Showing posts with label free download. Show all posts
Showing posts with label free download. Show all posts

Monday, August 15, 2011

SUSE Linux Administration

Course Description

The SUSE Linux Administration (3037) course teaches how to perform basic SUSE Linux Enterprise Server 9 (SLES 9) administrative tasks.

Course Objectives
This course teaches you how to perform the following Linux system administration tasks for SLES 9:
  • Update and check the health of a SLES 9 server
  • Perform administrative tasks with YaST
  • Manage users and groups
  • Provide basic system security
  • Manage the Linux file system
  • Manage software installation
  • Manage system initialization, processes, and services
  • Connect the server to the network
  • Provide basic network services (such as printing and web access)
  • Remotely access a SLES 9 server
These are administrative skills common to an entry-level administrator or help desk
technician in an enterprise environment.
Course Audience

While the primary audience for this course is Linux professionals, administrators with experience in other operating systems can also use this course to help prepare them to perform SLES 9 administrative tasks.

PDF Study Material

SUSE Linux Fundamentals

Learn SUSE Linux. Below mentioned are the course objectives, Audience & study material.
Course Objectives
This course teaches you the following concepts and skills fundamental to preparing to learn how to perform SLES 9 administrative tasks:
  • Understand the Linux story
  • Use the Linux desktop
  • Locate and use Help resources in the Linux system
  • Administer Linux with the YaST management utility
  • Manage Directories and Files in the Linux System
  • Work with the Linux shell and command line
  • Use Linux text editors
  • Understand and view processes in the Linux system
  • Manage the network configuration

These are fundamental and prerequisite to learning the skills of an entry level SUSE Linux administrator or help desk technician in an enterprise environment.

Course Audience

This course is intended for Linux administrators who need to administer SUSE Linux Enterprise Server on their network.

Prerequisite Knowledge

Before taking this course, we recommend that you have some experience working with a Linux desktop or server in a computing environment (such as an enterprise or academic environment).  However, you can successfully complete the course without prior Linux experience.

PDF Study material

Saturday, August 13, 2011

Seminar Test automation framework

A test automation framework is a set of assumptions, concepts and tools that provide support for automated software testing. The main advantage of such a framework is the low cost for maintenance. If there is change to any test case then only the test case file needs to be updated and the Driver Script and Startup script will remain the same. Ideally, there is no need to update the scripts in case of changes to the application.
Choosing the right framework/scripting technique helps in maintaining lower costs. The costs associated with test scripting are due to development and maintenance efforts. The approach of scripting used during test automation has effect on costs.


Various framework/scripting techniques are generally used:

*Linear (procedural code, possibly generated by tools like those that use record and playback)
*Structured (uses control structures - typically ‘if-     else’, ‘switch’, ‘for’, ‘while’ conditions/ statements)
*Data-driven (data is persisted outside of tests in a database, spreadsheet, or other mechanism)
*Keyword-driven
*Hybrid (two or more of the patterns above are used)

Presentation

CTA Test Automation Framework.ppt

Understanding of Automation Framework - Software Testing Genius

Software Testing Automation Framework (STAF) -

Software Testing Automation Framework (STAF)
Building an Automation Framework around Open Source
Test Automation

Sunday, August 7, 2011

Application Server

An application server is a software framework that provides an environment where applications can run, no matter what the applications are or what they do. It is dedicated to the efficient execution of procedures (programs, routines, scripts) for supporting the construction of applications.
The term was originally used when discussing early client–server systems to differentiate servers that run SQL services and middleware servers from file servers.


Later, the term took on the meaning of Web applications, but has since evolved further into more of a comprehensive service layer. An application server acts as a set of components accessible to the software developer through an API defined by the platform itself. For Web applications, these components are usually performed in the same machine where the Web server is running, and their main job is to support the construction of dynamic pages. However, present-day application servers target much more than just Web pages generation, they implement services like clustering, fail-over and load-balancing, so developers can be focused just on implementing the business logic.
Normally the term refers to Java application servers. When this is the case, the application server behaves like an extended virtual machine for the running applications, handling transparently connections to the database at one side, and connections to the Web client at the other.
Other uses of the term may refer to the services that a server makes available or the computer hardware on which the services run.

