Facebook Twitter Delicious Stumble Upon
0 comments

Code division multiple access (CDMA)

ABSTRACT


Code division multiple access (CDMA) is a channel access method used by various radio communication technologies. It should not be confused with the mobile phone standards called cdmaOne and CDMA2000 (which are often referred to as simply CDMA), which use CDMA as an underlying channel access method.

One of the basic concepts in data communication is the idea of allowing several transmitters to send information simultaneously over a single communication channel. This allows several users to share a band of frequencies (see bandwidth). This concept is called multiple access. CDMA employs spread-spectrum technology and a special coding scheme (where each transmitter is assigned a code) to allow multiple users to be multiplexed over the same physical channel. By contrast, time division multiple access (TDMA) divides access by time, while frequency-division multiple access (FDMA) divides it by frequency. CDMA is a form of spread-spectrum signalling, since the modulated coded signal has a much higher data bandwidth than the data being communicated.

An analogy to the problem of multiple access is a room (channel) in which people wish to talk to each other simultaneously. To avoid confusion, people could take turns speaking (time division), speak at different pitches (frequency division), or speak in different languages (code division). CDMA is analogous to the last example where people speaking the same language can understand each other, but other languages are perceived as noise and rejected. Similarly, in radio CDMA, each group of users is given a shared code. Many codes occupy the same channel, but only users associated with a particular code can communicate.
0 comments

BitTorrent is a peer-to-peer file sharing protocol free seminar topic



Abstract


BitTorrent is a peer-to-peer file sharing protocol used for distributing large amounts of data.[vague] BitTorrent is one of the most common protocols for transferring large files, and it has been estimated that it accounted for roughly 27% to 55% of all Internet traffic (depending on geographical location) as of February 2009.


Programmer Bram Cohen designed the protocol in April 2001 and released a first implementation on July 2, 2001.It is now maintained by Cohen's company BitTorrent, Inc. There are numerous BitTorrent clients available for a variety of computing platforms.





computer science, computer science seminar topics, computer seminar topics, network control systems, ieee seminar topics, it seminar topics, computer science, seminar title, seminar, seminar topics,
0 comments

Beowulf (computing) free seminar topic | seminar title




Abstract

A Beowulf cluster is a computer cluster of what are normally identical, commercially available computers, which are running a free and open source software (FOSS), Unix-like operating system, such as BSD, Linux, or Solaris. They are networked into a small TCP/IP LAN, and have libraries and programs installed which allow processing to be shared among them. Originally referring to a specific computer built in 1994 by Thomas Sterling and Donald Becker at NASA, Beowulf systems similar to the original NASA system are now deployed worldwide, chiefly in support of scientific computing. They are high-performance parallel computing clusters of inexpensive personal computer hardware. The name comes from the main character in the Old English poem Beowulf, which was bestowed by Sterling because the epic poem describes Beowulf as having "thirty mens' heft of grasp in the grip of his hand."
There is no particular piece of software that defines a cluster as a Beowulf. Commonly used parallel processing libraries include Message Passing Interface (MPI) and Parallel Virtual Machine (PVM). Both of these permit the programmer to divide a task among a group of networked computers, and collect the results of processing. Examples of MPI software include OpenMPI (OpenMPI) or MPICH (MPICH). There are additional MPI implementations available



computer science, computer science seminar topics, computer seminar topics, network control systems, ieee seminar topics, it seminar topics, computer science, seminar title, seminar, seminar topics,

0 comments

Asynchronous on-chip networks Free seminar topic | seminar title




Abstract

Various kinds of asynchronous interconnect and synchronisation mechanisms are being proposed for designing low power, low emission and high-speed SOCs. They facilitate modular design and possess greater resilience to fabrication time inter-chip and run-time intra-chip process variability. They can provide a solution for low power consumption in chips and simplify global timing assumptions, e.g. on clock skew, by having asynchronous communication between modules. A few methodologies, including globally asynchronous, locally synchronous and desynchronisation, aim at leveraging the benefits of both synchronous and asynchronous design paradigms. The authors survey various methodologies used for leveraging asynchronous on-chip communication. They investigate various GALS based implementations, desynchronisation strategies and asynchronous network-on-chip (NoC) designs






computer science, computer science seminar topics, computer seminar topics, network control systems, ieee seminar topics, it seminar topics, computer science, seminar title, seminar, seminar topics,
0 comments

Applications of artificial intelligence FRee seminar topics | seminar tiltle




Abstract

Artificial intelligence has been used in a wide range of fields including medical diagnosis, stock trading, robot control, law, scientific discovery and toys. However, many AI applications are not perceived as AI: "A lot of cutting edge AI has filtered into general applications, often without being called AI because once something becomes useful enough and common enough it's not labeled AI anymore. "Many thousands of AI applications are deeply embedded in the infrastructure of every industry."In the late 90s and early 21st century, AI technology became widely used as elements of larger systems, but the field is rarely credited for these successes.






