Security Risks and Solutions – ADHOC Routing Protocols Seminar Report for CSE Students

Introduction to Security Risks and Solutions – ADHOC Routing Protocols :

This paper discussed about the security issues in ad-hoc routing protocols and how the process of routing takes place in ad-hoc networks.  Because of the ad-hoc nature of MANETs, proper routing is very important in order to protect against attacks.  There is a need to focus on available security solutions to prevent security risks in ad-hoc networks. 

Overview:

Attacks using impersonation are called spoofing, which hides the real IP address or MAC address and user another one. Falsifying route error messages, route cache poisoning, routing table overflow attack, reply attack and black hole are few of the popular attacks which uses fabrication. Attacks using fabrication are very difficult to detect. There is a need to find a routing protocol which forms routes free from any malicious nodes. A good routing protocol should detect the malicious nodes and need to change the routes accordingly. Route cache poisoning is a passive attack that can occur in DSR. Mainly ad-hoc networks are divided into open, managed-open and managed-hostile environmental categories.

The techniques which helps to enhance the ad-hoc routing protocols are security-Aware ad-hoc routing, secure routing protocol and selfish node. Selfish node is a concept used in open environment ad-hoc networks to avoid maliciously behaving nodes. The monitor, reputation system, path manager and trust manager are the four components which are used to keep network throughput at a maximum. For managed-open environments, secure communications are provided by ARAN protocol. ARAN, Authenticated Routing for Ad-hoc Networks protocol has authentication and transmission phases. 

Conclusions:

In order to make ad-hoc routing more secure, different solutions are available for different environments.  The security level of ad-hoc routing protocols always depends on situation, context and infrastructure availability.  Every security problem in ad-hoc networks has solutions but every solution has its own drawbacks.  The choice of selecting solutions to security problems in ad-hoc networks based on the impact of those security aspects.

Download  Security Risks and Solutions – ADHOC Routing Protocols .

Engineering Seminar Topics for CSE Students on Android

Introduction to Android Seminar Topic:

This paper discussed about the most emerging and fast growing mobile operation system, Android.  Android code has a free software license, Apache license. The Android Open Source Project is working on further developments of Android and providing maintenance to the current version. Android is a mobile operating system which developed based on Linux kernel with middleware, libraries and API’s written in C.

Overview:

Android has huge number of developers to develop applications and there are approximately, 250,000 applications are available for Android.  Google is running an online application store, Android market and allows the users to download Android apps using third-party sites.   Updates in Android are coming as versions and each version has its own code name.  Cupcake, Donut, Eclair, Froyo, Gingerbread, Honeycomb, and Ice Cream Sandwich are the code names of Android versions.

 The combination of Gingerbread and Honeycomb is termed as Ice cream sandwich version and also this version has few more new updates.  Android logo has an Android robot which represents the Android operating system.  Android’s custom typeface is called Norad, which is only used in the text logo.  Android x86 project provides support to x86 version of Android OS and Google TV uses a special x86 Android version.

Conclusions:

Android is a software stack for mobile devices developed by Google and Open Handset Alliance.  Android is marked as world-wide best selling smart phones platform.   Google TV, tablet computers, smart phones, netbooks and few more devices are using this Android operating system.  ARM architecture is the main hardware platform of Android.  HTCDream is the first phone which used Android software in 2008. Mostly, applications developed in Java language are using Android Software Development Kit.

Android market, an online application store is running by Google and also along with android apps, Google provides many other Google apps in this store.  From the Android market, users can install applications from third party application stores like Amazon application store. 

Download  Engineering Seminar Topic and report for CSE Students on Android .

Brain Computer Interface Seminar Topic with Report for CSE Students

Introduction to Brain Computer Interface Seminar Topic:

This paper discussed about how to measure brain function and importance of different neuroimaging modalities. As per researches, the best tool to measure brain function is EEG (electroencephalographic). In this tool, by using both invasive and non-invasive real time techniques, activities from different parts of the brain can be measured.  These EEG signals will get applied to signal processing unit for further processing.

Overview:

The main task involved in this tool is the classification of EEG patterns with respective to its frequency and amplitude in different consciousness states.  EEG signals can be obtained from brain by both invasive and non-invasive techniques. In Invasive technique, EEG signals obtained either with the help of needle electrode or by a chip which implanted in the brain. In non-invasive technique, user needs to wear an electrode cap which records EEG activity from the brain and identify brain waves.

