Voice Enabled Browser Seminar Report for CSE Students

Introduction to Voice Enabled Browser Seminar Topic:

Voice enabled browser means that recognize the speech for the computer input. It converts the spoken words into machine language that is under stable to the computer.  It recognize the person speech that what is said by the user and what to do.

This type of technology includes call dialing for example “ call home “ , content search, audio search, call routing, data entry, text processing by using speech, doing e-mails by speech, preparation of the document, input of the any number and to find any song in the device.

Hand free computing: – hand free computing means to use the computer by the user without the use to hand that they commonly used interfacing device such as mouse and keyboard. For this speech recognition technique is used that recognize the speech as a command for the input. It is also useful for the disabled user. A computer can be trained to recognize the speech and the correct command is to taken as the input.

It is very useful while driving or in factories. This can be varied by range of tongue, lips, month and movement of the head to the mouth. It uses speech recognition software and a microphone. Some example of this technology is sensitive camera and joysticks. A camera is mounted on the user head to take input in the device.

Our aim is to build a speech recognition application that searches the keyword or content entered by the user in appropriate way. Its system preferences can be changed by the user according to his or her needs. This application must be multi functional that is it can accept two or more than two commands at a time. New command for new action can be created by the user. The application must generate mouse and keyboard events.

Download  Voice Enabled Browser Seminar Report for CSE Students .

Virtual Network Computing Project Report for CSE Students

Introduction to Virtual Network Computing Project:

Today the technology in the world is growing at a very fast rate. This technology has introduced a virtual network computer system. There is much software that allows computer to interact with another computer or mobile device through internet. To use virtual network computer we must have TCP/IP connection and a server.

The virtual network computer is open source software that is available freely in the world. It allows working user on different platforms without changing software or hardware. The technology that is increasing in local area network for its better link property between different machines is cross platform computing. In this all devices are compatible that they have the ability to connect to other devices. The hardware compatible is shown by plug compatible.  For doing capability between two hardware ends if we require software for configuring the device then it is called emulation. If same data formats are used by software then they are compatible.

Open source: – Open source means that the source code of the program is available freely for the public use and public can modify it. Different programmers in different areas read this code from internet and modify it for the improvement of the source program. It is a collaborative effort of the developer and shares its review in the community for the development of the program.

RFB protocol: – RFB stand for remote frame buffer which allow accessing the remote areas to graphical user. It is applicable to the all system because it works on frame buffer. It is used in the virtual network computing. It uses TCP/IP protocol to connect to the server. The user uses latest version of RFB because it provides best security and appropriate compression. Ti use to maintain cross platform capability in virtual network computing.

Download  Virtual Network Computing Project Report for CSE Students .

Seminar Topic on Routing Protocols

Introduction to Seminar Topic on Routing Protocols:

Today the technology is increasing day by day this results in the vast increment of communication through the networks for this we require routing. For doing routing we require packet switch method over a large distance. For doing distance routing it follows some algorithms that are Fulkerson algorithm, Dual FSM algorithm and bellman ford algorithm.

A always inform its topologies to keep changing periodically. Distance vector means to manipulate the network protocols from one node to another. Routers do not have the knowledge of the entire path so they follow two methods they are destination distance and packet to be forwarded in direction. There are some example of distance vector routing they are IGRP, EGP, RIPv1 RIPv2 and BGP.

Methods: – To calculate the path distance between two points the router use a distance vector method which is different between different routing protocols in a network but have same algorithms. The two methods for calculating path of routers from start point to destination point is distance calculation between two points and direction of the routers in which they will move.

The cost which is required by routers to reach to the destination is calculated by various matrices method. Hope count of the destination is taken in account by RIP and IGRP uses node delay and available bandwidth to calculate the distance of the destination.

This routing node protocols are updated periodically to inform the neighbors of the node about the configuration that the distance vector protocol is using and the process is called as rumors by routing because they receive information from the other router and cannot justify that it is true or not. For this they use many features. The RIP routing uses cross platform distance vector routing whereas IGRP uses Cisco system distance vector routing. 

Download  Seminar Topic on Routing Protocols .

Research Paper on Virtual Keyboard

Introduction to Research Paper on Virtual  Keyboard:

Now a day the technology is not limited to computer and laptops, it had come to virtual environment. It’s one of the example is virtual keyboard. It uses artificial intelligence and sensors that allow the user to work on the simple flat surface as there is keyboard.

QWERTY keyboard: – It was the first keyboard to be developed that looks like a type writer. Its layout s based on the English language. When we press key, it pushes the rubber down and the current flows through the circuit and the word is generated in the CPU.

