Showing posts with label ppt. Show all posts
Showing posts with label ppt. Show all posts

Monday, August 15, 2011

Signal processing

Signal processing is an area of electrical engineering and applied mathematics that deals with operations on or analysis of signals, in either discrete or continuous time, to perform useful operations on those signals. Signals of interest can include sound, images, time-varying measurement values and sensor data, for example biological data such as electrocardiograms, control system signals, telecommunication transmission signals such as radio signals, and many others. Signals are analog or digital electrical representations of time-varying or spatial-varying physical quantities. In the context of signal processing, arbitrary binary data streams and on-off signaling are not considered as signals, but only analog and digital signals that are representations of analog physical quantities.

Analog signal processing is for signals that have not been digitized, as in classical radio, telephone, radar, and television systems. This involves linear electronic circuits such as passive filters, active filters, additive mixers, integrators and delay lines. It also involves non-linear circuits such as compandors, multiplicators (frequency mixers and voltage-controlled amplifiers), voltage-controlled filters, voltage-controlled oscillators and phase-locked loops.

Presentation

Digital Signal Processing - The University of Texas at Austin
Digital Signal Processing (DSP) Fundamentals
Multirate Digital Signal Processing
Basics of Signal Processing – Intel
Digital Signal Processing Using MATLAB甐.4

Sunday, June 26, 2011

Seminar on Software as a service

Software as a service (SaaS, typically pronounced [sæs]), sometimes referred to as "on-demand software," is a software delivery model in which software and its associated data are hosted centrally (typically in the (Internet) cloud) and are typically accessed by users using a thin client, normally using a web browser over the Internet.

While practically every Internet service (such as Web search engine or web-based email) is driven by some underlying software, the term software as a service is often used in the context of business applications, and in some cases even more narrowly as software in a category which has on-premises software; i.e., equivalent applications that are installed in businesses' computer networks or personal computers.

 

SaaS has become a common delivery model for most business applications, including accounting, collaboration, customer relationship management (CRM), enterprise resource planning (ERP), invoicing, human resource management (HRM), content management (CM) and service desk management. SaaS has been incorporated into the strategy of all leading enterprise software companies.

According to a Gartner Group estimate, SaaS sales in 2010 have reached $9B, up 15.7% from 2009, and are projected to increase to $10.7b in 2011, up 16.2% from 2010. Gartner Group also estimates that SaaS applications, which accounted for a little more than 10% of the total enterprise software market last year, would represent at least 16% of worldwide software sales by 2014.

The term software as a service (SaaS) is considered to be part of the nomenclature of cloud computing, along with infrastructure as a service (IaaS) and platform as a service (PaaS).

Power point presentation on Software as a service

Project Abstract - Greedy Routing With Anti-Void Traversal For Wireless Sensor Networks

The unreachability problem (i.e., the so-called void problem) that exists in the greedy routing algorithms has been studied for the wireless sensor networks. Some of the current research work cannot fully resolve the void problem, while there exist other schemes that can guarantee the delivery of packets with the excessive consumption of control overheads. In this paper, a greedy antivoid routing (GAR) protocol is proposed to solve the void problem with increased routing efficiency by exploiting the boundary finding technique for the unit disk graph (UDG). The proposed rolling-ball UDG boundary traversal (RUT) is employed to completely guarantee the delivery of packets from the source to the destination node under the UDG network. The boundary map (BM) and the indirect map searching (IMS) scheme are proposed as efficient algorithms for the realization of the RUT technique.

 

 

Moreover, the hop count reduction (HCR) scheme is utilized as a short-cutting technique to reduce the routing hops by listening to the neighbor’s traffic, while the intersection navigation (IN) mechanism is proposed to obtain the best rolling direction for boundary traversal with the adoption of shortest path criterion. In order to maintain the network requirement of the proposed RUT scheme under the non-UDG networks, the partial UDG construction (PUC) mechanism is proposed to transform the non-UDG into UDG setting for a portion of nodes that facilitate boundary traversal. These three schemes are incorporated within the GAR protocol to further enhance the routing performance with reduced communication overhead. The proofs of correctness for the GAR scheme are also given in this paper. Comparing with the existing localized routing algorithms, the simulation results show that the proposed GAR-based protocols can provide better routing efficiency.

