Showing posts with label information technology seminar topic. Show all posts
Showing posts with label information technology seminar topic. Show all posts

Monday, August 15, 2011

122 Seminar & projects

Here are 122 seminar topics related to computer science, electronics and  electrical field along with power point presentation.

    1. Project Abstract - E-Learning
    2. Seminar on SMTP
    3. Seminar on Software as a service
    4. Project - Time Attendance
    5. Tabu Search Algorithm For Cluster Building In Wire...
    6. Seminar on Online identity management
    7. Seminar on Website Marketing
    8. Seminar on Personality development
    9. How to make a Presentation
    10. Seminar on Project management
    11. Seminar on leadership qualities
    12. Seminar on Linux Virtual File System
    13. Internet Marketing Strategy
    14. Seminar on Internet Marketing
    15. Seminar on Affiliate marketing
    16. Seminar on Search Engine Marketing
    17. Seminar on Time management
    18. Seminar on Java Security
    19. Web Services in Java
    20. Seminar on SDLC
    21. Seminar on fingerprint recognition
    22. Project Abstract - Hospital Management System
    23. Seminar on Android
    24. Seminar on Organizational information systems
    25. Project - Digital library
    26. Seminar on E-Business
    27. Seminar on Iris Scanning
    28. Grid network
    29. Earth Simulator
    30. M-Commerce
    31. Socket Programming
    32. video door phone
    33. CCTV System
    34. WI-MAX
    35. WISENET
    36. Optical fiber communication
    37. Lightweight Directory Access Protocol
    38. Kerberos
    39. Organic light emitting diode (OLED)
    40. Augmented Reality
    41. The Bionic Eye
    42. Optical Communications in Space
    43. 4G Wireless Systems
    44. Bittorrent
    45. Wireless USB
    46. Tripwire
    47. Data mining
    48. Interactive Voice Response
    49. Nessus
    50. Mobile Computing
    51. Holographic Versatile Disc
    52. Satellite radio
    53. Silverlight
    54. Bluetooth
    55. Wearable computers
    56. Cluster computing
    57. Quantum computer
    58. HVAC
    59. Mobile IP
    60. FireWire
    61. Home Networking
    62. Plasma display
    63. PLAN 9 Operating system
    64. Global Positioning System
    65. Spyware and Trojan horses
    66. Voice over Internet Protocol
    67. SSL-TLS
    68. PolyBot - Modular, self-reconfigurable robots
    69. Facial recognition system
    70. Captchas
    71. Ext3 File System
    72. Embedded Linux
    73. Computer forensics
    74. Security Protocol For Sensor Network
    75. Signal processing
    76. Seminar on Smoke detector
    77. Seminar on Motion detector
    78. Seminar on Transformer
    79. Seminar Test automation framework
    80. Seminar on Digital and analog signals
    81. Seminar on Programmable logic controller
    82. Seminar on LED
    83. Seminar on power systems automations
    84. Seminar on Flight Simulator
    85. Application Server
    86. Inventory Control System
    87. Seminar - Online Gaming
    88. Project – Online Survey System
    89. Project Abstract - Traffic Management System
    90. Seminar on IPTV
    91. Seminar on Smartphone
    92. Seminar on Real-Time Operating Systems
    93. Seminar on Agile Methodology
    94. Project on GPS Integrity Monitoring
    95. Seminar on Listening Skills
    96. Seminar on Communication Skills
    97. Seminar on Mobile commerce
    98. Project - Payroll Management System
    99. Seminar on SAP CRM
    100. Seminar on Sales Tracking
    101. Seminar on Marketing
    102. Seminar on Sap R/3 Architecture
    103. Seminar on Software Project Management
    104. Seminar on Motivation
    105. Seminar on CRM
    106. Enterprise resource planning
    107. Seminar on Cloud computing
    108. Project - 2D Sonar
    109. Project - 3D Pong
    110. Project on Laser Pointer Mouse
    111. Project on Fingerprint Verification System
    112. Project - Wireless Surveillance System
    113. Project - Instant messaging
    114. Seminar on Laser Communications
    115. Project - Online Examination System
    116. Nanotechnology
    117. Project on Library Management System
    118. Seminar on web application security
    119. .Net Framework Security
    120. Seminar on .NET framework
    121. Seminar on Artificial intelligence
    122. Seminar on Unlicenced Mobile Access

Incase, you have any suggestion or wants me to add any topic. Kindly post in the comment section.

