Approach For Recognition Of Optical Or Visual Characters Project

This paper is about neural approach for recognition of optical or visual characters. Previously the neural approach was implemented for optical characters but this paper suggests about simplified neural approach. 

In the existing system classical approach for pattern recognition is not well suited as the characters can differ in size, shape and style from one person to other or can change within the course of time with the same person, even the visual characters can get spoiled due to noise. And also there are no rules for defining visual characters. 

In the proposed system optical character recognition was suggested as it has advantages over the existing system, the new method implemented is adaptive with minimum errors and changes in patterns and the system introduced is a general system which is independent of size and aspect ratio and also user specific. 

In general a software implements good documentation improves user friendliness and also maintainability whereas quality software results in user satisfaction where all the user requirements are met with no or less errors and the project all these features are well implemented. 

The paper is about recognition of optical or visual characters and various approaches. In this paper we have dealt with the various approaches for recognition and its features and also introduced neural approach for recognition and compared its features to the existing system and concluded that the neural approach is the best approach which is simpler than other approaches.  

Hardware required:

          CPU Type            :  Intel Pentium IV

          Display type     :   CGA, VGA, and SVGA.

          RAM                    :  256 MB and above.

Software:

              Front end                  :   JAVA

              Operating systems    :   windows 98, windows xp and higher versions.

Download  Approach For Recognition Of Optical Or Visual Characters Project.

Optical Camouflage Technology Seminar Report

Introduction to Optical Camouflage Technology Seminar Topic:

This paper describes about various methods used for implementation of visual space. One of the most common topic now a days are displaying a virtual object in real world. In this paper we discuss about camouflage technique called optimal camouflage.

The idea of Optical camouflage is to create the invisibility of an object with something so that it is projected behind the object. It completely covers the wearer such that viewer can see through the wearer and the wearer remains invisible. The different methods of optical camouflage provide invisibility in the visible site of spectrum. The idea of optical camouflage is providing virtual transparency using masked object. If the background image is projected on to masked object then we can observe object as virtually transparent.

For enabling the transparency cloak enables optical camouflage to work using a material named “retro-reflective” where the material is covered with small beads. These beads bounce the light rays in the same direction when light is focussed on beads.

The applications of this retro-reflective material can be seen in traffic signs, and even in bicycles reflector also in lighting part of raincoat like the cloak they can be viewed even from far distance since they shine brightly with little light. This application can be more useful for the people driving at nights.

The disadvantage of this technique is that the observer needs to look through half-mirror. For the implementation of current systems needs a half-mirror and projectors fixed on ground. In the future work is going on such that a person can view background image for various viewpoints with H.M.P

Download  Optical Camouflage Technology Seminar Report.

Object Tracking And Detection Seminar Report

Introduction to Object Tracking And Detection Seminar Topic:

Object tracking has become important in computer vision. The usage of high-powered computers, ensuring higher quality, automation of video analysis is responsible for implementation of object tracking.

Object tracking is a method of tracking an object through alternate image frames for finding its movement when compared to remaining objects. Tracking can be simplified by using constraints on objects related to its movement or appearance and even we can constrain the movement of object with fixed velocity. Problem can be simplified knowing about objects its number, its sizes and also appearance, shape in prior.

There are various approaches for object tracking and the approaches depends on various factors such as image features, size, shape and appearance of objects. In general object is a thing which can be further analysed; it can be anything like vehicles on road. Each object is represented by their shape. And in this paper object shapes are used for tracking objects.

Object detection from video sequence is the process of identifying moving objects in sequence using digital image processing techniques. And moving object detection is based on object identification which is moving and tracking of moving object.

 In this paper we will see a number of algorithms its advantages and disadvantages of moving object detection. Object tracking is used to track both spatial and temporary changes. Were some features of these objects are selected and matched on to other frames. In this paper we have discussed about Object tracking and also about Object tracking in detail along with its approaches.

The paper gives the advantages of Object Tracking for tracking of objects, its features and its approach towards other tracking methods. 

Download  Object Tracking And Detection Seminar Report.

NVIDIA TESLA Personal Super Computer Seminar Report

This paper is about a desktop computer named Tesla Personal Supercomputer. It is implemented on capabilities of NVidia’s Tesla which is based on parallel computing architecture with around 960 parallel cores. 

NVIDIA is well known for visual technologies and also in the inventory of GPU, which is a processor with great performance provides interactive graphics on pcs, mobile devices, and workstations. 

GPU computing is based on usage of GPU which stands for graphics processing unit for computing. In complex or heterogeneous model GPU computing involves usage of both CPU and GPU. Where sequential part of application is executed using CPU and intensive part executes on GPU. But according to user view the effective performance is due to GPU. 

