Showing posts with label computer science seminar. Show all posts
Showing posts with label computer science seminar. Show all posts

Tuesday, July 5, 2011

.Net Framework Security

.NET has its own security mechanism with two general features: Code Access Security (CAS), and validation and verification. Code Access Security is based on evidence that is associated with a specific assembly. Typically the evidence is the source of the assembly (whether it is installed on the local machine or has been downloaded from the intranet or Internet). Code Access Security uses evidence to determine the permissions granted to the code. Other code can demand that calling code is granted a specified permission. The demand causes the CLR to perform a call stack walk: every assembly of each method in the call stack is checked for the required permission; if any assembly is not granted the permission a security exception is thrown. however, has to split the application into subdomains; it is not done by the CLR.

            

Code Access Security (CAS), in the Microsoft .NET framework, is Microsoft's solution to prevent untrusted code from performing privileged actions. When the CLR loads an assembly it will obtain evidence for the assembly and use this to identify the code group that the assembly belongs to. A code group contains a permission set (one or more permissions). Code that performs a privileged action will perform a code access demand which will cause the CLR to walk up the call stack and examine the permission set granted to the assembly of each method in the call stack. The code groups and permission sets are determined by the administrator of the machine who defines the security policy.

Power point Presentation on .net Framework Security

 

Sunday, July 3, 2011

Seminar on Artificial intelligence

Artificial intelligence (AI) is the intelligence of machines and the branch of computer science that aims to create it. AI textbooks define the field as "the study and design of intelligent agents" where an intelligent agent is a system that perceives its environment and takes actions that maximize its chances of success. John McCarthy, who coined the term in 1956, defines it as "the science and engineering of making intelligent machines."

  

The field was founded on the claim that a central property of humans, intelligence—the sapience of Homo sapiens—can be so precisely described that it can be simulated by a machine. This raises philosophical issues about the nature of the mind and the ethics of creating artificial beings, issues which have been addressed by myth, fiction and philosophy since antiquity. Artificial intelligence has been the subject of optimism, but has also suffered setbacks and, today, has become an essential part of the technology industry, providing the heavy lifting for many of the most difficult problems in computer science.

Power point presentations on Artificial intelligence

Seminar on Unlicenced Mobile Access

Generic Access Network or GAN is a telecommunication system that extends mobile voice, data and IP Multimedia Subsystem/Session Initiation Protocol (IMS/SIP) applications over IP networks. Unlicensed Mobile Access or UMA, is the commercial name used by mobile carriers for external IP access into their core networks.

The most common application of GAN is in a dual-mode handset service where subscribers can seamlessly handover connections between wireless LANs and wide area networks using a GSM/Wi-Fi dual-mode mobile phone. UMA technology has enabled the convergence of mobile, fixed and Internet telephony, sometimes called Fixed Mobile Convergence.

                       

The local network may be based on private unlicensed spectrum technologies like 802.11, while the wide network is alternatively GSM/GPRS or UMTS mobile services. On the cellular network, the mobile handset communicates over the air with a base station, through a base station controller, to servers in the core network of the carrier.

Under the GAN system, when the handset detects a wireless LAN, it establishes a secure IP connection through a gateway to a server called a GAN Controller (GANC) on the carrier's network. The GANC presents to the mobile core network as a standard cellular base station. The handset communicates with the GANC over the secure connection using existing GSM/UMTS protocols. Thus, when a mobile moves from a GSM to an 802.11 network, it appears to the core network as if it is simply on a different base station.

Power point presentation on UMA

Saturday, July 2, 2011

List of Seminar topics

Hi All,

Here is the large number of seminar topics on computer science, information technology and electronics along with seminar materials provided. I hope these materials & topics will be helpful for all of you.

If you want any further information, please feel free to post your request in the comment section. I will try to assist in all possible manner.

Thanks!

Friday, July 1, 2011

Seminar on SDLC

The Systems Development Life Cycle (SDLC), or Software Development Life Cycle in systems engineering, information systems and software engineering, is the process of creating or altering systems, and the models and methodologies that people use to develop these systems. The concept generally refers to computer or information systems. Emphasis on this article (SLDC) is on man-made technological life-cycle. But there are many other life-cycle models to choose from. This includes ecological life cycles, for every life cycle, whether biological or technological, has a beginning and an end.

