Showing posts with label Topics. Show all posts
Showing posts with label Topics. Show all posts

Saturday, July 2, 2011

Another list of Seminar topics

Hi,

Please find another list of Computer science , information technology and electronics seminar topics.

I will be adding many more such topics in coming future. Please post your comments whether these are helpful or not. And also, if you have any suggestion, please let me know so that I can incorporate that too.

Thanks!

Friday, July 1, 2011

Seminar on SDLC

The Systems Development Life Cycle (SDLC), or Software Development Life Cycle in systems engineering, information systems and software engineering, is the process of creating or altering systems, and the models and methodologies that people use to develop these systems. The concept generally refers to computer or information systems. Emphasis on this article (SLDC) is on man-made technological life-cycle. But there are many other life-cycle models to choose from. This includes ecological life cycles, for every life cycle, whether biological or technological, has a beginning and an end.

In software engineering the SDLC concept underpins many kinds of software development methodologies. These methodologies form the framework for planning and controlling the creation of an information system: the software development process.

 

Systems Development Life Cycle (SDLC) is a process used by a systems analyst to develop an information system, including requirements, validation, training, and user (stakeholder) ownership. Any SDLC should result in a high quality system that meets or exceeds customer expectations, reaches completion within time and cost estimates, works effectively and efficiently in the current and planned Information Technology infrastructure, and is inexpensive to maintain and cost-effective to enhance.

Computer systems are complex and often (especially with the recent rise of Service-Oriented Architecture) link multiple traditional systems potentially supplied by different software vendors. To manage this level of complexity, a number of SDLC models or methodologies have been created, such as "waterfall"; "spiral"; "Agile software development"; "rapid prototyping"; "incremental"; and "synchronize and stabilize"

Power point presentation on Systems Development Life Cycle

Saturday, June 25, 2011

Project - Wireless hand signal transceiver for soldiers

The project is to build a wireless hand signal transceiver for soldiers that can facilitate communication when the current hand signal system doesn't work, such as too dark in the night or people being too far away from each other to see the real hand signals. The transceiver will be in the shape of a glove to enable convenient use and increase stealth. Short range RF will be used for the wireless communication, gyros/accelerometers will be used to detect different motions to make the transceiver a natural expansion of the current hand signal system, buttons on each finger are used to encode information like meters and numbers, an LCD screen will be installed on the back to display the received messages, and an earphone is used to alert the soldier upon receiving a new message.

 

                          

Reference material on the project

Presentation

Paper

Source: University of Illinois

Author :Xiaoli WANG, Yang XU

Seminar on Online identity management

Online identity management (OIM) also known as online image management or online personal branding or personal reputation management (PRM) is a set of methods for generating a distinguished Web presence of a person on the Internet. That presence could be reflected in any kind of content that refers to the person, including news, participation in blogs and forums, personal web sites (Marcus, Machilek & Schütz 2006), social media presence, pictures, video, etc.

Online identity management also refers to identity exposure and identity disclosure, and has particularly developed in the management on online identity in social network services (Tufekci 2008) or online dating services (Siibak 2007).

One aspect of the online identity management process has to do with improving the quantity and quality of traffic to sites that have content related to a person. In that aspect, OIM is a part of another discipline called search engine optimization with the difference that the only keyword is the person's name, and the optimization object is not necessary a single web site; it can consider a set of completely different sites that contain positive online references. The objective in this case is to get high rankings for as many sites as possible when someone search for a person's name. If the search engine used is Google, this action is called "to google someone”.

Another aspect has to do with impression management, i.e. "the process through which people try to control the impressions other people form of them". One of the objective is in particular to increase the online reputation of the person.

Online identity management often involves participation in social media sites like Facebook, LinkedIn, Flickr, YouTube, Twitter, Twitxr, Last.fm, Myspace, Orkut and other online communities and community websites, and is related to blogging, blog social networks like MyBlogLog and blog search engines like Technorati.

But it can also consist in more questionable practices. Hence in the case of social network services users have the possibility to buy 'friends' so to increase their visibility

             

 

Presentation on the topic  Online identity management

Seminar on Website Marketing

Internet marketing, also known as digital marketing, web marketing, online marketing, search marketing or e-marketing, is the marketing (generally promotion) of products or services over the Internet.

