Blu-Ray Technology Seminar

Introduction to Blu-Ray Technology Seminar:

BLU-RAY Features:

Blu-Ray has large storing capacity with a minimum of 24GB. The optical disc recording is protected by optical disc cartridge. These discs have a high data transfer speed of 36Mbps. The disc supports MPEG-2 technology for audio and video streams. Also, the Blu-Ray driver is capable of reading DVDs. Blu-Ray discs are available under read-only, writeable and re-writeable types.

BLU-RAYS and DVD’s:

DVD’s are capable of storing 5-7 times more than a CD and a Blu-ray is capable of storing 5-7 times more than a DVD. This makes a Blu-Ray disc a very high storage disc. Blu-rays use blue laser with shorter wavelength than red which is used to read DVD’s. Thus a smaller focus beam reads the ‘pits’ on a Blu-Ray disc. Pits are closely packed in a Blu-Ray disc which increases the storage space and speed along with precision.

ADVANTAGES and APPLICATIONS OF BLU-RAY:

Blu-Ray has large storage capacity with very high data transfer speeds which is available as read only, writable and re-writable. The disc is protected against dust and fingerprints and an encrypted algorithm protects the content of the disc. The disc has a large life span of 10-15 years. Re-writing operation does not cause any trouble to the disc unlike DVD’s and CD’s. Blu-ray also supports HD recording and transmitting. HDTV recordings are common these days which is possible only because of Blu-Ray technology. Though the cost of Blu-Ray is high at the moment, the wide set of applications would lead to decrease in the price of the discs. Thus, the technology holds a wide scope of development and its use would gradually increase with time.

Download Blu-Ray Technology Seminar.  

Seminar Report on Blu-Ray Technology

Introduction to Blu-Ray Technology Seminar Topic:

Blu-Ray disc is the optical disc storage format which offers higher data capacity and quality compared to any other formats available today. The Blu Ray disc technology was developed by the BluRay Disc Association (BDA), a body constituting the leading consumer electronics and computer companies including Apple, Dell Inc., Sony, L.G, Samsung, Disney pictures etc. BluRay was first introduced in market in 2003.

Structure of the disc

BluRay disc consists of 3 layers:

  1. Transparent cover: 0.1 mm transparent layer made of spin coated UV resin sandwiched between a bonding layer and protective coating.
  2. High speed recording material : A recording layer made of Ag, In, Sb, Te, Ge has high re-crystallization speed to enable recording at high linear speeds
  3. Super advanced rapid cooling structure: AlN is used in layer to makes it a heat sink

BluRay discs come in single layer and dual layer variants.

The BluRay technology:

Although BluRay is same in size as its predecessors (CD and DVD), it offers 25GB of storage on a single layered disc and 50GB storage on dual layered disc. BluRay technology accomplishes this by using a blue-violet (405 nm) laser light instead of red (650nm) lasers used in CDs. The surface of an optical disc consists of a large number of “pits” on which the data is written with the help of lasers. Thus by using a ray of shorter wavelength, the size of pits can be reduced and their number can be increased facilitating the writing of large amounts of data onto the Blu-Ray disc. This makes endless applications for the technology which has led to initiation of various researches in different fields. 

Download Seminar Report on Blu-Ray Technology.  

CSE Seminar Report on Microsoft Surface

Introduction to  Microsoft Surface Seminar Topic:

A new milestone was achieved by Microsoft with the announcement of Microsoft Surface.  Microsoft surface has a 30-inch touch screen with five cameras to sense the objects mounted on the screen. It is capable of recognizing multiple gestures simultaneously. The screen has discarded keyboards and mouse. Not only does it recognize finger touch, but also tracks the movement of paint brushes. The device is capable of recognizing objects by scanning their barcodes.

 Now getting on to the components of Microsoft Surface, it consists of a screen with a projector, an essential CPU and an Infrared. Microsoft Surface has been provided with an advanced screen to recognize objects placed atop by their shapes also one of the unique features of the device. Live wallpapers have been introduced advertising its superior touch. The projector displays a 1024 x 768 pixel image, while the 850-nanometer LED light source in the Infrared picks up a 1280 x 960 pixel image. It contains a Core 2 Duo processor, with 2GB RAM and a 256MB Graphic Card along with the necessary wireless communication using Wi-Fi, Bluetooth and the upcoming technology of NFC (Near Field Communication).

Microsoft surface brings a whole new set of applications designed especially for the simplicity of the user. This increases its scope of use in all kinds of activities. Though the best, Microsoft Surface poses its own problems to the common user. Even if one neglects the high price, the size and energy consumption of the device makes it hard to be used by the common man.

Microsoft Surface has a wide range of applications. The basic applications such as photos, music and games are available with the device. Real life applications include the use to pay bills using credit cards. Microsoft surface can be introduced in restaurants, electronic stores and bars. As of now, there are unlimited applications possible. The launch of the device and the applications it holds would help us get a better understanding of the fields in which it holds a promising advantage over the other devices.

Download CSE Seminar Report on Microsoft Surface.  

