Showing posts with label seminar topics. Show all posts
Showing posts with label seminar topics. Show all posts

Sunday, September 23, 2012

Seminar on Distributed Database Systems

A distributed database is a database in which storage devices are not all attached to a common processing unit such as the CPU. It may be stored in multiple computers located in the same physical location, or may be dispersed over a network of interconnected computers. Unlike parallel systems, in which the processors are tightly coupled and constitute a single database system, a distributed database system consists of loosely coupled sites that share no physical components.

Collections of data (e.g. in a database) can be distributed across multiple physical locations. A distributed database can reside on network servers on the Internet, on corporate intranets or extranets, or on other company networks. The replication and distribution of databases improves database performance at end-user worksites. 

To ensure that the distributive databases are up to date and current, there are two processes: replication and duplication. Replication involves using specialized software that looks for changes in the distributive database. Once the changes have been identified, the replication process makes all the databases look the same. The replication process can be very complex and time consuming depending on the size and number of the distributive databases. This process can also require a lot of time and computer resources. Duplication on the other hand is not as complicated. It basically identifies one database as a master and then duplicates that database. The duplication process is normally done at a set time after hours. This is to ensure that each distributed location has the same data. In the duplication process, changes to the master database only are allowed. This is to ensure that local data will not be overwritten. Both of the processes can keep the data current in all distributive locations.

Reference

Distributed Databases

Distributed Database System - DUET

Database Management Systems

Distributed Database Systems

Distributed Databases - Prentice Hall

Globus: A Metacomputing Infrastructure Toolkit

Emerging high-performance applications require the ability to exploit diverse, geographically distributed resources. These applications use high-speed networks to integrate supercomputers, large databases, archival storage devices, advanced visualization devices, and/or scientific instruments to form networked virtual supercomputers or metacomputers. While the physical infrastructure to build such systems is becoming widespread, the heterogeneous and dynamic nature of the metacomputing environment poses new challenges for developers of system software, parallel tools, and applications. In this article, we introduce Globus, a system that we are developing to address these challenges. The Globus system is intended to achieve a vertically integrated treatment of application, middleware, and network. A low-level toolkit provides basic mechanisms such as communication, authentication, network information, and data access. These mechanisms are used to construct various higher-level metacomp

Download

Fisherfaces: Recognition Using Class Specific Linear Projection

We develop a face recognition algorithm which is insensitive to gross variation in lighting direction and facial expression. Taking a pattern classification approach, we consider each pixel in an image as a coordinate in a high-dimensional space. We take advantage of the observation that the images of a particular face, under varying illumination but fixed pose, lie in a 3-D linear subspace of the high dimensional image space -- if the face is a Lambertian surface without shadowing. However, since faces are not truly Lambertian surfaces and do indeed produce self-shadowing, images will deviate from this linear subspace. Rather than explicitly modeling this deviation, we linearly project the image into a subspace in a manner which discounts those regions of the face with large deviation. Our projection method is based on Fisher's Linear Discriminant and produces well separated classes in a low-dimensional subspace even under severe variation in lighting and facial expressions.

Download

Saturday, August 13, 2011

Seminar Test automation framework

A test automation framework is a set of assumptions, concepts and tools that provide support for automated software testing. The main advantage of such a framework is the low cost for maintenance. If there is change to any test case then only the test case file needs to be updated and the Driver Script and Startup script will remain the same. Ideally, there is no need to update the scripts in case of changes to the application.
Choosing the right framework/scripting technique helps in maintaining lower costs. The costs associated with test scripting are due to development and maintenance efforts. The approach of scripting used during test automation has effect on costs.


