Showing posts with label power point presentation. Show all posts
Showing posts with label power point presentation. Show all posts

Monday, August 15, 2011

122 Seminar & projects

Here are 122 seminar topics related to computer science, electronics and  electrical field along with power point presentation.

    1. Project Abstract - E-Learning
    2. Seminar on SMTP
    3. Seminar on Software as a service
    4. Project - Time Attendance
    5. Tabu Search Algorithm For Cluster Building In Wire...
    6. Seminar on Online identity management
    7. Seminar on Website Marketing
    8. Seminar on Personality development
    9. How to make a Presentation
    10. Seminar on Project management
    11. Seminar on leadership qualities
    12. Seminar on Linux Virtual File System
    13. Internet Marketing Strategy
    14. Seminar on Internet Marketing
    15. Seminar on Affiliate marketing
    16. Seminar on Search Engine Marketing
    17. Seminar on Time management
    18. Seminar on Java Security
    19. Web Services in Java
    20. Seminar on SDLC
    21. Seminar on fingerprint recognition
    22. Project Abstract - Hospital Management System
    23. Seminar on Android
    24. Seminar on Organizational information systems
    25. Project - Digital library
    26. Seminar on E-Business
    27. Seminar on Iris Scanning
    28. Grid network
    29. Earth Simulator
    30. M-Commerce
    31. Socket Programming
    32. video door phone
    33. CCTV System
    34. WI-MAX
    35. WISENET
    36. Optical fiber communication
    37. Lightweight Directory Access Protocol
    38. Kerberos
    39. Organic light emitting diode (OLED)
    40. Augmented Reality
    41. The Bionic Eye
    42. Optical Communications in Space
    43. 4G Wireless Systems
    44. Bittorrent
    45. Wireless USB
    46. Tripwire
    47. Data mining
    48. Interactive Voice Response
    49. Nessus
    50. Mobile Computing
    51. Holographic Versatile Disc
    52. Satellite radio
    53. Silverlight
    54. Bluetooth
    55. Wearable computers
    56. Cluster computing
    57. Quantum computer
    58. HVAC
    59. Mobile IP
    60. FireWire
    61. Home Networking
    62. Plasma display
    63. PLAN 9 Operating system
    64. Global Positioning System
    65. Spyware and Trojan horses
    66. Voice over Internet Protocol
    67. SSL-TLS
    68. PolyBot - Modular, self-reconfigurable robots
    69. Facial recognition system
    70. Captchas
    71. Ext3 File System
    72. Embedded Linux
    73. Computer forensics
    74. Security Protocol For Sensor Network
    75. Signal processing
    76. Seminar on Smoke detector
    77. Seminar on Motion detector
    78. Seminar on Transformer
    79. Seminar Test automation framework
    80. Seminar on Digital and analog signals
    81. Seminar on Programmable logic controller
    82. Seminar on LED
    83. Seminar on power systems automations
    84. Seminar on Flight Simulator
    85. Application Server
    86. Inventory Control System
    87. Seminar - Online Gaming
    88. Project – Online Survey System
    89. Project Abstract - Traffic Management System
    90. Seminar on IPTV
    91. Seminar on Smartphone
    92. Seminar on Real-Time Operating Systems
    93. Seminar on Agile Methodology
    94. Project on GPS Integrity Monitoring
    95. Seminar on Listening Skills
    96. Seminar on Communication Skills
    97. Seminar on Mobile commerce
    98. Project - Payroll Management System
    99. Seminar on SAP CRM
    100. Seminar on Sales Tracking
    101. Seminar on Marketing
    102. Seminar on Sap R/3 Architecture
    103. Seminar on Software Project Management
    104. Seminar on Motivation
    105. Seminar on CRM
    106. Enterprise resource planning
    107. Seminar on Cloud computing
    108. Project - 2D Sonar
    109. Project - 3D Pong
    110. Project on Laser Pointer Mouse
    111. Project on Fingerprint Verification System
    112. Project - Wireless Surveillance System
    113. Project - Instant messaging
    114. Seminar on Laser Communications
    115. Project - Online Examination System
    116. Nanotechnology
    117. Project on Library Management System
    118. Seminar on web application security
    119. .Net Framework Security
    120. Seminar on .NET framework
    121. Seminar on Artificial intelligence
    122. Seminar on Unlicenced Mobile Access

Incase, you have any suggestion or wants me to add any topic. Kindly post in the comment section.

