Cython B.tech Computer Science Seminar Report

Introduction to Cython Seminar Topic:

It is the advanced version of the programming language python, and it is also called the derivative of Pyrex language, designed with extra syntax and to remove the limitations of that language. They can also compile the code written in python, as they are first converted in to the c code. The generated c sometimes gives as error of declarations for the python and c types. To remove this we use Cython as it makes them in the part of the program.

These language first convert the code in to the following C/C++ code and then in the binary code. They the array very fast as they access the array of python directly as object and they support almost all types of number even complex floating type. They have faster functions and smart algorithm that are 6 times faster than the fastest. In C we have to call external function like sin () from math but in Cython it has its own sin () function that is faster than that. We need to import the c libraries from python and write the code also as fast as possible. In Cython we have different strings for both byte strings and Unicode strings.

Advantages: it has increased the speed of python almost to the speed of the C. it has added new data types and different types of declarations few static type. They are more than any wrapper solutions that are available.

Limitations: they face main problem during the compilation time. They have limited threading. They don’t have templates. Compiler sometimes ignores the error related to the static type declarations. They are the best when we talk about using the external libraries but it is not suited for replacing normal python code to Cython code. we require little experience while using dynamic and static block.

Download  Cython B.tech Computer Science Seminar Report.

Computer Seminar Topic and Report on Removable Media Storage Devices

Introduction to Seminar Topic on Removable Media Storage Devices:

Mass storage or auxiliary storage refer to different devices are used to store huge amounts of data. Now many modern storage devises developed but in earliest days of early 1800’s only these storage devices developed. These modern storage devices includes all type of tape drives and disc drives such as optical disc drives, RAID systems, floppy disc drives, magnetic tape drives and drum memory.

These mass storage devices include non removable and removable media devices. Mass storage devices are similar to memory present in the devises but not the same. Temporary storage within system is referred as memory but mass storage devices store the data permanently even when the system turns off. These mass storage devices are measured in kilobytes (kb), megabytes (mb), gigabytes (gb) or in terabytes (tb) and these devices have characteristics of seek time, course capacity, transfer speed and cost.

Magnetic storage disks are mostly used in personal computers for storage media. This magnetic disk can be recorded and also re-recorded magnetically any times. Magnetic recording tapes, floppy disks, hard disks and magnetic strips on electronic cards are the common examples for magnetic storage devices. For creating CD’s and DVD’s optical storage devices are used that is written and read by light where the data is stored. Optical disks have the advantages of less weight and higher capacity over magnetic disks.Many mass storage devices are developed in advanced years day by day from when the first mass storage device floppy designed in 1971.

In this project we are going to give a detailed information that how mass storage devices store the data, types of mass storage devices, history of these mass storage devices and resent developments in these mass storage devices and what are the advantages of these mass storage devices.

Download  Computer Seminar Topic and Report on Removable Media Storage Devices.

Latest Computer Seminar Topic and Report on Super Computer

Introduction to Computer Seminar Topic on Super Computer:

A super computer has high processing speed and Heavy storage capacity which is measured in petaplofs. They were introduced in 1960’s and were used in CDC control Data Corporation by Seymour Cray. They were after designed by IBM and Hewlett-Packard.  Tianhe-1A is the fastest super computer in the world which is located at china.

Hardware design:

The hardware design consists of lacks of processor and RAM’s for high speed data processing. They are large in size at size 5-story building. The high speed processing is achieved by parallel processing. The key element is highly parallel systems.

Supercomputer challenges, technologies

  • The major fact is super computers lots of power that is in megawatts. And for cooling purpose that much amount of power is used. The cost of power consumption is 3.5 million $.
  • The latency of super computer between its parts is 10 Nano second’s .It cannot move faster than light. The modern supercomputer built with several cup’s running parallel with latencies of 1-5 micro seconds.
  • They consume massive amount of data in a very short time.

Processing Techniques:

Vector processing techniques were used in the beginning of super computers.

 But they went down by DSP and SIMD Simple instructions and multiple data.

  For video processing and graphics Teraflops video card were used.

  The technology for GPU’s is GPGPU’S

Operating System:

The operating system in super computers is LINUX variants. 

Programming:

The programming is done based on c and c++ language. The effort requires is lot optimizing the performance of cups because of wasting time on unwanted nodes. The GPGPUS used have hundreds of processing cores programmed based on CUDA and Open Gl.

