Showing posts with label computer science seminar topic. Show all posts
Showing posts with label computer science seminar topic. Show all posts

Sunday, September 23, 2012

SET Based Approach to Secure the Payment in Mobile Commerce

In this paper we propose an approach, combining the SET protocol with the TLS/WTLS protocols in order to enforce the security services over the WAP 1.X for the payment in the m-commerce. We propose to implement the additional services of the SET protocol as the confidentiality of the payment information between the buyer and the payment gateway and the data integrity. However, we use WTLS certificates instead of the SET certificates. This allows to avoid the SET certification heaviness. Moreover, this approach eliminates the “WAP gap ” since the payment information would not be decrypted within the WAP gateway nor within the seller side.

Download

Seminar on Distributed Database Systems

A distributed database is a database in which storage devices are not all attached to a common processing unit such as the CPU. It may be stored in multiple computers located in the same physical location, or may be dispersed over a network of interconnected computers. Unlike parallel systems, in which the processors are tightly coupled and constitute a single database system, a distributed database system consists of loosely coupled sites that share no physical components.

Collections of data (e.g. in a database) can be distributed across multiple physical locations. A distributed database can reside on network servers on the Internet, on corporate intranets or extranets, or on other company networks. The replication and distribution of databases improves database performance at end-user worksites. 

To ensure that the distributive databases are up to date and current, there are two processes: replication and duplication. Replication involves using specialized software that looks for changes in the distributive database. Once the changes have been identified, the replication process makes all the databases look the same. The replication process can be very complex and time consuming depending on the size and number of the distributive databases. This process can also require a lot of time and computer resources. Duplication on the other hand is not as complicated. It basically identifies one database as a master and then duplicates that database. The duplication process is normally done at a set time after hours. This is to ensure that each distributed location has the same data. In the duplication process, changes to the master database only are allowed. This is to ensure that local data will not be overwritten. Both of the processes can keep the data current in all distributive locations.

Reference

Distributed Databases

Distributed Database System - DUET

Database Management Systems

Distributed Database Systems

Distributed Databases - Prentice Hall

Saturday, September 22, 2012

Seminar - Microsoft Silverlight

Microsoft Silverlight is an application framework for writing and running rich Internet applications, with features and purposes similar to those of Adobe Flash. The run-time environment for Silverlight is available as a plug-in for web browsers running under Microsoft Windows and Mac OS X. While early versions of Silverlight focused on streaming media, current versions support multimedia, graphics and animation, and give developers support for CLI languages and development tools. Silverlight is also one of the two application development platforms for Windows Phone, but Silverlight enabled web pages cannot run on Internet Explorer for Windows Phone as there is no plugin.

                           

Over the course of about five years Microsoft has released five versions: The first version was released in 2007; the latest version was released on May 8, 2012. It is compatible with multiple web browsers used on Microsoft Windows and Mac OS X operating systems, and with mobile devices using the Windows Mobile and Symbian (Series 60) platforms. A free software implementation named Moonlight, developed by Novell in cooperation with Microsoft, is available to bring Silverlight versions 1 and 2 functionality to Linux, FreeBSD and other open source platforms, although some Linux distributions do not include it, citing redistribution and patent concerns. On May 2012, Moonlight was abandoned because of the lack of popularity of Silverlight

References

ArcGIS API for Microsoft Silverlight/WPF: Advanced Topics

Building Rich Web Applications with Microsoft SilverLight
Silverlight Webservices on Wall Street

Microsoft Silverlight

Microsoft Silverlight is a cross-browser, cross-platform

Project – Music player in java

Here is another project which can be used as mini project. Its an open source music player coded in java. You can use it for reference to understand the programming structure as to how java can be used for designing applications. It will definitely help to understand the power of java. This player can be used as case study too to understand its complexity involved in desgining such application.

 

          

You DO need a J2SE 1.4 or higher (J2SE 1.5, 1.6)

http://www.javazoom.net/jlgui/sources.html

Monday, August 15, 2011

122 Seminar & projects

Here are 122 seminar topics related to computer science, electronics and  electrical field along with power point presentation.

