Pre Final Year Internships
The office has been networking with various universities and research labs, and continues to build a strong platform supported by very good screening of the applicants, submitting select candidates to the Professors, enabling efficient communication and coordinating all the intermediate steps till the students arrive and all follow up with the students and faculty. It plays a liaison between all the parties and spends an inordinate amount of time trouble shooting and coordinating to ensure good outcomes for all sides. It has dramatically cut down the past spamming from students which was one of the desired outcomes from overseas professors and gives them access to a very streamlined and efficient process wherein they can find strong applicants and get meaningful research done during the summers.
Some of these students have been applying for higher studies and getting fellowships for masters and PhD level programs at the same universities or other universities based on the quality of the research work strengthening their applications.
The NY office also works with the universities on ensuring that there are good stipends and other remuneration provided to the visiting interns including often air fare, misc expenses, health insurance etc.
Here’s the description of few of the projects that were done as a part of this Internship in Summer 2016:
Morphological Phase Diagram
Professor Adrienne Stiff-Roberts, Department of Electrical and Computer Engineering, Duke University
Professor Yaroslava Yingling, Department of Material Science and Engineering, North Carolina State University
Submitted by: Vishal Jindal
Resonant-infrared matrix-assisted pulsed laser evaporation (RIR-MAPLE) is a promising deposition technology for the fabrication of conjugated polymer-based optoelectronic devices for two primary reasons: (i) the ability to control film morphology, and (ii) the ability to deposit multi-layered hetero structures.
Read MoreNeuromorphic Computation and Spintronics
Professor Shaloo Rakheja, Department of Electrical and Computer Engineering, New York University
Submitted by: Vaibhav Sarvesh Pandey
Designing Neuromorphic circuits using memristors: Nanoscale Memristor Device as Synapse in Neuromorphic Systems Neuromorphic Computation describes the use of very-large-scale integration (VLSI) systems containing electronic analog circuits to mimic neuro-biological architectures present in the nervous system. When the weighted sum of inputs to a neuron is more than a particular threshold it outputs a voltage pulse called an action potential.
Read MoreMachine Society Interfaces (Live multi-person tracking)
Professor Martin Brooke, Department of Electrical and Computer Engineering, Duke University
Submitted by: Saptarshi Gan
Tracking multiple persons in video is an important problem and highly useful in many domains. For Governments and Performers there is a desire to trace the path an individual has taken through groups and society. Government motivations cover a spectrum from the beneficial, through benign, and belligerent.
Read MoreDesign of a Class-A RF Power Amplifier
Professor Shaloo Rakheja, Department of Electrical and Computer Engineering, New York University-Tandon School of Engineering
Submitted by: Pranav Kumar
A 10 GHz Class-A Power Amplifier Design with Physics-Based RF Compact Model
Read MoreEvent Coreference Resolution using Convolutional Neural Networks
Professor Vincent Ng, Human Language Technology Research Institute, University of Texas at Dallas
Submitted by: Nirbhay Modhe and Parag Bansal
Performance Formulation for Cooperative Threshold Strategy in Computational Sprinting: Modern data centres have a large number of servers organised into racks. The servers within the same rack share a power supply. The demand for power varies across time depending on the phase of the applications the servers are running.
Read MoreCache Side-Channeling attacks
Professor Brendan Dolan-Gavitt, Computer Science and Engineering, NYU Tandon School of Eng.
Submitted by: Ayush Agarwal
A simple generalised defense mechanism to counter all such cache-side channel attacks
Read MoreSAT Based attack on SARLock
Professor Siddharth Garg, Assistant Professor, Electrical and Computer Engineering, NYU - Tandon School of Engineering
Submitted By: Anubhav Kumar
Project on Hardware security, SAT solvers and formal methods. Main area of research was logic locking. Logic locking is a hardware security technique to prevent reverse engineering of digital ICs and IC piracy. The idea is to modify the IC design flow, so a chipmaker that gets hold of a mask work, legally or otherwise, would need to communicate with the owner of the mask work,before the chipmaker can inject correctly functioning chips into a market for consumption by users.
Read MoreCooperative Threshold Strategy in Computational Sprinting
Professor Benjamin C. Lee, Department of Electrical and Computer Engineering, Duke University
Submitted by: Abhimanyu Yadav
Performance Formulation for Cooperative Threshold Strategy in Computational Sprinting: Modern data centres have a large number of servers organised into racks. The servers within the same rack share a power supply. The demand for power varies across time depending on the phase of the applications the servers are running.
Read MoreContext Based Manipulation
Dr. Ross Knepper, Department of Computer Science, Cornell University
Submitted by: Aashi Manglik
In human-robot interaction, instructions are generally communicated to robot in natural language which may have multiple parses or interpretations possible. Humans, through their cognitive skills, are able to disambiguate the request based on context. This work uses contextual semantic parsing to ground natural language entities to objects present in the environment.
Read MoreDeep Population Genetics
Professor Rumi Chunara, Department of Computer Science and Engineering, New York University
Submitted By: Aadil Hayat
The dramatic progress in sequencing technologies offers unprecedented prospects for deciphering the organization of natural populations in space and time. However, the size of the datasets generated also poses some daunting challenges. In particular, Bayesian clustering algorithms based on pre-defined population genetics models such as the STRUCTURE, BAPS or ADEGENT software may not be able to cope with this unprecedented amount of data with good accuracy and within practical time.
Read More