CSE Seminar Topic Idea on Artificial Neutral Network

Introduction to Seminar Topic Idea on Artificial Neutral Network:

This paper displays a manufactured neural system-based methodology (ANN) for reactive power (VAR) improvement of interconnected power frameworks. The reactive power assets are planned to minimize the aggregate transmission misfortunes of the system. The recommended ANN for this academic work is a several-layer food-send system with a sigmoid transfer method. Special stacking states of reactive power are utilized as info plan to develop the ANN. The wanted yield is the optimal voltages at the VAR-regulated transports. Because the coming about state from the ANN should not be achievable and some voltage breaking points are outstripped, a standard-based methodology is utilized for control variable changes.

Straightforwardness, heightened preparing speed and fitness to model non-direct methods utilizing ANN make the recommended methodology a reasonable alternative for VAR streamlining. The recommended way is connected on a genuine power framework and the displayed test outcomes exhibit its relevance for continuous VAR improvement. As of late, reactive power control has appropriated a perpetually-building investment from electric utilities specifically because of restrained transmission abilities of elevated-voltage system to suit supplemental electric loads. Any updates in framework request may consequence in easier-voltage profiles.

With a specific end goal to uphold the wanted voltage profile and reactive power line in the transmission lines under different managing conditions, power framework administrators can select number of control apparatuses for example switching VAR compensators, adapting generator voltages and altering transformer tap settings. By an optimal change of these control gadgets, the planning of the reactive power might minimize the transmission misfortunes of the system.

In this research project, utilizing fake neural system so that the transmission misfortunes are minimized, the situation of reactive power improvement is illuminated. Contrasting stacking states of reactive power were described as data designs to develop the neural grid to recognize the closest key for a given and untrained reactive-power managing conditions. Then again, there may be sure system scenario where the grid result was not possible, and certain transport voltages could outdo their reasonable cutoff points. When this scenario happened, a standard-based methodology was utilized to control variables to realize commonsense result. Numerical effects of an actual framework have demonstrated that the recommended way is viable and hearty for taking care of the situation of reactive power enhancement.

 

Quantum Cryptography Seminar Topic for B.tech CSE Students

Introduction to Quantum Cryptography Seminar Topic:

The same time as the 20th century and a part of, the challenge between Code creators and code breakers has experienced inversions and inconveniences. A unbreakable figure was concocted in 1918, admitting that its unbreakability was not authenticated until the 1940s. This figure was somewhat unfeasible for the reason that it needed the sender and beneficiary to concur in advance on a nexus-an impressive stockpile of secret haphazard digits, some of which were utilized up every time a secret inform was transmitted.

More viable figures with short, reusable keys, or no secret key whatsoever, were advanced in the 1970s, but right up ’til today they remain in a scientific limbo, having not been broken or authenticated secure. A well known sudden infrastructure is the utilization of quantum mechanics to perform cryptographic deeds unachievable by arithmetic apart from everyone else. Quantum cryptographic gadgets ordinarily utilize distinctive photons of light and exploit Heisenberg’s doubt rule, as per which measuring a quantum framework when all is said in done irritates it and yields inadequate qualified data about its state soon after the estimation.

Spying on a quantum correspondences channel hence creates a unavoidable exasperation, cautioning the honest users. Quantum cryptography adventures this impact to permit several gatherings who have never met and who offer no secret informative data previously to impart in categorical mystery under the nose of a rival. A touch is an essential unit of qualified information, traditionally acted for as a 0 or 1 in your computerized PC.

Every traditional digit is physically grasped through a perceptible physical framework, for example the polarization on a hard circle or the charge on a capacitor. A record, for instance, involved n-elements saved on the hard drive of a common machine is appropriately portrayed by a string of 8n zeros and ones. Thus lays a nexus distinction between your established PC and a quantum PC. Where an established PC complies with the well comprehended laws of traditional physical science, a quantum machine is a gadget that saddles physical wonder extraordinary to quantum mechanics (specifically quantum obstruction) to apprehend an at heart unique mode of informative content preparing.