Various framework/scripting techniques are generally used:

*Linear (procedural code, possibly generated by tools like those that use record and playback)
*Structured (uses control structures - typically ‘if-     else’, ‘switch’, ‘for’, ‘while’ conditions/ statements)
*Data-driven (data is persisted outside of tests in a database, spreadsheet, or other mechanism)
*Keyword-driven
*Hybrid (two or more of the patterns above are used)

Presentation

CTA Test Automation Framework.ppt

Understanding of Automation Framework - Software Testing Genius

Software Testing Automation Framework (STAF) -

Software Testing Automation Framework (STAF)
Building an Automation Framework around Open Source
Test Automation

Seminar on power systems automations

Power system automation is the act of automatically controlling the power system via instrumentation and control devices. Substation automation refers to using data from Intelligent electronic devices (IED), control and automation capabilities within the substation, and control commands from remote users to control power system devices.
Since full substation automation relies on substation integration, the terms are often used interchangeably. Power system automation includes processes associated with generation and delivery of power.

Monitoring and control of power delivery systems in the substation and on the pole top reduce the occurrence of outages and shorten the duration of outages that do occur. The IEDs, communications protocols, and communications methods, work together as a system to perform power system automation. The term “power system” describes the collection of devices that make up the physical systems that generate, transmit, and distribute power. The term “instrumentation and control (I&C) system” refers to the collection of devices that monitor, control, and protect the power system.

Presentation

power_system_automation
GE Power Automation System - GEDigitalenergy.eu
Power Systems Modeling and Stability Analysis
Power System Protection and Automation in GECOL
Distribution Automation Systems with Advanced Features

Sunday, August 7, 2011

Inventory Control System

An inventory control system is a process for managing and locating objects or materials. In common usage, the term may also refer to just the software components.
Modern inventory control systems often rely upon barcodes and RFID tags to provide automatic identification of inventory objects. In an academic study performed at Wal-Mart, RFID reduced Out of Stocks by 30 percent for products selling between 0.1 and 15 units a day. Inventory objects could include any kind of physical asset: merchandise, consumables, fixed assets, circulating tools, library books, or capital equipment. To record an inventory transaction, the system uses a barcode scanner or RFID reader to automatically identify the inventory object, and then collects additional information from the operators via fixed terminals (workstations), or mobile computers.


An inventory control system may be used to automate a sales order fulfillment process. Such a system contains a list of order to be filled, and then prompts workers to pick the necessary items, and provides them with packaging and shipping information.
An inventory system also manages in and outwards material of hardware.
Real-time inventory control systems may use wireless, mobile terminals to record inventory transactions at the moment they occur. A wireless LAN transmits the transaction information to a central database.

PowerPoint Presentation on inventory control system

Inventory Management I
Inventory Management 2
Inventory Management 3
Inventory Systems for Independent Demand
DISTRIBUTION INVENTORY SYSTEMS
Inventory control model

Seminar - Online Gaming

An online game is a game played over some form of computer network. This almost always means the Internet or equivalent technology, but games have always used whatever technology was current: modems before the Internet, and hard wired terminals before modems. The expansion of online gaming has reflected the overall expansion of computer networks from small local networks to the Internet and the growth of Internet access itself. Online games can range from simple text based games to games incorporating complex graphics and virtual worlds populated by many players simultaneously. Many online games have associated online communities, making online games a form of social activity beyond single player games.


The rising popularity of Flash and Java led to an Internet revolution where websites could utilize streaming video, audio, and a whole new set of user interactivity. When Microsoft began packaging Flash as a pre-installed component of IE, the Internet began to shift from a data/information spectrum to also offer on-demand entertainment. This revolution paved the way for sites to offer games to web surfers. Some online multiplayer games like World of Warcraft, Final Fantasy XI and Lineage II charge a monthly fee to subscribe to their services, while games such as Guild Wars offer an alternative no monthly fee scheme. Many other sites relied on advertising revenues from on-site sponsors, while others, like RuneScape, or Tibia let people play for free while leaving the players the option of paying, unlocking new content for the members.

