Routing Seminar Topic for CSE with Report

Introduction to Routing Seminar Topic:

This paper discussed about the importance of Routing and multicast routing scheme.  In an inter network, information passed from source to destination node through Routing, which is an important component of communication networks.   Due to limited wireless network bandwidth, energy resources and dynamic topology, multicast becomes the most challenging routing scheme in peer-to-peer or adhoc networks.  Multicast is hard in wired networks when compared to that of unicast routing scheme.

Overview:

Multicast routing scheme supports many envisioned advanced applications like military operations, civil operations and disaster management in peer-to-peer networks.  Tree based and mesh-based are the two categories of adhoc multicast routing protocols.  Only one path exists between the source and receiver in tree based routing scheme.  Multiple redundant paths exist between the source and receiver in mesh-based routing scheme.  Proactive, reactive and hybrid are the three update mechanism categories in multicast routing protocols based on the adhoc routing information.  

In proactive protocol, nodes always evaluate routes to all reachable nodes and maintain consistent routing information.  The proactive protocol is also termed as table-driven protocol.  In reactive protocol, routing information is not maintained at the network nodes if communication is not exist.  The reactive protocol is also termed as on-demand routing.  In order to balance the delay and control overhead, the hybrid routing protocols exists as an advantage of both proactive and reactive routing protocols. In adhoc networks, this paper has compared two on-demand routing protocols like Multicast operation of Ad-hoc On-demand Distance Vector (MAODV) and On-Demand Multicast Routing Protocol (ODMRP) based on the corresponding routing performance.

Conclusions:

This paper compares two on-demand routing protocols in adhoc network and analyzed the results based on the corresponding routing protocols performance. MAODV is a hard state reactive tree based routing and this protocol uses a broadcast route-discovery mechanism.  ODMRP  protocol is based on a mesh structure and connects the multicast members by using forwarding group nodes concept. ODMRP helps to create and maintain the multicast forwarding state.

Download  Routing Seminar Topic for CSE with Report .

Home wireless network Seminar Topic for Technical CSE Students

This paper discussed the process of setting up a home wireless network. In order to setup a home wireless network there is a need to complete an initial wireless router setup and then add computers and devices to the network.  As the availability of routers, internet access increases rapidly in the market it is easy to set up a wireless network.

Overview:

We need to connect to the internet which is the first step, for that we need to ensure the internet connection and modems are in working state.   The second step is connecting wireless router to modem. Then modem should allow us to connect to the internet.  When computer connects to the router wirelessly, the router sends communications to the internet with the help of modem. ISP’s instructions are always available to guide on how to connect router to modem.  Once connects router to modem there is a need to configure the network, which is a third step in the process.

Temporarily connects the computer to open network port on the wireless router using the wireless router cable.  So later whenever the computer is turn on then the connection should establish with the router automatically.  Need to type an URL in internet explorer page in order to configure the router. The router configuration page may prompts for the password and password or address need to be given as per router’s instruction page.  

The three things need to be configure in router configuration page are wireless network name (SSID), Wi-Fi protected access and an administrative password. The fourth step involves in this process includes the connection of computers, printers and other devices to the wireless network.  Instructions for adding wired, wireless devices and printers to the computers are available always in online.  Once the computer and devices are connected to each other, and then can share files, printers and games among the internet users.

Conclusions:

This paper discussed five steps to set up a home wireless network. All the steps mentioned here are so clear for an user to implement in order to set up a wireless network at home.

Download  Home wireless network Seminar Topic for Technical CSE Students .

Seminar Topics for ECE 2012 on Robotics with Report

This paper discussed about an emerging technology, surgical robotics. Robotic surgery plays an important role in overcoming the surgical limitation of minimally invasive laparoscopic surgery. Robots in operating rooms provide assistance to surgeons and help them to complete the routine surgical activities with less effort. Surgical robots are controlled by the methods like remote control and voice activation. Surgical robots allow precision of surgical instruments in minimally invasive procedures.

The main goal of robotic surgery field is to develop or design a robot which can perform heart surgery.  Robotic surgery helps to reduce pain and scaring to the patient.  In addition to the rewards to the patient, this robotic surgery is very helpful to both the surgeon and the hospital.

Overview:

Robots are entered into medical field slowly but proved its presence with its significant benefits. Robotic surgery is comes into existence to overcome the drawbacks of conventional surgical procedures. Doctors have already started using the sophisticated robots to perform surgical tasks on patients. The robotic surgical systems have capability to improve the safety and effectiveness of surgeries. But even these systems also have some drawbacks.

