Showing posts with label be projects. Show all posts
Showing posts with label be projects. Show all posts

Sunday, September 23, 2012

Project abstract - Optimizing Search Engines using Clickthrough Data

This paper presents an approach to automatically optimizing the retrieval quality of search engines using clickthrough data. Intuitively, a good information retrieval system should present relevant documents high in the ranking, with less relevant documents following below. While previous approaches to learning retrieval functions from examples exist, they typically require training data generated from relevance judgments by experts. This makes them difficult and expensive to apply. The goal of this paper is to develop a method that utilizes clickthrough data for training, namely the query-log of the search engine in connection with the log of links the users clicked on in the presented ranking. Such clickthrough data is available in abundance and can be recorded at very low cost. Taking a Support Vector Machine (SVM) approach, this paper presents a method for learning retrieval functions. From a theoretical perspective, this method is shown to be well-founded in a risk minimization framework. Furthermore, it is shown to be feasible even for large sets of queries and features. The theoretical results are verified in a controlled experiment. It shows that the method can effectively adapt the retrieval function of a meta-search engine to a particular group of users, outperforming Google in terms of retrieval quality after only a couple of hundred training examples.

Download

Saturday, September 22, 2012

Project – Music player in java

Here is another project which can be used as mini project. Its an open source music player coded in java. You can use it for reference to understand the programming structure as to how java can be used for designing applications. It will definitely help to understand the power of java. This player can be used as case study too to understand its complexity involved in desgining such application.

 

          

You DO need a J2SE 1.4 or higher (J2SE 1.5, 1.6)

http://www.javazoom.net/jlgui/sources.html

Saturday, August 13, 2011

Seminar on Transformer

A transformer is a device that transfers electrical energy from one circuit to another through inductively coupled conductors—the transformer's coils. A varying current in the first or primary winding creates a varying magnetic flux in the transformer's core and thus a varying magnetic field through the secondary winding. This varying magnetic field induces a varying electromotive force (EMF), or "voltage", in the secondary winding. This effect is called mutual induction.
If a load is connected to the secondary, an electric current will flow in the secondary winding and electrical energy will be transferred from the primary circuit through the transformer to the load. In an ideal transformer, the induced voltage in the secondary winding (Vs) is in proportion to the primary voltage (Vp), and is given by the ratio of the number of turns in the secondary (Ns) to the number of turns in the primary (Np) as follows:

                 

By appropriate selection of the ratio of turns, a transformer thus allows an alternating current (AC) voltage to be "stepped up" by making Ns greater than Np, or "stepped down" by making Ns less than Np.
In the vast majority of transformers, the windings are coils wound around a ferromagnetic core, air-core transformers being a notable exception.
Transformers range in size from a thumbnail-sized coupling transformer hidden inside a stage microphone to huge units weighing hundreds of tons used to interconnect portions of power grids. All operate with the same basic principles, although the range of designs is wide. While new technologies have eliminated the need for transformers in some electronic circuits, transformers are still found in nearly all electronic devices designed for household ("mains") voltage. Transformers are essential for high-voltage electric power transmission, which makes long-distance transmission economically practical.

Presentation

100 MVA POWER TRANSFORMER

Transformer Design Differences
DRY CORE TRANSFORMERS (rated under 750 volts)
Ramifications of the New Transformer Efficiency Standards
Transformers
Transformer 2

Seminar Test automation framework

A test automation framework is a set of assumptions, concepts and tools that provide support for automated software testing. The main advantage of such a framework is the low cost for maintenance. If there is change to any test case then only the test case file needs to be updated and the Driver Script and Startup script will remain the same. Ideally, there is no need to update the scripts in case of changes to the application.
Choosing the right framework/scripting technique helps in maintaining lower costs. The costs associated with test scripting are due to development and maintenance efforts. The approach of scripting used during test automation has effect on costs.


