Tuesday, July 26, 2011

Seminar on Smartphone

A smartphone is a high-end mobile phone that offers more advanced computing ability and connectivity than a contemporary feature phone (i.e. a modern low-end phone). A smartphone combines the functions of a personal digital assistant (PDA) and a mobile phone. Today's models typically also serve as portable media players and camera phones with high-resolution touchscreen, GPS navigation, Wi-Fi and mobile broadband access.
A smartphone runs a complete mobile operating system. Widespread examples are Apple iOS, Google Android, Microsoft Windows Phone 7, Nokia Symbian, Research In Motion BlackBerry OS, and embedded Linux distributions such as Maemo and MeeGo. Such systems can be installed on many different phone models. They can run third-party applications, using an application programming interface (API).
According to an Olswang report in early 2011, the rate of smartphone adoption is accelerating: as of March 2011 22% of UK consumers had a smartphone, with this percentage rising to 31% amongst 24–35 year olds. Growth in demand for advanced mobile devices boasting powerful processors and graphics processing units, abundant memory (FLASH memory), high-resolution screens with multi-touch capability, and open operating systems has outpaced the rest of the mobile phone market for several years. According to an early 2010 study by ComScore, over 45.5 million people in the United States owned smartphones out of 234 million total subscribers. Despite the large increase in smartphone sales in the last few years, smartphone shipments only make up 20% of total handset shipments, as of the first half of 2010. In March 2011 Berg Insight reported data that showed global smartphone shipments increased 74% from 2009 to 2010.

                  

Power point presentation on Smartphone

Smartphones at Rice University
SmartPhone Attacks and Defenses
Smart-phones
Smartphones in Ophthalmology
Understanding Win32 Support in Pocket PC and Smartphone
SmartPhone Thesis A Seminar - cse

Seminar on Real-Time Operating Systems

A real-time operating system (RTOS) is an operating system (OS) intended to serve real-time application requests.
A key characteristic of a RTOS is the level of its consistency concerning the amount of time it takes to accept and complete an application's task; the variability is jitter. A hard real-time operating system has less jitter than a soft real-time operating system. The chief design goal is not high throughput, but rather a guarantee of a soft or hard performance category. A RTOS that can usually or generally meet a deadline is a soft real-time OS, but if it can meet a deadline deterministically it is a hard real-time OS.
A real-time OS has an advanced algorithm for scheduling. Scheduler flexibility enables a wider, computer-system orchestration of process priorities, but a real-time OS is more frequently dedicated to a narrow set of applications. Key factors in a real-time OS are minimal interrupt latency and minimal thread switching latency, but a real-time OS is valued more for how quickly or how predictably it can respond than for the amount of work it can perform in a given period of time.

Power point presentation on real-time operating system

RTOS - Design and Implementation
6.0 INTRODUCTION TO REAL-TIME OPERATING SYSTEMS (RTOS)
Real Time Operating Systems
Real-Time Operating Sytems - Stanford
Basic Design using RTOS
Real Time Operating Systems (RTOS)

Seminar on Agile Methodology

Agile Software Development is a group of software development methodologies based on iterative and incremental development, where requirements and solutions evolve through collaboration between self-organizing, cross-functional teams. The Agile Manifesto introduced the term in 2001.

       

Incremental software development methods have been traced back to 1957. In 1974, a paper by E. A. Edmonds introduced an adaptive software development process.
So-called lightweight software development methods evolved in the mid-1990s as a reaction against heavyweight methods, which were characterized by their critics as a heavily regulated, regimented, micromanaged, waterfall model of development. Proponents of lightweight methods (and now agile methods) contend that they are a return to development practices from early in the history of software development.
Early implementations of lightweight methods include Scrum (1995), Crystal Clear, Extreme Programming (1996), Adaptive Software Development, Feature Driven Development, and Dynamic Systems Development Method (DSDM) (1995). These are now typically referred to as agile methodologies, after the Agile Manifesto published in 2001.

Power point presentation on Agile Software Development

SCRUM – an agile software development methodology
Agile Development Methodology
Agile Software Development
eXtreme Programming and Agile Concepts
Agile Software Engineering
Agile Methods A Practical Perspective

Sunday, July 24, 2011

Project on GPS Integrity Monitoring

Receiver Autonomous Integrity Monitoring (RAIM) is a technology developed to assess the integrity of Global Positioning System (GPS) signals in a GPS receiver system. It is of special importance in safety-critical GPS applications, such as in aviation or marine navigation.

RAIM detects faults with redundant GPS pseudorange measurements. That is, when more satellites are available than needed to produce a position fix, the extra pseudoranges should all be consistent with the computed position. A pseudorange that differs significantly from the expected value (i.e., an outlier) may indicate a fault of the associated satellite or another signal integrity problem (e.g., ionospheric dispersion). Traditional RAIM uses fault detection (FD) only, however newer GPS receivers incorporate Fault Detection and Exclusion (FDE) which enables them to continue to operate in the presence of a GPS failure.


