Artificial Intelligence Final Seminar Topic

The research abstract Artificial Intelligence Final Seminar Topic focuses mainly on establishing the fact that ‘Intelligence’ is in the mind. The research abstract proposes a working hypothesis a Separability Hypothesis which posits that we can factor off an architecture for cognition from a more general architecture for mind, thus avoiding a number of philosophical objections that have been raised about the “Strong AI” hypothesis.

Challenges involved:

A major problem in the study of intelligence and cognition is the range of—often implicit—assumptions about what phenomena these terms are meant to cover. The research abstract raises some pertinent questions: Are we just talking about cognition as having and using knowledge, or are we also talking about other mental states such as emotions and subjective awareness? Are we talking about intelligence as an abstract set of capacities, or as a set of biological mechanisms and phenomena? These two questions set up two dimensions of discussion about intelligence.

Dimension 1: Is intelligence separable from other mental phenomena?

The research paper elucidates over Dimension 1 saying that – When people think of intelligence and cognition, they often think of an agent being in some knowledge state, that is, having thoughts, beliefs. They also think of the underlying process of cognition as something that changes knowledge states.

Dimension 2: Functional versus Biological

The second dimension in discussions about intelligence involves the extent to which we need to be tied to biology for understanding intelligence. Can intelligence be characterized abstractly as a functional capability which just happens to be realized more or less well by some biological organisms?

Conclusion:

The research abstract marches forth by asking how far intelligence or cognition can be separated from mental phenomena in general. The abstract then suggests that the problem of architecture for cognition is not really well-posed, since, depending upon what aspects of the behavior of biological agents are included in the functional specification; there can be different constraints on the architecture. The research abstract reviews a number of issues and proposals relevant to cognitive architectures.

Download Artificial Intelligence Final Seminar Topic.

Applications of Robotics in Medicine Computer Science Engineering Seminar

This research abstract Applications of Robotics in Medicine Computer Science Engineering Seminar talks about the multiple application benefits Robotics has to offer in the field of medicine. A survey conducted on Applications of Robotics in Medicine addresses sets of known achievements, singling out noteworthy autonomous in body devices, either co-robotic surgical aids, in view of recognizing shared benefits or hindrances, to explore how to conceive effective tools, tailored to answer given demands, while remaining within established technologies.

Applications in Medicine: The role of robots is a highly varied one. Robots in the field of medicine are used right from scrubbing the floors to collecting the blood samples of patients. The eminence of Robots has enhanced ever since and now the machine-man actually carries out a surgery. Robotic surgery is the process in which a robot actually carries out a surgical procedure under the control of its computer program. Although a surgeon certainly will be involved in the planning of the procedure to be performed and will also observe the implementation of that

plan, the execution of the plan will not be accomplished by them – but by the robot.

Robots in Tele-Surgery: In a method like this one an expert surgeon actually maneuvers the movements of the Robot from a distance. A robot, local to the patient, becomes the surgeon’s hands, while an intricate interface conveys the robot’s senses to the surgeon (making use of while an intricate interface conveys the robot’s senses to the surgeon (making use of visual, aural, force and tactile feedback).

Conclusion:

Although Medical Robotics is a highly challenging field, still it is in its embryonic state. There are several methods and security measures that ensue to see the field bloom to its full potential. Inclusion of Robots in surgery specifically is a matter that has lot many ideas to be considered. These range from The development, and international adoption, of safety standards the aim of task-specific, as opposed to general-purpose, robots the education of the medical community in the acceptance and integration of Robots.

Download Applications of Robotics in Medicine Computer Science Engineering Seminar.

An Overview of Secure Shell CSIT Paper Presentation

The research paper An Overview of Secure Shell CSIT Paper Presentation deals in creating greater security measures while working over internet. Internet- that has now almost become inevitable to the entire process of communication. A vast overflow of information in a given scenario like this needs an equally efficient security back-up. Secure Shell is a protocol that provides authentication, encryption and data integrity to secure network communications. This research paper elucidates the various security measures.