computer science, computer science seminar topics, computer seminar topics, network control systems, ieee seminar topics, it seminar topics, computer science, seminar title, seminar, seminar topics,
0 comments

Application of delay tolerant networking (DTN) in Airborne Networks : free seminar topics



Abstract

As airborne networks (ANs) evolve and become increasingly net-centric, it is critical that apt consideration is given to properly extend Internet protocol (IP)-based networking services to the tactical assets. This is an effort to resolve current interoperability issues through the use of a standard protocol and provide IP connectivity between all airborne network platforms. However, large gaps exist between the current AN architecture and future envisioned net-centric capabilities. The dynamic nature of the AN topology, typically characterized by highly intermittent links and long link delays, limits the use and effectiveness of Internet-based standards and protocols. Developed separately, the delay tolerant network (DTN) architecture has been designed to address the needs of networks characterized by link intermittency, lack of end-to-end connectivity between end users, and high latency. While originally developed for deep space networking and inter-planetary communications, DTNs are highly applicable for sensor-based networks, terrestrial wireless networks, satellite networks, underwater acoustic networks as well as airborne networks. This paper addresses the specific challenges of establishing and maintaining reliable communications within an IP-based AN environment. In addition, this paper provides an overview of DTN, and details how this technology may be integrated into to the AN infrastructure in order to address the current issues affecting AN performance





computer science, computer science seminar topics, computer seminar topics, network control systems, ieee seminar topics, it seminar topics, computer science, seminar title, seminar, seminar topics,
0 comments

Analysis of Queuing Delay in RPR Networks free seminar title, topics




Abstract

Resilient packet ring (RPR) that has been standardized as IEEE 802.17 is a MAC layer protocol designed for data centric metropolitan area network applications. A well-designed RPR network would be able to offer QoS guarantee for throughput and delay sensitive data classes in addition to providing other types of low cost best effort services. Careful network planning would be required to allow successful provisioning of classA services with strict delay and jitter requirements over RPR networks. This would require the knowledge of the dependency of delay and jitter for classA traffic on the load that is added to the ring. In this article, we propose an algorithm to estimate the dependency of delay and jitter for classA traffic in RPR networks on the total traffic added to the ring by nodes. We will follow an analytical approach based on queuing theory to find the probability density function of the delay for classA packets and try to find a closed-form solution to the problem using some simplifying assumptions. Simulations are used to verify the results of analytical derivations





computer science, computer science seminar topics, computer seminar topics, network control systems, ieee seminar topics, it seminar topics, computer science, seminar title, seminar, seminar topics,
0 comments

Analysis of coordination mechanisms in a two-echelon supply chain free seminar topics




Abstract

Coordinating the supply chain is a main object of supply chain management, and an inventory decision model is developed to analyze the coordination of a two-echelon supply chain with one supplier and one retailer. The products in our paper are perishable and sold over a single selling season. After discussing a pure wholesale price contract, we put forward a return contract. Then several tactics are proposed to improve the performance of the traditional return contract. All our findings are illustrated by a numerical example





computer science, computer science seminar topics, computer seminar topics, network control systems, ieee seminar topics, it seminar topics, computer science, seminar title, seminar, seminar topics,

0 comments

An On-Chip In-Circuit Emulation Architecture for Debugging an Asynchronous Java Accelerator free seminar topic and title



Abstract


The solution to debug a problem in a deeply embedded system is to integrate the debug and communication module inside the chip. In this paper, we propose an on-chip in-circuit emulation (ICE) architecture for debugging an asynchronous Java accelerator core which can be integrated with any existing processor and operating system. The operation of this ICE module and the debug strategy of the Java accelerator are specifically designed for asynchronous implementation. They not only facilitate the system development but also provide a manufacture test method for asynchronous chips.




computer science, computer science seminar topics, computer seminar topics, network control systems, ieee seminar topics, it seminar topics, computer science, seminar title, seminar, seminar topics,
0 comments

An OFDM-specified lossless FFT architecture : free seminar topics ,seminar title




Abstract



In this paper, a VLSI architecture based on radix-22 integer fast Fourier transform (IntFFT) is proposed to demonstrate its efficiency. The IntFFT algorithm guarantees the perfect reconstruction property of transformed samples. For a 64-points radix-22 FFT architecture, the proposed architecture uses 2 sets of complex multipliers (six real multipliers) and has 6 pipeline stages. By exploiting the symmetric property of lossless transform, the memory usage is reduced by 27.4%. The whole design is synthesized and simulated with a 0.18-mum TSMC 1P6M standard cell library and its reported equivalent gate count usage is 17,963 gates. The whole chip size is 975 mumtimes977 mum with a core size of 500 mumtimes500 mum. The core power consumption is 83.56 mW. A Simulink-based orthogonal frequency demodulation multiplexing platform is utilized to compare the conventional fixed-point FFT and proposed IntFFT from the viewpoint of system-level behavior in items of signal-to-quantization-noise ratio (SQNR) and bit error rate (BER). The quantization loss analysis of these two types of FFT is also derived and compared. Based on the simulation results, the proposed lossless IntFFT architecture can achieve comparative SQNR and BER performance with reduced memory usage


computer science, computer science seminar topics, computer seminar topics, network control systems, ieee seminar topics, it seminar topics, computer science, seminar title, seminar, seminar topics, 
0 comments

