Showing posts with label computer science. Show all posts
Showing posts with label computer science. Show all posts

Saturday, July 2, 2011

Another list of Seminar topics

Hi,

Please find another list of Computer science , information technology and electronics seminar topics.

I will be adding many more such topics in coming future. Please post your comments whether these are helpful or not. And also, if you have any suggestion, please let me know so that I can incorporate that too.

Thanks!

Friday, July 1, 2011

Project Abstract - Hospital Management System

A hospital information system (HIS), variously also called clinical information system (CIS) is a comprehensive, integrated information system designed to manage the administrative, financial and clinical aspects of a hospital. This encompasses paper-based information processing as well as data processing machines.

It can be composed of one or a few software components with specialty-specific extensions as well as of a large variety of sub-systems in medical specialties (e.g. Laboratory Information System, Radiology Information System).

 

              

 

CISs are sometimes separated from HISs in that the former concentrate on patient-related and clinical-state-related data (electronic patient record) whereas the latter keeps track of administrative issues. The distinction is not always clear and there is contradictory evidence against a consistent use of both terms.

Power point presentation on Hospital Management System

Sunday, June 26, 2011

Project Abstract - Route Stability In Manets Under The Random Direction Mobility Model

A fundamental issue arising in mobile ad hoc networks (MANETs) is the selection of the optimal path between any two nodes. A method that has been advocated to improve routing efficiency is to select the most stable path so as to reduce the latency and the overhead due to route reconstruction.

 

 

In this work, we study both the availability and the duration probability of a routing path that is subject to link failures caused by node mobility. In particular, we focus on the case where the network nodes move according to the Random Direction model, and we derive both exact and approximate (but simple) expressions of these probabilities. Through our results, we study the problem of selecting an optimal route in terms of path availability. Finally, we propose an approach to improve the efficiency of reactive routing protocols.

Presentation on the topic mobile ad hoc networks

Saturday, June 25, 2011

Seminar on Personality development

Personality Development quintessentially means enhancing and grooming one’s outer and inner self to bring about a positive change to your life. Each individual has a distinct persona that can be developed, polished and refined. This process includes boosting one’s confidence, improving communication and language speaking abilities, widening ones scope of knowledge, developing certain hobbies or skills, learning fine etiquettes and manners, adding style and grace to the way one looks, talks and walks and overall imbibing oneself with positivity, liveliness and peace.

The whole process of this development takes place over a period of time. Even though there are many crash courses in personality development that are made available to people of all age groups, implementing this to your routine and bringing about a positive change in oneself takes a considerable amount of time. It is not necessary to join a personality development course; one can take a few tips and develop his or her own aura or charm.

 

 

Presentation on the topic Personality Development

How to make a Presentation

Below are some of the ways to prepare for presentation/seminars

  • Think about the presentation beforehand. It is short-changing the organisers of the event and your audience if you only think about what you're going to say the day before or while travelling to the event. If necessary, clarify with the organisers exactly what is required of you and what facilities you will require.
  • Do use PowerPoint if the facilities are available. Although some speakers seem to have taken an aversion to PowerPoint, it is so convenient and ensures that your presentation has a clear structure and something for your listeners to take away.
  • Be very clear about how much time you have - and stick to that time in preparing and delivering your presentation. It's very difficult to 'cut' a PowerPoint presentation at the event itself, so it's a great mistake to run out of time. Most presenters prepare too much material; but nobody ever complains that a presentation was too short (it always allows more time for questions).
  • Be very clear about your key message - and ensure that everything in your presentation is both consistent with, and suppportive of, that key message. You should be able to articulate the message in a phrase or a sentence and indeed you might want to use that phrase or sentence in one of your first slides, or one of your last, or even both.
  •  

                      

    Source :http://www.rogerdarlington.co.uk/Presentation.html

    Presentation on the topic presentation/seminars

    Ebook - Linux System Administration

    You can rely on the fully updated second edition of Linux System Administration for answers to all your questions about installing, configuring, and administering Linux. Written by two Linux experts, this book teaches you, step-by-step, all the standard and advanced techniques you need to know to set up and maintain a secure, effective Linux environment. Scores of clear, consistent examples illustrate these techniques in detail--so you stay on track and accomplish all your goals

