All Posts in : Computer Science Seminars
Showing posts with label Computer Science Seminars. Show all posts
Public Key Infrastructure
Seminar topic on Public Key Infrastructure(PKI) :
Public Key Infrastructure is widely using in major organizations .Public Key Infrastructure supports digital signature and document encryption. It provides more security and authentication over internet, so it is very useful for those who use internet to provide their services.For example banking which providing banking services through internet.So sectors like banking will use this technology to provide more security and authentication.
Digital signatures are used to verify user identities.Public key cryptography means providing secure communication to user on a insecure public network by verifying user identity via digital signatures.
Public Key Infrastructure all the public keys will be stored in a directory.PKI is a method which creates , store and distribution of digital signatures which are used to particular public key belongs to a certain entry.That means PKI creates digital certificates and stores in directory called central repository .
A Search Engine for 3D Models
Seminar on A Search Engine for 3D Models : To day we are mostly using text-based search engine techniques to search information .These text-based search engines may face difficulties on showing 3D data .Creating quality 3D models takes more time.However there are many 3D models are available on web. The main challenge in a search engine for 3D models is query method development and an robust algorithm . For a 3D Models search engine we must develop queries those which supports queries based on 3D sketches, 2D sketches, 3D model . So 3D Models search engines must support those queries. This paper gives more information about search engines for 3D models.
10 GB ETHERNET
Seminar topic on 10 GB Ethernet : 10 GB Ethernet is a computer networking standard that defines the version of Ethernet.It offers similar benefits like as previous Ethernet standards.It has the maximum data rate of 10gb/s and it is 10 times faster than gigabit Ethernet.By using this we can interconnect LAN , WAN and MANs.It works on full-duplex mode and not support half-duplex mode operations.It only performs over optical fibers.This paper gives full information about architecture and protocol architecture of 802.3ae.
Wireless mesh networks
Seminar topic on Wireless mesh networks :Wireless mesh networks(WMN) is formed by radio node and it belongs to mesh topology.Generally it consist of mesh clients,routers and gateways.WMN's are implemented by one of wireless technology's 802.11,802.15,802.16 or combination of more than one wireless technology's.In WMN's if any node failure that may not effect the other nodes in the communication.So WMN's is reliable .If one node fail, then rest of nodes form communication.Main applications of Wireless mesh networks are environment monitoring,public safety and citywide wireless Internet services.
Resource Reservation Protocol
SEMINAR ON Resource Reservation Protocol : Resource Reservation Protocol (RSVP) is mainly designed to reserve resources across network for an integrated service internet.Resource Reservation Protocol belongs to the transport layer protocol that operates on IPV4 and IPV6 internet layer.Mainly this protocol is used by the routers that receive(request) and transmit(send) the quality of service (QOS) over the network.Resource Reservation Protocol is not an routing protocol , it perform operations between routing protocols.This paper mainly explains about the operations and performance of Resource Reservation Protocol.
Automatic Computing
SEMINAR ON Automatic Computing :Automatic Computing means that the devices having self managing capability i.e they perform computing itself without user(human) interference.
Ambiophonics
SEMINAR ON Ambiophonics :Ambiophonics employs the digital signal processing and two loud speakers are placed in front of the listener to increase the reproduction of stereophonic and 1.5 sorround sound music , movies and games in pc's home theaters and workstation applications .Ambiophonics eliminates the crosstalk in conventional stereo triangle speaker placements.
Storage Area Network (SAN)
SEMINAR ON Storage Area Network : Storage Area Network is a type of network that provides that provide access to data storage.Storage Area Network connect the storage devices to the network.Storage Area Network is mainly used to provide the accessibility of data storage to servers such as disk arrays,magnetic tapes ,and many more.These devices are logically connected to the operating system.Storage Area Network provide separate network to the storage devices and Storage Area Network not allowed other networks to access those storage devices .Storage Area Network provide block level operations.This paper mainly explains about the infrastructure and benefits of Storage Area Network.
Structured Cabling
SEMINAR ON Structured Cabling : Structured Cabling infrastructure contains the no of subsystems.Structured Cabling design and installation is performed by the set of standards.The standards define who to address the cabling in various topology.these standards are international standards published by ISO/IEC , CENELEC , TIA (Telecommunications Industry Association).Building Industry Consulting Service International is recognised trainer of Structured Cabling installers.This paper mainly explains about the Structured Cabling standards , network design ,installation and maintenance of Structured Cabling.
SyncML
SEMINAR ON SyncML : SyncML Stand for Synchronization Markup Language.SyncML is a platform independent information synchronization standard.SyncML synchronize the data between mobile devices and computers.It builds more on mobile phones and PDA'S.SyncML is a protocol based up on standardized XML communication over HTTP POST which makes that implements on any platform.This paper mainly explains about the real time applications and implementation of SyncML.
