Seminar Topic on BACnet and Lon Works

BACnet™ (Building Automation and Controls Network). This paper is meant to explore the substantial differences between each approach, and also focus on various popular myths in order to dispel some of the confusion and misinformation that has surfaced as these different solutions which have been introduced to the marketplace. This paper also discuss about how to create an automation and controls system which are designed tointeroperate with other BACnet systems.Interoperate in a BACnetmeans that two or more BACnet-speaking computer systems shares the same communications networks, and ask each other systems to perform various functions on a peer-to-peer basis.

Although this system does not require similarcapabilities, it is simplerfor system designers to design system components at every level of complexity, to have access to all functions of other automation system peers. Hear there are no class distinction between smaller controller, lager controller, actuator, sensors and host computer or operator work stations. The BACnet provides a sophisticated model for describing automation systems for all types. These models are based on the idea that the systems to be truly interoperable, there should be some agreement about various aspects of the overall operation and the individual systems by themselves. BACnet models are been divided into : Objects, services, LANs, internetworking, conformance. This paper discussesabout these classifications of models in detail.

Lonwork is the next topic which has been discussed in this paper. At the basic core of this technology is owned by a single proprietor communications protocol called LonTalk, which is a simple mailing system with some basic mechanisms for transferring messages between two or more systems. One of the major problems of the lonworks is that they are no able to extent since it needs an gold level agreement from its official members. 

Download Seminar Topic on BACnet and Lon Works .

Attack Scenario Construction and Automated Report Generation in Sachet Project Report

Increased use of internet has led to more cybercrimes like unauthorized use of computer in the network thereby it is necessary to use the intrusion detection system, to protect the information system from the unauthorized attacks and malicious attacks. Intrusion detection system (IDS) is a system that monitors all computers in a network and identifies all security breaches and raises alerts to the administrative system about an cracker is trying to create an unauthorized access to the network. In this paper discusses about the real time and network based IDS.

The main aim of this project is to identify logical relation among the low level alerts and provide a report security issues to the system administrator called as attack scenarios. This module of the project has been successfully tested on a benchmark 2000 DARPA data set. Automated report generations takes all related report generated as mentioned above together and generates an overall picture about the network attacks and present it to the system administrator. 

      There are mainly two types of intrusion detection system: Host based IDS and Network based IDSHost based IDS uses audit logs and system as its data source, while the other network-based IDS uses network traffic as there data source. An assignee on the host which captures intrusions by analyzing application logs, file-system modifications (binaries, password files, etc.)and other host activities is done in the host-based IDS.

The sensors are placed at a the network to identify all network traffic flows and analyze the content of every individual packet and check whether any sort of malicious activities in case of network-based IDS, such as denial of service attacks, buffer overflow attacks, etc. are been occurring in the network these results from IDS are been automatically reported to the system administrator as an overall picture about the network attack.

Download Attack Scenario Construction and Automated Report Generation in Sachet Project Report.

Scalable Multicast Protocol for Communication in Large Groups Project Report

SCAMP stands for Scalable Multicast Protocol for Communication in Large Group, this paper discusses about a new multicast protocol for communication with in large groups over internet. Most of the protocols build either shared tree or source based tree. Source tree are one which the node sending the data are supposed to be their root, source based tree are been used in data delivery. Source tree are been initiated by the receivers. It also helps in reducing the traffic in different parts of the network.

While shared tree, routers in the Internet act as root of the trees and distribute the data between the members of the group which lies in this tree. The shared is also used for signaling process, it provides information on source to all other members in the tree. One of the main advantages of source-based trees is that they support high data rate and they support sparse group, the advantages of these two are taken together in the SCAMP.

SCAMP protocol builds both of the shared tree and the source based tree. So in overall these protocols helps in reducing the traffic over different parts of the network, cut down the processing cost of the router and also make use of the bandwidth by subdividing the load over the network. Multicasting in IP network allows the transmission of IP diagram to a set of host from a multicast group. The end-to-end delay in source based trees is almost half of that in a shared tree.

Since SCAMP protocol builds source-based trees for the delivery of data packets. A brief study about the modes of packet delivery and an overview of the existing multicast protocols in this paper so a new protocol which are able to support high data rate and sparse as well as dense multicast groups are been proposed through SCAMP in this paper.

Download Scalable Multicast Protocol for Communication in Large Groups Project Report.

Comparison between Windows XP and Windows 7 Seminar Topic

This paper discusses about two main operating systems in the market. Operating system provides a platform for the application software to execute. It performs as an intermediate between the application software and the hardware part of the system.

While comparing the two operating system both are been designed by Microsoft, where windows XP was first released in year 2001 later on there were several versions of windows XP in the following years. Some of the main features of windows XP are fast user switching, remote desktop functionality, it also provide good GUI as compared with older versions. The high graphics used in the OS need not perform in older hardware’s like Pentium 3 are the main cons of XP.