The test statistic used is a function of the pseudorange measurement residual (the difference between the expected measurement and the observed measurement) and the amount of redundancy. The test statistic is compared with a threshold value, which is determined based on the requirements for the probability of false alarm (Pfa) and the probability of missed detection

Project abstract - PDF

Saturday, July 23, 2011

Seminar on Listening Skills

Listening skill is a communication technique that requires the listener to understand, interpret, and evaluate what (s)he hears. The ability to listen actively can improve personal relationships through reducing conflicts, strengthening cooperation, and fostering understanding.

When interacting, people often are not listening attentively. They may be distracted, thinking about other things, or thinking about what they are going to say next (the latter case is particularly true in conflict situations or disagreements). Active listening is a structured way of listening and responding to others, focusing attention on the speaker. Suspending one's own frame of reference, suspending judgment and avoiding other internal mental activities are important to fully attend to the speaker.

Comprehension is "shared meaning between parties in a communication transaction". This is the first step in the listening process. The first challenge for the listener is accurately identifying speech sounds and understanding and synthesizing these sounds as words. We are constantly bombarded with auditory stimuli, so the listener has to select which of those stimuli are speech sounds and choose to pay attention to the appropriate sounds (attending). The second challenge is being able to discern breaks between discernable words, or speech segmentation. This becomes significantly more difficult with an unfamiliar language because the speech sounds blend together into a continuous cluster. Determining the context and meanings of each word is essential to comprehending a sentence.

Power point presentation on Listening Skills

LISTENING SKILLS Prof.Meenakshi Gupta Dept of Humanities & Social
Improving Your Listening Skills idXready Sample PowerPoint
Listening Skills
Developing Good Listening Skills
Teaching Listening Skills
Listening Skills - PowerPoint – Itslife
How to Improve Listening Skills

Seminar on Communication Skills

Communication is the activity of conveying meaningful information. Communication requires a sender, a message, and an intended recipient, although the receiver need not be present or aware of the sender's intent to communicate at the time of communication; thus communication can occur across vast distances in time and space. Communication requires that the communicating parties share an area of communicative commonality. The communication process is complete once the receiver has understood the sender.

 

Human spoken and picture languages can be described as a system of symbols (sometimes known as lexemes) and the grammars (rules) by which the symbols are manipulated. The word "language" also refers to common properties of languages. Language learning normally occurs most intensively during human childhood. Most of the thousands of human languages use patterns of sound or gesture for symbols which enable communication with others around them. Languages seem to share certain properties, although many of these include exceptions. There is no defined line between a language and a dialect. Constructed languages such as Esperanto, programming languages, and various mathematical formalisms are not necessarily restricted to the properties shared by human languages.

Power point presentation on communication skills

101 Ways top Improve Your Communication Skills

COMMUNICATION-SKILLS.ppt
communication.ppt - Itivadnagar.org
Communication Skills
COMMUNICATION & PRESENTATION SKILLS ORAL PRESENTATION
Communication Skills

Seminar on Mobile commerce

Mobile Commerce, or m-Commerce, is about the explosion of applications and services that are becoming accessible from Internet-enabled mobile devices. It involves new technologies, services and business models. It is quite different from traditional e-Commerce. Mobile phones impose very different constraints than desktop computers. But they also open the door to a slew of new applications and services. They follow you wherever you go, making it possible to look for a nearby restaurant, stay in touch with colleagues, or pay for items at a store.

              

As the Internet finds its way into our purses or shirt pockets, the devices we use to access it are becoming more personal too. Already today, mobile phones know the phone numbers of our friends and colleagues. They are starting to track our location. Tomorrow, they will replace our wallets and credit cards. One day, they may very well turn into intelligent assistants capable of anticipating many of our wishes and needs, such as automatically arranging for taxis to come and pick us up after business meetings or providing us with summaries of relevant news and messages left by colleagues. But, for all these changes to happen, key issues of interoperability, usability, security, and privacy still need to be addressed.

 

Power presentation on Mobile Commerce

Introduction to M-Commerce - Stanford InfoLab
Mobile Commerce
Mobile Commerce 2
Mobile Computing & Networking

Idea Mobile Commerce

Mobile Commerce - Protocol Engineering and Technology Unit

Project - Payroll Management System

The Piccolo Payroll Management System is intended to be a secure and robust enterprise application that can help manage personnel financial aspects. It is developed in Visual Basic.NET and XML.

 

Download

Reference material on Payroll Management System

Source Code C Payroll Management System
Payroll Presentation - New York University
HR/Payroll System Replacement Project - Brown University
Electronic Payroll System
HRMS and Payroll

More info regarding project can be obtained from

http://sourceforge.net/projects/piccolo-payroll/

Friday, July 22, 2011

Seminar on SAP CRM

SAP CRM solutions help integrate sales, service and marketing through business processes and enterprise applications. These solutions help organizations manage three important customer-focused issues: generating new growth, attaining operational excellence, and enhancing competitive agility.

SAP CRM

Almost Everything About SAP CRM Transaction Launcher - Part I (PDF 12 MB) New!

While there are many documents that explain how to take advantage of Transaction Launcher functionality in CRM, I personally haven't come across one which explains how to troubleshoot it. This article is a humble attempt. It includes configuration steps, HTTP Watch traces and debugging. Due to the sheer size of this document, I have only covered three most commonly used scenarios.

30 Jun 2011

SAP CRM

Streamline Marketing Collaboration with SAP Streamwork (Video)New!

