MCA Seminar Topic on Modern Applications of Object-Oriented Languages

Introduction to Modern Applications of Object-Oriented Languages:

Vortex is an optimizing compiler intended to produce high quality coda for programs written in a heavily-object-oriented style. To achieve this vortex includes a number of intra- and inter procedural static analyses that can exploit knowledge about the whole program being compiled, it includes inter procedural class analysis, class hierarchy analysis, and exhaustive class testing, and profile-guided optimizations such as receiver class prediction &selective specialization.

Object oriented languages are becoming increasingly popular for the development of software systems of all kinds, five object oriented languages namely small talk, java, php, c++, and python were chosen.

Introduction:

Object oriented programming languages include several feature that can be used to make programs more reusable & extensible. Classes support the construction of encapsulated abstract data types, inheritance allows one abstract data type to be implemented as an incremental modification of one or more existing abstract data type. Dynamic dispatching it is a level of indirection between client and implementation . In this it allows a single piece of client code to multiple different  implementation.

Programmers design the application by putting together different pieces of already written code. Each piece of coed is called object. Object can have properties like color, shape , size and data type. Programming with object is quite like working with real-world object.

 Main features that are available in modern object oriented languages are thread visibility, dynamic binding, exception handling. Data structures consisting of includes the inheritance, modularity, polymorphism and encapsulation.

Materials and methods:

Object oriented development:

This system development is an extension of structured programming. It emphasize the benefits of modular and reusable computer code and modeling real-world object.

Object oriented programming is 95% philosophy   and 5% technology.

Concepts of object oriented:

There are 4 properties

  1. Inheritance
  2. Encapsulation
  3. Polymorphism
  4. Abstraction
Download MCA Seminar Topic on Modern Applications of Object-Oriented Languages . 

Latest CSE Seminar Ideas on CDPD technology in Mobile computing

Introduction to  CDPD technology in Mobile computing :

Mobile computing is a computer interaction in which the data is transmitted via computer. Mobile computing involves mobile communication, mobile hardware as well as mobile software .The mobile computing principle is to send and receive the data across the cellular networks.

Mobile data communication it allows the user to transmit data from remote location to other remote location (or) fixed location .This is the biggest problem for the business people. The mobile data communication is dominated by the technology called CDPD.

CDPD networks allow the mobile users to connect to the network across a fixed link and a packet switched system.

CDPD has a sleep mode which allows the device to save the power when not in use.

Existing cellular network architecture:

A cellular network consists of mobile units linked together to switching equipment, which inter connect the different parts of the networks and allow access to the fixed public switched telephone network (PSTN). The tech is hidden from view, it is incorporated in a number of transceivers called base station (BS).

Existing cellular networks based on circuit- switching consists of base station (BS), base station controllers, switching centers, gateways etc. In this base station the physical transmission with fast power control & wireless scheduling and the base station controllers most of the radio resource management. So, when mobile terminal moves to another cell it needs another base station.

 Data communication: (DC)

 Exchange of data from one system to other system it has wide range of applications including file transfer, inter connection between wide area networks, facsimile (fax) electronic mail, access to the internet. The network used in DC is PSTN, leased-lines and ISDN (integrated services date network) and ATM (Asynchronous Transfer mode). These networks are analogy digital using tech such as circuit- switching packet-switching etc.

CDPD technology:

The mobile data communication market is dominated by a technology called CDPD. Its principle lies the usage of the idle time in between existing voice signals that are being sent across the cellular network.

The advantage of this system is that the idle time is very helpful for the business people.

Download Latest CSE Seminar Ideas on CDPD technology in Mobile computing .

Online Examination Project Documentation

Introduction to Online Examination Project:

What are the users bemoan storable needs

User needs a web-based system. In this system if the user is facing a problem it will remove and .

Web-based system reduce the paper work and it provider easy of work to do.

How can the problem be redefined?

The problems of existing system can be slowed by marking a layout of the system on paper. We will see the problem and needs of the existing system and requirements the problems. Also, it has factors such as cost, effort, time, labor

Specification Report;

System interface It will not access the data from any other application it is self contained system.

User Interface;

Application will be accessed through the Browser interface. The s/w would be fully compatible with Microsoft interface Explorer for version 6 without logging the system no user can access the application.

Communication interface;

The system should be accessed over LAN/WAN. FOR clients the n/w should be accessed TCP/IP protocol.