Scope of Secure Shell Protocol: Implementations of Secure Shell offer the following capabilities: a secure command-shell, secure file transfer, and remote access to a variety of TCP/IP applications via a secure tunnel. Secure Shell client and server applications are widely available for most popular operating systems.

Security Requirements: The research paper talks about the following security requirements.

  1. Confidentiality: the information being transmitted should not be accessible to unauthorized third parties.
  2. Integrity: Unauthorized parties must not be able to incorporate modifications in the data.
  3. Authentication: Both the parties must identify each other and must abide by the norms thoroughly.

Benefits of Secure Shell: The research paper identifies various benefits of Secure Shell Protocol. Secure Shell offers a good solution for the problem of securing data sent over a public network. The research paper talks about using Secure Shell and the Internet for securely transferring documents and work products electronically. It also talks about cost saving over other traditional methods of data/information transmission.

Conclusion:

The research paper talks about the Secure Shell technology and its indispensable value in providing with network security tools that help compliment system and data security. Secure Shell encrypts remote connections and helps administrators decide which means of authentication they require. Additionally, Secure Shell enables to create secure remote backups and tunnel other TCP-based traffic. Secure Shell secures your mission-critical data from eavesdropping.

Download An Overview of Secure Shell CSIT Paper Presentation.

Developing a High Performance Cache System Paper Presentation

The research paper Developing a High Performance Cache System Paper Presentation describes the cache memory as a key mechanism in improving the overall performance of the system. The paper aims at developing a high performance cache system.

 What cache does: Cache exploits the reference stream of the typical application. The research paper describes how cache functions in a given locality. Two types of localities are discussed in the research paper

  1. Temporal locality
  2. Spatial locality

The research paper also talks about ‘prefetching mechanism’ that reduces cache misses. Hardware-based prefetching requires some modification to the cache, but almost no modification to the processor core. Its main advantage is that prefetches are handled dynamically at run time without compiler intervention. In contrast software-based approaches rely on compiler technology to perform static program analysis and to selectively insert prefetch instructions.

A SMI cache is constructed in three parts; a conventional direct mapped cache With a small block size, a fully associative buffer with a large block size at the same cache level, and a hardware prefetching unit. The improvement in performance is achieved by exploiting the basic characteristic of locality.

Benefits of cache: Common design objective for the cache are to improve utilization of the temporal and spatial locality inherent in applications. However no single cache organization exploit both temporal and spatial locality optimally because of their contradictory characteristics.

Conclusion:

The research paper basically aims at designing a simple but high performance cache system with low cost, a new caching mechanism for exploiting two types of locality effectively and adaptively is designed: A direct mapped cache with a small block size for exploiting temporal locality and a fully associative spatial buffer with a large block size for exploiting spatial buffer.

Download Developing a High Performance Cache System Paper Presentation.

Advanced Security Measures in a Wireless LAN Computer Seminar

The research paper Advanced Security Measures in a Wireless LAN Computer Seminar is about the Wireless Local Area Networks or WLANs and how they metamorphosed the arena of Computer Networking. The growing demand of mobile computing devices, such as laptops and personal digital assistants, and a subsequent demand for continual network connections without having to “plug in,” are heralding enterprise WLANs.

Benefits of WLAN: Network Managers are vouching for the benefits of WLAN. This research paper talks about the multiple benefits of WLAN. WLANs are extremely useful in a scenario that requires almost a frequent shift of working space, and other geographical and spatial barriers (that interfere with the smooth functioning of processes). WLANs provide the freedom of working without being tethered by wires. The research paper speaks of various technologies that help in accessing networked data.

These days, there are four types of Wireless networks, ranging from slow and inexpensive to fast and expensive. They are: WECA (Wireless Ethernet Compatibility Alliance) -WI-Fi, Bluetooth, IrDA (Infrared Direct Access) and HomeRF.