This video gives a brief overview of how marketers can leverage SAP StreamWork today to streamline collaboration with multiple stakeholders, both inside and outside their organization, to increase marketing effectiveness and build corporate memory. The integration of StreamWork, a social and collaborative decision-making tool, with SAP CRM Marketing is possible through consulting services.

Power point presentation on SAP CRM

SAP CRM Internet Sales Online Services for Prospective
SAP Customer Relationship Management Release Release SAP CRM2007
the first SAP CRM implementation for – TechTarget
India SAP CoE - CRM Middleware
SAP CRM
CRM Solution Market

Seminar on Sales Tracking

Manage the relationship with your clients and track the entire deal making process. See who, from your sales team, is working on each deal and what the status of each sale is. With Podio reporting you see your sales pipelines for the coming weeks and months, along with sales totals for the previous weeks and months, all displayed on the space's front page. Arrange meetings with your clients and leads, your partners and with your team. Also, share with your sales team the resources they need to be successful, including sales presentations and scripts. Provide a place to see frequently asked questions from leads and clients, and collectively come up with the best answers. This pack is primarily designed for businesses that make one sale to each of their clients.

 

Power point presentation on

Car Dealership sales tracking system
Tracking and Paying Sales Tax
The Sales Tracker for XYZ Grocery
The Latest in Oracle Sales OnLine Features
Mars Track ERP System

Seminar on Marketing

Marketing is the process used to determine what products or services may be of interest to customers, and the strategy to use in sales, communications and business development.It generates the strategy that underlies sales techniques, business communication, and business developments. It is an integrated process through which companies build strong customer relationships and create value for their customers and for themselves.


Marketing is used to identify the customer, satisfy the customer, and keep the customer. With the customer as the focus of its activities, marketing management is one of the major components of business management. Marketing evolved to meet the stasis in developing new markets caused by mature markets and overcapacities in the last 2-3 centuries.[citation needed] The adoption of marketing strategies requires businesses to shift their focus from production to the perceived needs and wants of their customers as the means of staying profitable.
The term marketing concept holds that achieving organizational goals depends on knowing the needs and wants of target markets and delivering the desired satisfactions. It proposes that in order to satisfy its organizational objectives, an organization should anticipate the needs and wants of consumers and satisfy these more effectively than competitors.

Power point presentation on Marketing

Presentation Guidelines for Marketing Plans
Marketing
How to create a Successful Marketing Plan
Marketing Management
CRM in Marketing
MARKETING ENVIRONMENT

Wednesday, July 20, 2011

Seminar on Sap R/3 Architecture

SAP R/3 is the former name of the main enterprise resource planning software produced by SAP AG. It is an enterprise-wide information system designed to coordinate all the resources, information, and activities needed to complete business processes such as order fulfillment or billing.


The first version of SAP's flagship enterprise software was a financial Accounting system named R/1 called as YSR. This was replaced by R/2 at the end of the 1970s. SAP R/2 was in a mainframe based business application software suite that was very successful in the 1980s and early 1990s. It was particularly popular with large multinational European companies who required soft-real-time business applications, with multi-currency and multi-language capabilities built in. With the advent of distributed client–server computing SAP AG brought out a client–server version of the software called SAP R/3 (The "R" was for "Real-time data processing" and 3 was for 3-tier). This new architecture is compatible with multiple platforms and operating systems, such as Microsoft Windows or UNIX. This opened up SAP to a whole new customer base

SAP R/3 was officially launched on 6 July 1992. It was renamed SAP ERP and later again renamed ECC (ERP Central Component). SAP came to dominate the large business applications market over the next 10 years. SAP ECC 5.0 ERP is the successor of SAP R/3 4.70. The newest version of the suite is SAP ERP 6.0 – the path to SAP Business Suite 7.

Power point presentation on SAP

SAP R/3 Architecture
SAP R/3 Architecture 2
Study of SAP R/3 Architecture
SAP R/3 Overview & Basis Technology
SAP Business Warehouse (BW)
Architecture of the R/3 System

Seminar on Software Project Management

The history of software project management is closely related to the history of software. Software was developed for dedicated purposes for dedicated machines until the concept of object-oriented programming began to become popular in the 1960's, making repeatable solutions possible for the software industry. Dedicated systems could be adapted to other uses thanks to component-based software engineering. Companies quickly understood the relative ease of use that software programming had over hardware circuitry, and the software industry grew very quickly in the 1970's and 1980's. To manage new development efforts, companies applied proven project management methods, but project schedules slipped during test runs, especially when confusion occurred in the gray zone between the user specifications and the delivered software. To be able to avoid these problems, software project management methods focused on matching user requirements to delivered products, in a method known now as the waterfall model.

Power point presentation on software project management
Software Project Management
Software Project Management 2
Software Project Management 3

Project management - Center for Systems and Software Engineering

Project Management – Planning
Quantitative Methods in Project Management

Seminar on Motivation

Motivation is the driving force by which humans achieve their goals. Motivation is said to be intrinsic or extrinsic. The term is generally used for humans but it can also be used to describe the causes for animal behavior as well. This article refers to human motivation. According to various theories, motivation may be rooted in a basic need to minimize physical pain and maximize pleasure, or it may include specific needs such as eating and resting, or a desired object, goal, state of being, ideal, or it may be attributed to less-apparent reasons such as altruism, selfishness, morality, or avoiding mortality. Conceptually, motivation should not be confused with either volition or optimism. Motivation is related to, but distinct from, emotion.

