June 9, 2011

>MyCare — The ‘Card’ That Could Save Your Life


The MyCare Card stores personal medical data (e.g. information on existing medical conditions, allergies and medication being taken) and plugs into a laptop’s USB port, enabling the data to be accessed in just a few moments.
It is the first device of its type to have been trialled in the UK.
This working prototype has been developed by City University London and Coventry University, with funding from the Engineering and Physical Sciences Research Council (EPSRC).
If the card’s owner is taken ill or involved in an accident, paramedics can simply retrieve the card from their pocket or handbag and use the data to gain instant access to their full medical history.
As well as using the data to inform their on-the-spot decisions, paramedics can phone key information ahead to a hospital if necessary.
Initial trials have been successful and the development team now hopes to work with organisations in the healthcare sector to undertake a full-scale pilot programme. If that programme is also completed successfully, the system could be available for patient use within around 3-4 years.
“When dealing with a medical emergency, patients may be unconscious or unable to communicate with paramedics for some other reason,” says Professor Panicos Kyriacou of City University, “our device makes potentially life-saving data easily accessible. For example, it’s vital to know whether a patient is allergic to latex. If they are, use of latex gloves by a paramedic might be fatal.” 
The MyCare Card is designed for voluntary use by patients. All data would be held on the card securely so that it could not be accessed if the card were lost.
A patient would keep the card in their possession and add or alter a range of personal information (e.g. on next of kin) on their home PCs. A plug embedded in the card is simply slid out and inserted into a computer; bespoke software then automatically runs from the card. This personal medical data-browsing software was also developed as part of the project.
When treated at a surgery, clinic or hospital, the patient would hand the card over to the medical professionals and the medical information on the card would be updated.
Card updates could also be made at pharmacies when collecting prescription medicines. The patient themselves would be able to view but not alter any of this medical data.
Although patient-held electronic health record cards have been trialled in some parts of the world, the MyCare Card has a number of unique features:
The software underlying the system is written in a portable way using Python programming language, meaning it can be ported easily between different computers and different computer operating systems.
The software is very modular and easy to extend, which means it is simple to add new features and database record types.
The MyCare system has been developed on an open-source basis, enabling a wide range of people to be involved in reviewing and contributing to the development process.
As part of the project, detailed surveys have been undertaken by Coventry University, led by Professor Andree Woodcock, to assess attitudes to the MyCare Card among health professionals and the public, including those with and without computer skills. These surveys have highlighted the need for a full pilot-scale study to enable all the key issues to be examined in detail (e.g. would GPs be happy to use such a system?).
“The MyCare Card has specifically been designed to be easy to use regardless of your level of computer literacy,” says Professor Kyriacou.
The 3-year ‘NHS MyCare’ project received total EPSRC funding of just over £260,000.
Access to information stored on the card is secured using user authentication protection similar to online banking. The card prototypes were developed at Coventry University, where the user surveys were also organised; the system’s underlying software was developed at City University London.
More information is available at: http://www.myc2.org
Courtesy ScienceDaily
June 9, 2011

>Clonezilla – An open Source way of disk partitioning


Clonezilla (http://www.clonezilla.org/) is a partition or disk cloning tool similar to Symantec Ghost. It saves and restores only blocks in use on the hard drive if the file system is supported. For unsupported file systems, dd is used instead. It has been used to clone a 5 GB system to 40 clients in about 10 minutes.
June 7, 2011

>Examining the Brain as a Neural Information Super-Highway


The brain functions as a complex system of regions that must communicate with each other to enable everyday activities such as perception and cognition. This need for networked computation is a challenge common to multiple types of communication systems. Thus, important questions about how information is routed and emitted from individual brain regions may be addressed by drawing parallels with other well-known types of communication systems, such as the Internet.
The authors, from the Rotman Research Institute at Baycrest Centre, Toronto, Canada, showed that — similar to other communication networks — the timing pattern of information emission is highly indicative of information traffic flow through the network. In this study the output of information was sensitive to subtle differences between individual subjects, cognitive states and brain regions.
The researchers recorded electrical activity from the brain and used signal processing techniques to precisely determine exactly when units of information get emitted from different regions. They then showed that the times between successive departures are distributed according to a specific distribution. For instance, when research study participants were asked to open their eyes in order to allow visual input, emission times became significantly more variable in parts of the brain responsible for visual processing, reflecting and indicating increased neural “traffic” through the underlying brain regions.
This method can be broadly applied in neuroscience and may potentially be used to study the effects of neural development and aging, as well as neurodegenerative disease, where traffic flow would be compromised by the loss of certain nodes or disintegration of pathways.
This research was funded by grants from the Canadian Institutes of Health Research (CIHR) and Santa Fe Institute Consortium to TP and a J.S. McDonnel Foundation grant to ARM.
Courtesy ScienceDaily
June 7, 2011