Internet Protocol Version 6 Presentation

Introduction to Internet Protocol Version 6 Presentation:

When we talk about IP means Internet Protocol we generally deal with the address space .The address space would be given for private and public use of private which technically termed as private address space and public address space .So there was reason to tackle this address space issue in more effective in economical manner.

When we speak effective it means it should work in any situation, this situation could be any technology that we use. The technology can be applied to any device. Thus the essential goal is to deal with address space; keeping this in mind Ipv6 was generated. 

Generally when we deal with Ip address we have a subnet .This subnet is used to mask the IP address so that it can deal with host address or network address, thus any kind of address is decided based on what is needed. 

Another primary reason for creating the IP is the population on earth, since Ipv4 cannot afford single IP address to this many people, Ipv6 solves this problem. 

Moreover there is no need to translated Ip address using address translation technology as was the case with Ipv4. 

There is importance of packet sending in Ipv6 also as was the case with Ipv4 because of the following reason: – – –

Transmission of a packet to multiple destinations in a single sends operation, this form the bases of specification in Ipv6. 

When we are going to deal with Ipv6 we would look at lot on size. This size can be in being in form of bits. Say subnet size of Ipv6 is generally seen to be 64 bits. 

The Internet world is changing constantly and thus reason for better address space addressing needed. Thus Ipv6 is special designed protocol that would deal with fast changing Internet World.

Download Internet Protocol Version 6 Presentation.  

IP and IPv6 Seminar Report

Introduction to IP and IPv6 Seminar Topic:

Ip address consist of A network address and a host address. Eg.132.139.100.1 where number that is red is network address and number that is orange is host address. So what exactly we may think this IP stands for: A IP generally stands for Internet Protocol. 

To manage this we generally used the IPV4 address space, but as time passed on their was thought that we would shortage of address space for IPV4 so IPV6 was developed

If we calculate the bits of Ipv4 it as follows:

Source and destination addresses are 32 bits (4 bytes) in length. 

IPv6 address is 128 bits long and consists of groups of four hexadecimal digits separated by colons.

Eg. Suppose you have a website with some domain address . Say www.ademoexample.com then its IPV6 address would look like 3102:30f0:2001:61::2  ie  16-bit blocks are set to 0 in the colon hexadecimal format which is  compressed to “::”  where“::” stands for double colon. 

What more in general was the reason to create IPv6.One was the reducing cost for end host so that appropriate address is assigned. Second is the better performance for the end host. 

Ipv6 fragment packets which are counter IPv4 header does not identify packet flow for QoS handling by routers. Source and destination addresses are 128 bits (16 bytes) in length.

Since we see that host address play a crucial role in Ipv6.Thus the use of host address resource records in DNS is to map hostnames to Ipv6 address. 

Now let’s see on how well this go with the current trend ,we say about 3G technology in mobile .The first question that comes in mind is, Do Ipv6 have been created keeping this in mind? The answer is yes since it works with latest 3G mobile technologies .This possible due to hierarchical mobility and better router optimization.

Download IP and IPv6 Seminar Report.  

Seminar Report on IP Telephony

Introduction to IP Telephony Seminar Topic:

Today in this modern world we speak about communication, network, application .All this have some connection in some sense or another.

We know about IP which stands for Internet Protocol  

The technical definition is as follows

IP telephony is the integration and convergence of voice and data networks, services, and applications.Notice this were the things we were talking about as above and now such a system is created. When we speak about IP Telephony it generally works real time

Now let’s see the various types of IP Telephony generally used

1.PC to PC           2. Phone-to-phone over IP

3.PC-to-Phone    4.Phone-to-PC 

PC to PC

Internet required for both party provides by Internet Service Provider (ISP).

Thus in this scenario we have a caller and a sender.

The caller must need here to know the IP address of the sender.

Both caller and sender here are therefore able to have voice communication established between them. 

Phone-to-phone over IP

Here we have a wireless network, where there is a sender and receiver. There is a managed IP network it is managed through gateways. 

PC-to-Phone 

Here we have two devices one is PC and second one is phone .PC is usually connected with the ISP and phone end is connected to a network using gateway .The gateway is generally useful for sender. Because all call is maintained of sender due to gateway. 

Phone-to-PC

Here we have two devices one is PC and second one is phone.It is similar to PC to phone with only the difference that the calling party is the telephony user and the called party is the PC user. 

The main reason to use IP telephony is cut down the cost ,increase productivity .It is also helpful to make IP calls ,this call can be made anywhere in the world to any telephone.

Download Seminar Report on IP Telephony.  

Management of Infrastructure projects for Civil Engineering

Introduction to Management of Infrastructure System Project:

This topic is a much interest for business enthusiast person

But this material would make it interested to even a general person.

Introduction

Since the computer system come into existence the way we do our work has changed .Since technology constantly changes there is a constant change in software and hardware and we need to upgrade the given system.

Now let’s try to understand how provisioning come into picture

The key is where we are managing our data .Since managing data at right place by right person would indicate the usefulness of data.

Here I am going to take one sector of business and then target on its Management Of Infrastructure Provisioning it is Telecom.

Provisioning of Telecom is known as Telecom Infrastructure Provisioning. 