    1. Project Abstract - E-Learning
    2. Seminar on SMTP
    3. Seminar on Software as a service
    4. Project - Time Attendance
    5. Tabu Search Algorithm For Cluster Building In Wire...
    6. Seminar on Online identity management
    7. Seminar on Website Marketing
    8. Seminar on Personality development
    9. How to make a Presentation
    10. Seminar on Project management
    11. Seminar on leadership qualities
    12. Seminar on Linux Virtual File System
    13. Internet Marketing Strategy
    14. Seminar on Internet Marketing
    15. Seminar on Affiliate marketing
    16. Seminar on Search Engine Marketing
    17. Seminar on Time management
    18. Seminar on Java Security
    19. Web Services in Java
    20. Seminar on SDLC
    21. Seminar on fingerprint recognition
    22. Project Abstract - Hospital Management System
    23. Seminar on Android
    24. Seminar on Organizational information systems
    25. Project - Digital library
    26. Seminar on E-Business
    27. Seminar on Iris Scanning
    28. Grid network
    29. Earth Simulator
    30. M-Commerce
    31. Socket Programming
    32. video door phone
    33. CCTV System
    34. WI-MAX
    35. WISENET
    36. Optical fiber communication
    37. Lightweight Directory Access Protocol
    38. Kerberos
    39. Organic light emitting diode (OLED)
    40. Augmented Reality
    41. The Bionic Eye
    42. Optical Communications in Space
    43. 4G Wireless Systems
    44. Bittorrent
    45. Wireless USB
    46. Tripwire
    47. Data mining
    48. Interactive Voice Response
    49. Nessus
    50. Mobile Computing
    51. Holographic Versatile Disc
    52. Satellite radio
    53. Silverlight
    54. Bluetooth
    55. Wearable computers
    56. Cluster computing
    57. Quantum computer
    58. HVAC
    59. Mobile IP
    60. FireWire
    61. Home Networking
    62. Plasma display
    63. PLAN 9 Operating system
    64. Global Positioning System
    65. Spyware and Trojan horses
    66. Voice over Internet Protocol
    67. SSL-TLS
    68. PolyBot - Modular, self-reconfigurable robots
    69. Facial recognition system
    70. Captchas
    71. Ext3 File System
    72. Embedded Linux
    73. Computer forensics
    74. Security Protocol For Sensor Network
    75. Signal processing
    76. Seminar on Smoke detector
    77. Seminar on Motion detector
    78. Seminar on Transformer
    79. Seminar Test automation framework
    80. Seminar on Digital and analog signals
    81. Seminar on Programmable logic controller
    82. Seminar on LED
    83. Seminar on power systems automations
    84. Seminar on Flight Simulator
    85. Application Server
    86. Inventory Control System
    87. Seminar - Online Gaming
    88. Project – Online Survey System
    89. Project Abstract - Traffic Management System
    90. Seminar on IPTV
    91. Seminar on Smartphone
    92. Seminar on Real-Time Operating Systems
    93. Seminar on Agile Methodology
    94. Project on GPS Integrity Monitoring
    95. Seminar on Listening Skills
    96. Seminar on Communication Skills
    97. Seminar on Mobile commerce
    98. Project - Payroll Management System
    99. Seminar on SAP CRM
    100. Seminar on Sales Tracking
    101. Seminar on Marketing
    102. Seminar on Sap R/3 Architecture
    103. Seminar on Software Project Management
    104. Seminar on Motivation
    105. Seminar on CRM
    106. Enterprise resource planning
    107. Seminar on Cloud computing
    108. Project - 2D Sonar
    109. Project - 3D Pong
    110. Project on Laser Pointer Mouse
    111. Project on Fingerprint Verification System
    112. Project - Wireless Surveillance System
    113. Project - Instant messaging
    114. Seminar on Laser Communications
    115. Project - Online Examination System
    116. Nanotechnology
    117. Project on Library Management System
    118. Seminar on web application security
    119. .Net Framework Security
    120. Seminar on .NET framework
    121. Seminar on Artificial intelligence
    122. Seminar on Unlicenced Mobile Access

Incase, you have any suggestion or wants me to add any topic. Kindly post in the comment section.

Thanks!

Saturday, August 13, 2011

Seminar on Flight Simulator

Flight simulation is an artificial re-creation of aircraft flight and various aspects of the flight environment. This includes the equations that govern how aircraft fly, how they react to applications of their controls and other aircraft systems, and how they react to the external environment such as air density, turbulence, cloud, precipitation, etc. Flight simulation is used for a variety of reasons, including flight training (mainly of pilots), for the design and development of the aircraft itself, and for research into aircraft characteristics, control handling qualities, and so forth.

