Showing posts with label Project Topics. Show all posts
Showing posts with label Project Topics. Show all posts

Sunday, September 23, 2012

Project abstract - Optimizing Search Engines using Clickthrough Data

This paper presents an approach to automatically optimizing the retrieval quality of search engines using clickthrough data. Intuitively, a good information retrieval system should present relevant documents high in the ranking, with less relevant documents following below. While previous approaches to learning retrieval functions from examples exist, they typically require training data generated from relevance judgments by experts. This makes them difficult and expensive to apply. The goal of this paper is to develop a method that utilizes clickthrough data for training, namely the query-log of the search engine in connection with the log of links the users clicked on in the presented ranking. Such clickthrough data is available in abundance and can be recorded at very low cost. Taking a Support Vector Machine (SVM) approach, this paper presents a method for learning retrieval functions. From a theoretical perspective, this method is shown to be well-founded in a risk minimization framework. Furthermore, it is shown to be feasible even for large sets of queries and features. The theoretical results are verified in a controlled experiment. It shows that the method can effectively adapt the retrieval function of a meta-search engine to a particular group of users, outperforming Google in terms of retrieval quality after only a couple of hundred training examples.

Download

Image Mosaicing for Tele-Reality Applications

While a large number of virtual reality applications, such as fluid flow analysis and molecular modeling, deal with simulated data, many newer applications attempt to recreate true reality as convincingly as possible. Building detailed models for such applications, which we call tele-reality, is a major bottleneck holding back their deployment. In this paper, we present techniques for automatically deriving realistic 2-D scenes and 3-D texture-mapped models from video sequences, which can help overcome this bottleneck. The fundamental technique we use is image mosaicing, i.e., the automatic alignment of multiple images into larger aggregates which are then used to represent portions of a 3-D scene. We begin with the easiest problems, those of flat scene and panoramic scene mosaicing, and progress to more complicated scenes, culminating in full 3-D models. We also present a number of novel applications based on tele-reality technology.

Download

Project abstract- The Entity-Relationship Model

A data model, called the entity-relationship model, is proposed. This model incorporates some of the important semantic information about the real world. A special diagrammatic technique is introduced as a tool for database design. An example of database design and description using the model and the diagrammatic technique is given. Some implications for data integrity, infor-mation retrieval, and data manipulation are discussed. The entity-relationship model can be used as a basis for unification of different views of data: t,he network model, the relational model, and the entity set model. Semantic ambiguities in these models are analyzed. Possible ways to derive their views of data from the entity-relationship model are presented. Key Words and Phrases: database design, logical view of data, semantics of data, data models, entity-relationship model, relational model, Data Base Task Group, network model.

Download

Project Absract- Resilient Overlay Networks

A Resilient Overlay Network (RON) is an architecture that allows distributed Internet applications to detect and recover from path outages and periods of degraded performance within several seconds, improving over today’s wide-area routing protocols that take at least several minutes to recover. A RON is an application-layer overlay on top of the existing Internet routing substrate. The RON nodes monitor the functioning and quality of the Internet paths among themselves, and use this information to decide whether to route packets directly over the Internet or by way of other RON nodes, optimizing application-specific routing metrics. Results from two sets of measurements of a working RON deployed at sites scattered across the Internet demonstrate the benefits of our architecture. For instance, over a 64-hour sampling period in March 2001 across a twelve-node RON, there were 32 significant outages, each lasting over thirty minutes, over the 132 measured paths. RON’s routing mechanism was able to detect, recover, and route around all of them, in less than twenty seconds on average, showing that its methods for fault detection and recovery work well at discovering alternate paths in the Internet. Furthermore, RON was able to improve the loss rate, latency, or throughput perceived by data transfers; for example, about 5 % of the transfers doubled their TCP throughput and 5 % of our transfers saw their loss probability reduced by 0.05. We found that forwarding packets via at most one intermediate RON node is sufficient to overcome faults and improve performance in most cases. These improvements, particularly in the area of fault detection and recovery, demonstrate the benefits of moving some of the control over routing into the hands of end-systems.