Introduction to Prolog Programming for Computer Science Students

Prolog (modifying in consistency) is without a doubt the most broadly utilized customizing dialects within counterfeit consciousness examine. Instead of basic dialects for example C or Java (which moreover happens to be question-situated) it’s an explanatory modifying dialect. That denotes, when actualizing the explanation to a situation, as a substitute for detailing how to accomplish a certain target in a certain scenario, we point out what the scenario (runs and actualities) and the objective (question) are and let the Prolog translator infer the fix for us.

Prolog is absolutely helpful in some situation zones, for example computerized reasoning, expected dialect preparing, databases . . . yet quite useless in others, for example representation or numerical contrivances. By taking after this course, you will study how to utilize Prolog as a customizing dialect to take care of down to earth situations in workstation science and manmade brainpower. You will moreover study how the Prolog mediator truly works. The last will incorporate a prologue to the legitimate foundations of the Prolog dialect.

These notes blanket the most essential Prolog thoughts you ought to have prior knowledge regarding, but its positively worthwhile to moreover have a take a gander at the literary works. The taking after several are well-known titles, but you might moreover counsel whatever available textbook on Prolog. As per this elephants are not grander than monkeys. This is decidedly wrong the extent that our true is concerned, but in the event that you check our small system again, you will consider that it states nothing regarding the connection between elephants and monkeys.

Still, we know that if elephants are greater than steeds, which in turn are larger than jackasses, who in turn are grander than monkeys, then elephants additionally need to be grander than monkeys. In numerical terms: the grander-connection is transitive. Be that as it may this has additionally not been described in our project. The right elucidation of the negative response Prolog has given is the taking after: from the informative content imparted to the framework it lack the capacity to be confirmed that an elephant is larger than a monkey.

Provided that, nonetheless, we could want to get a positive answer for an inquiry such as greater (elephant, monkey), we need to furnish a more correct portrayal of the planet. Restricted of doing this could be to include the remaining certainties, for example e.g. more gigantic (elephant, monkey), to our project.

NIT Calicut Project on Process Based Monitoring of Thin Clients Java Project

Introduction to Process Based Monitoring of Thin Clients Java Project:

In order to develop a centralized Linux based administration this project approaches for and its focus on administrative tool in order to monitor the multi-user networked environment that is run by several users. It is almost similar to the NITC computer center. The software will enable the computer network administrator to terminate the process of any user.

In case of users who are using any particular applications like instant messenger, chat client and others it will also link in to their ids. An improvement can be made in this system in the future by adding a mechanism that can take users’ screenshots with the help of the restricted programs. It will store these programs so that the administrator can take a look into it later on.

Moreover this software will also provide information to the administrator about the processes that relate to the given specifications at the initial time of starting the particular application. The application will further able to identify the process successfully. If the user tries to make use the techniques mentioned in the introduction to hide its identity this application will not let him do so. At times this software becomes a bit heavy on the server as it needs the Apache tomcat server.

Supplying more options to the administrator can make this software more advantageous. This will also reduce the load on the server. This software is highly important for organizations where a number of computers are connected in a single network. This will enable the administrator to keep a watch on the various interconnected lines and also to prevent all kinds of misuses. It will disclose the identity of the user in case he wants to perform any illegal activities. Using the proposed system of screen shots will make the software more useful and demanding among the users.

Download NIT Calicut Project on Process Based Monitoring of Thin Clients Java Project.

Gossip Based Random Routing In Ad Hoc Networks Latest CSE Seminar Topic with Report

Introduction to Gossip Based Random Routing In Ad Hoc Networks  Seminar Topic:

Most of the Adhoc routing protocols experience variant of the flooding.  Because of this many messages which are used in the routing are forwarded unnecessarily. In this paper we come up with a gossiping based approach which allows each node for forwarding message with some probability, so that this problem can be reduced. 