PowerPoint presentation on  Online gaming

Online Gaming

Online Gaming 2

Teens and Gaming

Online Gaming 3
Online Games 4
Measuring Online Game Application in GPRS and UMTS

Friday, August 5, 2011

Seminar on IPTV

Internet Protocol television (IPTV) is a system through which Internet television services are delivered using the architecture and networking methods of the Internet Protocol Suite over a packet-switched network infrastructure (such as the Internet or other access network), instead of being delivered through traditional radio frequency broadcast, satellite signal, and cable television (CATV) formats.
IPTV services may be classified into three main groups:
live television, with or without interactivity related to the current TV show;


time-shifted television: catch-up TV (replays a TV show that was broadcast hours or days ago), start-over TV (replays the current TV show from its beginning)
video on demand (VOD): browse a catalog of videos, not related to TV programming.
IPTV is distinguished from general Internet-based or web-based multimedia services by its on-going standardization process (e.g., European Telecommunications Standards Institute) and preferential deployment scenarios in subscriber-based telecommunications networks with high-speed access channels into end-user premises via set-top boxes or other customer-premises equipment.

Powerpoint presentation on IPTV

Iptv.Ppt
IPTV Industry Potential and Limitations - Gerson Lehrman Group
Presentation on IPTV and Mobile TV
Social IPTV Platform for Internal Collaboration

Tuesday, July 26, 2011

Seminar on Smartphone

A smartphone is a high-end mobile phone that offers more advanced computing ability and connectivity than a contemporary feature phone (i.e. a modern low-end phone). A smartphone combines the functions of a personal digital assistant (PDA) and a mobile phone. Today's models typically also serve as portable media players and camera phones with high-resolution touchscreen, GPS navigation, Wi-Fi and mobile broadband access.
A smartphone runs a complete mobile operating system. Widespread examples are Apple iOS, Google Android, Microsoft Windows Phone 7, Nokia Symbian, Research In Motion BlackBerry OS, and embedded Linux distributions such as Maemo and MeeGo. Such systems can be installed on many different phone models. They can run third-party applications, using an application programming interface (API).
According to an Olswang report in early 2011, the rate of smartphone adoption is accelerating: as of March 2011 22% of UK consumers had a smartphone, with this percentage rising to 31% amongst 24–35 year olds. Growth in demand for advanced mobile devices boasting powerful processors and graphics processing units, abundant memory (FLASH memory), high-resolution screens with multi-touch capability, and open operating systems has outpaced the rest of the mobile phone market for several years. According to an early 2010 study by ComScore, over 45.5 million people in the United States owned smartphones out of 234 million total subscribers. Despite the large increase in smartphone sales in the last few years, smartphone shipments only make up 20% of total handset shipments, as of the first half of 2010. In March 2011 Berg Insight reported data that showed global smartphone shipments increased 74% from 2009 to 2010.

                  

Power point presentation on Smartphone

Smartphones at Rice University
SmartPhone Attacks and Defenses
Smart-phones
Smartphones in Ophthalmology
Understanding Win32 Support in Pocket PC and Smartphone
SmartPhone Thesis A Seminar - cse

Seminar on Agile Methodology

Agile Software Development is a group of software development methodologies based on iterative and incremental development, where requirements and solutions evolve through collaboration between self-organizing, cross-functional teams. The Agile Manifesto introduced the term in 2001.

       

Incremental software development methods have been traced back to 1957. In 1974, a paper by E. A. Edmonds introduced an adaptive software development process.
So-called lightweight software development methods evolved in the mid-1990s as a reaction against heavyweight methods, which were characterized by their critics as a heavily regulated, regimented, micromanaged, waterfall model of development. Proponents of lightweight methods (and now agile methods) contend that they are a return to development practices from early in the history of software development.
Early implementations of lightweight methods include Scrum (1995), Crystal Clear, Extreme Programming (1996), Adaptive Software Development, Feature Driven Development, and Dynamic Systems Development Method (DSDM) (1995). These are now typically referred to as agile methodologies, after the Agile Manifesto published in 2001.