There is no need of any surgery or implantation in this technique.  But in this technique, there are some limitations exist while recording from the scalp using electrode cap. Multi-Layer Perceptron Neural Network (MLP-NN) based method is one of the simpler and most efficient method under EEG classification.  EEG signals are used to control the output devices and this control can be achieved either by using tracking system or software technique.

Conclusions:

In BCI, the machine should learn how to differentiate brain activity patterns and the user should learn how to perform different tasks in order to yield distinct brain signals. In real-time there is a need to execute few tasks by the user for an effective working of BCI and the tasks are like Parameter extraction, pattern recognition and classification and generation of neurofeedback.  EEG patterns characteristic changes can be produced by performing few mental tasks like mental cube rotation or attention versus relaxation.  Initial training, offline analysis and classifier generation, training with neuro-feedback and classifier update are the four steps involved in the whole training process of BCI.

Download  Brain Computer Interface Seminar Topic with Report for CSE Students .

Routing Seminar Topic for CSE with Report

Introduction to Routing Seminar Topic:

This paper discussed about the importance of Routing and multicast routing scheme.  In an inter network, information passed from source to destination node through Routing, which is an important component of communication networks.   Due to limited wireless network bandwidth, energy resources and dynamic topology, multicast becomes the most challenging routing scheme in peer-to-peer or adhoc networks.  Multicast is hard in wired networks when compared to that of unicast routing scheme.

Overview:

Multicast routing scheme supports many envisioned advanced applications like military operations, civil operations and disaster management in peer-to-peer networks.  Tree based and mesh-based are the two categories of adhoc multicast routing protocols.  Only one path exists between the source and receiver in tree based routing scheme.  Multiple redundant paths exist between the source and receiver in mesh-based routing scheme.  Proactive, reactive and hybrid are the three update mechanism categories in multicast routing protocols based on the adhoc routing information.  

In proactive protocol, nodes always evaluate routes to all reachable nodes and maintain consistent routing information.  The proactive protocol is also termed as table-driven protocol.  In reactive protocol, routing information is not maintained at the network nodes if communication is not exist.  The reactive protocol is also termed as on-demand routing.  In order to balance the delay and control overhead, the hybrid routing protocols exists as an advantage of both proactive and reactive routing protocols. In adhoc networks, this paper has compared two on-demand routing protocols like Multicast operation of Ad-hoc On-demand Distance Vector (MAODV) and On-Demand Multicast Routing Protocol (ODMRP) based on the corresponding routing performance.

Conclusions:

This paper compares two on-demand routing protocols in adhoc network and analyzed the results based on the corresponding routing protocols performance. MAODV is a hard state reactive tree based routing and this protocol uses a broadcast route-discovery mechanism.  ODMRP  protocol is based on a mesh structure and connects the multicast members by using forwarding group nodes concept. ODMRP helps to create and maintain the multicast forwarding state.

Download  Routing Seminar Topic for CSE with Report .

Home wireless network Seminar Topic for Technical CSE Students

This paper discussed the process of setting up a home wireless network. In order to setup a home wireless network there is a need to complete an initial wireless router setup and then add computers and devices to the network.  As the availability of routers, internet access increases rapidly in the market it is easy to set up a wireless network.

Overview:

We need to connect to the internet which is the first step, for that we need to ensure the internet connection and modems are in working state.   The second step is connecting wireless router to modem. Then modem should allow us to connect to the internet.  When computer connects to the router wirelessly, the router sends communications to the internet with the help of modem. ISP’s instructions are always available to guide on how to connect router to modem.  Once connects router to modem there is a need to configure the network, which is a third step in the process.

Temporarily connects the computer to open network port on the wireless router using the wireless router cable.  So later whenever the computer is turn on then the connection should establish with the router automatically.  Need to type an URL in internet explorer page in order to configure the router. The router configuration page may prompts for the password and password or address need to be given as per router’s instruction page.  

The three things need to be configure in router configuration page are wireless network name (SSID), Wi-Fi protected access and an administrative password. The fourth step involves in this process includes the connection of computers, printers and other devices to the wireless network.  Instructions for adding wired, wireless devices and printers to the computers are available always in online.  Once the computer and devices are connected to each other, and then can share files, printers and games among the internet users.

Conclusions:

This paper discussed five steps to set up a home wireless network. All the steps mentioned here are so clear for an user to implement in order to set up a wireless network at home.

Download  Home wireless network Seminar Topic for Technical CSE Students .