This industry was developed with the aim that it will connect people in no time irrespective of the location .Well we see the result in front of our eyes.

Now how did this industry achieve this target by emerging the latest technology and support of millions of customers made the telecom market one of the best market in the world? 

We as a normal person can visualize the growth of the telecom industry just by seeing its market share.

The telecom industry role is played by both in government and private company. 

Now let’s to focus of how the telecom industry positions itself in our country India.

Many company’s such BSNL, Airtel, Vodafone, Uninor etc the players of Telecom Industry has certain market share.

This market share is based on number of subscribers, the network, the location popularity and various factors necessary for a given circumstances.

Now days we emphasize more on environment so the main goal of this sector is to look on how effectively they can carry their goal.

This is usually done for Environmental Impact Report by Carriers.

Download Management of Infrastructure project Report for Civil Engineering  students. 

Seminar Report on Iris Recognition System

Introduction to Iris Recognition System Seminar Topic:

Before knowing what an Iris is? Let’s see this diagram to conceptual understand what and where an Iris is.

Diagram 

irish system

The basic functionality of Iris is it controls the amount of light that enters the eye.

Now we think into create a system /prototype named Iris Recognition Prototype.

So how to make such things possible? Is next question for the developers, as such things seem impossible at first go. 

This topic is much interest for a biology student, but since we are a developer we need to build some interest in understanding the work before building the prototype. 

A inspiration to create such a system

Actually there was a science fiction in Hollywood where we see that the main character undergo an eye transplant so that his identity would be changed but he used his original eyes to get access to restricted location. 

Now I think there is some motivation as a developer for getting interest to build such a system.

The next question that comes in mind of a developer do we have any technology to build such system at this time .The answer is yes.

Sounds good, so what technology can make this thing possible. The key answer is bio metric system.Thus a bio metric system is generally used to verify a person identity. 

Now since we need to perform such a huge task, advance database should be used along with biometric system to store the information

The database generally in basically consists of Iris images.The Iris images are stored on particular resolution after applying some key algorithm that is essential. Here each task plays some importance to the task we perform manually.

The central aim of creating such a system is uniqueness .If such a system exist it can easily replace finger pattern matching system or face reorganization system.

Download Seminar Report on Iris Recognition System . 

Project Report on Audio Watermarking

Introduction to Audio Watermarking Project:

Audio water marking technical white paper is a presentation in engineering seminar showing the needs of audio water marking in this present day situation.

Digital data is of audio or video and it is represented by 0 or 1 of binary bits.

The data can be stored for long period without damage. Because of public exposure, the property of data can be loss by the number of ways such as mp3 compression, low pass filtering and amplitude scaling.

Audio watermarking is a new technique which protects the audio data, the data will not be lost.

The features of audio water marking are transparent, robust, efficient and independent. They are of two types.

One is temporal water marking and the other is special water marking. In temporal water marking, the water marks are hidden directly into the digital audio signals in the time domain.

Where as in special water marking, it applies the transfer of frequency such as FFT, SCT and DW and the water marked information is veiled under the transformed data.

Audio watermarking can be applied by DC level shifting in which watermark is embedded by shifting the DC level of the audio signal. And this DC level of audio signal does not need the original signal and the water mark and there is no robustness to filtering as water mark is embedded to all frequency bands.

Brand division scheme (BDS) and Spread Spectrum scheme (SSS) can provide protection against the mp3 compression. It is conclude in the seminar that water mark can be embed in an audio signal without detection and being perceived as required. It is extracted without the original signal. The water mark is known as blind otherwise public audio water marking.

Download Project Report on Audio Watermarking . 

Watermarking Digital Audio Seminar Report

Introduction to Watermarking Digital Audio Seminar Topic:

Water marking is the process of embedding information into a signal (Audio (or) video) that is difficult to remove the information is carried in the form of signal. If the signal is copied then the information is also copy. A signal may carry several different water marks at the same time. The protection is very important to water mark. Here we are discussing one of the techniques of audio watermarking (SSW). In this technique a narrow band signal is transmitted over a much large bandwidth so that the signal energy presented in any signal frequency is undetectable, and it has a feature that it destroy such watermark requires noise of high amplitude to be added to all frequency bins.

Audio watermarking salient features:

There are some special features for the audio watermarking that s transparent, robust, efficient and independent. It may be classified in two ways.

  1. Temporal watermarking
  2. Special watermarking.

Temporal watermarking:

In this watermarking system the watermark are hidden into the digital audio signals in the time domain.

 Special watermarking:

In this system transfer of frequency is applied such as FFT, SCT & Digital water.

A bit of audio watermarking application:

DC level schema is applied for the audio watermarking. In this schema the DC level shifting in which water mark is embedded by shifting the DC level of the audio signal. And the audio signal does not need the original signal and the watermark. There is no robustness for the frequency marking for filtering as watermark is embedded to all frequency bands. The spread spectrum scheme (SSS) can provide protection against the MP3 compression. A seminar has been prepared in that seminar it is concluded that the watermark can be embedding onto an audio signal wit out detection but being perceived as required. 

Download Watermarking Digital Audio Seminar Report.