Applications of Robotics in Medicine Computer Science Engineering Seminar

This research abstract Applications of Robotics in Medicine Computer Science Engineering Seminar talks about the multiple application benefits Robotics has to offer in the field of medicine. A survey conducted on Applications of Robotics in Medicine addresses sets of known achievements, singling out noteworthy autonomous in body devices, either co-robotic surgical aids, in view of recognizing shared benefits or hindrances, to explore how to conceive effective tools, tailored to answer given demands, while remaining within established technologies.

Applications in Medicine: The role of robots is a highly varied one. Robots in the field of medicine are used right from scrubbing the floors to collecting the blood samples of patients. The eminence of Robots has enhanced ever since and now the machine-man actually carries out a surgery. Robotic surgery is the process in which a robot actually carries out a surgical procedure under the control of its computer program. Although a surgeon certainly will be involved in the planning of the procedure to be performed and will also observe the implementation of that

plan, the execution of the plan will not be accomplished by them – but by the robot.

Robots in Tele-Surgery: In a method like this one an expert surgeon actually maneuvers the movements of the Robot from a distance. A robot, local to the patient, becomes the surgeon’s hands, while an intricate interface conveys the robot’s senses to the surgeon (making use of while an intricate interface conveys the robot’s senses to the surgeon (making use of visual, aural, force and tactile feedback).

Conclusion:

Although Medical Robotics is a highly challenging field, still it is in its embryonic state. There are several methods and security measures that ensue to see the field bloom to its full potential. Inclusion of Robots in surgery specifically is a matter that has lot many ideas to be considered. These range from The development, and international adoption, of safety standards the aim of task-specific, as opposed to general-purpose, robots the education of the medical community in the acceptance and integration of Robots.

Download Applications of Robotics in Medicine Computer Science Engineering Seminar.

An Overview of Secure Shell CSIT Paper Presentation

The research paper An Overview of Secure Shell CSIT Paper Presentation deals in creating greater security measures while working over internet. Internet- that has now almost become inevitable to the entire process of communication. A vast overflow of information in a given scenario like this needs an equally efficient security back-up. Secure Shell is a protocol that provides authentication, encryption and data integrity to secure network communications. This research paper elucidates the various security measures.

Scope of Secure Shell Protocol: Implementations of Secure Shell offer the following capabilities: a secure command-shell, secure file transfer, and remote access to a variety of TCP/IP applications via a secure tunnel. Secure Shell client and server applications are widely available for most popular operating systems.

Security Requirements: The research paper talks about the following security requirements.

  1. Confidentiality: the information being transmitted should not be accessible to unauthorized third parties.
  2. Integrity: Unauthorized parties must not be able to incorporate modifications in the data.
  3. Authentication: Both the parties must identify each other and must abide by the norms thoroughly.

Benefits of Secure Shell: The research paper identifies various benefits of Secure Shell Protocol. Secure Shell offers a good solution for the problem of securing data sent over a public network. The research paper talks about using Secure Shell and the Internet for securely transferring documents and work products electronically. It also talks about cost saving over other traditional methods of data/information transmission.

Conclusion:

The research paper talks about the Secure Shell technology and its indispensable value in providing with network security tools that help compliment system and data security. Secure Shell encrypts remote connections and helps administrators decide which means of authentication they require. Additionally, Secure Shell enables to create secure remote backups and tunnel other TCP-based traffic. Secure Shell secures your mission-critical data from eavesdropping.

Download An Overview of Secure Shell CSIT Paper Presentation.

Developing a High Performance Cache System Paper Presentation

The research paper Developing a High Performance Cache System Paper Presentation describes the cache memory as a key mechanism in improving the overall performance of the system. The paper aims at developing a high performance cache system.

 What cache does: Cache exploits the reference stream of the typical application. The research paper describes how cache functions in a given locality. Two types of localities are discussed in the research paper

  1. Temporal locality
  2. Spatial locality

The research paper also talks about ‘prefetching mechanism’ that reduces cache misses. Hardware-based prefetching requires some modification to the cache, but almost no modification to the processor core. Its main advantage is that prefetches are handled dynamically at run time without compiler intervention. In contrast software-based approaches rely on compiler technology to perform static program analysis and to selectively insert prefetch instructions.

A SMI cache is constructed in three parts; a conventional direct mapped cache With a small block size, a fully associative buffer with a large block size at the same cache level, and a hardware prefetching unit. The improvement in performance is achieved by exploiting the basic characteristic of locality.

Benefits of cache: Common design objective for the cache are to improve utilization of the temporal and spatial locality inherent in applications. However no single cache organization exploit both temporal and spatial locality optimally because of their contradictory characteristics.

