Term paper of Biometrics

Introduction to Term paper of Biometrics:

It is a technology of science which identifies the person on the basis of physical and behavioral characteristic. This physical characteristic cannot be stolen and cannot be forgotten. Now a day’s various types of methods are used for identification in biometrics. In biometrics, most popular techniques are face recognition and fingerprint scanning and other famous techniques are Iris scanning, Retina scan, and voice recognition. Firstly this technology was used in China in which stamp on the children hand was made to distinguish one child from another. Later it was used in Paris by policemen to identify criminals.

Physical biometrics: – It involved many methods they are hand geometry, fingerprint, vein pattern, DNA matching and fingerprint matching. Behavioral biometrics involves voice recognition, keystroke and signature matching.

Practical use: – This technology is used in various fields such as government for passports and voter card identification. In transportation for security and checking license. In healthcare for checking patients identity cards. In public safety and justice. For education and in drivers licenses. In employees identity cards for checking daily attendance.

This technology act as a gatekeeper between the confidential data and the hacker without verifying the password on one can see the personal data of the person. This technology is very reliable as it secures the data of the person very safely. It is very user-friendly since it is easy to operate. It is very cheap.

Through this technique, we can stop cybercrime, frauds, scamp and many more threats in this world. It offers various solutions for a problem to the schools and government agencies. This technique generally creates a template of the password for the comparison. This type of technology provides a high level of security.

Technical Seminar Topic on Virtual keyboard

Introduction to Technical Seminar Topic on Virtual keyboard:

Today the technology is growing day by day. This technology has introduced a virtual keyboard. Virtual keyboard is just a technique that is developed in java language which is easy, smaller and faster. It has many features like platform independent that supports text input, copy paste operations, user friendly and small in size.

QWERTY keyboard:-There are several things in keyboard that have to understood such as key matrix and speed for transmission. Key matrix is nothing but a grid of circuits that lies under the keys and when the key is pressed the small amount of current is flowed in the circuit. And it is also relay on switches that cause the change in current flowing.

Types of keyboard: – There are many types of keyboard according to their keys such as 82 and108 keys apple keyboard and 101 and 104 windows keyboard. They are also classified according to their arrangements such as in laptops, functional, typing, and numerical and control keyboard.

Technologies in keyboard: – There are various types of technologies for keyboard. We have some audible type keyboards. Some of them are mental contact, rubber dome, capacities, membrane and foam element keyboards.

Virtual typing: – this type of technology uses artificial intelligence and sensors to allow users that he can work anywhere on any surface. It uses a flashlight technique that flash light of keyboard on any surface. In the device measure the movement of the fingers when keys are pressed down and determine the keystrokes.

Drawbacks: – It is very difficult to use it because in it we have to type in the thin air so for using it we need a practice. It is very costly. For using it in a room the light of the room must be bright so that the keyboard is visible to us and we can able to type on it.

Download  Technical Seminar Topic on Virtual keyboard .

Seminar Report on Virtual Surgery

Introduction to Seminar Topic on Virtual Surgery:

Today the computing power is increasing day by day. We can see as the internet is growing day by day. This technology is also increasing in medical field such as advancement in tools and in surgery. This computer environment provides a virtual reality which is similar to the world. And this virtual reality is also used by doctors in doing virtual surgery. Through it doctors improve their surgery plans and practice their surgery on 3D model and if in it they found error, they can correct it before doing it on a real human.

Application: – There are many applications of virtual surgery. It can be useful in understanding complex 3D model and in doing training. Some of them are:-

Training and education: – Generally the training is done using textbook images and structures that are in 2D plane. This training can be done highly interactive be allowing them to see various layers of tissue using VR model.

Surgical planning: – Through VR model the surgeon can practice its surgery and calculate his parameter for his upcoming surgery. This reduces the error in the surgery and the surgery can be done in most reliable manner.

Image guidance: – It plays a vital role in virtual surgery. This helps in doing robotic surgery. This is advancement in 3D image processing.

Telesurgery: – This type of technique is used on human who are physically separated and it is based on master slave robot.

Virtual surgery simulation: – For this we to fallow various steps, they are 3D simulation in which we simulate the 3D image of the body. Second is touch simulation in which we use sensors for this.

The simulator of VR is nothing but it suns on the software and helps the user to interact user with virtual environment. Usually it works on force feedback.

Download  Seminar Report on Virtual Surgery .