In this paper we implement gossiping, i.e. we decide randomly to forward or not to forward the message so that it can minimize the number of the messages being routed significantly. From the percolation theory we can conclude that this feature of the Gossiping exhibits the feature of the bimodal.  

The nodes are used for joining in a dynamic manner and also can quit the networks depending on the situation. Moreover, the limitations on power consumption in a node transmission range are typically small when compared to the span of the network. This limits the propagation range of a mobile node. The main challenges involving in the design of the Adhoc networks include the dynamic routing protocol development where routes can be determined more efficiently. 

Our protocol is simple and also easy to implement into the existing routing protocols. Even when we add this feature of gossiping to the AODV, there is a significant performance increase in all the metrics which are considered also in the situations in network which are as small as with around 150 nodes. This approach of Gossiping has lot of advantages when compared to that of other approaches. A further limit exists for the amount of the non-local traffic which is being sent over the large networks. In spite of this problem the gossiping feature is still useful for the non-local messages which are being sent on the large networks.

Download Gossip Based Random Routing In Ad Hoc Networks Latest CSE Seminar Topic with Report.

Go Programming Language from Google Latest CSE Final Year Seminar Report

Introduction to Go Programming Language from Google Seminar Topic:

The paper is about the introduction to the programming language named GO. It is for programmers with c or c++ knowledge.  This project describes the language specification with a series of programs implementing key features of the language.

In this programming the declaration of the functions are similar to that of the programing languages like ‘C’ where the functions are declared with the keyword ‘func’, also the execution of the program starts from main method only. A string constant contains Unicode characters encoded in UTF-8. GO is also a multi-threaded language which increases the performance of the applications.

The declaration of comment is similar to that of declaration in c++     /* … */.  Regarding the semicolon we can notice that our general program has no semicolons.

When we speak about this language the compilers included are Gccgo which makes use of GCC back end. Usage of this type of compilers will run most fastly and also capable of generating less code when compared to that of Gccgo. It is similar to the usage of variable type specification of integer; float also unsigned integers like uint.

These compilers run faster but generate less code compared to that of Gccgo. Go defines variables of types such as int8, float64 and also unsigned integers like uint, uint32 and more.

With the channels we will be able to service the multiple clients without using the multiplexer explicitly .This covers some of the basic topics in general about Go programming language.

In this paper we have given the introduction to the programming language named GO. It is for programmers with c or c++ knowledge.  This project describes the language specification with a series of programs implementing key features of the language. 

Download Go Programming Language from Google Latest CSE Final Year Seminar Report.

Game Development Technical Paper Presentation for Computer Science Students

Introduction to Game Development Technical Paper Presentation:

The paper is about development of the game. The game is software which is being installed in the computer systems. The goal of the games development involves 100% satisfaction and also entertainment to a maximum extent for the users. By using this game development process the different types of the video games are being produced.

Games are developed based on consoles. Running of the same game is not possible on consoles multi-times. Also it costs high for developing a game. As a result the consumers mostly deal with the existing players which makes new comers life more miserable.

In general the development process by the game developer involves the development done from a single person to large business association. These games are developed for generating profit. The games which are well-made can get enough profit. It is even important for the games developer to estimate the development costs so that they can attain profits more than the investment.

The games which are developed previously used to provide the entertainment to lower extent.   The implementation of the system and also for playing of the system required the mainframe computers. Existing industries provide high supply in fields of research, advertising and manufacturing. The life of the competitors become difficult  to enter into competition without the market share sufficiently.

The process of the game development involves three stages which includes the pre-production, also the production and also the post production. This process of production of game assures a high quality services to user to provide entertainment to maximum extent. Some of the game industries include EA, also UBISOFT and also ZYNGA for producing high quality games.

Download Game Development Technical Paper Presentation for Computer Science Students.

