All Posts in : Seminar Topics
Showing posts with label Seminar Topics. Show all posts

Cloud Computing

Seminar On Cloud Computing :

           Cloud computing is the latest of computing paradigms. It promises to change the way people use computing resources. Using Internet as the backbone, cloud computing asserts that it is possible to provide computing as a “utility” to end users “as and when needed” basis. Cloud computing has a potential to serve users of all kinds: individual users, institutions, industry at large. This report cover issues such nature and scope of cloud computing, its applications, business rationale etc.
            Cloud computing is a business model that harnesses the web as the ultimate business platform. Cloud computing is impregnated with immense potential for array of practical applications. The model is expected make computing needs available via web on retail basis and is called cloud computing. Cloud computing intends to make the Internet the ultimate home of all computing resources- storage, computations, applications and allow end user to available them in quantities of her choice, location of their preferences, for duration of their liking. In other world web become the provision store for all your computing needs.

Cellular Digital Packet Data

Seminar topic on Cellular Digital Packet Data : 

           Cellular Digital Packet Data (CDPD) is a technique used for transmitting small chunks of data, commonly referred to as packets, over the cellular network in a reliable manner. It allows users to send and receive data from anywhere in the cellular coverage area at any time, quickly and efficiently. CDPD technology provides extensive, high speed (data can be sent over the Airlink at a rate of 19.2 kilobits per second), high capacity, cost effective data services to mobile users.
           With this technology, both voice and data can be transmitted over existing cellular channels. Wireless data communications will soon be just as commonplace as the currently popular office and desk top applications are replaced by a mobile professional with a portable and (various) hand held devices. To facilitate this evolution 1: Advanced mobile data technology is being deployed by cellular service providers, thereby making the service more reliable, useful and cost effective, and 2: Business benefits are being identified and cost justified by early adopters across numerous market segments.
             By building CDPD as an overlay to the existing cellular infrastructure, and using the same frequencies as cellular voice, carriers are able to minimize the capital expenditures required to offer the service while offering the same coverage area (footprint) their customer base has grown accustomed to. In comparison, it costs approximately $1 million to build out a new cellular cellsite and only about $50,000 to build the CDPD overlay to an existing site. The CDPD overlay network is made up of a combination of key components that operate together to provision the overall service.

Captcha Security For Phishing Secure Or Not

Seminar Topic On Captcha Security For Phishing Secure Or Not ? :

Addressing recent online banking threats, the banking industry offers us several solutions for our safety online banking experience, however those solutions may not finally secure the users under the rising threats. The main challenges are how to enable safe online banking on a compromised host, and solving the general ignorance of security warning.
CAPTCHA is primarily used to anti bot automated login, also, CAPTCHA base application can further provides secure PIN input against keylogger and mouse-logger for Bank’s customer.

Brain Machine Interface

Seminar Topic On Brain Machine Interface : 

A brain-machine interface is a communication system that does not depend on the brains normal output pathways of peripheral nerves and muscles. It is a new communication link between a functioning human brain and the outside world. These are electronic interfaces with the brain, which has the ability to send and receive signals from the brain. BMI uses brain activity to command, control, actuate and communicate with the world directly through brain integration with peripheral devices and systems. The signals from the brain are taken to the computer via the implants for data entry without any direct brain intervention. BMI transforms mental decisions and/or reactions into control signals by analyzing the bio-electrical brain activity.
While linking the brain directly with machines was once considered science fiction, advances over the past few years have made it increasingly viable. It is an area of intense research with almost limitless possibilities. The human brain is the most complex physical system we know of, and we would have to understand its operation in great detail to build such a device. An immediate goal of brain-machine interface study is to provide a way for people with damaged sensory/motor functions to use their brain to control artificial devices and restore lost capabilities. By combining the latest developments in computer technology and hi-tech engineering, paralyzed persons will be able to control a motorized wheel chair, computer painter, or robotic arm by thought alone. In this era where drastic diseases are getting common it is a boon if we can develop it to its full potential. Recent technical and theoretical advances, have demonstrated the ultimate feasibility of this concept for a wide range of space-based applications. Besides the clinical purposes such an interface would find immediate applications in various technology products also.