CSE Seminar Report on VSAM

Introduction to CSE Seminar Topic on VSAM:

VSAM stands for virtual storage access management. It was introduces by IBM and used for data store management. A multiple virtual storage is called MVS which is used as operating system in computers. At the time of operating system installing several memory partitions each of fixed size is set up in the memory. After some time an evolution is come in MVS in which the memory is dynamically allocated to the program as needed but it had some drawbacks for that IBM developed virtual memory which uses three different areas of physical memory. MVS provides service for hardware acceleration that does translation and support ASCII. It has two segments that are concept and facilities, in which a simple introduction is given to the VSAM introducing its components to whom that have not experienced it and second one is access method services in which all function of the VSAM is introduced.

Sometimes VSAM data sets are also called as clusters. These clusters are of various types they are:-

KSDS cluster: – In this the record are placed in the data sets in ascending order and it must contain a key that has unique value and helps to identify the record. Once the key is defined it cannot be deleted or altered.

ESDS Cluster: – In this all the rectors are placed at the end of the data set. In it record cannot be deleted only it can be done inactive. In this the record can be updated without updating the length of the data set.

RRDS cluster: – In this pre formatted slots of fixed lengths are used which has a unique record number. The record number cannot be changed and cannot be deleted. We can insert the new record without disturbing the exiting record and it uses RDF which shows that the slot is occupied or not.

Download  CSE Seminar Report on VSAM .

Virtual Reality Documentation

Introduction to Virtual Reality Seminar topic:

It is the environment that is generally generated by computer called computer generated environment that’s make the human feel like that he is in the real world. It is hosted by the computer like a database which is present inside the memory. A database is consist of images and vertices and images are also referred as polygon which as three vertices. It uses sensors for interaction and also helps computer to get connected with human brain for example head sensors.

Desktop virtual reality (VR) system: – In this the user can experience the virtual environment by just viewing on the computer display.

Immerse VR system: – In this type of VR the user is surrounded by the virtual environment.

Head mounted display (HMD):- It was the first technology that provides Immersive experience to the user, developed in 1965. It has motion trackers that measure the position of the user head which results that the user is able to walk in the virtual environment.

BOOM: – It stands for Binocular Omni orientation monitor. In this the screen and optical is attached to a multi link arm which guides the user in the virtual environment. This all devices are stored in the box.

Cave: – Cave stands for Cave automatic virtual environment that provides virtual images or pictures on the room wall or on the floor for this the user have to wear light weight stereo glasses.

Input and other technologies: – Various types of input devices are there such as joysticks, hand held wands which allow user to navigate in the virtual environment, data gloves and voice recognition.

Application: – The virtual reality has various type of reality such as in education, for health caring, manufacturing anything, learning and in productivity. It is also used for doing many space operations.

Download  Virtual Reality Documentation .

Virtual Reality Seminar Report

Introduction to Virtual Reality Seminar Topic:

It is the technology that displays the environment with the help of simulations that look real to the user.  User can have real environment experience by standing at the same place. For this we use special device that display stereographic displays. It also includes sounds though speakers or headphone. A device named HMD (head mounted display) that is wearied by the user on the head and then he can have experience. It displays the images to the user eyes and makes the scene such that it feels real to the user. User can walk and look around the places.

Another device is BOOM. In this a small house is created and closed from all the places. Only two holes are made for the user. User can look through the holes and feel the real world. One more device is called CAVE; in this stereo images are displayed on the walls and on the floors. More than one people can wear this device and walk in the CAVE and feel the real world.

In this system many input and output devices are used like gloves, joysticks, all are imbedded with lots of sensors.  These systems are widely used in the medical field. It is used for the diagnostic purpose.

They are used in the education systems. Every object is made in 3-D form so it make easy for the user to learn fast. All the games that are developed now days are based on the stereo graphics animations. Animations movies that are developed are 3-D are based on the virtual reality environment like Tron.

This technology has a new impact on the society. People are more involved in the virtual environment and they have created the influence on the human behavior. 

Download  Virtual Reality Seminar Report .

Paper Presentation on Virtual Prototype System

Introduction to Paper Presentation on Virtual Prototype System:

Super systems: it will be wrong if we call it super system, then it create in our mind of big systems. But actually a system that is built on the single chip is called system on chip (SoC). These chips are used in the mobile devices, which may have more than one CPU and more than one signal processing.  And many other things like USB, Wi-Fi, and Bluetooth etc. mobile is handheld device. But if we talk about the base stations then it have many subsystems and many individual processors. They use super systems that comprises of many processing engines. Even in the many modern cars have super systems that have at least 80 processors.