In software engineering the SDLC concept underpins many kinds of software development methodologies. These methodologies form the framework for planning and controlling the creation of an information system: the software development process.

 

Systems Development Life Cycle (SDLC) is a process used by a systems analyst to develop an information system, including requirements, validation, training, and user (stakeholder) ownership. Any SDLC should result in a high quality system that meets or exceeds customer expectations, reaches completion within time and cost estimates, works effectively and efficiently in the current and planned Information Technology infrastructure, and is inexpensive to maintain and cost-effective to enhance.

Computer systems are complex and often (especially with the recent rise of Service-Oriented Architecture) link multiple traditional systems potentially supplied by different software vendors. To manage this level of complexity, a number of SDLC models or methodologies have been created, such as "waterfall"; "spiral"; "Agile software development"; "rapid prototyping"; "incremental"; and "synchronize and stabilize"

Power point presentation on Systems Development Life Cycle

Seminar on fingerprint recognition

Fingerprint recognition or fingerprint authentication refers to the automated method of verifying a match between two human fingerprints. Fingerprints are one of many forms of biometrics used to identify individuals and verify their identity. This article touches on two major classes of algorithms (minutia and pattern) and four sensor designs (optical, ultrasonic, passive capacitance, and active capacitance).

A fingerprint sensor is an electronic device used to capture a digital image of the fingerprint pattern. The captured image is called a live scan. This live scan is digitally processed to create a biometric template (a collection of extracted features) which is stored and used for matching. This is an overview of some of the more commonly used fingerprint sensor technologies.

                     

Optical fingerprint imaging involves capturing a digital image of the print using visible light. This type of sensor is, in essence, a specialized digital camera. The top layer of the sensor, where the finger is placed, is known as the touch surface. Beneath this layer is a light-emitting phosphor layer which illuminates the surface of the finger. The light reflected from the finger passes through the phosphor layer to an array of solid state pixels (a charge-coupled device) which captures a visual image of the fingerprint. A scratched or dirty touch surface can cause a bad image of the fingerprint. A disadvantage of this type of sensor is the fact that the imaging capabilities are affected by the quality of skin on the finger. For instance, a dirty or marked finger is difficult to image properly. Also, it is possible for an individual to erode the outer layer of skin on the fingertips to the point where the fingerprint is no longer visible. It can also be easily fooled by an image of a fingerprint if not coupled with a "live finger" detector. However, unlike capacitive sensors, this sensor technology is not susceptible to electrostatic discharge damage.

Power point Presentation on Fingerprint recognition

Sunday, June 26, 2011

Project - Human Resource Management Systems

A Human Resource Management System (HRMS) or Human Resource Information System (HRIS), refers to the systems and processes at the intersection between human resource management (HRM) and information technology. It merges HRM as a discipline and in particular its basic HR activities and processes with the information technology field, whereas the programming of data processing systems evolved into standardized routines and packages of enterprise resource planning (ERP) software. On the whole, these ERP systems have their origin on software that integrates information from different applications into one universal database. The linkage of its financial and human resource modules through one database is the most important distinction to the individually and proprietary developed predecessors, which makes this software application both rigid and flexible.

            

Power point Presentation on the topic Human Resource Management System

Seminar on Software as a service

Software as a service (SaaS, typically pronounced [sæs]), sometimes referred to as "on-demand software," is a software delivery model in which software and its associated data are hosted centrally (typically in the (Internet) cloud) and are typically accessed by users using a thin client, normally using a web browser over the Internet.

While practically every Internet service (such as Web search engine or web-based email) is driven by some underlying software, the term software as a service is often used in the context of business applications, and in some cases even more narrowly as software in a category which has on-premises software; i.e., equivalent applications that are installed in businesses' computer networks or personal computers.

 

SaaS has become a common delivery model for most business applications, including accounting, collaboration, customer relationship management (CRM), enterprise resource planning (ERP), invoicing, human resource management (HRM), content management (CM) and service desk management. SaaS has been incorporated into the strategy of all leading enterprise software companies.

According to a Gartner Group estimate, SaaS sales in 2010 have reached $9B, up 15.7% from 2009, and are projected to increase to $10.7b in 2011, up 16.2% from 2010. Gartner Group also estimates that SaaS applications, which accounted for a little more than 10% of the total enterprise software market last year, would represent at least 16% of worldwide software sales by 2014.

