Showing posts with label information technology seminar. Show all posts
Showing posts with label information technology seminar. Show all posts

Tuesday, July 5, 2011

.Net Framework Security

.NET has its own security mechanism with two general features: Code Access Security (CAS), and validation and verification. Code Access Security is based on evidence that is associated with a specific assembly. Typically the evidence is the source of the assembly (whether it is installed on the local machine or has been downloaded from the intranet or Internet). Code Access Security uses evidence to determine the permissions granted to the code. Other code can demand that calling code is granted a specified permission. The demand causes the CLR to perform a call stack walk: every assembly of each method in the call stack is checked for the required permission; if any assembly is not granted the permission a security exception is thrown. however, has to split the application into subdomains; it is not done by the CLR.

            

Code Access Security (CAS), in the Microsoft .NET framework, is Microsoft's solution to prevent untrusted code from performing privileged actions. When the CLR loads an assembly it will obtain evidence for the assembly and use this to identify the code group that the assembly belongs to. A code group contains a permission set (one or more permissions). Code that performs a privileged action will perform a code access demand which will cause the CLR to walk up the call stack and examine the permission set granted to the assembly of each method in the call stack. The code groups and permission sets are determined by the administrator of the machine who defines the security policy.

Power point Presentation on .net Framework Security

 

Sunday, July 3, 2011

Seminar on Artificial intelligence

Artificial intelligence (AI) is the intelligence of machines and the branch of computer science that aims to create it. AI textbooks define the field as "the study and design of intelligent agents" where an intelligent agent is a system that perceives its environment and takes actions that maximize its chances of success. John McCarthy, who coined the term in 1956, defines it as "the science and engineering of making intelligent machines."

  

The field was founded on the claim that a central property of humans, intelligence—the sapience of Homo sapiens—can be so precisely described that it can be simulated by a machine. This raises philosophical issues about the nature of the mind and the ethics of creating artificial beings, issues which have been addressed by myth, fiction and philosophy since antiquity. Artificial intelligence has been the subject of optimism, but has also suffered setbacks and, today, has become an essential part of the technology industry, providing the heavy lifting for many of the most difficult problems in computer science.

Power point presentations on Artificial intelligence

Seminar on Unlicenced Mobile Access

Generic Access Network or GAN is a telecommunication system that extends mobile voice, data and IP Multimedia Subsystem/Session Initiation Protocol (IMS/SIP) applications over IP networks. Unlicensed Mobile Access or UMA, is the commercial name used by mobile carriers for external IP access into their core networks.

The most common application of GAN is in a dual-mode handset service where subscribers can seamlessly handover connections between wireless LANs and wide area networks using a GSM/Wi-Fi dual-mode mobile phone. UMA technology has enabled the convergence of mobile, fixed and Internet telephony, sometimes called Fixed Mobile Convergence.

                       

The local network may be based on private unlicensed spectrum technologies like 802.11, while the wide network is alternatively GSM/GPRS or UMTS mobile services. On the cellular network, the mobile handset communicates over the air with a base station, through a base station controller, to servers in the core network of the carrier.

Under the GAN system, when the handset detects a wireless LAN, it establishes a secure IP connection through a gateway to a server called a GAN Controller (GANC) on the carrier's network. The GANC presents to the mobile core network as a standard cellular base station. The handset communicates with the GANC over the secure connection using existing GSM/UMTS protocols. Thus, when a mobile moves from a GSM to an 802.11 network, it appears to the core network as if it is simply on a different base station.

Power point presentation on UMA

Saturday, July 2, 2011

Another list of Seminar topics

Hi,

Please find another list of Computer science , information technology and electronics seminar topics.

I will be adding many more such topics in coming future. Please post your comments whether these are helpful or not. And also, if you have any suggestion, please let me know so that I can incorporate that too.

Thanks!

Friday, July 1, 2011

Seminar on SDLC

The Systems Development Life Cycle (SDLC), or Software Development Life Cycle in systems engineering, information systems and software engineering, is the process of creating or altering systems, and the models and methodologies that people use to develop these systems. The concept generally refers to computer or information systems. Emphasis on this article (SLDC) is on man-made technological life-cycle. But there are many other life-cycle models to choose from. This includes ecological life cycles, for every life cycle, whether biological or technological, has a beginning and an end.

In software engineering the SDLC concept underpins many kinds of software development methodologies. These methodologies form the framework for planning and controlling the creation of an information system: the software development process.