Modern embedded systems like camera, printers are based on the virtual prototyping. This feature reduces size and price of the system and makes it less time consuming. As we can have better quality of work in less time, so it gives better profit earning.

To create embedded systems based on the virtual prototyping we need an engineering environment like CoMET. This is the tool used for creating system simulations specially system on chip configuration. With the help of this tool we can develop, create simulation, and provide better optimization. Other system used is the METeor.

It is used for the real time environment for both embedded and system on chip.  We can even design hardware and develop software components that we require. It has many components that are used for the control like DMA controller, memory controller.

VaSTis also the virtual model for prototyping. They are fast as well as accurate. They work at the speed of 200MIPS. They are based on the sequential development. They have better level of accuracy and performance.

Download  Paper Presentation on Virtual Prototype System .

Term Paper on Virtual Network Computing

Introduction to Term Paper on Virtual Network Computing:

This is the advanced application used for using computer through network by sitting at distant places. It means that with the help this application you can use your home computer by sitting at some other place or city or anywhere else. We just need an internet connection and the specific software. We can use any application of that computer, run any program, edit or delete something.

To setup VNC network, we need to install software at both server and client side. We need authorization from the user or client whose system you want to use. We need to create TCP/IP connection at the server side. When we connect the system we first need to do request to the client for the permission then only the connection can be created. 

VNC provide us a graphical interface that displays on the server having image of the client desktop. Programming of VMC client is very easy; we only need to concentrate on the frame buffer and TCP/IP transmission while side programming is hard than client side. Programmers need to take care while programming for client, they have to ensure that client side must be as simple as possible.

The main problem arises in VNC is screen resolution of both the server and client, they should have same display to match the desktop otherwise client have to make the changes in their screen resolution. Network connection must be fast as possible to obtain the better result otherwise screen at the server side might get hang or fluctuate. If client side connection was closed then the server side process will stop. VNC network are secured, first time we are connected after that all the information send is encrypted cannot be used by anyone. 

Download  Term Paper on Virtual Network Computing .

Virtual Network Computing Seminar Report for CSE Students

Introduction to Virtual Network Computing Seminar Topic:

It is distance computing that is very useful. It means that you can use your computer without sitting in front of it. It means that you can operate any computer with the help of internet connection; we don’t need to sit in front of the computer. We can access the full control over the computer by net connection, we have the right to delete, edit, or run to any program.  To establish VNC connection we require to two components VNC server and VNC and viewer. They both are connected to each other through VNC protocol. A TCP connection is established between both of them.

To establish connection first server made request to client for permission if client allows then only the connection is established. They are protected with the help of password. After that they are connected and then ready to share information or desktop. 

You can connect with other computer also, for that you need to enter the server name and desktops which are connected and their quantity. Your DNS connection must be proper otherwise you will not be able to use the name, and then you have to use the address like 192.168.1.2:2.

Programming of VNC server is difficult than viewer. Our main motive is to make the client side as simple as possible. VNC server is very nice for the user who cannot sit in front of computer for long time and also want to operate computer from long distance. In VNC you can leave your computer on and go to other computer and do some other work and continue again where you leaved.

The work will remain same as you leaved earlier. In this you can’t use the feature of the modem and the display might be slow and might get hang little.

Download  Virtual Network Computing Seminar Report for CSE Students .

Seminar Report on Virtual Memory

Introduction to Seminar Topic on Virtual Memory:

This is the memory that is illusion to the user. This memory is larger than the system memory or real memory. This memory is used when non-continuous memory allocation is done. This memory has different parts used for different purpose like memory management; it is used to create page information. Different terms are used in the page entry like valid bit for checking page exists in the memory or not. Page frame is used for locating page in the memory. Prot info is used for protecting the page. Modified is used for checking whether the page is modified or not. Ref info is used for referencing the page after loading in the memory.

When the traffic of the page is increased and the CPU efficiency is low then this condition is called thrashing. This happens when the page is operated in the fault zone. Page hardware has three operations. First: it translates the page information and detects the page faults. Secondly: it must provide the security to the pages so that one page should not be able to use the other pages.

Third: it must set the modify bit when we want to perform the operation on the page and must set the reference bit when we doing referencing to the page. If in case one of the memories doesn’t exist in the memory then the chance of the page fault arises. They may in balance the input output operation.

We must load the required page in the memory when the page fault occurs. This operation is done VM handler. It replaces the page when required. In case of page fault kernel of the operating system switches the CPU to do another work or it paused for the next time.

Download  Seminar Report on Virtual Memory .