PowerPoint Presentation

Next Generation Web Application Server Platform
ApplicationServer.ppt
Application Servers
IBM WebSphere Application Server Fundamentals – Part 2
Application Server
J2EE Application Server

Seminar - Online Gaming

An online game is a game played over some form of computer network. This almost always means the Internet or equivalent technology, but games have always used whatever technology was current: modems before the Internet, and hard wired terminals before modems. The expansion of online gaming has reflected the overall expansion of computer networks from small local networks to the Internet and the growth of Internet access itself. Online games can range from simple text based games to games incorporating complex graphics and virtual worlds populated by many players simultaneously. Many online games have associated online communities, making online games a form of social activity beyond single player games.


The rising popularity of Flash and Java led to an Internet revolution where websites could utilize streaming video, audio, and a whole new set of user interactivity. When Microsoft began packaging Flash as a pre-installed component of IE, the Internet began to shift from a data/information spectrum to also offer on-demand entertainment. This revolution paved the way for sites to offer games to web surfers. Some online multiplayer games like World of Warcraft, Final Fantasy XI and Lineage II charge a monthly fee to subscribe to their services, while games such as Guild Wars offer an alternative no monthly fee scheme. Many other sites relied on advertising revenues from on-site sponsors, while others, like RuneScape, or Tibia let people play for free while leaving the players the option of paying, unlocking new content for the members.

PowerPoint presentation on  Online gaming

Online Gaming

Online Gaming 2

Teens and Gaming

Online Gaming 3
Online Games 4
Measuring Online Game Application in GPRS and UMTS

Saturday, August 6, 2011

Project – Online Survey System

LimeSurvey is a PHP survey software to create online surveys. Features open/closed surveys, branching, participant administration, quotas, WYSIWYG HTML editor, email invitations & reminders, assessments, basic statistics and more

Download the project

Friday, August 5, 2011

Project Abstract - Traffic Management System

Active traffic management (ATM), also known as managed lanes or smart lanes, is a scheme for improving traffic flow and reducing congestion on motorways. It has been implemented in several countries, including Germany, the United Kingdom, and the United States. It makes use of automatic systems and human intervention to manage traffic flow and ensure the safety of road users.

              

It is currently in operation on the M42 motorway south-east of Birmingham and in Warwickshire. The scheme had initially been criticized by some due to possible safety and environmental concerns, however a Highways Agency report into the first six months of the scheme scheme showed a reduction in the number of accidents from over 5 a month to 1.5 per month on average. It has now been expanded onto other roads following the initial trial on the M42. It is seen as a less expensive alternative to widening a road.

Powerpoint presentation on Traffic management system

Traffic Management Systems.ppt
Operations Management File Type Ppt

Tuesday, July 26, 2011

Seminar on Real-Time Operating Systems

A real-time operating system (RTOS) is an operating system (OS) intended to serve real-time application requests.
A key characteristic of a RTOS is the level of its consistency concerning the amount of time it takes to accept and complete an application's task; the variability is jitter. A hard real-time operating system has less jitter than a soft real-time operating system. The chief design goal is not high throughput, but rather a guarantee of a soft or hard performance category. A RTOS that can usually or generally meet a deadline is a soft real-time OS, but if it can meet a deadline deterministically it is a hard real-time OS.
A real-time OS has an advanced algorithm for scheduling. Scheduler flexibility enables a wider, computer-system orchestration of process priorities, but a real-time OS is more frequently dedicated to a narrow set of applications. Key factors in a real-time OS are minimal interrupt latency and minimal thread switching latency, but a real-time OS is valued more for how quickly or how predictably it can respond than for the amount of work it can perform in a given period of time.

