Bittorrent B.tech Final Year CSE Seminar Topic with Report

Introduction to BitTorrent Seminar Topic:

The paper is about the BitTorrent. It is defined as a protocol which enables the peer-peer communication of file sharing system. It is mostly used when we are dealing with large volumes of data which is transmitted via the internet.  

This protocol is used for reducing the impact on the network and also a server for transmitting the large files. The file is made into segments called as pieces. Each peer gets a piece of the file is distributed, and then it becomes the source in case of other peers.

It is capable of dividing or distributing the task i.e. the distribution of the file is shared to the peer who is requesting it. It is also even capable of sending the copy of the file and gets it distributed among the other unlimited peers.

The existing studies which are considered are single-torrent based, but most of the peers have the capability for dealing with the torrents which are multiple based on our analysis. Also, these studies are not even accurate for the single-torrent based due to some assumptions. Therefore our analysis of the Bit Torrent system has provided with various assumptions.

The limitations with the systems related to the BitTorrent are, the decrease in case of the peer arrival rate impacts the service availability which makes down and also the file becomes difficult to search and also even download.

Other limitation includes the fluctuation in the client performance and changes with peer population. Also, the systems which we are using now are not offering the good services to the peers. The limitations which are discussed above helps us for providing a new approach to the multi-torrent model.

Security in Operating System and WindowsNT Final Year CSE Technical Seminar PPT

Introduction to Security in Operating System and WindowsNT Technical Seminar Topic:

Computer security refers to the protection of all components like hardware, software, and stored data of a computer from damage, theft, or unauthorized use. Most confidential data should be protected from the unauthorized users so that the data should be encrypted. Many users accessing the data lead to data inconsistency as they may alter the data. So, proper passwords should be used. Sometimes systems may crash so that we may loss important data to overcome this we should maintain data backup. 

Security problems in operating systems: 

Authentication: authentication is mainly dependent on the user identity. The most common user identity is giving passwords. When the user enters the username then the system asks for the password if the entered password matches the password stored in the system the system assumes that the user as the legal user. But the passwords can be easily guessed by the unauthorized users if we use simple passwords. So we should be more careful while choosing the passwords. The main problem is keeping the password secret. To solve this problem we have encrypted passwords and one time passwords. 

Program threats: Hackers thefts the data or programs written by some users and they may change them. it leads to the misuse of the data. The two major program threats are Trojan horses and Trap doors. 

System threats: the two main system threats are warms and viruses. Warm replicates a file so that the number of copies of a file are produced ultimately then the system performance goes downs. Virus spread their programs to all the files and damages them. These viruses are usually spread by downloading data from the network and exchanging the infected disks. 

WindowsNT: 

Microsoft included security as part of the initial design specifications for Windows NT, and it is pervasive in the operating system. The security model includes components to control who accesses which objects, which actions an individual can take on an object, and which events are audited.

Download Security in Operating System and WindowsNT Final Year CSE Technical Seminar PPT.

Face Recognition Technology B.tech Seminar Topic for Computer Science Students

Introduction to Face Recognition Technology Seminar Topic:

This paper discussed about one of the unique secured technologies, face recognition technology. This technology secures the information by authenticate the user based on the face. This is much secured when compared to any other traditional technologies except in the twins’ case.

Because face is unique identification for any user but this statement is not acceptable for an identical twins.  This technology is non-transferable. In this technology, the system takes the features of a face, stores in database, takes the user’s face features and tries to search and map the same with the existing face features from the central or local database.

Overview:

Previously actions are takes place on paper or face-to-face but slowly things are changed and most of the actions performed electronically.  This growth in electronics has demanded faster and secure transactions and communications. Fastness depends upon what hardware or what software is being used for that transaction that is the entire performance of the transaction depends on software and hardware infrastructure. Secure transactions can take place only when there is checking for accurate user identification, authorization and authentication.

  Personal Identification Numbers PIN’s were usually used for user identification and security clearances to access bank accounts, to access codes for buildings and to get access to computer systems.  In the case of lost credit and debit cards, there is a possibility for an unauthenticated user to access the account with correct personal codes, which he got from after attempting many probability trails.  This happened because many users usually use easy to remember PIN’s and passwords like they may use their birthdays, phone numbers as security numbers and most of the users gives nicknames as passwords.

