Facebook Twitter Delicious Stumble Upon
Showing posts with label Btech. Show all posts
Showing posts with label Btech. Show all posts
0 comments

A methodology for architecture-oriented rapid prototyping - seminar topics,it seminar topics,latest seminar topics,seminar topics on computer science

A methodology for architecture-oriented rapid prototyping



Abstract



A methodology for architecture-oriented rapid prototyping is presented. In the very early development phases, concept-oriented rapid prototyping is used to clarify the requirements between the customer and the contractor. In the second, more complex phase of rapid prototyping, the architecture of the target system is used. So this kind of rapid prototyping is called “architecture-oriented rapid prototyping”. Most electronic control units (ECUs) use microcontrollers with plenty of on-chip peripherals. Sometimes, application-specific microcontrollers with non-standard peripherals are used, but then, all of these peripheral components must be present in the rapid prototyping system. To obtain this, we developed an interface module with an FPGA for the peripheral parts of microcontroller-based designs, as well as a prototyping ECU which can be programmed with CASE tools

0 comments

Multicasting in Ad Hoc Networks :Seminar title - seminar topics,it seminar topics,latest seminar topics,seminar topics on computer science

       Multicasting in Ad Hoc Networks

My next seminar title is  multicasting in ad Hoc Networks .It is very important networking topic . this topic which can be used to research and seminar.

ABSTRACT






MANETs are useful in many application environments and do not need any infrastructure support. Collaborative computing and communications in smaller areas (buildings, organizations, conferences, etc.) can be set up using MANETs.
Communications in battlefields and disaster recovery areas are other examples of application environments. Similarly communications using a network of sensors, and inter-island communications using floats over water are other potential applications of MANETs. The increasing use of collaborative applications and wireless devices may further add to the needs and usages of MANETs. Many of these potential applications of MANETs involve point-to-multipoint communication, and thus would benefit from multicasting support in the network layer.


IP multicasting – is an extension to Internet architecture to support multiple clients at network layer. The fundamental motivation behind IP multicasting is to save network and bandwidth resource via transmitting a single copy of data to reach multiple receivers simultaneously.


What makes ad hoc multicasting distinguished from Internet multicasting is that mobile nodes could move around freely and rapidly.


Ad hoc multicasting protocols in existing literature have either evolved from the Internet multicast protocol, or designed specifically for ad hoc networks. Most of these protocols attempt to adapt to the network dynamics in ad hoc networks. The primary goal of ad hoc multicasting protocols should be to construct/maintain a robust & efficient multicasting route even during high network dynamics.
Multicasting techniques in MANETs can be classified based on group dynamics or network dynamics.


A primary issue for managing multicast group dynamics is the routing path that is built for data forwarding. Most existing ad hoc multicasting protocols can be classified as tree-based or mesh-based.


In a tree-based protocol, a tree-like data forwarding path is built with the root at the source of the multicast session. In a mesh-based protocol, in contrast, multiple routes may exist between any pair of source and destination, which is intended to enrich the connectivity among group members for better resilience against topology changes.


A major source of network dynamics is node mobility and node failure


Reliance on More Nodes

Reliance on Fewer Nodes

Reliance on No Nodes

Reliance on Stable Nodes

Reliance on an Overlay Layer

 

 

More topic 


monet

ad hoc networks

mobile ad hoc networking

ad hoc networking

access networks

adhoc networking

adhoc

0 comments

Free seminar topic : Routing In Mobile Ad Hoc Networks - seminar topics,it seminar topics,latest seminar topics,seminar topics on computer science

    Routing In Mobile Ad Hoc Networks

  
                    My next seminar topic suggestion is Routing in mobile ad Hoc networks.It is a good seminar topic.If you can research with this  topic.The routing is important on in network .We are adding complete Research and seminar topics only.Each topic we can  do research and seminar.


Abstract







Developing support for routing is one of the most significant challenges in ad hoc networks and is critical for the basic network operations. Certain unique combinations of characteristics make routing in ad hoc networks interesting.


First, nodes in an ad hoc network are allowed to move in an uncontrolled manner. Such node mobility results in a highly dynamic network with rapid topological changes causing frequent route failures. A good routing protocol for this network environment has to dynamically adapt to the changing network topology.


