Showing posts with label project ideas. Show all posts
Showing posts with label project ideas. Show all posts

Sunday, September 23, 2012

Seminar on Distributed Database Systems

A distributed database is a database in which storage devices are not all attached to a common processing unit such as the CPU. It may be stored in multiple computers located in the same physical location, or may be dispersed over a network of interconnected computers. Unlike parallel systems, in which the processors are tightly coupled and constitute a single database system, a distributed database system consists of loosely coupled sites that share no physical components.

Collections of data (e.g. in a database) can be distributed across multiple physical locations. A distributed database can reside on network servers on the Internet, on corporate intranets or extranets, or on other company networks. The replication and distribution of databases improves database performance at end-user worksites. 

To ensure that the distributive databases are up to date and current, there are two processes: replication and duplication. Replication involves using specialized software that looks for changes in the distributive database. Once the changes have been identified, the replication process makes all the databases look the same. The replication process can be very complex and time consuming depending on the size and number of the distributive databases. This process can also require a lot of time and computer resources. Duplication on the other hand is not as complicated. It basically identifies one database as a master and then duplicates that database. The duplication process is normally done at a set time after hours. This is to ensure that each distributed location has the same data. In the duplication process, changes to the master database only are allowed. This is to ensure that local data will not be overwritten. Both of the processes can keep the data current in all distributive locations.

Reference

Distributed Databases

Distributed Database System - DUET

Database Management Systems

Distributed Database Systems

Distributed Databases - Prentice Hall

Globus: A Metacomputing Infrastructure Toolkit

Emerging high-performance applications require the ability to exploit diverse, geographically distributed resources. These applications use high-speed networks to integrate supercomputers, large databases, archival storage devices, advanced visualization devices, and/or scientific instruments to form networked virtual supercomputers or metacomputers. While the physical infrastructure to build such systems is becoming widespread, the heterogeneous and dynamic nature of the metacomputing environment poses new challenges for developers of system software, parallel tools, and applications. In this article, we introduce Globus, a system that we are developing to address these challenges. The Globus system is intended to achieve a vertically integrated treatment of application, middleware, and network. A low-level toolkit provides basic mechanisms such as communication, authentication, network information, and data access. These mechanisms are used to construct various higher-level metacomp

Download

Project abstract - Freenet: A Distributed Anonymous Information Storage and Retrieval System

We describe Freenet, an adaptive peer-to-peer network application that permits the publication, replication, and retrieval of data while protecting the anonymity of both authors and readers. Freenet operates as a network of identical nodes that collectively pool their storage space to store data files and cooperate to route requests to the most likely physical location of data. No broadcast search or centralized location index is employed. Files are referred to in a location-independent manner, and are dynamically replicated in locations near requestors and deleted from locations where there is no interest. It is infeasible to discover the true origin or destination of a file passing through the network, and difficult for a node operator to determine or be held responsible for the actual physical contents of her own node.

Download

Project – Student management System in java

A student information system (SIS) is a software application for education establishments to manage student data. Student information systems for entering student testa school, college or university. Also known as student information management system (SIMS), student records system (SRS), student management system (SMS), campus management system (CMS) or school management system (SMS).

These systems vary in size, scope and capability, from packages that are implemented in relatively small organizations to cover student records alone, to enterprise-wide solutions that aim to cover most aspects of running large multi-campus organizations with significant local responsibility. Many systems can be scaled to different levels of functionality by purchasing add-on "modules" and can typically be configured by their home institutions to meet local needs.

Reference

Source http://lernjava.blogspot.in/2010/04/student-management-system-project-in.html

Second Open source program for reference http://sourceforge.net/p/freesms/code/76/tree/

 

 

Monday, August 15, 2011

122 Seminar & projects

Here are 122 seminar topics related to computer science, electronics and  electrical field along with power point presentation.