Thanks!

Saturday, August 13, 2011

Seminar on Smoke detector

A smoke detector is a device that detects smoke, typically as an indicator of fire. Commercial, industrial, and mass residential devices issue a signal to a fire alarm system, while household detectors, known as smoke alarms, generally issue a local audible and/or visual alarm from the detector itself.
Smoke detectors are typically housed in a disk-shaped plastic enclosure about 150 millimetres (6 in) in diameter and 25 millimetres (1 in) thick, but the shape can vary by manufacturer or product line. Most smoke detectors work either by optical detection (photoelectric) or by physical process (ionization), while others use both detection methods to increase sensitivity to smoke. Sensitive alarms can be used to detect, and thus deter, smoking in areas where it is banned such as toilets and schools. Smoke detectors in large commercial, industrial, and residential buildings are usually powered by a central fire alarm system, which is powered by the building power with a battery backup. However, in many single family detached and smaller multiple family housings, a smoke alarm is often powered only by a single disposable battery.

               

The first automatic electric fire alarm was invented in 1890 by Francis Robbins Upton (U.S. patent no. 436,961). Upton was an associate of Thomas Edison, but there is no evidence that Edison contributed to this project.
George Andrew Darby patents the first electrical Heat detector and Smoke detector in 1902 in Birmingham, England. [1]
In the late 1930s the Swiss physicist Walter Jaeger tried to invent a sensor for poison gas. He expected that gas entering the sensor would bind to ionized air molecules and thereby alter an electric current in a circuit in the instrument. His device failed: small concentrations of gas had no effect on the sensor's conductivity. Frustrated, Jaeger lit a cigarette—and was soon surprised to notice that a meter on the instrument had registered a drop in current. Smoke particles had apparently done what poison gas could not. Jaeger's experiment was one of the advances that paved the way for the modern smoke detector.

Presentation on smoke detector

Residential Smoke Alarm Installation
Smoke Detectors
How Does A Smoke Detector Work?
First Thought When Smoke Detector Went Off
Smoke Detector Installation.ppt
Wireless Smoke Detection
Carbon Monoxide Detectors & Fire Alarms

Seminar on Transformer

A transformer is a device that transfers electrical energy from one circuit to another through inductively coupled conductors—the transformer's coils. A varying current in the first or primary winding creates a varying magnetic flux in the transformer's core and thus a varying magnetic field through the secondary winding. This varying magnetic field induces a varying electromotive force (EMF), or "voltage", in the secondary winding. This effect is called mutual induction.
If a load is connected to the secondary, an electric current will flow in the secondary winding and electrical energy will be transferred from the primary circuit through the transformer to the load. In an ideal transformer, the induced voltage in the secondary winding (Vs) is in proportion to the primary voltage (Vp), and is given by the ratio of the number of turns in the secondary (Ns) to the number of turns in the primary (Np) as follows:

                 

By appropriate selection of the ratio of turns, a transformer thus allows an alternating current (AC) voltage to be "stepped up" by making Ns greater than Np, or "stepped down" by making Ns less than Np.
In the vast majority of transformers, the windings are coils wound around a ferromagnetic core, air-core transformers being a notable exception.
Transformers range in size from a thumbnail-sized coupling transformer hidden inside a stage microphone to huge units weighing hundreds of tons used to interconnect portions of power grids. All operate with the same basic principles, although the range of designs is wide. While new technologies have eliminated the need for transformers in some electronic circuits, transformers are still found in nearly all electronic devices designed for household ("mains") voltage. Transformers are essential for high-voltage electric power transmission, which makes long-distance transmission economically practical.

Presentation

100 MVA POWER TRANSFORMER

Transformer Design Differences
DRY CORE TRANSFORMERS (rated under 750 volts)
Ramifications of the New Transformer Efficiency Standards
Transformers
Transformer 2

Seminar on Programmable logic controller

A programmable logic controller (PLC) or programmable controller is a digital computer used for automation of electromechanical processes, such as control of machinery on factory assembly lines, amusement rides, or light fixtures. PLCs are used in many industries and machines. Unlike general-purpose computers, the PLC is designed for multiple inputs and output arrangements, extended temperature ranges, immunity to electrical noise, and resistance to vibration and impact. Programs to control machine operation are typically stored in battery-backed or non-volatile memory. A PLC is an example of a hard real time system since output results must be produced in response to input conditions within a bounded time, otherwise unintended operation will result.

