Tuesday, February 17, 2015

Stop Worrying about Smart phones Overheating Now…..





Overheating of smartphones is no longer a big issue… thinks why? A new temperature mapping technology for tiny devices that could help to solve the problem of overheating in smartphones and computers have recently been developed.  Plasmon Energy Expansion Thermometry or PEET, is the name of technique that allows temperatures to be mapped in units as small as a nanometre, a unit of measure equal to one-billionth of a metre. It is based on the same physical principles behind the glass-bulb thermometer that was invented by Daniel Gabriel Fahrenheit back in 1724.

This new thermal imaging technique allows engineers to "see" how the temperature changes from point to point inside the smallest electronic circuits said the researchers. The latest microelectronic circuits consist of billions of nanometer-scale transistors. It is important to note that each transistor generates only a tiny bit of heat as it operates. So when several transistors operate at a same time, the computer chips become very hot. And eventually, cell phones and computer become warm. And in the case of computer, it is necessary to ensure that the fans run properly.






"With the old techniques, measuring the thermal conductivity of a nanowire returns one number. Mapping temperature with PEET, we get 10,000 numbers as we go down the wire," explained lead researcher Chris Regan, associate professor of physics and astronomy at University of California, Los Angeles. "It is the difference between seeing the score and watching the game – one gives you much better knowledge of the players," Regan pointed out.





             PEET removes the disadvantages of current temperature mapping techniques which includes use one of two thermal imaging techniques: capturing the infrared radiation the device emits or dragging a tiny thermometer back and forth across the device’s surface. Also they both have failed to demonstrate the resolution necessary to “see” the active features in modern transistors, which are typically 22 nanometers across or smaller.


         PEET determines temperature in the same way by monitoring changes in density using a transmission electron microscope. The team demonstrated the technique on tiny aluminium wires that were heated on one end. PEET mapping will enable them to heat a transistor and accurately map which parts of it heat up and track how the heat is transported away. This knowledge could help engineers revolutionize the design of the nanoscale electronics inside the next generation of computing devices

You can find more details here.

As usual waiting for your valuable comments……

Please give your suggestion and follow us if you are interested, which encourage us to create new topics for you. And Thankyou for your support.

Thursday, February 12, 2015

Bad USB

Bad USB meaning bad not in a good way, is a critical security flaw detected last year has become a main point of interest for users.Security researchers Karsten Nohl and Jakob Lell first presented the concept, demonstrating a collection of proof-of-concept malicious software that highlights how the security of USB devices has long been fundamentally broken. The malware they created, called BadUSB, can be installed on a USB device to completely take over a PC, invisibly alter files installed from the memory stick, or even redirect the user’s internet traffic. Since BadUSB resides not in the flash memory storage of USB devices, but in the firmware that controls their basic functions, the attack code can remain hidden long after the contents of the device’s memory would appear to the average user to be deleted.
The problem isn’t limited to thumb drives. All manner of USB devices from keyboards and mice to smartphones have firmware that can be reprogrammed, in addition to USB memory sticks, Nohl and Lell say they’ve also tested their attack on an Android handset plugged into a PC. And once a BadUSB-infected device is connected to a computer, Nohl and Lell describe a grab bag of evil tricks it can play. It can, for example, replace software being installed with a corrupted or backdoored version. It can even impersonate a USB keyboard to suddenly start typing commands.
The element of Nohl and Lell’s research that elevates it above the average theoretical threat is the notion that the infection can travel both from computer to USB and vice versa. Any time a USB stick is plugged into a computer, its firmware could be reprogrammed by malware on that PC, with no easy way for the USB device’s owner to detect it. And likewise, any USB device could silently infect a user’s computer. “It goes both ways,” Nohl says. “Nobody can trust anybody”.
We know that every USB device has a microcontroller which acts as an interface between the device (a keyboard, a flash drive) and the host (your PC). This contains software that can be reprogrammed to do nefarious things, such as logging your keystrokes, infecting your PC with malware, or something much worse. This makes BadUSB highly dangerous; very hard to detect, even for virus scanners. This occasional reformatting keeps our thumbdrives from becoming the carrier of the malware epidemic. 
BadUSB potentially gave hackers the ability to hijack or subvert billions of USB devices, from keyboards to printers to thumb drives. At the time, due to the severity of the issue, the researchers who discovered the flaw didn’t publish their BadUSB exploit code. Now, however, two other hackers have worked out how to exploit BadUSB and they’ve published their code on Github for all to see. The pressure is now on device makers to actually fix the flaw before millions of users have their USB devices and peripherals exploited, which is a problem, because there’s really no easy fix for BadUSB.

