Hi this is Sanjeev. I am passionate about robots and autonomous vehicles --- fascinated by the DARPA 2007 Urban Challenge. My interests include autonomous navigation, path planning, reinforcement learning, machine learning and convex optimization. In future, I would like to build robots that help humans in multitude of tasks.
Hi this is PRATEEK. My interests include Penetration Testing, Wireless Attacks, Intrusion Detection and Forensic Analysis. I am Presently working on modelling an Intrusion Detection system. In the future i would like to become an Information Security Expert.

We graduated from the Indian Institute of Technology Roorkee, with B. Tech in Electrical Engineering in 2011. We started searching-eye during 2nd year of our undergrad to share knowledge. It was fun back then; we have moved on with other projects, and no longer active on searching-eye. We hope you find something useful here.
Recently Viewed
 
    News
     

    Kinect using ROS

    A tutorial detailing the basics of Kinect sensor interfacing with ROS and down-sampling the obtained point cloud, using the Point Cloud Library, converting it to pcl::PoinXYZ format, and then publishing it to the other nodes needing the processed cloud.



    LATEST NEWS-

    Autonomous Navigation

    A presentation on autonomous navigation in unknown environments, and methods for solving such problems is coming soon. The presentation will test the proposed methods with famous, global planners, like RRTs and its random variants.

    New:Infosec Institute's Computer Forensics Online Course Review
    Interested in learning how Computer Forensics specialists work, deal with legal issues, gather evidence,and perform post mortem and live forensics? We recommend the course on Computer Foreniscs by Infosec Institute Read the review here.

    Recommended Article:DNS Hacking (Beginner to Advanced)
    Interested in receiving some ethical hacking training ? We recommend the course on Ethical Hacking by Infosec Institute.

    Recommended Article:W3af walkthrough and tutorial Part-1
    Interested in learning more about Web Application Security ? We recommend the course on Web Application Penetration Testing by Infosec Institute.

    Recommended Article:A New DNS Exploitation Technique: Ghost Domain Names
    Interested in learning more about the most advanced tools and techniques used in securing and breaking into networks these days. We recommend the course on Advance Ethical Hacking by Infosec Institute.

    Recommended Article:Circumventing NAT with UDP hole punching
    Interested in learning more about the latest trends in Information Security ? We recommend the course on Security Awareness for IT Users by Infosec Institute.

    Decentralized Reinforcement Learning: Initiated

    Dual Decomposition in Reinforcement Learning: Autonomously coordinating the RL agents using linking variables.

    Ellipsoidal Constrained Agent Navigation (ECAN) - published

    A Path planning algorithm, for online planning in completely unknown and unseen environments. It is based on Convex-Quadratic Constrained Quadratic Program (QCQP), Semi-Definite Programming (SDP) and Second-Order Cone Programming (SOCP). ECAN doesn't make any assumptions on shape of the agent (it can be convex or non-convex) and uses SOCP to handle non-convex shaped agent.

    DFRL-E: Delta Formation of RL-Agents - Autonomous Navigation in ECAN

    Defining the waypoints autonomously, for autonomous navigation in ECAN project.

    ARL-10/11 - Refining

    Making ARL-10/11 more pragmatic.

    CCO-10/11

    Searching-Eye launched CCO-10/11: Convex & Combinatorial Optimization.

    CFMAS:SP-11

    Coalition Formation in Multi-Agent Systems: Strategic Planning.

    Carnegie Mellon University: Transformer project for Military

    PITTSBURGH—The Defense Advanced Research Projects Agency (DARPA) has awarded a 17-month, $988,000 contract to Carnegie Mellon’s Robotics Institute to develop an autonomous flight system for the Transformer (TX) Program, which is exploring the feasibility of a military ground vehicle that could transform into a vertical-take-off-and-landing (VTOL) air vehicle.

    Support Vector Machine

    Next on searching-eye.com and MLR. Complete Convex analysis of the SVM.

    Cornell University: AFOSR Project

    The goal of the proposed work is to rapidly evaluate, and demonstrate in flight, algorithms for cooperative tracking of moving targets using multiple UAVs. This STTR program, joint with the Insitu Group, develops planning, control, and cooperative tracking estimation algorithms for their ScanEagle and SeaScan UAV's.

    MIT: Robust Robotics Research Group

    Micro-Air Vehicle Navigation and Control:
    In environments where GPS is noisy and maps are unavailable, such as indoors or in dense urban environments, a UAV (unmanned air vehicle) runs the risk of becoming lost, operating in high threat regions, or colliding with obstacles. The size, weight and budget limitations of micro air vehicles (MAVs) typically preclude high-precision inertial navigation units that can mitigate the loss of GPS. We are developing estimation and planning algorithms that allow MAVs to use environmental sensors such as range finders to estimate their position, build maps of the environment and fly safely and robustly.

    MAC-X:

    Machine Learning, Advanced Reinforcement Learning and Convex & Combinatorial Optimization.

    Simple perceptron, Voted perceptron and KERNEL Perceptron:

    MATLAB code & Tutorial: From here. After clicking, scroll to the bottom of the page. A presentation accompanies the MATLAB Code for Simple Perceptron, Voted Perceptron and Kernel Perceptron.
    Enjoy :-)

    CFMAS: SP-11 - Coalition Formation in Multi-Agent Systems: Strategic Planning-2011 Proposed Starting date: 20th of Jan 2011.