    1. Project Abstract - E-Learning
    2. Seminar on SMTP
    3. Seminar on Software as a service
    4. Project - Time Attendance
    5. Tabu Search Algorithm For Cluster Building In Wire...
    6. Seminar on Online identity management
    7. Seminar on Website Marketing
    8. Seminar on Personality development
    9. How to make a Presentation
    10. Seminar on Project management
    11. Seminar on leadership qualities
    12. Seminar on Linux Virtual File System
    13. Internet Marketing Strategy
    14. Seminar on Internet Marketing
    15. Seminar on Affiliate marketing
    16. Seminar on Search Engine Marketing
    17. Seminar on Time management
    18. Seminar on Java Security
    19. Web Services in Java
    20. Seminar on SDLC
    21. Seminar on fingerprint recognition
    22. Project Abstract - Hospital Management System
    23. Seminar on Android
    24. Seminar on Organizational information systems
    25. Project - Digital library
    26. Seminar on E-Business
    27. Seminar on Iris Scanning
    28. Grid network
    29. Earth Simulator
    30. M-Commerce
    31. Socket Programming
    32. video door phone
    33. CCTV System
    34. WI-MAX
    35. WISENET
    36. Optical fiber communication
    37. Lightweight Directory Access Protocol
    38. Kerberos
    39. Organic light emitting diode (OLED)
    40. Augmented Reality
    41. The Bionic Eye
    42. Optical Communications in Space
    43. 4G Wireless Systems
    44. Bittorrent
    45. Wireless USB
    46. Tripwire
    47. Data mining
    48. Interactive Voice Response
    49. Nessus
    50. Mobile Computing
    51. Holographic Versatile Disc
    52. Satellite radio
    53. Silverlight
    54. Bluetooth
    55. Wearable computers
    56. Cluster computing
    57. Quantum computer
    58. HVAC
    59. Mobile IP
    60. FireWire
    61. Home Networking
    62. Plasma display
    63. PLAN 9 Operating system
    64. Global Positioning System
    65. Spyware and Trojan horses
    66. Voice over Internet Protocol
    67. SSL-TLS
    68. PolyBot - Modular, self-reconfigurable robots
    69. Facial recognition system
    70. Captchas
    71. Ext3 File System
    72. Embedded Linux
    73. Computer forensics
    74. Security Protocol For Sensor Network
    75. Signal processing
    76. Seminar on Smoke detector
    77. Seminar on Motion detector
    78. Seminar on Transformer
    79. Seminar Test automation framework
    80. Seminar on Digital and analog signals
    81. Seminar on Programmable logic controller
    82. Seminar on LED
    83. Seminar on power systems automations
    84. Seminar on Flight Simulator
    85. Application Server
    86. Inventory Control System
    87. Seminar - Online Gaming
    88. Project – Online Survey System
    89. Project Abstract - Traffic Management System
    90. Seminar on IPTV
    91. Seminar on Smartphone
    92. Seminar on Real-Time Operating Systems
    93. Seminar on Agile Methodology
    94. Project on GPS Integrity Monitoring
    95. Seminar on Listening Skills
    96. Seminar on Communication Skills
    97. Seminar on Mobile commerce
    98. Project - Payroll Management System
    99. Seminar on SAP CRM
    100. Seminar on Sales Tracking
    101. Seminar on Marketing
    102. Seminar on Sap R/3 Architecture
    103. Seminar on Software Project Management
    104. Seminar on Motivation
    105. Seminar on CRM
    106. Enterprise resource planning
    107. Seminar on Cloud computing
    108. Project - 2D Sonar
    109. Project - 3D Pong
    110. Project on Laser Pointer Mouse
    111. Project on Fingerprint Verification System
    112. Project - Wireless Surveillance System
    113. Project - Instant messaging
    114. Seminar on Laser Communications
    115. Project - Online Examination System
    116. Nanotechnology
    117. Project on Library Management System
    118. Seminar on web application security
    119. .Net Framework Security
    120. Seminar on .NET framework
    121. Seminar on Artificial intelligence
    122. Seminar on Unlicenced Mobile Access

Incase, you have any suggestion or wants me to add any topic. Kindly post in the comment section.

Thanks!