Internet marketing is considered to be broad in scope because it not only refers to marketing on the Internet, but also includes marketing done via e-mail and wireless media. Digital customer data and electronic customer relationship management (ECRM) systems are also often grouped together under internet marketing.

Internet marketing ties together the creative and technical aspects of the Internet, including design, development, advertising, and sales. Internet marketing also refers to the placement of media along many different stages of the customer engagement cycle through search engine marketing (SEM), search engine optimization (SEO), banner ads on specific websites, email marketing, and Web 2.0 strategies.[citation needed]

In 2008, The New York Times, working with comScore, published an initial estimate to quantify the user data collected by large Internet-based companies. Counting four types of interactions with company websites in addition to the hits from advertisements served from advertising networks, the authors found that the potential for collecting data was up to 2,500 times per user per month.

     

 

Presentation on the topic website marketing

Seminar on Personality development

Personality Development quintessentially means enhancing and grooming one’s outer and inner self to bring about a positive change to your life. Each individual has a distinct persona that can be developed, polished and refined. This process includes boosting one’s confidence, improving communication and language speaking abilities, widening ones scope of knowledge, developing certain hobbies or skills, learning fine etiquettes and manners, adding style and grace to the way one looks, talks and walks and overall imbibing oneself with positivity, liveliness and peace.

The whole process of this development takes place over a period of time. Even though there are many crash courses in personality development that are made available to people of all age groups, implementing this to your routine and bringing about a positive change in oneself takes a considerable amount of time. It is not necessary to join a personality development course; one can take a few tips and develop his or her own aura or charm.

 

 

Presentation on the topic Personality Development

How to make a Presentation

Below are some of the ways to prepare for presentation/seminars

  • Think about the presentation beforehand. It is short-changing the organisers of the event and your audience if you only think about what you're going to say the day before or while travelling to the event. If necessary, clarify with the organisers exactly what is required of you and what facilities you will require.
  • Do use PowerPoint if the facilities are available. Although some speakers seem to have taken an aversion to PowerPoint, it is so convenient and ensures that your presentation has a clear structure and something for your listeners to take away.
  • Be very clear about how much time you have - and stick to that time in preparing and delivering your presentation. It's very difficult to 'cut' a PowerPoint presentation at the event itself, so it's a great mistake to run out of time. Most presenters prepare too much material; but nobody ever complains that a presentation was too short (it always allows more time for questions).
  • Be very clear about your key message - and ensure that everything in your presentation is both consistent with, and suppportive of, that key message. You should be able to articulate the message in a phrase or a sentence and indeed you might want to use that phrase or sentence in one of your first slides, or one of your last, or even both.
  •  

                      

    Source :http://www.rogerdarlington.co.uk/Presentation.html

    Presentation on the topic presentation/seminars

    Seminar on Project management

    Project management is the discipline of planning, organizing, securing and managing resources to bring about the successful completion of specific project goals and objectives.

    A project is a temporary endeavor, having a defined beginning and end (usually constrained by date, but can be by funding or deliverables), undertaken to meet unique goals and objectives, usually to bring about beneficial change or added value. The temporary nature of projects stands in contrast to business as usual (or operations), which are repetitive, permanent or semi-permanent functional work to produce products or services. In practice, the management of these two systems is often found to be quite different, and as such requires the development of distinct technical skills and the adoption of separate management.

    The primary challenge of project management is to achieve all of the project goals and objectives while honoring the preconceived project constraints. Typical constraints are scope, time, and budget. The secondary—and more ambitious—challenge is to optimize the allocation and integration of inputs necessary to meet pre-defined objectives.

       

     

    Power point presentation on Project management

    Seminar on leadership qualities

    Leaders do not command excellence, they build excellence. Excellence is “being all you can be” within the bounds of doing what is right for your organization. To reach excellence you must first be a leader of good character. You must do everything you are supposed to do. Organizations will not achieve excellence by figuring out where it wants to go, then having leaders do whatever they have to in order to get the job done, and then hope their leaders acted with good character. This type of thinking is backwards. Pursuing excellence should not be confused with accomplishing a job or task. When you do planning, you do it by backwards planning. But you do not achieve excellence by backwards planning. Excellence starts with leaders of good and strong character who engage in the entire process of leadership. And the first process is being a person of honorable character.