                    

    Coverage includes:
    * Installing a Linux server
    * Setting up and maintaining user and group accounts
    * Setting up Linux system security
    * Sharing files using Samba and NFS
    * Implementing a backup strategy
    * Troubleshooting common Linux problems
    * Setting up the X Window System
    * Setting up TCP/IP and connecting to the Internet
    * Setting up a mail server
    * Maintaining filesystems and partitions
    * Configuring printers
    * Improving system performance
    * Writing shell scripts
    * Using Webmin for cross-distribution GUI administration
    The Craig Hunt Linux Library
    The Craig Hunt Linux Library provides in-depth, advanced coverage of the key topics for Linux administrators. Topics include Samba, Network Servers, DNS Server Administration, Apache, Security, and Sendmail. Each book in the series is either written by or meticulously reviewed by Craig Hunt to ensure the highest quality and most complete coverage for networking professionals working specifically in Linux environments.

                   

     

    Download Ebook

    Sybex.Linux.System.Administration.eBook

    Ebook - Java™ Application Development on Linux

    Why another book on Java? Why a book on Java and Linux? Isn’t Java a platform-independent system? Aren’t there enough books on Java? Can’t I learn everything I need to know from the Web?
    No doubt, there are a host of Java books on the market. We didn’t wake up one morning and say, “You know what the world really needs? Another book about Java!” No. What we realized was that there are a couple of “holes” in the Java book market.
    First, Linux as a development platform and deployment platform for Java applications has been largely ignored. This is despite the fact that the *nix platform (meaning all UNIX and UNIX-like systems, Linux included) has long been recognized as one of the most programmer-friendly platforms in existence.

                          
    Those few resources for Java on Linux that exist emphasize tools to the exclusion of the Java language and APIs.
    Second, books on the Java language and APIs have focused on pedagogical examples that serve to illustrate the details of the language and its libraries, but very few of these examples are in themselves practically useful, and they tend to deal only with the issues of writing programs, and not at all with deploying and maintaining them. Anyone who has worked on a major software project, especially a software project that is developed and deployed in a business for a business, knows that designing and coding are only about half of the work involved. Yes, writing Java code is only slightly affected by the development and the deployment platform, but the process of releasing and maintaining such applications is significantly different between platforms.

    Download ebook

    Java Application Development on Linux

    Seminar on Java Security

    Java's security model is one of the language's key architectural features that makes it an appropriate technology for networked environments. Security is important because networks provide a potential avenue of attack to any computer hooked to them. This concern becomes especially strong in an environment in which software is downloaded across the network and executed locally, as is done with Java applets, for example. Because the class files for an applet are automatically downloaded when a user goes to the containing Web page in a browser, it is likely that a user will encounter applets from untrusted sources. Without any security, this would be a convenient way to spread viruses. Thus, Java's security mechanisms help make Java suitable for networks because they establish a needed trust in the safety of network-mobile code.

     

                   

    Java's security model is focused on protecting users from hostile programs downloaded from untrusted sources across a network. To accomplish this goal, Java provides a customizable "sandbox" in which Java programs run. A Java program must play only inside its sandbox. It can do anything within the boundaries of its sandbox, but it can't take any action outside those boundaries. The sandbox for untrusted Java applets, for example, prohibits many activities, including:

    • Reading or writing to the local disk
    • Making a network connection to any host, except the host from which the applet came
    • Creating a new process
    • Loading a new dynamic library and directly calling a native method

    By making it impossible for downloaded code to perform certain actions, Java's security model protects the user from the threat of hostile code.

    Ppt on Java Security

    Free Ebook on Teach Yourself Java in 21 Days

    This book is intended for people with at least some basic programming background, which includes people with years of programming experience or people with only a small amount of experience. If you understand what variables, loops,
    and functions are, you’ll be just fine for this book. The sorts of people who might want to read this book include you, if

    • You’re a real whiz at HTML, understand CGI programming (in perl, AppleScript, Visual Basic, or some other popular CGI language) pretty well, and want to move on to the next level in Web page design
    • You had some Basic or Pascal in school and you have a basic grasp of what programming is, but you’ve heard Java is easy to learn, really powerful, and very cool.

