There was an error in this gadget

Technical Seminors Hot topics

Computer Science:


Topic Name:Audio CAPTCHA: Existing solutions assessment and a new implementation for VoIP telephony
Category: Computer Science / Information Technology

SPam over Internet Telephony (SPIT) is a potential source of future annoyance in Voice over IP (VoIP) systems. A typical way to launch a SPIT attack is the use of an automated procedure (i.e., bot), which generates calls and produces unsolicited audio messages. A known way to protect against SPAM is a Reverse Turing Test, called CAPTCHA (Completely Automated Public Turing Test to Tell Computer and Humans Apart). In this paper, we evaluate existing audio CAPTCHA, as this type of format is more suitable for VoIP systems, to help them fight bots. To do so, we first suggest specific attributes-requirements that an audio CAPTCHA should meet in order to be effective. Then, we evaluate this set of popular audio CAPTCHA, and demonstrate that there is no existing implementation suit-able enough for VoIP environments. Next, we develop and implement a new audio CAPTCHA, which is suitable for SIP-based VoIP telephony. Finally, the new CAPTCHA is tested against users and bots and demonstrated to be efficient.

Brain Machine Interface:

Topic NName: Brain Machine Interface
Category: Computer Science / Information Technology

A brain-machine interface is a communication system that does not depend on the brains normal output pathways of peripheral nerves and muscles. It is a new communication link between a functioning human brain and the outside world. These are electronic interfaces with the brain, which has the ability to send and receive signals from the brain. BMI uses brain activity to command, control, actuate and communicate with the world directly through brain integration with peripheral devices and systems. The signals from the brain are taken to the computer via the implants for data entry without any direct brain intervention. BMI transforms mental decisions and/or reactions into control signals by analyzing the bioelectrical brain activity.

While linking the brain directly with machines was once considered science fiction, advances over the past few years have made it increasingly viable. It is an area of intense research with almost limitless possibilities. The human brain is the most complex physical system we know of, and we would have to understand its operation in great detail to build such a device. An immediate goal of brain-machine interface study is to provide a way for people with damaged sensory/motor functions to use their brain to control artificial devices and restore lost capabilities. By combining the latest developments in computer technology and hi-tech engineering, paralyzed persons will be able to control a motorized wheel chair, computer painter, or robotic arm by thought alone. In this era where drastic diseases are getting common it is a boon if we can develop it to its full potential. Recent technical and theoretical advances, have demonstrated the ultimate feasibility of this concept for a wide range of space-based applications. Besides the clinical purposes such an interface would find immediate applications in various technology products also.


Category: Computer Science / Information Technology


IPTV (Internet Protocol Television) is a system where a digital television service is delivered by using Internet Protocol over a network infrastructure, which may include delivery by a broadband connection. A general definition of IPTV is television content that, instead of being delivered through traditional broadcast and cable formats, is received by the viewer through the technologies used for computer networks.

For residential users IPTV is often provided in conjunction with Video on Demand and may be bundled with Internet services such as Web access and VoIP.The commercial building of IPTV, VoIP and Internet access is referred to as ”triple play” service(adding mobility is called “Quadruple play”).IPTV is typically supplied by a service provider using a closed network infrastructure. This closed network approach is in competition with the delivery of TV content over the public internet, called Internet Television. In businesses, IPTV may be used to deliver television content over cooperate LANs.

By contrast “Internet TV “generally refers to transport streams sent over IP networks and proprietary variants as used by websites such as YouTube are now rarely considered to be IPTV services. The IP based platform offers significant advantages, including the ability to integrate television with other IP-based services like high speed Internet access and VoIP.