 

Power point presentation on Motivation

Motivation & Emotion
Motivation - Careervarsity.com
Motivation
Motivation 2
Work Motivation
Motivation PowerPoint

Monday, July 18, 2011

Seminar on CRM

Customer relationship management(CRM) is a widely-implemented strategy for managing a company’s interactions with customers, clients and sales prospects. It involves using technology to organize, automate, and synchronize business processes—principally sales activities, but also those for marketing, customer service, and technical support. The overall goals are to find, attract, and win new clients, nurture and retain those the company already has, entice former clients back into the fold, and reduce the costs of marketing and client service. Customer relationship management describes a company-wide business strategy including customer-interface departments as well as other departments. Measuring and valuing customer relationships is critical to implementing this strategy.

Benefits of CRM

A CRM system may be chosen because it is thought to provide the following advantages:

  • Quality and efficiency
  • Decrease in overall costs
  • Decision support
  • Enterprise agility
  • Customer Attention

Power point presentation on CRM

Customer Relationship Management (CRM)
CRM in Marketing
CRM 2
SAP CRM Internet Sales Online Services for Prospective
CRM Presentation
Pricing Overview for CRM 3.0
crm ppt

Enterprise resource planning

Enterprise resource planning (ERP) integrates internal and external management information across an entire organization, embracing finance/accounting, manufacturing, sales and service, customer relationship management, etc. ERP systems automate this activity with an integrated software application. Its purpose is to facilitate the flow of information between all business functions inside the boundaries of the organization and manage the connections to outside stakeholders.
ERP systems can run on a variety of hardware and network configurations, typically employing a database as a repository for information.


ERP systems typically include the following characteristics:

  • An integrated system that operates in real time (or next to real time), without relying on periodic updates.
  • A common database, which supports all applications.
  • A consistent look and feel throughout each module.
  • Installation of the system without elaborate application/data integration by the Information Technology (IT) department
    Power point presentation on ERP
ERP PPT - Free ERP Software Implementation Guide

 ERP Implementation Fundamentals

 ERP Centric Data Mining and KD

 ERP

 ERP Modules

 ERP and CRM

Sunday, July 17, 2011

Seminar on Cloud computing

Cloud computing means using multiple server computers via a digital network, as though they were one computer. Often, the services available are considered part of cloud computing.
Traditionally, without a cloud, a web server runs as a single computer or a group of privately owned computers. The computer(s) are powerful enough to serve a given amount of requests per minute and can do so with a certain amount of latency per request. If the computer's website or web application suddenly becomes more popular, and the amount of requests are far more than the web server can handle, the response time of the requested pages will be increased due to overloading. On the other hand, in times of low load much of the capacity will go unused.
If the website, service, or web application is hosted in a cloud, however, additional processing and compute power is available from the cloud provider. The website would share those servers with perhaps thousands of other websites varying size and memory. If the website suddenly becomes more popular, the cloud can automatically direct more individual computers to work to serve pages for the site, and more money is paid for the extra usage. If it becomes unpopular, however, the amount of money due will be less. Cloud computing is popular for its pay-as-you-go pricing model.

Cloud computing visual diagram
Clouds are sometimes set up within large corporations, or other institutions, so that many users all share the same server power. As computer power gets cheaper, many different applications are provided and managed by the cloud server. In many cases, users might not download and install applications on their own device or computer; all processing and storage is maintained by the cloud server.

Power point presentation on Cloud computing

Cloud computing
Security Issue in cloud Computing
Cloud Computing
Service Oriented Cloud Computing Infrastructure

Cloud Computing 2

Cloud Computing 3

Cloud computing: A mainframe strategy overview

Project - 2D Sonar

This project will implement a phase-array sonar system that will create a two-dimensional map of the environment directly in front of the array and display it on a screen for the user. The system will consist of one acoustic transmitter and a number of receivers. The receivers will be placed in a linear array spaced appropriately. Analysis of the phase relationships (to determine the angle) and delays (to calculate distances) in the receivers will allow a two-dimensional map of the environment to be drawn.

The project will consist of three parts: a signal processor, a master controller, and a display module. The signal processor will manipulate the phases of the different received signals to determine the distance to the target at a certain angle. The master controller dictates when data is gathered, processed, and post-processed. The display module will make a two-dimensional color-coded map that shows distance and highlights edges. There will also be alternate display modes that show waveforms of received signals to help with debugging.

Project Files

Presentation (PDF)

Report (PDF)

Report Appendix (PDF)

Project - 3D Pong

3D Pong takes MIT Pong to the next level with a 3D interface. At the heart of the project there is a hardware based 3D renderer. The renderer takes in a 3D model, specifically a sequence of colored triangles in a 3D space, and produces a 2D SVGA image. The view is controlled through a trackball mouse, which specifies rotations, translations and zoom. While the renderer can take in pre-built models stored in on-chip ROM, during gameplay a model of the current board is generated dynamically.