IMPACT OF BadUSB ATTACK

Once reprogrammed, devices can turn malicious in many ways, including:
1.A device can emulate a keyboard and issue commands on behalf of the logged-in user, for example to exfiltrate files or install malware. Such malware, in turn, can infect the controller chips of other USB devices connected to the computer.
2.The device can also spoof a network card and change the computer’s DNS setting to redirect traffic.
3.A modified thumb drive or external hard disk can, when it detects that the computer is starting up, boot a small virus, which infects the computer’s operating system prior to boot.
4.No effective defences from USB attacks are known. Malware scanners cannot access the firmware running on USB devices. Behavioural detection is difficult since behaviour of an infected device may look as though a user has simply plugged in a new device. Blocking or allowing specific USB device classes and device IDs is possible, however generic lists can easily be bypassed. Pre-boot attacks may be prevented by use of a BIOS password and booting only to the hard drive.
5.Simply reinstalling the operating system, the standard response to otherwise ineradicable malware, does not address BadUSB infections at their root. The USB thumb drive, from which the operating system is reinstalled, may already be infected, as may the hardwired webcam or other USB components inside the computer. A BadUSB device may even have replaced the computer’s BIOS – again by emulating a keyboard and unlocking a hidden file on the USB thumb drive.
6.Once infected, computers and their USB peripherals can never be trusted again.

Implementing that new security model will first require convincing device makers that the threat is real. The alternative, Nohl says, is to treat USB devices like hypodermic needles that can’t be shared among users, a model that sows suspicion and largely defeats the devices’ purpose. Also, USB chipset manufacturers can start hardening their firmware so it can't be easily modified. Security companies can start adding programs to check USB devices for unauthorized firmware alterations.
One way to prevent attacks would be for manufacturers to require signed firmware updates for USB controllers or to disable the ability to change the firmware once a device leaves the factory. Some vendors might already do this, but many don’t. And even if more manufacturers start doing this, the millions of existing insecure USB thumb drives will linger on for years and users will have a hard time telling them apart.
BadUSB is a real threat that has serious consequences for computer hardware input devices. The only true protection that users have against BadUSB is to avoid the usage of USB drives and devices, along with covering USB ports to prevent infected devices from being plugged in.


Please give your suggestion and follow us if you are interested, which encourage us to create new topics for you. And Thankyou for your support.

Wednesday, February 11, 2015

Spot the SPOT ….


Wants another pet…? Here is the Spot….



Google-owned technology firm Boston Dynamics unveils Spot, another masterpiece robot. Spot is incredibly impressive and maybe a little bit terrifying. This puppy-like robot is a four-legged robot weighing only 160 pounds that can navigate rough terrain and office cubicles alike, i.e. it is designed to walk on any terrain… And he’s quiet, so you might not see him coming. It is a  miniaturised version of its Big Dog quadrupedal bot. Spot has a sensor-laden head and can be used indoors and out, and could eventually help with search and rescue, mapping, or accessing disaster zones. Spot is electrically powered and moves using a system of hydraulic pumps and valves, according to the company,




More interesting and disturbing part of all is, the android pup, though skids and stumbles, stays upright despite a few hefty kicks to its side, which you can see for yourself from the video... The compact, lighter, self-balancing, quit bot, with its natural and organic movements in the video looks very much like living things and these features make it quite adorable Spot could be used to enter areas too dangerous for humans to occupy, or bring important supplies to destinations too treacherous for regular robots and too wooded for drones. Surely this newly introduced bot reminds us that robots will one day take over our world….






This robots are capable of self-balancing even you kick the Spot, It is too smart because it even can follow you similar to your dog… and also capable of doing any task you assigned.  Of course even if it’s at its early stage of development, we can expect it in our daily life like for emergency rescue, helping defence personals, helping in carrying foods and supply to remote place in case of natural calamity. Even if can use these robot’s for exploring other planets, which is very effective.








