Ajax Technology CSE Seminar Topic with Documentation

Introduction to Ajax Technology Seminar Topic:

The paper is about the Ajax technology.  The technology Ajax is used for creating the customized web applications which are dynamic in nature.  It forms a communication which is asynchronous and also two-way; this communication exists between the server and also the web browser.  The aim of this paper is for providing the information about the technology AJAX, what all the duties that are performed by this technology, and also the situations when this technology should be implemented and also when not to use. This paper also includes the future enhancements when compared to that of present.

This type of communication which is asynchronous helps user to browse the webpage, as they are being loaded as sections. It has also capability of adding information which is new or being updated recently without the page being refreshed. In the present situation the application of Ajax is being used in many companies as many customers prefer the application which is being developed using this technology.

Developing an Ajax application includes the writing of the code with three sections, where the first section includes the code which is being written in HTML, where the second section is written in the JavaScript, whereas the third section is written in server script written in PHP.  Where each section of code represent the Ajax request and if there is any missing in the request then the section may fail.

AJAX helps to develop internet applications. It makes use of XML for communication with server. Overall they provide application which is interactive. We can conclude that AJAX is easy technology to learn with a little knowledge of html. Al Though the Ajax provides the web applications which are interactive and rich but if they are not properly used can create security problems.

Download Ajax Technology CSE Seminar Topic with Documentation.

High Speed Adder Used In Digital Signal Processing Technical Seminar Topic for CSE

Introduction to High speed adder used in digital signal processing Seminar Topic:

At the very least, most people expect computers to do some kind of arithmetic computation and thus, most people expect computers to add. Combinational logic circuits that perform binary addition are known as adders. We have half adder and full adder. Half adder is a combinational circuit which performs the addition of two bits.

In half adder circuit we have two binary inputs and two binary outputs. Full adder is also a combinational circuit which performs the addition of three bits. Full adder circuit may also be implemented from the combination of two half adder circuits. 

             We have some problems with this adder like it is very slow and some times it may give wrong results because of slow propagation of signals. To overcome these problems we have several adders, those are: Ripple adder, Carry Look Ahead adder, Carry Select adder, 2’s compliment adder, Conditional Sum adder, Carry Save adder.

Download High Speed Adder Used In Digital Signal Processing Technical Seminar Topic for CSE .

 

Numerical Problem a Parallel Approach Topic for CSE Technical Seminar with PPT

Introduction to Numerical Problem a Parallel Approach Topic Presentation:

We know that in sequential processing we need to process the data sequentially that is one by one which is very time consuming and in sequential approach there is a lack of interprocessor communication. Parallel processing is solving a problem by working at a time on different parts of that problem. We require algorithms, programming languages, operating systems, compilers and so many numbers of processors that may be in tens or in millions also. Parallel processing reduces the time taking to solve the problems. 

Flynn’s Classification

1. Single instruction stream, single data stream (SISD) Computer:

            In SISD computer we have only one control and one processor instruction stream is sent to processor from the control and processed the data stream is sent to the memory. 

2. Multiple instruction stream, single data stream (MISD) computer:

            In MISD computers we have number of processors and controls. A single data stream is sent from the memory to the processor then numbers of instruction stream are sent to the controls. 

3. Single instruction stream, multiple data stream (SIMD) computer:

            In SIMD computer we have number of processors and a single control. Numbers of data streams are sent to the processors from the memory and a single instruction stream is sent to all the processors from the single control. 

4. Multiple instruction stream, multiple data stream (MIMD) computer:

            In MIMD we have number of processors and controls. Numbers of data streams are sent from the shared memory or interconnection network to the processor and numbers of instructon streams are sent to the processor from the number of controls. 

In parallel processing we use number of parallel algorithms. A parallel algorithm is a solution method to be solved on a parallel computer. The quality of the parallel algorithm depends on the speedup it produces. The larger the speedup, the better the parallel algorithm.

Download Numerical Problem a Parallel Approach Topic for CSE Technical Seminar with PPT.