Saturday, August 13, 2011

Seminar on LED

A light-emitting diode (LED) is a semiconductor light source. LEDs are used as indicator lamps in many devices and are increasingly used for other lighting. Introduced as a practical electronic component in 1962, early LEDs emitted low-intensity red light, but modern versions are available across the visible, ultraviolet and infrared wavelengths, with very high brightness.
When a light-emitting diode is forward biased (switched on), electrons are able to recombine with electron holes within the device, releasing energy in the form of photons. This effect is called electroluminescence and the color of the light (corresponding to the energy of the photon) is determined by the energy gap of the semiconductor. An LED is often small in area (less than 1 mm2), and integrated optical components may be used to shape its radiation pattern. LEDs present many advantages over incandescent light sources including lower energy consumption, longer lifetime, improved robustness, smaller size, faster switching, and greater durability and reliability. LEDs powerful enough for room lighting are relatively expensive and require more precise current and heat management than compact fluorescent lamp sources of comparable output.

                 
Light-emitting diodes are used in applications as diverse as replacements for aviation lighting, automotive lighting (particularly brake lamps, turn signals and indicators) as well as in traffic signals. The compact size, the possibility of narrow bandwidth, switching speed, and extreme reliability of LEDs has allowed new text and video displays and sensors to be developed, while their high switching rates are also useful in advanced communications technology. Infrared LEDs are also used in the remote control units of many commercial products including televisions, DVD players, and other domestic appliances.

Presentation

Flexible Organic LED's
LED Light Show Crititcal Design Review
The White LED
Presentation on LED BASED home lighting for rural – THRIVE
Light Emitting Diode (L.E.D.)
LED Measurement
Light Emitting Diodes (LED's)
Technorati Tags: ,

Saturday, August 6, 2011

Project – Online Survey System

LimeSurvey is a PHP survey software to create online surveys. Features open/closed surveys, branching, participant administration, quotas, WYSIWYG HTML editor, email invitations & reminders, assessments, basic statistics and more

Download the project

Monday, July 18, 2011

Enterprise resource planning

Enterprise resource planning (ERP) integrates internal and external management information across an entire organization, embracing finance/accounting, manufacturing, sales and service, customer relationship management, etc. ERP systems automate this activity with an integrated software application. Its purpose is to facilitate the flow of information between all business functions inside the boundaries of the organization and manage the connections to outside stakeholders.
ERP systems can run on a variety of hardware and network configurations, typically employing a database as a repository for information.


ERP systems typically include the following characteristics:

  • An integrated system that operates in real time (or next to real time), without relying on periodic updates.
  • A common database, which supports all applications.
  • A consistent look and feel throughout each module.
  • Installation of the system without elaborate application/data integration by the Information Technology (IT) department
    Power point presentation on ERP
ERP PPT - Free ERP Software Implementation Guide

 ERP Implementation Fundamentals

 ERP Centric Data Mining and KD

 ERP

 ERP Modules

 ERP and CRM

Sunday, July 17, 2011

Project on Laser Pointer Mouse

The purpose of this project is to design an implement a laser pointer mouse. When doing a PowerPoint presentation or using the computer for any other occasion for which it is inconvenient to be sitting in front of it, users would like a way to control the computer remotely. The laser pointer mouse allows lecturers and presenters to point at the screen, and, with the press of a button, move the mouse cursor to the location of the laser, without ever touching the computer or mouse. A few more buttons allow the user to perform wirelessly transmitted left, right, and double clicks. Support for drawing over the screen, e.g. arrows and circles for increased presentation effectiveness, will be implemented as time permits. The system will be implemented in Verilog, and realized on the FPGA on the 6.111 labkit.