Biometrics

Seminar Topic On Biometrics :

Biometrics refers to the automatic identification of a person based on his or her physiological or behavioral characteristics like fingerprint, or iris pattern, or some aspects of behaviour like handwriting or keystroke patterns. Biometrics is being applied both to identity verification. The problem each involves is somewhat different. Verification requires the person being identified to lay claim to an identity. So the system has two choices, either accepting or rejecting the person’s claim. Recognition requires the system to look through many stored sets of characteristics and pick the one that matches the unknown individual being presented. Biometric system is essentially a pattern recognition system, which makes a personal identification by determining the authenticity of a specific physiological or behavioral characteristics possessed by the user.
Biometrics is a rapidly evolving technology, which is being used in forensics Such as criminal identification and prison security, and has the potential to be used in a large range of civilian application areas. Biometrics can be used transactions conducted via telephone and Internet (electronic commerce and electronic banking. In automobiles, biometrics can replace keys with key-less entry devices


Bio Inspired Computing

Seminar Topic On Bio Inspired Computing : 
            Bio inspired computing is a field of study that loosely knits together sub-fields related to the topics of connectionism, social behaviour and emergence. It is often closely related to the field of artificial intelligence, as many of its pursuits can be linked to machine learning. It relies heavily on the fields of biology, computer science and mathematics. Briefly put, it is the use of computers to model nature, and simultaneously the study of nature to improve the usage of computers. Biologically-inspired computing is a major subset of natural computation.
             One way in which bio-inspired computing differs from artificial intelligence (AI) is in how it takes a more evolutionary approach to learning, as opposed to the what could be described as creationist methods used in traditional AI. In traditional AI, intelligence is often programmed from above: the programmer is the creator, and makes something and imbues it with its intelligence. Bio-inspired computing, on the other hand, takes a more bottom-up, decentralised approach; bio-inspired techniques often involve the method of specifying a set of simple rules, a set of simple organisms which adhere to those rules, and a method of iteratively applying those rules. After several generations of rule application it is usually the case that some forms of complex behaviour arise.

Bio Chips

Seminar Topic On Bio Chips:

The human body is the next big target of chip makers. It won’t be long before bio chip implants will come to the rescue of sick, those who are lost, gunned soldiers and wandering mental patients etc.
Medical researchers have been working to integrate chips and people for many years, often plucking devices from well known electronic appliances. Bio chips are being used to genetic, toxicological, protein and biochemical researches. It can also be used to rapidly detect chemical agents used in biological warfare so that defensive measures can be taken. Currently implanted systems have got a range of about two to twelve inches.
Most of us won’t like the idea of implanting a bio chip in our body that identifies us uniquely and can be used to track our location. That would be a major loss of privacy. But there is a flip side to this! Such bio chips could help agencies to locate lost children, downed soldiers and wandering Alzheimer’s patients

Autonomic Computing

Seminar Topic On Autonomic Computing : 

Autonomic Computing is a new vision of computing initiated by IBM. This new paradigm shifts the fundamental definition of the technology age from one of computing, to one defined by data. Access to data from multiple, distributed sources, in addition to traditional centralized storage devices will allow users to transparently access information when and where they need it. At the same time, this new view of computing will necessitate changing the industry’s focus on processing speed and storage to one of developing distributed networks that are largely self-managing, self-diagnostic, and transparent to the user.
The high-tech industry has spent decades creating computer systems with ever-mounting degrees of complexity to solve a wide variety of business problems. Ironically, complexity itself has become part of the problem. It’s a problem that’s not going away, but will grow exponentially, just as our dependence on technology has. The solution may lie in automation, or creating a new capacity where important computing operations can run without the need for human intervention.