The project contains several high-level modules in addition to the renderer. A track-ball driver connects to the PS/2 interface and provide rotation, translation and zoom inputs, along with a possible lightsource input, to the renderer. A game-logic module provides ball and paddle coordinates to the game-model builder. The game-model builder turns the ball and paddle coordinates into a 3D model of the game field. The 2D image produced by the renderer is buffered in a double-buffer module which interfaces with the labkit SRAM. An SVGA module uses these buffered images to generate monitor outputs.

The renderer is pipelined, and is divided into several submodules. These include a rotator, a translator, a triangle shader, a projector, and a pixel-painter. The rotator module uses matrix multiplication to rotate triangle vertices about the origin. The translator module uses signed subtraction to recenter the points about a new origin. The shader module calculates a vector normal to the triangle's plain, then take a dot product with the light-source vector, in order to calculate the proper color for the entire triangle. The projector module, uses the z-coordinate of each point to rescale the x and y coordinates, based on a given lens focal length. Finally, the pixel painter enumerates the pixels in the interior of the triangle, storing their colors and z-coordinates to the buffer module.

Project Files

Presentation (PDF)

Report (PDF)

Report Appendix (PDF)

Project on Laser Pointer Mouse

The purpose of this project is to design an implement a laser pointer mouse. When doing a PowerPoint presentation or using the computer for any other occasion for which it is inconvenient to be sitting in front of it, users would like a way to control the computer remotely. The laser pointer mouse allows lecturers and presenters to point at the screen, and, with the press of a button, move the mouse cursor to the location of the laser, without ever touching the computer or mouse. A few more buttons allow the user to perform wirelessly transmitted left, right, and double clicks. Support for drawing over the screen, e.g. arrows and circles for increased presentation effectiveness, will be implemented as time permits. The system will be implemented in Verilog, and realized on the FPGA on the 6.111 labkit.

  

Project Files

Presentation (PDF)

Report (PDF - 5.7 MB)

Report Appendix (PDF)

Project on Fingerprint Verification System

We will design and implement an image recognition system to identify fingerprints based on a given database. We will begin by inputting simple images and checking that the system accurately identifies those images. As the system is developed, more complex images can be used. The final stage of the project will involve identifying an individual's fingerprint based on standard points of identification used in common practice.

This project consists of a few stages. The initial stage will involve creating a database in memory for the image comparison. The next stage will be developing an interface between the camera and a RAM to store the image that needs to be identified. Once the image has been loaded into the system, it must be processed to select the appropriate characteristics for the comparison to the database. The processed image will then be compared to the images in the database to determine the quality of the similarities. The most similar image will be selected and presented to the user interface along with the quality of the identification.

                  

The image processing will involve a series of filters in the spatial domain. There will be an edge-detection filter to sharpen the image, prior to binarization of the fingerprint. Another filter will select the unique components of the fingerprint. The database will contain the post-processed fingerprint information to minimize the size of the stored data. The database size will be limited to the memory of the labkit, which will be sufficient to demonstrate the functionality of the fingerprint matching system.

The work will be split into two components. Bashira will be responsible for interfacing the camera to the labkit, as well as managing the data storage in memory. Cheryl will implement the image processing to isolate the data for the analysis and the matching. Once the fingerprint recognition scheme is working, both team members will work to enhance the identification interface as time allows to create a visually appealing result.

 

Project Files

Presentation (PDF)

Report (PDF)

Report Appendix (PDF)

Source : MIT

Project - Wireless Surveillance System

This project implements a networked video surveillance system in digital logic. It allows a user to view video input from a remote camera on a VGA monitor by capturing camera data, encoding it, transmitting it wirelessly, and subsequently receiving, decoding, and re-displaying the data. To test the system, the project is divided into three main components: video capture/display, data encoding/decoding, and wireless transmission/reception. Each part is put through a comprehensive series of tests using Model Sim and simulated data. Once each component passes design and functional tests, all three components are then connected to transmit video data wirelessly

                 

Project Files

Presentation (PDF)

Report (PDF)

Report Appendix (PDF)

Source : MIT university

Project - Instant messaging

Instant messaging (IM) is a collection of technologies used for text-based communication between two or more participants over the Internet or other types of networks. Of importance is that online chat and instant messaging differs from other technologies such as e-mail due to the perceived synchronicity of the communications by the users –chat happens in real-time. Some systems permit messages to be sent to people not currently 'logged on' (offline messages), thus removing some of the differences between IM and e-mail (often done by sending the message to the associated e-mail account).

                     

IM allows effective and efficient communication, allowing immediate receipt of acknowledgment or reply. In many cases instant messaging includes additional features which can make it even more popular. For example, users can see each other by using webcams, or talk directly for free over the Internet using a microphone and headphones or loudspeakers. Many client programs allow file transfers as well, although they are typically limited in the permissible file-size.

It is typically possible to save a text conversation for later reference. Instant messages are often logged in a local message history, making it similar to the persistent nature of e-mails.

Team building lab (PDF)

Networking lab (PDF)

Optional lab: graphical user interfaces in Swing (PDF)

Project (PDF)

Project Source code - Instant messaging

guichat (ZIP) (This ZIP file contains 2 .jar files, 2 .java files and 2 files with no file extension.)

friendly (ZIP) (This ZIP file contains 6 .java files and 2 files with no file extension.)

guiwords (ZIP) (This ZIP file contains 2 .jar files, 2 .java files and 3 files with no file extension.)

