Seminar Topics

Download the Seminars
 Download the Seminars
 An Overview of Virtual Reality Download An Overview of Virtual Reality
Reality is a computer-based technology which incorporates specialized input and output devices to aVirtualllow the user to interact with and experience an artificial environment as if it were the real world. A VR system permits the user to explore a three-dimensional virtual - or artificial - environment and to interact with lifelike and/or fantasy elements created by the designer. In the virtual world, the user can do things as routine as throwing a ball or as fantastic as flying through space. And these things can be made to occur by something as simple as a hand gesture or a nod or (one day) a sound.
Rate this Seminar :
 An Introduction to TCP/IP Download An Introduction to TCP/IP
Most of us know of TCP/IP as the glue that binds the Internet. But not as many can offer a cogent description of what it is and how it works. So what is TCP/IP, really? TCP/IP is a means for networked computers to communicate with each other. It doesn't matter whether they are part of the same network or are attached to separate networks. It doesn't matter if one computer is a Cray and the other a Macintosh. TCP/IP is a platform-independent standard that bridges the gap between dissimilar computers, operating systems, and networks. It's the protocol that drives the global Internet, and it is to the Internet that TCP/IP owes much of its popularity. Understanding TCP/IP is largely a matter of understanding a collection of arcane protocols that TCP/IP hosts use to exchange information. Let's look at some of those protocols and see what makes TCP/IP tick
Rate this Seminar :
 Security System using Biometrics Download Security System using Biometrics
Biometrics refers to the automatic identification of a person based on his/her physiological or behavioral characteristics. This method of identification is preferred over traditional methods involving passwords and PIN numbers for various reasons: the person to be identified is required to be physically present at the point-of-identification; identification based on biometric techniques obviates the need to remember a password or carry a token.
Rate this Seminar :
 Secured Data Transmission using Cryptographic and Steganographic Techniques Download Secured Data Transmission using Cryptographic and Steganographic Techniques
As we enter the age of universal electronic connectivity, electronic eavesdropping and electronic fraud threaten the prosperity of corporations and individuals. Thus, the role of digital security has become increasingly important. The security requirements within an organization have undergone major changes in the last few decades. Before the widespread use of data processing equipment, data and information valuable to an organization were made invulnerable primarily by physical and administrative means. With the advent of computer networks and the internet however, the design of automated tools which ensure security and privacy of information transferred across networks was inevitable. Though there are several security techniques in use, two of the most prominent ones are steganography and cryptography. In this paper , we discuss these two techniques and how their combination can result in an efficient and secure data transfer software.
Rate this Seminar :
 RSA : An Insight Download RSA : An Insight
Public key cryptosystems were invented in the late 1970's, with some help from the development of complexity theory around that time. It was observed that based on a problem so difficult that it would need thousands of years to solve, and with some luck, a cryptosystem could be developed which would have two keys, a secret key and a public key. With the public key one could encrypt messages, and decrypt them with the private key. Thus the owner of the private key would be the only one who could decrypt the messages, but anyone knowing the public key could send them in privacy.
Rate this Seminar :
 Securing the Network Routing Algorithms Download Securing the Network Routing Algorithms
In this technical paper we present a study of the various routing algorithms, which are in use presently. This study of present algorithms is limited to their general working and the various security problems, which they are unable to solve. Our main emphasis is on discussing a novel approach based on “Leap-Frog cryptographic signing protocol” and that how this novel approach deals the various security threats, which, its predecessors (using traditional public-key signature schemes) are unable to withstand.
Rate this Seminar :
 Random Access Memory Download Random Access Memory
Random access memory (RAM) is the best known form of computer memory. RAM is considered “random access” because you can access any memory cell directly if you know the row and column that intersect at that cell.
Rate this Seminar :
 Ping of Death : Seminar on Denial Of Service Download Ping of Death : Seminar on Denial Of Service
The Ping of Death uses a ping system utility to create an IP packet that exceeds the maximum 65,536 bytes of data allowed by the IP specification. The oversize packet is then sent to an unsuspecting system. Systems may crash, hang, or reboot when they receive such a maliciously crafted packet. This attack is not new, and all OS vendors have fixes in place to handle the oversize packets.
Rate this Seminar :
 Optical Network Architecture Download Optical Network Architecture
One of the major issues in the networking industry today is tremendous demand for more and more bandwidth. However, with the development of optical networks and the use of Dense Wavelength Division Multiplexing (DWDM) technology, a new and probably, a very crucial milestone is being reached in network evolution. The existing SONET/SDH network architecture is best suited for voice traffic rather than today's high-speed data traffic. To upgrade the system to handle this kind of traffic is very expensive and hence the need for the development of an intelligent all-optical network. Such a network will bring intelligence and scalability to the optical domain by combining the intelligence and functional capability of SONET/SDH, the tremendous bandwidth of DWDM and innovative networking software to spawn a variety of optical transport, switching and management related products. This paper deals with optical network architecture and explains virtual topology along with optical layer and higher layer interface.
Rate this Seminar :
 Neural Networks Download Neural Networks
The power and speed of modern digital computers is truly astounding. No human can ever hope to compute a million operations a second. However, there are some tasks for which even the most powerful computers cannot compete with the human brain, perhaps not even with the intelligence of an earthworm. Imagine the power of the machine which has the abilities of both computers and humans. It would be the most remarkable thing ever. And all humans can live happily ever after (or will they?). Before discussing the specifics of artificial neural nets though, let us examine what makes real neural nets - brains - function the way they do. Perhaps the single most important concept in neural net research is the idea of connection strength.
Rate this Seminar :