Analysis of OpenCL on CUDA Platform IIT Thesis for CSE Students

This Thesis is about the study of the OpenCL. It is considered as a framework where programs which are written can be executed on multiple platforms which consist of several units like central processing unit, processors, and also graphical processing unit.

OpenCL is capable of performing the computations in a parallel manner. The parallel execution can be either task based or even can be data based. The main aim of this project is to study the new platform OpenCL which is launched in recently.

There is a huge development from the past years in the field of the High Scale Computation especially much development is observed in the field of the General Purpose Graphical processing unit.

With the feature of the platform independency OpenCL is demanded by many when compared to that of technologies of CUDA. Which are capable of performing the computations on fixed number of graphical card.

When we compare the non CUDA, then we have only option of the heterogeneous system called OpenCL for the sake of the high scalable feature and when we speak about CUDA we have options either OpenCL or even CUDA.

In this project a comparison is done based on the performance of the two systems which are CUDA based systems. Based on the performance we will reach to the conclusions which will more suites for the demand of high scale computation.

We can conclude that OpenCL is capable of performing the computations in a parallel manner. The parallel execution can be either task based or even can be data based.

Download Analysis of OpenCL on CUDA Platform IIT Thesis for CSE Students.  

Latest CSE Seminar Topic on An Operating System for Multicore and Clouds

Introduction to An Operating System for Multicore and Clouds Seminar Topic:

An Operating System for Multicore and Clouds CSE seminar topic explains about an operating system for the multicore and clouds. And also all its mechanisms and also the implementation are also provided. For providing the efficient computing capabilities for the user, both the cloud computers and also the multicore processors provide an efficient hardware. 

In order for the user to enjoy the computational capabilities the operating systems are needed for the hardware. The existing multicore systems are not capable of supporting number of cores and also not even clouds. 

In the present days the cloud systems creates complexity to the user that he needs to manage the individual virtual machines and also requires to deal with the concerns at the system-level. FOS is considered as an operating system for single system image over multicore and also the cloud systems. 

FOS is capable of meeting the challenges by dividing the operating system into a number of services of the system. Further the system is decomposed into number of independent servers so that the communication is possible via messages. The main goal of this paper is providing an operating system which can serve both the systems of cloud and also the multicore. 

The systems of the cloud computing and also the multicores has provided classes for the application development and but also face some challenges. The challenges can occur in the resource pools and also the computing infrastructure. FOS allows the developer for focussing on the application-level problem without any distractions in the system infrastructure. 

We can conclude that for providing the efficient computing capabilities for the user, both the cloud computers and also the multicore processors provide an efficient hardware. 

Download Latest CSE Seminar Topic on An Operating System for Multicore and Clouds .  

An Asynchronous Leader Election Algorithm for Dynamic Networks B.tech Seminar Report

Introduction to An Asynchronous Leader Election Algorithm for Dynamic Networks Seminar Topic:

This seminar topic is about the Asynchronous leader election algorithm. This is the famous election algorithm which is used in the dynamic networks. In the dynamic network the topology of the communication changes frequently. This algorithm is used for asynchronous networks. 

The implementation of this algorithm is based on the ideas of the routing algorithm by name TORA. This algorithm is a routing algorithm used especially for the mobile Adhoc networks. In the implementation of this algorithm whenever there is a change in the topology each component which is connected has a unique leader. 

This TORA makes use of the various algorithms like wave algorithm so that the logical direction of the communication can be reverse. In this algorithm if at all a node has lost its lastly outgoing link then it will start searching for the leader. In case if it does not get path to the leader it makes itself as leader. 

In this algorithm it can capability of selecting any node as the leader and also involves the less number of the messages when compared to the other algorithms. For messages it focuses on point-point communication other than preferring the broadcasting. 

The main functionality of the leader of the network involves communication. It ensures a clear and also the transparent communication in the network. A network leader is capable of identifying and also can access sources of the knowledge with and outside the network.

We can conclude that this is the famous election algorithm which is used in the dynamic networks where the topology of the communication changes frequently. and also this algorithm is used for asynchronous networks.

Download An Asynchronous Leader Election Algorithm for Dynamic Networks B.tech Seminar Report.  

An Alternative to Captcha – Video Captcha B.tech CSE Seminar Report

Introduction to An Alternative to Captcha – Video Captcha Seminar Topic:

This Seminar Topic is about the Video Captcha. It is the technique which is used for implementing the content based video as the Captcha task. These captacha’s are being generated from various sources like YouTube videos which are uploaded by the people. The grading of the videos is given by the usage of all tags which are related to videos. The rate of the success will be around 70% to 90% whereas the attack rate drops drastically to 13%. We can find a better performance of the video Captcha when compared to that of the existing Captcha in terms of usability and also the security.

