to robotics: moving the heavy-duty processing tasks into the cloud, which he notes offers two major benefits. First, robots no longer need to carry large amounts of computer hardware, and second, they get access to more computing resources than they could ever carry. Goldberg says moving robotics to the cloud enables machine-learning and big data techniques to be applied to a group of robots rather than to individual machines. "One robot can spend 10,000 hours learning something, or 10,000 robots can spend one hour learning the same thing," he notes. Cloud robotics already is being employed by Google's self-driving cars, which send the information they gather to the Google cloud, enabling it to improve the performance of all of its cars. Goldberg says health care also holds numerous possibilities for cloud-based robotics, from administering radiation therapies to suturing wounds and giving patients intravenous fluids.

W3C, Now Age 20, Gives Official Recommendations for HTML5



eWeek (10/28/14) Chris Preimesberger
The World Wide Web Consortium (W3C) marked the 20th anniversary of HTML at its week-long annual conference at the Computer History Museum this month, recognizing the history and influence of the Internet markup language and publishing its official recommendations for HTML5, its fifth major revision. HTML5 spent seven years in development and already is widely used. It offers many new features that make it very attractive to developers in the era of Internet-connected devices of all sizes. Its built-in capabilities make it a powerhouse for audio/visual media, including computer games, as well as science and mathematics. "Today we think nothing of watching video and audio natively in the browser, and nothing of running a browser on a phone," said W3C director Sir Tim Berners-Lee. "Though they remain invisible to most users, HTML5 and the Open Web Platform are driving these growing user experiences." Although HTML5 already is supported on most devices and used by a large percentage of developers, W3C HTML Working Group co-chair Paul Cotton of Microsoft says the format will continue to grow. In particular, he expects to see developers fork the code into their own version, "and start to innovate on that kind of platform going forward."