Virtual keyboard: – It is the keyboard that works on the flat surface anywhere and at anytime. It keeps the track of the finger and takes the input according to keystroke. It projects the light on the surface which looks like the QWERTY keyboard. It uses sensors and the infrared rays for projecting light on the surface. It is used in high tech work because of its low noise and fast work.

Technology: – the development of virtual keyboard is based on mainly three steps first is sensor module, which plays a vital role in virtual keyboard. It keeps the track of user finger to take the input. It processes the keystroke and then the output is shown on the monitor. Second is IR light source which emit infrared beam. It projects the image of the keyboard on the flat surface from which the user can type.

These rays are invisible to the human eyes. And the third one is pattern projector, in which the projector uses to show the image of keyboard on the plane surface. If there are project patterns present then there is no need of infrared rays. There are different types of virtual keyboard are there such as canasta, sensor board, kitty, in focus and developer VKB.

Download  Research Paper on Virtual  Keyboard .

Technical Report on Computer Viruses

Introduction to Technical Topic on Computer Viruses:

Virus is a program that can execute itself and can cause damage to the computer hardware and data present on the hard disk. In this report we will show the list of ten most dangerous viruses. Cabir: – It was found in 2004. It a mobile phone virus that spreads through Bluetooth in message inbox with very nice name. they also slow down the processing of the phone.

Skulls: – it is another type of mobile virus which damages whole phone. We can only receive call from it.This type of viruses isTrojan based.

Comm. Warrior: – It is the mobile virus which sends its copy to another number via MMS and damages the whole phone.

Locknut: – it spread through internet downloading which damages the ROM system of the cell phone and damages the application of the phone.

Fontal: – It also spread through internet. Once it is fired it locks the whole phone and could be opened.

RommWar: – It is type of mobile virus that spreads through Bluetooth, MMS and internet. It damages the phone booting system very badly and phone keeps on restarting again and again.

Doom Boot: – This type of viruses spread through Bluetooth in mobile phones. It damages the booting system of phone and creates corrupted files in the phone.

Card Trap: -it spreads through memory card of the mobile phone. It damages the some button of phone. It also causes the application to not functional. If this infected mobile is an attached to a computer then it will transfer to pc and starts replicating itself in the computer.

PB Stealer: – It spreads through Bluetooth. It damages the number in the contacts, database of the phone and notepad in the phone.

App disabler: – It is most dangerous virus as it affects the operating system of the phone and spread through Bluetooth.

Download  Technical Report on Computer Viruses .

Seminar Report on Computer Virus

Introduction to Seminar Topic on Computer Virus:

A computer is a program that is capable of copying itself and can harm the system and can spread from one computer to another through network without knowing to anyone. They can be spread by attaching itself with some program and can inflect the system. They are capable of hiding themselves from antivirus.

E-mail plays a major role in spreading virus in computers. These had spread so much that are started affecting the mobile phone also. First virus was developed in Pakistan. In computers they perform unwanted task. Viruses are written in a particular programming language. This type of viruses have many side effects, they can deny access to the system. They can send fake message. They have ability of corrupting data and deleting data.

Viruses program: – There are many viruses like program which can affect the system, they do the all the hidden process without knowing the user about it. Another is backdoor Trojan which allows the user to take control of another computer via internet. Worms are another type of viruses which spreads by copying itself. Boot sector virus was the first virus to be developing that effects the boot sector of the hard drive.

Parasitic virus, which is also called file virus and have the ability to attach themselves with the program. These types of viruses’ effect the system by companionship, by linking, by overwriting, by inserting by prep-ending and by appending.Another is macro virus that comes in a document and has the ability of copying and spreading itself. And the last one is hoaxes, which is sent over the e-mail to Vitim computers. It also avoid us to not to read our e-mails and it is very destructive one. It is undetectable as they spread through e-mails.

Research Paper on Virus and Anti Virus

Introduction to Research Paper on Virus and Anti Virus:

A computer program that has the ability to delete the personal data and has the ability to copy itself in whole memory is defined as virus. It can take control of the whole system. All viruses are of reproductive type. Many viruses are written in assembly language and some of them are in high level language.

Types of viruses:-

File virus: – It is a type of virus that is attached to the program and makes it infected and when we install the program it starts executing.

Boot sector virus: – It is most dangerous virus if it is once loaded than it is very difficult to stop it. It affects the boot sector of the system or hark disc or floppy disc.

Multipartite virus: – this type of virus is hybrid of program virus and boot sector virus.

Stealth virus: – They have the property to hide themselves from dentition from the antivirus. They are also capable to redirecting the head of scanner to some another location.

Polymorphic virus: – It has the property of self replicating its once the user have installed the infected file to the system, it affect the RAM part of the memory.