  

Project Files

Presentation (PDF)

Report (PDF - 5.7 MB)

Report Appendix (PDF)

Saturday, July 16, 2011

Nanotechnology

Nanotechnology (sometimes shortened to "nanotech") is the study of manipulating matter on an atomic and molecular scale. Generally, nanotechnology deals with structures sized between 1 to 100 nano metre in at least one dimension, and involves developing materials or devices possessing at least one dimension within that size. Quantum mechanical effects are very important at this scale, which is in the quantum realm.
Nanotechnology is very diverse, ranging from extensions of conventional device physics to completely new approaches based upon molecular self-assembly, from developing new materials with dimensions on the nano scale to investigating whether we can directly control matter on the atomic scale.
There is much debate on the future implications of nanotechnology. Nanotechnology may be able to create many new materials and devices with a vast range of applications, such as in medicine, electronics, biomaterials and energy production. On the other hand, nanotechnology raises many of the same issues as any new technology, including concerns about the toxicity and environmental impact of nano materials, and their potential effects on global economics, as well as speculation about various doomsday scenarios. These concerns have led to a debate among advocacy groups and governments on whether special regulation of nanotechnology is warranted.

Power Point presentation on Nanotechnology
 Introduction to Nanotechnology
Economic Impacts of Nanotechnology
Oklahoma Nanotechnology Initiative
Nanotechnology Challenges and Fears
Nanotechnology
Challenges of Nanotechnology

Friday, July 1, 2011

Seminar on SDLC

The Systems Development Life Cycle (SDLC), or Software Development Life Cycle in systems engineering, information systems and software engineering, is the process of creating or altering systems, and the models and methodologies that people use to develop these systems. The concept generally refers to computer or information systems. Emphasis on this article (SLDC) is on man-made technological life-cycle. But there are many other life-cycle models to choose from. This includes ecological life cycles, for every life cycle, whether biological or technological, has a beginning and an end.

In software engineering the SDLC concept underpins many kinds of software development methodologies. These methodologies form the framework for planning and controlling the creation of an information system: the software development process.

 

Systems Development Life Cycle (SDLC) is a process used by a systems analyst to develop an information system, including requirements, validation, training, and user (stakeholder) ownership. Any SDLC should result in a high quality system that meets or exceeds customer expectations, reaches completion within time and cost estimates, works effectively and efficiently in the current and planned Information Technology infrastructure, and is inexpensive to maintain and cost-effective to enhance.

Computer systems are complex and often (especially with the recent rise of Service-Oriented Architecture) link multiple traditional systems potentially supplied by different software vendors. To manage this level of complexity, a number of SDLC models or methodologies have been created, such as "waterfall"; "spiral"; "Agile software development"; "rapid prototyping"; "incremental"; and "synchronize and stabilize"

Power point presentation on Systems Development Life Cycle

Seminar on fingerprint recognition

Fingerprint recognition or fingerprint authentication refers to the automated method of verifying a match between two human fingerprints. Fingerprints are one of many forms of biometrics used to identify individuals and verify their identity. This article touches on two major classes of algorithms (minutia and pattern) and four sensor designs (optical, ultrasonic, passive capacitance, and active capacitance).

A fingerprint sensor is an electronic device used to capture a digital image of the fingerprint pattern. The captured image is called a live scan. This live scan is digitally processed to create a biometric template (a collection of extracted features) which is stored and used for matching. This is an overview of some of the more commonly used fingerprint sensor technologies.

                     

Optical fingerprint imaging involves capturing a digital image of the print using visible light. This type of sensor is, in essence, a specialized digital camera. The top layer of the sensor, where the finger is placed, is known as the touch surface. Beneath this layer is a light-emitting phosphor layer which illuminates the surface of the finger. The light reflected from the finger passes through the phosphor layer to an array of solid state pixels (a charge-coupled device) which captures a visual image of the fingerprint. A scratched or dirty touch surface can cause a bad image of the fingerprint. A disadvantage of this type of sensor is the fact that the imaging capabilities are affected by the quality of skin on the finger. For instance, a dirty or marked finger is difficult to image properly. Also, it is possible for an individual to erode the outer layer of skin on the fingertips to the point where the fingerprint is no longer visible. It can also be easily fooled by an image of a fingerprint if not coupled with a "live finger" detector. However, unlike capacitive sensors, this sensor technology is not susceptible to electrostatic discharge damage.

