B.tech CSE Seminar Topic on Smart Retina Generic Gesture Tracking Platform with Report

Smart retina is known for its feature tracking platform and it is also used to create interfaces that are based on the retina. These interfaces are used for interaction through visual means and it can also operate without the need of using any sort of audio or text. Moreover, these interfaces acts as translators between the functions of the machines and gestures of the human. Plus, these are also self-explanatory at the level of introductory and the presentation of the gestures that are used for support serve as the reflex interface or the actual visual interface. The self – organization system is the best to explain these interfaces.

These interfaces are based on the retina that avoid the barrier of age and language. Smart retina acts as a translator between machine functions and gestures of the human. It also includes the audio, actuators and text usage. This also expands the capabilities of smart retina’s that too beyond the visual.

As per the scenario 1 this smart retina can act as a tool for navigation combined with the google. It also able to capture the gestures of the hand of the user’s making it easy to understand just like computer actions like down, zoom in, right, up, etc. with the operating system it then sends the commands to the required application.

The purpose of this project is to provide the input device with a vision based structure. A retina that is programmable can send commands by using his hand functions. There is a fusion between the processing and the acquisition functions that allows  adapting to the conditions of learning and for the scene of the dynamic range. The retina can computes more efficiently with its optical input and parallelism. In terms of motion detector this feature has excellent properties.

Download B.tech CSE Seminar Topic on Smart Retina Generic Gesture Tracking Platform with Report.

Skew Heap in Data Structures

A heap data structure that is implemented in the form of a binary tree is known as a skew heap. These are very beneficial especially because of the merging capability which is quite more than the binary heaps. In comparison to the binary heaps there are no constraint structures which mean there is no guarantee that the tree height will be logarithmic. For this only two conditions are must firstly the general heap used should be enforced and secondly, the use of special heap merge is necessary for the merging of every two skew heaps.

A skew heap is nothing but only advanced and self-adjusting version of the leftist heap that can balance by thaw swapping of nodes unconditionally during the merging of two heaps in the merge path. In case of removing and adding values these merge paths are used. A skew heap will be of no use without the structural constraints. According to the complexity analysis it can be used for the demonstration of all operations of a skew heap in O (log n).

We can use the leftist heap in case of merging two skew heaps. This is the same process that is stated above. It helps in

Comparing of two heap roots

It also swaps the new heap

It merges the heap having the long root with the correct sub tree of the other heap.

It merges the result of the correct sub tree with a small root heap.

This is a non recursive process which does not give ant perfect sorting but tends to clear the things a little bit.

Merging a new tree to the node of another heap or original tree is like adding value to a skew heap. The main mode is further linked that becomes the new root itself. 

Download Skew Heap in Data Structures Reference Material.

Servelets in Java Reference Material

The servlet is a mini program for server side and it is used to design protocol and dynamic web pages. It can only be executed and loaded on the web server. The server’s outlet is usually sent to the client as a part of response and it comes in the format of MIME. The issues of security that are associated with Java applet are not applicable for the purpose of serving as clients can get output from servlet that is tempered by a virus. If your web server is behind the protection of the firewall then your server will also be highly secured.

Working of servlet-:

Moreover this is program of server side and thus processed only on the requisition from the client. The client makes request usually with the help of the browsers or any other kind of pages. The request is sent by the browsers of the clients as an HTTP request. This I located by the web server using the web container. the engine of servlet execute the request and generate the clients’ response in the MIME format. Further the server deployed it into various other pages.

There are two kinds of pages- Dynamic and static web pages.

Static web pages are created with the help of HTML, CSS, language of scripting, images and others. It gives an equal view to all clients and can be loaded and executed through the web browser and server respectively after the total download only. The static page source code can be viewed by the clients and it also cannot store data of the users on the servers. Authorization cannot be handled by static web pages.

Dynamic web page is designed using programming of server side like servlet, PHP, Asp, and others. Moreover it can load using web browsers as well as executed using the same. The dynamic page output is further sent to the client and is also capable of producing different views of various clients.

Download Servelets in Java Reference Material.

Latest CSE Seminar Topic on Sky X Technology

Introduction to  Seminar Topic on Sky X Technology:

For providing  the service of private network access and internet over a long distance as well as to remote areas satellites are the best option. Currently the throughput over the use of satellite networks is restricted only to a fraction of bandwidth that is available. For satellite conditions internet protocol is not optimized. With the use of sky XX protocol this restriction can be easily overcome.s The server system of Sky X gateway and Sky X clients can replace the TCP link of over satellite with the optimized protocol for the latency asymmetric conditions of bandwidth high loss and other factors of the typical communication of the satellite.

Adding the system of Sky X to the network of satellites that allows the clients to take the advantages of the bandwidth that is available. The gateway moreover makes the increase the performance of the clients without any kind of modifications on the part of the server of clients on the satellite network.