Seminar on Laser Communications

Optical communications, in various forms, have been used for thousands of years. The Ancient Greeks polished their shields to send signals during battle. In the modern era, semaphores and wireless solar telegraphs called heliographs were developed, using coded signals to communicate with their recipients.
In 1880 Alexander Graham Bell and his assistant Charles Sumner Tainter created the Photo phone, at Bell's newly established Volta Laboratory in Washington, DC. Bell considered it his most important invention. The device allowed for the transmission of sound on a beam of light. On June 3, 1880, Bell conducted the world's first wireless telephone transmission between two buildings, some 213 meters apart. Its first practical use came in military communication systems many decades later.
Carl Zeiss Jena developed the Licht sprechgerät 80 (direct translation: light speaking device) that the German army used in their World War II anti-aircraft defense units.

The invention of lasers in the 1960s revolutionized free space optics. Military organizations were particularly interested and boosted their development. However the technology lost market momentum when the installation of optical fiber networks for civilian uses was at its peak. Many simple and inexpensive consumer remote controls use low-speed communication using infrared (IR) light. This known as consumer IR technologies.

Power point presentation on laser communications

Laser Communications
Free Space Laser Communications
Laser Communication 2
Laser Communication 3
Free-Space Optical Communications for Tactical Applications
The Future of Satellite Communications
Semiconductor Sources for Optical Communications

Saturday, July 16, 2011

Project - Online Examination System

Online Examination System (OES) is a MCQ(Multiple Choice Questions) based Examination system, which is built using PHP and MySQL. OES provides an easy-to-use environment for preparing questions, conducting exams and managing results

 

 

Here is a working Online Examination system

It can be downloaded from here

http://sourceforge.net/projects/oes/files/OES-without-Installer-v.1.1.zip/download

Power point presentation on Online Examination system

Online Examination System
Online Examination Using Farming Based System
Online Exam/Paper Management System
ONLINE EXAMINATION

Nanotechnology

Nanotechnology (sometimes shortened to "nanotech") is the study of manipulating matter on an atomic and molecular scale. Generally, nanotechnology deals with structures sized between 1 to 100 nano metre in at least one dimension, and involves developing materials or devices possessing at least one dimension within that size. Quantum mechanical effects are very important at this scale, which is in the quantum realm.
Nanotechnology is very diverse, ranging from extensions of conventional device physics to completely new approaches based upon molecular self-assembly, from developing new materials with dimensions on the nano scale to investigating whether we can directly control matter on the atomic scale.
There is much debate on the future implications of nanotechnology. Nanotechnology may be able to create many new materials and devices with a vast range of applications, such as in medicine, electronics, biomaterials and energy production. On the other hand, nanotechnology raises many of the same issues as any new technology, including concerns about the toxicity and environmental impact of nano materials, and their potential effects on global economics, as well as speculation about various doomsday scenarios. These concerns have led to a debate among advocacy groups and governments on whether special regulation of nanotechnology is warranted.

Power Point presentation on Nanotechnology
 Introduction to Nanotechnology
Economic Impacts of Nanotechnology
Oklahoma Nanotechnology Initiative
Nanotechnology Challenges and Fears
Nanotechnology
Challenges of Nanotechnology

Project on Library Management System

An integrated library system (ILS), also known as a library management system (LMS), is an enterprise resource planning system for a library, used to track items owned, orders made, bills paid, and patrons who have borrowed.

An ILS usually comprises a relational database, software to interact with that database, and two graphical user interfaces (one for patrons, one for staff). Most ILSes separate software functions into discrete programs called modules, each of them integrated with a unified interface. Examples of modules might include:

acquisitions (ordering, receiving, and invoicing materials)
    cataloging (classifying and indexing materials)
    circulation (lending materials to patrons and receiving them back)
    serials (tracking magazine and newspaper holdings)
    the OPAC (public interface for users)

 

    

Each patron and item has a unique ID in the database that allows the ILS to track its activity.

Larger libraries use an ILS to order and acquire, receive and invoice, catalog, circulate, track and shelve materials. Smaller libraries, such as those in private homes or non-profit organizations (like churches or synagogues, for instance), often forgo the expense and maintenance required to run an ILS, and instead use a library computer system.

Power point presentation on Library Management System

Library Management System
LIBRARY MANAGEMENT SYSTEM 2
RFID BASED LIBRARY MANAGEMENT SYSTEM
School library management system
Introduction to Open Source Library Management Systems
Mobile Library Management System
Online Library Management System

Seminar on web application security

A web application security scanner is program which communicates with a web application through the web front-end in order to identify potential security vulnerabilities in the web application and architectural weaknesses. It performs a black-box test. Unlike source code scanners, web application scanners don't have access to the source code and therefore detect vulnerabilities by actually performing attacks.