               

The PLC was invented in response to the needs of the American automotive manufacturing industry. Programmable logic controllers were initially adopted by the automotive industry where software revision replaced the re-wiring of hard-wired control panels when production models changed.
Before the PLC, control, sequencing, and safety interlock logic for manufacturing automobiles was accomplished using hundreds or thousands of relays, cam timers, and drum sequencers and dedicated closed-loop controllers. The process for updating such facilities for the yearly model change-over was very time consuming and expensive, as electricians needed to individually rewire each and every relay.

Presentation

PROGRAMMABLE LOGIC CONTROOLER
PROGRAMMABLE LOGIC CONTROOLER 2
Industrial Programmable Logic Controllers (PLCs)
What is a PLC ?
PLC AND ITS APPLICATION
Programmable Logic Controllers

Seminar on power systems automations

Power system automation is the act of automatically controlling the power system via instrumentation and control devices. Substation automation refers to using data from Intelligent electronic devices (IED), control and automation capabilities within the substation, and control commands from remote users to control power system devices.
Since full substation automation relies on substation integration, the terms are often used interchangeably. Power system automation includes processes associated with generation and delivery of power.

Monitoring and control of power delivery systems in the substation and on the pole top reduce the occurrence of outages and shorten the duration of outages that do occur. The IEDs, communications protocols, and communications methods, work together as a system to perform power system automation. The term “power system” describes the collection of devices that make up the physical systems that generate, transmit, and distribute power. The term “instrumentation and control (I&C) system” refers to the collection of devices that monitor, control, and protect the power system.

Presentation

power_system_automation
GE Power Automation System - GEDigitalenergy.eu
Power Systems Modeling and Stability Analysis
Power System Protection and Automation in GECOL
Distribution Automation Systems with Advanced Features

Saturday, July 23, 2011

Seminar on Listening Skills

Listening skill is a communication technique that requires the listener to understand, interpret, and evaluate what (s)he hears. The ability to listen actively can improve personal relationships through reducing conflicts, strengthening cooperation, and fostering understanding.

When interacting, people often are not listening attentively. They may be distracted, thinking about other things, or thinking about what they are going to say next (the latter case is particularly true in conflict situations or disagreements). Active listening is a structured way of listening and responding to others, focusing attention on the speaker. Suspending one's own frame of reference, suspending judgment and avoiding other internal mental activities are important to fully attend to the speaker.

Comprehension is "shared meaning between parties in a communication transaction". This is the first step in the listening process. The first challenge for the listener is accurately identifying speech sounds and understanding and synthesizing these sounds as words. We are constantly bombarded with auditory stimuli, so the listener has to select which of those stimuli are speech sounds and choose to pay attention to the appropriate sounds (attending). The second challenge is being able to discern breaks between discernable words, or speech segmentation. This becomes significantly more difficult with an unfamiliar language because the speech sounds blend together into a continuous cluster. Determining the context and meanings of each word is essential to comprehending a sentence.

Power point presentation on Listening Skills

LISTENING SKILLS Prof.Meenakshi Gupta Dept of Humanities & Social
Improving Your Listening Skills idXready Sample PowerPoint
Listening Skills
Developing Good Listening Skills
Teaching Listening Skills
Listening Skills - PowerPoint – Itslife
How to Improve Listening Skills

Seminar on Communication Skills

Communication is the activity of conveying meaningful information. Communication requires a sender, a message, and an intended recipient, although the receiver need not be present or aware of the sender's intent to communicate at the time of communication; thus communication can occur across vast distances in time and space. Communication requires that the communicating parties share an area of communicative commonality. The communication process is complete once the receiver has understood the sender.