 

Saturday, June 25, 2011

Seminar on Website Marketing

Internet marketing, also known as digital marketing, web marketing, online marketing, search marketing or e-marketing, is the marketing (generally promotion) of products or services over the Internet.

Internet marketing is considered to be broad in scope because it not only refers to marketing on the Internet, but also includes marketing done via e-mail and wireless media. Digital customer data and electronic customer relationship management (ECRM) systems are also often grouped together under internet marketing.

Internet marketing ties together the creative and technical aspects of the Internet, including design, development, advertising, and sales. Internet marketing also refers to the placement of media along many different stages of the customer engagement cycle through search engine marketing (SEM), search engine optimization (SEO), banner ads on specific websites, email marketing, and Web 2.0 strategies.[citation needed]

In 2008, The New York Times, working with comScore, published an initial estimate to quantify the user data collected by large Internet-based companies. Counting four types of interactions with company websites in addition to the hits from advertisements served from advertising networks, the authors found that the potential for collecting data was up to 2,500 times per user per month.

     

 

Presentation on the topic website marketing

Seminar on Personality development

Personality Development quintessentially means enhancing and grooming one’s outer and inner self to bring about a positive change to your life. Each individual has a distinct persona that can be developed, polished and refined. This process includes boosting one’s confidence, improving communication and language speaking abilities, widening ones scope of knowledge, developing certain hobbies or skills, learning fine etiquettes and manners, adding style and grace to the way one looks, talks and walks and overall imbibing oneself with positivity, liveliness and peace.

The whole process of this development takes place over a period of time. Even though there are many crash courses in personality development that are made available to people of all age groups, implementing this to your routine and bringing about a positive change in oneself takes a considerable amount of time. It is not necessary to join a personality development course; one can take a few tips and develop his or her own aura or charm.

 

 

Presentation on the topic Personality Development

Seminar on Project management

Project management is the discipline of planning, organizing, securing and managing resources to bring about the successful completion of specific project goals and objectives.

A project is a temporary endeavor, having a defined beginning and end (usually constrained by date, but can be by funding or deliverables), undertaken to meet unique goals and objectives, usually to bring about beneficial change or added value. The temporary nature of projects stands in contrast to business as usual (or operations), which are repetitive, permanent or semi-permanent functional work to produce products or services. In practice, the management of these two systems is often found to be quite different, and as such requires the development of distinct technical skills and the adoption of separate management.

The primary challenge of project management is to achieve all of the project goals and objectives while honoring the preconceived project constraints. Typical constraints are scope, time, and budget. The secondary—and more ambitious—challenge is to optimize the allocation and integration of inputs necessary to meet pre-defined objectives.

   

 

Power point presentation on Project management

Seminar on leadership qualities

Leaders do not command excellence, they build excellence. Excellence is “being all you can be” within the bounds of doing what is right for your organization. To reach excellence you must first be a leader of good character. You must do everything you are supposed to do. Organizations will not achieve excellence by figuring out where it wants to go, then having leaders do whatever they have to in order to get the job done, and then hope their leaders acted with good character. This type of thinking is backwards. Pursuing excellence should not be confused with accomplishing a job or task. When you do planning, you do it by backwards planning. But you do not achieve excellence by backwards planning. Excellence starts with leaders of good and strong character who engage in the entire process of leadership. And the first process is being a person of honorable character.

 

Character develops over time. Many think that much of a person's character is formed early in life. However, we do not know exactly how much or how early character develops. But, it is safe to claim that character does not change quickly. A person's observable behavior is an indication of her character. This behavior can be strong or weak, good or bad. A person with strong character shows drive, energy, determination, self-discipline, willpower, and nerve. She sees what she wants and goes after it. She attracts followers. On the other hand, a person with weak character shows none of these traits. She does not know what she wants. Her traits are disorganized, she vacillates and is inconsistent. She will attract no followers.

A strong person can be good or bad. A gang leader is an example of a strong person with a bad character, while an outstanding community leader is one with both strong and good characteristics. An organization needs leaders with both strong and good characteristics, people who will guide them to the future and show that they can be trusted.