Power point presentation on real-time operating system

RTOS - Design and Implementation
6.0 INTRODUCTION TO REAL-TIME OPERATING SYSTEMS (RTOS)
Real Time Operating Systems
Real-Time Operating Sytems - Stanford
Basic Design using RTOS
Real Time Operating Systems (RTOS)

Saturday, July 23, 2011

Project - Payroll Management System

The Piccolo Payroll Management System is intended to be a secure and robust enterprise application that can help manage personnel financial aspects. It is developed in Visual Basic.NET and XML.

 

Download

Reference material on Payroll Management System

Source Code C Payroll Management System
Payroll Presentation - New York University
HR/Payroll System Replacement Project - Brown University
Electronic Payroll System
HRMS and Payroll

More info regarding project can be obtained from

http://sourceforge.net/projects/piccolo-payroll/

Wednesday, July 20, 2011

Seminar on Software Project Management

The history of software project management is closely related to the history of software. Software was developed for dedicated purposes for dedicated machines until the concept of object-oriented programming began to become popular in the 1960's, making repeatable solutions possible for the software industry. Dedicated systems could be adapted to other uses thanks to component-based software engineering. Companies quickly understood the relative ease of use that software programming had over hardware circuitry, and the software industry grew very quickly in the 1970's and 1980's. To manage new development efforts, companies applied proven project management methods, but project schedules slipped during test runs, especially when confusion occurred in the gray zone between the user specifications and the delivered software. To be able to avoid these problems, software project management methods focused on matching user requirements to delivered products, in a method known now as the waterfall model.

Power point presentation on software project management
Software Project Management
Software Project Management 2
Software Project Management 3

Project management - Center for Systems and Software Engineering

Project Management – Planning
Quantitative Methods in Project Management

Seminar on Motivation

Motivation is the driving force by which humans achieve their goals. Motivation is said to be intrinsic or extrinsic. The term is generally used for humans but it can also be used to describe the causes for animal behavior as well. This article refers to human motivation. According to various theories, motivation may be rooted in a basic need to minimize physical pain and maximize pleasure, or it may include specific needs such as eating and resting, or a desired object, goal, state of being, ideal, or it may be attributed to less-apparent reasons such as altruism, selfishness, morality, or avoiding mortality. Conceptually, motivation should not be confused with either volition or optimism. Motivation is related to, but distinct from, emotion.

 

Power point presentation on Motivation

Motivation & Emotion
Motivation - Careervarsity.com
Motivation
Motivation 2
Work Motivation
Motivation PowerPoint

Monday, July 18, 2011

Seminar on CRM

Customer relationship management(CRM) is a widely-implemented strategy for managing a company’s interactions with customers, clients and sales prospects. It involves using technology to organize, automate, and synchronize business processes—principally sales activities, but also those for marketing, customer service, and technical support. The overall goals are to find, attract, and win new clients, nurture and retain those the company already has, entice former clients back into the fold, and reduce the costs of marketing and client service. Customer relationship management describes a company-wide business strategy including customer-interface departments as well as other departments. Measuring and valuing customer relationships is critical to implementing this strategy.

Benefits of CRM

A CRM system may be chosen because it is thought to provide the following advantages:

  • Quality and efficiency
  • Decrease in overall costs
  • Decision support
  • Enterprise agility
  • Customer Attention

Power point presentation on CRM

Customer Relationship Management (CRM)
CRM in Marketing
CRM 2
SAP CRM Internet Sales Online Services for Prospective
CRM Presentation
Pricing Overview for CRM 3.0
crm ppt

Sunday, July 17, 2011

Project on Fingerprint Verification System

We will design and implement an image recognition system to identify fingerprints based on a given database. We will begin by inputting simple images and checking that the system accurately identifies those images. As the system is developed, more complex images can be used. The final stage of the project will involve identifying an individual's fingerprint based on standard points of identification used in common practice.