                In future definitely we can see these type of robots similar to our structure.  


                  As usual please give your valuable comments.............


Please give your suggestion and follow us if you are interested, which encourage us to create new topics for you. And Thankyou for your support.

Tuesday, February 10, 2015

Now ELISA Test in Fast Track.

Just 15 minutes for HIV, Syphilis….




We can now turn any smartphone (whether iPhones or Android devices) into an HIV and syphilis tester. Wonder how? Here is the answer… The plastic attachment, about the size of the phone itself, uses disposable cartridges to load blood and the device’s app reads the results, giving a diagnosis in about 15 minutes. The device, called “dongle”, can be attached to any smart phone or tablet through the audio jack. This is the first low-cost dongle that replicates all mechanical, optical, and electronic functions of a laboratory-based enzyme-linked immunosorbent assay (ELISA) without requiring any stored energy; all necessary power is drawn from a smartphone… This low-weight device is capable of simultaneously detecting HIV antibody, treponemal-specific antibody for syphilis and nontreponemal antibody for active syphilis in a single format....


So these are the steps: - plug the dongle in and take a blood sample with the prick of a finger. Insert the sample into a disposable plastic collector (cartridges) and connect the collector to a microfluidic chip which analyses the sample. Next, insert the chip with the blood sample into the dongle, open the app, wait about 15 minutes and you have your results.



Let’s see what’s happening… The blood sample mixes with chemicals called reagents in micro scale channels within the cartridge. Gold nanoparticles bind to antibodies, and silver nanoparticles form a film around the gold particles. This silver film blocks light shined through the finished sample, indicating the test result within 15 minutes. The result is automatically loaded into the phone’s storage.


         As I have already said, it is cheap among typical diagnostic methods; $34 for each dongle and $2 for each cartridge. It is a “mobile application” i.e. health care workers can go door to door to provide tests, instead of requiring people to come to clinics. It helps in reducing the transmission of sexually transmitted diseases from mothers to children.The facilities are outstanding, process is durable, requires little user training, and needs no maintenance or additional manufacturing.Researchers is also studying about other possibilities of device to test other diseases…The technology is so rapidly growing that we can use it to transform our world into better, healthier place just by one finger prick……

For more details please click to the link

As usual expecting your valuable comments..............



Please give your suggestion and follow us if you are interested, which encourage us to create new topics for you. And Thankyou for your support.

Saturday, February 07, 2015

Is Our Gravity Artificial...!!

In paper, gravity means constantly increase / decrease in acceleration.  But it seems to be most difficult to create this in outer space.  You might think that there was almost zero gravity in space station….. No, space station also experience almost same gravitational pull toward earth as we feel here on earth, of course it’s not same. In space station we feel zero gravity because its constantly falling down towards earth, but it will not reach the earth because of its horizontal velocity and earth curvature. So infact here we create artificial zero gravity….Isn’t  ?????????.



So I think it’s not tooooo difficult, it’s just how we think…….

Most popular vision on artificial gravity is a rotating wheel space station which is a hypothetical wheel-shaped space station that rotates about its axis, thus creating an environment of artificial gravity. Its seems to be not practical in every situation, because its limit the speed of space ship.

Now new research showing that its possible to create gravity using Magnetism. And they manage to levitate a live frog inside a 32 mm diameter vertical bore of a Bitter solenoid in a magnetic field of about 16 teslas.




Space adaptation syndrome occurs in humans and animals if they live in a zero gravity area. Over a long time this leads to bone density decreases, which may be permanent. To avoid these ARTIFICIAL GRAVITY is being proposed for many years and science fictions have been portrayed it. Scientists are developing it to create gravity of varying strengths in a zero or low gravity environment. It is generated using different forces, especially centripetal force and linear acceleration. It’s really helpful for astronauts on spaceships for their long term space travel, for ease of mobility etc. it also helps to avoid the adverse of long term health effects such as weightlessness.

Please give your suggestion on gravity.....................



Please give your suggestion and follow us if you are interested, which encourage us to create new topics for you. And Thankyou for your support.