     

    What if you know programming, but you don’t know object-oriented programming? Fear not. This book assumes no background in object-oriented design. If you know object-oriented programming, in fact, the first couple of days will be easy for you.

    Download Free ebook

    Link

    Web Services in Java

    Web services are Web based applications that use open, XML-based standards and transport protocols to exchange data with clients. Web services are developed using Java Technology APIs and tools provided by an integrated Web Services Stack called Metro.

     

    The Metro stack consisting of JAX-WS, JAXB, and WSIT, enable you to create and deploy secure, reliable, transactional, interoperable Web services and clients. The Metro stack is part of Project Metro and as part of GlassFish, Java Platform, Enterprise Edition (Java EE), and partially in Java PlatForm, Standard Edition (Java SE). GlassFish and Java EE also support the legacy JAX-RPC APIs.

    Power point presentation on web services in java

    ppt

    Sunday, April 10, 2011

    Seminar on Iris Scanning

    Iris recognition is a method of biometric authentication that uses pattern-recognition techniques based on high-resolution images of the irides of an individual's eyes.

    Not to be confused with another, less prevalent, ocular-based technology, retina scanning, iris recognition uses camera technology, with subtle infrared illumination reducing specular reflection from the convex cornea, to create images of the detail-rich, intricate structures of the iris. Converted into digital templates, these images provide mathematical representations of the iris that yield unambiguous positive identification of an individual.

    Iris scanner

    Iris recognition efficacy is rarely impeded by glasses or contact lenses. Iris technology has the smallest outlier (those who cannot use/enroll) group of all biometric technologies. Because of its speed of comparison, iris recognition is the only biometric technology well-suited for one-to-many identification. A key advantage of iris recognition is its stability, or template longevity, as, barring trauma, a single enrollment can last a lifetime.

    Reference Material

    Grid network

    A grid network is a kind of computer network consisting of a number of (computer) systems connected in a grid topology.

    In a regular grid topology, each node in the network is connected with two neighbors along one or more dimensions. If the network is one-dimensional, and the chain of nodes is connected to form a circular loop, the resulting topology is known as a ring. Network systems such as FDDI use two counter-rotating token-passing rings to achieve high reliability and performance. In general, when an n-dimensional grid network is connected circularly in more than one dimension, the resulting network topology is a torus, and the network is called "toroidal". When the number of nodes along each dimension of a toroidal network is 2, the resulting network is called a hypercube.

    A parallel computing cluster or multi-core processor is often connected in regular interconnection network such as a de Bruijn graph , a hypercube graph, a hypertree network, a fat tree network, a torus, or cube-connected cycles.

    Note that a grid network is not the same as a grid computer (or computational grid) (even though the nodes in a grid network are usually computers, and grid computing obviously requires some kind of computer network to interconnect the computers)

    Reference Material

    Sunday, November 28, 2010

    Earth Simulator

    The Earth Simulator (ES), developed by the Japanese government's initiative "Earth Simulator Project", was a highly parallel vector supercomputer system for running global climate models to evaluate the effects of global warming and problems in solid earth geophysics. The system was developed for Japan Aerospace Exploration Agency, Japan Atomic Energy Research Institute, and Japan Marine Science and Technology Center in 1997. Construction started in October 1999, and the site officially opened on March 11, 2002. The project cost 60 billion yen.

    Built by NEC, ES was based on their SX-6 architecture. It consisted of 640 nodes with eight vector processors and 16 gibibytes of computer memory at each node, for a total of 5120 processors and 10 terabytes of memory. Two nodes were installed per 1 metre x 1.4 metre x 2 metre cabinet. Each cabinet consumed 20 kW of power. The system had 700 terabytes of disk storage (450 for the system and 250 for the users) and 1.6 petabytes of mass storage in tape drives. It was able to run holistic simulations of global climate in both the atmosphere and the oceans down to a resolution of 10 km. Its performance on the LINPACK benchmark was 35.86 TFLOPS, which was almost five times faster than ASCI White.