Audio Captcha: Existing Solutions Assessment And A New Implementation For Voip Telephony

Seminar Topic On : Audio Captcha: Existing Solutions Assessment And A New Implementation For Voip Telephony 

SPam over Internet Telephony (SPIT) is a potential source of future annoyance in Voice over IP (VoIP) systems. A typical way to launch a SPIT attack is the use of an automated procedure (i.e., bot), which generates calls and produces unsolicited audio messages. A known way to protect against SPAM is a Reverse Turing Test, called CAPTCHA (Completely Automated Public Turing Test to Tell Computer and Humans Apart). In this paper, we evaluate existing audio CAPTCHA, as this type of format is more suitable for VoIP systems, to help them fight bots. To do so, we first suggest specific attributes-requirements that an audio CAPTCHA should meet in order to be effective. Then, we evaluate this set of popular audio CAPTCHA, and demonstrate that there is no existing implementation suit-able enough for VoIP environments. Next, we develop and implement a new audio CAPTCHA, which is suitable for SIP-based VoIP telephony. Finally, the new CAPTCHA is tested against users and bots and demonstrated to be efficient.

Artificial Passenger

Seminar Topic On Artificial Passenger : 

An artificial passenger (AP) is a device that would be used in a motor vehicle to make sure that the driver stays awake. IBM has developed a prototype that holds a conversation with a driver, telling jokes and asking questions intended to determine whether the driver can respond alertly enough. Assuming the IBM approach, an artificial passenger would use a microphone for the driver and a speech generator and the vehicle’s audio speakers to converse with the driver. The conversation would be based on a personalized profile of the driver. A camera could be used to evaluate the driver’s “facial state” and a voice analyzer to evaluate whether the driver was becoming drowsy. If a driver seemed to display too much fatigue, the artificial passenger might be programmed to open all the windows, sound a buzzer, increase background music volume, or even spray the driver with ice water. One of the ways to address driver safety concerns is to develop an efficient system that relies on voice instead of hands to control Telematics devices. It has been shown in various experiments that well designed voice control interfaces can reduce a driver’s distraction compared with manual control situations. One of the ways to reduce a driver’s cognitive workload is to allow the driver to speak naturally when interacting with a car system (e.g.when playing voice games, issuing commands via voice). It is difficult for a driver to remember a syntax, such as “What is the distance to JFK?”"Or how far is JFK?” or “How long to drive to JFK?” etc.). This fact led to the development of Conversational Interactivity for Telematics (CIT) speech systems at IBM Research.
CIT speech systems can significantly improve a driver-vehicle relationship and contribute to driving safety. But the development of full fledged Natural Language Understanding (NLU) for CIT is a difficult problem that typically requires significant computer resources that are usually not available in local computer processors that car manufacturer provide for their cars. To address this, NLU components should be located on a server that is accessed by cars remotely or NLU should be downsized to run on local computer devices (that are typically based on embedded chips).Some car manufacturers see advantages in using upgraded NLU and speech processing on the client in the car, since remote connections to servers are not available everywhere, can have delays, and are no trobust.

Animatronics

Seminar Topic On Animatronics : 

Animatronics is a cross between animation and electronics. Basically, an animatronic is a mechanized puppet. It may be preprogrammed or remotely controlled. An abbreviated term originally coined by Walt Disney as “Audio-Animatronics” (used to describe his mechanized characters), can actually be seen in various forms as far back as Leonardo-Da-Vinci’s Automata Lion, (theoretically built to present lillies to the King of France during one of his Visits),and has now developed as a career which may require combined talent in Mechanical Engineering , Sculpting / Casting, Control Technologies, Electrical / Electronic, Airbrushing, Radio-Control.
Long before digital effects appeared, animatronics were making cinematic history. The scare generated by the Great White coming out of the water in “Jaws” and the tender otherworldliness of “E.T.” were its outcomes. Animatronics creatures often seem as real to us as their flesh-and-blood counterparts. The Jurassic Park series combined digital effects with animatronics.