Examples of special-purpose supercomputers:

Belle, Deep Blue, and Hydra, for playing chess

Reconfigurable computing machines or parts of machines

GRAPE, for astrophysics and molecular dynamics

Deep Crack, for breaking the DEScipher

MDGRAPE-3, for protein structure computation

D. E. Shaw ResearchAnton, for simulating molecular dynamics

QPACE, for simulations of the strong interaction (Lattice QCD)

Download  Latest Computer Seminar Topic and Report on Super Computer.

ECE Technical Seminar Report for Schonhage Stassen Algorithm Seminar Topic

Introduction to Schonhage Stassen Algorithm Seminar Topic:

This algorithm is used multiply the large integers quickly. The developers are Arnold Schönhage and Volker Stassen in 1971.This algorithm uses recursive Fast Fourier transforms in rings with 22n + 1 element. There are several notations in this Big O notation. This algorithm was in use up to furers algorithm. But this algorithm achieves only astronomical large values. The method of schonhage-stassen is based on Crandall and Pomerance in their Prime Numbers.

Convolutions:

For example take numbers 123 and 456 and multiply with the base digit B without carry. The output is.

    1 2 3
  × 4 5 6

    6 12 18
  5 10 15  
4 8 12    

4 13 28 27 18
         
 

 

 

       

The sequence 4, 13, 28, 27, 18 is called linear convolution. They are original sequences of 1, 2, 3 and 4, 5, 6.

Convolution theorem:

The Stassen-schonhage algorithm depends on the convolution theorem. By the use of this algorithm two sequences can be easily calculated. Cyclic convolutions of two vectors are calculated by DFT discrete Fourier transform. Elements are multiplied vector by vector.

CyclicConvolution(X, Y) = IDFT (DFT(X) · DFT(Y)).

For the multiplication of algorithm and to invoke recursively if we use DFT and IDFT for the vectors DFT(x) and IDFT(y) this results in a best algorithm for cyclic convolutions.

Nega cyclic convolution is very useful if use in this algorithm it’s a update of convolution theorem. It can be stated as

A = (aj), 0 ≤ j<n

A−1 = (a−j), 0 ≤ j < n

Now, we can state:

NegacyclicConvolution(X, Y) = A−1 · IDFT (DFT (A · X) · DFT (A · Y)). 

The multiplications of recursive vectors element-by-element can easily calculated by nega cyclic convolution. It also faster than cyclic convolution theorem because it has slight modification mod 2n + 1.

Download  ECE Technical Seminar Report for Schonhage Stassen Algorithm Seminar Topic.

Attacking LSB Based Image Steganographic Technique Seminar Report

Introduction to Attacking LSB Based Image Steganographic Technique Seminar Topic:

The word stegano was derived from a Greek word called steganos which means covering or hiding. Steganography means hiding important messages in any form image, audio, video, paper etc. The process allows covering important messages in uncommon way. From the ancient days steganography was used by covering the wood texts with waxes. During the World War 2 also it is used by some spies. Invisible inks are mostly used as a process of steganography they are seen only heated under fire. Steganography is used ide copy-right information in images or audio or video. By this third party sharing.

Steganography-Today:

Us government concerned the needs of the steganography. Terrorists are using steganography to communicate between each other. For example Al-Qaeda posting images over air and they are downloaded by other and they revealed by their techniques. It is also considered as anti-forensic mechanism which includes child pornography.

Steganography-Tools:

The tools which are used:

  • StegoDons
  • MandelSteg
  • Hide and Seek
  • Jpeg-Jsteg
  • Stools
  • Ezstego
  • Hide4pGp
  • Stegaons
  • StegHide
  • Invisible
  • JpHide
  • Hiderman
  • camouflage

Types of Analysis:

  • Specific image steganalysis :
  • Palette Image Steganalysis
  • Raw Image Steganalysis
  • JPEG Image Steganalysis
  • Generic Image Steganalysis Algorithms 

Steganalysis meets Cryptanalysis: 

  • size difference
  • date/time difference
  • contents – modifications
  • checksum
    • Categories
    • Histogram analysis
    • Change in file properties
    • Statistical Attack
    • Visually
    • Audible

Common encryption algorithms used:

–        XOR

–        DES

–        3DES

–        IDEA

–        AES 

Password Guessing/Dictionary Attacks:

There are some password guessing techniques like brute-force, Rainbow.

Passwords can be determined by Camouflage.

Multi hex program can also be used.