The server for Sky X and the client Sky X can enhance the working ability through high speed of data transmission with the help of the satellites directly at the user’s end. It also helps in increasing the performance of the web almost 3 times and even more it also enhances  the speed of file transfer by 10 to 100 times. This system does not need any sort of changes on the users end or servers. The products of Sky X are known as protocol gatewayTCP performance enhancing proxy or TCP in short.

It is also known as satellite spoofer and are available always for installation of hardware solutions. This can be added to any kind of the satellite network. Plus the family of Sky X includes the gateway. Client, server and the OEM products. The gateway is a perfect solution for all hardware’s.

 

Polytechnics Seminar Topic on Digital Library in an Academic Environment with Report

Introduction to Polytechnics Seminar Topic on Digital Library in an Academic Environment:

With advancement in the information and communication technology along with the globalization in the internet and related telecommunication systems the human sphere is virtually getting impacted highly. In the field of science, humanities and engineering it is the computer that acts as the basic needed equipment and stands at the top of the list. Social and technological development that began during the end of the 20th century altered the functions and traditional accomplishment of the libraries like that of selection preserving organizing, thus making it easy for accessing the information’s that are stored in the libraries.

A radical changing period is faced today by almost all the libraries followed by alteration in electronic information sources and low priced microcomputers. These have further changes the functioning of the modern libraries. The rapid popularity of internet has reshaped the distribution of economical informations and feasibility. It also altered the ways in which the librarians used to perform.

The basic cost of digitization is very high but according to the experiments it shows that once this system is introduced then the cost of maintenance will be quite cheaper even lower than any traditional library maintenance. With time the prices of digitization are reducing and the publication through online is increasing.

The users’ needs are shifting with time to a new environment and thus there is no need to say that after two years or so all the libraries will be digitized. This system is designed to benefit the users who can use it directly from the desktop of their own computer. Although the system is very upgraded and is highly beneficial  but still the role of the librarian at any cost cannot be excluded. For information on packaging and repackaging which are required in digitalized libraries for electronic publishing, purpose of reference, to advice about the strategy to the users etc.

Download Polytechnics Seminar Topic on Digital Library in an Academic Environment with Report.

Platform Visualization Seminar Topic with Report for Computer Science Students

The visualization is the advanced software technology which is defining the IT and conceptual changes of the computing. Currently the x86 computer hardware capable of single operating system and the one application. The devices are not using completely. The visualization is meant for the operating imaginary operating systems on the same system by sharing the applications in multiple interfaces. The computer can operate the various operating systems and various applications at a time.  

The Project consists of the single operating system on one computer and system installed with the more operating systems.  The use of the systems is very less than what actually uses and capability.

The Project Virtualization brings the system capability to run more than one operating system on the single system. The Purpose is to use the system efficiently.

The virtual infrastructure enables the user to use the system as multiple systems in the single infrastructure. The virtual systems posses four important features.

  1. Compatibility: The Virtual system will host the provided operating system and applications and all required components. The Virtual systems are compatible to other x86 operating systems, applications and the drivers.
  2. Isolation: The Virtual system still becomes isolated by using the other operating systems and applications.  For instance the four Virtual systems run on single system and if one Virtual system collapses the three will run.
  3. Encapsulation: The Virtual hardware resources are packed in a single system. This makes user to handle and use the system easy. For instance one Virtual system can be moved to other Virtual software.
  4. Hardware Independence: The Virtual machines are totally independent from the physical hardware. For instance the Virtual system posses the Virtual components are independent from the system that are using. 

Download Platform Visualization Seminar Topic with Report for Computer Science Students.

CSE Latest Technical Seminar Topic on Pill Cameras based on Nanotechnology with Report

The purpose of the nanotechnology is developing the advanced products in big volume and good quality. The existing technology has achieved the high quantity production and still to improve the manufacturing which is currently producing the products in big volume level. The volume has to be reduced for the products to use it for the minimum space or molecular level.

The research in molecular level had already started in the 1980’s. The molecular level manufacturing was not taken seriously. The introduction of the Nanotechnology, it has become true to manufacture it at molecular level. The manufacturing at molecular level in the field of the Nanotechnology has invented one product called the Pill Camera that is useful for the cancer, ulcer and the anemia treatment. The Pill Camera has brought the new scope in the medicine.

The Pill Camera is the very small capsule that goes to the body and desired location without causing any injury. For example the Pill Camera goes to the intestine and takes snaps that is sent to the computer system to evaluate the digestive system. The Pill Camera has some demerits and it can be replaced by the applying the grain size motor and the bi directional wireless telemetry capsules. Also the manufacturing of the tiny products by the Nanotechnology can be observed. The other applications and very useful techniques are the results of the Nanotechnology shall be discussed.

Existing System

The current system consists of the endoscopic examination of the intestine which is done by sending of pipe by mouth to the intestine. But this pipe cannot go to complete intestine of 20 feet.