Agent Oriented Programming

Seminar Topic On  Agent Oriented Programming : 

Agent-Oriented Software Engineering is the one of the most recent contributions to the field of Software Engineering. It has several benefits compared to existing development approaches, in particular the ability to let agents represent high-level abstractions of active entities in a software system. This paper gives an overview of recent research and industrial applications of both general high-level methodologies and on more specific design methodologies for industry-strength software engineering. We know that people/systems depend on other people/systems to accomplish tasks or goals, people/systems make commitments to provide a task or meet a goal people/systems have strategies to ensure their goals are accomplished. Agent-oriented approaches model people and systems as agents.
Agent oriented programming is an emerging programming paradigm with roots in the domain of artificial intelligence. This paradigm is often described to as the natural successor to object oriented paradigm. Highly suited to applications which are embedded in complex dynamic environments, it is based on human concepts such as belief, goals and plans. This allows a natural specification of sophisticated software systems in terms that are similar to human understanding, allowing programmers to concentrate on the critical properties of the application rather than getting absorbed in the intricacies of complicated environment.

Advancements Towards 4G

Seminar Topic On Advancements Towards 4G:

           Currently 2G Technology (GSM), or second generation technology, is widely used worldwide for cell phone networks. The problem with 2G technology is that the data rates are limited. This makes it inefficient for data transfer applications such as video conferencing, music or video downloads. To increase the speed, various new technologies have been in development. One of these, 4G technology, is mainly made up of high-speed wireless networks designed to carry data, rather than voice or a mixture of the two. 4G transfers data to and from mobile devices at broadband speeds – up to100 Mbps moving and 1Gbps while the phone is stationary. In addition to high speeds, the technology is more robust against interference and tapping guaranteeing higher security. This innovative technology functions with the aid of VoIP, IPv6, and Orthogonal frequency division multiplexing (OFDM).
            To cater the growing needs of 4G, mobile data communication providers will deploy multiple antennas at transmitters to increase the data rate. Unlike the 3G networks, which are a mix of circuit switched and packet switched networks, 4G will be based on packet switching only (TCP/IP). This will allow low-latency data transmission. Furthermore, the use of IP to transfer information will require IPv6 to facilitate the use of more cell phone devices. During the presentation, an overview of the various generations of mobile device technologies preceding 4G would be followed by technical aspects of 4G and how it functions, as well as the way it can lead to future innovations in cellular and communication technology.

Adding Intelligence To Internet Using Satellites

Seminar Topic On Adding Intelligence To Internet Using Satellites:

Satellites have been used for years to provide communication network links. Historically, the use of satellites in the Internet can be divided into two generations. In the first generation, satellites were simply used to provide commodity links (e.g., T1) between countries. Internet Protocol (IP) routers were attached to the link endpoints to use the links as single-hop alternatives to multiple terrestrial hops. Two characteristics marked these first-generation systems: they had limited bandwidth, and they had large latencies that were due to the propagation delay to the high orbit position of a geosynchronous satellite.
In the second generation of systems now appearing, intelligence is added at the satellite link endpoints to overcome these characteristics. This intelligence is used as the basis for a system for providing Internet access engineered using a collection or fleet of satellites, rather than operating single satellite channels in isolation. Examples of intelligent control of a fleet include monitoring which documents are delivered over the system to make decisions adaptively on how to schedule satellite time; dynamically creating multicast groups based on monitored data to conserve satellite bandwidth; caching documents at all satellite channel endpoints; and anticipating user demands to hide latency.

