We plan to start consultancies and work on characterization and then slowly move in Nano manufacturing.
Our focus is on software development in the first phase. We plan to establish our consultancies part and focus on characterization of nanomaterials and install our basic facilities and finally move on to nano manufacturing. We plan to set up our offices in Hyderabad and Chennai and keep our research work world-class. The consultancy services is chose as a long term benefit for us and market The biggest problem faced by manufacturers, investors, supplier and customers is that they are not getting appropriate dealer and information regarding their interest and subject. As consultancy sector is equally important, because of huge capital and future market of this ever growing technology, the first and important thing is to establish a consultancy services. In a developing country like India where everyday new opportunities and likely to be are created in this field, there is a need of consultancy which can consult the customers, manufacturers, suppliers regarding their interests, investments, future aspects, market survey, product investment strategy, manufacturing and investing cash flow calculations etc. unfortunately the problem in India is the number of users of suppliers and user of nano materials are very large in number but the appropriate consultants are very less who can guide and consult then on the exact situation that can be used for the best performance of their desired application. As in India many organizations and companies have started working upon CNT (carbon nanotubes, MEMS, lithography study, electron microscopy, nano surface study etc), heavy research is going on CNT. It becomes important to find out the names coming in limelight using these advanced technologies of using them.
Consultancy is the only part that can help us to stand in this field. As initial capital required for production of CNT is really high, and the market size is determined by the customers and suppliers, the survey regarding the needs can only be easily conducted if we start up with consultancy services, as it will help gather required capital, and will be very helpful and crucial in our second and third phase of manufacturing of CNT.
We will focus on various tasks beside consultancies such as Characterization Instruments and will try to build up upon the rich knowledge and IP we have achieved.
In phase 3 our main goal will be nano manufacturing get in CNT manufacturing and work on other nanomanufaturing like nano silver, ZnO nano materials etc.
The setting of Software Research Lab in nanotechnology and MEMS is included in the miscellaneous part as it will not be taking much of the part of the investment and the collaboration with the required organization will be done.
In this project we aim at finding more efficient, secure and reliable SMC technique. In the initial stage we plan to study the existing techniques of SMC. In phase one will closely examine these existing methods. Initially we will simulate them on a network. We will examine the security, functioning and other parameters of the techniques based on the previous simulations of techniques. Many experimental calculations will be performed with these methodologies. Based on the simulation and examination of the techniques we will find out the security vulnerabilities and other flaws in the present methods. A report will be prepared, based on the simulation and various issues related to these methods. First and foremost, we will lay down the network for simulation. We will connect around forty to fifty computers in a network using LAN. To test the proper functioning of a technique we will design a protocol based on the particular technique and use all the rules of that technique. A software will be prepared which can perform SMC computations using the rules of the technique. We will then deploy the software on the network prepared. The network will be made ready for the process and the software will be used to perform the required tasks. Using this prepared set we will perform several computations. During the testing we will have our security team try to hack through the whole system. The security team will try to hack in the systems security and will try to leak out information and data involved in the process. This approach will allow us to find the vulnerabilities in the method. The security of the whole process would be analyzed and the data transfer would be constantly monitored using network tapping software. Several computations would be performed using the same technique to test the same for different purposes and using varies approaches. Many different types of computations would be performed to analyze a particular technique and its suitability for particular types of tasks and its usability in a particular application. The technique suited for a particular type of application may not be well suited for other types of computations. A detailed report would be prepared based on the testing and experimentation.
In the second stage we will try to find a solution to these various issues along with the security issue as a major focus, and we will try to eliminate them. We will try to remove the flaws by examining the reports produced by the simulation and experimentation. The techniques will be modified accordingly to meet the needed security level. Based on the scope of enhancement in a particular we will try to eliminate any flaws in the technique and if necessary we will try to club different techniques to make a better one if possible. Then they will again be simulated and experimented on the test network as to ensure they meet the desired requirements. All the parameters and characteristics of the whole process would be noted and report would be prepared. If any technique seems out of scope of enhancement we will not work on it further. Only those techniques which can be improved or which have a chance of enhancement, will be worked on. Based on the study we will also prepare reports related to security concerning issues in various methods and various key features which are prime requisite of SMC. We will address key improvements which can be done in the existing techniques to improve their security, performance, applicability etc. and to over all improve the technique. Based on these we will present many papers on international level to address these issues related to a technique, the key prime requisite of a technique and the trends in SMC. We plan to send our work to various international conferences and journals.
In third stage our aim would be to find out a new technique with maximum security. We will use the results obtained in the previous stages and will try to keep in mind the security related issues and other flaws in the existing methods. Based on our research and reports of the result of simulation and experiments conducted on the simulation network, we will try to evolve a new technique to address the existing security issues, free from the flaws of the existing era and having the maximum security. We will enlist the various required key features, the various issues related to SMC, and the major problems which remain a big hindrance for the SMC. We will find out various techniques to address the issues and will cycle through many of the available techniques to fix them. We will add features in the technique by finding the best options available currently. We would combine a set of powerful and useful features and will try to address the common issues found in the earlier stages, by using suitable way. The technique to be developed would be free from all the flaws which have been found out in the existing techniques in the earlier stages, it should have all the features which are essential for SMC, it should provide maximum security, it should have wide range of applicability, it should be easy to implement, the performance should be optimal etc. We will conduct some final tests and surveys to demonstrate the technique, it powerful features and its working. We would conduct online surveys involving many academic institutes. Papers would be prepared for the technique which would show the detailed functioning of it along with the comparison with the other techniques. We plan to publish our work in major recognized journals and conferences.