>Virtual Shopping in 3D


Courtesy Businessweek.
Linda Smith walked on stage at the Spring 2011 Demo Conference in Palm Desert, Calif., on Feb. 28 and tried on clothes. Looking at herself in an interactive mirror, she tested out virtual dresses, handbags, and jewelry. The interactive “fitting room,” called Swivel, is a mix of software created by her company, FaceCake Marketing Technologies of Calabasas, Calif., and a hacked 3D camera from Microsoft’s (MSFT) Kinect gaming console.
Kinect started out as a controller-free gaming system, but developers such as FaceCake are writing new applications for the system’s 3D camera. Kinect cameras essentially transform computers into two-way mirrors whose system can see users. One potential use of Kinect is making accurate 3D models of people to help them purchase everything from swimsuits to jeans online.
In 2011, 148.1 million shoppers, or about 83 percent of U.S. Internet users ages 14 and older, will make a purchase online, according to eMarketer. In the first quarter of 2011, retail e-commerce sales totaled $46 billion, according to the Census Bureau of the U.S. Commerce Dept. Yet almost 38 percent of women don’t buy online, according to Forrester Research (FORR), because they want to be able to see and touch items before they hand over a credit card. Retailers have tried to help shoppers overcome reservations with new visualization tools such as augmented reality, which lets customers try on clothes virtually, according to eMarketer. “The more lifelike you can make your e-commerce experience, the better that experience will be,” says Noah Elkin, principal analyst at eMarketer. “If you’re a retailer, it will make your site a more persuasive place to go to make that purchase.”
Augmented Relality Applications
In the retail sector, companies have been experimenting with two-dimensional augmented-reality applications that let customers try on clothes virtually. Last Sept. 10, Macy’s (M) installed a Magic Fitting Room in its Herald Square Store in New York. Within minutes, shoppers were trying on the most popular tops, dresses, and jackets, creating as many as 16 outfits that could be stored in a digital closet and then shared on Facebook and by e-mail. Over the next six weeks, more than 16,000 fitting sessions were completed, according to the maker of the Magic Fitting Room, digital marketing and technology agency LBI International (LBI:NA).
Similarly in April, Swiss watchmaker Tissot ran an interactive display in a Harrods window, inviting passersby to try on watches. Mobile apps also let EBay (EBAY) shoppers try on sunglasses or outfits superimposed on photos of themselves. Still, these efforts lack the depth of 3D images.
May 30, 2011

>Nokia Promises Updates for Symbian till 2016


Nokia’s move of switching over to Windows Phone 7 as it’s main platform caused quite a stir. People began questioning the support for Symbian devices.But there is good news for the users of Symbian devices.Stephen Elop (CEO of Nokia) stated in a video interview today that Nokia would continue supporting and updating Symbian till at least 2016. He said that although Nokia are in the transition period of moving from Symbian to Windows, the support for Symbian will continue.
May 30, 2011

>Chameleon Magnets: Ability to Switch Magnets ‘On’ or ‘Off’ Could Revolutionize Computing


What causes a magnet to be a magnet, and how can we control a magnet’s behavior? These are the questions that University at Buffalo researcher Igor Zutic, a theoretical physicist, has been exploring over many years.

In a recent commentary in Science, Zutic and fellow UB physicist John Cerne, who studies magnetism experimentally, discuss an exciting advancement: A study by Japanese scientists showing that it is possible to turn a material’s magnetism on and off at room temperature.