Operations;

Client side: interactive operations using options provided in the application.

Server side: Database backup should be restored.

User characteristic:

The end user of s/w can be divided into 2 Administrator and operator.

Bottlenecks Identified in existing system;

In existing system maintain education related information is shared in the form of documents and hard copies. This method causes waste of paper in order to overcome this problem we use online database for storing files and data ,hard-copied documents leads the following problem. Such as lack of space, filling poses as problem, filleting is not easy, Reviewing becomes time consuming

Need for the new system:

A computerized system is required to solve the problems and handles the works.

A web based application is required for providing a working environment that is flexible and easy to working environment that is flexible and easy to work and rebuke the time.

Aims and Objectives:

The purpose of the proposed system is to provide comprehensive computerized system. Which will collect, capture and analyze the data from the impact of the program. 

Download Online Examination Project Documentation.

Bluetooth Technology Electronics Seminar Topic

Introduction to Bluetooth Technology Electronics Seminar Topic:

Bluetooth is a radio frequency specification for shout range, here the Bluetooth provides point to point and point to multi point voice and data transfer Bluetooth facilitates the replacement of gables from one device to another device b a short range radio link. With the help of Bluetooth we can operate some number of devices such as keyboard, mouse, printers, fax machines, headphones.

“The future of Bluetooth looks bright because it meets the basic need of connectivity in close proximity”

What is Bluetooth?

It is a specification that attempt to provide a standard method of wireless communication between various personal devices

How Bluetooth Technology work:

Design of Bluetooth micro chip is of 9mm x 9 mm  low cost and short Lange ladino link. Bluetooth is a wireless device which works for a short distance voice and data transmition it is mostly used for mobile and internet connection purpose. Using Bluetooth technology it is possible to connect 8 devices a time each pioneer support up to 3 Simultaneous voice devices.

                           Bluetooth technology is designed to be as sauces as a wire.

Transmission type and rates;

The baseband protocol combines circuit and packet switching sloth should be these for synchronous packet so that the packet do not assign ant of order

Circuit switching is of 2 types

Synchronous and asynchronous

Up to 3 synchronous data channels, and one synchronous and one asynchronous data channel can be support only one channel.

Synchronous channel support 64 kb/s transfer rate.

Asynchronous cannel can transfer 721 kb/s in one direction and 57.6 kb/s in other

Radio frequency and spectrum hopping:

The system is designed to use fast acknowledgment and frequency hopping. It is packet based after receiving the packet it will jump to new frequency by his it has less problem interface.

The Bluetooth radio chip functions at 2.4 gig cheats, it is unlicensed ism band. It separates the 2.4ghls frequency band into 79hops one MHz apart, starting 2.402 and ending 2.480. The standard frequency range is 10 centimeters to 10 metros, and it can be extended up to 100 meters by increasing Transmission power.

Data Transmission:

 The data is transmitted through asynchronous and synchronous. The asynchronous connectionless is used for data and synchronous connection oriented is(SCO) is used for “voice” Within a Pico net.  Time division duplex (TDD) is used by both ACL and SCO. And both of them support 16 types packet.

Download Bluetooth Technology Electronics Seminar Topic.

Resort Management System

This project takes care of the resort management at the core area of the database. Already information is stored in the system database shows the information regarding the different resorts that are available in the system records .the system also takes care of the atomic information of the different units that are present under one resort. The unit is well designed for the basic flexibility of the tourist who wants to stay.

Existing system is presently undeveloped one and the manual process of the overall system is so complicated. The clients in the real time system can be too thick and may need many resources to be used upon the system. The centralized database is only the solution to develop the system.

Proposed system the guests or clients can visit the site and if require register themselves with the required information. The registered guest can raise the request for unit bookings. The maintenance of the unit booking is maintained by the proper management. The system provides the facility for booking of the required available units as per the number that is available. The system is totally built upon the three standards . This application is implemented in three tire architecture client, business and data tires are three levels involved.

The module maintains all the details of the Accommodation location that are available. Unit information this module maintains the information regarding all the units that are registered and there reference unit types.

Booking module maintains the information of all the booking of the units as per the guest requirements.

This project has minimum software requirement the operating system which we use for this project is windows 2000 professional/xp,  browsers internet explorer 5.0 and Netscape navigator.