Ajax : free seminar topic | seminar title




Abstract

Ajax ( is a group of interrelated web development methods used on the client-side to create interactive web applications. With Ajax, web applications can send data to, and retrieve data from, a server asynchronously (in the background) without interfering with the display and behavior of the existing page. Data is usually retrieved using the XMLHttpRequest object. Despite the name, the use of XML is not needed (JSON is often used instead), and the requests need not be asynchronous.
Like DHTML and LAMP, Ajax is not one technology, but a group of technologies. Ajax uses a combination of HTML and CSS to mark up and style information. The DOM is accessed with JavaScript to dynamically display, and to allow the user to interact with the information presented. JavaScript and the XMLHttpRequest object provide a method for exchanging data asynchronously between browser and server to avoid full page reloads.


computer science, computer science seminar topics, computer seminar topics, network control systems, ieee seminar topics, it seminar topics, computer science, seminar title, seminar, seminar topics,
0 comments

Adaptive power-fidelity in energy-aware wireless embedded systems free seminar topic

Adaptive power-fidelity in energy-aware wireless embedded systems




Abstract

Energy aware system operation, and not just low power hardware, is an important requirement for wireless embedded systems. These systems, such as wireless multimedia terminals or wireless sensor nodes, combine (soft) real-time constraints on computation and communication with requirements of long battery lifetime. In this paper, we present an OS-directed dynamic power management technique for such systems that goes beyond conventional techniques to provide an adaptive power vs. fidelity trade-off. The ability of wireless systems to adapt to changing fidelity in the form of data losses and errors is used to tradeoff against energy consumption. We also exploit system workload variation to proactively manage energy resources by predicting processing requirements. The supply voltage, and clock frequency are set according to predicted computation requirements of a specific task instance, and an adaptive feedback control machanism is used to keep system fidelity (deadline misses) within specifications. We present the theoretical framework underlying our approach in the context of both a static priority-based preemptive task scheduler as well as a dynamic priority based one, and present simulation-based performance analysis that shows that our technique provides large energy savings (up to 76%) with little loss in fidelity (<4%). Further, we describe the implementation of our technique in the eCos real-time operating system (RTOS) running on a StrongARM processor to illustrate the issues involved in enhancing RTOSs for energy awareness.



computer science, computer science seminar topics, computer seminar topics, network control systems, ieee seminar topics, it seminar topics, computer science, seminar title, seminar, seminar topics,
0 comments

Achieving EMC compliance by design - case study of fixed remote station in corDECT WLL system | free seminar topic

Achieving EMC compliance by design - case study of fixed remote station in corDECT WLL system


Abstract

Telecommunication has an important role in society enabling effective voice & data communication between people across the globe. EMC compliance is mandatory and vital for telecom products. This paper deals with the efforts put in during the design & development and EMC testing of such a telecom product - Wireless in Local Loop (WLL) system to comply to International standards like ETSI, IEC & CISPR and National standards like TEC. This paper also highlights the advantages of incorporating EMC design rules in early stage of design, due to flexibility in choosing of components like filters, shields and protective devices to achieve cost-effective solution and avoiding field modification. A case study of telecom product, viz., (FRS) Fixed Remote Station of Wireless Local Loop (WLL) subsystem, used in subscriber premises for voice telephony and Internet connectivity is taken up for elucidating EMI problems encountered during the EMC certification process and the measures taken to mitigate the same. The experience gained during this FRS EMC compliance certification of the corDECT system will substantially reduce the cycle time in future products with better design margin. Emission and susceptibility requirements from Standard Institutes to meet the Regulatory Authorities are also outlined







computer science, computer science seminar topics, computer seminar topics, network control systems, ieee seminar topics, it seminar topics, computer science, seminar title, seminar, seminar topics,
0 comments

A uniform laser energy control for ceramic sintering rapid prototyping free seminar topics

