Overview of Parallel Architecture CSE Seminar Topic

Overview of Parallel Architecture CSE Seminar Topic: Parallel computing is a process of computation in which multiple events are being processed and operating on a principle of splitting a large problem into smaller ones which further is processed concurrently. Concurrent indicates parallelism, simultaneity and pipelining.

Parallel events are occurred in many resources during the same time interval; simultaneous events are occurred at the same real time; and pipelined events are occurred in overlapped span of time. Parallel computing deals with concurrent execution of multiple programs in the computer.

The highest level of parallel processing is held among multiple events or programs during multiprogramming, multiprocessing, and time-sharing. Parallel processing is an execution of multiple tasks to solve a computational problem. Most primary reasons for using parallel technology are to save time, executing larger problems, cost savings, transmission speeds, taking advantage of non-local resources etc.

The computational problem has the ability to break a work into discrete pieces of work that is solved simultaneously, to execute multiple tasks at a time, and processed in less time with multiple resources than single resource.

Conclusion:

In today’s world, commercial applications are making use of parallel computers. A computer running an application is able to execute high amount of data in sophisticated method so we can imply that commercial applications may define future parallel computers design. But scientific applications will still remain the users of parallel processing technology. Nowadays, many parallel programming languages and compilers, are splitting a program into multiple processes and/or threads which to be processed concurrently with parallel architectures. Using shared memory or message passing systems, the operating system needs to form communication between the processes and threads. It should also support the operating system that detects, analyzes and manages the dependencies. In order to serialize the concurrent access to the shared resources, mutual exclusion technique is used.

Download Overview of Parallel Architecture CSE Seminar Topic

OOPS Through Java CSE Seminar

OOPS Through Java CSE Seminar: An object-oriented programming language such as Java includes many features that make it very different from any other standard languages. Java was designed to be cross-platform like C to compile binary form. In this PowerPoint, Java is compiled to an intermediate form which is called byte-code. A Java program cannot execute on the host machine. There is a special native program called the Java interpreter that reads the byte code and executes the corresponding native machine instructions. Hence to port Java programs to a new platform, an interpreter is needed to port some library routines.

OOPS programming language provides support for the following object-oriented concepts: Encapsulation, Polymorphism, and Inheritance. Encapsulation is the mechanism that binds the code and data which manipulates and keeps safe from misuse and interference. Polymorphism has the ability to take many forms of an object. Inheritance is that in which one object acquired the properties of another object.

Java has many advantages like it is secured, it is robust in memory management, it deals with multi threading programming and GUI programming, web based (applets), handling runtime errors, and network based applications.

Java editions provide a platform for developing and deploying secure, portable applications that run on server which are J2SE, J2EE, and J2ME. This programming language also provides support for Objects, Classes, Instance, Variable, data types, methods, and constructors.

Conclusion:

OOP is the technique to create programs based on the real world. Object-orientation is a set of tools and methods that allows software engineers to build user friendly, reliable, maintainable, well documented, reusable software computers that fulfills the requirements of its users. It is stated that object-orientation provides software developers with advanced tools to solve a wide variety of problems. Object-orientation provides the latest design of computation. This model programs are organized on objects and data. In OOP language the principal target is to find out the objects to manipulate and their relation between each other.

Download OOPS Through Java CSE Seminar.

CSE Computer Science Engineering Seminar Biometrics

CSE Computer Science Engineering Seminar Biometrics: The research paper states and explains various types of Biometric devices and their services. The following have been mentioned in the paper thoroughly.

  • Fingerprint identification.
  • Face recognition.
  • Iris recognition.
  • Hand geometry.
  • Signature recognition.
  • Retinal scanning

The research abstract suggests that the cost effectiveness of biometrics in education is astronomical. Alternative methods of biometrics are being used at a lower cost to both students and educational facilities.  Prices of finger-scan systems have been declining over the years. They are still relatively more expensive than other existing security solutions such as magnetic stripe cards and smart chip cards.

Download CSE Computer Science Engineering Seminar Biometrics.

Download CSE Seminar Biometrics to Ameliorate Authentication

This research paper Download CSE Seminar Biometrics to Ameliorate Authentication talks about the role of biometrics to ameliorate authentication.