A switched IP network also allows for the delivery of significantly more content and functionality. In a typical TV or satellite network, using broadcast video technology, all the content constantly flows downstream to each customer, and the customer switches the content at the set top box. The customer can select from as many choices as the telecoms, cable or Satellite Company can stuff into the “pipe” flowing into the home. A switched IP network works differently. Content remains in the network, and only the content the customer selects is sent into the customer’s home. That frees up the bandwidth, and the customer’s choice is less restricted by the size of the “pipe” into the home. This also implies that the customer’s privacy could be compromised to a greater extent than is possible with traditional TV or satellite networks.

Topic Name: Inferno OS
Category: Computer Science / Information Technology

Inferno is an operating system for creating and supporting distributed services .The name of the operating system and of its associated programs, as well as of the company Vita Nuova Holding that produces it, were inspired by the litrary works of Dante Alighieri, particularly the Divine Comedy Inferno runs in hosted mode under several different operating systems or natively on a range of hardware architectures. In each configuration the operating system presents the same standard interfaces to its applications. A communications protocol called Styx is applied uniformly to access both local and remote resources. Applications are written in the type-safe Limbo programming language, whose binary representation is identical over all platforms.

Topic Name: Bubble Sensing
Category:Computer Science / Information Technology


We propose bubble-sensing, a new sensor network abstraction that allows mobile phone users to create a binding between sensing tasks and the physical world at locations of interest, that remains active for a duration set by the user. We envision mobile phones being able to affix sensing task bubbles at places of interest and then receive sensed data as it becomes available in a delay-tolerant fashion, in essence, creating a living documentary of places of interest in the physical world. The system relies on other mobile phones that opportunistically pass through bubble-sensing locations to acquire tasks and do the sensing on behalf of the initiator, and deliver the data to the bubble-sensing server for retrieval by the user who initiated the task.

We describe an implementation of the bubble-sensing system using sensor-enabled mobile phones, specifically, Nokia’s N80 and N95 (with GPS, accelerometers, microphone, camera). Task bubbles are maintained at locations through the interaction of ”bubble carriers”, which carry the sensing task into the area of interest, and ”bubble anchors”, which maintain the task bubble in the area when the bubble carrier is no longer present. In our implementation, bubble carriers and bubble anchors implement a number of simple mobile phone based protocols that refresh the task bubble state as new mobile phones move through the area. Phones communicate using the local Ad-Hoc 802.11g radio to transfer task state and maintain the task in the region of interest. This task bubble state is ephemeral and times out when no bubble carriers or bubble anchors are in the area. Our design is resilient to periods when no mobiles pass through the bubble area and is capable of ‘‘reloading” the task into the bubble region.

Topic Name:APPLE – A Novel Approach for Direct Energy Weapon Control
Category: Electronics

Adaptive photonic based phase locked elements (APPLE) is Raytheon’s DARPA development initiative. The initiative is for development of a directed energy weapon that utilizes a beam combining technique for the achievement of high power. It will integrate the laser enabled weapon applications into unmanned aerial vehicles. The APPLE program is to enable all electronic combining of high-power laser engraver beams within an agile, conformal aperture-a practical approach to synthesizing high-power weapon laser engravers from low-power modules for applications such as laser radar, laser target designation, laser communications, and weapons grade lasers. The idea is to provide electro-optical systems with the same mission flexibility and performance that microwave phased arrays provide for RF applications such as radar and electronic warfare systems.

Topic Name: Lightning Protection Using LFA-M
Category: Electrical

A long flashover arrester (LFA), which comprises of three flashover modules using the creeping discharge effect, is described in this paper. In this design, the total arrester stressing voltage is applied simultaneously to all of the three modules so that the voltage-time characteristics of the arresters are improved. It assured reliable protection of medium voltage (e.g., 10kv) over head power line against both induced over voltages and direct lightning strokes. A single LFA per support or pole is found to be sufficient to protect an over head line against induced over voltages. An LFA should be arranged in parallel with each insulator in order to protect a line against direct lightning strokes.



Post a Comment


Twitter Delicious Facebook Digg Stumbleupon Favorites More

Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | Premium Wordpress Themes