Seminar Topics for ECE 2012 on Robotics with Report

This paper discussed about an emerging technology, surgical robotics. Robotic surgery plays an important role in overcoming the surgical limitation of minimally invasive laparoscopic surgery. Robots in operating rooms provide assistance to surgeons and help them to complete the routine surgical activities with less effort. Surgical robots are controlled by the methods like remote control and voice activation. Surgical robots allow precision of surgical instruments in minimally invasive procedures.

The main goal of robotic surgery field is to develop or design a robot which can perform heart surgery.  Robotic surgery helps to reduce pain and scaring to the patient.  In addition to the rewards to the patient, this robotic surgery is very helpful to both the surgeon and the hospital.

Overview:

Robots are entered into medical field slowly but proved its presence with its significant benefits. Robotic surgery is comes into existence to overcome the drawbacks of conventional surgical procedures. Doctors have already started using the sophisticated robots to perform surgical tasks on patients. The robotic surgical systems have capability to improve the safety and effectiveness of surgeries. But even these systems also have some drawbacks.

The one of the main disadvantage of this system is it is highly expensive. The usage of robots in performing surgery is termed as Robotic surgery. Remote surgery, minimally invasive surgery and unmanned surgery are the three significant benefits of Robotic surgeries. The enhanced vision of these systems is highly remarkable. Unlike the conventional laparoscopic camera views, this system has 3-dimensional view with depth perception.

Conclusions:

Robotic surgery is still in its evolving state. This paper discussed about the current role of robotics in surgery and its future. Robotic technology improves and expands laparoscopic procedures and brings revolution in surgery. Beyond the limits of human ability, a robotic can perform or expand its surgical treatment modalities. But maintaining of this robotic technology is cost effective so researches are still carrying out by considering all aspects like cost and power consumption.

Download  Seminar Topics for ECE 2012 on Robotics with Report .

Agricultural Robotics ECE Seminar Topic Fulll Report

Introduction to Agricultural Robotics Seminar Topic:

This paper discussed about the usage of robotics technologies in various fields and about an upcoming automation technology, Agricultural Robotics.  The main target of this technology is on how crop production can increase but not on how to replace human driver with a computer simply.

Overview:

Agricultural robotics technology helps to produce qualitative products at higher speeds and with fewer errors.  Robotics helps in various fields like agriculture, medicine, mining and space researches. The major disadvantage of driverless machines for agriculture is liability. This technology can completely change cultural or emotional appeal of agriculture.  This technology is fully cost-effective.

Treeboot is a popular embedded network sensing technology. The main objective of Treeboot robots is to acquire information about the environment by making use of distributed sensors. The forester robot is used for cutting up of wood, harvesting pulp and hard wood in the forests. Robots are highly used in Horticulture to maintain lawns successfully.

The main features of these robots are no fumes, no oil leaks, and no pollution and whisper quiet operation. Fruit picking robots are useful for harvesting of crops. These robots are using video image capturing technique to distinguish leaves from fruits. In the last decade, there is a significant development in Agricultural robots.  Researches are still carrying out in designing these robots more efficient for better agriculture.

Conclusions:

The robot-enhanced productivity is very high in agriculture immense and the robots are appearing on farms in various guises. The other problems associated with autonomous farm equipment are addressed with this technology. Crop production may be done better and cheaper with small machines than the larger ones. The non-farm community highly accepts the smaller machines. The jobs in agriculture includes highly repetitive decisions hence the robots can exactly substitutes human operators. The quality of the products can be highly sensed and verified by machines accurately.  The quality of our lives can be improved by robots by farming many qualitative crops but this process has its own drawbacks.

Download  Agricultural Robotics ECE Seminar Topic Fulll Report .

Computer Forensics B.tech CSE Seminar Topic and Report for Final Year Students

Introduction to Computer Forensics  Seminar Topic:

The process of identifying, preserving, analyzing and presenting legally acceptable evidence is termed as Computer Forensics. Computer forensics services are very much useful in professional environment and in corporate consulting.

Overview:

Computer forensics services are useful services for both private and government organizations during audits. The main parts of computer forensics are Forensic Data Recovery (FDR) and Incident Response Systems (IRS).  There are existing laws which supports computer forensics in criminal as well as civil litigations.  Security risk management, electronic document discovery and Data recovery are carried out using the computer forensics tools.  Computer forensics services are also useful for disputes resolution and to provide an expert witness testimony.  