It says that Biometrics is the science of using digital technology to identify individuals based on the individual’s unique physical and biological qualities. Simply, biometrics is the technique of verifying a person’s identity from a physical characteristic (i.e., fingerprint, hand print, face, scent, thermal image, or iris pattern), or personal trait (voice pattern, handwriting, or acoustic signature).

 The research paper extensively explains two main types of Biometrics:

 1.       Physical Biometrics

2.       Behavioral Biometrics

Scope of Biometrics: The research paper suggests that as a number of separate software and hardware vendors are included in the Biometric industry, each with their own interfaces, algorithms and data structures standards have emerged to provide a common software interface, to allow sharing of biometric templates, and to permit effective comparison and evaluation of different biometric technologies.

One of the more interesting uses of biometrics involves combining biometrics with smart cards and public key infrastructure a major recognition system, a fingerprint verification system, and a speaker verification system.

The paper posits problems in the area of biometrics. It says that problem with biometrics is how and where to store the user’s template. Because the template represents the user’s personal characters, its storage introduces privacy concerns. 

Furthermore, storing the template in a centralized database leaves that template subject to attack and compromise. On the other hand, storing the template on a smart card enhances individual privacy and increases protection from attack, because individual users control their own templates.

Conclusion:

The research paper suggests that the advances in accuracy and usability and decreasing cost have made the biometric technology a secure, affordable and cost effective way of identifying individuals. 

Biometric parameters such as fingerprint scanning, iris scanning, retinal scanning, hand geometry, signature verification, voice verification and others are all well established with their own particular characteristics.

The limiting factors of speed and band width are now a thing of the past and their practical performance might in many instances be better than expected. Today, Biometrics is an efficient and effective method of replacing passwords, tokens and smart cards.

Biometrics In Secure E-Transactions CSE Seminars

The research paper Biometrics In Secure E-Transactions CSE Seminars very clearly explains the indispensable role of biometrics for secure-transactions. The paper says that as technology has advanced there has been a negative side also hackers as spoofers steal/ misuse credit card numbers, even though the network has been made secure.

This paper proposes a multi-biometric model (integrating voice, fingerprint and facial scanning) that can be embedded in a mobile phone this making e-transactions more secure.

The research abstract gives some insight into Multibiometrics. It says that A multi-biometrics system is obtained by the integration of multiple individual biometrics models. Numbers of models integrating hand geometry, keystroke dynamics, face and iris recognition system have flooded the markets in recent years.

Need for Biometrics in mobile phones: The paper explains why should there be security device in a mobile. It explains saying that shopping through the internet has become very popular and surely, a WAP-enabled mobile phone provides the facilities to consumers to shop online.

Credit cards continue to be an effective tool for online money transactions. But, on the other hand, credit card’s number can be stolen on its way to its destination and can be misused by hackers. Thus, e-Business through a mobile phone becomes insecure.

The research paper talks about facial recognition as one effective feature of biometrics. It says that Facial recognition is considered to be one of the most tedious among all scans. Further, difficulty in acquisition of face and cost of equipment make it more complex.

The paper shows that even two persons having an almost similar face with a minute difference can also be differentiated. The research paper also casts light and explains in depth yet another biometric technique- the voice recognition.

Conclusion:

The research paper concludes saying that the mobile multi-biometrics can be embedded in the mobile phone. The phone is cost-effective since no special hardware is required and is highly secure. Thus, this mobile phone, if it becomes a reality, will provide more secure e-Business and E-Transactions.

Biometrics Finger Print Authentication Final Year Seminar

The research abstract Biometrics Finger Print Authentication Final Year Seminar elucidates Fingerprint authentication as a valuable tool for Biometric identification. The paper investigates correlation-based fingerprint authentication schemes that can be used for mobile devices.

The paper says that the investigated algorithms were implemented with a J2ME Environment on the application layer In order to reduce the resources demanded for the mobile device environment.

The research paper proposes a new hierarchical correlation-based scheme based on the idea that the overall authentication can be decomposed into partial autocorrelations.

Recent trends: The paper claims that only recently, a few products of biometric-enabled mobile devices have been announced available to consumers. However, different manufacturers tend to have their own standards and proprietary technology.

In most current commercial solutions, the biometric function is embedded in the system hardware and is expensive.

The paper suggests that J2ME applications should be designed to consume as little resource as possible. To meet this special requirement, a new hierarchical correlation algorithm for fingerprint authentication on mobile devices is said to be developed.