    Reference material

    M-Commerce

    Mobile Commerce, also known as M-Commerce or mCommerce, is the ability to conduct commerce using a mobile device, such as a mobile phone, a Personal digital assistantPDA, a smartphone, or other emerging mobile equipment such as dashtop mobile devices. Mobile Commerce has been defined as follows:

    "Mobile Commerce is any transaction, involving the transfer of ownership or rights to use goods and services, which is initiated and/or completed by using mobile access to computer-mediated networks with the help of an electronic device."

    Mobile commerce was born in 1997 when the first two mobile-phone enabled Coca Cola vending machines were installed in the Helsinki area in Finland. The machines accepted payment via SMS text messages. The first mobile phone-based banking service was launched in 1997 by Merita Bank of Finland, also using SMS.

    In 1998, the first sales of digital content as downloads to mobile phones were made possible when the first commercial downloadable ringtones were launched in Finland by Radiolinja (now part of Elisa Oyj).

    Two major national commercial platforms for mobile commerce were launched in 1999: Smart Money (http://smart.com.ph/money/) in the Philippines, and NTT DoCoMo's i-Mode Internet service in Japan. i-Mode offered a revolutionary revenue-sharing plan where NTT DoCoMo kept 9 percent of the fee users paid for content, and returned 91 percent to the content owner.

    For reference

    Socket Programming

    Sockets are interfaces that can "plug into" each other over a network. Once so "plugged in", the programs so connected communicate. A "server" program is exposed via a socket connected to a certain /etc/services port number. A "client" program can then connect its own socket to the server's socket, at which time the client program's writes to the socket are read as stdin to the server program, and stdout from the server program are read from the client's socket reads.

    Before a user process can perform I/O operations, it calls Open to specify and obtain permissions for the file or device to be used. Once an object has been opened, the user process makes one or more calls to Read or Write data. Read reads data from the object and transfers it to the user process, while Write transfers data from the user process to the object. After all transfer operations are complete, the user process calls Close to inform the operating system that it has finished using that object.

     

    For Reference

    Sunday, March 7, 2010

    WI-MAX

    WiMAX, meaning Worldwide Interoperability for Microwave Access, is a telecommunications technology that provides wireless transmission of data using a variety of transmission modes, from point-to-multipoint links to portable and fully mobile internet access. The technology provides up to 10 Mbps broadband speed without the need for cables. The technology is based on the IEEE 802.16 standard (also called Broadband Wireless Access). The name "WiMAX" was created by the WiMAX Forum, which was formed in June 2001 to promote conformity and interoperability of the standard. The forum describes WiMAX as "a standards-based technology enabling the delivery of last mile wireless broadband access as an alternative to cable and DSL".

    Reference link

    Tuesday, March 2, 2010

    WISENET

    WISENET is a wireless sensor network that monitors the environmental conditions such as light, temperature, and humidity. This network is comprised of nodes called "motes" that form an ad-hoc network to transmit this data to a computer that function as a server. The server stores the data in a database where it can later be retrieved and analyzed via a web-based interface. The network works successfully with an implementation of one sensor mote.

    Introduction:
    The technological drive for smaller devices using less power with greater functionality has created new potential applications in the sensor and data acquisition sectors. Low-power microcontrollers with RF transceivers and various digital and analog sensors allow a wireless, battery-operated network of sensor modules ("motes") to acquire a wide range of data. The TinyOS is a real-time operating system to address the priorities of such a sensor network using low power, hard real-time constraints, and robust communications.

    The first goal of WISENET is to create a new hardware platform to take advantage of newer microcontrollers with greater functionality and more features. This involves selecting the hardware, designing the motes, and porting TinyOS. Once the platform is completed and TinyOS was ported to it, the next stage is to use this platform to create a small-scale system of wireless networked sensors.

    System Description:
    There are two primary subsystems (Data Analysis and Data Acquisition) comprised of three major components (Client, Server, Sensor Mote Network).
    Primary Subsystems:
    There are two top-level subsystems -
    Data Analysis
    Data Acquisition.

    Data Analysis:
    This subsystem is software-only (relative to WISENET). It relied on existing Internet and web (HTTP) infrastructure to provide communications between the Client and Server components. The focus of this subsystem was to selectively present the collected environmental data to the end user in a graphical manner.