The drawbacks of implementing graphic programming languages like cg is the developers has developed their applications like graphics but map them to triangles and polygons this limited the performance of GPU’s. 

GPU computing uses an architecture named CUDA architecture. This architecture of CUDA has a number of processors which can operate together. Its architecture is based on CUDA parallel programming. NVIDIA provided its first support for the c language with as small set of keywords and identifiers. 

Important factors that differentiate with other technologies include efficiency and even the technology fast growth, efficient utilization of CPU using parallel processing, manufacturing defects. 

The paper is about introduction of new desktop computer named Tesla Personal Supercomputer. Its features and the implementation of super computer is also given  And also the inventory of GPU is discussed.

Download  NVIDIA TESLA Personal Super Computer Seminar Report.

Secure Three-Party Authenticated Quantum Key Distribution Protocols Project Abstract

Introduction to Secure Three-Party Authenticated Quantum Key Distribution Protocols Project:

The paper is about usage of Quantum Key Distribution Protocols to ensure security in case of huge networks. This protocol uses DES algorithm for the purpose of encryption and decryption of text file. To ensure security this project helps both the sender and receiver to register into databases. Whenever a request is sent from either sender or receiver then a secret key is generated. Trusted Centre which is the third part authenticates both sender and receiver and the secret key is generated by them.

The Trusted Centre later issues a quantum key to both sender and receiver once secret key is verified. The quantum key is a random key of 8-bit and is generated using a function in .NET. Using RSA algorithm session key is generated, and is converted into binary form.

Once the quantum key is matched from sender and receiver end the data can be encrypted and intermediate form also can be viewed. In the same way once decryption is done both encrypted and decrypted files are available. Thus a secure transaction of data occurs between sender and receiver using third party Trusted Centre.

This paper focusses on improving security for large applications and proposes Quantum Key Distribution Protocols and also gives details about third party Trusted Centre, the way it ensures the security and giving the conclusion that it can be better protocol when compared to that of existing protocols in all aspects of either performance or cost or in terms of security. 

REQUIREMENTS INCLUDE 

              HARDWARE REQUIREMENTS INCLUDE: PC with min 10 GB hard-disk and 512 MB RAM.

              SOFTWARE REQUIREMENTS INCLUDE: WINDOWS XP/2000, SQL SERVER/ORACLE, JAVA/C#.

Download  Secure Three-Party Authenticated Quantum Key Distribution Protocols Project Abstract.

CSE Seminar Report on Nano RAM

Introduction to Seminar Topic on Nano RAM:

NRAM is a product of nanotechnology. The main objective of the company is delivering a product which will replace all present forms of memory of DRAM, SRAM, Flash memory and Hard disk storage. Other words a universal memory chip responsible for replacing existing and new applications.

It has a lot of advantages over DRAM. I.e. NRAM performs faster at very low power consumption that DRAM. It is a non-volatile chip and provides permanent data storage even not in power. 

The term nanotechnology defines where Nanos means billion. That means it is a technology that measures components or features. Simply nanotechnology is manipulation of atoms or molecules for creating objects which are smaller than hundreds of nano metres. 

Products are made up of atoms. The properties of the products depend on the arrangement of atoms. If we rearrange atoms in coal can form diamond. The two concepts associated with Nanotechnology are Positional assembly and self-replication. Positional assembly is arrangement of molecules for getting molecular parts at right places.

The self-replicating systems make copies of themselves and also for manufacturing the useful products. If we design a system the manufacturing costs and also the product cost is low.

Every day research is been carried to build ideas for products on molecule level. Thus, with the usage of NRAM provides very fast than compared to other applications.

The paper is about implementation of new product, NRAM which will replace all existing memories. And in detail description was given about NRAM and also it is compared with all existing memories and its advantages are given. And concludes that NRAM plays a vital role and its performance is better when compared to all existing memories.

Download  CSE Seminar Report on Nano RAM.

Industrial Training Report on Networking Telecommunication Management

Introduction to Networking Telecommunication Management:

The paper is about networking and telecommunication management. The success of field involving telecommunication and it is due to effective management system. In this paper we deal with strengths and limitations involved in telecommunications management system.

Telecommunication management is responsible for managing networks and services. It provides various functions related to operations, maintenance, performance and security.

A network is a collection of computers, hardware which allows user to share information or resources. The need of networking has improved in today’s world. The network is used by every commercial office for resources. It connects users from all locations.

There are three types of networks   private:  It is owned by one firm for all its needs and this network is not accessed by all. Public: It is a network which is offered for free. And this public network can be accessed within the country.  International:  It is a collection of both public and private networks connected to one other internationally. An example for this is internet which is used to connect all networks.