 

Systems Development Life Cycle (SDLC) is a process used by a systems analyst to develop an information system, including requirements, validation, training, and user (stakeholder) ownership. Any SDLC should result in a high quality system that meets or exceeds customer expectations, reaches completion within time and cost estimates, works effectively and efficiently in the current and planned Information Technology infrastructure, and is inexpensive to maintain and cost-effective to enhance.

Computer systems are complex and often (especially with the recent rise of Service-Oriented Architecture) link multiple traditional systems potentially supplied by different software vendors. To manage this level of complexity, a number of SDLC models or methodologies have been created, such as "waterfall"; "spiral"; "Agile software development"; "rapid prototyping"; "incremental"; and "synchronize and stabilize"

Power point presentation on Systems Development Life Cycle

Seminar on fingerprint recognition

Fingerprint recognition or fingerprint authentication refers to the automated method of verifying a match between two human fingerprints. Fingerprints are one of many forms of biometrics used to identify individuals and verify their identity. This article touches on two major classes of algorithms (minutia and pattern) and four sensor designs (optical, ultrasonic, passive capacitance, and active capacitance).

A fingerprint sensor is an electronic device used to capture a digital image of the fingerprint pattern. The captured image is called a live scan. This live scan is digitally processed to create a biometric template (a collection of extracted features) which is stored and used for matching. This is an overview of some of the more commonly used fingerprint sensor technologies.

                     

Optical fingerprint imaging involves capturing a digital image of the print using visible light. This type of sensor is, in essence, a specialized digital camera. The top layer of the sensor, where the finger is placed, is known as the touch surface. Beneath this layer is a light-emitting phosphor layer which illuminates the surface of the finger. The light reflected from the finger passes through the phosphor layer to an array of solid state pixels (a charge-coupled device) which captures a visual image of the fingerprint. A scratched or dirty touch surface can cause a bad image of the fingerprint. A disadvantage of this type of sensor is the fact that the imaging capabilities are affected by the quality of skin on the finger. For instance, a dirty or marked finger is difficult to image properly. Also, it is possible for an individual to erode the outer layer of skin on the fingertips to the point where the fingerprint is no longer visible. It can also be easily fooled by an image of a fingerprint if not coupled with a "live finger" detector. However, unlike capacitive sensors, this sensor technology is not susceptible to electrostatic discharge damage.

Power point Presentation on Fingerprint recognition

Sunday, June 26, 2011

Project - Human Resource Management Systems

A Human Resource Management System (HRMS) or Human Resource Information System (HRIS), refers to the systems and processes at the intersection between human resource management (HRM) and information technology. It merges HRM as a discipline and in particular its basic HR activities and processes with the information technology field, whereas the programming of data processing systems evolved into standardized routines and packages of enterprise resource planning (ERP) software. On the whole, these ERP systems have their origin on software that integrates information from different applications into one universal database. The linkage of its financial and human resource modules through one database is the most important distinction to the individually and proprietary developed predecessors, which makes this software application both rigid and flexible.

            

Power point Presentation on the topic Human Resource Management System

Seminar on Software as a service

Software as a service (SaaS, typically pronounced [sæs]), sometimes referred to as "on-demand software," is a software delivery model in which software and its associated data are hosted centrally (typically in the (Internet) cloud) and are typically accessed by users using a thin client, normally using a web browser over the Internet.

While practically every Internet service (such as Web search engine or web-based email) is driven by some underlying software, the term software as a service is often used in the context of business applications, and in some cases even more narrowly as software in a category which has on-premises software; i.e., equivalent applications that are installed in businesses' computer networks or personal computers.

 

SaaS has become a common delivery model for most business applications, including accounting, collaboration, customer relationship management (CRM), enterprise resource planning (ERP), invoicing, human resource management (HRM), content management (CM) and service desk management. SaaS has been incorporated into the strategy of all leading enterprise software companies.

According to a Gartner Group estimate, SaaS sales in 2010 have reached $9B, up 15.7% from 2009, and are projected to increase to $10.7b in 2011, up 16.2% from 2010. Gartner Group also estimates that SaaS applications, which accounted for a little more than 10% of the total enterprise software market last year, would represent at least 16% of worldwide software sales by 2014.

The term software as a service (SaaS) is considered to be part of the nomenclature of cloud computing, along with infrastructure as a service (IaaS) and platform as a service (PaaS).