Source http://www.nwlink.com/~donclark/leader/leadchr.html

Power point Presentation on leadership qualities

Seminar on Linux Virtual File System

A virtual file system (VFS) or virtual filesystem switch is an abstraction layer on top of a more concrete file system. The purpose of a VFS is to allow client applications to access different types of concrete file systems in a uniform way. A VFS can, for example, be used to access local and network storage devices transparently without the client application noticing the difference. It can be used to bridge the differences in Windows, Mac OS and Unix filesystems, so that applications can access files on local file systems of those types without having to know what type of file system they are accessing.

A VFS specifies an interface (or a "contract") between the kernel and a concrete file system. Therefore, it is easy to add support for new file system types to the kernel simply by fulfilling the contract. The terms of the contract might change incompatibly from release to release, which would require that concrete file system support be recompiled, and possibly modified before recompilation, to allow it to work with a new release of the operating system; or the supplier of the operating system might make only backward-compatible changes to the contract, so that concrete file system support built for a given release of the operating system would work with future versions of the operating system.

                    

 

Presentation on the topic virtual file system

Internet Marketing Strategy

Developing a successful internet marketing strategy is an essential part of your online success. In order to succeed, you must develop and implement a strategic plan that includes all of the following:
  • A great product
  • A web site specifically designed to sell
  • A killer marketing strategy
Each step plays an important role in your overall strategy and must be developed to its fullest potential. If even one step fails, your chances of success will be minimal.

Developing Your Product

Your first step will be to develop a great product. You're probably thinking that's easier said than done, but it's really not. The absolute best product is one that you can develop yourself and deliver over the Internet. With today's technology, there is absolutely no reason why you can't create your own product. The knowledge you have within your own mind is extremely valuable. Everybody is good at something, has a special talent or some specialized knowledge. Use this knowledge to create a product.
The key to developing a great product is exclusiveness. Your product should be unique and not be in competition with hundreds of other similar products. You must give your potential customers exactly what they want. Develop a high-quality product that fills a void to increase your chance of success.
Another consideration of great importance is your target market. Keep in mind, the Internet is a global marketplace. Develop a product with a large geographic target and a wide appeal. A great product will fulfill a need or desire and provide instant gratification.

Source: http://www.web-source.net/3steps.htm

Presentation on Topic

Seminar on Internet Marketing

Internet marketing, also known as digital marketing, web marketing, online marketing, search marketing or e-marketing, is the marketing (generally promotion) of products or services over the Internet.

Internet marketing is considered to be broad in scope because it not only refers to marketing on the Internet, but also includes marketing done via e-mail and wireless media.Digital customer data and electronic customer relationship management (ECRM) systems are also often grouped together under internet marketing.

Internet marketing ties together the creative and technical aspects of the Internet, including design, development, advertising, and sales. Internet marketing also refers to the placement of media along many different stages of the customer engagement cycle through search engine marketing (SEM), search engine optimization (SEO), banner ads on specific websites, email marketing, and Web 2.0 strategies.[citation needed]

In 2008, The New York Times, working with comScore, published an initial estimate to quantify the user data collected by large Internet-based companies. Counting four types of interactions with company websites in addition to the hits from advertisements served from advertising networks, the authors found that the potential for collecting data was up to 2,500 times per user per month.

 

Presentations on topic Internet marketing

Seminar on Affiliate marketing

Affiliate marketing is a marketing practice in which a business rewards one or more affiliates for each visitor or customer brought about by the affiliate's own marketing efforts. Examples include rewards sites, where users are rewarded with cash or gifts, for the completion of an offer, and the referral of others to the site. The industry has four core players: the merchant (also known as 'retailer' or 'brand'), the network, the publisher (also known as 'the affiliate'), and the customer. The market has grown in complexity to warrant a secondary tier of players, including affiliate management agencies, super-affiliates and specialized third party vendors.

Affiliate marketing overlaps with other Internet marketing methods to some degree, because affiliates often use regular advertising methods. Those methods include organic search engine optimization, paid search engine marketing, e-mail marketing, and in some sense display advertising. On the other hand, affiliates sometimes use less orthodox techniques, such as publishing reviews of products or services offered by a partner.