A uniform laser energy control for ceramic sintering rapid prototyping


Abstract

The rapid-prototyping has become popular nowadays as the lifecycles of commercial and consumer products have been shorten to years or even months. The rapid prototyping technology provides a modern way to review the rapid change of the product has forced the designers and manufacturers to make new designs, jigs, tools, and molds for the products. Unlike the traditional machining of cutting material, the rapid prototyping utilize technologies, such as etching, laser, etc., to form the shapes of designed articles within limited time and cost. As cutting-through is prohibited, means to control the machining are required and important to the success of prototyping. This study has focused on the laser energy control for the ceramic rapid prototyping, which will sinter the ceramic powders into a solid object. A uniform laser energy controller is developed to improve the quality of the ceramic working piece. The developed method has been implemented and tested on a MCU and FPGA controller to demonstrate its applicability to ceramic sintering rapid prototyping.





computer science, computer science seminar topics, computer seminar topics, network control systems, ieee seminar topics, it seminar topics, computer science, seminar title, seminar, seminar topics,
0 comments

A Tempest Fiber Optic Local Area Network post free seminar topics

A Tempest Fiber Optic Local Area Network post

Abstract



Local Area Networks (LANs) are coming to the forefront in data communications for both commercial as well as military applications. This thrust has resulted from the requirement to provide communications and resource sharing between dispersed users of computers and/or workstations. For many government/military applications, security is a key aspect. This paper describes a recently developed TEMPEST LAN which utilizes optical fiber as the communications medium along with LAN transceivers and communication servers designed to meet TEMPEST requirements. The LAN operates at 10 Mb/s using the Ethernet and IEEE 802.3 Standards.




computer science, computer science seminar topics, computer seminar topics, network control systems, ieee seminar topics, it seminar topics, computer science, seminar title, seminar, seminar topics,
0 comments

A New Routing Scheme Based on Greedy Tree in Delay Tolerant Networks

A New Routing Scheme Based on Greedy Tree in Delay Tolerant Networks


Abstract


Delay tolerant networking (DTN) is a new store-and-forward architecture and protocol suite for the networks which is intermittent connectivity. Depending on the nodes ability of store and forward, the messages are delivered to their destination with the proper choice of routing protocol by nodes' mobility. In order to successful delivery, many routing protocols use multiply copies methods. Although the messages are transferred to the destination, the redundant of messages copies increase much. These routing protocols are not appropriate for energyconstrained and bandwidth-constrained applications such as the wireless networks. In many resource-constrained mobile wireless DTN networks, single copy routing schemes should be used suitably. This paper presents a new routing scheme of single-copy based on the DTN connectivity graph and the corresponding greedy tree. The nodes choose the next intermediate node to transmit the message by comparing the location of nodes in the greedy tree. We show that delivery ratio is increased significantly by using our scheme in the single-copy routing



Labels

10 Gigabit Ethernet 2038 bug 2038 problem 2038 unix 3g mobile 3g mobile network 3g mobiles 3g network A apache load balancer Artificial intelligence Artificial intelligence research .Artificial intelligence ideas bca BE bsa bsc Btech computer science computer science seminar topics computer security computer seminar topics d rt data visualization data visualization blog databases databases security digital convergence digital watermark digital watermarking disable ipv6 dr t drt bick dtr E education ethernet controller ethernet switch F face recoganization free radio free watermark gigabit gigabit ethernet gigabit ethernet card gigabit ethernet lan gigabit ethernet switch gigabit switch grid architecture hirschman herfindahl index how to make a watermark human computer interaction human computer interface human factors IEEE ieee seminar topics information security interface design interface designers internet security ip v6 ipv4 to ipv6 ipv6 ipv6 address ipv6 example ipv6 format ipv6 link local ipv6 ping ipv6 to ipv4 ipv6 tunneling IT it seminar topics latest seminar topics load balancer load balancers load balancing lookout mobile security mca millenium bug mobile computing mobile data mobile database mobile tracker mobiles national seminars network control systems network controller network load balancing network radio network security networking online database parallel computer parallel computers parallel computing parallel processing phone radio radon transform Real-time Transport Protocol RTP rtp online rtp protocol rtp stream rtp udp rtp video rtp.pt rtp1 science seminar topics securewireless network seminar seminar title seminar topic seminar topics seminar topics computer seminar topics in computer science seminar topics it seminars seminartitle steganography stochastic network stock trading seminar topics streaming rtp T technology seminar topics test ipv6 the year 2038 problem training training seminars u Ubiquitous udp rtp ui ui patterns umts unix 2038 unix 2038 problem v video compersion visualization of data visualization tool voicexml Vrml water mark watermark free watermark images watermarking watermarks what is 3g what is wireless lan what is xml windows mobile wireless access point wireless card usb wireless internet network wireless lan wireless n usb wireless network devices wireless networks wireless router wireless usb wireless usb adapter wireless usb adaptor wireless usb drivers wireless usb network adapter wireless usb to usb workshop xml document xml editor xml examples xml file xml files xml format xml parser xml schema y2k38 year 2038 year 2038 problem