Power point presentation on Software as a service

Project Abstract - Combinatorial Approach For Preventing Sql Injection Attacks

A combinatorial approach for protecting Web applications against SQL injection is discussed in this paper, which is a novel idea of incorporating the uniqueness of Signature based method and auditing method. The major issue of web application security is the SQL Injection, which can give the attackers unrestricted access to the database that underlie Web applications and has become increasingly frequent and serious. From signature based method standpoint of view, it presents a detection mode for SQL injection using pair wise sequence alignment of amino acid code formulated from web application form parameter sent via web server.

 

                  

 

On the other hand from the Auditing based method standpoint of view, it analyzes the transaction to find out the malicious access. In signature based method It uses an approach called Hirschberg algorithm, it is a divide and conquer approach to reduce the time and space complexity. This system was able to stop all of the successful attacks and did not generate any false positives.

Project - Time Attendance

Time and attendance, or Workforce Management, systems are used by companies of all sizes to record working hours of employees primarily in order to pay their wages. Some companies have a requirement to record the number of hours spent on specific tasks in order to cost jobs accurately. This is referred to as job costing.

A workforce management system enables an employer to have full control of all employees working hours right at an operators fingertips. It is also invaluable for ensuring compliance with labour regulations regarding proof of attendance.

Companies with large employee numbers might need to install several clocking points in order to speed up the process of getting all employees to clock in or out quickly or to record activity in dispersed locations.

 

                  

 

Depending on the supplier, identification method and number of clocking points required, prices vary widely.

A Workforce Management System protects a company from payroll fraud and provides both employer and employees with confidence in the accuracy of their wage payments.

Project Abstract - Cell Breathing Techniques For Load Balancing In Wireless Lans

Maximizing network throughput while providing fairness is one of the key challenges in wireless LANs (WLANs). This goal is typically achieved when the load of access points (APs) is balanced. Recent studies on operational WLANs, however, have shown that AP load is often substantially uneven. To alleviate such imbalance of load, several load balancing schemes have been proposed. These schemes commonly require proprietary software or hardware at the user side for controlling the user-AP association. In this paper we present a new load balancing technique by controlling the size of WLAN cells (i.e., AP’s coverage range), which is conceptually similar to cell breathing in cellular networks.

 

         

 

The proposed scheme does not require any modification to the users neither the IEEE 802.11 standard. It only requires the ability of dynamically changing the transmission power of the AP beacon messages. We develop a set of polynomial time algorithms that find the optimal beacon power settings which minimize the load of the most congested AP. We also consider the problem of network-wide min-max load balancing. Simulation results show that the performance of the proposed method is comparable with or superior to the best existing association-based methods.

Project Abstract - Route Stability In Manets Under The Random Direction Mobility Model

A fundamental issue arising in mobile ad hoc networks (MANETs) is the selection of the optimal path between any two nodes. A method that has been advocated to improve routing efficiency is to select the most stable path so as to reduce the latency and the overhead due to route reconstruction.

 

 

In this work, we study both the availability and the duration probability of a routing path that is subject to link failures caused by node mobility. In particular, we focus on the case where the network nodes move according to the Random Direction model, and we derive both exact and approximate (but simple) expressions of these probabilities. Through our results, we study the problem of selecting an optimal route in terms of path availability. Finally, we propose an approach to improve the efficiency of reactive routing protocols.

Presentation on the topic mobile ad hoc networks

Saturday, June 25, 2011

Seminar on Online identity management

Online identity management (OIM) also known as online image management or online personal branding or personal reputation management (PRM) is a set of methods for generating a distinguished Web presence of a person on the Internet. That presence could be reflected in any kind of content that refers to the person, including news, participation in blogs and forums, personal web sites (Marcus, Machilek & Schütz 2006), social media presence, pictures, video, etc.

Online identity management also refers to identity exposure and identity disclosure, and has particularly developed in the management on online identity in social network services (Tufekci 2008) or online dating services (Siibak 2007).

One aspect of the online identity management process has to do with improving the quantity and quality of traffic to sites that have content related to a person. In that aspect, OIM is a part of another discipline called search engine optimization with the difference that the only keyword is the person's name, and the optimization object is not necessary a single web site; it can consider a set of completely different sites that contain positive online references. The objective in this case is to get high rankings for as many sites as possible when someone search for a person's name. If the search engine used is Google, this action is called "to google someone”.