    ARL-10/11: Advanced Reinforcement Learning-2010/11

    Searching-Eye launches the ARL-10/11, only course in the world which will blend the ideas of Reinforcement Learning, Convex Optimization, Path Planning, Subgradient Methods, Cutting Plane Methods and Distributed Convex Optimization, and will apply the same in Robotics, Navigation and Coalition Formation Problems.

    Bilateral Filtering Approach: Road Extraction via Cluster Reduction.

    Results of the project can be seen. Matlab Code available for download.

    Human Lip Detection Including Face Segmentation Under Normal & Ill-Illuminated Conditions.

    The technical report along with the MATLAB code can be downloaded from the Sanjeev Sharma's Home Page.

    Google, Adobe attacked through China

    Google announced on Tuesday that the Internet giant is considering exiting the Chinese market after sophisticated online attacks targeted its systems to breach the Gmail accounts of pro-democracy activists.
    In a post to its blog, the company stated that an investigation into an attack against the Gmail accounts of pro-democracy activists turned up evidence of a much broader assault against Google's systems. The attack -- first noticed in mid-December and considered "highly sophisticated and targeted" -- resulted in the "theft of intellectual property," the company stated. It's unclear from the statement whether the two Gmail accounts accessed by attackers constituted intellectual property.

    Autonomous Robot Detects Shrapnel

    Bioengineers at Duke University have developed a laboratory robot that can successfully locate tiny pieces of metal within flesh and guide a needle to its exact location -- all without the need for human assistance.

    SC World Congress: Feds talk cybersecurity

    Top officials from U.S. law enforcement and government agencies speaking at SC World Congress in New York this week said progress has been made in fighting cybercrime recently, but increased collaboration with individuals from the private sector and international law enforcement bodies is needed to keep up the momentum. Shawn Henry, assistant director of the FBI Cyber Division, said that efforts to cooperate with foreign law enforcement agencies have paid off in the fight against cybercriminals. Six years ago, for example, the FBI could not respond to an attack that was traced back to an individual outside of the U.S, Henry said. Today, FBI agents are working hand-in-hand with international law enforcement agents in Estonia, Romania and other countries to build cases against cybercriminals and make arrests.

    World's top universities heading for Autonomous Car, after success in DARPA Urban Challenge


    Team MIT's TALOS autonomous vehicle, readied for the DARPA Urban Challenge, is outfitted with a multitude of sensors. The sensors scan and sweep across an intersection to show approaching and standing traffic as well as curbs and lane markings, which TALOS's algorithm must assess before continuing.

    University of California Berkeley: Formation Flight

    By forming a coordinated formation, it is possible to achieve flight integrity with less fuel consumption, increasing the possibility of a mission's success. Even with such unique flight capabilities, the helicopter teams will be confronted by very challenging situations. The potential for accidents is increased by requirements to fly in close formations and under harsh conditions including poor weather, extremely low altitudes, low visibility, extreme temperatures, noise, vibrations, blasts, flashes, radiation and battlefield air pollution. The effects of battlefield stress exerted on aircrew increases dramatically under these adverse circumstances. Therefore, computer-assisted autonomous formation flight can help to diminish battlefield stress. Reduction of pilots' stress directly means the extension of radius of action and minimizing uncertainties during movements.

    Tuning up autonomous vehicles

    Browser Vulnerabilities Expose Users To Man-in-the-middle Attacks On HTTPS


    Security researchers at Microsoft have found a way to break the end-to-end security guarantees of HTTPS without breaking any cryptographic scheme. Affected browsers include Microsoft’s Internet Explorer 8, Mozilla Firefox, Google Chrome, Apple Safari and Opera.During a research project concluded earlier this year, the Microsoft Research team discovered a set of vulnerabilities exploitable by a malicious proxy targeting browsers’ rendering modules above the HTTP/HTTPS layer.

    White House, Pentagon announce plans for new cybersecurity positions


    It's just been a few short months since a proposed bill called for the creation of a National Cybersecurity Advisor, but it looks like there's now not one but two new positions in the offing, with both the Pentagon and President Obama himself announcing plans for some newly elevated offices charged with keeping the nation's networks secure. While a specific "Cybersecurity Czar" hasn't yet been named, the White House position will apparently be a member of both the National Security Council and National Economic Council and, in addition to coordinating U.S. response in the event of a major attack, the office will also be tasked with protecting privacy and civil liberties. Details on the new Pentagon office, on the other hand, are expectedly even less specific although, according to The New York Times, it'll be a military command that will work to coordinate efforts now scattered across the four armed services, and will apparently serve as complement to the civilian office in the White House.


    Gumblar Google-poisoning Attack Picks Up Speed, 246% Growth Over Last Week


    Miscreants have developed one of most sophisticated click fraud malware applications to date. The Trojan code - dubbed FFsearcher by security firm SecureWorks - plugs into a Google API that allows webmasters to add a Google-powered search widget (called “Google Custom Search”) to their website. In normal use, search results made via the widget are displayed alongside Google AdSense ads, with webmasters receiving a small fee every time a surfer follows an ad.
    The Central Intelligence Agency, PayPal, and hundreds of other organizations are under an unexplained assault that's bombarding their websites with millions of compute-intensive requests.
    The "massive" flood of requests is made over the websites' SSL, or secure-sockets layer, port, causing them to consume more resources than normal connections, according to researchers at Shadowserver Foundation, a volunteer security collective. The torrent started about a week ago and appears to be caused by recent changes made to a botnet known as Pushdo.