Thanks!

Sunday, August 7, 2011

Inventory Control System

An inventory control system is a process for managing and locating objects or materials. In common usage, the term may also refer to just the software components.
Modern inventory control systems often rely upon barcodes and RFID tags to provide automatic identification of inventory objects. In an academic study performed at Wal-Mart, RFID reduced Out of Stocks by 30 percent for products selling between 0.1 and 15 units a day. Inventory objects could include any kind of physical asset: merchandise, consumables, fixed assets, circulating tools, library books, or capital equipment. To record an inventory transaction, the system uses a barcode scanner or RFID reader to automatically identify the inventory object, and then collects additional information from the operators via fixed terminals (workstations), or mobile computers.


An inventory control system may be used to automate a sales order fulfillment process. Such a system contains a list of order to be filled, and then prompts workers to pick the necessary items, and provides them with packaging and shipping information.
An inventory system also manages in and outwards material of hardware.
Real-time inventory control systems may use wireless, mobile terminals to record inventory transactions at the moment they occur. A wireless LAN transmits the transaction information to a central database.

PowerPoint Presentation on inventory control system

Inventory Management I
Inventory Management 2
Inventory Management 3
Inventory Systems for Independent Demand
DISTRIBUTION INVENTORY SYSTEMS
Inventory control model

Tuesday, July 26, 2011

Seminar on Smartphone

A smartphone is a high-end mobile phone that offers more advanced computing ability and connectivity than a contemporary feature phone (i.e. a modern low-end phone). A smartphone combines the functions of a personal digital assistant (PDA) and a mobile phone. Today's models typically also serve as portable media players and camera phones with high-resolution touchscreen, GPS navigation, Wi-Fi and mobile broadband access.
A smartphone runs a complete mobile operating system. Widespread examples are Apple iOS, Google Android, Microsoft Windows Phone 7, Nokia Symbian, Research In Motion BlackBerry OS, and embedded Linux distributions such as Maemo and MeeGo. Such systems can be installed on many different phone models. They can run third-party applications, using an application programming interface (API).
According to an Olswang report in early 2011, the rate of smartphone adoption is accelerating: as of March 2011 22% of UK consumers had a smartphone, with this percentage rising to 31% amongst 24–35 year olds. Growth in demand for advanced mobile devices boasting powerful processors and graphics processing units, abundant memory (FLASH memory), high-resolution screens with multi-touch capability, and open operating systems has outpaced the rest of the mobile phone market for several years. According to an early 2010 study by ComScore, over 45.5 million people in the United States owned smartphones out of 234 million total subscribers. Despite the large increase in smartphone sales in the last few years, smartphone shipments only make up 20% of total handset shipments, as of the first half of 2010. In March 2011 Berg Insight reported data that showed global smartphone shipments increased 74% from 2009 to 2010.

                  

Power point presentation on Smartphone

Smartphones at Rice University
SmartPhone Attacks and Defenses
Smart-phones
Smartphones in Ophthalmology
Understanding Win32 Support in Pocket PC and Smartphone
SmartPhone Thesis A Seminar - cse

Seminar on Agile Methodology

Agile Software Development is a group of software development methodologies based on iterative and incremental development, where requirements and solutions evolve through collaboration between self-organizing, cross-functional teams. The Agile Manifesto introduced the term in 2001.