     

    Character develops over time. Many think that much of a person's character is formed early in life. However, we do not know exactly how much or how early character develops. But, it is safe to claim that character does not change quickly. A person's observable behavior is an indication of her character. This behavior can be strong or weak, good or bad. A person with strong character shows drive, energy, determination, self-discipline, willpower, and nerve. She sees what she wants and goes after it. She attracts followers. On the other hand, a person with weak character shows none of these traits. She does not know what she wants. Her traits are disorganized, she vacillates and is inconsistent. She will attract no followers.

    A strong person can be good or bad. A gang leader is an example of a strong person with a bad character, while an outstanding community leader is one with both strong and good characteristics. An organization needs leaders with both strong and good characteristics, people who will guide them to the future and show that they can be trusted.

    Source http://www.nwlink.com/~donclark/leader/leadchr.html

    Power point Presentation on leadership qualities

    Internet Marketing Strategy

    Developing a successful internet marketing strategy is an essential part of your online success. In order to succeed, you must develop and implement a strategic plan that includes all of the following:
      • A great product
      • A web site specifically designed to sell
      • A killer marketing strategy
    Each step plays an important role in your overall strategy and must be developed to its fullest potential. If even one step fails, your chances of success will be minimal.

    Developing Your Product

    Your first step will be to develop a great product. You're probably thinking that's easier said than done, but it's really not. The absolute best product is one that you can develop yourself and deliver over the Internet. With today's technology, there is absolutely no reason why you can't create your own product. The knowledge you have within your own mind is extremely valuable. Everybody is good at something, has a special talent or some specialized knowledge. Use this knowledge to create a product.
    The key to developing a great product is exclusiveness. Your product should be unique and not be in competition with hundreds of other similar products. You must give your potential customers exactly what they want. Develop a high-quality product that fills a void to increase your chance of success.
    Another consideration of great importance is your target market. Keep in mind, the Internet is a global marketplace. Develop a product with a large geographic target and a wide appeal. A great product will fulfill a need or desire and provide instant gratification.

    Source: http://www.web-source.net/3steps.htm

    Presentation on Topic

    Seminar on Internet Marketing

    Internet marketing, also known as digital marketing, web marketing, online marketing, search marketing or e-marketing, is the marketing (generally promotion) of products or services over the Internet.

    Internet marketing is considered to be broad in scope because it not only refers to marketing on the Internet, but also includes marketing done via e-mail and wireless media.Digital customer data and electronic customer relationship management (ECRM) systems are also often grouped together under internet marketing.

    Internet marketing ties together the creative and technical aspects of the Internet, including design, development, advertising, and sales. Internet marketing also refers to the placement of media along many different stages of the customer engagement cycle through search engine marketing (SEM), search engine optimization (SEO), banner ads on specific websites, email marketing, and Web 2.0 strategies.[citation needed]

    In 2008, The New York Times, working with comScore, published an initial estimate to quantify the user data collected by large Internet-based companies. Counting four types of interactions with company websites in addition to the hits from advertisements served from advertising networks, the authors found that the potential for collecting data was up to 2,500 times per user per month.

     

    Presentations on topic Internet marketing

    Seminar on Affiliate marketing

    Affiliate marketing is a marketing practice in which a business rewards one or more affiliates for each visitor or customer brought about by the affiliate's own marketing efforts. Examples include rewards sites, where users are rewarded with cash or gifts, for the completion of an offer, and the referral of others to the site. The industry has four core players: the merchant (also known as 'retailer' or 'brand'), the network, the publisher (also known as 'the affiliate'), and the customer. The market has grown in complexity to warrant a secondary tier of players, including affiliate management agencies, super-affiliates and specialized third party vendors.

    Affiliate marketing overlaps with other Internet marketing methods to some degree, because affiliates often use regular advertising methods. Those methods include organic search engine optimization, paid search engine marketing, e-mail marketing, and in some sense display advertising. On the other hand, affiliates sometimes use less orthodox techniques, such as publishing reviews of products or services offered by a partner.

    Affiliate marketing—using one website to drive traffic to another—is a form of online marketing, which is frequently overlooked by advertisers.While search engines, e-mail, and website syndication capture much of the attention of online retailers, affiliate marketing carries a much lower profile. Still, affiliates continue to play a significant role in e-retailers' marketing strategies.