So, there is a severe need of having strong unique identification technology for authenticate and authorize the user for accessing systems and financial accounts. Face recognition is a popular evolving technology which helps to easily identify the user for the corresponding accounts.  There and many traditional secure methods like biometrics, finger prints and unique hand-writing recognition for easily identifying the authenticate user. But these methods have their own drawbacks which were faced by this face recognition technology. Even this technology is in vain when consider the identical twins users.

Download Face Recognition Technology B.tech Seminar Topic for Computer Science Students.

Ethernet Technology CSE Seminar Topic Abstract and Report

Introduction to Ethernet Technology CSE Seminar Topic:

This paper discussed about the major LAN technology, Ethernet technology. This paper also discussed about the various Ethernet physical layers along with link media requirements or limitations.

Overview:

Ethernet stations communicate each other by sending data packets. Each Ethernet station provided with a 48-bit MAC address which is used to mention the source and destination of each packet. As in Ethernet, point-to-point links connected by switches and these replaced coaxial cables so the installation cost is reduced, increased reliability, management and troubleshooting. Link level connections will define by both the source and destination addresses and these connections are established by Ethernet.  

The operating system on the receiving station selects exact protocol module by making use of Ethertype filed in each frame.  All generations of Ethernet are interconnected through bridging and use the same frame formats.  In Ethernet, computers and other devices linked through cables. Cables connected to the computer at one end and the other end connects to switches, hubs and repeaters. Basically, Ethernet works with the help of chain reactions. Different variants of Ethernet technology are available in current market.

Ethernet cable, Ethernet hub, crossover cable and router are the few types of equipment for Ethernet network. Ethernet requires a patch cable to connect the devices in the network. Patch cable is a standard RJ-45 twisted pair cable. Ethernet hub has many Ethernet ports and can connect device to the hub using Ethernet cable to form a network. Two devices can be connected using an Ethernet cable without a hub called Crossover cable. Router is mostly used on a home network, because it allows to share the internet connection among two or more computers.

Conclusions:

Ethernet became a powerful LAN technology because of few specific characteristics.  Ethernet technology is easy to understand, implement and maintain. Network implementations take place at low-cost in this technology.  This technology provides huge flexibility for network installation and also guarantees successful interconnection. It is hard to imagine the current network technological world without the presence of Ethernet.  

Download Ethernet Technology CSE Seminar Topic Abstract and Report .

Secure and Fast Encryption Routine CS Final Year Seminar Topic with Report

Introduction to Secure and Fast Encryption Routine Seminar Topic:

This paper discussed about an algorithm, SAFER – Secure and Fast Encryption Routine. In this algorithm, the plain text encrypts by going through S-boxes and decrypts by its inverses but not like in DES where each block is divided into parts which in turn some parts affect others.  For the entire process of encryption SAFER process undergoes eight rounds. Applying the first sub-key to the eight byte of the block is the first step for each round. The process of applying each byte of the sub-key to each byte of the block always relies on which byte is used. SAFER used for invert the encrypted plaintext by reverse each step and in this process there is a possibility of altering the sub-keys which used for encryption. 

Overview:

The process of encryption and decryption of plaintext using sub-keys is same in both SAFER-128 and SAFER SK-128 algorithms.  SAFER SK is a new version of SAFER, which has a huge secure key schedule and also there exists a 40-bit version of SAFER SK. The first 64-bit sub-key was the key itself in the original version of SAFER.

The S-boxes:

The regular box indicates 45 raised to successive powers modulo 257. In S-boxes, every s-box is inverse of the preceding s-box and there may be a probability of getting intractability of the discrete logarithm problem.   Among eight rounds of SAFER process, after the eighth round an extra sub-key is added in the way that the first sub-key of each round.

Sub-key generation:

In order to generate successive sub-keys there is a need to place individual bytes of the key in a circular left shift of 3 bits between the rounds, and the yielded result is XORed with a constant which is fixed for each round.  Usually the rounds proposed for SAFER process are six but later it increased to eight. The fixed constants are obtained mathematically for up to 10 rounds. 

Download Secure and Fast Encryption Routine CS Final Year Seminar Topic with Report.