The video Captcha is the first technique which is capable of distinguishing the humans and also the machines using the videos. Also its properties which are desired are described in the introduction. The challenges are graded automatically. Also the grading can be parameterized so that a balance exists between the usability and also the security. The results which are conducted on the user studies conclude that the video Captcha is considered as a replacement to text-based Captcha.

The main purpose of using Captcha is for avoiding the misuse of the online services which makes programs of creating thousands of the free emails and then used for sending SPAM. The types of the Captcha includes the recognition of the character also the speech recognition and also the understanding of the images.

We can say that the results which are conducted on the user studies conclude that the video Captcha is considered as a replacement to text-based Captcha also we can find a better performance of the video Captcha when compared to that of the existing Captcha in terms of usability and also the security. 

Download An Alternative to Captcha – Video Captcha B.tech CSE Seminar Report.  

AMOEBA Study of Distributed System PPT Presentation

Introduction to AMOEBA Study of Distributed System Paper Presentation:

The paper is about AMOEBA. It is the operating system capable of connecting a huge variety of the individual machines over a network to form a huge computer. It was developed at the university by name Vrije in the location of Amsterdam by the person name MR. Andrew S. Tannenbum.

This AMOEBA system is capable of connecting the multiple AMOEBA systems into a single coherent system. This objective is attained with the help of the objects and also their capabilities in a uniform ways.  The main aim of the amoeba system is for building a system which is time sharing so that the network of computers will resemble as a single machine.

The design goals of the system includes Transparency i.e. the feature of being transparent, the other feature includes Distribution i.e. the distribution of the tasks among processes. The parallelism feature allows the processes to run in a parallel manner so that multiple tasks can be performed. Also involves the increase in performance.

The architecture of the system includes the client-server model, where the server will meet the client request. This system involves the three functions to implement firstly, the request call from a client and then the second function involves the get Request call and thirdly the function of PutReply on the server side.

We can conclude that the distributed system is more efficient in terms of reliability and also cost when compared to that of the time sharing system. It is the operating system capable of connecting a huge variety of the individual machines over a network to form a huge computer. And also Amoeba is the only distributed operating system which will implement the wide area network. This amoeba with the object and capability model becomes flexible and also easy to use. 

Download AMOEBA Study of Distributed System PPT Presentation.  

Clustered Computing Using Single Thread Space Presentation PPT

Introduction to Clustered Computing Using Single Thread Space Presentation:

This Technical Seminar Presentation is about the cluster computing. This cluster computing is implemented with the single thread space. Implementation of them has resulted in the higher performance from past some years. Their implementation is based on some of the factors related to the processors, even the memory and also the interconnection.

For achieving the SSI i.e. the single system image for the cluster computer is defined as a challenging task as the SSI is a complete transparency which is need of all resources and also the integration in a cluster. The clusters will depend on the network which is interconnected.

The computers will execute integration software so that the collaborative computing is achieved. It appears as a single system image by hiding the physical boundaries.

In case of the single thread space, the threads can easily move in between the machines. The threads which are running in the space are capable of sharing these resources which are created by the thread. It provides as a single system among all the threads that are being created by the process. In case of the multithreaded applications clustering is done as a new environment. 

Threads which are created in the user applications are capable of running at any node in the cluster. The total cluster is placed into the single computer system using a single thread space.

We can conclude that the cluster computing has resulted in the higher performance from past some years. Their implementation is based on some of the factors related to the processors, even the memory and also the interconnection.

Download Clustered Computing Using Single Thread Space Presentation PPT.  

Final Year CSE Seminar Report on AMD’S Bulldozer Architecture

Introduction to Final Year CSE Seminar Topic on AMD’S Bulldozer Architecture:

 This CSE Seminar Topic is about Bulldozer. Bulldozer is considered as an Advanced Micro Devices abbreviated as (AMD) Central processing unit the codename which is given for the server also the processors of the desktop are introduced in the month of October 2011.

The processor Bulldozer is designed from the initial stage but not as an extension of other processors. The development of it aims at around 10-125 watt products which are for computing. AMD has resulted in the improving the efficiency of the performance-per-watt in the applications of high-performance computing applications with the implementation of the Bulldozer processors.

The processor is a dual core block which is capable of supporting two threads for the execution. It is capable of placing from the mainstream clients to that of the servers. The architecture of the bulldozer works with two integer cores. Each possesses 2 ALU’s and 2 AGU’s capable of executing operations which can be either memory or even arithmetic per clock cycle. The execution pipeline provides hardware such that the performance increases in case of the multi-threaded applications.