        
Flight simulations have varying degrees of hardware, modelling detail and realism that depend on their purpose. They can range from PC laptop-based models of aircraft systems, to simple replica cockpits for familiarisation purposes, to more complex cockpit simulations with some working controls and systems, to highly detailed cockpit replications with all controls and aircraft systems and wide-field outside-world visual systems, all mounted on six degree-of-freedom (DOF) motion platforms which move in response to pilot control movements and external aerodynamic factors.

Presentation

Flight Simulator Game Engine Progress
Human Space Flight Training Survey – FAA
Computational Bat Flight Visualization

Sunday, August 7, 2011

Seminar - Online Gaming

An online game is a game played over some form of computer network. This almost always means the Internet or equivalent technology, but games have always used whatever technology was current: modems before the Internet, and hard wired terminals before modems. The expansion of online gaming has reflected the overall expansion of computer networks from small local networks to the Internet and the growth of Internet access itself. Online games can range from simple text based games to games incorporating complex graphics and virtual worlds populated by many players simultaneously. Many online games have associated online communities, making online games a form of social activity beyond single player games.


The rising popularity of Flash and Java led to an Internet revolution where websites could utilize streaming video, audio, and a whole new set of user interactivity. When Microsoft began packaging Flash as a pre-installed component of IE, the Internet began to shift from a data/information spectrum to also offer on-demand entertainment. This revolution paved the way for sites to offer games to web surfers. Some online multiplayer games like World of Warcraft, Final Fantasy XI and Lineage II charge a monthly fee to subscribe to their services, while games such as Guild Wars offer an alternative no monthly fee scheme. Many other sites relied on advertising revenues from on-site sponsors, while others, like RuneScape, or Tibia let people play for free while leaving the players the option of paying, unlocking new content for the members.

PowerPoint presentation on  Online gaming

Online Gaming

Online Gaming 2

Teens and Gaming

Online Gaming 3
Online Games 4
Measuring Online Game Application in GPRS and UMTS

Friday, August 5, 2011

Seminar on IPTV

Internet Protocol television (IPTV) is a system through which Internet television services are delivered using the architecture and networking methods of the Internet Protocol Suite over a packet-switched network infrastructure (such as the Internet or other access network), instead of being delivered through traditional radio frequency broadcast, satellite signal, and cable television (CATV) formats.
IPTV services may be classified into three main groups:
live television, with or without interactivity related to the current TV show;


time-shifted television: catch-up TV (replays a TV show that was broadcast hours or days ago), start-over TV (replays the current TV show from its beginning)
video on demand (VOD): browse a catalog of videos, not related to TV programming.
IPTV is distinguished from general Internet-based or web-based multimedia services by its on-going standardization process (e.g., European Telecommunications Standards Institute) and preferential deployment scenarios in subscriber-based telecommunications networks with high-speed access channels into end-user premises via set-top boxes or other customer-premises equipment.

Powerpoint presentation on IPTV

Iptv.Ppt
IPTV Industry Potential and Limitations - Gerson Lehrman Group
Presentation on IPTV and Mobile TV
Social IPTV Platform for Internal Collaboration

Tuesday, July 26, 2011

Seminar on Smartphone

A smartphone is a high-end mobile phone that offers more advanced computing ability and connectivity than a contemporary feature phone (i.e. a modern low-end phone). A smartphone combines the functions of a personal digital assistant (PDA) and a mobile phone. Today's models typically also serve as portable media players and camera phones with high-resolution touchscreen, GPS navigation, Wi-Fi and mobile broadband access.
A smartphone runs a complete mobile operating system. Widespread examples are Apple iOS, Google Android, Microsoft Windows Phone 7, Nokia Symbian, Research In Motion BlackBerry OS, and embedded Linux distributions such as Maemo and MeeGo. Such systems can be installed on many different phone models. They can run third-party applications, using an application programming interface (API).
According to an Olswang report in early 2011, the rate of smartphone adoption is accelerating: as of March 2011 22% of UK consumers had a smartphone, with this percentage rising to 31% amongst 24–35 year olds. Growth in demand for advanced mobile devices boasting powerful processors and graphics processing units, abundant memory (FLASH memory), high-resolution screens with multi-touch capability, and open operating systems has outpaced the rest of the mobile phone market for several years. According to an early 2010 study by ComScore, over 45.5 million people in the United States owned smartphones out of 234 million total subscribers. Despite the large increase in smartphone sales in the last few years, smartphone shipments only make up 20% of total handset shipments, as of the first half of 2010. In March 2011 Berg Insight reported data that showed global smartphone shipments increased 74% from 2009 to 2010.

