Extensible Style Sheet Language XSL Seminar Report

Description: The research paper Extensible Style Sheet Language XSL Seminar Report talks about extensible style sheet language (XSL). It describes what it is. The research paper says that how style sheets help in describing specific data during presentations. These sheets help with language and pronunciation. In absence of style sheets additional components needed for presentations should be taken over by HTML tags and so on. Web style sheets have been in vogue lately but their creative prowess went unobserved. Web editors have started using Netscape’s proprietary pages to enhance their presentation skills instead of creating their own powerful pages. Style sheets help in more effective presentations at the same time safeguarding the webpage’s integrity.

Some important terminology:  

  • XML – Extensible MarkUp Language – Allows data or content to be marked up using tags invented by the author.
  • CSS – Cascading Style Sheets – A technique, that’s used to add style to HTML.
  • DSSSL – Document Style Semantics and Specification Language – An international standard for associating processing with SGML (Standard Generalized Markup Language) documents (in other words how a printer should process it!).

Conclusion: XSL (Extensible Style Language) is a styles sheet language designed for the Web community. It provides functionality far beyond CSS (e.g. element reordering). XSL is intended to be accessible to the markup level user by providing a declarative solution to most data description and rendering requirements. Less common tasks are accommodated through a graceful escape to a familiar scripting environment. This approach is familiar to the Web publishing community as it is modeled after the HTML/JavaScript environment. With XSL, the family of XML specifications now includes: XML — the subset of SGML that is the XML language. XLL –addressing and linking capabilities defined in the XPointer and XLink specs .XSL — a language to specify the association of presentation style with XML information

Download Extensible Style Sheet Language XSL Seminar Report.

Exception Handling Runtime Errors CSE Technical Paper

Description: The research presentation Exception Handling Runtime Errors CSE Technical Paper talks about Exception Handling. It explains lucidly what exception handling is. The research paper suggests that exceptions are runtime errors which occur when user gives an invalid entry. Exceptions are not logical or syntax errors. Exception handling is the way to deal with these errors.

The presentation suggests that EH in VB.net is done by two ways:

  1. Structured method
  2. Unstructured method

In the unstructured method the error is skipped or ignored. In the structured method the exceptions are handled in a structural pattern by individual blocks.

Syntax à try
Statements to execute

Catch Variable as exception class
Statements to handle exception
Finally mandatory statement

End try

The base class to work with exceptions is “system.exception”

 Conclusion: The presentation concludes on a note that A single try block can have any number of catch blocks defined for it.

  • Try blocks can be nested.
  • It is mandatory to define at least one catch block for a single try block.
  • Finally block is an optional block if used within a try block definition then the code written in that block will always be executed.
  • A single try block can have zero or only one finally block defined for it

 Whenever an exception occurs then if the try block is defined with more than one catch then each and every catch block is verified in a sequential order till it encounters a valid catch block.

Download Exception Handling Runtime Errors CSE Technical Paper.

How Computer Evolved Computer Science Seminar

Description: The research report How Computer Evolved Computer Science Seminar casts light on important breakthrough research that happened in the domain of Computer Sciences. It begins stating the invention of the ingenious machine to the present inventions.

1904: Invention of Thermionic Valve

1938: Conrad Zeus first constructed the world’s first binary digital computer. Z1.

1941: World’s first electromechanical computer was built.

1948: Claude Shannon identified the bit as the fundamental unit of data and the basic unit of computation.

1951: The UNIVAC I developed.

1952: John von Neumann’s IAS computer became operational.

1953: IBM shipped its first electronic computer, the 701.

1955: The first fully transistorized computer, TRADIC.

1956: Experiments began for direct keyboard input on computers. Doug Ross wrote a memo advocating direct access.

1981: Sony shipped the first 3 1/4″ floppy disk and drive. The MS-DOS was  released.

1982:  Phillips created an erasable optical disk.
The first Cray XPM produced.
The first issue of PC Magazine printed.
Intel introduced the 6 MHz 80286 microprocessor.
Microsoft release MS-DOS 1.1 to IBM.
The first IBM PC clone, the MPC.
Compaq Portable PC introduced.
TCP/IP introduced and Internet’s birth.