Power point presentation on Agile Software Development

SCRUM – an agile software development methodology
Agile Development Methodology
Agile Software Development
eXtreme Programming and Agile Concepts
Agile Software Engineering
Agile Methods A Practical Perspective

Saturday, July 23, 2011

Seminar on Listening Skills

Listening skill is a communication technique that requires the listener to understand, interpret, and evaluate what (s)he hears. The ability to listen actively can improve personal relationships through reducing conflicts, strengthening cooperation, and fostering understanding.

When interacting, people often are not listening attentively. They may be distracted, thinking about other things, or thinking about what they are going to say next (the latter case is particularly true in conflict situations or disagreements). Active listening is a structured way of listening and responding to others, focusing attention on the speaker. Suspending one's own frame of reference, suspending judgment and avoiding other internal mental activities are important to fully attend to the speaker.

Comprehension is "shared meaning between parties in a communication transaction". This is the first step in the listening process. The first challenge for the listener is accurately identifying speech sounds and understanding and synthesizing these sounds as words. We are constantly bombarded with auditory stimuli, so the listener has to select which of those stimuli are speech sounds and choose to pay attention to the appropriate sounds (attending). The second challenge is being able to discern breaks between discernable words, or speech segmentation. This becomes significantly more difficult with an unfamiliar language because the speech sounds blend together into a continuous cluster. Determining the context and meanings of each word is essential to comprehending a sentence.

Power point presentation on Listening Skills

LISTENING SKILLS Prof.Meenakshi Gupta Dept of Humanities & Social
Improving Your Listening Skills idXready Sample PowerPoint
Listening Skills
Developing Good Listening Skills
Teaching Listening Skills
Listening Skills - PowerPoint – Itslife
How to Improve Listening Skills

Wednesday, July 20, 2011

Seminar on Motivation

Motivation is the driving force by which humans achieve their goals. Motivation is said to be intrinsic or extrinsic. The term is generally used for humans but it can also be used to describe the causes for animal behavior as well. This article refers to human motivation. According to various theories, motivation may be rooted in a basic need to minimize physical pain and maximize pleasure, or it may include specific needs such as eating and resting, or a desired object, goal, state of being, ideal, or it may be attributed to less-apparent reasons such as altruism, selfishness, morality, or avoiding mortality. Conceptually, motivation should not be confused with either volition or optimism. Motivation is related to, but distinct from, emotion.

 

Power point presentation on Motivation

Motivation & Emotion
Motivation - Careervarsity.com
Motivation
Motivation 2
Work Motivation
Motivation PowerPoint

Sunday, July 17, 2011

Seminar on Cloud computing

Cloud computing means using multiple server computers via a digital network, as though they were one computer. Often, the services available are considered part of cloud computing.
Traditionally, without a cloud, a web server runs as a single computer or a group of privately owned computers. The computer(s) are powerful enough to serve a given amount of requests per minute and can do so with a certain amount of latency per request. If the computer's website or web application suddenly becomes more popular, and the amount of requests are far more than the web server can handle, the response time of the requested pages will be increased due to overloading. On the other hand, in times of low load much of the capacity will go unused.
If the website, service, or web application is hosted in a cloud, however, additional processing and compute power is available from the cloud provider. The website would share those servers with perhaps thousands of other websites varying size and memory. If the website suddenly becomes more popular, the cloud can automatically direct more individual computers to work to serve pages for the site, and more money is paid for the extra usage. If it becomes unpopular, however, the amount of money due will be less. Cloud computing is popular for its pay-as-you-go pricing model.

Cloud computing visual diagram
Clouds are sometimes set up within large corporations, or other institutions, so that many users all share the same server power. As computer power gets cheaper, many different applications are provided and managed by the cloud server. In many cases, users might not download and install applications on their own device or computer; all processing and storage is maintained by the cloud server.