Timing Attack
SEMINAR ON Timing Attack :Timing Attack in cryptography is an attack in which the attacker analyze the time taken to execute cryptographic algorithms and then attempts to compromise a crypto system.the measurement of time is depends on crypto system design , the cpu running ,the algorithms used and many more.mainly the time can be depend on the input .this paper mainly explains about the timing attack on implementations of Diffie-Hellman , Rsa , Dss.
Turbo Codes
SEMINAR ON Turbo Codes : Turbo Codes are high performance forward error correction codes which was developed in 1993 introduced by Berrou, Glavieux and Thitimajshima.Turbo Codes are mainly used in satellite communications.Turbo Codes are mainly used to achieve reliable information transformation over band width.
VHSIC Hard ware Description Language(VHDL)
SEMINAR ON VHSIC Hard ware Description Language(VHDL) :VHDL Stands for Very High Speed Integrated Circuits Hard ware Description Language.VHDL used in electronic design automation to describe and simulate complex digital systems.VHDL is designed and developed by department of US defense . The first version of VHDL designed to IEEE Standard 1076-1987 which include wide range of data types like numerical,logical,character,array and time.next the IEEE Standard 1164 which defined 9 value logic type.next the updated IEEE standard that allows the syntax more consistence and provide naming flexibility ,extends character type to allowing ISO-8859-1 printable characters and also add the xnor operator .Next IEEE Standard 1076.2 added the better handling functionalities of real and complex data types.IEEE Standard 1076.3 allows signed and unsigned types.IEEE standard 1076.1 provides analog and mixed signal circuit design extensions.VHDL IEEE Standard 1076-2008 published in 2009
Virtual Keyboard
SEMINAR ON Virtual Keyboard : Virtual Keyboard is part of the screen that allows the user to enter characters.Virtual Keyboard is a software component and performed with multiple input devices like touch screen , actual keyboard and mouse. On desktop Pc Virtual Keyboard provide an alternative to the key boards and it is helpful for the disabilities who can't use physical devise.Virtual Keyboard plays a major role on where the devices with no physical connectivity.Virtual Keyboard is full sized qwerty key board that projected onto any surface that's why it is also called as projection key board.Virtual Keyboard mainly works on Virtual devices.This paper mainly explains about the functionality and applications of the Virtual Keyboard.
Voice Portal
SEMINAR ON Voice Portal : Voice Portals providing access to information, service and perform transactions through spoken commands and voice responses.Voice Portal is same as web portal.
Wireless Sensor Network
SEMINAR ON Wireless Sensor Network :Wireless Sensor Network consist distributed autonomous sensors that monitor physical and environmental conditions, like sound , temperature and pressure..The wireless sensor nodes are cooperatively sends the monitoring data to a main location through network.wireless sensor networks are mainly used in the military such as battlefield surveillance and also these networks are widely used in industrial areas to monitor industrial process and machine health.
XML Encryption
SEMINAR ON XML Encryption :XML Encryption is a W3C standard.XML Encryption is used to encrypt the XML elements in to cipher text.The process of encryption is it takes an element from XML document and encrypt it and it's children. .after encryption also the document remains should be in well formed.Mainly three XML Encryption approaches are there.They are using only symmetric encryption , symmetric and asymmetric encryption and x.509 certificate.This paper mainly explains about how to encrypt the contents of XML elements and gives brief information on three techniques (approaches)used to encrypting XML elements.
Wireless Fidelity ( Wi Fi)
SEMINAR ON Wireless Fidelity ( Wi Fi) :Wi-Fi stands for Wireless Fidelity that allows two nodes ( electronic devices ) to communicate wirelessly.Wi-Fi uses radio frequency for transmitting and receiving the data.An access point is used to connect to wireless networks.the Wi-Fi devises are enabled with in the the range of wireless networks.Through these wireless networks Wi-Fi devises access internet if wireless networks access the internet.the Wi-Fi devices are based on 802.11 standards which was developed by IEEE and Wi-Fi adapted by Wi-Fi alliance .The frequency range of Wi-Fi devices is less and frequency range is depend on IEEE 802.11 Standards.This paper mainly explains about the IEE802.11 standard networks , applications and security of Wi-Fi networks.
Mobile ADHOC Network
SEMINAR ON Mobile ADHOC Network : Mobile ADHOC Network is a set of mobile devices(mobile nodes) are connected by wireless links.Mobile ADHOC Network is a infra structureless network because the mobile nodes are moving from one place to another at any time so there is no fixed infra structured id there.Mobile ADHOC Network is a self configurable network.The main challenge of Mobile ADHOC Network to continuously maintained the route information for traffic.The mobile nodes are not fixed and are moved from one place to another at any time so to maintain route traffic information about mobile nodes is difficult.This paper mainly explains the characteristics of Mobile ADHOC Networks and protocols used in wireless ADHOC Networks.