Power point Presentation on Fingerprint recognition

Thursday, June 30, 2011

Project Abstract - E-Learning

E-learning comprises all forms of electronically supported learning and teaching. The information and communication systems, whether networked learning or not, serve as specific media to implement the learning process.[1] The term will still most likely be utilized to reference out-of-classroom and in-classroom educational experiences via technology, even as advances continue in regard to devices and curriculum.

              

E-learning is essentially the computer and network-enabled transfer of skills and knowledge. E-learning applications and processes include Web-based learning, computer-based learning, virtual education opportunities and digital collaboration. Content is delivered via the Internet, intranet/extranet, audio or video tape, satellite TV, and CD-ROM. It can be self-paced or instructor-led and includes media in the form of text, image, animation, streaming video and audio.

Abbreviations like CBT (Computer-Based Training), IBT (Internet-Based Training) or WBT (Web-Based Training) have been used as synonyms to e-learning. Today one can still find these terms being used, along with variations of e-learning such as elearning, Elearning, and eLearning. The terms will be utilized throughout this article to indicate their validity under the broader terminology of E-learning.

Power point presentation on E-Learning

Tuesday, June 28, 2011

Seminar on SMTP

Simple Mail Transfer Protocol (SMTP) is an Internet standard for electronic mail (e-mail) transmission across Internet Protocol (IP) networks. SMTP was first defined by RFC 821 (1982, eventually declared STD 10), and last updated by RFC 5321 (2008)[2] which includes the extended SMTP (ESMTP) additions, and is the protocol in widespread use today. SMTP is specified for outgoing mail transport and uses TCP port 25. The protocol for new submissions is effectively the same as SMTP, but it uses port 587 instead. SMTP connections secured by SSL are known by the shorthand SMTPS, though SMTPS is not a protocol in its own right.

 

While electronic mail servers and other mail transfer agents use SMTP to send and receive mail messages, user-level client mail applications typically only use SMTP for sending messages to a mail server for relaying. For receiving messages, client applications usually use either the Post Office Protocol (POP) or the Internet Message Access Protocol (IMAP) or a proprietary system (such as Microsoft Exchange or Lotus Notes/Domino) to access their mail box accounts on a mail server.

 

Power point presentation on SMTP

Sunday, June 26, 2011

Project - Human Resource Management Systems

A Human Resource Management System (HRMS) or Human Resource Information System (HRIS), refers to the systems and processes at the intersection between human resource management (HRM) and information technology. It merges HRM as a discipline and in particular its basic HR activities and processes with the information technology field, whereas the programming of data processing systems evolved into standardized routines and packages of enterprise resource planning (ERP) software. On the whole, these ERP systems have their origin on software that integrates information from different applications into one universal database. The linkage of its financial and human resource modules through one database is the most important distinction to the individually and proprietary developed predecessors, which makes this software application both rigid and flexible.

            

Power point Presentation on the topic Human Resource Management System

Ebook - Linux Kernel Development

Linux Kernel Development details the design and implementation of the Linux kernel, presenting the content in a manner that is beneficial to those who wish to write and develop kernel code. This book is for anyone who wants a fun, practical approach to the Linux kernel.

The author, a core kernel developer, shares valuable knowledge and experience on the very latest Linux kernel.

 

      

 

The book discusses the major subsystems and features of the Linux kernel, including their design and implementation, their purpose and goals, and their interfaces. Specific topics covered include: process management, scheduling, time management and timers, system call interface, memory addressing and management, caching layers, VFS, kernel synchronization, debugging, and the kernel community.

The book covers the new 2.6 Linux kernel, and includes numerous sections on its new features, such as the new O(1) scheduler, the new I/O schedulers, the new block layer, and kernel preemption.

This book is an authoritative, practical guide that helps programmers better understand the Linux kernel, and to write and develop kernel code.