       

Incremental software development methods have been traced back to 1957. In 1974, a paper by E. A. Edmonds introduced an adaptive software development process.
So-called lightweight software development methods evolved in the mid-1990s as a reaction against heavyweight methods, which were characterized by their critics as a heavily regulated, regimented, micromanaged, waterfall model of development. Proponents of lightweight methods (and now agile methods) contend that they are a return to development practices from early in the history of software development.
Early implementations of lightweight methods include Scrum (1995), Crystal Clear, Extreme Programming (1996), Adaptive Software Development, Feature Driven Development, and Dynamic Systems Development Method (DSDM) (1995). These are now typically referred to as agile methodologies, after the Agile Manifesto published in 2001.

Power point presentation on Agile Software Development

SCRUM – an agile software development methodology
Agile Development Methodology
Agile Software Development
eXtreme Programming and Agile Concepts
Agile Software Engineering
Agile Methods A Practical Perspective

Saturday, July 23, 2011

Seminar on Mobile commerce

Mobile Commerce, or m-Commerce, is about the explosion of applications and services that are becoming accessible from Internet-enabled mobile devices. It involves new technologies, services and business models. It is quite different from traditional e-Commerce. Mobile phones impose very different constraints than desktop computers. But they also open the door to a slew of new applications and services. They follow you wherever you go, making it possible to look for a nearby restaurant, stay in touch with colleagues, or pay for items at a store.

              

As the Internet finds its way into our purses or shirt pockets, the devices we use to access it are becoming more personal too. Already today, mobile phones know the phone numbers of our friends and colleagues. They are starting to track our location. Tomorrow, they will replace our wallets and credit cards. One day, they may very well turn into intelligent assistants capable of anticipating many of our wishes and needs, such as automatically arranging for taxis to come and pick us up after business meetings or providing us with summaries of relevant news and messages left by colleagues. But, for all these changes to happen, key issues of interoperability, usability, security, and privacy still need to be addressed.

 

Power presentation on Mobile Commerce

Introduction to M-Commerce - Stanford InfoLab
Mobile Commerce
Mobile Commerce 2
Mobile Computing & Networking

Idea Mobile Commerce

Mobile Commerce - Protocol Engineering and Technology Unit

Project - Payroll Management System

The Piccolo Payroll Management System is intended to be a secure and robust enterprise application that can help manage personnel financial aspects. It is developed in Visual Basic.NET and XML.

 

Download

Reference material on Payroll Management System

Source Code C Payroll Management System
Payroll Presentation - New York University
HR/Payroll System Replacement Project - Brown University
Electronic Payroll System
HRMS and Payroll

More info regarding project can be obtained from

http://sourceforge.net/projects/piccolo-payroll/

Friday, July 22, 2011

Seminar on Marketing

Marketing is the process used to determine what products or services may be of interest to customers, and the strategy to use in sales, communications and business development.It generates the strategy that underlies sales techniques, business communication, and business developments. It is an integrated process through which companies build strong customer relationships and create value for their customers and for themselves.


Marketing is used to identify the customer, satisfy the customer, and keep the customer. With the customer as the focus of its activities, marketing management is one of the major components of business management. Marketing evolved to meet the stasis in developing new markets caused by mature markets and overcapacities in the last 2-3 centuries.[citation needed] The adoption of marketing strategies requires businesses to shift their focus from production to the perceived needs and wants of their customers as the means of staying profitable.
The term marketing concept holds that achieving organizational goals depends on knowing the needs and wants of target markets and delivering the desired satisfactions. It proposes that in order to satisfy its organizational objectives, an organization should anticipate the needs and wants of consumers and satisfy these more effectively than competitors.

Power point presentation on Marketing

Presentation Guidelines for Marketing Plans
Marketing
How to create a Successful Marketing Plan
Marketing Management
CRM in Marketing
MARKETING ENVIRONMENT

Wednesday, July 20, 2011

Seminar on Software Project Management

The history of software project management is closely related to the history of software. Software was developed for dedicated purposes for dedicated machines until the concept of object-oriented programming began to become popular in the 1960's, making repeatable solutions possible for the software industry. Dedicated systems could be adapted to other uses thanks to component-based software engineering. Companies quickly understood the relative ease of use that software programming had over hardware circuitry, and the software industry grew very quickly in the 1970's and 1980's. To manage new development efforts, companies applied proven project management methods, but project schedules slipped during test runs, especially when confusion occurred in the gray zone between the user specifications and the delivered software. To be able to avoid these problems, software project management methods focused on matching user requirements to delivered products, in a method known now as the waterfall model.