Significant Changes in Laptop BCA Final Year Seminar Topic with Report

This paper discussed about many significant changes takes place in laptop including features like processors, screens, and display and supporting optical drives. Still many changes are taking place to completely redefine the structure and design of notebooks by 2015. Some notebooks offers sneak peeks which are designing by independent designers and these notebooks arranged in cars gives us insight into what we might be driving in the future.

During 90’s laptop contained integrated pointing devices, speakers and webcams but now-a-days all these became standard equipment for a laptop. Some laptops have touch-sensitive screens which can act as both keyboard and mouse but laptops with multi-touch technology are also entered into the market.

Overview:

The compenion concept notebook borrows from slide cell phones to move beyond the clamshell.  There is a two superbright organic LED panels located side by side with another panel at lower side which acts as keyboard or scribbling pad. All these three-quarters are of inch thick only. Dual-screen systems will become more popular in the coming seven years. Some laptops have two touch-sensitive displays and acts as both display and mechanical keyboard. In those the upper screen is for viewing applications and the lower screen is for other purposes like typing, jotting notes or drawing.

Siafu concept notebook is designed for the blind and it has no screen.  Siafu can convert the images which need to display on the screen as 3D shapes which are created with oil-based synthetic material, Magneclay. Magneclay can instantly forms shapes in response to electrical fields and this magneclay surface helps to read a Braille newspaper, feeling the shapes of a blueprint.  Cairo, the new concept of notebook which can use at anywhere that is at home, in a car, in an Internet café or on a hotel desk. This concept replaces the lid hinge with a shiny bar and it is a carrying handle. Cairo allows the lid to fold up for convenience in travel and it can be converted into an easel or it can sit on a car’s steering wheel. 

Download Significant Changes in Laptop BCA Final Year Seminar Topic with Report.

Latest General Seminar Topic for CSE Students on Cyborg

This paper discussed about the concept of Cyborg, cybermetics and its applications.  Cybermetics is closely related to control theory, electrical network theory, system theory, neuroscience etc. Cyborg is evolved from Cybermetics concept. Cyborg is also termed as cybermetic organism which deals with both biological and artificial values and it is a mixture of organism and technology. 

Overview: 

Cyborgation is the process of becoming a cyborg, which is half living and half machine.  Cyborg with artificial hearts, cyborgs with retinal implants, cyborgs with brain sensors cyborgs with bionic arms are different types of cyborg. Cyborg eel and robo roach are considered as animal cyborgs.  Cyborg concept is used in military and medicine applications. Cyborgation is used as a treatment of Parkinsons disease – treatment for the people who are suffered with vision problem. Due to improved technology, cyborg is an organism with enhanced abilities. A patient fitted with an insulin pump can also be considered as cyborg, since these mechanical parts improves the body’s natural mechanisms through feedback mechanisms. 

White lab rat is the world’s first cyborg. To extend organizational complex functioning as an integrated homeostatic system unconsciously, cyborg is proposed for the first time.  The intimate relation between human and machine lead to the evolution of this concept.  Cyborg is a man-machine system which controls the human body control mechanisms from external by using drugs or regulatory devices.   

Conclusions: 

Cyborgology is the future technology to implement the real human needs. All the terminators which are developed and implemented are all considered as cyborgs only. The main demerit of this concept is people who are rich can make use of this technology and fight against many diseases and in turn can live for long time as much they wish.  Using this technology one can know the location and condition of a implanted person which is a serious concern comes under human privacy violation.  The main advantage of this technology is re-engineering of human species.  As an artificial life wins against organic life the quality of life is significantly improved. 

Download Latest General Seminar Topic for CSE Students on Cyborg .

Business Intelligence and Data Warehousing CSE Seminar Report

This paper discussed about the concepts of Business intelligence and Data warehousing. Business Intelligence is the concept of providing right information at right time to the right decision makers.  There are many BI tools are currently available in the market.  BI supports reporting, analysis and decision making and it popularly referred as enterprise-wide platform. Enterprise users can make better business decisions by gathering, storing, analyzing and providing access to the data with the help of BI tools.

Data Warehouse is a collective database which collects, transforms, loads data from various operational sources and provides the same during reporting and analyzing in a proper, specific format for various business professionals. It is a centralized, integrated, historical and relational database. Data mining is a technique of applying models and methods to data in order to identify patterns and trends. Few techniques which come under data mining related to statistical, mathematical, iterative, scalable, artificial intelligence and machine-learning concepts.  Data mining tools look for patterns like simple models, intermediate models and complex models. 