Power point presentation on Cloud computing

Cloud computing
Security Issue in cloud Computing
Cloud Computing
Service Oriented Cloud Computing Infrastructure

Cloud Computing 2

Cloud Computing 3

Cloud computing: A mainframe strategy overview

Seminar on Laser Communications

Optical communications, in various forms, have been used for thousands of years. The Ancient Greeks polished their shields to send signals during battle. In the modern era, semaphores and wireless solar telegraphs called heliographs were developed, using coded signals to communicate with their recipients.
In 1880 Alexander Graham Bell and his assistant Charles Sumner Tainter created the Photo phone, at Bell's newly established Volta Laboratory in Washington, DC. Bell considered it his most important invention. The device allowed for the transmission of sound on a beam of light. On June 3, 1880, Bell conducted the world's first wireless telephone transmission between two buildings, some 213 meters apart. Its first practical use came in military communication systems many decades later.
Carl Zeiss Jena developed the Licht sprechgerät 80 (direct translation: light speaking device) that the German army used in their World War II anti-aircraft defense units.

The invention of lasers in the 1960s revolutionized free space optics. Military organizations were particularly interested and boosted their development. However the technology lost market momentum when the installation of optical fiber networks for civilian uses was at its peak. Many simple and inexpensive consumer remote controls use low-speed communication using infrared (IR) light. This known as consumer IR technologies.

Power point presentation on laser communications

Laser Communications
Free Space Laser Communications
Laser Communication 2
Laser Communication 3
Free-Space Optical Communications for Tactical Applications
The Future of Satellite Communications
Semiconductor Sources for Optical Communications

Saturday, July 16, 2011

Project - Online Examination System

Online Examination System (OES) is a MCQ(Multiple Choice Questions) based Examination system, which is built using PHP and MySQL. OES provides an easy-to-use environment for preparing questions, conducting exams and managing results

 

 

Here is a working Online Examination system

It can be downloaded from here

http://sourceforge.net/projects/oes/files/OES-without-Installer-v.1.1.zip/download

Power point presentation on Online Examination system

Online Examination System
Online Examination Using Farming Based System
Online Exam/Paper Management System
ONLINE EXAMINATION

Nanotechnology

Nanotechnology (sometimes shortened to "nanotech") is the study of manipulating matter on an atomic and molecular scale. Generally, nanotechnology deals with structures sized between 1 to 100 nano metre in at least one dimension, and involves developing materials or devices possessing at least one dimension within that size. Quantum mechanical effects are very important at this scale, which is in the quantum realm.
Nanotechnology is very diverse, ranging from extensions of conventional device physics to completely new approaches based upon molecular self-assembly, from developing new materials with dimensions on the nano scale to investigating whether we can directly control matter on the atomic scale.
There is much debate on the future implications of nanotechnology. Nanotechnology may be able to create many new materials and devices with a vast range of applications, such as in medicine, electronics, biomaterials and energy production. On the other hand, nanotechnology raises many of the same issues as any new technology, including concerns about the toxicity and environmental impact of nano materials, and their potential effects on global economics, as well as speculation about various doomsday scenarios. These concerns have led to a debate among advocacy groups and governments on whether special regulation of nanotechnology is warranted.

Power Point presentation on Nanotechnology
 Introduction to Nanotechnology
Economic Impacts of Nanotechnology
Oklahoma Nanotechnology Initiative
Nanotechnology Challenges and Fears
Nanotechnology
Challenges of Nanotechnology

Project on Library Management System

An integrated library system (ILS), also known as a library management system (LMS), is an enterprise resource planning system for a library, used to track items owned, orders made, bills paid, and patrons who have borrowed.