                  

Power point presentation on Smartphone

Smartphones at Rice University
SmartPhone Attacks and Defenses
Smart-phones
Smartphones in Ophthalmology
Understanding Win32 Support in Pocket PC and Smartphone
SmartPhone Thesis A Seminar - cse

Seminar on Agile Methodology

Agile Software Development is a group of software development methodologies based on iterative and incremental development, where requirements and solutions evolve through collaboration between self-organizing, cross-functional teams. The Agile Manifesto introduced the term in 2001.

       

Incremental software development methods have been traced back to 1957. In 1974, a paper by E. A. Edmonds introduced an adaptive software development process.
So-called lightweight software development methods evolved in the mid-1990s as a reaction against heavyweight methods, which were characterized by their critics as a heavily regulated, regimented, micromanaged, waterfall model of development. Proponents of lightweight methods (and now agile methods) contend that they are a return to development practices from early in the history of software development.
Early implementations of lightweight methods include Scrum (1995), Crystal Clear, Extreme Programming (1996), Adaptive Software Development, Feature Driven Development, and Dynamic Systems Development Method (DSDM) (1995). These are now typically referred to as agile methodologies, after the Agile Manifesto published in 2001.

Power point presentation on Agile Software Development

SCRUM – an agile software development methodology
Agile Development Methodology
Agile Software Development
eXtreme Programming and Agile Concepts
Agile Software Engineering
Agile Methods A Practical Perspective

Saturday, July 23, 2011

Seminar on Mobile commerce

Mobile Commerce, or m-Commerce, is about the explosion of applications and services that are becoming accessible from Internet-enabled mobile devices. It involves new technologies, services and business models. It is quite different from traditional e-Commerce. Mobile phones impose very different constraints than desktop computers. But they also open the door to a slew of new applications and services. They follow you wherever you go, making it possible to look for a nearby restaurant, stay in touch with colleagues, or pay for items at a store.

              

As the Internet finds its way into our purses or shirt pockets, the devices we use to access it are becoming more personal too. Already today, mobile phones know the phone numbers of our friends and colleagues. They are starting to track our location. Tomorrow, they will replace our wallets and credit cards. One day, they may very well turn into intelligent assistants capable of anticipating many of our wishes and needs, such as automatically arranging for taxis to come and pick us up after business meetings or providing us with summaries of relevant news and messages left by colleagues. But, for all these changes to happen, key issues of interoperability, usability, security, and privacy still need to be addressed.

 

Power presentation on Mobile Commerce

Introduction to M-Commerce - Stanford InfoLab
Mobile Commerce
Mobile Commerce 2
Mobile Computing & Networking

Idea Mobile Commerce

Mobile Commerce - Protocol Engineering and Technology Unit

Project - Payroll Management System

The Piccolo Payroll Management System is intended to be a secure and robust enterprise application that can help manage personnel financial aspects. It is developed in Visual Basic.NET and XML.

 

Download

Reference material on Payroll Management System

Source Code C Payroll Management System
Payroll Presentation - New York University
HR/Payroll System Replacement Project - Brown University
Electronic Payroll System
HRMS and Payroll

More info regarding project can be obtained from

http://sourceforge.net/projects/piccolo-payroll/

Friday, July 22, 2011

Seminar on Marketing

Marketing is the process used to determine what products or services may be of interest to customers, and the strategy to use in sales, communications and business development.It generates the strategy that underlies sales techniques, business communication, and business developments. It is an integrated process through which companies build strong customer relationships and create value for their customers and for themselves.


