Symbian Operating System Seminars For CSE Students

Symbian Operating System Seminars For CSE Students: Symbian is a mobile operating system (OS) which is targeted at cellular mobile phones and provides a high-level of integration with personal information management (PIM) functionality and communication. The Symbian OS is open for third-party development by enterprise IT departments, independent software vendors, network operators, and Symbian OS licensees.

This OS is licensed by world’s mobile phone manufacturers BenQ, Fujitsu, Arima, Lenovo, LG Electronics, Panasonic, Samsung Mitsubishi, Motorola, Nokia, and Sony Ericsson. It is the leading OS on Smart cellular phones.

Symbian OS has three design rules. They are the integrity and security of user data is   paramount, user time must not be wasted, and all resources are scarce. This OS has a microkernel architecture that means minimum usage is within the kernel to improve availability, robustness, and responsiveness. It consists of a memory management, scheduler, and device drivers.

It is to ensure that Symbian OS is adopted as the operating system by its customers for the development of lower cost and higher volume, advanced and data-enabled phones which are known as smartphones.

Symbinan OS is an open standard operating system for data-enabled mobile phones (smartphones) from Symbian Ltd. It supports PC synchronization, Java, GPRS packet-switched data, and Bluetooth local wireless access. The first phone which used Symbian OS was the Nokia 9210 Communicator in 2001.

It is written in C++ and therefore considered as its primary programming language. C++ provides the highest access to the Symbian OS. Symbian is a software licensing company which supplies and develops the open, advanced, standard operating system for data-enabled mobile phones.

Conclusion:

Today’s modern smart mobile phones are available as small sized/handy on optimized memory usage, extensible new software, minimal battery use, affordable, and many form factors. Symbian OS hence offers a user friendly platform which is easy to build applications and makes a large developer community.

Download Symbian Operating System Seminars For CSE Students.

Storage Area Network SAN Paper Presentation for CSE

Storage Area Network SAN Paper Presentation for CSE: Data perceived today is the key for various organizations like stock exchange, banking, government record etc. It is an explosive demand for data storage and this demand is addressed by deploying SAN. The activity of sharing a single large storage device over many applications has made SAN an attractive application in today’s market.

In today’s computing network, data theft, fraud, hacker attempts, and human error exchange across the public networks like internet. Data storage networking venders are rapidly deploying and developing security frameworks for protection of data stored. It helps to ensure safe and reliable data processing over a storage area networks (SAN).

One thing to remember about SAN security is that SAN is a vulnerable network to the sorts of vulnerabilities. SAN resources are protected by physical security and the hosts should meet stringent security requirements.

Storage area network is a dedicated centrally managed infrastructure. It enables interconnection of server and data storage system. Basically, it is a high speed network behind LAN/WAN networks. It is optimized for data I/O operation and storage management. It facilitates sharing of resources, universal access, supports unpredictable information technology growth, improves information protection, provides affordable 24 x 365   availability, and disaster tolerance.

SAN removes data traffic during backup process which increases network performance. It improves data access that provides high speed network communications. It helps to centralize management of system and consolidate backups, increasing overall system efficiency. It is added to the network with minimal disruption.

SAN is broadly classified into three layers. They are Host Bus Adaptors, SAN Network, and Storage Devices. SAN Management is a combination of two managements, Storage Management and Network Management.

Conclusion:

SAN is a data centric network. It is deployed over networks and devices for data management and enterprise growth where data security is of main concern. The storage networking association has built a working area and will come out with specifications and standard recommendations.

Download Storage Area Network SAN Paper Presentation for CSE.

Steganography Student Seminars

Steganography Student Seminars: Steganography is an art and science of hiding information by embedding messages within an object. It is seemingly harmless messages. It is useful in various areas like personal, military, diplomatic, and intellectual property applications. Steganography is the term which is applied to much number of processes which will hide a message within an object. The hidden message is not visible to an observer.

Steganography is an art with which writing is hidden with the help of recovery by the minds of men. Though people have hidden secrets throughout the ages, the recent development in technology and computational power has propelled to today’s security techniques. Steganography literally means hidden writing or covered writing that is writing is known to casual observer.