Another aspect has to do with impression management, i.e. "the process through which people try to control the impressions other people form of them". One of the objective is in particular to increase the online reputation of the person.

Online identity management often involves participation in social media sites like Facebook, LinkedIn, Flickr, YouTube, Twitter, Twitxr, Last.fm, Myspace, Orkut and other online communities and community websites, and is related to blogging, blog social networks like MyBlogLog and blog search engines like Technorati.

But it can also consist in more questionable practices. Hence in the case of social network services users have the possibility to buy 'friends' so to increase their visibility

             

 

Presentation on the topic  Online identity management

Seminar on Personality development

Personality Development quintessentially means enhancing and grooming one’s outer and inner self to bring about a positive change to your life. Each individual has a distinct persona that can be developed, polished and refined. This process includes boosting one’s confidence, improving communication and language speaking abilities, widening ones scope of knowledge, developing certain hobbies or skills, learning fine etiquettes and manners, adding style and grace to the way one looks, talks and walks and overall imbibing oneself with positivity, liveliness and peace.

The whole process of this development takes place over a period of time. Even though there are many crash courses in personality development that are made available to people of all age groups, implementing this to your routine and bringing about a positive change in oneself takes a considerable amount of time. It is not necessary to join a personality development course; one can take a few tips and develop his or her own aura or charm.

 

 

Presentation on the topic Personality Development

How to make a Presentation

Below are some of the ways to prepare for presentation/seminars

  • Think about the presentation beforehand. It is short-changing the organisers of the event and your audience if you only think about what you're going to say the day before or while travelling to the event. If necessary, clarify with the organisers exactly what is required of you and what facilities you will require.
  • Do use PowerPoint if the facilities are available. Although some speakers seem to have taken an aversion to PowerPoint, it is so convenient and ensures that your presentation has a clear structure and something for your listeners to take away.
  • Be very clear about how much time you have - and stick to that time in preparing and delivering your presentation. It's very difficult to 'cut' a PowerPoint presentation at the event itself, so it's a great mistake to run out of time. Most presenters prepare too much material; but nobody ever complains that a presentation was too short (it always allows more time for questions).
  • Be very clear about your key message - and ensure that everything in your presentation is both consistent with, and suppportive of, that key message. You should be able to articulate the message in a phrase or a sentence and indeed you might want to use that phrase or sentence in one of your first slides, or one of your last, or even both.
  •  

                      

    Source :http://www.rogerdarlington.co.uk/Presentation.html

    Presentation on the topic presentation/seminars

    Seminar on Project management

    Project management is the discipline of planning, organizing, securing and managing resources to bring about the successful completion of specific project goals and objectives.

    A project is a temporary endeavor, having a defined beginning and end (usually constrained by date, but can be by funding or deliverables), undertaken to meet unique goals and objectives, usually to bring about beneficial change or added value. The temporary nature of projects stands in contrast to business as usual (or operations), which are repetitive, permanent or semi-permanent functional work to produce products or services. In practice, the management of these two systems is often found to be quite different, and as such requires the development of distinct technical skills and the adoption of separate management.

    The primary challenge of project management is to achieve all of the project goals and objectives while honoring the preconceived project constraints. Typical constraints are scope, time, and budget. The secondary—and more ambitious—challenge is to optimize the allocation and integration of inputs necessary to meet pre-defined objectives.

       

     

    Power point presentation on Project management

    Wednesday, May 18, 2011

    Seminar on Organizational information systems

    Information Systems (IS) is an academic/professional discipline bridging the business field and the well-defined computer science field that is evolving toward a new scientific area of study.An information systems discipline therefore is supported by the theoretical foundations of information and computations such that learned scholars have unique opportunities to explore the academics of various business models as well as related algorithmic processes within a computer science discipline. Typically, information systems or the more common legacy information systems include people, procedures, data, software, and hardware (by degree) that are used to gather and analyze digital information. Specifically computer-based information systems are complementary networks of hardware/software that people and organizations use to collect, filter, process, create, & distribute data (computing). Computer Information System(s) (CIS) is often a track within the computer science field studying computers and algorithmic processes, including their principles, their software & hardware designs, their applications, and their impact on society. Overall, an IS discipline emphasizes functionality over design.