Quality of Service Routing Approaches and Algorithms CSE Technical Seminar

Introduction to Quality of Service Routing Approaches and Algorithms Technical Seminar:

Now-a-days so many applications are there in the internet that need service guarantee in order to maintain the functionality. So far there were no preferences to traffic; internet has followed best effort service. But now, the applications need the service guarantee, to provide this we need a system which provides these kinds of guarantees.

Quality of Service includes some mechanisms and provides such guarantees. QoS considers hop count and doesn’t follow shortest path routing. QoS routing is a routing scheme, under which paths for flows would be determined based on some knowledge of Resource availability in the network as well as the QoS requirements of the flow. 

Objectives: 

            The objectives of QoS are based on the information about network state and resource availability. These are as follows

  • Dynamic determination of feasible paths.
  • Optimization of resource usage.
  • Graceful performance degradation. 

Routing algorithms

            We have several problems in QoS routing and we can solve these problems using some algorithms. The two complex problems are MCOP (Multi-Constrained Optimal Path routing problem) and MCP (Multi-Constrained Path routing problem).these can be solved by heuristic approaches. The algorithms that are for the optimization problem MCOP can easily solve also the MCP problem by just checking if the optimal path is feasible with regard to the given constraints. For solving the MCP problem we have several algorithms. Those are Chen and Nahrstedt’s algorithm, Jaffe’s algorithm, Tunable Accuracy Multiple Constraints Routing Algorithm, Iwata’s algorithm, Randomized algorithm.

Routing strategies and approaches:

            QoS routing algorithms are divided into 3 broad classes based on the different tasks done by the QoS routing. Those are i) Source routing ii) Distributed routing iii) Hierarchical routing.

            QoS routing is more popular now because of OSPF protocol.Qospf uses three metrics: Available bandwidth, Propagation delay, Hop count

 Download Quality of Service Routing Approaches and Algorithms CSE Technical Seminar.

Technical Seminar Topic with PPT on Mining the Web Graph for IT Students

Web mining refers to applying data mining techniques on web based hypertexts. As we have large amount of data available online. web mining is more popular now-a-days.      E-commerce is the most important application of web mining for its rapid development. 

Classification of web mining

Web mining is classified into three types based on the type of data used: i) web content mining ii) web structure mining iii) web usage mining

Web content mining: web content mining explains the mining of data from web contents. Web is the repository of data so that there are so many techniques to extract the data. Most of the techniques are based on the semi structured HTML documents data and unstructured free text data. Web content mining is of two point views information retrieval view and database view.

Web structure mining: under web structure mining the models behind the hyperlinks is discovered. These models shows the structures of the hyperlinks present on the web site so that the similar data could be grouped together therefore it would be easy to the user to retrieve the data.

Web usage mining: different user uses different technique to retrieve the needed information from the web. These patterns are discovered using this technique to improve the quality of web content to the end user and also to improve the site design. Web usage mining is also known as web log mining.

Web data clustering:

Clustering the web data means to group the data. Similar kind of data is grouped together into one class so that when ever the user requests for particular data the information related to that particular topic will be retrieved. We have lot benefits by clustering the data like integrating various data representations, improving the web data accessibility, improving information retrieval, etc. We have different types of clustering. Those are: hierarchical clustering, partitional clustering, probabilistic clustering, graph based clustering, fuzzy clustering, neural network based clustering and hybrid clustering.

Web caching:

Web caching refers to storage of recently retrieved computer information to future use. Web caching decreases the traffic in the web by reducing the bandwidth usage and reduces the server load. Evaluation methods and techniques of web caching are hit rate, weighted hit rate and latency.

Download Technical Seminar Topic with PPT on Mining the Web Graph for IT Students.

B.tech CSE Technical Seminar Topic on Subnetting and Supernetting with PPT

Introduction to Subnetting and Supernetting Technical Seminar Topic:

The traffic over the network address space utilization can not be controlled by installing more routers or by increasing the size of the routing tables. Every system has given a unique IP address consisting of 32 bits written in dotted decimal format. This 32 bit IP address is divided into two parts: first 0-15bits represents network number and from16-31bits represents host number. 