                                                                                                                    

A web application security scanner can facilitate the automated review of a web application with the expressed purpose of discovering security vulnerabilities, and are required to comply with various regulatory requirements. Web application scanners can look for a wide variety of vulnerabilities, including:

  • Input/Output validation: (Cross-site scripting, SQL Injection, etc.)
  • Specific application problems
  • Server configuration mistakes/errors/version

Power point presentation on web application security

Web application security
Web Application Security 1
Web Application Security - Black Hat
Introduction to Web Application Security and App
E-security solutions: Web Applications Security and challenges
Web Application Security 2
Building a Robust Web Application Security Plan
Web Application Security Whitepaper

Tuesday, July 5, 2011

.Net Framework Security

.NET has its own security mechanism with two general features: Code Access Security (CAS), and validation and verification. Code Access Security is based on evidence that is associated with a specific assembly. Typically the evidence is the source of the assembly (whether it is installed on the local machine or has been downloaded from the intranet or Internet). Code Access Security uses evidence to determine the permissions granted to the code. Other code can demand that calling code is granted a specified permission. The demand causes the CLR to perform a call stack walk: every assembly of each method in the call stack is checked for the required permission; if any assembly is not granted the permission a security exception is thrown. however, has to split the application into subdomains; it is not done by the CLR.

            

Code Access Security (CAS), in the Microsoft .NET framework, is Microsoft's solution to prevent untrusted code from performing privileged actions. When the CLR loads an assembly it will obtain evidence for the assembly and use this to identify the code group that the assembly belongs to. A code group contains a permission set (one or more permissions). Code that performs a privileged action will perform a code access demand which will cause the CLR to walk up the call stack and examine the permission set granted to the assembly of each method in the call stack. The code groups and permission sets are determined by the administrator of the machine who defines the security policy.

Power point Presentation on .net Framework Security

 

Monday, July 4, 2011

Seminar on .NET framework

The .NET Framework (pronounced dot net) is a software framework that runs primarily on Microsoft Windows. It includes a large library and supports several programming languages which allows language interoperability (each language can use code written in other languages). The .NET library is available to all the programming languages that .NET supports. Programs written for the .NET Framework execute in a software environment (as contrasted to hardware environment), known as the Common Language Runtime (CLR), an application virtual machine that provides important services such as security, memory management, and exception handling. The class library and the CLR together constitute the .NET Framework.

              

The .NET Framework's Base Class Library provides user interface, data access, database connectivity, cryptography, web application development, numeric algorithms, and network communications. Programmers produce software by combining their own source code with the .NET Framework and other libraries. The .NET Framework is intended to be used by most new applications created for the Windows platform. Microsoft also produces a popular integrated development environment largely for .NET software called Visual Studio.

 

Power point presentation on .NET Framework

Sunday, July 3, 2011

Seminar on Artificial intelligence

Artificial intelligence (AI) is the intelligence of machines and the branch of computer science that aims to create it. AI textbooks define the field as "the study and design of intelligent agents" where an intelligent agent is a system that perceives its environment and takes actions that maximize its chances of success. John McCarthy, who coined the term in 1956, defines it as "the science and engineering of making intelligent machines."

  

The field was founded on the claim that a central property of humans, intelligence—the sapience of Homo sapiens—can be so precisely described that it can be simulated by a machine. This raises philosophical issues about the nature of the mind and the ethics of creating artificial beings, issues which have been addressed by myth, fiction and philosophy since antiquity. Artificial intelligence has been the subject of optimism, but has also suffered setbacks and, today, has become an essential part of the technology industry, providing the heavy lifting for many of the most difficult problems in computer science.

Power point presentations on Artificial intelligence

Seminar on Unlicenced Mobile Access

Generic Access Network or GAN is a telecommunication system that extends mobile voice, data and IP Multimedia Subsystem/Session Initiation Protocol (IMS/SIP) applications over IP networks. Unlicensed Mobile Access or UMA, is the commercial name used by mobile carriers for external IP access into their core networks.

The most common application of GAN is in a dual-mode handset service where subscribers can seamlessly handover connections between wireless LANs and wide area networks using a GSM/Wi-Fi dual-mode mobile phone. UMA technology has enabled the convergence of mobile, fixed and Internet telephony, sometimes called Fixed Mobile Convergence.

                       

The local network may be based on private unlicensed spectrum technologies like 802.11, while the wide network is alternatively GSM/GPRS or UMTS mobile services. On the cellular network, the mobile handset communicates over the air with a base station, through a base station controller, to servers in the core network of the carrier.

Under the GAN system, when the handset detects a wireless LAN, it establishes a secure IP connection through a gateway to a server called a GAN Controller (GANC) on the carrier's network. The GANC presents to the mobile core network as a standard cellular base station. The handset communicates with the GANC over the secure connection using existing GSM/UMTS protocols. Thus, when a mobile moves from a GSM to an 802.11 network, it appears to the core network as if it is simply on a different base station.

Power point presentation on UMA

Saturday, July 2, 2011

Another list of Seminar topics

Hi,

Please find another list of Computer science , information technology and electronics seminar topics.

I will be adding many more such topics in coming future. Please post your comments whether these are helpful or not. And also, if you have any suggestion, please let me know so that I can incorporate that too.

Thanks!

List of Seminar topics

Hi All,

Here is the large number of seminar topics on computer science, information technology and electronics along with seminar materials provided. I hope these materials & topics will be helpful for all of you.

If you want any further information, please feel free to post your request in the comment section. I will try to assist in all possible manner.

Thanks!