The paper talks about the implementation issues of J2ME. It says that the heart of Java 2 Micro Edition (J2ME) is a compact virtual machine (VM) whose basic functionalities are summarized in configurations.

Currently, there are two configurations available, each is defined for devices with similar computing power and equipment characteristics, namely connected limited device configuration (CLDC) and connected device configuration (CDC).

Conclusion:

The research elucidates various mathematical derivations to express the functionality in a better way. The research paper concludes saying that the hierarchical scheme has clear advantages over the full correlation method.

The paper suggests that there is often a tradeoff between execution speed and memory consumption, the proposed hierarchical method is slower than partial correlation algorithms. It is able to achieve reasonable authentication performance when plastic distortion presents in test fingerprints.

Purpose of Cryptography and Network Security CSE Final Year Seminar

The research paper Purpose of Cryptography and Network Security CSE Final Year Seminar explains what Authentication is. It says that Authentication is the process of proving one’s identity. (The primary forms of host-to-host authentication on the Internet today are name-based or address-based, both of which are notoriously weak.) . The following techniques have been mentioned and meticulously explained in the research paper.

Some experts argue that cryptography appeared spontaneously sometime after writing was invented, with applications ranging from diplomatic missives to war-time battle plans. It is no surprise, then, that new forms of cryptography came soon. after the widespread development of computer communications. In data and telecommunications, cryptography is necessary when communicating over any untrusted medium, which includes just about any network, particularly the Internet.

  • Privacy/confidentiality: Ensuring that no one can read the message except the intended receiver.
  • Integrity: Assuring the receiver that the received message has not been altered in any way from the original.
  • Non-repudiation: A mechanism to prove that the sender really sent this message.

The advantage of traditional cryptography is that it is usually much faster than public-key cryptography.

The main cryptography techniques mentioned in the paper are:

  • Block Ciphers
  • Stream Ciphers
  • Message Authentication Codes

The paper explains that In CBC mode each plaintext block is XOR’d with the previous cipher text block before it is encrypted. Because there is no previous cipher text for the first block, an 8-byte block known as the Initial Chaining Value (ICV) is used to start the process. Patterns in the plaintext are hidden by the exclusive-OR.  The ICV should be different for any messages encrypted with the same key, but it does not have to be kept secret and can be transmitted with the encrypted text.

Nearly all modern multi-user computer and network operating systems employ passwords at the very least to protect and authenticate users accessing computer and/or network resources. But passwords are not typically kept on a host or server in plaintext, but are generally encrypted using some sort of hash scheme.

Conclusion:

The research paper ends on a note that what CRYPTOGRAPHY Can Do.

It says that potentially, cryptography can hide information while it is in transit or storage. In general, cryptography can:

  • Provide SECRECY.
  • AUTHENTICATE that a message has not changed in transit.
  • Implicitly authenticate the sender.

Cryptography hides words: At most, it can only hide talking about contraband or illegal actions. One possible application for cryptography is to secure on-line communications between work and home, perhaps leading to a society-wide reduction in driving, something that all appreciate.

Download Purpose of Cryptography and Network Security CSE Final Year Seminar.

Cryptography and Network Security CSE Technical Seminar

The research paper Cryptography and Network Security CSE Technical Seminar speaks about Cryptography and its importance in securing the data from any foreign influence. Cryptography is the science of writing in secret code and is an ancient art. The first documented use of cryptography in writing dates back to circa 1900 B.C. when an Egyptian scribe used non-standard hieroglyphs in an inscription. In data and telecommunications, cryptography is necessary when communicating over any untrusted medium, which includes just about any network, particularly the Internet. Within the context of any application-to-application communication, there are some specific security requirements. The research abstract explains in depth all the above mentioned aspects.

The research paper explains three types of cryptographic algorithms:

Secret Key Cryptography (SKC): Uses a single key for both encryption and decryption

Public Key Cryptography (PKC): Uses one key for encryption and another for decryption

Hash Functions: Uses a mathematical transformation to irreversibly “encrypt” information

Types of authority have been explained in the paper:

Establish identity: Associate, or bind, a public key to an individual, organization, corporate position, or other entity.

Assign authority: Establish what actions the holder may or may not take based upon this certificate.

Secure confidential information (e.g., encrypting the session’s symmetric key for data confidentiality).