This project consists of a few stages. The initial stage will involve creating a database in memory for the image comparison. The next stage will be developing an interface between the camera and a RAM to store the image that needs to be identified. Once the image has been loaded into the system, it must be processed to select the appropriate characteristics for the comparison to the database. The processed image will then be compared to the images in the database to determine the quality of the similarities. The most similar image will be selected and presented to the user interface along with the quality of the identification.

                  

The image processing will involve a series of filters in the spatial domain. There will be an edge-detection filter to sharpen the image, prior to binarization of the fingerprint. Another filter will select the unique components of the fingerprint. The database will contain the post-processed fingerprint information to minimize the size of the stored data. The database size will be limited to the memory of the labkit, which will be sufficient to demonstrate the functionality of the fingerprint matching system.

The work will be split into two components. Bashira will be responsible for interfacing the camera to the labkit, as well as managing the data storage in memory. Cheryl will implement the image processing to isolate the data for the analysis and the matching. Once the fingerprint recognition scheme is working, both team members will work to enhance the identification interface as time allows to create a visually appealing result.

 

Project Files

Presentation (PDF)

Report (PDF)

Report Appendix (PDF)

Source : MIT

Project - Wireless Surveillance System

This project implements a networked video surveillance system in digital logic. It allows a user to view video input from a remote camera on a VGA monitor by capturing camera data, encoding it, transmitting it wirelessly, and subsequently receiving, decoding, and re-displaying the data. To test the system, the project is divided into three main components: video capture/display, data encoding/decoding, and wireless transmission/reception. Each part is put through a comprehensive series of tests using Model Sim and simulated data. Once each component passes design and functional tests, all three components are then connected to transmit video data wirelessly

                 

Project Files

Presentation (PDF)

Report (PDF)

Report Appendix (PDF)

Source : MIT university

Project - Instant messaging

Instant messaging (IM) is a collection of technologies used for text-based communication between two or more participants over the Internet or other types of networks. Of importance is that online chat and instant messaging differs from other technologies such as e-mail due to the perceived synchronicity of the communications by the users –chat happens in real-time. Some systems permit messages to be sent to people not currently 'logged on' (offline messages), thus removing some of the differences between IM and e-mail (often done by sending the message to the associated e-mail account).

                     

IM allows effective and efficient communication, allowing immediate receipt of acknowledgment or reply. In many cases instant messaging includes additional features which can make it even more popular. For example, users can see each other by using webcams, or talk directly for free over the Internet using a microphone and headphones or loudspeakers. Many client programs allow file transfers as well, although they are typically limited in the permissible file-size.

It is typically possible to save a text conversation for later reference. Instant messages are often logged in a local message history, making it similar to the persistent nature of e-mails.

Team building lab (PDF)

Networking lab (PDF)

Optional lab: graphical user interfaces in Swing (PDF)

Project (PDF)

Project Source code - Instant messaging

guichat (ZIP) (This ZIP file contains 2 .jar files, 2 .java files and 2 files with no file extension.)

friendly (ZIP) (This ZIP file contains 6 .java files and 2 files with no file extension.)

guiwords (ZIP) (This ZIP file contains 2 .jar files, 2 .java files and 3 files with no file extension.)

Seminar on Laser Communications

Optical communications, in various forms, have been used for thousands of years. The Ancient Greeks polished their shields to send signals during battle. In the modern era, semaphores and wireless solar telegraphs called heliographs were developed, using coded signals to communicate with their recipients.
In 1880 Alexander Graham Bell and his assistant Charles Sumner Tainter created the Photo phone, at Bell's newly established Volta Laboratory in Washington, DC. Bell considered it his most important invention. The device allowed for the transmission of sound on a beam of light. On June 3, 1880, Bell conducted the world's first wireless telephone transmission between two buildings, some 213 meters apart. Its first practical use came in military communication systems many decades later.
Carl Zeiss Jena developed the Licht sprechgerät 80 (direct translation: light speaking device) that the German army used in their World War II anti-aircraft defense units.