                       

     

    As illustrated by the pradeep sagar in 1991 on the right, the history of information systems coincides with the history of computer science that began long before the modern discipline of computer science emerged in the twentieth century. Regarding the circulation of information and ideas, numerous legacy information systems still exist today that are continuously updated to promote ethnographic approaches, to ensure data integrity, and to improve the social effectiveness & efficiency of the whole process. In general, information systems are focused upon processing information within organizations, especially within business enterprises, and sharing the benefits with modern society

    Power point presentation on Organizational information systems

    Wednesday, May 11, 2011

    Ebook - JavaServer Pages, 2nd edition

    Since its inception in 1999, Enterprise Java has taken the Java programming community by storm--developers have realized its potential for building distributed applications. Today, JavaServer Pages (JSP) continues to harmonize how web designers and programmers create dynamic web sites. JSP builds on the popular Java servlet technology and makes it easier to develop dynamic web applications--even if you're not a hard-core programmer.

     

    JavaServer Pages, 2nd Edition is completely revised and updated to cover the substantial changes in the 1.2 version of the JSP specification, and also includes detailed coverage of the new JSP Standard Tag Library (JSTL)--an eagerly anticipated specification of a set of JSP elements for the tasks needed in most JSP applications. This book starts off by illustrating how JSP capitalizes on the power of Java servlets to create effective, portable web applications. It shows how to get started using the Apache Tomcat server, and provides detailed coverage of JSP syntax and features, error handling and debugging, authentication and personalization, and how to use JSTL for database access, XML processing, and internationalization.

    JavaServer Pages recognizes the different needs of the two groups of professionals who want to learn JSP: page authors interested in using JSP elements in web pages, and programmers concerned with learning the JSP API and using JSP effectively in an enterprise application. If you're in the latter group, this book also teaches you such advanced topics as integrating servlets and JavaBeans with JSP, using the popular Apache Struts MVC framework to illustrate how it's done. Finally, the author presents how to develop custom tag libraries, using realistic examples that you can use as a springboard for your own JSP libraries.

     

    Download Ebook

    Link 1

    Link 2

    Project - Digital library

    A digital library is a library in which collections are stored in digital formats (as opposed to print, microform, or other media) and accessible by computers.[1] The digital content may be stored locally, or accessed remotely via computer networks. A digital library is a type of information retrieval system.

    In the context of the DELOS, a Network of Excellence on Digital Libraries, and DL.org, a Coordination Action on Digital Library Interoperability, Best Practices and Modelling Foundations, Digital Library researchers and practitioners produced a Digital Library Reference Model  which defines a digital library as:

        A potentially virtual organisation, that comprehensively collects, manages and preserves for the long depth of time rich digital content, and offers to its targeted user communities specialised functionality on that content, of defined quality and according to comprehensive codified policies.

     

    Actually, this document contains a Digital Library Manifesto which introduces the three types of relevant ‘systems’, i.e. Digital Library, Digital Library System, and Digital Library Management System. It describes the main concepts characterising these systems, i.e., organisation, content, user, functionality, quality, policy and architecture. It introduces the main roles that actors may play within digital libraries, i.e., end-user, manager and software developer. Finally, it describes the reference frameworks needed to clarify the DL universe at different levels of abstraction, i.e., the Digital Library Reference Model and the Digital Library Reference Architecture.

    Power point presentation on digital library

    Seminar on E-Business

    Electronic business, commonly referred to as "eBusiness" or "e-business", or an internet business, may be defined as the application of information and communication technologies (ICT) in support of all the activities of business. Commerce constitutes the exchange of products and services between businesses, groups and individuals and can be seen as one of the essential activities of any business. Electronic commerce focuses on the use of ICT to enable the external activities and relationships of the business with individuals, groups and other businesses.[1]

    The term "e-business" was coined by IBM's marketing and Internet teams in 1996.[2][3]

    Electronic business methods enable companies to link their internal and external data processing systems more efficiently and flexibly, to work more closely with suppliers and partners, and to better satisfy the needs and expectations of their customers.

    In practice, e-business is more than just e-commerce. While e-business refers to more strategic focus with an emphasis on the functions that occur using electronic capabilities, e-commerce is a subset of an overall e-business strategy. E-commerce seeks to add revenue streams using the World Wide Web or the Internet to build and enhance relationships with clients and partners and to improve efficiency using the Empty Vessel strategy.

    Power point presentation on Electronic business