Affiliate marketing—using one website to drive traffic to another—is a form of online marketing, which is frequently overlooked by advertisers.While search engines, e-mail, and website syndication capture much of the attention of online retailers, affiliate marketing carries a much lower profile. Still, affiliates continue to play a significant role in e-retailers' marketing strategies.

 

Presentations slides on Affiliate marketing

Seminar on Search Engine Marketing

Search engine marketing, (SEM), is a form of Internet marketing that seeks to promote websites by increasing their visibility in search engine result pages (SERPs) through the use of, paid placement, contextual advertising, and paid inclusion. Search engine optimization (SEO) is "optimizing" website pages to achieve higher ranking in search results via the process of selecting specific keyword expressions associated to the website SEM is utilizing various means of "marketing" a website in order for it to become more relevant in regard to search engine searches and their rankings. It should be asserted that SEM is NOT SEO and vice versa. SEM constitutes Ad words which comprises pay per call (particularly beneficial for local providers as it enables potential consumers to get in touch directly to a company with one click), article submissions, advertising and making sure SEO has been done. Also, key word analysis needs to be done for both SEO and SEM; but not necessarily at the same time. SEM is a constant and tedious task. It frequently needs to be updated and monitored continually. Another part of SEM is Social Media Marketing (SMM). SMM is a type of marketing that involves exploiting social media to influence consumers that one company’s products and/or services are valuable. You can do SEM without doing SMM but you can't do SMM without doing SEM because SMM is a higher level of SEM.

 

 

As the number of sites on the Web increased in the mid-to-late 90s, search engines started appearing to help people find information quickly. Search engines developed business models to finance their services, such as pay per click programs offered by Open Text in 1996 and then Goto.comin 1998. Goto.com later changed its name to Overture in 2001, and was purchased by Yahoo! in 2003, and now offers paid search opportunities for advertisers through Yahoo! Search Marketing. Google also began to offer advertisements on search results pages in 2000 through the Google AdWords program. By 2007, pay-per-click programs proved to be primary money-makers for search engines. In a market dominated by Google, in 2009 Yahoo! and Microsoft announced the intention to forge an alliance. The Yahoo! & Microsoft Search Alliance eventually received approval from regulators in the US and Europe in February 2010

Presentation on Topic Search engine marketing

Seminar on Java Security

Java's security model is one of the language's key architectural features that makes it an appropriate technology for networked environments. Security is important because networks provide a potential avenue of attack to any computer hooked to them. This concern becomes especially strong in an environment in which software is downloaded across the network and executed locally, as is done with Java applets, for example. Because the class files for an applet are automatically downloaded when a user goes to the containing Web page in a browser, it is likely that a user will encounter applets from untrusted sources. Without any security, this would be a convenient way to spread viruses. Thus, Java's security mechanisms help make Java suitable for networks because they establish a needed trust in the safety of network-mobile code.

 

               

Java's security model is focused on protecting users from hostile programs downloaded from untrusted sources across a network. To accomplish this goal, Java provides a customizable "sandbox" in which Java programs run. A Java program must play only inside its sandbox. It can do anything within the boundaries of its sandbox, but it can't take any action outside those boundaries. The sandbox for untrusted Java applets, for example, prohibits many activities, including:

  • Reading or writing to the local disk
  • Making a network connection to any host, except the host from which the applet came
  • Creating a new process
  • Loading a new dynamic library and directly calling a native method

By making it impossible for downloaded code to perform certain actions, Java's security model protects the user from the threat of hostile code.

Ppt on Java Security

Web Services in Java

Web services are Web based applications that use open, XML-based standards and transport protocols to exchange data with clients. Web services are developed using Java Technology APIs and tools provided by an integrated Web Services Stack called Metro.

 

The Metro stack consisting of JAX-WS, JAXB, and WSIT, enable you to create and deploy secure, reliable, transactional, interoperable Web services and clients. The Metro stack is part of Project Metro and as part of GlassFish, Java Platform, Enterprise Edition (Java EE), and partially in Java PlatForm, Standard Edition (Java SE). GlassFish and Java EE also support the legacy JAX-RPC APIs.

Power point presentation on web services in java

ppt