Windows 7 is the latest operating system released by Microsoft which has entirely different graphics performance, and much more high performance compared with the older version like vista, XP. Microsoft has worked on this operating system to correct all the bugs reported by the users and tried to improve all features as recommended by the users in the previous version OS developed by Microsoft. Some of the main system requirements are: processor clocked at more than 1GHz and minimum RAM of 1GB and HDD of minimum 40GB.

Some of the main advantage of windows 7 are it is faster than windows XP, it supports almost all software which was installed in windows XP i.e. software compatibility, windows 7 also provide more security features than older version. Windows 7 are available in different versions like home edition, professional, ultimate. On basis of different surveys conducted most of the people prefer to use windows 7 than windows XP, since windows 7 is more faster accurate and more secure than windows XP. But in case of systems with low system configuration windows XP is the correct choice.

Download Comparison between Windows XP and Windows 7 Seminar Topic.

Artificial Intelligence for Face Recognition Project Report

This paper deals with recognition of image using neural network. Since today in modern life all of us rely on internet for most of the transfer of data and for grasping up of knowledge, so the security of using internet for data transfer of data has been more important, protection technique like encryption and authentication are been used to protect data while transmitting through internet, even though the security is insufficient so the increasedsecurity on internet is done by using face recognition using neural network, even though his approach is costlier it can provide high advantage of tight security.

It is used in identifying people in real time. By combining local image samplings, the self- organizing map neural network and the convectional neural network, the self-organizing map provides the quantization ofimage samples into a topological space where inputs are in the original space and also in the output space, thereby providing dimensionality reduction and invariance to minor changes in the image sample. These software features are implemented using MATLAB v 6.5.

By implementing the face recognition system the business transaction via internet can be improved. The hybrid neural network solution which compare and recognizes a person with a large database of faces, the neural system give most likely face of people from the database often only one image is available for a person, the next stage of the system is to train the images and stored to the database. Finally the authorized person’s face is used for security monitoring software. Different representation of faces like multidimensional, complex and visual stimuli developing a computational model for face recognition is very difficult. Faces has distinguishable landmark i.e. peaks and valleys on the human faces, There are almost 80 peaks and valleys in human face. Some of them are Distance between eyes, width of nose, depth of eye, jaw line, chin, etc.

Download Artificial Intelligence for Face Recognition Project Report.

Advertising Agency Project Report Abstract

Advertising can be considered as the successful resource which is a combination of different techniques that could be used for the purpose of promoting products and services of a company. The brand image and brand awareness can be created by using the advertisements. Nowadays, in this competitive market for getting competitive advantages among their competitors many companies are using advertisements as their major marketing campaigns. In order to perform their advertisements, companies are trying to make use of advertising agencies through which they are trying to design their advertisements efficiently to attract the customers. Especially advertising agencies are happened to be important resources within the advertising field and they are playing important role in supporting the companies with their effective advertising designs and campaigns. Advertising agencies are the group of people who has experienced talented and skilled individuals capable of making efficient advertisements on behalf of companies in order to succeed themselves in the market place. The main functions of advertising agencies are explained in detail as follows:

  • They will allow the companies to create brand awareness among the customers of specific companies
  • They will support the companies in improving the sales and market values of their products and services
  • They will convey the products and service messages of the specific company to the customers

Advertising agencies are providing many added advantages to the companies in maintaining their product expertise with brand knowledge and they will even save the costs and time of the companies who are trying to market their products and services by using advertising agencies. The major advertising mediums in the current markets are newspapers, television, mails, radio, magazines, and broachers, outdoor and social media sites like Twitter, Facebook, MySpace and Orkut. 

Download Advertising Agency Project Report Abstract.

Administration of Super Specialty Hospital Activities Abstract

The main aim and purpose of this project is to design and develop a Web Based Hospital Administration System that can be used for managing the entire operations of hospitals and more specifically to offer efficient services to the patients over the hospitals. Hospitals can make use of this application called Hospital Management Software for the purpose of making medical bills and other activities involved at hospital. This project contains two different sections such as advanced MD as well as advanced EMR that are explained in detail as follows:

Advanced MD

This is medical billing software that can be used to generate the entire medical bills of the patients without any errors which generates the bill payment slip that can be used to claim different insurances that even includes different elements such as maintenance of patient record, appoints schedule, patient check in and check out details, claims management, medial bill collection, reports generation as well as hospital management.

Advanced EMR

 This advanced MD can be considered as the practice management that is used to produce the access to the users about their medical information which is having similar characteristics of EMR- Electronic Medical Records that saves the money and time of the patients which involves different elements such as patient chart and dashboard, patient documentation, patient charge sheets as well as partners of EMR.