 

Human spoken and picture languages can be described as a system of symbols (sometimes known as lexemes) and the grammars (rules) by which the symbols are manipulated. The word "language" also refers to common properties of languages. Language learning normally occurs most intensively during human childhood. Most of the thousands of human languages use patterns of sound or gesture for symbols which enable communication with others around them. Languages seem to share certain properties, although many of these include exceptions. There is no defined line between a language and a dialect. Constructed languages such as Esperanto, programming languages, and various mathematical formalisms are not necessarily restricted to the properties shared by human languages.

Power point presentation on communication skills

101 Ways top Improve Your Communication Skills

COMMUNICATION-SKILLS.ppt
communication.ppt - Itivadnagar.org
Communication Skills
COMMUNICATION & PRESENTATION SKILLS ORAL PRESENTATION
Communication Skills

Wednesday, July 20, 2011

Seminar on Motivation

Motivation is the driving force by which humans achieve their goals. Motivation is said to be intrinsic or extrinsic. The term is generally used for humans but it can also be used to describe the causes for animal behavior as well. This article refers to human motivation. According to various theories, motivation may be rooted in a basic need to minimize physical pain and maximize pleasure, or it may include specific needs such as eating and resting, or a desired object, goal, state of being, ideal, or it may be attributed to less-apparent reasons such as altruism, selfishness, morality, or avoiding mortality. Conceptually, motivation should not be confused with either volition or optimism. Motivation is related to, but distinct from, emotion.

 

Power point presentation on Motivation

Motivation & Emotion
Motivation - Careervarsity.com
Motivation
Motivation 2
Work Motivation
Motivation PowerPoint

Monday, July 18, 2011

Enterprise resource planning

Enterprise resource planning (ERP) integrates internal and external management information across an entire organization, embracing finance/accounting, manufacturing, sales and service, customer relationship management, etc. ERP systems automate this activity with an integrated software application. Its purpose is to facilitate the flow of information between all business functions inside the boundaries of the organization and manage the connections to outside stakeholders.
ERP systems can run on a variety of hardware and network configurations, typically employing a database as a repository for information.


ERP systems typically include the following characteristics:

  • An integrated system that operates in real time (or next to real time), without relying on periodic updates.
  • A common database, which supports all applications.
  • A consistent look and feel throughout each module.
  • Installation of the system without elaborate application/data integration by the Information Technology (IT) department
    Power point presentation on ERP
ERP PPT - Free ERP Software Implementation Guide

 ERP Implementation Fundamentals

 ERP Centric Data Mining and KD

 ERP

 ERP Modules

 ERP and CRM

Sunday, July 17, 2011

Project - Wireless Surveillance System

This project implements a networked video surveillance system in digital logic. It allows a user to view video input from a remote camera on a VGA monitor by capturing camera data, encoding it, transmitting it wirelessly, and subsequently receiving, decoding, and re-displaying the data. To test the system, the project is divided into three main components: video capture/display, data encoding/decoding, and wireless transmission/reception. Each part is put through a comprehensive series of tests using Model Sim and simulated data. Once each component passes design and functional tests, all three components are then connected to transmit video data wirelessly

                 

Project Files

Presentation (PDF)

Report (PDF)

Report Appendix (PDF)

Source : MIT university

Seminar on Laser Communications

Optical communications, in various forms, have been used for thousands of years. The Ancient Greeks polished their shields to send signals during battle. In the modern era, semaphores and wireless solar telegraphs called heliographs were developed, using coded signals to communicate with their recipients.
In 1880 Alexander Graham Bell and his assistant Charles Sumner Tainter created the Photo phone, at Bell's newly established Volta Laboratory in Washington, DC. Bell considered it his most important invention. The device allowed for the transmission of sound on a beam of light. On June 3, 1880, Bell conducted the world's first wireless telephone transmission between two buildings, some 213 meters apart. Its first practical use came in military communication systems many decades later.
Carl Zeiss Jena developed the Licht sprechgerät 80 (direct translation: light speaking device) that the German army used in their World War II anti-aircraft defense units.

The invention of lasers in the 1960s revolutionized free space optics. Military organizations were particularly interested and boosted their development. However the technology lost market momentum when the installation of optical fiber networks for civilian uses was at its peak. Many simple and inexpensive consumer remote controls use low-speed communication using infrared (IR) light. This known as consumer IR technologies.