The term software as a service (SaaS) is considered to be part of the nomenclature of cloud computing, along with infrastructure as a service (IaaS) and platform as a service (PaaS).

Power point presentation on Software as a service

Project Abstract - Combinatorial Approach For Preventing Sql Injection Attacks

A combinatorial approach for protecting Web applications against SQL injection is discussed in this paper, which is a novel idea of incorporating the uniqueness of Signature based method and auditing method. The major issue of web application security is the SQL Injection, which can give the attackers unrestricted access to the database that underlie Web applications and has become increasingly frequent and serious. From signature based method standpoint of view, it presents a detection mode for SQL injection using pair wise sequence alignment of amino acid code formulated from web application form parameter sent via web server.

 

                  

 

On the other hand from the Auditing based method standpoint of view, it analyzes the transaction to find out the malicious access. In signature based method It uses an approach called Hirschberg algorithm, it is a divide and conquer approach to reduce the time and space complexity. This system was able to stop all of the successful attacks and did not generate any false positives.

Project - Time Attendance

Time and attendance, or Workforce Management, systems are used by companies of all sizes to record working hours of employees primarily in order to pay their wages. Some companies have a requirement to record the number of hours spent on specific tasks in order to cost jobs accurately. This is referred to as job costing.

A workforce management system enables an employer to have full control of all employees working hours right at an operators fingertips. It is also invaluable for ensuring compliance with labour regulations regarding proof of attendance.

Companies with large employee numbers might need to install several clocking points in order to speed up the process of getting all employees to clock in or out quickly or to record activity in dispersed locations.

 

                  

 

Depending on the supplier, identification method and number of clocking points required, prices vary widely.

A Workforce Management System protects a company from payroll fraud and provides both employer and employees with confidence in the accuracy of their wage payments.

Project Abstract - Resequencing Analysis Of Stop-And-Wait Arq For Parallel Multichannel Communications

In this paper, we consider a multichannel data communication system in which the stop-and-wait automatic-repeat request protocol for parallel channels with an in-sequence delivery guarantee (MSW-ARQ-inS) is used for error control. We evaluate the resequencing delay and the resequencing buffer occupancy, respectively. Under the assumption that all channels have the same transmission rate but possibly different time-invariant error rates, we derive the probability generating function of the resequencing buffer occupancy and the probability mass function of the resequencing delay. Then, by assuming the Gilbert–Elliott model for each channel, we extend our analysis to time-varying channels. Through examples, we compute the probability mass functions of the resequencing  buffer occupancy and the resequencing delay for time-invariant channels. From numerical and simulation results, we analyze trends in the mean resequencing buffer occupancy and the mean resequencing delay as functions of system parameters. We expect that the modeling technique and analytical approach used in this paper can be applied to the performance evaluation of other ARQ protocols (e.g., the selective-repeat ARQ) over multiple time-varying channels. Index Terms—In-sequence delivery, modeling and performance, multichannel data communications, resequencing buffer occupancy, resequencing delay, SW-ARQ.

Project Abstract - Cell Breathing Techniques For Load Balancing In Wireless Lans

Maximizing network throughput while providing fairness is one of the key challenges in wireless LANs (WLANs). This goal is typically achieved when the load of access points (APs) is balanced. Recent studies on operational WLANs, however, have shown that AP load is often substantially uneven. To alleviate such imbalance of load, several load balancing schemes have been proposed. These schemes commonly require proprietary software or hardware at the user side for controlling the user-AP association. In this paper we present a new load balancing technique by controlling the size of WLAN cells (i.e., AP’s coverage range), which is conceptually similar to cell breathing in cellular networks.

 

         

 

The proposed scheme does not require any modification to the users neither the IEEE 802.11 standard. It only requires the ability of dynamically changing the transmission power of the AP beacon messages. We develop a set of polynomial time algorithms that find the optimal beacon power settings which minimize the load of the most congested AP. We also consider the problem of network-wide min-max load balancing. Simulation results show that the performance of the proposed method is comparable with or superior to the best existing association-based methods.