Networks are classified depending on coverage is LAN: this network is located in a small geographical area. It is most commonly used network.

The types of network topologies are Bus network:  computers are connected by cable. The cable is called as bus. The connection should be disconnected from both sides. Ring network: it is a bus network connected at both ends. Star network: is a network where a machine is connected to central machine called server.

The paper is about networking, the various topologies of networks and the types of networks divided based on coverage. And also security implementation is also provided. 

Download  Industrial Training Report on Networking Telecommunication Management.

PG Seminar Report on Strategic Management

Introduction to PG Seminar Topic on Strategic Management:

Threat of new entrants, the video game industry is leading now days, with three other firms that dominate in the industry with comparable market share. Existing industries provide high supply in fields of research, advertising and manufacturing. It will be difficult for the new competitors to enter into competition without sufficient market share.

Customer switching costs are low; customer is easily attracted to new models developed by consumers and game developers.

Because of independent game developers, the benefits obtained are very high. Games are developed specially for each console. As same game cannot be run on multiple consoles, developing a game involves a high cost so the developers will not afford of developing for new entrants. Therefore consumers choose among existing players so the life of new comers is difficult.

Even retail and wholesale channels also limit its services to new comers. Branded companies sell their products in stores and via channels.

To compete with the existing competitors the new comers need to invest in global distribution channels and even the new comers have chance of selling the products online via websites.

Nintendo has laid a target with the help of Wii console than with others in the seventh generation. Buyers are very sensitive towards price while choosing gaming console.

And the measures of Nintendo’s have overcome several barriers. Nintendo was responsible for consumers who are informed and the game what they play or watch is left to themselves.

The paper is about present competitors, their business and their threats they are facing from competitors and also the scope of new comers in the business. 

Download  PG Seminar Report on Strategic Management.

NGSCB Seminar Report for CSE Students

Introduction to NGSCB Seminar Topic:

The Next-Generation Secure Computing Base is also known as Palladium. NGSCB is used for implementing concepts on future versions of Microsoft windows OS. Where NGSCB is part of Microsoft, and its main is to implement security and privacy of users. 

NGSCB depends on Trusted Computing Group, which provides several features of security, random number generation, secure cryptography which is typical to maintain.  With configuration of hardware and software of NGSCB the above situations can be handled.

A Microsoft trusted computing system has software components given by Microsoft, whereas the hardware components are developed by Trusted Computing Group. In trusted computing which is presently been used has two hardware components i.e. the trusted platform module which is responsible for storing cryptographic keys securely and a memory feature.

Whereas the NGSCB has two software components, named Nexus which is a kernel i.e. part of O.S and Nexus computing agents which has modules within the application.

To ensure security at the time of manufacture a cryptographic key is generated. The cryptographic key will be stored in TPM. The key is never disclosed to any other component and not even to the owner. The key cannot be disclosed by any process like reverse engineering or any other such method.

Applications pass data encrypted with key and to be decrypted needs to be done by TPM. But same can be done under some constraints. And decrypted data is sent to only authenticated or authorized applications and will not be stored anywhere so that other applications can access the data. TPM also produces cryptographic signature based on hidden key. And this signature can be verified by user or third party so that we can know the status of computer whether it is secured.

Download  NGSCB Seminar Report for CSE Students.

Seminar Report on Human Area Networking Technology

The paper is about intra body communication. The concept of this type of communication is not new it was proposed in 90’s. In this paper we deal with technology HAN which turns the surface of human body to data transmission path, such that speed of around 10 mbps can be obtained between any points of the body.

Though this type of communication was introduced earlier but has some limitations on speed and also the range. I.e. the range was limited to some kilometres and max communication speed was around only 40bit/s.

 In the present system, all the above limitations was overcome by NTT located at abroad, using photonic electric field sensors has introduced human area networking technology by name REDTACTION. It is a new technology which safely turns the surface of human body to hi speed network transmission path. The communication can be possible with any surfaces of body as hands, arms, legs or toes. The RedTacton even works on clothes and even shoes. It makes use of electric field generated from surface of human body for networking data transmission.

For the communication to be possible NTT developed an electric-optic sensor for identifying electric field generated on surface of human body. This sensor has three features. I.e. it has capability of measuring electric fields from DUT without contacting it and provides an Ultra wide-band measurement and the main feature supported is it provides one-point contact measurement which is independent of ground.

This concept of one-point contact measurement is used in the human area networking technology called RedTacton. The future work can be applications for defining communications within, other than surface or outside of the body.

Download  Seminar Report on Human Area Networking Technology .