Various framework/scripting techniques are generally used:

*Linear (procedural code, possibly generated by tools like those that use record and playback)
*Structured (uses control structures - typically ‘if-     else’, ‘switch’, ‘for’, ‘while’ conditions/ statements)
*Data-driven (data is persisted outside of tests in a database, spreadsheet, or other mechanism)
*Keyword-driven
*Hybrid (two or more of the patterns above are used)

Presentation

CTA Test Automation Framework.ppt

Understanding of Automation Framework - Software Testing Genius

Software Testing Automation Framework (STAF) -

Software Testing Automation Framework (STAF)
Building an Automation Framework around Open Source
Test Automation

Seminar on LED

A light-emitting diode (LED) is a semiconductor light source. LEDs are used as indicator lamps in many devices and are increasingly used for other lighting. Introduced as a practical electronic component in 1962, early LEDs emitted low-intensity red light, but modern versions are available across the visible, ultraviolet and infrared wavelengths, with very high brightness.
When a light-emitting diode is forward biased (switched on), electrons are able to recombine with electron holes within the device, releasing energy in the form of photons. This effect is called electroluminescence and the color of the light (corresponding to the energy of the photon) is determined by the energy gap of the semiconductor. An LED is often small in area (less than 1 mm2), and integrated optical components may be used to shape its radiation pattern. LEDs present many advantages over incandescent light sources including lower energy consumption, longer lifetime, improved robustness, smaller size, faster switching, and greater durability and reliability. LEDs powerful enough for room lighting are relatively expensive and require more precise current and heat management than compact fluorescent lamp sources of comparable output.

                 
Light-emitting diodes are used in applications as diverse as replacements for aviation lighting, automotive lighting (particularly brake lamps, turn signals and indicators) as well as in traffic signals. The compact size, the possibility of narrow bandwidth, switching speed, and extreme reliability of LEDs has allowed new text and video displays and sensors to be developed, while their high switching rates are also useful in advanced communications technology. Infrared LEDs are also used in the remote control units of many commercial products including televisions, DVD players, and other domestic appliances.

Presentation

Flexible Organic LED's
LED Light Show Crititcal Design Review
The White LED
Presentation on LED BASED home lighting for rural – THRIVE
Light Emitting Diode (L.E.D.)
LED Measurement
Light Emitting Diodes (LED's)
Technorati Tags: ,

Seminar on Flight Simulator

Flight simulation is an artificial re-creation of aircraft flight and various aspects of the flight environment. This includes the equations that govern how aircraft fly, how they react to applications of their controls and other aircraft systems, and how they react to the external environment such as air density, turbulence, cloud, precipitation, etc. Flight simulation is used for a variety of reasons, including flight training (mainly of pilots), for the design and development of the aircraft itself, and for research into aircraft characteristics, control handling qualities, and so forth.

        
Flight simulations have varying degrees of hardware, modelling detail and realism that depend on their purpose. They can range from PC laptop-based models of aircraft systems, to simple replica cockpits for familiarisation purposes, to more complex cockpit simulations with some working controls and systems, to highly detailed cockpit replications with all controls and aircraft systems and wide-field outside-world visual systems, all mounted on six degree-of-freedom (DOF) motion platforms which move in response to pilot control movements and external aerodynamic factors.

Presentation

Flight Simulator Game Engine Progress
Human Space Flight Training Survey – FAA
Computational Bat Flight Visualization

Saturday, August 6, 2011

Project – Online Survey System

LimeSurvey is a PHP survey software to create online surveys. Features open/closed surveys, branching, participant administration, quotas, WYSIWYG HTML editor, email invitations & reminders, assessments, basic statistics and more