Download

Project – Student management System in java

A student information system (SIS) is a software application for education establishments to manage student data. Student information systems for entering student testa school, college or university. Also known as student information management system (SIMS), student records system (SRS), student management system (SMS), campus management system (CMS) or school management system (SMS).

These systems vary in size, scope and capability, from packages that are implemented in relatively small organizations to cover student records alone, to enterprise-wide solutions that aim to cover most aspects of running large multi-campus organizations with significant local responsibility. Many systems can be scaled to different levels of functionality by purchasing add-on "modules" and can typically be configured by their home institutions to meet local needs.

Reference

Source http://lernjava.blogspot.in/2010/04/student-management-system-project-in.html

Second Open source program for reference http://sourceforge.net/p/freesms/code/76/tree/

 

 

Monday, August 15, 2011

122 Seminar & projects

Here are 122 seminar topics related to computer science, electronics and  electrical field along with power point presentation.

    1. Project Abstract - E-Learning
    2. Seminar on SMTP
    3. Seminar on Software as a service
    4. Project - Time Attendance
    5. Tabu Search Algorithm For Cluster Building In Wire...
    6. Seminar on Online identity management
    7. Seminar on Website Marketing
    8. Seminar on Personality development
    9. How to make a Presentation
    10. Seminar on Project management
    11. Seminar on leadership qualities
    12. Seminar on Linux Virtual File System
    13. Internet Marketing Strategy
    14. Seminar on Internet Marketing
    15. Seminar on Affiliate marketing
    16. Seminar on Search Engine Marketing
    17. Seminar on Time management
    18. Seminar on Java Security
    19. Web Services in Java
    20. Seminar on SDLC
    21. Seminar on fingerprint recognition
    22. Project Abstract - Hospital Management System
    23. Seminar on Android
    24. Seminar on Organizational information systems
    25. Project - Digital library
    26. Seminar on E-Business
    27. Seminar on Iris Scanning
    28. Grid network
    29. Earth Simulator
    30. M-Commerce
    31. Socket Programming
    32. video door phone
    33. CCTV System
    34. WI-MAX
    35. WISENET
    36. Optical fiber communication
    37. Lightweight Directory Access Protocol
    38. Kerberos
    39. Organic light emitting diode (OLED)
    40. Augmented Reality
    41. The Bionic Eye
    42. Optical Communications in Space
    43. 4G Wireless Systems
    44. Bittorrent
    45. Wireless USB
    46. Tripwire
    47. Data mining
    48. Interactive Voice Response
    49. Nessus
    50. Mobile Computing
    51. Holographic Versatile Disc
    52. Satellite radio
    53. Silverlight
    54. Bluetooth
    55. Wearable computers
    56. Cluster computing
    57. Quantum computer
    58. HVAC
    59. Mobile IP
    60. FireWire
    61. Home Networking
    62. Plasma display
    63. PLAN 9 Operating system
    64. Global Positioning System
    65. Spyware and Trojan horses
    66. Voice over Internet Protocol
    67. SSL-TLS
    68. PolyBot - Modular, self-reconfigurable robots
    69. Facial recognition system
    70. Captchas
    71. Ext3 File System
    72. Embedded Linux
    73. Computer forensics
    74. Security Protocol For Sensor Network
    75. Signal processing
    76. Seminar on Smoke detector
    77. Seminar on Motion detector
    78. Seminar on Transformer
    79. Seminar Test automation framework
    80. Seminar on Digital and analog signals
    81. Seminar on Programmable logic controller
    82. Seminar on LED
    83. Seminar on power systems automations
    84. Seminar on Flight Simulator
    85. Application Server
    86. Inventory Control System
    87. Seminar - Online Gaming
    88. Project – Online Survey System
    89. Project Abstract - Traffic Management System
    90. Seminar on IPTV
    91. Seminar on Smartphone
    92. Seminar on Real-Time Operating Systems
    93. Seminar on Agile Methodology
    94. Project on GPS Integrity Monitoring
    95. Seminar on Listening Skills
    96. Seminar on Communication Skills
    97. Seminar on Mobile commerce
    98. Project - Payroll Management System
    99. Seminar on SAP CRM
    100. Seminar on Sales Tracking
    101. Seminar on Marketing
    102. Seminar on Sap R/3 Architecture
    103. Seminar on Software Project Management
    104. Seminar on Motivation
    105. Seminar on CRM
    106. Enterprise resource planning
    107. Seminar on Cloud computing
    108. Project - 2D Sonar
    109. Project - 3D Pong
    110. Project on Laser Pointer Mouse
    111. Project on Fingerprint Verification System
    112. Project - Wireless Surveillance System
    113. Project - Instant messaging
    114. Seminar on Laser Communications
    115. Project - Online Examination System
    116. Nanotechnology
    117. Project on Library Management System
    118. Seminar on web application security
    119. .Net Framework Security
    120. Seminar on .NET framework
    121. Seminar on Artificial intelligence
    122. Seminar on Unlicenced Mobile Access