An ILS usually comprises a relational database, software to interact with that database, and two graphical user interfaces (one for patrons, one for staff). Most ILSes separate software functions into discrete programs called modules, each of them integrated with a unified interface. Examples of modules might include:

acquisitions (ordering, receiving, and invoicing materials)
    cataloging (classifying and indexing materials)
    circulation (lending materials to patrons and receiving them back)
    serials (tracking magazine and newspaper holdings)
    the OPAC (public interface for users)

 

    

Each patron and item has a unique ID in the database that allows the ILS to track its activity.

Larger libraries use an ILS to order and acquire, receive and invoice, catalog, circulate, track and shelve materials. Smaller libraries, such as those in private homes or non-profit organizations (like churches or synagogues, for instance), often forgo the expense and maintenance required to run an ILS, and instead use a library computer system.

Power point presentation on Library Management System

Library Management System
LIBRARY MANAGEMENT SYSTEM 2
RFID BASED LIBRARY MANAGEMENT SYSTEM
School library management system
Introduction to Open Source Library Management Systems
Mobile Library Management System
Online Library Management System

Seminar on web application security

A web application security scanner is program which communicates with a web application through the web front-end in order to identify potential security vulnerabilities in the web application and architectural weaknesses. It performs a black-box test. Unlike source code scanners, web application scanners don't have access to the source code and therefore detect vulnerabilities by actually performing attacks.

                                                                                                                    

A web application security scanner can facilitate the automated review of a web application with the expressed purpose of discovering security vulnerabilities, and are required to comply with various regulatory requirements. Web application scanners can look for a wide variety of vulnerabilities, including:

  • Input/Output validation: (Cross-site scripting, SQL Injection, etc.)
  • Specific application problems
  • Server configuration mistakes/errors/version

Power point presentation on web application security

Web application security
Web Application Security 1
Web Application Security - Black Hat
Introduction to Web Application Security and App
E-security solutions: Web Applications Security and challenges
Web Application Security 2
Building a Robust Web Application Security Plan
Web Application Security Whitepaper

Tuesday, July 5, 2011

.Net Framework Security

.NET has its own security mechanism with two general features: Code Access Security (CAS), and validation and verification. Code Access Security is based on evidence that is associated with a specific assembly. Typically the evidence is the source of the assembly (whether it is installed on the local machine or has been downloaded from the intranet or Internet). Code Access Security uses evidence to determine the permissions granted to the code. Other code can demand that calling code is granted a specified permission. The demand causes the CLR to perform a call stack walk: every assembly of each method in the call stack is checked for the required permission; if any assembly is not granted the permission a security exception is thrown. however, has to split the application into subdomains; it is not done by the CLR.

            

Code Access Security (CAS), in the Microsoft .NET framework, is Microsoft's solution to prevent untrusted code from performing privileged actions. When the CLR loads an assembly it will obtain evidence for the assembly and use this to identify the code group that the assembly belongs to. A code group contains a permission set (one or more permissions). Code that performs a privileged action will perform a code access demand which will cause the CLR to walk up the call stack and examine the permission set granted to the assembly of each method in the call stack. The code groups and permission sets are determined by the administrator of the machine who defines the security policy.

Power point Presentation on .net Framework Security

 

Monday, July 4, 2011

Seminar on .NET framework

The .NET Framework (pronounced dot net) is a software framework that runs primarily on Microsoft Windows. It includes a large library and supports several programming languages which allows language interoperability (each language can use code written in other languages). The .NET library is available to all the programming languages that .NET supports. Programs written for the .NET Framework execute in a software environment (as contrasted to hardware environment), known as the Common Language Runtime (CLR), an application virtual machine that provides important services such as security, memory management, and exception handling. The class library and the CLR together constitute the .NET Framework.

              

The .NET Framework's Base Class Library provides user interface, data access, database connectivity, cryptography, web application development, numeric algorithms, and network communications. Programmers produce software by combining their own source code with the .NET Framework and other libraries. The .NET Framework is intended to be used by most new applications created for the Windows platform. Microsoft also produces a popular integrated development environment largely for .NET software called Visual Studio.

 

Power point presentation on .NET Framework