The one of the main disadvantage of this system is it is highly expensive. The usage of robots in performing surgery is termed as Robotic surgery. Remote surgery, minimally invasive surgery and unmanned surgery are the three significant benefits of Robotic surgeries. The enhanced vision of these systems is highly remarkable. Unlike the conventional laparoscopic camera views, this system has 3-dimensional view with depth perception.

Conclusions:

Robotic surgery is still in its evolving state. This paper discussed about the current role of robotics in surgery and its future. Robotic technology improves and expands laparoscopic procedures and brings revolution in surgery. Beyond the limits of human ability, a robotic can perform or expand its surgical treatment modalities. But maintaining of this robotic technology is cost effective so researches are still carrying out by considering all aspects like cost and power consumption.

Download  Seminar Topics for ECE 2012 on Robotics with Report .

Agricultural Robotics ECE Seminar Topic Fulll Report

Introduction to Agricultural Robotics Seminar Topic:

This paper discussed about the usage of robotics technologies in various fields and about an upcoming automation technology, Agricultural Robotics.  The main target of this technology is on how crop production can increase but not on how to replace human driver with a computer simply.

Overview:

Agricultural robotics technology helps to produce qualitative products at higher speeds and with fewer errors.  Robotics helps in various fields like agriculture, medicine, mining and space researches. The major disadvantage of driverless machines for agriculture is liability. This technology can completely change cultural or emotional appeal of agriculture.  This technology is fully cost-effective.

Treeboot is a popular embedded network sensing technology. The main objective of Treeboot robots is to acquire information about the environment by making use of distributed sensors. The forester robot is used for cutting up of wood, harvesting pulp and hard wood in the forests. Robots are highly used in Horticulture to maintain lawns successfully.

The main features of these robots are no fumes, no oil leaks, and no pollution and whisper quiet operation. Fruit picking robots are useful for harvesting of crops. These robots are using video image capturing technique to distinguish leaves from fruits. In the last decade, there is a significant development in Agricultural robots.  Researches are still carrying out in designing these robots more efficient for better agriculture.

Conclusions:

The robot-enhanced productivity is very high in agriculture immense and the robots are appearing on farms in various guises. The other problems associated with autonomous farm equipment are addressed with this technology. Crop production may be done better and cheaper with small machines than the larger ones. The non-farm community highly accepts the smaller machines. The jobs in agriculture includes highly repetitive decisions hence the robots can exactly substitutes human operators. The quality of the products can be highly sensed and verified by machines accurately.  The quality of our lives can be improved by robots by farming many qualitative crops but this process has its own drawbacks.

Download  Agricultural Robotics ECE Seminar Topic Fulll Report .

Computer Forensics B.tech CSE Seminar Topic and Report for Final Year Students

Introduction to Computer Forensics  Seminar Topic:

The process of identifying, preserving, analyzing and presenting legally acceptable evidence is termed as Computer Forensics. Computer forensics services are very much useful in professional environment and in corporate consulting.

Overview:

Computer forensics services are useful services for both private and government organizations during audits. The main parts of computer forensics are Forensic Data Recovery (FDR) and Incident Response Systems (IRS).  There are existing laws which supports computer forensics in criminal as well as civil litigations.  Security risk management, electronic document discovery and Data recovery are carried out using the computer forensics tools.  Computer forensics services are also useful for disputes resolution and to provide an expert witness testimony.  

These services can be availed in the compliance of proactive reviews, risk management and in investigations of specific allegations. The protection of intellectual property and the corporate assets are also a major services provided by computer forensics system.  These services can be applied for individual case studies which involves personal issues. Computer forensics helps in considering intentional misuse of privacy or personal information as a legal case. Data recovery problems are can address by this computer forensics system.

The common applications of a computer forensics are financial fraud detection, criminal prosecution and civil litigations.  In addition to cyber crimes, criminal are using computers for many criminal activities, in such situations computer forensics plays vital role in further investigation.  Computer forensic investigation is useful for identification, acquisition, preservation, analysis and reporting of digital evidences.  

Conclusions:

This paper discussed about the need of computer forensics. This system helps to store crucial electronic evidences and used them to prosecute individuals.  There is a need of cooperation from the private, public and international sectors to accomplish tasks using this computer forensic system. All stakeholders must exchange the information on cyber crimes so that it will be easy for a computer forensic system to detect and prevent such crimes. 