Incase, you have any suggestion or wants me to add any topic. Kindly post in the comment section.

Thanks!

Sunday, August 7, 2011

Inventory Control System

An inventory control system is a process for managing and locating objects or materials. In common usage, the term may also refer to just the software components.
Modern inventory control systems often rely upon barcodes and RFID tags to provide automatic identification of inventory objects. In an academic study performed at Wal-Mart, RFID reduced Out of Stocks by 30 percent for products selling between 0.1 and 15 units a day. Inventory objects could include any kind of physical asset: merchandise, consumables, fixed assets, circulating tools, library books, or capital equipment. To record an inventory transaction, the system uses a barcode scanner or RFID reader to automatically identify the inventory object, and then collects additional information from the operators via fixed terminals (workstations), or mobile computers.


An inventory control system may be used to automate a sales order fulfillment process. Such a system contains a list of order to be filled, and then prompts workers to pick the necessary items, and provides them with packaging and shipping information.
An inventory system also manages in and outwards material of hardware.
Real-time inventory control systems may use wireless, mobile terminals to record inventory transactions at the moment they occur. A wireless LAN transmits the transaction information to a central database.

PowerPoint Presentation on inventory control system

Inventory Management I
Inventory Management 2
Inventory Management 3
Inventory Systems for Independent Demand
DISTRIBUTION INVENTORY SYSTEMS
Inventory control model

Sunday, July 17, 2011

Project on Fingerprint Verification System

We will design and implement an image recognition system to identify fingerprints based on a given database. We will begin by inputting simple images and checking that the system accurately identifies those images. As the system is developed, more complex images can be used. The final stage of the project will involve identifying an individual's fingerprint based on standard points of identification used in common practice.

This project consists of a few stages. The initial stage will involve creating a database in memory for the image comparison. The next stage will be developing an interface between the camera and a RAM to store the image that needs to be identified. Once the image has been loaded into the system, it must be processed to select the appropriate characteristics for the comparison to the database. The processed image will then be compared to the images in the database to determine the quality of the similarities. The most similar image will be selected and presented to the user interface along with the quality of the identification.

                  

The image processing will involve a series of filters in the spatial domain. There will be an edge-detection filter to sharpen the image, prior to binarization of the fingerprint. Another filter will select the unique components of the fingerprint. The database will contain the post-processed fingerprint information to minimize the size of the stored data. The database size will be limited to the memory of the labkit, which will be sufficient to demonstrate the functionality of the fingerprint matching system.

The work will be split into two components. Bashira will be responsible for interfacing the camera to the labkit, as well as managing the data storage in memory. Cheryl will implement the image processing to isolate the data for the analysis and the matching. Once the fingerprint recognition scheme is working, both team members will work to enhance the identification interface as time allows to create a visually appealing result.

 

Project Files

Presentation (PDF)

Report (PDF)

Report Appendix (PDF)

Source : MIT

Project - Wireless Surveillance System

This project implements a networked video surveillance system in digital logic. It allows a user to view video input from a remote camera on a VGA monitor by capturing camera data, encoding it, transmitting it wirelessly, and subsequently receiving, decoding, and re-displaying the data. To test the system, the project is divided into three main components: video capture/display, data encoding/decoding, and wireless transmission/reception. Each part is put through a comprehensive series of tests using Model Sim and simulated data. Once each component passes design and functional tests, all three components are then connected to transmit video data wirelessly

                 

Project Files

Presentation (PDF)

Report (PDF)

Report Appendix (PDF)

Source : MIT university

Project - Instant messaging

Instant messaging (IM) is a collection of technologies used for text-based communication between two or more participants over the Internet or other types of networks. Of importance is that online chat and instant messaging differs from other technologies such as e-mail due to the perceived synchronicity of the communications by the users –chat happens in real-time. Some systems permit messages to be sent to people not currently 'logged on' (offline messages), thus removing some of the differences between IM and e-mail (often done by sending the message to the associated e-mail account).