Second, the underlying wireless channel provides much lower and more variable bandwidth than wired networks. The wireless channel working as a shared medium makes available bandwidth per node even lower. So routing protocols should be bandwidth-efficient by expending a minimal overhead for computing routes so that much of the remaining bandwidth is available for the actual data communication.








Third, nodes run on batteries which have limited energy supply. In order for nodes to stay and communicate for longer periods, it is desirable that a routing protocol be energy-efficient as well. This also provides also another reason why overheads must be kept low. Thus, routing protocols must meet the conflicting goals of dynamic adaptation and low overhead to deliver good overall performance.


Types of Routing in MANETs

 

Flooding


Proactive Routing


Location-Based Routing


On-Demand Routing





Related topic 

mobile ad hoc

ad hoc network

ad hoc routing

ad hoc network routing protocols

dynamic routing

bank routing

0 comments

Minimizing file download time in stocastic peer to peer network - seminar topics,it seminar topics,latest seminar topics,seminar topics on computer science

              

Minimizing file download time in stochastic peer to peer network



I am suggesting this topic for seminar because not a seminar topic but also its an project topic.
The minimizing file download time in peer to peer network is successfully executing we can serve more than one people at a time .
that is mean Now server can serve one people at a time .
Then after implementing this concept we can serve more than 10 client a a time.
Its same tike bitorrent.The server and client act both server and client.

The main objective of the system is used to minimize the file download time in a stochastic peer to peer network.
The peer to peer technology is heavilty used for content distribution applications.The early model for content distribution is centralized one.in which the service provider simply sets up a server and every user download files from it.In type of network architecture ,many users have to complete for limited resources in terms of bottleneck bandwidth or procesing power of a single server.As a result ,each user may recieve very poor performance.From a single user's perspective ,The duration of a downloadsession or the download time for that individual users is the most often used performance metric.P2P technology tries to solve of scalability by making the system distributed.Each computer(peer) in the network can act both server and client at the time.Whe nuber of clients are trying to access a fle the peers will give response to clients based on load balancing in the peer Its obivious that as time goes on the sevice capacity of the entire network will increase due to the increse in the number of servicing peers.With this increasing service capacity,Theoretical studies have shown that the average download time for each user in the network is much shoter than that of a centralized network architecture in ideal cases in other words ,users of a p2p network should enjoy much faster downloads.



You can try to implement... its not only a seminar topic but also a project topic


if you know more details about this topic .You can share with readers and increase your knowledge
2 comments

free seminar topics Artificial intelligence - seminar topics,it seminar topics,latest seminar topics,seminar topics on computer science


Artificial intelligence






 I know , You have better knowledge about  Artificial intelligence.The artificial intelliegence is also try to present seminar . But scope and application of  Artificial intelligence is very large .
Do you know to develope an artificial intelligence program ...? .If you can know any one programing language than you can able create artificial intelligence program .. Then how ....?


If you are  believe    Artificial intelligence programing for genies programmers only. Then you are wrong.Why i am saying. You can able to do program 



robots work




 artificial intelligence

 artificial intelligence


How


 Simple example :-   How to implement  on computer progaming


 We are doing project on text identifying.When  your enter a text or comment into the program.That program will execute time .The compiler will check the  " what can do when particular comment will comes" . then compiler will execute particular section .These like the robots are working






 The robots have developed by particular instraction .The particular command will came what will do .The robots will check the comment and it will be execute like switch  statement.




If you are thinking the post will contain foolish.I will not disagree.But  you will cross check again You can definitly get the proper logic .And visit again and post your comment








Abstract





Artificial intelligence has been used in a wide range of fields including medical diagnosis, stock trading, robot control, law, scientific discovery and toys. However, many AI applications are not perceived as AI: A lot of cutting edge AI has filtered into general applications, often without being called AI because once something becomes useful enough and common enough it's not labeled AI anymore.Many thousands of AI applications are deeply embedded in the infrastructure of every industry. In the late 90s and early 21st century, AI technology became widely used as elements of larger systems, but the field is rarely credited for these successes.
 