Project Abstract - Greedy Routing With Anti-Void Traversal For Wireless Sensor Networks

The unreachability problem (i.e., the so-called void problem) that exists in the greedy routing algorithms has been studied for the wireless sensor networks. Some of the current research work cannot fully resolve the void problem, while there exist other schemes that can guarantee the delivery of packets with the excessive consumption of control overheads. In this paper, a greedy antivoid routing (GAR) protocol is proposed to solve the void problem with increased routing efficiency by exploiting the boundary finding technique for the unit disk graph (UDG). The proposed rolling-ball UDG boundary traversal (RUT) is employed to completely guarantee the delivery of packets from the source to the destination node under the UDG network. The boundary map (BM) and the indirect map searching (IMS) scheme are proposed as efficient algorithms for the realization of the RUT technique.

 

 

Moreover, the hop count reduction (HCR) scheme is utilized as a short-cutting technique to reduce the routing hops by listening to the neighbor’s traffic, while the intersection navigation (IN) mechanism is proposed to obtain the best rolling direction for boundary traversal with the adoption of shortest path criterion. In order to maintain the network requirement of the proposed RUT scheme under the non-UDG networks, the partial UDG construction (PUC) mechanism is proposed to transform the non-UDG into UDG setting for a portion of nodes that facilitate boundary traversal. These three schemes are incorporated within the GAR protocol to further enhance the routing performance with reduced communication overhead. The proofs of correctness for the GAR scheme are also given in this paper. Comparing with the existing localized routing algorithms, the simulation results show that the proposed GAR-based protocols can provide better routing efficiency.

 

Project Abstract - Route Stability In Manets Under The Random Direction Mobility Model

A fundamental issue arising in mobile ad hoc networks (MANETs) is the selection of the optimal path between any two nodes. A method that has been advocated to improve routing efficiency is to select the most stable path so as to reduce the latency and the overhead due to route reconstruction.

 

 

In this work, we study both the availability and the duration probability of a routing path that is subject to link failures caused by node mobility. In particular, we focus on the case where the network nodes move according to the Random Direction model, and we derive both exact and approximate (but simple) expressions of these probabilities. Through our results, we study the problem of selecting an optimal route in terms of path availability. Finally, we propose an approach to improve the efficiency of reactive routing protocols.

Presentation on the topic mobile ad hoc networks

Saturday, June 25, 2011

Seminar on Online identity management

Online identity management (OIM) also known as online image management or online personal branding or personal reputation management (PRM) is a set of methods for generating a distinguished Web presence of a person on the Internet. That presence could be reflected in any kind of content that refers to the person, including news, participation in blogs and forums, personal web sites (Marcus, Machilek & Schütz 2006), social media presence, pictures, video, etc.

Online identity management also refers to identity exposure and identity disclosure, and has particularly developed in the management on online identity in social network services (Tufekci 2008) or online dating services (Siibak 2007).

One aspect of the online identity management process has to do with improving the quantity and quality of traffic to sites that have content related to a person. In that aspect, OIM is a part of another discipline called search engine optimization with the difference that the only keyword is the person's name, and the optimization object is not necessary a single web site; it can consider a set of completely different sites that contain positive online references. The objective in this case is to get high rankings for as many sites as possible when someone search for a person's name. If the search engine used is Google, this action is called "to google someone”.

Another aspect has to do with impression management, i.e. "the process through which people try to control the impressions other people form of them". One of the objective is in particular to increase the online reputation of the person.

Online identity management often involves participation in social media sites like Facebook, LinkedIn, Flickr, YouTube, Twitter, Twitxr, Last.fm, Myspace, Orkut and other online communities and community websites, and is related to blogging, blog social networks like MyBlogLog and blog search engines like Technorati.

But it can also consist in more questionable practices. Hence in the case of social network services users have the possibility to buy 'friends' so to increase their visibility

             

 

Presentation on the topic  Online identity management

Seminar on Personality development

Personality Development quintessentially means enhancing and grooming one’s outer and inner self to bring about a positive change to your life. Each individual has a distinct persona that can be developed, polished and refined. This process includes boosting one’s confidence, improving communication and language speaking abilities, widening ones scope of knowledge, developing certain hobbies or skills, learning fine etiquettes and manners, adding style and grace to the way one looks, talks and walks and overall imbibing oneself with positivity, liveliness and peace.

The whole process of this development takes place over a period of time. Even though there are many crash courses in personality development that are made available to people of all age groups, implementing this to your routine and bringing about a positive change in oneself takes a considerable amount of time. It is not necessary to join a personality development course; one can take a few tips and develop his or her own aura or charm.