                     

IM allows effective and efficient communication, allowing immediate receipt of acknowledgment or reply. In many cases instant messaging includes additional features which can make it even more popular. For example, users can see each other by using webcams, or talk directly for free over the Internet using a microphone and headphones or loudspeakers. Many client programs allow file transfers as well, although they are typically limited in the permissible file-size.

It is typically possible to save a text conversation for later reference. Instant messages are often logged in a local message history, making it similar to the persistent nature of e-mails.

Team building lab (PDF)

Networking lab (PDF)

Optional lab: graphical user interfaces in Swing (PDF)

Project (PDF)

Project Source code - Instant messaging

guichat (ZIP) (This ZIP file contains 2 .jar files, 2 .java files and 2 files with no file extension.)

friendly (ZIP) (This ZIP file contains 6 .java files and 2 files with no file extension.)

guiwords (ZIP) (This ZIP file contains 2 .jar files, 2 .java files and 3 files with no file extension.)

Saturday, July 16, 2011

Project - Online Examination System

Online Examination System (OES) is a MCQ(Multiple Choice Questions) based Examination system, which is built using PHP and MySQL. OES provides an easy-to-use environment for preparing questions, conducting exams and managing results

 

 

Here is a working Online Examination system

It can be downloaded from here

http://sourceforge.net/projects/oes/files/OES-without-Installer-v.1.1.zip/download

Power point presentation on Online Examination system

Online Examination System
Online Examination Using Farming Based System
Online Exam/Paper Management System
ONLINE EXAMINATION

Nanotechnology

Nanotechnology (sometimes shortened to "nanotech") is the study of manipulating matter on an atomic and molecular scale. Generally, nanotechnology deals with structures sized between 1 to 100 nano metre in at least one dimension, and involves developing materials or devices possessing at least one dimension within that size. Quantum mechanical effects are very important at this scale, which is in the quantum realm.
Nanotechnology is very diverse, ranging from extensions of conventional device physics to completely new approaches based upon molecular self-assembly, from developing new materials with dimensions on the nano scale to investigating whether we can directly control matter on the atomic scale.
There is much debate on the future implications of nanotechnology. Nanotechnology may be able to create many new materials and devices with a vast range of applications, such as in medicine, electronics, biomaterials and energy production. On the other hand, nanotechnology raises many of the same issues as any new technology, including concerns about the toxicity and environmental impact of nano materials, and their potential effects on global economics, as well as speculation about various doomsday scenarios. These concerns have led to a debate among advocacy groups and governments on whether special regulation of nanotechnology is warranted.

Power Point presentation on Nanotechnology
 Introduction to Nanotechnology
Economic Impacts of Nanotechnology
Oklahoma Nanotechnology Initiative
Nanotechnology Challenges and Fears
Nanotechnology
Challenges of Nanotechnology

Project on Library Management System

An integrated library system (ILS), also known as a library management system (LMS), is an enterprise resource planning system for a library, used to track items owned, orders made, bills paid, and patrons who have borrowed.

An ILS usually comprises a relational database, software to interact with that database, and two graphical user interfaces (one for patrons, one for staff). Most ILSes separate software functions into discrete programs called modules, each of them integrated with a unified interface. Examples of modules might include:

acquisitions (ordering, receiving, and invoicing materials)
    cataloging (classifying and indexing materials)
    circulation (lending materials to patrons and receiving them back)
    serials (tracking magazine and newspaper holdings)
    the OPAC (public interface for users)

 

    

Each patron and item has a unique ID in the database that allows the ILS to track its activity.