The invention of lasers in the 1960s revolutionized free space optics. Military organizations were particularly interested and boosted their development. However the technology lost market momentum when the installation of optical fiber networks for civilian uses was at its peak. Many simple and inexpensive consumer remote controls use low-speed communication using infrared (IR) light. This known as consumer IR technologies.

Power point presentation on laser communications

Laser Communications
Free Space Laser Communications
Laser Communication 2
Laser Communication 3
Free-Space Optical Communications for Tactical Applications
The Future of Satellite Communications
Semiconductor Sources for Optical Communications

Monday, July 4, 2011

Seminar on .NET framework

The .NET Framework (pronounced dot net) is a software framework that runs primarily on Microsoft Windows. It includes a large library and supports several programming languages which allows language interoperability (each language can use code written in other languages). The .NET library is available to all the programming languages that .NET supports. Programs written for the .NET Framework execute in a software environment (as contrasted to hardware environment), known as the Common Language Runtime (CLR), an application virtual machine that provides important services such as security, memory management, and exception handling. The class library and the CLR together constitute the .NET Framework.

              

The .NET Framework's Base Class Library provides user interface, data access, database connectivity, cryptography, web application development, numeric algorithms, and network communications. Programmers produce software by combining their own source code with the .NET Framework and other libraries. The .NET Framework is intended to be used by most new applications created for the Windows platform. Microsoft also produces a popular integrated development environment largely for .NET software called Visual Studio.

 

Power point presentation on .NET Framework

Sunday, July 3, 2011

Seminar on Artificial intelligence

Artificial intelligence (AI) is the intelligence of machines and the branch of computer science that aims to create it. AI textbooks define the field as "the study and design of intelligent agents" where an intelligent agent is a system that perceives its environment and takes actions that maximize its chances of success. John McCarthy, who coined the term in 1956, defines it as "the science and engineering of making intelligent machines."

  

The field was founded on the claim that a central property of humans, intelligence—the sapience of Homo sapiens—can be so precisely described that it can be simulated by a machine. This raises philosophical issues about the nature of the mind and the ethics of creating artificial beings, issues which have been addressed by myth, fiction and philosophy since antiquity. Artificial intelligence has been the subject of optimism, but has also suffered setbacks and, today, has become an essential part of the technology industry, providing the heavy lifting for many of the most difficult problems in computer science.

Power point presentations on Artificial intelligence

Seminar on Unlicenced Mobile Access

Generic Access Network or GAN is a telecommunication system that extends mobile voice, data and IP Multimedia Subsystem/Session Initiation Protocol (IMS/SIP) applications over IP networks. Unlicensed Mobile Access or UMA, is the commercial name used by mobile carriers for external IP access into their core networks.

The most common application of GAN is in a dual-mode handset service where subscribers can seamlessly handover connections between wireless LANs and wide area networks using a GSM/Wi-Fi dual-mode mobile phone. UMA technology has enabled the convergence of mobile, fixed and Internet telephony, sometimes called Fixed Mobile Convergence.

                       

The local network may be based on private unlicensed spectrum technologies like 802.11, while the wide network is alternatively GSM/GPRS or UMTS mobile services. On the cellular network, the mobile handset communicates over the air with a base station, through a base station controller, to servers in the core network of the carrier.

Under the GAN system, when the handset detects a wireless LAN, it establishes a secure IP connection through a gateway to a server called a GAN Controller (GANC) on the carrier's network. The GANC presents to the mobile core network as a standard cellular base station. The handset communicates with the GANC over the secure connection using existing GSM/UMTS protocols. Thus, when a mobile moves from a GSM to an 802.11 network, it appears to the core network as if it is simply on a different base station.

Power point presentation on UMA

Saturday, July 2, 2011

Another list of Seminar topics

Hi,

Please find another list of Computer science , information technology and electronics seminar topics.

I will be adding many more such topics in coming future. Please post your comments whether these are helpful or not. And also, if you have any suggestion, please let me know so that I can incorporate that too.

Thanks!