Different types of threats to the network and how cryptography deals with them effectively have been mentioned in the Research abstract.

Conclusion:

The research paper concludes on a note commenting about the effectiveness of network security. In this context it explains VPN.  A  virtual  private network ( VPN ) is a way to use a public telecommunication  infrastructure ,  such  as  the Internet ,  to  provide remote offices  or  individual users with  secure access to their organization’s network. A  virtual  private network  can  be  contrasted  with  an  expensive  system  of owned or  leased  lines  that  can  only  be  used by one organization. The goal  of  a VPN  is  to provide the organization  with  the  same  capabilities , but at a  much  lower  cost.

Download Cryptography and Network Security CSE Technical Seminar.

Network Security BE Btech CSE Seminar Report

The research paper Network Security BE Btech CSE Seminar Report speaks about how Network Security is achieved. This paper is based on practical techniques, tactics, of attacking and the concept and mechanism of their attacks. Thus for stopping the net criminals from intruding into the systems, the system administrator should know the drawbacks, loopholes of the OS, internet, and networking.

Attacks on the Server: The research paper describes the attacks on the server. One of the attacks described in the research paper is DOS attacks. Denial Of Service attacks (DOS attacks) are very common hacking attacks. It is defined as: An attack on the target system by a malicious attacker to render the normal services offered by it to legitimate users as unavailable or disable services..It involves the launching of an attack that will make the services offered by the target system  or normal services offered by the internet or a network system to a legitimate user.

Network Security BE Btech CSE Seminar Report Types of DOS Attacks:

1. Ping of death

2. Synflood Attack

3. Trojan Key logger attacks

4. Mail bombings

5. Port Scanning

How to block the ports: The research paper concludes on the note saying that the netstat command gives us a couple of open ports on our system or server.

  • Check the Trojan list and compare if the open port number matches any Trojan list. If it does get a Trojan remover and remove the Trojan.
  • WE can also remap the ports. This is an efficient method to secure our open ports. The remapping is done by the fact that instead of running a service on a well-known port, where it can be easily exploited, it better to run it on a not so known port. Thus a hacker will find it more difficult to find that service. This method is known as remapping.
  • ETHERPEEK is excellent sniffing software, which can easily trace the port scanner.
  • NUKE NABBER, a window freeware, claims to be an excellent port blocker.

There are other utilities such as PORT DUMPER, which can fake daemons (services) like Telnet, Finger printing, etc.

Download Network Security BE Btech CSE Seminar Report.

Cryptography and Network Security in Distributed Networking System Seminar

The research paper Cryptography and Network Security in Distributed Networking System Seminar defines what cryptography is and how it helps in providing security to shared information and data. It is said in the research paper that the explosive growth in computer systems and their interconnection via networks has increased the dependence of both organizations and individuals on the information stored and communicated. This in turn, has lead to a heightened awareness of the need to protect data and resources from disclosures, to guarantee the authenticity of data and messages and to protect the systems from network based attacks. Secondly, the disciplines of cryptography and network security have matured, leading to the development of practical, readily available applications to enforce network security.

What is meant by cryptography: The research paper explains the term cryptography and also explains how the process is achieved it says that the word cryptography means “secret writing”. However, the term today refers to the science and of transforming messages to make them secure and immune to attacks. The original message before being transformed is called plaintext. After the message is transformed, it is called cipher text. An encryption algorithm transforms the plaintext to cipher; a decryption algorithm transforms the cipher text back to plaintext. The sender uses an encryption algorithm and the receiver uses a decryption algorithm.

Symmetric Key Cryptography: The paper explains symmetric key cryptography. The symmetric-key cryptography algorithms are so named because the same key can be used in both directions. Here, the same key is used by both sender/receiver. The sender uses this key and an encryption algorithm to encrypt data. The receiver uses the same key and a decryption algorithm to decrypt data. In Symmetric-key cryptography, the algorithm used for decryption is the inverse of the algorithm used for encryption. The research paper explains the benefits and drawbacks of symmetric key cryptography.

Conclusion:

The research abstract ends on the note that the security mechanisms usually involve more than a particular algorithm or protocol. This usually also requires some secret information that raises the questions about creation, distribution and protection of that secret information which are major tasks that are involved in this science of cryptography.

Download Cryptography and Network Security in Distributed Networking System Seminar.