Download  Computer Forensics B.tech CSE Seminar Topic and Report for Final Year Students .

RFB Protocol Seminar Report for B.tech CSE Students

Introduction to RFB Protocol Seminar Topic:

This paper discussed about the RFB protocol and defined its various working aspects. Also, this paper defined about the remote computing and remote access. RFB protocol acts as a communication protocol while remote access takes place between client and servers across network. Remote access is possible when client and server communicating by making use of this protocol. RFB protocol working activities are detailed in this paper.

Overview:

RFB protocol has various messages which are send and interpreted by both server and client modules. RFB protocol provides remote access to GUIs. This protocol is applicable to all windowing systems and applications as this works at the frame buffer level. RFB protocol is using in Virtual Network Computing also. Display and Input protocols are the basic parts of RFB protocol. The display part is based on a single graphics primitive and the Input protocol based on a normal workstation model.

In RFB protocol, a thin client protocol, in which there is some communication protocols exist between RFB client and RFB server.  This protocol is designed in a way such that makes a client with fewer requirements.  Because of this the task of implementing a client is very simple. This protocol became very popular after it used in Virtual Network Computing.  This protocol can be extended into new encodings and pseudo encodings.

RFB protocol can operate on either byte-stream or message-based transport channels. This protocol is used over a TCP\IP connection also. This protocol proceeds through three stages like handshaking phase, initialization phase and normal protocol interaction phase. In the first phase, both client and server agree the rules, security and version of communication. In the second phase, client and server exchange the messages. In the final phase, both client and server exchange various other messages which begin with a message-type byte.

Conclusions:

This paper has given and implementation example of RFB protocol for easy understanding of its concepts, also define how program can be execute on a server or client based on this RFB protocol.

Download  RFB Protocol Seminar Report for B.tech CSE Students .

Brain-Computer Interface B.tech CSE Seminar Topic with Report

This paper discussed about an emerging technology, Brain-computer Interface (BCI).  BCI helps to control remote devices by making use of electrophysiological signals.  BCI consists of electrodes which can apply to the scalp of an individual. These electrodes capture brain’s electrical activity and carry the same to amplifiers, where these amplifiers pass the signal to a computer for processing through an analog to digital converter

Overview:

BCI performs communication and environmental control by providing EEG signal to the computer for processing. In BCI’s considerable amount of time spends on recognition and signal processing and also much complexity involves in the signals carried out by a BCI, so because of these BCI’s are slow in performance when compared to that of human actions. The BCI system takes Electroencephalogram (EEG) signals as inputs and gives control option by its output. The obtained output signals are evaluated as cursor control or prosthesis control. 

BCI provides a communication channel for patients with locked-in-syndrome. BCIs aimed at repairing human cognitive functions. BCI reads electrical signals of human brain activity and translate them to computer understandable digital language and then converted into few actions like turning on a TV or moving a cursor. BCI helps to the patients who cannot perform actions based on the signals from their brain. Apart from medical usage, BCI is also useful for gaming and automobile activities. Few of the technologies used for BCI are neural tissue engineering, robotics and signal processing.

Conclusions:

Mostly the direct communication through EEG takes place in BCI. Signal acquisition, Signal processing, classification and pattern recognition and application are the four main components of a BCI system. BCI creates a direct communication between human brain and external devices.  Neuroprosthetics is a technique using in BCI to control nervous system disabilities.  But there is a need of extensive training on how to use EEG technique in BCI system. BCI environment setup is costly so implementation of BCI system is more cost-effective. 

Download  Brain-Computer Interface B.tech CSE Seminar Topic with Report.

B.tech CSE Seminar Topic with Report for Response Mechanisms in Ids On Intelligent Agents

This paper discussed about response mechanisms in Intrusion Detection System (IDS) and also discussed about few IDS based on intelligent agents.

Overview:

Intrusion Detection is a main objective of Intrusion Detection Agent System.  The other objectives of this system are responding to the attacks and tries to tracks down the attacker’s machines.  Intruders are tracked efficiently by looking at MLSI (Mark Left by Suspected Intruder).  Manager, Information gathering agent and Tracing agent are three types of mobile agents. Information about intrusions can be gathered by IDS sensors from system logs.

 IDS sensors inform the managers whenever they detect MLSI.  Then a tracing agent, which can activate the information-gathering agent and employs a message box upon arrival, will get dispatched in target host by the manager.  After getting the additional information, information gathering agent returns back to the manager and informs about the additional information. 