LAN Security: WLAN security, that has been traditional so far, includes the use of Service Set Identifiers (SSIDs), open or shared-key authentication, static WEP keys and optional Media Access Control (MAC) authentication. This combination offers a basic level of access control and privacy. But like any other security systems this one is not free from shortcomings. The research paper discusses these things in depth.

How WLAN is attacked: Eavesdropping, tampering, utilizing antennas, war driving, malicious association, blue drive attack and some more explained in the research paper show possible threat to WLAN.

Conclusion:

The research paper offers some brilliant security measures. It suggests to have a single access point controlled via secure operating system like Linux. It is suggested in the research paper to occasionally boot up and trap sections of traffic to look for any attack signatures. The user must connect via a VPN, the access point is secured so it cannot be reset, WEP is enabled, and access point is in a position that limits travel of the radio frequency outside of the premises.

Download Advanced Security Measures in a Wireless LAN CSE Computer Science Engineering B Tech/ BE Final Project Paper Presentation and Seminar PPT..

Cyborgs – An advanced Robotic Technology Btech CSE Seminar Presentation

The research paper Cyborgs – An advanced Robotic Technology Btech CSE Seminar Presentation talks about the Cyborgs- An Advanced Robotic Technology. Pictures like Bicentennial Man and the Last Mimzi have glorified the field of Robotics like never before. There has been an upsurge in choosing the career domain as an inevitable career option. There is a breakthrough in the research in Robotics almost daily. Cyborg is one such advanced technology that has many promises to make to the coming generations.

Literally a Cyborg is a hypothetical human being with programmed for an alien or hostile environment. A Cyborg has artificial limbs or other body parts. Hollywood glorified Cyborgs in blockbusters like Terminator. A Cyborg can also be a human being seeking respite in artificial intelligence to overcome his/her physical/mental constraints.

Besides fiction and Hollywood Cyborg acts as a panacea for people who might have suffered a limb/limbs amputation in wars or accidents. iLimb and C-Leg are some major breakthrough in the domain of Cyborgs. The iLimb acts as a prosthetic to help the victim cope with the loss of hand/leg. Besides aiming at helping the victim assume a natural gait the iLimb also has magnetic and cochlear implants that help the victim with sensory perception.

A British Research Scientist Kevin Warwick made 100 electrodes fire his neurons in order to make his mind communicate with the internet. He carried many other researches successfully.

Cyborgs also play a vital role in safeguarding and managing huge records/databases.

Types of Cyborgs:

There are two types of Cyborgs- Restorative and Enhanced. As the name suggests the restorative Cyborgs help in restoring the activity of lost limbs, organs etc.  The enhanced Cyborgs works towards maximizing the output of the artificial limb/organ. Cyborgs has also penetrated deeper into fields called as ‘Cryonics’—wherein a patient deemed dead is preserved and treated at a later stage. Cyborgs plays a vital role in military too.

Besides given a lease of life to sports personnel by gifting them with high performance limbs which otherwise might have been amputated in some accident.

Conclusion:

Cyborgs has a great future lying ahead. One may in the future have a machine body with the muscular brain, or a muscular body harboring a computer brain!!

Download Cyborgs – An advanced Robotic Technology  Btech CSE Seminar Presentation.

History of Computers CSE Seminar Topic

The research paper History of Computers CSE Seminar Topic speaks about the History of Computers. Post-modernization if anything has marveled the world it is ‘Computers’. Computers have now become omnipresent. They are omnipresent too. No official work this day is possible without using a computer. Be it extracting money from an ATM or sending mails, presentations or any other valuable data, computers are indispensable to all processes and procedures.