Please share your ideas .You can better opportunity  for Proving Your intelligence .Please post your comment about this article



Related topic

what is artificial intelligence

artificial intelligence

artificial intelligence research

artificial intelligence software

a.i. artificial intelligence

artificial intelligence programs

artificial intelligence in games

artificial intelligent

artificial intelligence programming

artificial intelligence modern approach

artificial intelligence algorithms




0 comments

Free seminar topic : Security in Mobile Database Systems - seminar topics,it seminar topics,latest seminar topics,seminar topics on computer science

Security in Mobile Database Systems


 You can use this topic for seminar .It will have wild range of scope



Abstract The importance of databases in modern businesses and governmental institutions is huge and still growing. Many mission-critical applications and business processes rely on databases. These databases contain data of different degree of importance and confidentiality, and are accessed by a wide variety of users. Integrity violations for a database can have serious impact on business processes; disclosure of confidential data in some cases has the same effect. Traditional database security provides techniques and strategies to handle such problems with respect to database servers in a non-mobile context.




For many businesses applications are going mobile that means using enterprise data in a mobile context, thus using a mobile DBMS. With these new developments the business data of an enterprise can be made available to an even larger number of users and a wider range of applications than before.


To work on business data anytime and anywhere is the major goal pursued by developing mobility support in database context. The confidentiality of mission- critical data must be ensured, even though most mobile devices do not provide a secure environment for storage of such data.
Security requirements that apply to a central company database should apply similarly and in an appropriate manner to the parts of the database replicated on mobile devices in the field. A mobile database security infrastructure is needed to accomplish this goal. When developing such an infrastructure we can benefit from the results of traditional database security work. But we also need to adapt the existing techniques and strategies to the mobile context, and we need to develop new ones that attack certain issues specific to use of database systems in a mobile environment.




Related Topics




mobile database systems

mobile databases

database management system

database management systems

mobile software

relational database systems

database server

mobile data terminals

windows mobile access database

 

 

 

If You can know more data about the  "Security in Mobile Database Systems" .Then share your Ideas to world . Pleas post your ideas...


0 comments

Free seminar topic : Captcha - seminar topics,it seminar topics,latest seminar topics,seminar topics on computer science



Captcha



If i suggest this topic for seminar Your really think ,i am a fool .Than i will ask you what  you know about captcha.


suppose you know ...


1)The captcha is only picture.The picture contain element  type than only enter to the secured webpage.
2)Its a human verification code.






free captcha pics








Ya,I will agree these points. How can use more advanced......






Example :


If you are owner of a website .That contain posting  comment .The comment will be publishing Through spam .Than you can increase the number of spam but you will not got good benefits.
You can try the captcha.your monthly bandwidth will be decrease the use of spam ..
we can use spam detection method .




If i will suggest Captcha will include  all the your own application but it will be also simple .The captcha  not only picture you can try with simple maths


5+2 =    , 4+9=   7+3=   8 +1= 

You can try with like this but it will be simple .another wise you will affect your traffic 
 


The possibilities of captcha is very strong ......








Abstract

A CAPTCHA  is a type of challenge-response test used in computing as an attempt to ensure that the response is generated by a person. The process usually involves one computer (a server) asking a user to complete a simple test which the computer is able to generate and grade. Because other computers are supposedly unable to solve the CAPTCHA, any user entering a correct solution is presumed to be human. Thus, it is sometimes described as a reverse Turing test, because it is administered by a machine and targeted to a human, in contrast to the standard Turing test that is typically administered by a human and targeted to a machine. A common type of CAPTCHA requires the user to type letters or digits from a distorted image that appears on the screen.






Realated topic





captcha

web security

captcha google

captcha generator

email captcha

captcha script

ajax captcha

captcha codes

captcha security

animated captcha



If you Have More ideas about captcha  then please post your ideas.....
How we can protect web security from spammers.............?  you can choose this topic for seminar


0 comments

Free seminar topics : BitTorrent File sharing - seminar topics,it seminar topics,latest seminar topics,seminar topics on computer science


BitTorrent File sharing



If ,I suggest this topic  when you will ask me what is the importance of the Bittorrent ? .The Bit Torrent is common to all the internet user ,Then .....why  you are provide this topic.....


   I am saying the BitTorrent system will importance concept in internet .The misuse of  BitTorrent will reduce the importance.The peer to peer file sharing.In my opinion We can use this method to share the data on local network or internet.When one system act both client and server. So i will refer the project topic .......



Free seminar topics : BitTorrent File sharing



BitTorrent is a peer-to-peer file sharing protocol used for distributing large amounts of data.[vague] BitTorrent is one of the most common protocols for transferring large files, and it has been estimated that it accounted for roughly 27% to 55% of all Internet traffic (depending on geographical location) as of February 2009.