1998: Celeron processor shipped
Steve Jobs introduced the iMac.
Microsoft released Windows 98.
America Online buys Netscape Communications.
Motorola officially introduced the G4 processor.

1999: Cyrix released the MII processor – beats PIII
Apple introduced the G3 PowerBook and the iBook.
AMD released the Athlon processor.
Apple released the Power Mac G4 compter (With Motorola G4)

2000: Microsoft unveils Windows 2000 OS and Windows ME.
BeOS v5 OS for PCs released.
Palm III c handheld computer released.
Microsoft launches the pocket PC that runs on Microsoft Windows CE 3.0.
Corel released WordPerfect Office 2000 for Linux.
Apple releases MAC X DR 4.
Compaq introduced the iPAQ Pocket PC handheld computer.
Intel announces Pentium 4.
Microsoft unveils it’s C# (Called C Sharp) language.
Apple introduced the PowerMac G4 Cube.
AMD shipped 1.1 GHz Athlon processor.

2001: Intel announced hyper-threaded P4 capable of working as two processors.
Napster closes down.

Download How Computer Evolved Computer Science Seminar.

Ethical Hacking and Advantages Btech Seminar Report

Description: The research paper Ethical Hacking and Advantages Btech Seminar Report talks about ethical hacking as a necessary evil. Hacking as such is a very bad thing to do. A person who is a genius with his own right in using computers and who knows inside out of computer’s hardware components and machinery and who masters some of the quintessential computer languages, and can decode everything in order to understand what it means and how it works can be a potential hacker. In simple words a hacker is a subject expert.

IN this growing world of information and technology and bulge of information in a colossal proportion, security is the most vulnerable thing. Information sometimes decides the fate of the company. This information has to be secured because of a highly networked environment. A third party access to your information might play foul with the business dreams of prosperity and expansion.

In a scenario like this hackers who have all the essential tools to penetrate into a secure environment can steal your precious information or corrupt it irreversibly using ‘backdoors, toolkits and worms’. Not just this the business world is growing astronomically there is a financial transaction across the world at drop of hand, hackers smack at e-transactions as they can make their lucre dreams come true. The research paper makes understand the evil purport of hackers, and their desire to indulge in something sly.

Conclusion: The research paper concludes saying that in a scenario like this in which security is the most endangered element, ethical hacking comes into existence. Ethical hackers are the hackers authorized by the company and with an official seal to go about hacking. They are more intelligent than malicious hackers in the sense they penetrate into the security system the similar way hackers do and identify the vulnerable areas within. They, the ethical hackers, have to step into the shoes of malicious hackers and understand the extent of danger that could be unleashed upon the system.

Download Ethical Hacking and Advantages Btech Seminar Report.

How is Ethical Hacking Done CS Student Project Seminar

Description: The research paper How is Ethical Hacking Done CS Student Project Seminar describes the process of ethical hacking. It tries to explain the nature of hacking and why it is done. It also shows the differences between malicious hacking and ethical hacking. The research paper suggests that in these days of ever growing information and so knowledge there is a direct proportionality with the competitive spirit within the companies. Companies want to outperform one another. Information and secret/private information of the company at that could be of utmost importance in making or breaking lucrative business deals.

Not just business proceeding, but the transactions depend heavily upon security systems and advanced cryptology algorithms. In a scenario like this e-transaction becomes highly vulnerable. Perpetrators who are geniuses in their own right can create programs, decryptions and algorithms that play foul with your security system. This they do in order to gain access to the personal information and the most private information the company shares or just to corrupt the entire system by using toolkits, Trojans and other malicious weapons and derive evil pleasure seeing the company/person in trouble and experience losses.

Ethical hackers are the persons that help right in time. Ethical hackers as the name itself suggests are persons authorized by the company to wear the hat of hackers and do similar things that hackers do. This they do in order to discover the potential vulnerability, upheavals and loopholes in the company security system. Genius per se ethical hackers are a step ahead of mainstream malicious hackers in the sense they need to go a step above these hackers and think what they could do to corrupt the information. Only then will the ethical hackers be able to understand the ways of fortifying company’s security measures.

Conclusion: The paper concludes saying that ethical hacking is advantageous and also disadvantageous. Ethical hacking helps a company realize potential loopholes at the same time it is like sharing the most intimate information of the company with an outsider. This poses many severe and related questions. An act based on trust could do bad too at times.