 

 

Presentation on the topic Personality Development

How to make a Presentation

Below are some of the ways to prepare for presentation/seminars

  • Think about the presentation beforehand. It is short-changing the organisers of the event and your audience if you only think about what you're going to say the day before or while travelling to the event. If necessary, clarify with the organisers exactly what is required of you and what facilities you will require.
  • Do use PowerPoint if the facilities are available. Although some speakers seem to have taken an aversion to PowerPoint, it is so convenient and ensures that your presentation has a clear structure and something for your listeners to take away.
  • Be very clear about how much time you have - and stick to that time in preparing and delivering your presentation. It's very difficult to 'cut' a PowerPoint presentation at the event itself, so it's a great mistake to run out of time. Most presenters prepare too much material; but nobody ever complains that a presentation was too short (it always allows more time for questions).
  • Be very clear about your key message - and ensure that everything in your presentation is both consistent with, and suppportive of, that key message. You should be able to articulate the message in a phrase or a sentence and indeed you might want to use that phrase or sentence in one of your first slides, or one of your last, or even both.
  •  

                      

    Source :http://www.rogerdarlington.co.uk/Presentation.html

    Presentation on the topic presentation/seminars

    Seminar on Project management

    Project management is the discipline of planning, organizing, securing and managing resources to bring about the successful completion of specific project goals and objectives.

    A project is a temporary endeavor, having a defined beginning and end (usually constrained by date, but can be by funding or deliverables), undertaken to meet unique goals and objectives, usually to bring about beneficial change or added value. The temporary nature of projects stands in contrast to business as usual (or operations), which are repetitive, permanent or semi-permanent functional work to produce products or services. In practice, the management of these two systems is often found to be quite different, and as such requires the development of distinct technical skills and the adoption of separate management.

    The primary challenge of project management is to achieve all of the project goals and objectives while honoring the preconceived project constraints. Typical constraints are scope, time, and budget. The secondary—and more ambitious—challenge is to optimize the allocation and integration of inputs necessary to meet pre-defined objectives.

       

     

    Power point presentation on Project management

    Seminar on Linux Virtual File System

    A virtual file system (VFS) or virtual filesystem switch is an abstraction layer on top of a more concrete file system. The purpose of a VFS is to allow client applications to access different types of concrete file systems in a uniform way. A VFS can, for example, be used to access local and network storage devices transparently without the client application noticing the difference. It can be used to bridge the differences in Windows, Mac OS and Unix filesystems, so that applications can access files on local file systems of those types without having to know what type of file system they are accessing.

    A VFS specifies an interface (or a "contract") between the kernel and a concrete file system. Therefore, it is easy to add support for new file system types to the kernel simply by fulfilling the contract. The terms of the contract might change incompatibly from release to release, which would require that concrete file system support be recompiled, and possibly modified before recompilation, to allow it to work with a new release of the operating system; or the supplier of the operating system might make only backward-compatible changes to the contract, so that concrete file system support built for a given release of the operating system would work with future versions of the operating system.

                        

     

    Presentation on the topic virtual file system

    Internet Marketing Strategy

    Developing a successful internet marketing strategy is an essential part of your online success. In order to succeed, you must develop and implement a strategic plan that includes all of the following:
      • A great product
      • A web site specifically designed to sell
      • A killer marketing strategy
    Each step plays an important role in your overall strategy and must be developed to its fullest potential. If even one step fails, your chances of success will be minimal.

    Developing Your Product

    Your first step will be to develop a great product. You're probably thinking that's easier said than done, but it's really not. The absolute best product is one that you can develop yourself and deliver over the Internet. With today's technology, there is absolutely no reason why you can't create your own product. The knowledge you have within your own mind is extremely valuable. Everybody is good at something, has a special talent or some specialized knowledge. Use this knowledge to create a product.
    The key to developing a great product is exclusiveness. Your product should be unique and not be in competition with hundreds of other similar products. You must give your potential customers exactly what they want. Develop a high-quality product that fills a void to increase your chance of success.
    Another consideration of great importance is your target market. Keep in mind, the Internet is a global marketplace. Develop a product with a large geographic target and a wide appeal. A great product will fulfill a need or desire and provide instant gratification.

    Source: http://www.web-source.net/3steps.htm

    Presentation on Topic