Download the project

Tuesday, July 26, 2011

Seminar on Smartphone

A smartphone is a high-end mobile phone that offers more advanced computing ability and connectivity than a contemporary feature phone (i.e. a modern low-end phone). A smartphone combines the functions of a personal digital assistant (PDA) and a mobile phone. Today's models typically also serve as portable media players and camera phones with high-resolution touchscreen, GPS navigation, Wi-Fi and mobile broadband access.
A smartphone runs a complete mobile operating system. Widespread examples are Apple iOS, Google Android, Microsoft Windows Phone 7, Nokia Symbian, Research In Motion BlackBerry OS, and embedded Linux distributions such as Maemo and MeeGo. Such systems can be installed on many different phone models. They can run third-party applications, using an application programming interface (API).
According to an Olswang report in early 2011, the rate of smartphone adoption is accelerating: as of March 2011 22% of UK consumers had a smartphone, with this percentage rising to 31% amongst 24–35 year olds. Growth in demand for advanced mobile devices boasting powerful processors and graphics processing units, abundant memory (FLASH memory), high-resolution screens with multi-touch capability, and open operating systems has outpaced the rest of the mobile phone market for several years. According to an early 2010 study by ComScore, over 45.5 million people in the United States owned smartphones out of 234 million total subscribers. Despite the large increase in smartphone sales in the last few years, smartphone shipments only make up 20% of total handset shipments, as of the first half of 2010. In March 2011 Berg Insight reported data that showed global smartphone shipments increased 74% from 2009 to 2010.

                  

Power point presentation on Smartphone

Smartphones at Rice University
SmartPhone Attacks and Defenses
Smart-phones
Smartphones in Ophthalmology
Understanding Win32 Support in Pocket PC and Smartphone
SmartPhone Thesis A Seminar - cse

Seminar on Agile Methodology

Agile Software Development is a group of software development methodologies based on iterative and incremental development, where requirements and solutions evolve through collaboration between self-organizing, cross-functional teams. The Agile Manifesto introduced the term in 2001.

       

Incremental software development methods have been traced back to 1957. In 1974, a paper by E. A. Edmonds introduced an adaptive software development process.
So-called lightweight software development methods evolved in the mid-1990s as a reaction against heavyweight methods, which were characterized by their critics as a heavily regulated, regimented, micromanaged, waterfall model of development. Proponents of lightweight methods (and now agile methods) contend that they are a return to development practices from early in the history of software development.
Early implementations of lightweight methods include Scrum (1995), Crystal Clear, Extreme Programming (1996), Adaptive Software Development, Feature Driven Development, and Dynamic Systems Development Method (DSDM) (1995). These are now typically referred to as agile methodologies, after the Agile Manifesto published in 2001.

Power point presentation on Agile Software Development

SCRUM – an agile software development methodology
Agile Development Methodology
Agile Software Development
eXtreme Programming and Agile Concepts
Agile Software Engineering
Agile Methods A Practical Perspective

Monday, July 18, 2011

Enterprise resource planning

Enterprise resource planning (ERP) integrates internal and external management information across an entire organization, embracing finance/accounting, manufacturing, sales and service, customer relationship management, etc. ERP systems automate this activity with an integrated software application. Its purpose is to facilitate the flow of information between all business functions inside the boundaries of the organization and manage the connections to outside stakeholders.
ERP systems can run on a variety of hardware and network configurations, typically employing a database as a repository for information.


ERP systems typically include the following characteristics:

  • An integrated system that operates in real time (or next to real time), without relying on periodic updates.
  • A common database, which supports all applications.
  • A consistent look and feel throughout each module.
  • Installation of the system without elaborate application/data integration by the Information Technology (IT) department
    Power point presentation on ERP
ERP PPT - Free ERP Software Implementation Guide

 ERP Implementation Fundamentals

 ERP Centric Data Mining and KD

 ERP

 ERP Modules

 ERP and CRM

Sunday, July 17, 2011

Project on Laser Pointer Mouse

The purpose of this project is to design an implement a laser pointer mouse. When doing a PowerPoint presentation or using the computer for any other occasion for which it is inconvenient to be sitting in front of it, users would like a way to control the computer remotely. The laser pointer mouse allows lecturers and presenters to point at the screen, and, with the press of a button, move the mouse cursor to the location of the laser, without ever touching the computer or mouse. A few more buttons allow the user to perform wirelessly transmitted left, right, and double clicks. Support for drawing over the screen, e.g. arrows and circles for increased presentation effectiveness, will be implemented as time permits. The system will be implemented in Verilog, and realized on the FPGA on the 6.111 labkit.