Data base is MYSQL 5.0, webserver is Tomcat.

Seminar Report on Extreme Programming

Introduction to Extreme Programming Seminar Topic:

XP used in agile methodology it shares the values from the manifesto and goes simple set of practice.Where there are many other methodologies they will try to answer the question. XP it is simple and asks “what is the simplest set of practices .I could possibly need and what do I need to do to limit my needs to those practices?”

It is simple to work beyond a narrow set of project criteria.

What is XP?

XP is a discipline of software development based on values of simplicity,communication, feedback and courage.

XP works with the whole tram by bringing them together, But by simple practice.

XP trams use a simple form of planning and tracking to decide what to do next.

The core XP practices for the above are called whole team planning game,small release and Acceptance tests.

Core practice:

There are 12 core practices are there that design XP. Teams new to XP focus on developing skills.

The practices can be described as a cycle of activities.

The inner circle describes the tight cycle of program.

The outer loop describing the planning cycle that occurs between the customer and programmar.The middle loop shows practices that help the team communication and coordinate the delivers of quality software.

WHOLE TEAM:

 All the team members sit together to do XP project.  This teamincludes the customer who provides the requirements, sets the priorities and stresses the projects.The team also includes testers to test the project and the projects also have some helper’s requirements and a coach is there to help the team and he will handle every are who works on the XP team.

PLANNING GAME:

Plan should be there before doing the task there are 2 points that need to be followed that are predict task that need to be completed on due date and get ready  to plan next step.

There are 2 key planning steps in XP they are

  1. Release planning
  2. Iteration planning

Download Seminar Report on Extreme Programming.

Extensible Messaging and Presence Protocol Seminar Report

Introduction to Extensible Messaging and Presence Protocol Seminar Topic:

XMPP is a protocol that transmits small pieces of XML from one place to another place.

Also, it provides the services such as channel encryption, authentication presence, contact ,one-one messaging, multiparty messaging notification, service discovery, capabilities,  & advertise, structured data forms, work flow management, peer-peer media sessions.

Problem definition:

Security is main concern in communication protection of the data through XMPP is the concept to overcome, the problem of (SSL-HTTP): i.e.; secure sockets layer (SSL) works below the HTTP in layer architecture.

As XMPP is open in nature, it will minimize / eradicate the problem occurred above.

To overcome this problem:

This project main aim is to create an XMPP application for any organization and capable to connect any XMPP server.

  1. XMPP works over persistent connections
  2. XMPP becomes cheap
  3. It is designed an event stream protocol
  4. It is asynchronous: in asynchronous messaging system the participant is sending the message continuously and need not to wait for the response from the recipient. 

XMPP consists of XML stream that enable two entities on the internet to exchange message.

SYSTEN ANALYSIS:

EXISTING SYSTEM ARCHITECTURE:

In this project the protection depends on the implementation of the correctness by the web browser, server software and actual cryptographic algorithms supported.

Security is the main concern in communication protection of the data through XMPP is the concept to overcome, the problem of secure socket layer works below the HTTP in layer architecture.

PROPOSED SYSTEM ARCHITECTURE:

In this project the proposed system wants to create an XMPP application for an industry capable of connecting to any XMPP server.

There are some standard XMPP commands that use to build the application.

  • Connect and disconnect
  •   Register
  •   Check roster
  •  Send messages
  •   Set status
  •   Communicate presence

Download Extensible Messaging and Presence Protocol Seminar Report.

Extending Grids with Cloud Resource Management for Scientific Computing Seminar Report

Introduction to Extending Grids with Cloud Resource Management for Scientific Computing Seminar Topic:

Extending Grids with Cloud Resource Management for Scientific Computing explains about using  super computers, scientific computing is constant to the next levels such as cluster computing, Meta computing. Grid computing gained the high popularity in the field of scientific computing. Scientific computing is a traditional high work load.

Today in this generation cloud computing is emerging as the paradigm for the next generation of large scale scientific computing, the cloud computing has the four main advantages they are

  1. The cloud cannot buy their own hardware they promote the concept of leasing remote resources which frees from permanent maintenance costs and eliminate the burden of hardware.
  2. Cloud technology reduces cost of installation by removing extra hardware applications that need to be added to super computer but fulfills recruitment. To the resources needed. Through the new concept of “scaling-by credit card”.
  3. The concept of hardware virtualization can represent a significant breakthrough automatic and scalable deployment of complex scientific software.
  4. The provision of resources through business relationships contains specialized data Centre companies in offering reliable services which existing grid infrastructure fail to deliver. For scientific applications there exist several integrated environments for transparent programming and high performance.