     

    Presentations slides on Affiliate marketing

    Seminar on Search Engine Marketing

    Search engine marketing, (SEM), is a form of Internet marketing that seeks to promote websites by increasing their visibility in search engine result pages (SERPs) through the use of, paid placement, contextual advertising, and paid inclusion. Search engine optimization (SEO) is "optimizing" website pages to achieve higher ranking in search results via the process of selecting specific keyword expressions associated to the website SEM is utilizing various means of "marketing" a website in order for it to become more relevant in regard to search engine searches and their rankings. It should be asserted that SEM is NOT SEO and vice versa. SEM constitutes Ad words which comprises pay per call (particularly beneficial for local providers as it enables potential consumers to get in touch directly to a company with one click), article submissions, advertising and making sure SEO has been done. Also, key word analysis needs to be done for both SEO and SEM; but not necessarily at the same time. SEM is a constant and tedious task. It frequently needs to be updated and monitored continually. Another part of SEM is Social Media Marketing (SMM). SMM is a type of marketing that involves exploiting social media to influence consumers that one company’s products and/or services are valuable. You can do SEM without doing SMM but you can't do SMM without doing SEM because SMM is a higher level of SEM.

     

     

    As the number of sites on the Web increased in the mid-to-late 90s, search engines started appearing to help people find information quickly. Search engines developed business models to finance their services, such as pay per click programs offered by Open Text in 1996 and then Goto.comin 1998. Goto.com later changed its name to Overture in 2001, and was purchased by Yahoo! in 2003, and now offers paid search opportunities for advertisers through Yahoo! Search Marketing. Google also began to offer advertisements on search results pages in 2000 through the Google AdWords program. By 2007, pay-per-click programs proved to be primary money-makers for search engines. In a market dominated by Google, in 2009 Yahoo! and Microsoft announced the intention to forge an alliance. The Yahoo! & Microsoft Search Alliance eventually received approval from regulators in the US and Europe in February 2010

    Presentation on Topic Search engine marketing

    Seminar on Time management

    Time management is the act or process of exercising conscious control over the amount of time spent on specific activities, especially to increase efficiency or productivity. Time management may be aided by a range of skills, tools, and techniques used to manage time when accomplishing specific tasks, projects and goals. This set encompasses a wide scope of activities, and these include planning, allocating, setting goals, delegation, analysis of time spent, monitoring, organizing, scheduling, and prioritizing. Initially, time management referred to just business or work activities, but eventually the term broadened to include personal activities as well. A time management system is a designed combination of processes, tools, techniques, and methods. Usually time management is a necessity in any project development as it determines the project completion time and scope.

     

                 

    Here are the various presentations on the topic Time Management

     

    Seminar on Java Security

    Java's security model is one of the language's key architectural features that makes it an appropriate technology for networked environments. Security is important because networks provide a potential avenue of attack to any computer hooked to them. This concern becomes especially strong in an environment in which software is downloaded across the network and executed locally, as is done with Java applets, for example. Because the class files for an applet are automatically downloaded when a user goes to the containing Web page in a browser, it is likely that a user will encounter applets from untrusted sources. Without any security, this would be a convenient way to spread viruses. Thus, Java's security mechanisms help make Java suitable for networks because they establish a needed trust in the safety of network-mobile code.

     

                   

    Java's security model is focused on protecting users from hostile programs downloaded from untrusted sources across a network. To accomplish this goal, Java provides a customizable "sandbox" in which Java programs run. A Java program must play only inside its sandbox. It can do anything within the boundaries of its sandbox, but it can't take any action outside those boundaries. The sandbox for untrusted Java applets, for example, prohibits many activities, including:

    • Reading or writing to the local disk
    • Making a network connection to any host, except the host from which the applet came
    • Creating a new process
    • Loading a new dynamic library and directly calling a native method

    By making it impossible for downloaded code to perform certain actions, Java's security model protects the user from the threat of hostile code.

    Ppt on Java Security

    Web Services in Java

    Web services are Web based applications that use open, XML-based standards and transport protocols to exchange data with clients. Web services are developed using Java Technology APIs and tools provided by an integrated Web Services Stack called Metro.

     

    The Metro stack consisting of JAX-WS, JAXB, and WSIT, enable you to create and deploy secure, reliable, transactional, interoperable Web services and clients. The Metro stack is part of Project Metro and as part of GlassFish, Java Platform, Enterprise Edition (Java EE), and partially in Java PlatForm, Standard Edition (Java SE). GlassFish and Java EE also support the legacy JAX-RPC APIs.