Programmer Bram Cohen designed the protocol in April 2001 and released a first implementation on July 2, 2001.It is now maintained by Cohen's company BitTorrent, Inc. There are numerous BitTorrent clients available for a variety of computing platforms.




Related topics




bittorrent

bittorrent vs utorrent

utorrent

fastest bittorrent client

bittornado

flash animation

bitlord

flexibility

peer to peer

peer to peer network

peer 2 peer

peer to peer file sharing

file sharing

p2p file sharing

flexible

p2p file sharing programs

bitcomet

file sharing server



Do you think My post good or bad ? If bad ,Than how will be modify my post...?



If you have More ideas than post your ideas about Bittorrent. If share your knowledge than it will be increase  please post your ideas ..................




0 comments

Free Seminar topics : Virtual Reality Markup Language (VRML) - seminar topics,it seminar topics,latest seminar topics,seminar topics on computer science


                            

Virtual Reality Markup Language (VRML)



The VRML became an open standard by ISO in 1997 (ISO/ IEC DIS 14772-1).Its establishment as an open  as an open standard for the transfer of data over the internet explores an opportunity to build multi-user ,distributed virtual worlds for the use on a world wise scale and its free  to platform-dependency and operating system constriants leads it to a greater height.VRML ,sometimes pronounced vermal ,is an acronym of Virtual reality Modelling language ,is a scene descriptive language.The two most using terms virtual and reality can be expressed as following....



Virtual :  "being an essence or effect though not formally recognized or admitted"

Reality :  "A real event ,entity or state of actions "


We many combine them and said that virtual reality is an event or entity that is real in effect but not in fact.VRML file supports pain UTF-8 (universal character Set Transformation Format) or ASCII text file. The advantages are that this type of format understands not only english but also others .Its simply  a 3-D interchange format .  VRML ruled over java 3D and MPEG-4  because of its following features :




Flexibility


       VRML's most attractive features is its flexibility.
 

Scripting capability


It is possible to allow for interactivity and complex behaviour through  java scripting or vrmlScrpting .


Network capability


Shared and distributed virtual environment is porvided by th authority so that its gathers all end-users under a single umberala.



Realism

  Created through an appropriate use of background ,animation ,textures ,lighting as well as different level of Details (LOD).





Related Article



vrml viewer

web 3d

vrml tutorial

animation

network capabilities

flash animation

network capability

flexibility

flexible spending account

flexible


1 comments

Seminar topics for students Face Recognition Grand Challenge - seminar topics,it seminar topics,latest seminar topics,seminar topics on computer science


Face recognition systems



abstract


The primary goal of the FRGC was to promote and advance face recognition technology designed to support existing face recognition efforts in the U.S. Government. FRGC developed new face recognition techniques and prototype systems while increasing performance by an order of magnitude. The FRGC was open to face recognition researchers and developers in companies, academia, and research institutions. FRGC ran from May 2004 to March 2006.

The FRGC consisted of progressively difficult challenge problems. Each challenge problem consisted of a data set of facial images and a defined set of experiments. One of the impediments to developing improved face recognition is the lack of data. The FRGC challenge problems include sufficient data to overcome this impediment. The set of defined experiments assists researchers and developers in making progress on meeting the new performance goals.

There are three main contenders for improving face recognition algorithms: high resolution images, three-dimensional (3D) face recognition, and new preprocessing techniques. The FRGC is simultaneously pursuing and will assess the merit of all three techniques. Current face recognition systems are designed to work on relatively small still facial images. The traditional method for measuring the size of a face is the number of pixels between the centers of the eyes. In current images there are 40 to 60 pixels between the centers of the eyes (10,000 to 20,000 pixels on the face). In the FRGC, high resolution images consist of facial images with 250 pixels between the centers of the eyes on average. The FRGC will facilitate the development of new algorithms that take advantage of the additional information inherent in high resolution images.





Three-dimensional (3D) face recognition algorithms identify faces from the 3D shape of a person's face. In current face recognition systems, changes in lighting (illumination) and pose of the face reduce performance. Because the shape of faces is not affected by changes in lighting or pose, 3D face recognition has the potential to improve performance under these conditions.