 

Download Ebook

Linux Kernel Development
Linux Kernel Development

Project Abstract - Combinatorial Approach For Preventing Sql Injection Attacks

A combinatorial approach for protecting Web applications against SQL injection is discussed in this paper, which is a novel idea of incorporating the uniqueness of Signature based method and auditing method. The major issue of web application security is the SQL Injection, which can give the attackers unrestricted access to the database that underlie Web applications and has become increasingly frequent and serious. From signature based method standpoint of view, it presents a detection mode for SQL injection using pair wise sequence alignment of amino acid code formulated from web application form parameter sent via web server.

 

                  

 

On the other hand from the Auditing based method standpoint of view, it analyzes the transaction to find out the malicious access. In signature based method It uses an approach called Hirschberg algorithm, it is a divide and conquer approach to reduce the time and space complexity. This system was able to stop all of the successful attacks and did not generate any false positives.

Tabu Search Algorithm For Cluster Building In Wireless Sensor Networks – Project Abtracts

The main challenge in wireless sensor network deployment pertains to optimizing energy consumption when collecting data from sensor nodes. This paper proposes a new centralized clustering method for a data collection mechanism in wireless sensor networks, which is based on network energy maps and Quality-of-Service (QoS) requirements. The clustering problem is modeled as a hypergraph partitioning and its resolution is based on a tabu search heuristic.

 

 

Our approach defines moves using largest size cliques in a feasibility cluster graph. Compared to other methods (CPLEX-based method, distributed method, simulated annealing-based method), the results show that our tabu search-based approach returns high-quality solutions in terms of cluster cost and execution time. As a result, this approach is suitable for handling network extensibility in a satisfactory manner.

Wednesday, May 18, 2011

Seminar on Organizational information systems

Information Systems (IS) is an academic/professional discipline bridging the business field and the well-defined computer science field that is evolving toward a new scientific area of study.An information systems discipline therefore is supported by the theoretical foundations of information and computations such that learned scholars have unique opportunities to explore the academics of various business models as well as related algorithmic processes within a computer science discipline. Typically, information systems or the more common legacy information systems include people, procedures, data, software, and hardware (by degree) that are used to gather and analyze digital information. Specifically computer-based information systems are complementary networks of hardware/software that people and organizations use to collect, filter, process, create, & distribute data (computing). Computer Information System(s) (CIS) is often a track within the computer science field studying computers and algorithmic processes, including their principles, their software & hardware designs, their applications, and their impact on society. Overall, an IS discipline emphasizes functionality over design.

                   

 

As illustrated by the pradeep sagar in 1991 on the right, the history of information systems coincides with the history of computer science that began long before the modern discipline of computer science emerged in the twentieth century. Regarding the circulation of information and ideas, numerous legacy information systems still exist today that are continuously updated to promote ethnographic approaches, to ensure data integrity, and to improve the social effectiveness & efficiency of the whole process. In general, information systems are focused upon processing information within organizations, especially within business enterprises, and sharing the benefits with modern society

Power point presentation on Organizational information systems

Wednesday, May 11, 2011

Project - Digital library

A digital library is a library in which collections are stored in digital formats (as opposed to print, microform, or other media) and accessible by computers.[1] The digital content may be stored locally, or accessed remotely via computer networks. A digital library is a type of information retrieval system.

In the context of the DELOS, a Network of Excellence on Digital Libraries, and DL.org, a Coordination Action on Digital Library Interoperability, Best Practices and Modelling Foundations, Digital Library researchers and practitioners produced a Digital Library Reference Model  which defines a digital library as:

    A potentially virtual organisation, that comprehensively collects, manages and preserves for the long depth of time rich digital content, and offers to its targeted user communities specialised functionality on that content, of defined quality and according to comprehensive codified policies.

 

Actually, this document contains a Digital Library Manifesto which introduces the three types of relevant ‘systems’, i.e. Digital Library, Digital Library System, and Digital Library Management System. It describes the main concepts characterising these systems, i.e., organisation, content, user, functionality, quality, policy and architecture. It introduces the main roles that actors may play within digital libraries, i.e., end-user, manager and software developer. Finally, it describes the reference frameworks needed to clarify the DL universe at different levels of abstraction, i.e., the Digital Library Reference Model and the Digital Library Reference Architecture.

Power point presentation on digital library