Power point presentation on software project management
Software Project Management
Software Project Management 2
Software Project Management 3

Project management - Center for Systems and Software Engineering

Project Management – Planning
Quantitative Methods in Project Management

Monday, July 18, 2011

Seminar on CRM

Customer relationship management(CRM) is a widely-implemented strategy for managing a company’s interactions with customers, clients and sales prospects. It involves using technology to organize, automate, and synchronize business processes—principally sales activities, but also those for marketing, customer service, and technical support. The overall goals are to find, attract, and win new clients, nurture and retain those the company already has, entice former clients back into the fold, and reduce the costs of marketing and client service. Customer relationship management describes a company-wide business strategy including customer-interface departments as well as other departments. Measuring and valuing customer relationships is critical to implementing this strategy.

Benefits of CRM

A CRM system may be chosen because it is thought to provide the following advantages:

  • Quality and efficiency
  • Decrease in overall costs
  • Decision support
  • Enterprise agility
  • Customer Attention

Power point presentation on CRM

Customer Relationship Management (CRM)
CRM in Marketing
CRM 2
SAP CRM Internet Sales Online Services for Prospective
CRM Presentation
Pricing Overview for CRM 3.0
crm ppt

Sunday, July 17, 2011

Seminar on Cloud computing

Cloud computing means using multiple server computers via a digital network, as though they were one computer. Often, the services available are considered part of cloud computing.
Traditionally, without a cloud, a web server runs as a single computer or a group of privately owned computers. The computer(s) are powerful enough to serve a given amount of requests per minute and can do so with a certain amount of latency per request. If the computer's website or web application suddenly becomes more popular, and the amount of requests are far more than the web server can handle, the response time of the requested pages will be increased due to overloading. On the other hand, in times of low load much of the capacity will go unused.
If the website, service, or web application is hosted in a cloud, however, additional processing and compute power is available from the cloud provider. The website would share those servers with perhaps thousands of other websites varying size and memory. If the website suddenly becomes more popular, the cloud can automatically direct more individual computers to work to serve pages for the site, and more money is paid for the extra usage. If it becomes unpopular, however, the amount of money due will be less. Cloud computing is popular for its pay-as-you-go pricing model.

Cloud computing visual diagram
Clouds are sometimes set up within large corporations, or other institutions, so that many users all share the same server power. As computer power gets cheaper, many different applications are provided and managed by the cloud server. In many cases, users might not download and install applications on their own device or computer; all processing and storage is maintained by the cloud server.

Power point presentation on Cloud computing

Cloud computing
Security Issue in cloud Computing
Cloud Computing
Service Oriented Cloud Computing Infrastructure

Cloud Computing 2

Cloud Computing 3

Cloud computing: A mainframe strategy overview

Saturday, July 16, 2011

Project on Library Management System

An integrated library system (ILS), also known as a library management system (LMS), is an enterprise resource planning system for a library, used to track items owned, orders made, bills paid, and patrons who have borrowed.

An ILS usually comprises a relational database, software to interact with that database, and two graphical user interfaces (one for patrons, one for staff). Most ILSes separate software functions into discrete programs called modules, each of them integrated with a unified interface. Examples of modules might include:

acquisitions (ordering, receiving, and invoicing materials)
    cataloging (classifying and indexing materials)
    circulation (lending materials to patrons and receiving them back)
    serials (tracking magazine and newspaper holdings)
    the OPAC (public interface for users)

 

    

Each patron and item has a unique ID in the database that allows the ILS to track its activity.