The Proposed System

The Pill Camera consists of the device called the Diagnostic Imaging System assembled in the capsule posses the camera, lights, transmitter, battery. The camera is disposable. The camera takes various snaps of the intestine of high quality pictures. The System is 26 X 11 mm size and the transmits 50000 digital images. The chip used is the IC CMOS image sensor for taking images. The data send to the computer system to evaluate. 

Download CSE Latest Technical Seminar Topic on Pill Cameras based on Nanotechnology with Report.

CSE Term Paper Topic with Report on Fuzzy Set Theory In The Context Of Database Security

The Database Management System is a combination of the data and the programs to retrieve the data. The Database technology has put the huge image in the field of computers. The Database are now implemented in various areas like business, e- commerce, engineering, medical science, law, academic, library etc. 

The database posses collection of the similar data. For instance the telephone directory that posses the names, addresses, telephone numbers, profession. These all details are stored in somewhere previously in the diary of index book and now in computer in the MS Excel or MS Access. The information is the Database. 

The Project Fuzzy Set Theory is developed particularly for mathematical problems that are not accurate and unsolved by the human cognitive behavior by their intelligence. The traditional approach is unable to solve the concept of Fuzzy Set Theory. 

One example is the implementation of the Fuzzy Adaptive Resonance Theory with the neural network for identifying the abnormal intrusion detection in the Database operation. We have developed the Integrated Fuzzy set theory and the intrusion detection technique to identify the Hidden Anomaly in the Database that is accurate in real time. This technique is useful to measure the fractional number between the Zero and the One. We are calculating a fraction of the integer 1 with its uncertain degree. 

The conclusion of the Project is to protect the computer system from hacking and unauthorized access. The system administrator has less option to protect the systems. How ever the firewalls and the Intrusion Detection System are provided the solution for the protection. The more advanced technique is now developing known as the Intrusion prevention systems. The system has integrated techniques of the firewalls and the Intrusion Detection System to detect and inhibit the abnormal behavior. The preventing of the attacks is done by seeing the application layer information in the packets. The system is still more to be protected. The changing of attacks varies. The Fuzzy set theory is helpful and still need to be more developed. 

Phantom Computer Science Technical Seminar Report

The Phantom is a Personal Haptic Interface machine which had been developed at the MIT for the receiving of the feedback from the virtual objects. The Phantom was low cost device. The Phantom is a robotic arm which is connected to the computer and applied for the pointing in three dimensions.

The characteristic features are the low cost, very little size and the ability to simplify the complex information. The Phantom makes the users to get connected with the virtual objects and control the remote manipulations. The device does not show information for the various points, it just provide the high grade feed back for the simulation of the particular point. For instance one closed his eyes and keeping pen in his hand and get near to every thing in the office.

The recognition of the object gives an idea of the details of the particular object. The Phantom haptic interface implements the three dimensional movement that develops the force feed back system accurate than other haptic devices. The applications of the system are many. The medical simulation for training to surgical methods and the three dimensional painting on 3D clay modeling for the designing. 

The Phantom works when the user interacts with the device by using finger tip that contact with the physical objects. The device also gives the user to interact with the virtual objects. The device is a device that are connected to the computer.

The user can touches the thimble that is assembled with the mechanical arm. The Phantom regulated with the help of DC motors consists of the sensors and the encoders. The encoders trace the users movement in the x,y,z coordinates and the motor follows the forces exhibited on the user in x,y,z axis. The haptic systems analyzes the sense of the user and send the feed back in real time. The Phantom has many advantages and applications in many field.

Vocational Computer Training Programme Project

The Vocational training included in the higher education develops the student technically skilled which is very useful any where as career growth. The Vocational training is made to equip the student with technical sound, skillful, resulting and effective technicians. The learner should see the well training program by estimating themselves in the training place. The learners or the students of the training program will get the exposure of the improving of productivity, the safety management and the overall development. 

The learners are supposed to absorb the fundamentals of the environment and its protection along with the development of skills to make the personal habits efficiently dealing with the environmental problems and immediate taking of the important actions at the work premises. 

The students performing exceptional in the training definitely appreciated to make the career in the computer as professional. The training program eases the eligibility criteria and anybody literate can join the program, whereas other institutions made the eligibility criteria like 10th or 10+2 pass. 

The candidates who are exceptional command and highly skilled will be eligible to get the stipend to encourage them to learn the computer and make the career in this field. The success as the career is depended on the perfection in the field. 

The Vocational training requirements in the place in any state by developing the systematic education and training in that place that is needed on the basis of the social- economic survey done. 

The aim of the Project has been the promotion of the Vocational computer training for the underprivileged society young people who has potential to get trained and make them self employed. The fees would be very less as they can pursue the training without the problem of the money. The unemployment can be reduced by the program. The backward people will be advanced according to the current trend.