In the last couple years there have been advances in computer graphics and computer vision on modeling lighting and pose changes in facial imagery. These advances have led to the development of new computer algorithms that can automatically correct for lighting and pose changes in facial imagery. These new algorithms work by preprocessing a facial image to correct for lighting and pose prior to being processed through a face recognition system. The preprocessing portion of the FRGC will measure the impact of new preprocessing algorithms on recognition performance.

The FRGC improved the capabilities of automatic face recognition systems through experimentation with clearly stated goals and challenge problems. Researchers and developers can develop new algorithms and systems that meet the FRGC goals. The development of the new algorithms and systems is facilitated by the FRGC challenge problems.




What is your opinion about this seminar topic ? Do you  like it..... You can express ideas about this topic ....................





Related topics

face recognition systems 

biometrics face recognition

face recognition google

android face recognition

face recognition open source

opencv face recognition

fastaccess facial recognition

automatic face recognition

biometric face recognition

processing techniques

 

 

 

1 comments

Seminar title Ubiquitous Networking - seminar topics,it seminar topics,latest seminar topics,seminar topics on computer science

Ubiquitous Networking




Abstract



As many new types of devices will be connected to networks in the future, we expect that IPv6 will play a key role in object-to-object communications and also militate against address exhaustion of IPv4. Therefore, it is very important to provide ubiquitous networking capabilities using IPv6. This paper presents several issues for standardization in the support ubiquitous networking capabilities in IPv6- based next generation networks (NGN). These issues are relevant to the future activities of ITU-T's Study Group (SG) 13. We also discuss some basic concepts and present our vision related to this topic. In addition, we clearly identify the importance and key advantages of IPv6 in the ubiquitous networking environment. For developing the relevant standards to further enhance the current NGN, we propose new study items which include object identification, functional architecture, services, and strategies. ieee also provide additional considerations for standardization.






What is your opinion about this seminar topic ? Ubiquitous Networking is have more range data.
if you can observe our negative point .You can express ideas about this topic .......
please commented here ....................







For more Information



ubiquitous computing

ubiquitous

networking

home networking

ipv4 and ipv6

ipv6

ipv6 tutorial

ipv6 address

ipv6 multicast

computer networking

wireless networking

networking device


Labels

10 Gigabit Ethernet 2038 bug 2038 problem 2038 unix 3g mobile 3g mobile network 3g mobiles 3g network A apache load balancer Artificial intelligence Artificial intelligence research .Artificial intelligence ideas bca BE bsa bsc Btech computer science computer science seminar topics computer security computer seminar topics d rt data visualization data visualization blog databases databases security digital convergence digital watermark digital watermarking disable ipv6 dr t drt bick dtr E education ethernet controller ethernet switch F face recoganization free radio free watermark gigabit gigabit ethernet gigabit ethernet card gigabit ethernet lan gigabit ethernet switch gigabit switch grid architecture hirschman herfindahl index how to make a watermark human computer interaction human computer interface human factors IEEE ieee seminar topics information security interface design interface designers internet security ip v6 ipv4 to ipv6 ipv6 ipv6 address ipv6 example ipv6 format ipv6 link local ipv6 ping ipv6 to ipv4 ipv6 tunneling IT it seminar topics latest seminar topics load balancer load balancers load balancing lookout mobile security mca millenium bug mobile computing mobile data mobile database mobile tracker mobiles national seminars network control systems network controller network load balancing network radio network security networking online database parallel computer parallel computers parallel computing parallel processing phone radio radon transform Real-time Transport Protocol RTP rtp online rtp protocol rtp stream rtp udp rtp video rtp.pt rtp1 science seminar topics securewireless network seminar seminar title seminar topic seminar topics seminar topics computer seminar topics in computer science seminar topics it seminars seminartitle steganography stochastic network stock trading seminar topics streaming rtp T technology seminar topics test ipv6 the year 2038 problem training training seminars u Ubiquitous udp rtp ui ui patterns umts unix 2038 unix 2038 problem v video compersion visualization of data visualization tool voicexml Vrml water mark watermark free watermark images watermarking watermarks what is 3g what is wireless lan what is xml windows mobile wireless access point wireless card usb wireless internet network wireless lan wireless n usb wireless network devices wireless networks wireless router wireless usb wireless usb adapter wireless usb adaptor wireless usb drivers wireless usb network adapter wireless usb to usb workshop xml document xml editor xml examples xml file xml files xml format xml parser xml schema y2k38 year 2038 year 2038 problem