Larger libraries use an ILS to order and acquire, receive and invoice, catalog, circulate, track and shelve materials. Smaller libraries, such as those in private homes or non-profit organizations (like churches or synagogues, for instance), often forgo the expense and maintenance required to run an ILS, and instead use a library computer system.

Power point presentation on Library Management System

Library Management System
LIBRARY MANAGEMENT SYSTEM 2
RFID BASED LIBRARY MANAGEMENT SYSTEM
School library management system
Introduction to Open Source Library Management Systems
Mobile Library Management System
Online Library Management System

Seminar on web application security

A web application security scanner is program which communicates with a web application through the web front-end in order to identify potential security vulnerabilities in the web application and architectural weaknesses. It performs a black-box test. Unlike source code scanners, web application scanners don't have access to the source code and therefore detect vulnerabilities by actually performing attacks.

                                                                                                                    

A web application security scanner can facilitate the automated review of a web application with the expressed purpose of discovering security vulnerabilities, and are required to comply with various regulatory requirements. Web application scanners can look for a wide variety of vulnerabilities, including:

  • Input/Output validation: (Cross-site scripting, SQL Injection, etc.)
  • Specific application problems
  • Server configuration mistakes/errors/version

Power point presentation on web application security

Web application security
Web Application Security 1
Web Application Security - Black Hat
Introduction to Web Application Security and App
E-security solutions: Web Applications Security and challenges
Web Application Security 2
Building a Robust Web Application Security Plan
Web Application Security Whitepaper

Tuesday, July 5, 2011

.Net Framework Security

.NET has its own security mechanism with two general features: Code Access Security (CAS), and validation and verification. Code Access Security is based on evidence that is associated with a specific assembly. Typically the evidence is the source of the assembly (whether it is installed on the local machine or has been downloaded from the intranet or Internet). Code Access Security uses evidence to determine the permissions granted to the code. Other code can demand that calling code is granted a specified permission. The demand causes the CLR to perform a call stack walk: every assembly of each method in the call stack is checked for the required permission; if any assembly is not granted the permission a security exception is thrown. however, has to split the application into subdomains; it is not done by the CLR.

            

Code Access Security (CAS), in the Microsoft .NET framework, is Microsoft's solution to prevent untrusted code from performing privileged actions. When the CLR loads an assembly it will obtain evidence for the assembly and use this to identify the code group that the assembly belongs to. A code group contains a permission set (one or more permissions). Code that performs a privileged action will perform a code access demand which will cause the CLR to walk up the call stack and examine the permission set granted to the assembly of each method in the call stack. The code groups and permission sets are determined by the administrator of the machine who defines the security policy.

Power point Presentation on .net Framework Security

 

Monday, July 4, 2011

Seminar on .NET framework

The .NET Framework (pronounced dot net) is a software framework that runs primarily on Microsoft Windows. It includes a large library and supports several programming languages which allows language interoperability (each language can use code written in other languages). The .NET library is available to all the programming languages that .NET supports. Programs written for the .NET Framework execute in a software environment (as contrasted to hardware environment), known as the Common Language Runtime (CLR), an application virtual machine that provides important services such as security, memory management, and exception handling. The class library and the CLR together constitute the .NET Framework.

              

The .NET Framework's Base Class Library provides user interface, data access, database connectivity, cryptography, web application development, numeric algorithms, and network communications. Programmers produce software by combining their own source code with the .NET Framework and other libraries. The .NET Framework is intended to be used by most new applications created for the Windows platform. Microsoft also produces a popular integrated development environment largely for .NET software called Visual Studio.

 

Power point presentation on .NET Framework

Saturday, July 2, 2011

Another list of Seminar topics

Hi,

Please find another list of Computer science , information technology and electronics seminar topics.

I will be adding many more such topics in coming future. Please post your comments whether these are helpful or not. And also, if you have any suggestion, please let me know so that I can incorporate that too.

Thanks!

List of Seminar topics

Hi All,

Here is the large number of seminar topics on computer science, information technology and electronics along with seminar materials provided. I hope these materials & topics will be helpful for all of you.