Classful IP addressing

Classful addressing divides the entire IP address space (0.0.0.0 to 255.255.255.255) into classes. The different classes of IP address are Class A, Class B, Class C, Class D & Class E. The value ranges of these classes starting from class A are- 0 to 126 (127 is loop back), 128 to 191, 192 to 223, 224 to 239 and 240 to 255 respectively. 

Subnetting: 

The basic purpose of subnetting is to control the traffic over the networks. An IP address consists of network number and host number therefore subnetting is dividing the network number part classes into small pieces. In subnetting bits are borrowed from host ID part to the network ID part. It has two-level hierarchy in which network number and host number parts are present, in three level hierarchy we have network number, subnet number and host number. 

Supernetting/CIDR: 

Supernetting is combining the multiple internet address of a class. It does not follow the concept of classes because it is very confusing. CIDR stands for Classes Inter-Domain Routing. The notation of CIDR is xxx.xxx.xxx.xxx/n here ‘n’ is the number of leftmost ‘1’ bits in the mask.

Download B.tech CSE Technical Seminar Topic on Subnetting and Supernetting with PPT.

Security in Operating System and WindowsNT Final Year CSE Technical Seminar PPT

Introduction to Security in Operating System and WindowsNT Technical Seminar Topic:

Computer security refers to the protection of all components like hardware, software, and stored data of a computer from damage, theft, or unauthorized use. Most confidential data should be protected from the unauthorized users so that the data should be encrypted. Many users accessing the data lead to data inconsistency as they may alter the data. So, proper passwords should be used. Sometimes systems may crash so that we may loss important data to overcome this we should maintain data backup. 

Security problems in operating systems: 

Authentication: authentication is mainly dependent on the user identity. The most common user identity is giving passwords. When the user enters the username then the system asks for the password if the entered password matches the password stored in the system the system assumes that the user as the legal user. But the passwords can be easily guessed by the unauthorized users if we use simple passwords. So we should be more careful while choosing the passwords. The main problem is keeping the password secret. To solve this problem we have encrypted passwords and one time passwords. 

Program threats: Hackers thefts the data or programs written by some users and they may change them. it leads to the misuse of the data. The two major program threats are Trojan horses and Trap doors. 

System threats: the two main system threats are warms and viruses. Warm replicates a file so that the number of copies of a file are produced ultimately then the system performance goes downs. Virus spread their programs to all the files and damages them. These viruses are usually spread by downloading data from the network and exchanging the infected disks. 

WindowsNT: 

Microsoft included security as part of the initial design specifications for Windows NT, and it is pervasive in the operating system. The security model includes components to control who accesses which objects, which actions an individual can take on an object, and which events are audited.

Download Security in Operating System and WindowsNT Final Year CSE Technical Seminar PPT.

Face Recognition Technology B.tech Seminar Topic for Computer Science Students

Introduction to Face Recognition Technology Seminar Topic:

This paper discussed about one of the unique secured technologies, face recognition technology. This technology secures the information by authenticate the user based on the face. This is much secured when compared to any other traditional technologies except in the twins’ case.

Because face is unique identification for any user but this statement is not acceptable for an identical twins.  This technology is non-transferable. In this technology, the system takes the features of a face, stores in database, takes the user’s face features and tries to search and map the same with the existing face features from the central or local database.

Overview:

Previously actions are takes place on paper or face-to-face but slowly things are changed and most of the actions performed electronically.  This growth in electronics has demanded faster and secure transactions and communications. Fastness depends upon what hardware or what software is being used for that transaction that is the entire performance of the transaction depends on software and hardware infrastructure. Secure transactions can take place only when there is checking for accurate user identification, authorization and authentication.

  Personal Identification Numbers PIN’s were usually used for user identification and security clearances to access bank accounts, to access codes for buildings and to get access to computer systems.  In the case of lost credit and debit cards, there is a possibility for an unauthenticated user to access the account with correct personal codes, which he got from after attempting many probability trails.  This happened because many users usually use easy to remember PIN’s and passwords like they may use their birthdays, phone numbers as security numbers and most of the users gives nicknames as passwords.