To response to intrusion, a system must use large number of agents and have very elaborative mechanism. In AAIRS, IDS sensors give the output to interface agents who can keep track of IDS reports credibility. Here IDS middle tier components are implemented as mobile agents. ADEPTS system contains Intrusion Directed Acyclic Graph (I-DAG). Every node in I-DAG has Effect Service Set and Cause Service Set. Cause Service Set contains all the services which compromised to achieve the goal and Effect Service set contains all the services which will get compromised only after the goal is achieved.  ADEPTS system accepts multiple alerts simultaneously and for each alert, a separate I-DAG will get initiated. Confidence will assign to the node, if there exists a node in I-DAG corresponding to the intrusion.

Conclusions:

IDs mostly have response as its secondary activity.  For every response in IDA there are more than 100 responses in ADEPTS.  All models have provision for response and consider mostly parallel attacks.  All the models fit in distributed infrastructure, based on three mobile agents. There is a possibility of the response to failed in ADEPTS case. 

Download  B.tech CSE Seminar Topic with Report for Response Mechanisms in Ids  On Intelligent Agents  .

B.tech Seminar Topic for CSE Students on Data Mining Technique Helps To Reduce Test Suite

Introduction to Data Mining Technique Helps To Reduce Test Suite Seminar Topic:

This paper discussed about data mining technique which helps to reduce test suite and thereby facilitating the knowledge extraction from test cases. Both functional and non-functional requirements from SRS document transformed into state charts. These state charts will helpful to generate different test cases automatically for a single planning problem. Test cases generated from state charts are used for manual software testing or automated testing at system level.

Overview:

There is a need to have an effective test automation methods or tools to address many issues in testing like Test ware creation and its inconsistent maintenance. Data mining is a powerful technique which helps to create patterns from an existing database. Data mining techniques helps to manage the project by maintaining project related valuable data and produce higher quality software systems. The three steps involved in applying data mining technique to the current project is generation of classification rules, create the UML state machine, then generate test cases from it and applying data mining techniques to the generated test cases to reduce the test suite size.

The WEKA classifier system generates classification rules and those rules will get apply to both functional and non-functional requirements. State machines which can specify the current state\behavior of the system and these states machines can be created based on non-functional requirements.

  In a software testing world, state models are used to derive test cases from state machines. The main target of model-based testing is to automate the generation of test cases process from test models. Predicate selection, Predicate transformation and Test data generation are the three steps involved in generating the test cases from state machines.

Conclusions:

The process of covering patterns from data is termed as Data mining. Verification and validation of patterns on data samples is one of the important part in Data mining process. For mining different kinds of data, there are many methods available including clustering, characterization etc. 

Download  B.tech Seminar Topic for CSE Students on Data Mining Technique Helps To Reduce Test Suite .

BE CSE Seminar Topic on Captcha with Report

Introduction to Captcha Seminar Topic:

This paper is about a challenge-response test or a Turing test, Captcha which is administered by a machine and targeted to a human.  

 Overview:

Captcha have simple problems to solve by users rather than having difficult problems in artificial intelligence. Captcha helps in developing artificial intelligence of computers by creating incentives. It has the capability of distinguish humans from computers. Captcha wont depends on difficult problems in artificial intelligence.  

Captcha provides distorted image by showing letters or digits to the users and then allow the users to type them. Captcha can be in the form of distorted images, visual puzzle, photo recognition, speech captcha and 3D captcha. Development of 3D captcha is still in progress. Content-based video labeling as a Captcha task, addresses many problems which are encountered by using existing character recognition captcha. Public video databases generate many challenges.

A video captcha is a task in which user watches a video and then provides three tags.   If, once a video is selected, then there is a need to generate challenges using a function with four parameters. In order to enhance usability and maintain security against a video captcha frequency-based attack there is a need to extend the set of ground truth and user supplied tags.

Conclusions:

Captcha helps to prevent comment spam in public blogs. It protects the website registration. It helps to record the votes and managing in a way to avoid duplicate votes in online polls. In password systems, dictionary attacks can be prevented by captcha. Captcha truly guarantees that bots won’t enter or even read a website. A plausible solution against email worms and spam are offered by captcha. Can create customize captcha to address the problem directly and make the resistant implementation. Captcha can prevent unwanted macro-scripting of a standalone application.  Video captcha security is verified by a frequency based attack. 

Download  BE CSE Seminar Topic on Captcha with Report  .