Macro viruses: – It spreads through the document file. One the user gets the infected document and opens it and then the virus starts spreading in the whole system.

Antivirus: – it is a set of program that has the ability to prevent the computer from viruses that causes harm to the system.  For this it follows three steps that are detection, in which it detects a virus. Second is identify, in which it identified the infected program and the third is removing, in which it removes all the viruses from the system. There are three types of antivirus that are scanner, monitor and integrity checking program. 

Download  Research Paper on Virus and Anti Virus .

CSE Seminar on Virus and Anti Virus

Introduction to Seminar on Virus and Anti Virus:

Viruses are a program that destroys the important data of the computer. It is executable file which is designed in such a way that has the ability to replicating itself and cannot be detected. The first virus was created in mid eighties to affect the boot sector of the computer called brain virus. Today in a world three are thousands of viruses. The program which protects our data from these viruses is called antivirus. Viruses gain the control of the computer and can destroy everything on the computer. There are various type of viruses are there.

File program virus: – Some viruses are attached with the program and when installed they get into the memory and can affect the system.

Boot sector virus: – This is the viruses that are created without much difficulty and can affect the boot sector of any hard disk or floppy drive.

Multipartite viruses: – These viruses are the hybrid of boot and file program viruses.

Stealth viruses: – These viruses are capable of hiding themselves.

Polymorphic viruses: – They have the ability to change the code each time it spreads and very difficult of detect.

Macro viruses: – It is a document type of executable file. It has the ability to copy itself.

Antivirus: – It is program that protects our system from any virus to get infected. It follows three steps for preventing a system that are detection, in which it detects a virus. Second is identify, in which it identified the infected program and the third is removing, in which it removes all the viruses from the system.  It scans all the memory of the system including boot sector of the system and keep track of all the files and removes unwanted programs that is virus. While the system is running it keeps on monitoring the whole system.

Download  CSE Seminar on Virus and Anti Virus .

CSE Seminar Report on Virtualization

Introduction to Seminar Topic on Virtualization:

It a computer technology introduced by Microsoft that focus on three areas that are hardware virtualization, application virtualization and presentation virtualization.

Hardware virtualization: – Hardware virtualization is the running of various operations on a single machine. In this for creating virtual machine we use software. It is also called desktop virtualization when used on client machines. The client can run various application of different operating system by using virtual machine. Virtual machine also stored files of system that has a sever failure. For this type of technology the Microsoft offers various techniques. The different virtual machine have different configuration.

Presentation virtualization: – In this the software creates a virtual session that interacts with the user on the remote sever. All the remote computer is attached to a central sever where there is data is stored safely. It helps in managing various applications simultaneously on a single machine. It also improves the performance of the computer. It can also solve the problem of the computer.

Application virtualization: – In this the computer resource are presented in an abstract view. It built a connection between an application and the operating system. The main problem in that are that many application shares various things from different application so for avoiding this kind of error the user perform testing before installing any application. For creating virtual application Microsoft created an application called app V.

Other virtual technologies: – Some other technologies are network virtualization in which we use virtual private network which allow user access internal data of the organization if we are attaches to the network.Now a day this technology is used by Microsoft for internet protection. Another is storage virtualization, this provide an abstract view to the user so that other than the physically attached drive can be seen. 

Download  CSE Seminar Report on Virtualization .

CSE Seminar Report on Cluster Computing

Introduction to CSE Seminar Topic on Cluster Computing:

Today the use of computer is growing day by day at a very high rate. For this it has became necessary to improve the speed of the hardware of computer such as processor which is the heart of computer. And this can be done to computing more than one process simultaneously that type of processor is called multicore. Cluster is a collection of all the computers that are inter- connected with other and can work together. They are more reliable and used for improving the speed of computer this result in improvement in the application software speed.

Classification of the clusters: – These are classified in various types they are:-

High availability clusters: – They are used for the primarily purpose that improves the speed of the computer and the services of the component that are failed due to some reason. This type of cluster is used to remove this type of failure.

Load balancing cluster: – It manages the load of the computer such as if all workload of the computer is came on one thing than it manages the load and re-distribute it in a proper way.

High performance cluster: – It increases the speed of processor by distributing the computational task to different nodes. Its most common example is Linux. This type of cluster generally runs random application.

Grid cluster: – It connects the collection of that computer that does not trust each other and use them like a single computer.

Dedicated cluster: – It is a type of cluster in which a workstation is not owned by anyone but it share resource so that parallel computing can be done.

Non dedicated cluster: – It is a type of cluster in which an individual owned a workstation so that a fast response can be taken out from the workstation compare to remote workstation. 

Download  CSE Seminar Report on Cluster Computing.