Download How is Ethical Hacking Done CS Student Project Seminar

Ethical Hacking Vs Malicious Hacking

Description: The research paper Ethical Hacking Vs Malicious Hacking comments of Ethical Hacking and suggests how it is different from malicious hacking. The research paper also suggests how an organization should have a very strong, formidable security system in order to rise over hacking.  The research paper also compares and contrasts ethical hacking and malicious hacking.

Ethical hacking is voluntarily intruding the information security systems of a company by way of programming passwords and other such things. This is done by programming experts who can very dexterously decrypt the encrypted data. This happens in companies that are eager to know the loopholes prevalent in the security systems. Ethical hacking is also done in order to plug in these loopholes efficiently.

The research paper projects a hacker as a person who is eager to know the intricacies of learning the potential of the computer and extending its capabilities. An ordinary computer professional dares not to exploit the system beyond his scope and purpose. Hiring ethical hackers will facilitate the company by providing the necessary security measures it needs to implement. Malicious hacking on the other hand is done with an intention of exploiting the company’s information and creating programs to corrupt the security system. It’s a sly thing which is either done by geniuses or people who are adept at peeking over the shoulder to pilfer the information that they want.

Hacking in itself is a bad thing to do but at times when companies are apprehensive about the vulnerability of their systems, ethical hacking becomes necessary evil. This way the ethical hacker has to be more adept and skilled than the malicious hacker in the sense that he needs to know the possible information extraction a malicious hacker could do and from where.

Conclusion: The research paper concludes on a note that ethical hacking becomes an indispensable tool in putting the security systems of a company to acid test. An ethical hacker has be an ethical person himself with a capacity to outwit the malicious hacker but solely with the intention of safeguarding and securing the most intimate information of the company.

Download Ethical Hacking Vs Malicious Hacking Final Year Technical Seminar Report.

Ethical Hacking Computer Science Technical Paper Presentation

Description: The research paper Ethical Hacking Computer Science Technical Paper Presentation talks about Ethical hacking. The research paper suggests that in this age of information explosion and e-commerce, there is a colossal information exchange process taking place almost every second. These days there are so many vast stores online as reference material, collaborative conversations, communications, video conferencing and many more such communicative and information exchange processes have condensed the world. In a scenario like this there is every reason for some hackers to peep into your email by hacking your password or personal website and put some vulgar stuff that may upset you and play a spoilsport with your goal-oriented intentions. Ethical hackers will do better in a scenario like this. They will help plug-in loopholes in your security system and thus make it fortified against hacking of any kind.

Who is a hacker: A hacker is defined thus: A person who enjoys learning the details of computer systems and how to stretch their capabilities-as opposed to most users of computers, who prefer to learn only the minimum amount necessary.  One who programs enthusiastically or who enjoys programming rather than just theorizing about programming”.

The ethical hackers are the ones that are hired by the companies to see the strength of the security systems. Ethical hacking is not done to steal information or exploit it unlike hacking. This way the possible loopholes in the system can be effectively plugged. With the growth of computer storage and information sharing systems vulnerability of these increased almost simultaneously. Computer Scientists in the year 1993 openly declared that the techniques of the hacker could be employed for the smooth functioning of organizations and fortify the security measures of a system.

Conclusion: The research paper concludes on a note that good auditing and consideration of security measures from time to time and vigilance intrusion detecting and good systems administration can be very effective ways of securing and fortifying the company’s network.

Download Ethical Hacking Computer Science Technical Paper Presentation.

Distributed Packet Switching for LAN Ethernet Seminar Report

Description: The research paper Distributed Packet Switching for LAN Ethernet Seminar Report speaks on Distributed packet Switching for Local Area Network (LAN).The research paper suggests that Ethernet is a contention media access method that allows all the hosts of a network share a link in a secure way. Ethernet has gained popularity because of its relatively easier integration into an existing system. Fast Ethernet and Gigabit Ethernet are comparatively more popular versions. The Carrier Sense Multiple Access with Collision Detect (CSMA/CD) allows sharing of bandwidth evenly without having to share with any other device. Such a thing has been designed to avoid collision when data is shared among various end users or nodes. CSMA/CD allows a secure transmission. Bridges and routers prevent effective transmission being carried out through the entire network.