Image Compression And Denoising Based On Tree Adopted Wavelet Shrinkage

Seminar Topic On Image Compression And Denoising Based On Tree Adopted Wavelet Shrinkage :

An algorithm is described for simultaneously compressing and denoising images. The algorithm is called tree-adapted wavelet shrinkage and compression (TAWS-Comp). TAWS-Comp is a synthesis of an image compression algorithm, adaptively scanned wavelet difference reduction (ASWDR), and a denoising algorithm, tree-adapted wavelet shrink age (TAWS). As a Compression procedure, TAWS-Comp inherits all of the advantages of ASWDR: its ability to achieve a precise bit-rate assigned before compressing, its scalability of decompression, and its capability for enhancing regions-of interest. Such a full range of features has not been available with previous compressor plus denoiser algorithms. As a denoising procedure, TAWS-Comp is nearly as effective as TAWS alone. TAWS has been shown to have good performance, comparable to state of the art denoisers. In many cases, TAWS-Comp matches the performance of TAWS while simultaneously performing compression. TAWS-Comp is compared with other combined compressor/denoisers, in terms of error reduction and compressed bit-rates. Simultaneous compression and denoising is needed when images are acquired from a noisy source and storage or transmission capacity is severely limited (as in some video coding applications). An application is described where the features of TAWS-Comp as both compressor and denoiser are exploited.Keywords: image compression; image denoising; signal processing; video coding.

WiMAX

Seminar topic on WiMAX :

WiMAX stands for Worldwide Interoperability for Microwave Access. WiMAX was crated by WiMAX Forum.It is designed as an alter native to cable and DSL to provide speed of 30 to 40 mb/s data rate.It provides portable mobile broadband across word wide.It using different devices to access broadband.It also providing VoIP and IPTV services . It refers to interoperable implementations of the IEEE 802.16 of  wireless network standard ratified by the WiMAX Forum.

Public Key Infrastructure

Seminar topic on Public Key Infrastructure(PKI) :

Public Key Infrastructure is widely using in major organizations .Public Key Infrastructure supports digital signature and document encryption. It provides more security and authentication over internet, so it is very useful for those who use internet to provide their services.For example banking which providing banking services through internet.So sectors like banking will use this technology to provide more security and authentication. 
Digital signatures are used to verify user identities.Public key cryptography means providing secure communication to user on a insecure public network by verifying user identity via digital signatures.
Public Key Infrastructure all the public keys will be stored in a directory.PKI is a method which creates , store and distribution of digital signatures which are used to particular public key belongs to a certain entry.That means PKI creates digital certificates and stores in directory called central repository .

A Search Engine for 3D Models

Seminar on A Search Engine for 3D Models : To day we are mostly using text-based search engine techniques to search information .These text-based search engines may face difficulties on showing 3D data .Creating quality 3D models takes more time.However there are many 3D models are available on web.  The main challenge in a search engine for 3D models is query method development and an robust algorithm . For a 3D Models search engine we must develop queries those which supports queries based on 3D sketches, 2D sketches, 3D model . So 3D Models search engines must support those queries.  This paper gives more information about search engines for 3D models. 

10 GB ETHERNET

Seminar topic on 10 GB Ethernet : 10 GB Ethernet is a computer networking standard that defines the version of Ethernet.It offers similar benefits like as previous Ethernet standards.It has the maximum data rate of 10gb/s and it is 10 times faster than gigabit Ethernet.By using this we can interconnect LAN , WAN and MANs.It works on full-duplex mode and not support half-duplex mode operations.It only performs over optical fibers.This paper gives full information about architecture and protocol architecture of 802.3ae.

Wireless mesh networks

Seminar topic on Wireless mesh networks :Wireless mesh networks(WMN) is formed by radio node and it belongs to mesh topology.Generally it consist of  mesh clients,routers and gateways.WMN's are implemented by one of wireless technology's 802.11,802.15,802.16 or combination of more than one wireless technology's.In WMN's if any node failure that may not effect the other nodes in the communication.So WMN's is reliable .If one node fail, then rest of nodes form communication.Main applications of Wireless mesh networks are environment monitoring,public safety and citywide wireless Internet services.