Friday, July 1, 2011

Seminar on SDLC

The Systems Development Life Cycle (SDLC), or Software Development Life Cycle in systems engineering, information systems and software engineering, is the process of creating or altering systems, and the models and methodologies that people use to develop these systems. The concept generally refers to computer or information systems. Emphasis on this article (SLDC) is on man-made technological life-cycle. But there are many other life-cycle models to choose from. This includes ecological life cycles, for every life cycle, whether biological or technological, has a beginning and an end.

In software engineering the SDLC concept underpins many kinds of software development methodologies. These methodologies form the framework for planning and controlling the creation of an information system: the software development process.

 

Systems Development Life Cycle (SDLC) is a process used by a systems analyst to develop an information system, including requirements, validation, training, and user (stakeholder) ownership. Any SDLC should result in a high quality system that meets or exceeds customer expectations, reaches completion within time and cost estimates, works effectively and efficiently in the current and planned Information Technology infrastructure, and is inexpensive to maintain and cost-effective to enhance.

Computer systems are complex and often (especially with the recent rise of Service-Oriented Architecture) link multiple traditional systems potentially supplied by different software vendors. To manage this level of complexity, a number of SDLC models or methodologies have been created, such as "waterfall"; "spiral"; "Agile software development"; "rapid prototyping"; "incremental"; and "synchronize and stabilize"

Power point presentation on Systems Development Life Cycle

Seminar on fingerprint recognition

Fingerprint recognition or fingerprint authentication refers to the automated method of verifying a match between two human fingerprints. Fingerprints are one of many forms of biometrics used to identify individuals and verify their identity. This article touches on two major classes of algorithms (minutia and pattern) and four sensor designs (optical, ultrasonic, passive capacitance, and active capacitance).

A fingerprint sensor is an electronic device used to capture a digital image of the fingerprint pattern. The captured image is called a live scan. This live scan is digitally processed to create a biometric template (a collection of extracted features) which is stored and used for matching. This is an overview of some of the more commonly used fingerprint sensor technologies.

                     

Optical fingerprint imaging involves capturing a digital image of the print using visible light. This type of sensor is, in essence, a specialized digital camera. The top layer of the sensor, where the finger is placed, is known as the touch surface. Beneath this layer is a light-emitting phosphor layer which illuminates the surface of the finger. The light reflected from the finger passes through the phosphor layer to an array of solid state pixels (a charge-coupled device) which captures a visual image of the fingerprint. A scratched or dirty touch surface can cause a bad image of the fingerprint. A disadvantage of this type of sensor is the fact that the imaging capabilities are affected by the quality of skin on the finger. For instance, a dirty or marked finger is difficult to image properly. Also, it is possible for an individual to erode the outer layer of skin on the fingertips to the point where the fingerprint is no longer visible. It can also be easily fooled by an image of a fingerprint if not coupled with a "live finger" detector. However, unlike capacitive sensors, this sensor technology is not susceptible to electrostatic discharge damage.

Power point Presentation on Fingerprint recognition

Project Abstract - Hospital Management System

A hospital information system (HIS), variously also called clinical information system (CIS) is a comprehensive, integrated information system designed to manage the administrative, financial and clinical aspects of a hospital. This encompasses paper-based information processing as well as data processing machines.

It can be composed of one or a few software components with specialty-specific extensions as well as of a large variety of sub-systems in medical specialties (e.g. Laboratory Information System, Radiology Information System).

 

              

 

CISs are sometimes separated from HISs in that the former concentrate on patient-related and clinical-state-related data (electronic patient record) whereas the latter keeps track of administrative issues. The distinction is not always clear and there is contradictory evidence against a consistent use of both terms.

Power point presentation on Hospital Management System

Seminar on Android

Android is a software stack for mobile devices that includes an operating system, middleware and key applications. Google Inc. purchased the initial developer of the software, Android Inc., in 2005. Android's mobile operating system is based on the Linux kernel. Google and other members of the Open Handset Alliance collaborated on Android's development and release. The Android Open Source Project (AOSP) is tasked with the maintenance and further development of Android.The Android operating system is currently the world's best-selling Smartphone platform.

Android has a large community of developers writing applications ("apps") that extend the functionality of the devices. There are currently over 200,000 apps available for Android. Android Market is the online app store run by Google, though apps can also be downloaded from third-party sites. Developers write primarily in the Java language, controlling the device via Google-developed Java libraries.

                

The unveiling of the Android distribution on 5 November 2007 was announced with the founding of the Open Handset Alliance, a consortium of 80 hardware, software, and telecom companies devoted to advancing open standards for mobile devices. Google released most of the Android code under the Apache License, a free software and open source license

The Android open-source software stack consists of Java applications running on a Java-based, object-oriented application framework on top of Java core libraries running on a Dalvik virtual machine featuring JIT compilation. Libraries written in C include the surface manager, OpenCore[21] media framework, SQLite relational database management system, OpenGL ES 2.0 3D graphics API, WebKit layout engine, SGL graphics engine, SSL, and Bionic libc. The Android operating system, including the Linux kernel, consists of roughly 12 million lines of code including 3 million lines of XML, 2.8 million lines of C, 2.1 million lines of Java, and 1.75 million lines of C++.

Power point presentation on Android