Larger libraries use an ILS to order and acquire, receive and invoice, catalog, circulate, track and shelve materials. Smaller libraries, such as those in private homes or non-profit organizations (like churches or synagogues, for instance), often forgo the expense and maintenance required to run an ILS, and instead use a library computer system.

Power point presentation on Library Management System

Library Management System
LIBRARY MANAGEMENT SYSTEM 2
RFID BASED LIBRARY MANAGEMENT SYSTEM
School library management system
Introduction to Open Source Library Management Systems
Mobile Library Management System
Online Library Management System

Seminar on web application security

A web application security scanner is program which communicates with a web application through the web front-end in order to identify potential security vulnerabilities in the web application and architectural weaknesses. It performs a black-box test. Unlike source code scanners, web application scanners don't have access to the source code and therefore detect vulnerabilities by actually performing attacks.

                                                                                                                    

A web application security scanner can facilitate the automated review of a web application with the expressed purpose of discovering security vulnerabilities, and are required to comply with various regulatory requirements. Web application scanners can look for a wide variety of vulnerabilities, including:

  • Input/Output validation: (Cross-site scripting, SQL Injection, etc.)
  • Specific application problems
  • Server configuration mistakes/errors/version

Power point presentation on web application security

Web application security
Web Application Security 1
Web Application Security - Black Hat
Introduction to Web Application Security and App
E-security solutions: Web Applications Security and challenges
Web Application Security 2
Building a Robust Web Application Security Plan
Web Application Security Whitepaper

Friday, July 1, 2011

Seminar on SDLC

The Systems Development Life Cycle (SDLC), or Software Development Life Cycle in systems engineering, information systems and software engineering, is the process of creating or altering systems, and the models and methodologies that people use to develop these systems. The concept generally refers to computer or information systems. Emphasis on this article (SLDC) is on man-made technological life-cycle. But there are many other life-cycle models to choose from. This includes ecological life cycles, for every life cycle, whether biological or technological, has a beginning and an end.

In software engineering the SDLC concept underpins many kinds of software development methodologies. These methodologies form the framework for planning and controlling the creation of an information system: the software development process.

 

Systems Development Life Cycle (SDLC) is a process used by a systems analyst to develop an information system, including requirements, validation, training, and user (stakeholder) ownership. Any SDLC should result in a high quality system that meets or exceeds customer expectations, reaches completion within time and cost estimates, works effectively and efficiently in the current and planned Information Technology infrastructure, and is inexpensive to maintain and cost-effective to enhance.

Computer systems are complex and often (especially with the recent rise of Service-Oriented Architecture) link multiple traditional systems potentially supplied by different software vendors. To manage this level of complexity, a number of SDLC models or methodologies have been created, such as "waterfall"; "spiral"; "Agile software development"; "rapid prototyping"; "incremental"; and "synchronize and stabilize"

Power point presentation on Systems Development Life Cycle

Seminar on fingerprint recognition

Fingerprint recognition or fingerprint authentication refers to the automated method of verifying a match between two human fingerprints. Fingerprints are one of many forms of biometrics used to identify individuals and verify their identity. This article touches on two major classes of algorithms (minutia and pattern) and four sensor designs (optical, ultrasonic, passive capacitance, and active capacitance).

A fingerprint sensor is an electronic device used to capture a digital image of the fingerprint pattern. The captured image is called a live scan. This live scan is digitally processed to create a biometric template (a collection of extracted features) which is stored and used for matching. This is an overview of some of the more commonly used fingerprint sensor technologies.

                     

Optical fingerprint imaging involves capturing a digital image of the print using visible light. This type of sensor is, in essence, a specialized digital camera. The top layer of the sensor, where the finger is placed, is known as the touch surface. Beneath this layer is a light-emitting phosphor layer which illuminates the surface of the finger. The light reflected from the finger passes through the phosphor layer to an array of solid state pixels (a charge-coupled device) which captures a visual image of the fingerprint. A scratched or dirty touch surface can cause a bad image of the fingerprint. A disadvantage of this type of sensor is the fact that the imaging capabilities are affected by the quality of skin on the finger. For instance, a dirty or marked finger is difficult to image properly. Also, it is possible for an individual to erode the outer layer of skin on the fingertips to the point where the fingerprint is no longer visible. It can also be easily fooled by an image of a fingerprint if not coupled with a "live finger" detector. However, unlike capacitive sensors, this sensor technology is not susceptible to electrostatic discharge damage.