Marketing is used to identify the customer, satisfy the customer, and keep the customer. With the customer as the focus of its activities, marketing management is one of the major components of business management. Marketing evolved to meet the stasis in developing new markets caused by mature markets and overcapacities in the last 2-3 centuries.[citation needed] The adoption of marketing strategies requires businesses to shift their focus from production to the perceived needs and wants of their customers as the means of staying profitable.
The term marketing concept holds that achieving organizational goals depends on knowing the needs and wants of target markets and delivering the desired satisfactions. It proposes that in order to satisfy its organizational objectives, an organization should anticipate the needs and wants of consumers and satisfy these more effectively than competitors.

Power point presentation on Marketing

Presentation Guidelines for Marketing Plans
Marketing
How to create a Successful Marketing Plan
Marketing Management
CRM in Marketing
MARKETING ENVIRONMENT

Wednesday, July 20, 2011

Seminar on Software Project Management

The history of software project management is closely related to the history of software. Software was developed for dedicated purposes for dedicated machines until the concept of object-oriented programming began to become popular in the 1960's, making repeatable solutions possible for the software industry. Dedicated systems could be adapted to other uses thanks to component-based software engineering. Companies quickly understood the relative ease of use that software programming had over hardware circuitry, and the software industry grew very quickly in the 1970's and 1980's. To manage new development efforts, companies applied proven project management methods, but project schedules slipped during test runs, especially when confusion occurred in the gray zone between the user specifications and the delivered software. To be able to avoid these problems, software project management methods focused on matching user requirements to delivered products, in a method known now as the waterfall model.

Power point presentation on software project management
Software Project Management
Software Project Management 2
Software Project Management 3

Project management - Center for Systems and Software Engineering

Project Management – Planning
Quantitative Methods in Project Management

Monday, July 18, 2011

Seminar on CRM

Customer relationship management(CRM) is a widely-implemented strategy for managing a company’s interactions with customers, clients and sales prospects. It involves using technology to organize, automate, and synchronize business processes—principally sales activities, but also those for marketing, customer service, and technical support. The overall goals are to find, attract, and win new clients, nurture and retain those the company already has, entice former clients back into the fold, and reduce the costs of marketing and client service. Customer relationship management describes a company-wide business strategy including customer-interface departments as well as other departments. Measuring and valuing customer relationships is critical to implementing this strategy.

Benefits of CRM

A CRM system may be chosen because it is thought to provide the following advantages:

  • Quality and efficiency
  • Decrease in overall costs
  • Decision support
  • Enterprise agility
  • Customer Attention

Power point presentation on CRM

Customer Relationship Management (CRM)
CRM in Marketing
CRM 2
SAP CRM Internet Sales Online Services for Prospective
CRM Presentation
Pricing Overview for CRM 3.0
crm ppt

Enterprise resource planning

Enterprise resource planning (ERP) integrates internal and external management information across an entire organization, embracing finance/accounting, manufacturing, sales and service, customer relationship management, etc. ERP systems automate this activity with an integrated software application. Its purpose is to facilitate the flow of information between all business functions inside the boundaries of the organization and manage the connections to outside stakeholders.
ERP systems can run on a variety of hardware and network configurations, typically employing a database as a repository for information.


ERP systems typically include the following characteristics:

  • An integrated system that operates in real time (or next to real time), without relying on periodic updates.
  • A common database, which supports all applications.
  • A consistent look and feel throughout each module.
  • Installation of the system without elaborate application/data integration by the Information Technology (IT) department
    Power point presentation on ERP
ERP PPT - Free ERP Software Implementation Guide

 ERP Implementation Fundamentals

 ERP Centric Data Mining and KD

 ERP

 ERP Modules

 ERP and CRM

Sunday, July 17, 2011

Seminar on Cloud computing

Cloud computing means using multiple server computers via a digital network, as though they were one computer. Often, the services available are considered part of cloud computing.
Traditionally, without a cloud, a web server runs as a single computer or a group of privately owned computers. The computer(s) are powerful enough to serve a given amount of requests per minute and can do so with a certain amount of latency per request. If the computer's website or web application suddenly becomes more popular, and the amount of requests are far more than the web server can handle, the response time of the requested pages will be increased due to overloading. On the other hand, in times of low load much of the capacity will go unused.
If the website, service, or web application is hosted in a cloud, however, additional processing and compute power is available from the cloud provider. The website would share those servers with perhaps thousands of other websites varying size and memory. If the website suddenly becomes more popular, the cloud can automatically direct more individual computers to work to serve pages for the site, and more money is paid for the extra usage. If it becomes unpopular, however, the amount of money due will be less. Cloud computing is popular for its pay-as-you-go pricing model.