Power point presentation on laser communications

Laser Communications
Free Space Laser Communications
Laser Communication 2
Laser Communication 3
Free-Space Optical Communications for Tactical Applications
The Future of Satellite Communications
Semiconductor Sources for Optical Communications

Saturday, July 16, 2011

Nanotechnology

Nanotechnology (sometimes shortened to "nanotech") is the study of manipulating matter on an atomic and molecular scale. Generally, nanotechnology deals with structures sized between 1 to 100 nano metre in at least one dimension, and involves developing materials or devices possessing at least one dimension within that size. Quantum mechanical effects are very important at this scale, which is in the quantum realm.
Nanotechnology is very diverse, ranging from extensions of conventional device physics to completely new approaches based upon molecular self-assembly, from developing new materials with dimensions on the nano scale to investigating whether we can directly control matter on the atomic scale.
There is much debate on the future implications of nanotechnology. Nanotechnology may be able to create many new materials and devices with a vast range of applications, such as in medicine, electronics, biomaterials and energy production. On the other hand, nanotechnology raises many of the same issues as any new technology, including concerns about the toxicity and environmental impact of nano materials, and their potential effects on global economics, as well as speculation about various doomsday scenarios. These concerns have led to a debate among advocacy groups and governments on whether special regulation of nanotechnology is warranted.

Power Point presentation on Nanotechnology
 Introduction to Nanotechnology
Economic Impacts of Nanotechnology
Oklahoma Nanotechnology Initiative
Nanotechnology Challenges and Fears
Nanotechnology
Challenges of Nanotechnology

Project on Library Management System

An integrated library system (ILS), also known as a library management system (LMS), is an enterprise resource planning system for a library, used to track items owned, orders made, bills paid, and patrons who have borrowed.

An ILS usually comprises a relational database, software to interact with that database, and two graphical user interfaces (one for patrons, one for staff). Most ILSes separate software functions into discrete programs called modules, each of them integrated with a unified interface. Examples of modules might include:

acquisitions (ordering, receiving, and invoicing materials)
    cataloging (classifying and indexing materials)
    circulation (lending materials to patrons and receiving them back)
    serials (tracking magazine and newspaper holdings)
    the OPAC (public interface for users)

 

    

Each patron and item has a unique ID in the database that allows the ILS to track its activity.

Larger libraries use an ILS to order and acquire, receive and invoice, catalog, circulate, track and shelve materials. Smaller libraries, such as those in private homes or non-profit organizations (like churches or synagogues, for instance), often forgo the expense and maintenance required to run an ILS, and instead use a library computer system.

Power point presentation on Library Management System

Library Management System
LIBRARY MANAGEMENT SYSTEM 2
RFID BASED LIBRARY MANAGEMENT SYSTEM
School library management system
Introduction to Open Source Library Management Systems
Mobile Library Management System
Online Library Management System

Tuesday, July 5, 2011

.Net Framework Security

.NET has its own security mechanism with two general features: Code Access Security (CAS), and validation and verification. Code Access Security is based on evidence that is associated with a specific assembly. Typically the evidence is the source of the assembly (whether it is installed on the local machine or has been downloaded from the intranet or Internet). Code Access Security uses evidence to determine the permissions granted to the code. Other code can demand that calling code is granted a specified permission. The demand causes the CLR to perform a call stack walk: every assembly of each method in the call stack is checked for the required permission; if any assembly is not granted the permission a security exception is thrown. however, has to split the application into subdomains; it is not done by the CLR.

            

Code Access Security (CAS), in the Microsoft .NET framework, is Microsoft's solution to prevent untrusted code from performing privileged actions. When the CLR loads an assembly it will obtain evidence for the assembly and use this to identify the code group that the assembly belongs to. A code group contains a permission set (one or more permissions). Code that performs a privileged action will perform a code access demand which will cause the CLR to walk up the call stack and examine the permission set granted to the assembly of each method in the call stack. The code groups and permission sets are determined by the administrator of the machine who defines the security policy.