A material’s magnetism is determined by a property all electrons possess: something called “spin.” Electrons can have an “up” or “down” spin, and a material is magnetic when most of its electrons possess the same spin. Individual spins are akin to tiny bar magnets, which have north and south poles.

In the Japanese study, which also appears in the current issue of Science, a team led by researchers at Tohoku University added cobalt to titanium dioxide, a nonmagnetic semiconductor, to create a new material that, like a chameleon, can transform from a paramagnet (a nonmagnetic material) to a ferromagnet (a magnetic material) at room temperature.

To achieve change, the researchers applied an electric voltage to the material, exposing the material to extra electrons. As Zutic and Cerne explain in their commentary, these additional electrons — called “carriers” — are mobile and convey information between fixed cobalt ions that causes the spins of the cobalt electrons to align in one direction.

In an interview, Zutic calls the ability to switch a magnet “on” or “off” revolutionary. He explains the promise of magnet- or spin-based computing technology — called “spintronics” — by contrasting it with conventional electronics.

Modern, electronic gadgets record and read data as a blueprint of ones and zeros that are represented, in circuits, by the presence or absence of electrons. Processing information requires moving electrons, which consumes energy and produces heat.

Spintronic gadgets, in contrast, store and process data by exploiting electrons’ “up” and “down” spins, which can stand for the ones and zeros devices read. Future energy-saving improvements in data processing could include devices that process information by “flipping” spin instead of shuttling electrons around.

In their Science commentary, Zutic and Cerne write that chameleon magnets could “help us make more versatile transistors and bring us closer to the seamless integration of memory and logic by providing smart hardware that can be dynamically reprogrammed for optimal performance of a specific task.”

“Large applied magnetic fields can enforce the spin alignment in semiconductor transistors,” they write. “With chameleon magnets, such alignment would be tunable and would require no magnetic field and could revolutionize the role ferromagnets play in technology.”

In an interview, Zutic says that applying an electric voltage to a semiconductor injected with cobalt or other magnetic impurities may be just one way of creating a chameleon magnet.

Applying heat or light to such a material could have a similar effect, freeing electrons that can then convey information about spin alignment between ions, he says.

The so-far elusive heat-based chameleon magnets were first proposed by Zutic in 2002. With his colleagues, Andre Petukhov of the South Dakota School of Mines and Technology, and Steven Erwin of the Naval Research Laboratory, he elucidated the behavior of such magnets in a 2007 paper.

The concept of nonmagnetic materials becoming magnetic as they heat up is counterintuitive, Zutic says. Scientists had long assumed that orderly, magnetic materials would lose their neat, spin alignments when heated — just as orderly, crystalline ice melts into disorderly water as temperatures rise.

The carrier electrons, however, are the key. Because heating a material introduces additional carriers that can cause nearby electrons to adopt aligned spins, heating chameleon materials — up to a certain temperature — should actually cause them to become magnetic, Zutic explains. His research on magnetism is funded by the Department of Energy, Office of Naval Research, Air Force Office of Scientific Research and the National Science Foundation.


May 27, 2011

>Computer Scientists Work Toward Improving Robots’ Ability to Plan and Perform Complex Actions, Domestically and Elsewhere