Conclusion:

By using these techniques piracy can be controlled easily. There is no chance of sharing copy righted images audio vedio. Steganography has been implemented in various techniques in this trend.

Download  Attacking LSB Based Image Steganographic Technique Seminar Report.

Computer Seminar Topic on Static Router with Seminar Report

Introduction to Seminar Topic on Static Router:

Router is a device which routers the inter network from the source to destination. They transfer the packets from one network to another network. Routers use static and dynamic routing protocols in certain situations. Static routings are very common in routing.

Role of Router:

Routers are plays a key role in internet working. They determine the best path to transfer the packets from the source to the destination. It includes forwarding the packets or sending. They perform routing by remote networks and maintaining information about packets. The routers first forwarding decision is based on three layer information that is internet proxy address. The routing table is best way to find the match between the destination internet proxy of a packet and network addressing routing table. The router encapsulates the packet and sent them to appropriate IP address.

Router connections:

The router is to be connected with network with router interface. There are different types of connectors.

Serial connectors:

In serial connectors support EIA/TIA-232, EIA/TIA-449, V.35, X.21, and EIA/TIA-530 standards of connectors.DB-60 port supports five different cables and other ends are connected supported cables. Routers support smart serial interfaces which are 26-pin connectors it is whether DCE or DTE configuration type. It is smaller compared to DB-60. The cable which that we are using that is automatically determined by WAN-service that we are using.

Ethernet Connectors:

In Ethernet connectors a twisted pair RJ-45 connector is used for LAN-connections. It has eight-colored pins or strips. Ethernet cable uses 1, 2, 3 and 6 for sending and receiving data. A patch cable and cross over cables are used to connect.

Straight-through cables are used for:

  • Switch-to-router
  • Switch-to-PC
  • Hub-to-PC
  • Hub-to-server 

Crossover cables are used for:

  • Switch-to-switch
  • PC-to-PC
  • Switch-to-hub
  • Hub-to-hub
  • Router-to-router
  • Router-to-server

 Download  Computer Seminar Topic on Static Router with Seminar Report.

Honeypots For Network Security CSE Seminar Report

Introduction to Honeypots For Network Security Seminar Topic:

             Honeypots, an exciting new technology allow us to turn the tables on the bad guys. There has been a growing demand and interest in the field of honeypot technology.

           A honeypot is used in the field of network security. It acts as bait for potential attackers; the honeypot in turn gathers as much data on the attacker as possible to help determine their identity. A major goal of this paper is to showcase the possibilities of honeypots and their use in a research and productive environment.

A honeypot is much better at discovering suspicious intruders than an intrusion detection system. Honeypots have a big advantage where they do not generate false traffic reports, so it is harder for intruders to detect the device.

Introduction:

             As global communication is increasing in importance every day, so are computer crimes. Counter measure have been developed to detect and prevent intrusions by analyzing known facts and attack patterns. Similar to the military where it is imperative to know your enemy and their strategies and tools, computer security experts also need to know what their intruders are doing, what tools they are using and where they are based. If one knows this information, counter strategies can become more efficient and optimized. And one of the main goals of Honeypot is to gather this data.

A honeypot is principally a device which gathers information to learn from it. Its primary purpose is to camouflage itself from the black hat community so that they can be caught red handed. The honeypot silently gathers information like, their attack patterns, programs used, as well as information about the black hat community itself. There are other ways in which a honeypot helps intrusion detection. A honeypot can detect intruders while they are performing an attack and gather information about them.

                Although honey pots are good at preventing intrusions, they are not a perfect solution for preventing computer crime. They are hard to maintain and administrators need good knowledge about operating systems and network security. In the correct hands, a honeypot wields immense power to root out crime from the black hat community, but in the wrong hands, it becomes an instrument which is leveraged by the black hat community to commit crimes.

Download  Honeypots For Network Security CSE Seminar Report.

Computer Seminar Topic on Holographic Memory with Seminar Report

While this storage want is being met the storage technologies should continue so as to stay pace with a quickly increasing demand. With the decreasing price of storing knowledge and increasing storage capability with a same little device foot print are key enablers of this revolution.

Storing info through the amount of the medium not on its surface offers associate intriguing high capability various. Holographic knowledge storage could be a meter approach that has created recent progress towards utility with the looks of lower price facultative technologies.

With its ubiquitous laptop all connected via net modern era has lead associate explosion of data out there to users. Therefore the holographic memory has become a good Delphinapterus Lucas of technology analysis.