Computers primarily manipulate data and are even used desktop publishing. There has been colossal research in the domain of computers and now it has sophisticated domains like Artificial Intelligence, Robotics and many more. Gaming also is an emerging field that is ingrained in the domain of computers. The first electronic computer, the Electronic Numerical Integrator and Computer (ENIAC), was developed in 1946. It measured 18 feet by 80 feet and weighed 30 tons. Today’s desktop computers weigh much less, can store a million times more information, and are 50,000 times faster. In recent years, notebook-size laptop computers and hand-held Personal Digital Assistants (PDAs) have become popular.

All Parts of Computer:

The computer case is the metal and plastic box that contains the main components of the computer. A desktop case lies flat on a desk, and the monitor usually sits on top of it. A tower case,  is tall and sits next to the monitor or on the floor.

The front of the case usually has an on/off switch and two or more drives. On the back of the computer case are connection ports made to fit only one type of plug-in device. The ports include monitor cable port, keyboard/mouse ports, network cable port, microphone/speaker/auxiliary input ports and printer port (SCSI or Parallel). There’s also a place for the power cord plug.

The monitor, which resembles a television, is where the computer displays text and pictures.

The CPU or the Central Processing Unit is the brain of the computer. Its duty is to carry out the commands. The computer has both input and output devices. CDs, Pen-drives, floppies are input devices. Printers, webcam, scanners are an output device. The short-term memory of a computer is called RAM ( Random Access memory). IT stores memory in the form of MBs or GBs. The hard-disk or the C drive stores more data and information on your computer. Through the ROM ( Read only memory) you can only read but cannot store.

Download History of Computers CSE Seminar Topic.

4G Technology that Gets the World in your Palm CSE Seminar Topic

4G Technology that Gets the World in your Palm CSE Seminar Topic research paper talks about 4g and the future the technology standard has. 4G is the fourth generation wireless communication standard. It has been earlier preceded by 1G, 2G, 3G and 4 G. The 4G applications are characteristically user-driven, user controlled services and context aware applications. In comparison with 3G , 4G has higher data rates and it focuses on one of the primary features ‘QoS’ ( Quality of Service) which is the main criteria in 4G wireless communication.

4G Technology?

A quicker means of networking and communication is what that attracts people to applications like 4G.The technology not only envisages a surge of economy and a landslide improvement in the infrastructure of telecom companies but also assure a better and evolved way of reaching out to the customers and serving them in the best possible way. The emerging new communications standard and of course trendsetter, assumes a user to be able to access services independently of her or his location, in an almost transparent way, with the terminal being able to pick the preferred access technology at current location (ad-hoc, wired, wireless LAN, or cellular), and move between technologies seamlessly i.e. without noticeable disruption. Unified, secure, multi-service, and multiple-operator network architectures are now being developed in a context commonly referenced to as networks Beyond-3G or, alternatively, 4G networks .A 4G Network is routed through a :

  • A user – a person or company with a service level agreement (SLA) contracted with an operator for a specific set of services
  • A MT (Mobile Terminal) – a terminal from where the user accesses services.
  • AR (Access Router) – the point of attachment to the network, Paging Agent (PA), QOS Broker, AAAC System, Network Management System, Interoperator Network Interchange, Mobility of users across terminals, Mobility among multiple terminals, Per hop Behavior ( PHB), Monitory and Measurement functions and above all confidentiality.

A 4G Technology when discussed at an operational level has many subtleties and nuances. This QoS architecture is able to support multi-service, multi-operator environments, handling complex multimedia services, with per user and per service differentiation, and integrating mobility and AAAC aspects. Although the future of 4G is very promising it still has shortcomings owing to its different server orientation. A major issue in 4G systems is to make the high bit rates available in a larger portion of the cell, especially to users in an exposed position in between several base stations.

In current research, this issue is addressed by macro-diversity techniques, also known as group cooperative relays and also by beam division multiple access.

Conclusion

Sprint Nextel, Scartel in Russia, Belarus and Nicaragua use the 4G technology. Ericsson and Nokia Siemens too have come up with some latest versions of  Technology in the Scandinavian part of the world.