Business intelligence Applications: 

AS we know no single solution aims all business needs so there is a need to evolving of a single solution for all business intelligence applications like ad-hoc query generation, enterprise Reporting, Online Analytical Processing, Statistical Analysis, Data Mining, Forecasting, Dashboards and Scorecards.

 ABC’s of Business Intelligence: 

A refers to Access-it indicates how to connect people with enterprise resources

B refers to Business Intelligence- it indicates how to provide required information.

C refers to Collaboration-it indicates how to support business processes, productivity and how to establish interaction between internal and external clients. 

For real time decision makers there is a need of improved integration with live data. Business Intelligence tools are providing higher integration with live data by collecting or loading data from various operational sources. As data is unchained from transaction system there is a need of employees with deeper analytical skills.  Web-enabled warehouse stores mining of data. 

Conclusions: 

Enterprises across the world adopt BI solutions in order to keep business relevant, competitive and effective. Strategic purpose, Buy-in and Context are the important BI success factors.

Download Business Intelligence and Data Warehousing CSE Seminar Report.

Blue Eyes Technology Final Year Seminar Topic for Compute Science Students with Report

This paper discussed about the “Blue Eyes” technology and its respective researches.  Blue Eyes system acts as a real-time monitoring system for a user. This system helps user to avoid common threats resulting from human errors and improves the performance of overall system. Human errors might be weariness, oversight, tiredness or temporal indisposition. The CMOS camera integrated in this system enables the system to calculate the gaze point and identify what the operator is looking at. 

The newly introduced voice recognition algorithm in this system helps to simply the authorization process by facilitating communication between the operator and the central system.  A simpler embedded online system monitors conscious brain involvement and warn if necessary and this system can be build with the help of an operator and the supervised process. Because of this system, Bluetooth technology became more popular but this technology implementation is relatively inexpensive. 

Overview:

                Blue Eyes technology is targeted to create computational systems which have sensor and perceptual ability like those of human beings.  This technology uses non-obtrusive sensing method, uses video cameras and microphones to identify the users and observe their actions.  This technology helps to create a machine which can realize physical or emotional states of a human and which can identify what a user wants or where he is looking at.  

This paper focused on how the computers get the ability of sense, recognize and respond to the human actions. Sensing self-report and concurrent expression helps to users to communicate human emotions to computers, and then computers to other people. This paper highlights on how the researches takes place on blue eyes technology and briefly describes how the potential ethical concerns are addressed. Some machines need to pay attention to human emotions and have the capability to emulate emotion and some machines are useful as rigid tools. Automatic signals, behavioral manifestations and facial expressions are the three key aspects which are important in representing the emotions that a computer is believed to posses. 

Download  Blue Eyes Technology Final Year Seminar Topic for Compute Science Students with Report .

B.SC Computer Seminar Topic and Report on Google Chrome OS

This paper discussed about an upcoming operating system, Google Chrome OS which is designed by Google. Google designed this OS to work especially with web applications with natural ease.  This OS concept has got announced in 2009 and developed in 2008. But this OS is publicly available in the market only during the second half of 2010. This Operating system designed and implemented based on Linux operating system and will execute only of specifically designed hardware.

Overview:

         Google Chrome OS is aimed at net books initially and it is an open source, lightweight operating system. This OS is designed and implemented by Google initially and they designed in a way to satisfy the working conditions of web applications, so the main target of developing this operating system is web applications and it is announced in the year 2009.  Later in the second half of 2010 this OS is available as an open source code and in net books.

This OS provides the facility of quick, simple, and more secure computing experience for people who need to spend most of their time on web applications. 3S’s concept is the key aspect of Google chrome OS where 3S’s refers to speed, simplicity and security. Google Chrome OS can run on both x86 as well as ARM chips. Researches are still carrying out to make Google chrome OS works with multiple OEMs to bring a number of net books with this OS into market.

                                       The disadvantage of this OS is not able to find amazing boot time or snappy responsiveness because this Chromium OS won’t be as fast as the operating system is designed to be and also because it is running in a virtual machines. The advantage of this method is that internet connection, keyboard, and mouse will work together irrespective of the fact that whether these are part of Google’s list of approved hardware or not. 

Download  B.SC Computer Seminar Topic and Report on Google Chrome OS .