Power point Presentation on Fingerprint recognition

Project Abstract - Hospital Management System

A hospital information system (HIS), variously also called clinical information system (CIS) is a comprehensive, integrated information system designed to manage the administrative, financial and clinical aspects of a hospital. This encompasses paper-based information processing as well as data processing machines.

It can be composed of one or a few software components with specialty-specific extensions as well as of a large variety of sub-systems in medical specialties (e.g. Laboratory Information System, Radiology Information System).

 

              

 

CISs are sometimes separated from HISs in that the former concentrate on patient-related and clinical-state-related data (electronic patient record) whereas the latter keeps track of administrative issues. The distinction is not always clear and there is contradictory evidence against a consistent use of both terms.

Power point presentation on Hospital Management System

Thursday, June 30, 2011

Project Abstract - E-Learning

E-learning comprises all forms of electronically supported learning and teaching. The information and communication systems, whether networked learning or not, serve as specific media to implement the learning process.[1] The term will still most likely be utilized to reference out-of-classroom and in-classroom educational experiences via technology, even as advances continue in regard to devices and curriculum.

              

E-learning is essentially the computer and network-enabled transfer of skills and knowledge. E-learning applications and processes include Web-based learning, computer-based learning, virtual education opportunities and digital collaboration. Content is delivered via the Internet, intranet/extranet, audio or video tape, satellite TV, and CD-ROM. It can be self-paced or instructor-led and includes media in the form of text, image, animation, streaming video and audio.

Abbreviations like CBT (Computer-Based Training), IBT (Internet-Based Training) or WBT (Web-Based Training) have been used as synonyms to e-learning. Today one can still find these terms being used, along with variations of e-learning such as elearning, Elearning, and eLearning. The terms will be utilized throughout this article to indicate their validity under the broader terminology of E-learning.

Power point presentation on E-Learning

Sunday, June 26, 2011

Project - Human Resource Management Systems

A Human Resource Management System (HRMS) or Human Resource Information System (HRIS), refers to the systems and processes at the intersection between human resource management (HRM) and information technology. It merges HRM as a discipline and in particular its basic HR activities and processes with the information technology field, whereas the programming of data processing systems evolved into standardized routines and packages of enterprise resource planning (ERP) software. On the whole, these ERP systems have their origin on software that integrates information from different applications into one universal database. The linkage of its financial and human resource modules through one database is the most important distinction to the individually and proprietary developed predecessors, which makes this software application both rigid and flexible.

            

Power point Presentation on the topic Human Resource Management System

Seminar on Software as a service

Software as a service (SaaS, typically pronounced [sæs]), sometimes referred to as "on-demand software," is a software delivery model in which software and its associated data are hosted centrally (typically in the (Internet) cloud) and are typically accessed by users using a thin client, normally using a web browser over the Internet.

While practically every Internet service (such as Web search engine or web-based email) is driven by some underlying software, the term software as a service is often used in the context of business applications, and in some cases even more narrowly as software in a category which has on-premises software; i.e., equivalent applications that are installed in businesses' computer networks or personal computers.

 

SaaS has become a common delivery model for most business applications, including accounting, collaboration, customer relationship management (CRM), enterprise resource planning (ERP), invoicing, human resource management (HRM), content management (CM) and service desk management. SaaS has been incorporated into the strategy of all leading enterprise software companies.

According to a Gartner Group estimate, SaaS sales in 2010 have reached $9B, up 15.7% from 2009, and are projected to increase to $10.7b in 2011, up 16.2% from 2010. Gartner Group also estimates that SaaS applications, which accounted for a little more than 10% of the total enterprise software market last year, would represent at least 16% of worldwide software sales by 2014.

The term software as a service (SaaS) is considered to be part of the nomenclature of cloud computing, along with infrastructure as a service (IaaS) and platform as a service (PaaS).

Power point presentation on Software as a service