In this paper when we speak about the module have two cores, this Bulldozer when compared to that of the Intel core provides the Hyper Threading. Where Bulldozer provides the scheduler and also the integer units for each thread and Intel’s core is capable of accessing all the available resources but not the individual thread information.

In this paper we have discussed about Bulldozer. Bulldozer is considered as an Advanced Micro Devices abbreviated as (AMD) Central processing unit the codename which is given for the server also the processors of the desktop.

Download Final Year CSE Seminar Report on AMD’S Bulldozer Architecture.  

Hacking A New Perspective PPT Presentation

Introduction to Hacking A New Perspective Technical Seminar Presentation:

In Hacking A New Perspective Technical Seminar Presentation we discuss about hacking and understanding hacking objectives, also the techniques which are involved in hacking and also the dangers caused to our computer system.

 Hacker is a word which has two meanings i.e. a hacker is one who likes to play with software or systems and also eager for discovering the new ways to work electronically. Sniffer is defined as a program which is capable of capturing the information over the network of the computers. The type of the sniffer includes the commercial and also the underground. 

Many security credentials are not critical by themselves. But exploiting several credentials at the same time can cause damage to the system. Phisher is defined as the webpages which are developed for hacking purposes. They look similar to that of the authorized web pages. And once the user enters the details, these details are forwarded to the hacker. 

When we are dealing with the operating system like windows xp, it is required to even deal with the security and also the loopholes related with it. In this paper we have discussed the ways the hacking is performed. This knowledge helps us for maintaining the system for all applications in any fields. The hacking of windows locally can be done using the registry. In this paper we have also discussed about the precautions taken to control this and at the same time overcoming the faults are also dealt.

 In this paper we have discussed about hacking the techniques which are involved in the process of hacking and also its loopholes, along with the dangers caused to our computer system. 

Download Hacking A New Perspective PPT Presentation.  

CSE Seminar Idea on The Keyed-Hash Message Authentication Code (HMAC)

Introduction to CSE Seminar Idea on The Keyed-Hash Message Authentication Code (HMAC) :

The paper is about implementation of HMAC. This mechanism can be implemented with any approach of the cryptography with a shared secret key. The strength of the HMAC is dependent on the hash function properties.

The standard HMAC is used for applications which are required for the message authentication. The message authentication is done by using MCA. The applications of MACs which are being based on the hash functions of cryptography are named as HMAC’s.

The process of message authentication is as follows; firstly the sender of the message makes use of the HMAC function for producing the value, by considering both secret key as well as the message input. This MAC is delivered to the receiver of the message along with the message. The receiver will work on the message which is received with the key and compares then it compares the result with the MAC which is received. If a matching is found it is understood that the message was received in a correct manner.

The main aim of the implementation of MAC includes providing security i.e. providing authentication for the sender of the message and also ensuring the integrity so that additional mechanisms are not required. The functional requirements of HMAC’s includes the input as message and also has a secret key which will be exposed only for the originator of the message and also the receiver which it has to be delivered.

Even the limitations exist with this MAC layer, i.e. when we are dealing with security we cannot provide full assurance that the message passed is authentic. These limitations can exist with the non-authentic messages.

Web Spoofing Seminar PPT Presentation

Introduction to Web Spoofing Seminar PPT Presentation:

The paper is about the website spoofing. It is the process of creating a website in a fake manner such that the readers can be misled, that it has created by other different person or other organization. This process of spoofing will be similar to that of the design of the target website and even times it is similar to that of URL of the target.

The other process of the spoofing includes the usage of the ‘cloaked’ URL, Either by using the domain forwarding or can be either by inserting some control characters. This URL can appear in the same way as the genuine one when we are comparing with the address of the actual website.

To initiate the process, firstly the attacker will create a false copy of the original one with some similarities. These sites are capable of tracking the credential information related to usernames, passwords, and the credit card details. The false copy or the fake one will resemble in the similar manner of the original one. The attacker is capable of tracking all the false web pages.

The process of the spoofing will follow as, initially the message which is fake will be sent by the spoofer to the user. Then the user imagining it as the genuine site provides the credential information to the server. This spoofer is capable of tracking the information which is received from the server.  This information is used for performing the illegal actions.

We can conclude that the current technology is not able to avoid the web spoofing. This can be achieved by improving the security so that the spoofing can be controlled. 

Download Web Spoofing Seminar PPT Presentation.