    Power point presentation on web services in java

    ppt

    Wednesday, May 18, 2011

    Seminar on Organizational information systems

    Information Systems (IS) is an academic/professional discipline bridging the business field and the well-defined computer science field that is evolving toward a new scientific area of study.An information systems discipline therefore is supported by the theoretical foundations of information and computations such that learned scholars have unique opportunities to explore the academics of various business models as well as related algorithmic processes within a computer science discipline. Typically, information systems or the more common legacy information systems include people, procedures, data, software, and hardware (by degree) that are used to gather and analyze digital information. Specifically computer-based information systems are complementary networks of hardware/software that people and organizations use to collect, filter, process, create, & distribute data (computing). Computer Information System(s) (CIS) is often a track within the computer science field studying computers and algorithmic processes, including their principles, their software & hardware designs, their applications, and their impact on society. Overall, an IS discipline emphasizes functionality over design.

                       

     

    As illustrated by the pradeep sagar in 1991 on the right, the history of information systems coincides with the history of computer science that began long before the modern discipline of computer science emerged in the twentieth century. Regarding the circulation of information and ideas, numerous legacy information systems still exist today that are continuously updated to promote ethnographic approaches, to ensure data integrity, and to improve the social effectiveness & efficiency of the whole process. In general, information systems are focused upon processing information within organizations, especially within business enterprises, and sharing the benefits with modern society

    Power point presentation on Organizational information systems

    Wednesday, May 11, 2011

    Seminar on E-Business

    Electronic business, commonly referred to as "eBusiness" or "e-business", or an internet business, may be defined as the application of information and communication technologies (ICT) in support of all the activities of business. Commerce constitutes the exchange of products and services between businesses, groups and individuals and can be seen as one of the essential activities of any business. Electronic commerce focuses on the use of ICT to enable the external activities and relationships of the business with individuals, groups and other businesses.[1]

    The term "e-business" was coined by IBM's marketing and Internet teams in 1996.[2][3]

    Electronic business methods enable companies to link their internal and external data processing systems more efficiently and flexibly, to work more closely with suppliers and partners, and to better satisfy the needs and expectations of their customers.

    In practice, e-business is more than just e-commerce. While e-business refers to more strategic focus with an emphasis on the functions that occur using electronic capabilities, e-commerce is a subset of an overall e-business strategy. E-commerce seeks to add revenue streams using the World Wide Web or the Internet to build and enhance relationships with clients and partners and to improve efficiency using the Empty Vessel strategy.

    Power point presentation on Electronic business

    Sunday, April 10, 2011

    Seminar on Iris Scanning

    Iris recognition is a method of biometric authentication that uses pattern-recognition techniques based on high-resolution images of the irides of an individual's eyes.

    Not to be confused with another, less prevalent, ocular-based technology, retina scanning, iris recognition uses camera technology, with subtle infrared illumination reducing specular reflection from the convex cornea, to create images of the detail-rich, intricate structures of the iris. Converted into digital templates, these images provide mathematical representations of the iris that yield unambiguous positive identification of an individual.

    Iris scanner

    Iris recognition efficacy is rarely impeded by glasses or contact lenses. Iris technology has the smallest outlier (those who cannot use/enroll) group of all biometric technologies. Because of its speed of comparison, iris recognition is the only biometric technology well-suited for one-to-many identification. A key advantage of iris recognition is its stability, or template longevity, as, barring trauma, a single enrollment can last a lifetime.

    Reference Material

    Grid network

    A grid network is a kind of computer network consisting of a number of (computer) systems connected in a grid topology.

    In a regular grid topology, each node in the network is connected with two neighbors along one or more dimensions. If the network is one-dimensional, and the chain of nodes is connected to form a circular loop, the resulting topology is known as a ring. Network systems such as FDDI use two counter-rotating token-passing rings to achieve high reliability and performance. In general, when an n-dimensional grid network is connected circularly in more than one dimension, the resulting network topology is a torus, and the network is called "toroidal". When the number of nodes along each dimension of a toroidal network is 2, the resulting network is called a hypercube.

    A parallel computing cluster or multi-core processor is often connected in regular interconnection network such as a de Bruijn graph , a hypercube graph, a hypertree network, a fat tree network, a torus, or cube-connected cycles.

    Note that a grid network is not the same as a grid computer (or computational grid) (even though the nodes in a grid network are usually computers, and grid computing obviously requires some kind of computer network to interconnect the computers)

    Reference Material