Cloud computing visual diagram
Clouds are sometimes set up within large corporations, or other institutions, so that many users all share the same server power. As computer power gets cheaper, many different applications are provided and managed by the cloud server. In many cases, users might not download and install applications on their own device or computer; all processing and storage is maintained by the cloud server.

Power point presentation on Cloud computing

Cloud computing
Security Issue in cloud Computing
Cloud Computing
Service Oriented Cloud Computing Infrastructure

Cloud Computing 2

Cloud Computing 3

Cloud computing: A mainframe strategy overview

Saturday, July 16, 2011

Project on Library Management System

An integrated library system (ILS), also known as a library management system (LMS), is an enterprise resource planning system for a library, used to track items owned, orders made, bills paid, and patrons who have borrowed.

An ILS usually comprises a relational database, software to interact with that database, and two graphical user interfaces (one for patrons, one for staff). Most ILSes separate software functions into discrete programs called modules, each of them integrated with a unified interface. Examples of modules might include:

acquisitions (ordering, receiving, and invoicing materials)
    cataloging (classifying and indexing materials)
    circulation (lending materials to patrons and receiving them back)
    serials (tracking magazine and newspaper holdings)
    the OPAC (public interface for users)

 

    

Each patron and item has a unique ID in the database that allows the ILS to track its activity.

Larger libraries use an ILS to order and acquire, receive and invoice, catalog, circulate, track and shelve materials. Smaller libraries, such as those in private homes or non-profit organizations (like churches or synagogues, for instance), often forgo the expense and maintenance required to run an ILS, and instead use a library computer system.

Power point presentation on Library Management System

Library Management System
LIBRARY MANAGEMENT SYSTEM 2
RFID BASED LIBRARY MANAGEMENT SYSTEM
School library management system
Introduction to Open Source Library Management Systems
Mobile Library Management System
Online Library Management System

Seminar on web application security

A web application security scanner is program which communicates with a web application through the web front-end in order to identify potential security vulnerabilities in the web application and architectural weaknesses. It performs a black-box test. Unlike source code scanners, web application scanners don't have access to the source code and therefore detect vulnerabilities by actually performing attacks.

                                                                                                                    

A web application security scanner can facilitate the automated review of a web application with the expressed purpose of discovering security vulnerabilities, and are required to comply with various regulatory requirements. Web application scanners can look for a wide variety of vulnerabilities, including:

  • Input/Output validation: (Cross-site scripting, SQL Injection, etc.)
  • Specific application problems
  • Server configuration mistakes/errors/version

Power point presentation on web application security

Web application security
Web Application Security 1
Web Application Security - Black Hat
Introduction to Web Application Security and App
E-security solutions: Web Applications Security and challenges
Web Application Security 2
Building a Robust Web Application Security Plan
Web Application Security Whitepaper

Tuesday, July 5, 2011

.Net Framework Security

.NET has its own security mechanism with two general features: Code Access Security (CAS), and validation and verification. Code Access Security is based on evidence that is associated with a specific assembly. Typically the evidence is the source of the assembly (whether it is installed on the local machine or has been downloaded from the intranet or Internet). Code Access Security uses evidence to determine the permissions granted to the code. Other code can demand that calling code is granted a specified permission. The demand causes the CLR to perform a call stack walk: every assembly of each method in the call stack is checked for the required permission; if any assembly is not granted the permission a security exception is thrown. however, has to split the application into subdomains; it is not done by the CLR.

            

Code Access Security (CAS), in the Microsoft .NET framework, is Microsoft's solution to prevent untrusted code from performing privileged actions. When the CLR loads an assembly it will obtain evidence for the assembly and use this to identify the code group that the assembly belongs to. A code group contains a permission set (one or more permissions). Code that performs a privileged action will perform a code access demand which will cause the CLR to walk up the call stack and examine the permission set granted to the assembly of each method in the call stack. The code groups and permission sets are determined by the administrator of the machine who defines the security policy.

Power point Presentation on .net Framework Security