  

Project Files

Presentation (PDF)

Report (PDF - 5.7 MB)

Report Appendix (PDF)

Project - Wireless Surveillance System

This project implements a networked video surveillance system in digital logic. It allows a user to view video input from a remote camera on a VGA monitor by capturing camera data, encoding it, transmitting it wirelessly, and subsequently receiving, decoding, and re-displaying the data. To test the system, the project is divided into three main components: video capture/display, data encoding/decoding, and wireless transmission/reception. Each part is put through a comprehensive series of tests using Model Sim and simulated data. Once each component passes design and functional tests, all three components are then connected to transmit video data wirelessly

                 

Project Files

Presentation (PDF)

Report (PDF)

Report Appendix (PDF)

Source : MIT university

Project - Instant messaging

Instant messaging (IM) is a collection of technologies used for text-based communication between two or more participants over the Internet or other types of networks. Of importance is that online chat and instant messaging differs from other technologies such as e-mail due to the perceived synchronicity of the communications by the users –chat happens in real-time. Some systems permit messages to be sent to people not currently 'logged on' (offline messages), thus removing some of the differences between IM and e-mail (often done by sending the message to the associated e-mail account).

                     

IM allows effective and efficient communication, allowing immediate receipt of acknowledgment or reply. In many cases instant messaging includes additional features which can make it even more popular. For example, users can see each other by using webcams, or talk directly for free over the Internet using a microphone and headphones or loudspeakers. Many client programs allow file transfers as well, although they are typically limited in the permissible file-size.

It is typically possible to save a text conversation for later reference. Instant messages are often logged in a local message history, making it similar to the persistent nature of e-mails.

Team building lab (PDF)

Networking lab (PDF)

Optional lab: graphical user interfaces in Swing (PDF)

Project (PDF)

Project Source code - Instant messaging

guichat (ZIP) (This ZIP file contains 2 .jar files, 2 .java files and 2 files with no file extension.)

friendly (ZIP) (This ZIP file contains 6 .java files and 2 files with no file extension.)

guiwords (ZIP) (This ZIP file contains 2 .jar files, 2 .java files and 3 files with no file extension.)

Saturday, July 16, 2011

Project - Online Examination System

Online Examination System (OES) is a MCQ(Multiple Choice Questions) based Examination system, which is built using PHP and MySQL. OES provides an easy-to-use environment for preparing questions, conducting exams and managing results

 

 

Here is a working Online Examination system

It can be downloaded from here

http://sourceforge.net/projects/oes/files/OES-without-Installer-v.1.1.zip/download

Power point presentation on Online Examination system

Online Examination System
Online Examination Using Farming Based System
Online Exam/Paper Management System
ONLINE EXAMINATION

Tuesday, July 5, 2011

.Net Framework Security

.NET has its own security mechanism with two general features: Code Access Security (CAS), and validation and verification. Code Access Security is based on evidence that is associated with a specific assembly. Typically the evidence is the source of the assembly (whether it is installed on the local machine or has been downloaded from the intranet or Internet). Code Access Security uses evidence to determine the permissions granted to the code. Other code can demand that calling code is granted a specified permission. The demand causes the CLR to perform a call stack walk: every assembly of each method in the call stack is checked for the required permission; if any assembly is not granted the permission a security exception is thrown. however, has to split the application into subdomains; it is not done by the CLR.

            

Code Access Security (CAS), in the Microsoft .NET framework, is Microsoft's solution to prevent untrusted code from performing privileged actions. When the CLR loads an assembly it will obtain evidence for the assembly and use this to identify the code group that the assembly belongs to. A code group contains a permission set (one or more permissions). Code that performs a privileged action will perform a code access demand which will cause the CLR to walk up the call stack and examine the permission set granted to the assembly of each method in the call stack. The code groups and permission sets are determined by the administrator of the machine who defines the security policy.