This may have been a domestic dream a half-century ago, when the fields of robotics and artificial intelligence first captured public imagination. However, it quickly became clear that even “simple” human actions are extremely difficult to replicate in robots. Now, MIT computer scientists are tackling the problem with a hierarchical, progressive algorithm that has the potential to greatly reduce the computational cost associated with performing complex actions.
Leslie Kaelbling, the Panasonic Professor of Computer Science and Engineering, and Tomás Lozano-Pérez, the School of Engineering Professor of Teaching Excellence and co-director of MIT’s Center for Robotics, outline their approach in a paper titled “Hierarchical Task and Motion Planning in the Now,” which they presented at the IEEE Conference on Robotics and Automation earlier this month in Shanghai.
Traditionally, programs that get robots to function autonomously have been split into two types: task planning and geometric motion planning. A task planner can decide that it needs to traverse the living room, but be unable to figure out a path around furniture and other obstacles. A geometric planner can figure out how to get to the phone, but not actually decide that a phone call needs to be made.
Of course, any robot that’s going to be useful around the house must have a way to integrate these two types of planning. Kaelbling and Lozano-Pérez believe that the key is to break the computationally burdensome larger goal into smaller steps, then make a detailed plan for only the first few, leaving the exact mechanisms of subsequent steps for later. “We’re introducing a hierarchy and being aggressive about breaking things up into manageable chunks,” Lozano-Pérez says. Though the idea of a hierarchy is not new, the researchers are applying an incremental breakdown to create a timeline for their “in the now” approach, in which robots follow the age-old wisdom of “one step at a time.”
The result is robots that are able to respond to environments that change over time due to external factors as well as their own actions. These robots “do the execution interleaved with the planning,” Kaelbling says.
The trick is figuring out exactly which decisions need to be made in advance, and which can — and should — be put off until later.
Sometimes, procrastination is a good thing
Kaelbling compares this approach to the intuitive strategies humans use for complex activities. She cites flying from Boston to San Francisco as an example: You need an in-depth plan for arriving at Logan Airport on time, and perhaps you have some idea of how you will check in and board the plane. But you don’t bother to plan your path through the terminal once you arrive in San Francisco, because you probably don’t have advance knowledge of what the terminal looks like — and even if you did, the locations of obstacles such as people or baggage are bound to change in the meantime. Therefore, it would be better — necessary, even — to wait for more information.
Why shouldn’t robots use the same strategy? Until now, most robotics researchers have focused on constructing complete plans, with every step from start to finish detailed in advance before execution begins. This is a way to maximize optimality — accomplishing the goal in the fewest number of movements — and to ensure that a plan is actually achievable before initiating it.
But the researchers say that while this approach may work well in theory and in simulations, once it comes time to run the program in a robot, the computational burden and real-world variability make it impractical to consider the details of every step from the get-go. “You have to introduce an approximation to get some tractability. You have to say, ‘Whichever way this works out, I’m going to be able to deal with it,'” Lozano-Pérez says.
Their approach extends not just to task planning, but also to geometric planning: Think of the computational cost associated with building a precise map of every object in a cluttered kitchen. In Kaelbling and Lozano-Pérez’s “in the now” approach, the robot could construct a rough map of the area where it will start — say, the countertop as a place for assembling ingredients. Later on in the plan — if it becomes clear that the robot will need a detailed map of the fridge’s middle shelf, to be able to reach for a jar of pickles, for example — it will refine its model as necessary, using valuable computation power to model only those areas crucial to the task at hand.
Finding the ‘sweet spot’
Kaelbling and Lozano-Pérez’s method differs from the traditional start-to-finish approach in that it has the potential to introduce suboptimalities in behavior. For example, a robot may pick up object ‘A’ to move it to a location ‘L,’ only to arrive at L and realize another object, ‘B,’ is already there. The robot will then have to drop A and move B before re-grasping A and placing it in L. Perhaps, if the robot had been able to “think ahead” far enough to check L for obstacles before picking up A, a few extra movements could have been avoided.
But, ultimately, the robot still gets the job done. And the researchers believe sacrificing some degree of behavior optimality is worth it to be able to break an extremely complex problem into doable steps. “In computer science, the trade-offs are everything,” Kaelbling says. “What we try to find is some kind of ‘sweet spot’ … where we’re trading efficiency of the actions in the world for computational efficiency.”
Citing the field’s traditional emphasis on optimal behavior, Lozano-Pérez adds, “We’re very consciously saying, ‘No, if you insist on optimality then it’s never going to be practical for real machines.'”
Stephen LaValle, a professor of computer science at the University of Illinois at Urbana-Champaign who was not affiliated with the work, says the approach is an attractive one. “Often in robotics, we have a tendency to be very analytical and engineering-oriented — to want to specify every detail in advance and make sure everything is going to work out and be accounted for,” he says. “[The researchers] take a more optimistic approach that we can figure out certain details later on in the pipeline,” and in doing so, reap a “benefit of efficiency of computational load.”
Looking to the future, the researchers plan to build in learning algorithms so robots will be better able to judge which steps are OK to put off, and which ones should be dealt with earlier in the process. To demonstrate this, Kaelbling returns to the travel example: “If you’re going to rent a car in San Francisco, maybe that’s something you do need to plan in advance,” she says, because putting it off might present a problem down the road — for instance, if you arrive to find the agencies have run out of rental cars.
Although “household helper” robots are an obvious — and useful — application for this kind of algorithm, the researchers say their approach could work in a number of situations, including supply depots, military operations and surveillance activities.
“So it’s not strictly about getting a robot to do stuff in your kitchen,” Kaelbling says. “Although that’s the example we like to think about — because everybody would be able to appreciate that.”
Courtesy ScienceDaily
May 17, 2011