Concept of Holographic Memory

In optics, the intent is to record total wave field (both amplitude and phase) because it is intercepted by copy medium the record in plane might not even be a picture plane. The scattered or mirrored light-weight by object is intercepted by the recording medium and recorded utterly in spite of the actual fact that the detector is insensitive to the section distinction among the assorted a part of the optical field.

In optics, interference between the article wave and reference wave is made and recorded on a holographic material. The record referred to as exposure (whole record) captures the entire wave which may be viewed at the later time by illuminating the exposure with associate acceptable light. to the current day optics continues to supply the foremost correct depiction of three-D image within the world.

Related Link to download Seminar Report:

Holographic Memory Seminar Report

Holography may be a technique that permits recording and playback of 3- dimensional image. The referred to as a exposure in contrast to different third-dimensional “picture” exposure give exposure give what’s called “parallax”. Optical phenomenon permits the viewer to maneuver back and forth up and down and see completely different perspective – as if the article were truly there.

Download  Computer Seminar Topic on Holographic Memory with Seminar Report.

Computer Seminar Topics 2012 on Hidden Secret of Hacking with Seminar Report

Introduction to Seminar Topics 2012 on Hidden Secret of Hacking:

Today the entire world is growing very fast. They are developing very quickly. So at present everyone is trying to get their data first. Previously when we connect two people or more than two they have to meet face to face. When internet comes this process is very easy to every people because they can talk through internet. Likewise when there is no use of computer, every people face some problem because they have to do their work manually.

It was very time consuming. When computer invented it is very to people to do their work. At present they are working through online. It is much easier. They just out their document or information into a database through internet. This will take less time. But there is a problem when they are working online they have to be more concentrate on their work and must maintain a high security for their system. At present we access easily access all the information related to all the countries.

It is the main target of computer evil or online evils. They always wanted to theft the data from the system. In our language we called them hackers. Hackers are always ready to hack anyone’s system. If they succeed in their work then the whole world can face many problems like less of live and less of money. The threats interrupt the key assets of business: knowledge, internal networks, and web site or commerce portals generating revenue. Once attacks on these properties occur, they need a true impact on the profits, brand, and efficiency of the targeted organization. 

INTRODUCTION:

Online security is the main issue. Online freaks and users each a like are progressively obtaining introduced to a spread of on-line security threats. In this paper I will discussed the below topic.

1.      Difference between a hacker and a cracker

2.      What are a Virus, Worm and Trojan?

3.      Sniffing and Spoofing

4.      Phishing

5.      Credit Card hacking

Download  Computer Seminar Topics 2012 on Hidden Secret of Hacking with Seminar Report.

Latest Computer Seminar Topic on A Signature-free Buffer Overflow Attack Blocker

Introduction to Seminar Topic on A Signature-free Buffer Overflow Attack Blocker :

  • What is SigFree?

SigFree, full form is Signature Free is a technique by which buffer overflow attack can be prevented. SigFree blocks all the new buffer overflow attack. All the Code Injection Attack Packets also block by this SigFree technique. It means it is transparent.

  • What is Buffer Overflow Attack?

Actually it is the most vulnerability in any type of computer system. It is the main cause of any computer attacks. Server breaking down, worms are the example of these kind of attacks. A buffer flow occurs during any kind of program execution. Main cause is when a large number data copied into a fixed size buffer. Then there is a possibility to overwrite the data into the buffer.

  • How to Block the Buffer Overflow Attack?

We can block this type of attack by using SigFree technique. The total steps are mentioned below.

  • URL Decoder: It first encodes the request URL. 
  • ASCII Filter:  All the executable codes are in binary form. For that when any send a request URL and URL body, at that time ASCII Filter convert it to the Binary Code. 
  • Instruction Sequences Distiller: It rectifies or extracts all the instructions from the requested URL and requested body. 
  • Instruction Sequences Analyzer: Using the Instruction Sequences we can extracted from instruction sequence. This module analyzes which one is program. 
  • We used web services in this project to make HTTP request. 
  • What is web Service? 

Web Service describes a standardized way, which is an integrating web service. This is a special kind of web application. It can convert any application to web application. 

  • Why we use Web Application? 

In this project we give an idea where we perform the SigFree technique by sending an HTTP Server. For analyze the URL we have to extract the URL and check whether it is executable or not.

Download  Latest Computer Seminar Topic on A Signature-free Buffer Overflow Attack Blocker Seminar Report.