Conclusion:

The research paper basically aims at designing a simple but high performance cache system with low cost, a new caching mechanism for exploiting two types of locality effectively and adaptively is designed: A direct mapped cache with a small block size for exploiting temporal locality and a fully associative spatial buffer with a large block size for exploiting spatial buffer.

Download Developing a High Performance Cache System Paper Presentation.

Advanced Security Measures in a Wireless LAN Computer Seminar

The research paper Advanced Security Measures in a Wireless LAN Computer Seminar is about the Wireless Local Area Networks or WLANs and how they metamorphosed the arena of Computer Networking. The growing demand of mobile computing devices, such as laptops and personal digital assistants, and a subsequent demand for continual network connections without having to “plug in,” are heralding enterprise WLANs.

Benefits of WLAN: Network Managers are vouching for the benefits of WLAN. This research paper talks about the multiple benefits of WLAN. WLANs are extremely useful in a scenario that requires almost a frequent shift of working space, and other geographical and spatial barriers (that interfere with the smooth functioning of processes). WLANs provide the freedom of working without being tethered by wires. The research paper speaks of various technologies that help in accessing networked data.

These days, there are four types of Wireless networks, ranging from slow and inexpensive to fast and expensive. They are: WECA (Wireless Ethernet Compatibility Alliance) -WI-Fi, Bluetooth, IrDA (Infrared Direct Access) and HomeRF.

LAN Security: WLAN security, that has been traditional so far, includes the use of Service Set Identifiers (SSIDs), open or shared-key authentication, static WEP keys and optional Media Access Control (MAC) authentication. This combination offers a basic level of access control and privacy. But like any other security systems this one is not free from shortcomings. The research paper discusses these things in depth.

How WLAN is attacked: Eavesdropping, tampering, utilizing antennas, war driving, malicious association, blue drive attack and some more explained in the research paper show possible threat to WLAN.

Conclusion:

The research paper offers some brilliant security measures. It suggests to have a single access point controlled via secure operating system like Linux. It is suggested in the research paper to occasionally boot up and trap sections of traffic to look for any attack signatures. The user must connect via a VPN, the access point is secured so it cannot be reset, WEP is enabled, and access point is in a position that limits travel of the radio frequency outside of the premises.

Download Advanced Security Measures in a Wireless LAN CSE Computer Science Engineering B Tech/ BE Final Project Paper Presentation and Seminar PPT..

Cyborgs – An advanced Robotic Technology Btech CSE Seminar Presentation

The research paper Cyborgs – An advanced Robotic Technology Btech CSE Seminar Presentation talks about the Cyborgs- An Advanced Robotic Technology. Pictures like Bicentennial Man and the Last Mimzi have glorified the field of Robotics like never before. There has been an upsurge in choosing the career domain as an inevitable career option. There is a breakthrough in the research in Robotics almost daily. Cyborg is one such advanced technology that has many promises to make to the coming generations.

Literally a Cyborg is a hypothetical human being with programmed for an alien or hostile environment. A Cyborg has artificial limbs or other body parts. Hollywood glorified Cyborgs in blockbusters like Terminator. A Cyborg can also be a human being seeking respite in artificial intelligence to overcome his/her physical/mental constraints.

Besides fiction and Hollywood Cyborg acts as a panacea for people who might have suffered a limb/limbs amputation in wars or accidents. iLimb and C-Leg are some major breakthrough in the domain of Cyborgs. The iLimb acts as a prosthetic to help the victim cope with the loss of hand/leg. Besides aiming at helping the victim assume a natural gait the iLimb also has magnetic and cochlear implants that help the victim with sensory perception.

A British Research Scientist Kevin Warwick made 100 electrodes fire his neurons in order to make his mind communicate with the internet. He carried many other researches successfully.

Cyborgs also play a vital role in safeguarding and managing huge records/databases.

Types of Cyborgs:

There are two types of Cyborgs- Restorative and Enhanced. As the name suggests the restorative Cyborgs help in restoring the activity of lost limbs, organs etc.  The enhanced Cyborgs works towards maximizing the output of the artificial limb/organ. Cyborgs has also penetrated deeper into fields called as ‘Cryonics’—wherein a patient deemed dead is preserved and treated at a later stage. Cyborgs plays a vital role in military too.

Besides given a lease of life to sports personnel by gifting them with high performance limbs which otherwise might have been amputated in some accident.

Conclusion:

Cyborgs has a great future lying ahead. One may in the future have a machine body with the muscular brain, or a muscular body harboring a computer brain!!

Download Cyborgs – An advanced Robotic Technology  Btech CSE Seminar Presentation.