Background concepts:

There are several workflow execution middle wares for grid computing, it is used to support the new type of cloud infrastructure.

ASKALON:

ASKALON is a grid application. In this the user composes workflow application at a high level of abstraction using a UML graphical modeling tool. The abstract workflow is given in a XML form to the ASKALON middleware services for transparent execution on to the grid.

CLOUD COMPUTING:

It is used for the provisioning services through internet which are built like utilities. The most popular interpretation of cloud computing is infrastructure as a service (iaas).  Iaas provides modern hardware facilities to customers that pay only for what you use effectively.

Virtualization in (iaas) is distributed, automatic, scalable, deployment, installation and maintenance software. 

Download Extending Grids with Cloud Resource Management for Scientific Computing seminar report.

University Management System Project Report

Introduction to University Management System Project:

University Management System  starts with the registration of new staff and students. when the subjects are allocated to the staff the head of the department should enter the detailed information in the excel sheet. The staff enters the attendance of the students of their corresponding subjects and marks of the students.

PROBLEM IN THE EXISTING SYSTEM:

sorting and accessing the data in the form of excel sheet is a tremendous work. it requires a lot of laborious work. they should have to maintain the record of each and every student from starting it is so difficult and so costlier task.

PROPOSED SYSTEM:

In this project the UNIVERSITY MANAGEMENT SYSTEM (UMS) makes the management to get the updated information. this system includes the three functional divisions they are

University administrator

College administrator

User (student / faculties).

UNIVERSITY ADMINISTRATOR has the functionality of registering new colleges and courses.

COLLEGE ADMINISTATOR includes the creating department, course for each department, for each subject you should have to allocate a faculty.

USER in this project the USER includes the two either lecturer or student. The faculty will enter the attendance of the students and also marks.

The students will check their attendance and marks but they can’t modify or change anything.  

Download University Management System Project Report .

Latest Technical Seminar Topics for CSE 2012 on Antivirus Sandbox

Introduction to  Antivirus Sandbox  Seminar Topics:

Overview:

From the  invention of computer,  there is Malware in the files which destroys the working speed of system called virus. As now the technology develops the new viruses emerges and malicious are develops in the software. Many Antivirus have invented to prevent this malware but it can bear and prevent the encrypting virus. So here we have invented the new Antivirus software called Sandbox.

This protect the documents and creative files from these encrypted virus by checking for the malware before downloading the file through the temporary folder. There are different types of malware like virus, Trojan horse, Worm.

Sandbox:

Sandbox is the computer security that runs the untrusted application and malware documents using the four components.  The building components are the documents that is to be tested, Sandbox container, sandbox controller, system resources.

Working of Sandbox:

The sandbox works based on two applications namely trusted and untrusted application. The trusted application can be accessible since the contents are fully trusted. But untrusted application should be processed in the sandbox. The sandbox works under the restriction such that the application should under the sandbox manager. The sandbox manager alerts the user if any sensitive resources are present in the application. This software works on its own simulation in different platforms. Sandbox gives compact resources for the strange programs to run according to the instruction. It avoids the boot up process through freezing process. The virus works and get manipulates in the simulated area through the thread process. The sandbox avoid this using APIs. If the files processed beyond the restricted area the simulated norman sandbox denies the application and makes it unworkable. 

Advantages of Sandbox:

  1. Supports many Application Program Interface.
  2. Works on many threads simultaneously.
  3. Detect malicious programs.
  4. Supports networks and messaging action.

The another most important application is protection of Day Zero Attack. This is done by proactive monitor. The stranger file entering the computer is desperate and prevent the infection from the danger. After this analysis the system will decide whether the file can enter or dispatch.

Sandbox safe pattern:

There are many models that operates in different environment. They are :

 1.Java Applets,

2. Security system.

3. Unix system.

4. Virtual emulator.

This Sandbox is more preferable than any other techniques like Digital Signature. Since DS scans the file but Sandbox process and operate on the virus files and can works on both trusted and untrusted model.

Download Latest Technical Seminar Topics for CSE 2012 on Antivirus Sandbox .