Power point Presentation on .net Framework Security

 

Sunday, July 3, 2011

Seminar on Artificial intelligence

Artificial intelligence (AI) is the intelligence of machines and the branch of computer science that aims to create it. AI textbooks define the field as "the study and design of intelligent agents" where an intelligent agent is a system that perceives its environment and takes actions that maximize its chances of success. John McCarthy, who coined the term in 1956, defines it as "the science and engineering of making intelligent machines."

  

The field was founded on the claim that a central property of humans, intelligence—the sapience of Homo sapiens—can be so precisely described that it can be simulated by a machine. This raises philosophical issues about the nature of the mind and the ethics of creating artificial beings, issues which have been addressed by myth, fiction and philosophy since antiquity. Artificial intelligence has been the subject of optimism, but has also suffered setbacks and, today, has become an essential part of the technology industry, providing the heavy lifting for many of the most difficult problems in computer science.

Power point presentations on Artificial intelligence

Seminar on Unlicenced Mobile Access

Generic Access Network or GAN is a telecommunication system that extends mobile voice, data and IP Multimedia Subsystem/Session Initiation Protocol (IMS/SIP) applications over IP networks. Unlicensed Mobile Access or UMA, is the commercial name used by mobile carriers for external IP access into their core networks.

The most common application of GAN is in a dual-mode handset service where subscribers can seamlessly handover connections between wireless LANs and wide area networks using a GSM/Wi-Fi dual-mode mobile phone. UMA technology has enabled the convergence of mobile, fixed and Internet telephony, sometimes called Fixed Mobile Convergence.

                       

The local network may be based on private unlicensed spectrum technologies like 802.11, while the wide network is alternatively GSM/GPRS or UMTS mobile services. On the cellular network, the mobile handset communicates over the air with a base station, through a base station controller, to servers in the core network of the carrier.

Under the GAN system, when the handset detects a wireless LAN, it establishes a secure IP connection through a gateway to a server called a GAN Controller (GANC) on the carrier's network. The GANC presents to the mobile core network as a standard cellular base station. The handset communicates with the GANC over the secure connection using existing GSM/UMTS protocols. Thus, when a mobile moves from a GSM to an 802.11 network, it appears to the core network as if it is simply on a different base station.

Power point presentation on UMA

Saturday, July 2, 2011

Another list of Seminar topics

Hi,

Please find another list of Computer science , information technology and electronics seminar topics.

I will be adding many more such topics in coming future. Please post your comments whether these are helpful or not. And also, if you have any suggestion, please let me know so that I can incorporate that too.

Thanks!

List of Seminar topics

Hi All,

Here is the large number of seminar topics on computer science, information technology and electronics along with seminar materials provided. I hope these materials & topics will be helpful for all of you.

If you want any further information, please feel free to post your request in the comment section. I will try to assist in all possible manner.

Thanks!

Friday, July 1, 2011

Seminar on SDLC

The Systems Development Life Cycle (SDLC), or Software Development Life Cycle in systems engineering, information systems and software engineering, is the process of creating or altering systems, and the models and methodologies that people use to develop these systems. The concept generally refers to computer or information systems. Emphasis on this article (SLDC) is on man-made technological life-cycle. But there are many other life-cycle models to choose from. This includes ecological life cycles, for every life cycle, whether biological or technological, has a beginning and an end.

In software engineering the SDLC concept underpins many kinds of software development methodologies. These methodologies form the framework for planning and controlling the creation of an information system: the software development process.

 

Systems Development Life Cycle (SDLC) is a process used by a systems analyst to develop an information system, including requirements, validation, training, and user (stakeholder) ownership. Any SDLC should result in a high quality system that meets or exceeds customer expectations, reaches completion within time and cost estimates, works effectively and efficiently in the current and planned Information Technology infrastructure, and is inexpensive to maintain and cost-effective to enhance.

Computer systems are complex and often (especially with the recent rise of Service-Oriented Architecture) link multiple traditional systems potentially supplied by different software vendors. To manage this level of complexity, a number of SDLC models or methodologies have been created, such as "waterfall"; "spiral"; "Agile software development"; "rapid prototyping"; "incremental"; and "synchronize and stabilize"

Power point presentation on Systems Development Life Cycle