Hardware Requirements

This application needs Pentium IV processor with 120GB RAM and 40GB hard disk with high resolution monitor.

Software Requirements

This system needs an HTML, CSS, Java Script along with Java, JDBC, JNDI, Servlets and JSP including Eclipse with Oracle or SQL server as database and Windows XP/2003 or Linux/Solaris as Operating System and finally the server deployments are BEA WebLogic/JBoss/WebSphere/Tomcat. 

Download Administration of Super Specialty Hospital Activities Abstract.

Adaptive Control System with Knowledge Server Project Report

Nowadays, within the intelligent machine tools scenario the human involvement was totally changed and replaced by the controllers. Especially in the last decade period many research works are carried out on this concept to get appropriate idea on ideal scenario but still the CNC information processing process was not changed rapidly. This paper will identify the actual requirements of intelligent CNC system in order to analyze and identify the technology advancements within this specific filed by making use of the different types of the adaptive control systems. Within this system, a new concept which is a cost effective one for the purpose of artificial intelligence referred to as Knowledge Server Controllers are been established through which the actual intelligent processing requirements of the devices can be solved for the purpose of processing the intelligent data. This particular KSC- Knowledge Server Controllers are been utilized within the open environment of CNC for the purpose of building the efficient intelligent CNC.

The actual parameters which can be controlled within the machines with use of Artificial Intelligence Model with online path generation facility are presented within this paper. The added advantages of this system are that the tools can be selected automatically and operational parameters can be set easily. It is even capable of generating the automatic funds according to the limitations of the machines which uses back step strategies for detecting the geometrical deflections by using the control algorithms. This system will be incorporated with the alternate devices in order to solve the problems mutually and to detect the breakage of tool wares. Finally, if the interface is been established among the adaptive control system micro controller as well as the artificial intelligence data based the entire communication parameters can be controlled by using the server knowledge by introducing the prototypes.

Download Adaptive Control System with Knowledge Server Project Report.

Automatic Fuzzy Ontology Generation for Semantic Web Project Report

The main purpose of semantic web is to create the universal medium for the purpose of exchanging the information by inserting the documents within the semantics on internet within a specific manner. The Semantic web is having many capabilities through which they will be able to integrate the day to day trade mechanisms, daily updates associated with intelligent agents. Ontology can be considered as the domain concept that is capable of reading the different formats and it includes different resources such as individuals, characteristics, sayings as well as associations. Ontology is widely accepted technique that is been utilized as the specific standard knowledge resources for the purpose of supporting semantic web.

Ontology is widely used in Semantic webs for getting efficient information retrievals from the actual source system. In order to identify the improbability of the information ontology as well as web fuzzy logics can be associated together which is so called referred to as fuzzy ontology as the predefined hierarchy concept. Designing the hierarchy for the specific domains is not such a simple task and this proposed system will introduce a FOGA- fuzzy ontology generation framework which is capable of producing the automatic fuzzy ontology for the purpose of identifying the uncertainty of the information. This FOGA framework involves three different elements in it such as Fuzzy formal concept analysis, Concept hierarchy generation as well as Fuzzy ontology generation. The actual reasons for ontology enhancement towards the new data will be identified. In order to produce the ontology within the database the fuzzy logic technique will be used in this proposed system.

Hardware specifications

This system needs Intel Processor IV processor with 128MB Ram and 20GB hard disk along with 40x Samsung CD drive with 1.44 MB floppy disk including 15 Samtron color monitor with mercury keyboard and Logitech mouse.

 Software Specification

This system needs an operating system of Windows XP/2000  and the language required to perform the tasks are J2sdk1.4.0.

Download Automatic Fuzzy Ontology Generation for Semantic Web Project Report.

Activity Management System Project Report

Nowadays, internet is playing important role in every sector of the world that has dramatically changed the entire prospects of the world. Internet can be considered as one of the successful technological inventions which is associated with important information’s prior to the development of networking as well as information sharing processes. This project is entitled with a title called Activity Management System designed for the purpose of prudential banks. This application is aimed to support the persons who are dealing with the persons opting for premiums offered in their prudential banks. The main beneficiaries of this system are the prudential agents who make the customers to buy their premiums. This system is an automotive system that is capable of updating the entire agent reports that includes different types of sales activities including client premium details. The entire progress of the client’s premium will be updated automatically within this system. 

Hardware Requirements 

The hardware requirements of this application are the Pentium III 800MHz processor with an 128MB RAM with 20GB hard disk along with 1.22MB with 3.5 floppy disk including the display with 600×800 pixel resolution along with mouse as well as key board.

Software Requirements

The software requirements of this system needs a Windows 2k family as operating system along with HTML, Java Script with J2EE, servelets, JSP, JDBC as well as Java Bean as front end tools including Apache Tomcat 5.0 as web server and finally SQL server as backend tool.

Download Activity Management System Project Report.