How does CSMA/CD Protocol Work: Whenever there is a transmission process the host checks whether there is any blockage in the pathway? If there isn’t any the host goes about transmitting. The process doesn’t end here, the protocol keeps tracking if there is any transmission simultaneously from another host. If there is any interruption like that the protocol blocks it to facilitate smooth transmission once again. If there are multiple signals then also the protocol blocks. The hosts have to wait for the transmission, but until then there would be a timeout.

Full-duplex Ethernet can be used in three situations: With a connection from a switch to a host, with a connection from a switch to a switch, with a connection from a host to a host using a crossover cable.

Conclusion: Thus Ethernet plays a very effective role in secure transmission. It doesn’t allow multiple transmission and blocks interrupting transmissions until there’s a time out.

Download Distributed Packet Switching for LAN Ethernet Seminar Report.

Automation of Cars- Embedded Systems Seminar For Electronics Students

Automation of Cars Description:

The research paper Automation of Cars- Embedded Systems Seminar For Electronics Students speaks about Automation of cars using the embedded systems. The research paper first and foremost explains what an embedded system is. It suggests that embedded as the name itself suggests is the integration of computing elements into modern electronic gadgets and machines. It is a way to make the machines think and work intelligently.

Automation of Cars- Embedded Systems Seminar For Electronics Students

It is also about integrating various functions into a stereotype machine. Embedded system is a PC in a fridge, a car or a door or for that matter any other instrument with an enhance and intelligent communication behavior. AN embedded system is a PC that is ‘function-specific’ and that cannot take up all the additional works of a computer.

Autonomous vehicle or an intelligent car, a car that thinks has been a dream project of scientists since times immemorial. With embedded systems now catching up like wild fire the dream is now almost attainable. The research envisages an automated car by virtue of embedded systems that can zoom past the bridges, tunnels, bazaars, and many more places without going against the traffic rules at least once.

All the driver needs to do is sit in an Automation of Cars that is thoroughly and perfectly programmed to carry him/her to his/her destination. The car could be user specific too. The car would just start when the driver touches the steering with his finger. The finger print recognition which is a breakthrough is definitely a means of securing the car and protecting it against the predating car thieves.

An automated car like this would run without any human intervention, Mobile operated car is one fine example to get idea about car automation in present embedded system technology. The Geo positioning satellite (GPS) will give the car necessary information geography per second.

Conclusion of Automation of Cars:

The research paper suggests that the autonomous car is no more a distant dream and it is a reality. Technology should aim at designing more and more of such cars that will drastically cut short the rate of accidents across the world. What else these Automation of Cars are more disciplined too.

Download Automation of Cars- Embedded Systems Seminar For Electronics Students.

Embedded System Design and Challenges

Description: The research paper Embedded System Design and Challenges talks about the inherent difficulties that prevent effective design of embedded systems. It talks about the challenges faced by the domain and means of overcoming them. The complexity of the machine and the required chip design and the ever widening gap between the two is one potential reason for the design dysfunction of embedded systems. To reduce this gap in design productivity a number of propositions have been made in high-level modeling and validation.

Particularly advances have been made in ‘Abstraction and Reuse ` and ‘Structured design methods `. Structured design methods are Component-Based Design and Platform Based Design. There are many trends for design embedded system. Out of that highly programmed platform and UML for embedded software development are recent one. In unified embedded system development methodology, these two can be combined. Though these two concepts are powerful in their own right, their combination magnifies the effective gain in productivity and implementation.

The primary challenge of embedded systems is that it has to bring in the functionality of all the processes over a single chip. This is called System on Chip; only then this will be embedded in a hardware component facilitating a specific function of the electronic gadget or instrument. SOC consist of a range of building blocks from processors, memory, to communication and networking elements. There may be top down or bottom up approach to building an application in SOC.

Conclusion: Component Composition Framework is an exciting breakthrough that to a very great extent answers the challenges posed by embedded systems. The research paper also talks about the BALBOA Frameworks. Besides these there are many other technical challenges that need to be addressed. For example the research paper talks about reusing the SOC components. A successful installation of CCF will certainly consider better performance of SOCs in coming generations.

Download Embedded System Design and Challenges.