Download 4G Technology that Gets the World in your Palm CSE Seminar Topic.

A Zigbee Network Based Heart Monitoring System for Pre-Mature Babies Projects for Engineering

This Zigbee Network Based Heart Monitoring System for Pre-Mature Babies Projects for Engineering Paper introduces Zigbee technology in monitoring the heart rate of pre-mature babies, which broadens the previous radio standards to include higher flexibility, security and reliability. It includes features like mobility, low power consumption, longer battery life and hence can be incorporated in everyday applications.

a-zigbee-network-based-heart-monitering-system-for-pre-mature-babies-projects-for-engineeringWireless communication popularly shortened to “Wireless” as the name indicates is a kind of tele-communications without the use of wires or cables. It is a good replacement to overcome impractical considerations like long distance cabling and perfect for usage over long distances, provides connectivity through satellites connecting mobiles, workstations etc. GPS, Wi-Fi, Bluetooth are names synonymous with wireless.

In this project, Zigbee aims at upgrading heart monitoring systems such as ECG. The Zigbee wireless network is used to monitor the heart-rate of premature babies kept in different incubator rooms. Through wireless technology, their heart rate is closely examined and any signs of increase in heart rate or vice-versa can be communicated to the central monitoring system and immediate aid can be provided. Every baby’s heart rate is monitored by an individual Zigbee sensory nodule and information sensed by it is transmitted to the Zigbee central coordinator which in turn relays the information to the central monitoring system through LAN. The central coordinator will alert the central monitoring system if any premature baby requires immediate attention.

Conclusion:

A heart-rate monitoring system in hospitals requires to be operated all the time. Thus, Zigbee technology offering low power consumption, low cost, high battery life, less interference with other wireless devices and hence is ideal for heart-rate monitoring systems. Moreover, it is capable for remote monitoring and is less expensive than other heart rate monitors available in the market which use Bluetooth technology. Thus, Zigbee technology aims at infusing simple and cost-effective wireless technology options seamlessly into the market and targeting mainly automation and remote control applications.

Download A Zigbee Network Based Heart Monitoring System for Pre-Mature Babies Projects for Engineering CSE Computer Science Engineering B Tech/ BE Final Project Paper Presentation and Seminar PPT.

Communication Projects on Home Automation Using Mobile Communication

Technology has surged so ahead that it has now unlocked the potential for you to manage your home appliances without your physical presence. This project Communication Projects on Home Automation Using Mobile Communication enables you to control home appliances like bulbs, fans, water pumps etc with the pressing of your mobile keys. Consequently, if you do not remember to switch them off before you leave your house; you can easily do it through your mobile which serves as a remote.

communication-projects-on-home-automation-using-mobile-communicationThis project Communication Projects on Home Automation Using Mobile Communication consists of three main parts namely microcontroller, DTMF (dual-tone multiple-frequency) decoder and voice recording and playback device. While on a call, if a handset key is presses, a tone analogous to the key pressed is heard on the other side. This tone received (known as the DTMF tone) is processed by the microcontroller with aid of a DTMF decoder. The decoder further translates the tone into its corresponding binary digit and sent to the microcontroller.

‘Touch-tone’ is an edition of the DTMF used in telephone dialing. The use of DTMF here is that it allocates a particular frequency to each button which makes it easily identifiable for the electronic circuit. 8-bit microcontroller is used here which is programmable and has erasable ROM.  Discrete components like transformer, rectifier too are incorporated in the circuit.

Before the circuit starts functioning, all connections are tested and the ac supply is provided. Magnitude of the output is measured by the multimeter and its waveform seen in the oscilloscope.

Conclusion:                                 

                 Communication Projects on Home Automation Using Mobile Communication can be made use of in a wide range of home appliance devices. One of them is watering system where the principle of this project is applied and used to control a relay signal to the water pump. This project design can also be applied to automate garden lamps and also security systems.

Download Communication Projects on Home Automation Using Mobile Communication.