So, there is a severe need of having strong unique identification technology for authenticate and authorize the user for accessing systems and financial accounts. Face recognition is a popular evolving technology which helps to easily identify the user for the corresponding accounts.  There and many traditional secure methods like biometrics, finger prints and unique hand-writing recognition for easily identifying the authenticate user. But these methods have their own drawbacks which were faced by this face recognition technology. Even this technology is in vain when consider the identical twins users.

Download Face Recognition Technology B.tech Seminar Topic for Computer Science Students.

Ethernet Technology CSE Seminar Topic Abstract and Report

Introduction to Ethernet Technology CSE Seminar Topic:

This paper discussed about the major LAN technology, Ethernet technology. This paper also discussed about the various Ethernet physical layers along with link media requirements or limitations.

Overview:

Ethernet stations communicate each other by sending data packets. Each Ethernet station provided with a 48-bit MAC address which is used to mention the source and destination of each packet. As in Ethernet, point-to-point links connected by switches and these replaced coaxial cables so the installation cost is reduced, increased reliability, management and troubleshooting. Link level connections will define by both the source and destination addresses and these connections are established by Ethernet.  

The operating system on the receiving station selects exact protocol module by making use of Ethertype filed in each frame.  All generations of Ethernet are interconnected through bridging and use the same frame formats.  In Ethernet, computers and other devices linked through cables. Cables connected to the computer at one end and the other end connects to switches, hubs and repeaters. Basically, Ethernet works with the help of chain reactions. Different variants of Ethernet technology are available in current market.

Ethernet cable, Ethernet hub, crossover cable and router are the few types of equipment for Ethernet network. Ethernet requires a patch cable to connect the devices in the network. Patch cable is a standard RJ-45 twisted pair cable. Ethernet hub has many Ethernet ports and can connect device to the hub using Ethernet cable to form a network. Two devices can be connected using an Ethernet cable without a hub called Crossover cable. Router is mostly used on a home network, because it allows to share the internet connection among two or more computers.

Conclusions:

Ethernet became a powerful LAN technology because of few specific characteristics.  Ethernet technology is easy to understand, implement and maintain. Network implementations take place at low-cost in this technology.  This technology provides huge flexibility for network installation and also guarantees successful interconnection. It is hard to imagine the current network technological world without the presence of Ethernet.  

Download Ethernet Technology CSE Seminar Topic Abstract and Report .

Secure and Fast Encryption Routine CS Final Year Seminar Topic with Report

Introduction to Secure and Fast Encryption Routine Seminar Topic:

This paper discussed about an algorithm, SAFER – Secure and Fast Encryption Routine. In this algorithm, the plain text encrypts by going through S-boxes and decrypts by its inverses but not like in DES where each block is divided into parts which in turn some parts affect others.  For the entire process of encryption SAFER process undergoes eight rounds. Applying the first sub-key to the eight byte of the block is the first step for each round. The process of applying each byte of the sub-key to each byte of the block always relies on which byte is used. SAFER used for invert the encrypted plaintext by reverse each step and in this process there is a possibility of altering the sub-keys which used for encryption. 

Overview:

The process of encryption and decryption of plaintext using sub-keys is same in both SAFER-128 and SAFER SK-128 algorithms.  SAFER SK is a new version of SAFER, which has a huge secure key schedule and also there exists a 40-bit version of SAFER SK. The first 64-bit sub-key was the key itself in the original version of SAFER.

The S-boxes:

The regular box indicates 45 raised to successive powers modulo 257. In S-boxes, every s-box is inverse of the preceding s-box and there may be a probability of getting intractability of the discrete logarithm problem.   Among eight rounds of SAFER process, after the eighth round an extra sub-key is added in the way that the first sub-key of each round.

Sub-key generation:

In order to generate successive sub-keys there is a need to place individual bytes of the key in a circular left shift of 3 bits between the rounds, and the yielded result is XORed with a constant which is fixed for each round.  Usually the rounds proposed for SAFER process are six but later it increased to eight. The fixed constants are obtained mathematically for up to 10 rounds. 

Download Secure and Fast Encryption Routine CS Final Year Seminar Topic with Report.