Fuzzy Logic Computer Science Seminar Topic with Report 2011

Introduction to Fuzzy Logic  Computer Science Seminar Topic:

This paper is about land cover classification using C. The objects are divided into groups which are called as clusters. Here the objects of the similar type of clusters are grouped together whereas the objects of different objects are clustered separately. 

Land cover describes the land surface. It can be natural or semi-natural or can be man-made.

They are directly observable. The reason for knowing about the land coverage maps is for giving the brief idea about the natural and also the built resources. 

The Fuzzy C is a method of clustering which allows one data to belong to two or more clusters and is frequently used in image segmentation and pattern recognition. 

A new reformed fuzzy C means technique has been proposed for land cover classification. The satellite image segmentation and land cover classification by RFCM are compared with that of FCM and PFCM on the quality measures PSNR, compression ratio, and execution time and Kappa coefficient. 

The application which is developed also tested with various pictures and the results is proved to be successful. The program is also tested for its consistency and its reliability. This work is useful for land cover mapping. Land cover maps are essential inputs to environmental and land use planning at local, regional, and national levels. They are being used directly in resource inventories like woodland census, state of the environment reporting like distribution establishment, extent and quality in case of the key habitats. They also act as input to the development and monitoring of a range of land use and conservation policies.

Download Fuzzy Logic  Computer Science Seminar Topic with Report 2011.

ECE Training Report On GSM Architecture

Introduction to GSM Architecture Seminar Topic:

The paper is about the GSM, the global system for mobile communication. It is a standard which is being developed for describing the technologies for the digital cellular networks.

This is being developed for replacing the first generation of Analog cellular networks. Firstly the data transmission was done via circuits later the data was been transmitted via packets names as the GPRS. Their speed was improved with the help of EDGE. Later the GSM has attained its standard by the third generation. A GSM network has introduced 4G standards.

The implementation of this systems are complex, and is composed of the three components which are radio-equipped, also the cell sites of handsets and also includes the fabric of communications. 

For making the systems to work the companies has defined the set of standards that allow makers to operate so that the users can use the phones.  These are the standards which are been provided by the vendors and also being analysed by different parts of the system. 

The services which are offered by the GSM include, the basic and foremost service is telephony, and the speech is encoded digitally and is transmitted via the GSM network. The other service includes the data services where the users are capable of sending and receiving the data up to a speed of 9600 bps. 

The unique and new feature of GSM which is not found in the Analog system previously is the service of Short Message Service.  The message allows the alphanumeric characters which can be of 160 bytes. It is a bidirectional service. It is even capable of meeting the requirements even for the personal communication system.

Download ECE Training Report On GSM Architecture.

Bittorrent B.tech Final Year CSE Seminar Topic with Report

Introduction to BitTorrent Seminar Topic:

The paper is about the BitTorrent. It is defined as a protocol which enables the peer-peer communication of file sharing system. It is mostly used when we are dealing with large volumes of data which is transmitted via the internet.  

This protocol is used for reducing the impact on the network and also a server for transmitting the large files. The file is made into segments called as pieces. Each peer gets a piece of the file is distributed, and then it becomes the source in case of other peers.

It is capable of dividing or distributing the task i.e. the distribution of the file is shared to the peer who is requesting it. It is also even capable of sending the copy of the file and gets it distributed among the other unlimited peers.

The existing studies which are considered are single-torrent based, but most of the peers have the capability for dealing with the torrents which are multiple based on our analysis. Also, these studies are not even accurate for the single-torrent based due to some assumptions. Therefore our analysis of the Bit Torrent system has provided with various assumptions.

The limitations with the systems related to the BitTorrent are, the decrease in case of the peer arrival rate impacts the service availability which makes down and also the file becomes difficult to search and also even download.

Other limitation includes the fluctuation in the client performance and changes with peer population. Also, the systems which we are using now are not offering the good services to the peers. The limitations which are discussed above helps us for providing a new approach to the multi-torrent model.