>Android has a gaping network security hole


A trio of German security researchers from the University of Ulm have looked into the question of whether “it was possible to launch an impersonation attack against Google services and started our own analysis. The short answer is: Yes, it is possible, and it is quite easy to do so. Further, the attack is not limited to Google Calendar and Contacts, but is theoretically feasible with all Google services using the ClientLogin authentication protocol for access to its data APIs (application programming interface).” In other words: We are so hosed.

The problem is in the way that applications which deal with Google services request authentication tokens . These tokens are sometimes not even encrypted themselves and are good, in some cases, for up to two weeks. All a hacker has to do is grab these off an open Wi-Fi connection and you have the “key” to someone’s Gmail account, their Google calendar, or what have you.

It’s not just limited to Android apps though. The researchers also report that “this vulnerability is not limited to standard Android apps but pertains to any Android apps and also desktop applications that make use of Google services via the ClientLogin protocol over HTTP rather than HTTPS.”

Grabbing this information off the air is trivial. While it’s not as easy as using Firesheep to hi-jack a Web session, anyone with a lick of hacking talent and a network protocol analyzer such as WireShark can grab your tokens. With those in hand they can then change your Google passwords or do anything else they want with your various Google accounts.

Google, the Android smartphone and tablet makers, and the telecoms must fix this. Now.

While Android 3.x and Android 2.3.4 require the Google Calendar and Contacts apps to use the more secure HTTPS for their connections, your devices are very unlikely to currently have either one. The vendors must push out these updates sooner rather than later. In addition, Google needs to require all its ClientLogin requests to be made over secure connections. Developers should switch from ClientLogin to Oauth or some other more secure user authentication routine.

What can you do as an Android user? Well, as you wait for your vendor to update your device to Android 2.3.4, you can make a habit of not using any open Wi-Fi network.

That’s often easier to say than to do. In that case, I recommend that you either user your corporate VPN or look into setting up a Virtual Private Network (VPN) to call your own. This used to be something only a network administrator should try, but lately it’s become much easier to set up a small business, or even home, VPN server.

Fortunately, you shouldn’t need to add any software to your Android device to get it to work with your VPN. Android comes with its own built-in VPN software. This software supports most of the common VPN protocols. You’ll find it on your Android device under Wireless and Network settings/VPN Settings/Add VPN.

There are also VPN Android programs, such as 1 VPN and NeoRouter for Android, but you should try using Android’s built-in VPN setup mechanisms first. If that proves a little too difficult for you, then try one of these programs.

The real answer, of course, needs to come from Google, the hardware vendors, and the telecoms. Google’s Android developers need to improve security in their latest operating systems and patch the older versions of Android to handle the tokens securely. In turn, the vendors and telecoms need to ship the latest versions of Android, with security patches, to users as soon as possible. Until they do, it’s only a matter of time before users start losing important information through this hole to data thieves.

Courtesy Zdnet

May 17, 2011

>Hide Files Within Files for Better Data Security: Using Executable Program Files to Hide Data With Steganography


A new approach to hiding data within executable computer program files could make it almost impossible to detect hidden documents, according to a report in the International Journal of Internet Technology and Secured Transactions.
Steganography is a form of security through obscurity in which information is hidden within an unusual medium. An artist might paint a coded message into a portrait, for instance, or an author embed words in the text. A traditional paper watermark is a well-known example of steganography in action. At first glance, there would appear to be nothing unusual about the work, but a recipient aware of the presence of the hidden message would be able to extract it easily. In the computer age, steganography has become more of a science than an art.