These services can be availed in the compliance of proactive reviews, risk management and in investigations of specific allegations. The protection of intellectual property and the corporate assets are also a major services provided by computer forensics system.  These services can be applied for individual case studies which involves personal issues. Computer forensics helps in considering intentional misuse of privacy or personal information as a legal case. Data recovery problems are can address by this computer forensics system.

The common applications of a computer forensics are financial fraud detection, criminal prosecution and civil litigations.  In addition to cyber crimes, criminal are using computers for many criminal activities, in such situations computer forensics plays vital role in further investigation.  Computer forensic investigation is useful for identification, acquisition, preservation, analysis and reporting of digital evidences.  

Conclusions:

This paper discussed about the need of computer forensics. This system helps to store crucial electronic evidences and used them to prosecute individuals.  There is a need of cooperation from the private, public and international sectors to accomplish tasks using this computer forensic system. All stakeholders must exchange the information on cyber crimes so that it will be easy for a computer forensic system to detect and prevent such crimes. 

Download  Computer Forensics B.tech CSE Seminar Topic and Report for Final Year Students .

RFB Protocol Seminar Report for B.tech CSE Students

Introduction to RFB Protocol Seminar Topic:

This paper discussed about the RFB protocol and defined its various working aspects. Also, this paper defined about the remote computing and remote access. RFB protocol acts as a communication protocol while remote access takes place between client and servers across network. Remote access is possible when client and server communicating by making use of this protocol. RFB protocol working activities are detailed in this paper.

Overview:

RFB protocol has various messages which are send and interpreted by both server and client modules. RFB protocol provides remote access to GUIs. This protocol is applicable to all windowing systems and applications as this works at the frame buffer level. RFB protocol is using in Virtual Network Computing also. Display and Input protocols are the basic parts of RFB protocol. The display part is based on a single graphics primitive and the Input protocol based on a normal workstation model.

In RFB protocol, a thin client protocol, in which there is some communication protocols exist between RFB client and RFB server.  This protocol is designed in a way such that makes a client with fewer requirements.  Because of this the task of implementing a client is very simple. This protocol became very popular after it used in Virtual Network Computing.  This protocol can be extended into new encodings and pseudo encodings.

RFB protocol can operate on either byte-stream or message-based transport channels. This protocol is used over a TCP\IP connection also. This protocol proceeds through three stages like handshaking phase, initialization phase and normal protocol interaction phase. In the first phase, both client and server agree the rules, security and version of communication. In the second phase, client and server exchange the messages. In the final phase, both client and server exchange various other messages which begin with a message-type byte.

Conclusions:

This paper has given and implementation example of RFB protocol for easy understanding of its concepts, also define how program can be execute on a server or client based on this RFB protocol.

Download  RFB Protocol Seminar Report for B.tech CSE Students .

Brain-Computer Interface B.tech CSE Seminar Topic with Report

This paper discussed about an emerging technology, Brain-computer Interface (BCI).  BCI helps to control remote devices by making use of electrophysiological signals.  BCI consists of electrodes which can apply to the scalp of an individual. These electrodes capture brain’s electrical activity and carry the same to amplifiers, where these amplifiers pass the signal to a computer for processing through an analog to digital converter

Overview:

BCI performs communication and environmental control by providing EEG signal to the computer for processing. In BCI’s considerable amount of time spends on recognition and signal processing and also much complexity involves in the signals carried out by a BCI, so because of these BCI’s are slow in performance when compared to that of human actions. The BCI system takes Electroencephalogram (EEG) signals as inputs and gives control option by its output. The obtained output signals are evaluated as cursor control or prosthesis control. 

BCI provides a communication channel for patients with locked-in-syndrome. BCIs aimed at repairing human cognitive functions. BCI reads electrical signals of human brain activity and translate them to computer understandable digital language and then converted into few actions like turning on a TV or moving a cursor. BCI helps to the patients who cannot perform actions based on the signals from their brain. Apart from medical usage, BCI is also useful for gaming and automobile activities. Few of the technologies used for BCI are neural tissue engineering, robotics and signal processing.

Conclusions:

Mostly the direct communication through EEG takes place in BCI. Signal acquisition, Signal processing, classification and pattern recognition and application are the four main components of a BCI system. BCI creates a direct communication between human brain and external devices.  Neuroprosthetics is a technique using in BCI to control nervous system disabilities.  But there is a need of extensive training on how to use EEG technique in BCI system. BCI environment setup is costly so implementation of BCI system is more cost-effective. 

Download  Brain-Computer Interface B.tech CSE Seminar Topic with Report.