If you want any further information, please feel free to post your request in the comment section. I will try to assist in all possible manner.

Thanks!

Friday, July 1, 2011

Seminar on Android

Android is a software stack for mobile devices that includes an operating system, middleware and key applications. Google Inc. purchased the initial developer of the software, Android Inc., in 2005. Android's mobile operating system is based on the Linux kernel. Google and other members of the Open Handset Alliance collaborated on Android's development and release. The Android Open Source Project (AOSP) is tasked with the maintenance and further development of Android.The Android operating system is currently the world's best-selling Smartphone platform.

Android has a large community of developers writing applications ("apps") that extend the functionality of the devices. There are currently over 200,000 apps available for Android. Android Market is the online app store run by Google, though apps can also be downloaded from third-party sites. Developers write primarily in the Java language, controlling the device via Google-developed Java libraries.

                

The unveiling of the Android distribution on 5 November 2007 was announced with the founding of the Open Handset Alliance, a consortium of 80 hardware, software, and telecom companies devoted to advancing open standards for mobile devices. Google released most of the Android code under the Apache License, a free software and open source license

The Android open-source software stack consists of Java applications running on a Java-based, object-oriented application framework on top of Java core libraries running on a Dalvik virtual machine featuring JIT compilation. Libraries written in C include the surface manager, OpenCore[21] media framework, SQLite relational database management system, OpenGL ES 2.0 3D graphics API, WebKit layout engine, SGL graphics engine, SSL, and Bionic libc. The Android operating system, including the Linux kernel, consists of roughly 12 million lines of code including 3 million lines of XML, 2.8 million lines of C, 2.1 million lines of Java, and 1.75 million lines of C++.

Power point presentation on Android

Thursday, June 30, 2011

Project Abstract - E-Learning

E-learning comprises all forms of electronically supported learning and teaching. The information and communication systems, whether networked learning or not, serve as specific media to implement the learning process.[1] The term will still most likely be utilized to reference out-of-classroom and in-classroom educational experiences via technology, even as advances continue in regard to devices and curriculum.

              

E-learning is essentially the computer and network-enabled transfer of skills and knowledge. E-learning applications and processes include Web-based learning, computer-based learning, virtual education opportunities and digital collaboration. Content is delivered via the Internet, intranet/extranet, audio or video tape, satellite TV, and CD-ROM. It can be self-paced or instructor-led and includes media in the form of text, image, animation, streaming video and audio.

Abbreviations like CBT (Computer-Based Training), IBT (Internet-Based Training) or WBT (Web-Based Training) have been used as synonyms to e-learning. Today one can still find these terms being used, along with variations of e-learning such as elearning, Elearning, and eLearning. The terms will be utilized throughout this article to indicate their validity under the broader terminology of E-learning.

Power point presentation on E-Learning

Tuesday, June 28, 2011

Seminar on SMTP

Simple Mail Transfer Protocol (SMTP) is an Internet standard for electronic mail (e-mail) transmission across Internet Protocol (IP) networks. SMTP was first defined by RFC 821 (1982, eventually declared STD 10), and last updated by RFC 5321 (2008)[2] which includes the extended SMTP (ESMTP) additions, and is the protocol in widespread use today. SMTP is specified for outgoing mail transport and uses TCP port 25. The protocol for new submissions is effectively the same as SMTP, but it uses port 587 instead. SMTP connections secured by SSL are known by the shorthand SMTPS, though SMTPS is not a protocol in its own right.

 

While electronic mail servers and other mail transfer agents use SMTP to send and receive mail messages, user-level client mail applications typically only use SMTP for sending messages to a mail server for relaying. For receiving messages, client applications usually use either the Post Office Protocol (POP) or the Internet Message Access Protocol (IMAP) or a proprietary system (such as Microsoft Exchange or Lotus Notes/Domino) to access their mail box accounts on a mail server.

 

Power point presentation on SMTP