Those intent on hiding information from prying eyes can embed data in the many different file types that are ostensibly music files (mp3), images (jpeg), video (mpeg4) or word-processing documents. Unfortunately, there is a limit to how much hidden data can be embedded in such files without it becoming apparent that something is hidden because the file size increases beyond what one might expect to see for a common music or video file, for instance. A five minute music file in mp3 format and the widespread sampling rate of 128 kilobits per second, for instance, is expected to be about 5 megabytes in size. Much bigger and suspicions would be aroused as to the true nature of the file, examination with widely available mp3-tagging software would reveal something amiss with the file’s contents. The same could be said for almost all other file types.

However, one group of files that vary enormously in size and are usually rather difficult to examine in detail because they comprise of compiled computer code are executable, or exe, files. These files tend to contain lots of what might be described as “junk data” of their own as well as internal programmer notes and identifiers, redundant sections of code and infuriatingly in some senses coding “bloat.” All of this adds up to large and essentially random file sizes for exe files. As such, it might be possible to embed and hide large amounts of data in encoded form in an exe file without disrupting the file’s ability to be executed, or run, as a program but crucially without anyone discovering that the exe file has a dual function.

Computer scientists Rajesh Kumar Tiwari of the GLNA Institute of Technology, in Mathura and G. Sahoo of the Birla Institute of Technology, in Mesra, Ranchi, India, have developed just such an algorithm for embedding hidden data in an executable file. They provide details in the International Journal of Internet Technology and Secured Transactions. The algorithm has been built into a program with graphical user interface that would take a conventional exe file and the data to be hidden as input and merge the two producing a viable exe file with a hidden payload. The technology could be used on smart phones, tablet PCs, portable media players and any other information device on which a user might wish to hide data.

Courtesy ScienceDaily
May 17, 2011

>Applying Neuroscience to Robot Vision


Scientists have attempted to replicate human attributes and abilities such as detailed vision, spatial perception and object grasping in robots.After three years of intense work, the members of EYESHOTS* have made progress in controlling the interaction between vision and movement, and as a result have designed an advanced three-dimensional visual system synchronized with robotic arms which could allow robots to observe and be aware of their surroundings and also remember the contents of those images in order to act accordingly.

For a humanoid robot to successfully interact with its environment and develop tasks without supervision, it is first necessary to refine these basic mechanisms that are still not completely resolved, says Spanish researcher Ángel Pasqual del Pobil, director of the Robotic Intelligence Laboratory of the Universitat Jaume I. His team has validated the members’ findings with a system built at the University of Castellón (Spain) consisting of a robot head with moving eyes integrated into a torso with articulated arms.

To make the computer models the team started from the knowledge of animal and human biology, for which experts specialised in neuroscience, psychology, robotics and engineering worked together. The study began by recording monkeys’ neurons engaged in visual-motor coordination, as humans share our way of perceiving the world with primates.

The first feature of our visual system that the members replicated artificially was our saccadic eye movement which is related to the dynamic change of attention. According to Dr. Pobil: “We constantly change the point of view through very fast eye movements, so fast that we are hardly aware of it. When the eyes are moving, the image is blurred and we can’t see clearly. Therefore, the brain must integrate the fragments as if it were a puzzle to give the impression of a continuous and perfect image of our surroundings.”

From the neural data, the experts developed computer models of the section of the brain that integrates images with movements of both eyes and arms. This integration is very different from that which is normally carried out by engineers and experts in robotics. The EYESHOTS consortium set out to prove that when we make a grasping movement towards an object, our brain does not previously have to calculate the coordinates.

As the Spanish researcher explains: “The truth is that the sequence is much more straightforward: our eyes look at a point and tell our arm where to go. Babies learn this progressively by connecting neurons.” Therefore, these learning mechanisms have also been simulated in EYESHOTS through a neural network that allows robots to learn how to look, how to construct a representation of the environment, how to preserve the appropriate images, and use their memory to reach for objects even if these are out of their sight at that moment.

“Our findings can be applied to any future humanoid robot capable of moving its eyes and focusing on one point. These are priority issues for the other mechanisms to work correctly,” points out the researcher.

EYESHOTS was funded by the European Union through the Seventh Framework Programme and coordinated by the University of Genoa (Italy).

* EYESHOTS (Heterogeneous 3-D Visual Perception Across Fragments)