Power point Presentation on .net Framework Security

 

Monday, July 4, 2011

Seminar on .NET framework

The .NET Framework (pronounced dot net) is a software framework that runs primarily on Microsoft Windows. It includes a large library and supports several programming languages which allows language interoperability (each language can use code written in other languages). The .NET library is available to all the programming languages that .NET supports. Programs written for the .NET Framework execute in a software environment (as contrasted to hardware environment), known as the Common Language Runtime (CLR), an application virtual machine that provides important services such as security, memory management, and exception handling. The class library and the CLR together constitute the .NET Framework.

              

The .NET Framework's Base Class Library provides user interface, data access, database connectivity, cryptography, web application development, numeric algorithms, and network communications. Programmers produce software by combining their own source code with the .NET Framework and other libraries. The .NET Framework is intended to be used by most new applications created for the Windows platform. Microsoft also produces a popular integrated development environment largely for .NET software called Visual Studio.

 

Power point presentation on .NET Framework

Sunday, July 3, 2011

Seminar on Artificial intelligence

Artificial intelligence (AI) is the intelligence of machines and the branch of computer science that aims to create it. AI textbooks define the field as "the study and design of intelligent agents" where an intelligent agent is a system that perceives its environment and takes actions that maximize its chances of success. John McCarthy, who coined the term in 1956, defines it as "the science and engineering of making intelligent machines."

  

The field was founded on the claim that a central property of humans, intelligence—the sapience of Homo sapiens—can be so precisely described that it can be simulated by a machine. This raises philosophical issues about the nature of the mind and the ethics of creating artificial beings, issues which have been addressed by myth, fiction and philosophy since antiquity. Artificial intelligence has been the subject of optimism, but has also suffered setbacks and, today, has become an essential part of the technology industry, providing the heavy lifting for many of the most difficult problems in computer science.

Power point presentations on Artificial intelligence

Seminar on Unlicenced Mobile Access

Generic Access Network or GAN is a telecommunication system that extends mobile voice, data and IP Multimedia Subsystem/Session Initiation Protocol (IMS/SIP) applications over IP networks. Unlicensed Mobile Access or UMA, is the commercial name used by mobile carriers for external IP access into their core networks.

The most common application of GAN is in a dual-mode handset service where subscribers can seamlessly handover connections between wireless LANs and wide area networks using a GSM/Wi-Fi dual-mode mobile phone. UMA technology has enabled the convergence of mobile, fixed and Internet telephony, sometimes called Fixed Mobile Convergence.

                       

The local network may be based on private unlicensed spectrum technologies like 802.11, while the wide network is alternatively GSM/GPRS or UMTS mobile services. On the cellular network, the mobile handset communicates over the air with a base station, through a base station controller, to servers in the core network of the carrier.

Under the GAN system, when the handset detects a wireless LAN, it establishes a secure IP connection through a gateway to a server called a GAN Controller (GANC) on the carrier's network. The GANC presents to the mobile core network as a standard cellular base station. The handset communicates with the GANC over the secure connection using existing GSM/UMTS protocols. Thus, when a mobile moves from a GSM to an 802.11 network, it appears to the core network as if it is simply on a different base station.

Power point presentation on UMA

Saturday, July 2, 2011

Another list of Seminar topics

Hi,

Please find another list of Computer science , information technology and electronics seminar topics.

I will be adding many more such topics in coming future. Please post your comments whether these are helpful or not. And also, if you have any suggestion, please let me know so that I can incorporate that too.

Thanks!

List of Seminar topics

Hi All,

Here is the large number of seminar topics on computer science, information technology and electronics along with seminar materials provided. I hope these materials & topics will be helpful for all of you.

If you want any further information, please feel free to post your request in the comment section. I will try to assist in all possible manner.

Thanks!

Friday, July 1, 2011

Project Abstract - Hospital Management System

A hospital information system (HIS), variously also called clinical information system (CIS) is a comprehensive, integrated information system designed to manage the administrative, financial and clinical aspects of a hospital. This encompasses paper-based information processing as well as data processing machines.

It can be composed of one or a few software components with specialty-specific extensions as well as of a large variety of sub-systems in medical specialties (e.g. Laboratory Information System, Radiology Information System).

 

              

 

CISs are sometimes separated from HISs in that the former concentrate on patient-related and clinical-state-related data (electronic patient record) whereas the latter keeps track of administrative issues. The distinction is not always clear and there is contradictory evidence against a consistent use of both terms.

Power point presentation on Hospital Management System