s7 seminar abstracts

Upload: joyal-ks

Post on 14-Apr-2018

218 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/30/2019 S7 Seminar Abstracts

    1/3

    Joyal K. S.1

    SEMINARABSTRACTS

    NegativeDatabaseforDataSecurityData Security is a major issue in any web-based application. There have been

    approaches to handle intruders in any system, however, these approaches are not

    fully trustable; evidently data is not totally protected. Real world databases have

    information that needs to be securely stored. The approach of generating negative

    database could help solve such problem. A Negative Database can be defined as a

    database that contains huge amount of data consisting of counterfeit data along

    with the real data. Intruders may be able to get access to such databases, but, as they

    try to extract information, they will retrieve data sets that would include both the

    actual and the negative data. In this paper we present our approach towardsimplementing the concept of negative database to help prevent data theft from

    malicious users and provide efficient data retrieval for all valid users.

    TheX-internetEven a ubiquitous wireless internet isnt the complete fulfillment of the

    Seamless Mobility revolution. Todays internet connects people to people, providing

    information in text, video, sound and other formats intended for use by people. The

    next step is to internet-enable physical objects connecting people with things and

    even things with things.

    The extended internet, or X-internet, will enable connectivity not just between

    people and their computing devices, but between actual, everyday things like

    windows, highways, bananas, pets, appliances and more. By enabling connectivity for

    virtually any physical object that can potentially offer a message, the X-internet will

    affect every aspect of life and business in ways that used to be the realm of fantasy

    or even beyond fantasy.

    The X-internet will connect all kinds of things in all kinds of spaces. Mobility

    will be the norm. That means, first and foremost, that the X-internet will depend on

    pervasive wireless connectivity. At the same time, different X-internet applications

    will have different requirements for radio frequency, range, data rate and cost so

    cooperative wireless technologies will be required to allow systems based on

    multiple standards to work together seamlessly. Enabling technologies for the X-

    internet must automatically resolve the differences between various radio

    technologies and communications protocols to allow seamless interaction.

  • 7/30/2019 S7 Seminar Abstracts

    2/3

    Joyal K. S.2

    HTML5HTML5 is a markup language used for structuring and presenting content for

    the World Wide Web and a core technology of the Internet. It is the fifth revision of

    the HTML standard (created in 1990 and standardized as HTML 4 as of 1997) and, asof December 2012, is a candidate recommendation of the World Wide Web

    Consortium (W3C). Its core aims have been to improve the language with support for

    the latest multimedia while keeping it easily readable by humans and consistently

    understood by computers and devices (web browsers, parsers, etc.). HTML5 is

    intended to subsume not only HTML 4, but also XHTML 1 and DOM Level 2 HTML.

    The new technology is getting due attention from the developers and

    businesses due to the fact that it supports cross-platform application development,

    offers portability, scalable applications for browsers, and is more cost-effective and

    less labor-intensive than building native apps for Android, iOS and Windows Phone.

    HTML5 introduces elements and attributes that reflect typical usage on

    modern websites. Some of them are semantic replacements for common uses of

    generic block () and inline () elements, for example (website

    navigation block), , or and instead of

    . Some deprecated elements from HTML 4.01 have been dropped, including

    purely presentational elements such as and , whose effects havelong been superseded by the much more powerful CSS3. There is also a renewed

    emphasis on the importance of DOM scripting (e.g., JavaScript) in Web behavior.

    ProjectOxygenProject Oxygen is a collaborative effort involving many research activities

    throughout the Laboratory for Computer Science (LCS) and the Artificial Intelligence

    Laboratory (AIL) at the MIT. The Oxygen vision is to bring an abundance of

    computation and communication within easy reach of humans through natural

    perceptual interfaces of speech and vision so computation blends into peoples lives

    enabling them to easily do tasks they want to do collaborate, access knowledge,

    automate routine tasks and their environment.

    Oxygens user technologies directly address human needs. Speech and vision

    technologies enable us to communicate with Oxygen as if were interacting with

    another person, saving much time and effort. Automation, individualized knowledge

    access, and collaboration technologies help us perform a wide variety of tasks that

    we want to do in the ways we like to do them.

  • 7/30/2019 S7 Seminar Abstracts

    3/3

    Joyal K. S.3

    RedTactonRed Tacton is a new Human Area Networking technology that uses the surface

    of the human body as a safe, high speed network transmission path. Red Tacton uses

    the minute electric field emitted on the surface of the human body. Technically, it iscompletely distinct from wireless and infrared. A transmission path is formed at the

    moment a part of the human body comes in contact with a Red Tacton transceiver.

    Physically separating ends the contact and thus ends communication.

    Using Red Tacton, communication starts when terminals carried by the user or

    embedded in devices are linked in various combinations according to the user's

    natural, physical movements. Communication is possible using any body surfaces,

    such as the hands, fingers, arms, feet, face, legs or torso. Red Tacton works through

    shoes and clothing as well.

    SkinputSkinput Technology uses our skin as a medium for controlling a computer or

    other gadgets. By using sensors placed on the arm, every touch on every part will be

    able to control many things. Sensor that is able to distinguish a touch hard on every

    point so that differences can be used to distinguish the desired control. Skinput a

    method that allows the body to be appropriated for finger input using a novel, non-invasive, wearable bio-acoustic sensor. Skinput can offer larger interactive surface

    area with no increase in device size.

    It resolves the location of finger taps on the arm and hand by analyzing

    mechanical vibrations that propagate through the body. It collect these signals using

    a novel array of sensors worn as an armband.

    AmbientBackscatter(New technology released one week ago)Ambient backscatter uses existing radio frequency signals, such as radio,

    television and digital telephony to transmit data without a battery or power grid

    connection. Each such device uses an antenna to pick up an existing signal and

    convert it into tens to hundreds of microwatts of electricity. It uses that power to

    modify and reflect the signal with encoded data. Antennas on other devices in turn

    detect that signal, and can respond accordingly.

    The researchers have built small, battery-free devices with antennas that can

    detect, harness and reflect a TV signal, which then is picked up by other similardevices.