    Reference link

    Monday, March 1, 2010

    Lightweight Directory Access Protocol

    The Lightweight Directory Access Protocol, or LDAP ,is an application protocol for querying and modifying directory services running over TCP/IP.

    A directory is a set of objects with attributes organized in a logical and hierarchical manner. A simple example is the telephone directory, which consists of a list of names (of either persons or organizations) organized alphabetically, with each name having an address and phone number associated with it.

    An LDAP directory tree often reflects various political, geographic, and/or organizational boundaries, depending on the model chosen. LDAP deployments today tend to use Domain Name System (DNS) names for structuring the topmost levels of the hierarchy. Deeper inside the directory might appear entries representing people, organizational units, printers, documents, groups of people or anything else that represents a given tree entry (or multiple entries).

    Its current version is LDAPv3, which is specified in a series of Internet Engineering Task Force (IETF) Standard Track Requests for comments (RFCs) as detailed in RFC 4510

    A client starts an LDAP session by connecting to an LDAP server, called a Directory System Agent (DSA), by default on TCP port 389. The client then sends an operation request to the server, and the server sends responses in return. With some exceptions, the client does not need to wait for a response before sending the next request, and the server may send the responses in any order.

    The client may request the following operations:

        * Start TLS — use the LDAPv3 Transport Layer Security (TLS) extension for a secure connection
        * Bind — authenticate and specify LDAP protocol version
        * Search — search for and/or retrieve directory entries
        * Compare — test if a named entry contains a given attribute value
        * Add a new entry
        * Delete an entry
        * Modify an entry
        * Modify Distinguished Name (DN) — move or rename an entry
        * Abandon — abort a previous request
        * Extended Operation — generic operation used to define other operations
        * Unbind — close the connection (not the inverse of Bind)

    Reference links

    Sunday, February 28, 2010

    Kerberos

    Kerberos (pronounced /ˈkɛərbərəs/[1]) is a computer network authentication protocol, which allows nodes communicating over a non-secure network to prove their identity to one another in a secure manner. It is also a suite of free software published by Massachusetts Institute of Technology (MIT) that implements this protocol. Its designers aimed primarily at a client-server model, and it provides mutual authentication — both the user and the server verify each other's identity. Kerberos protocol messages are protected against eavesdropping and replay attacks.

    Kerberos builds on symmetric key cryptography and requires a trusted third party. Extensions to Kerberos can provide for the use of public-key cryptography during certain phases of authentication.

    MIT developed Kerberos to protect network services provided by Project Athena. The protocol was named after the Greek mythological character Kerberos (or Cerberus), known in Greek mythology as being the monstrous three-headed guard dog of Hades. Several versions of the protocol exist; versions 1–3 occurred only internally at MIT.

    Steve Miller and Clifford Neuman, the primary designers of Kerberos version 4, published that version in the late 1980s, although they had targeted it primarily for Project Athena.

    Version 5, designed by John Kohl and Clifford Neuman, appeared as RFC 1510 in 1993 (made obsolete by RFC 4120 in 2005), with the intention of overcoming the limitations and security problems of version 4.

    MIT makes an implementation of Kerberos freely available, under copyright permissions similar to those used for BSD. In 2007, MIT formed the Kerberos Consortium to foster continued development. Founding sponsors include vendors such as Sun Microsystems, Apple, Google, Microsoft and Centrify Corporation, and academic institutions such as Stanford University and MIT.

    Reference links

    Saturday, February 20, 2010

    Bittorrent

    BitTorrent is a peer-to-peer file sharing protocol used for distributing large amounts of data. BitTorrent is one of the most common protocols for transferring large files, and it has been estimated that it accounts for approximately 27-55% of all Internet traffic (depending on geographical location) as of February 2009.[1]

    BitTorrent protocol allows users to distribute large amounts of data without the heavy demands on their computers that would be needed for standard Internet hosting. A standard host's servers can easily be brought to a halt if high levels of simultaneous data flow are reached. The protocol works as an alternative data distribution method that makes even small computers (e.g. mobile phones) with low bandwidth capable of participating in large data transfers.

    Reference links