Steganography solves this problem by hiding the sensitive and secret information in a harmless file called carrier file. Steganographic software allows information which is hidden in graphics such as sound files. By this technology, data can be hidden in a normal picture without altering its appearance or size. The hidden messages do not need to be encrypted and it can be plain like everyday English.

Steganography has two types. They are Fragile and Robust. Fragile steganography is embedding of information into a file, which is destroyed if the file is altered or modified. Robust marking aims to embed information into a file, which cannot be destroyed easily.

An attempt to detect the use of steganography is called Steganalysis. It is the task of detecting and disabling steganographic information. It can be either passive or active.

Conclusion:

Steganography is a dynamic tool and capability to adapt new technology. It has its own position in computer data security. One can deduce that usage of steganography is growing with the amount of commercial tools present today. Steganography is another tool to hide data. Hiding a message decreases the message detection with steganography methods.

Download Steganography Student Seminars.

Video Fingerprinting and Encryption Principles MCA Final Seminar

This paper Video Fingerprinting and Encryption Principles MCA Final Seminar shows a tutorial of video scrambling algorithms and digital fingerprinting based on partial encryption. So we focus on the problems of encryption and video fingerprinting.

In constrained communication applications, multimedia security algorithms enable digital rights management (DRM). We focus on the video-on-demand (VoD) business model where subscribers request and receive video information to service provider at scheduled intervals. In a DRM context, the primary objective of fingerprinting and encryption is to protect video content from various attacks made by one or more attackers.

Overall, this article is based on two folds.  First one is to present a tutorial of the emerging areas of video fingerprinting, state-of-the-art review, and encryption highlighting design challenges for multicast environments. The second one is to propose the approach of joint fingerprinting and decryption (JFD) to establish a compromise between practicality and security for DRM applications.

Consider a single transmitter, which can be a VoD server to refer to source or server that communicates with any number of receivers that we call users. In every situation, the source should be responsible for embedding the global group watermark which may contain copyright and ownership information.

Using secret key cryptography, it is also responsible for encrypting the media content which is common for all users. The use of a group key for encryption enables multicast communications but needs more sophisticated key management. Fingerprinting can be done either at the transmitter or receiver and separate or integrated with the cryptographic process.

Conclusion:

This document provides an overview of various issues that should be addressed for video encryption and fingerprinting in a DRM context. By giving the thrust toward security, a solution is needed that give a better compromise between security and complexity. Low-complexity security solutions should take careful account of the application, dependent restrictions and competing objectives.

Download Video Fingerprinting and Encryption Principles MCA Final Year Seminar.

Parallel Data Mining Of Association Rules BE Seminar

The objective of this Parallel Data Mining Of Association Rules BE Seminar is to generate association rules. This document cover problem of parallel mining of association rules on distributed memory multiprocessor machine. Parallel mining of association rules describe a spectrum of trade-off between memory usage, communication, computation, synchronization and use of problem specific information. “Apriori” parallel algorithm is implemented by which performance is measured and shows a good speed up behavior when compared to sequential implementation.

The growth of scientific, business, and government databases sizes has outpaced our ability to interpret and digest the stored data. This is a need for new generation tools and techniques for automated and intelligent database analysis. These generated tools and techniques are the subjects of data mining.

Data Mining is the process of analyzing data and summarizing into useful information from different perspectives. This Information is used to increase revenue and cut the costs or both. This mining software is used to analyze data, which is one of the best analytical tools.

The primary goal of Data Mining is to obtain knowledge that a user can act on and it is done by building a model of real world from a variety of sources, which include customer’s history, corporate transactions, customer demographic information, and relevant external database.

The major goals of Data Mining are Prediction and Description. Prediction involves usage of fields of the database to predict the unknown values of the variables of interest. Description focuses on finding human-interpretable patterns that describes the data.

The Data Mining approach is generally categorized into six-types. They are Classification, Regression, Time Series, Clustering, Association Rules and Sequence Discovery.

Conclusion:

Implementation of the Apriori Algorithm for Mining of Association rules, it is difficult to carry large amount of data for greater accuracy in a given amount of time. Size up provides sub linear performance as the numbers of transactions are more. It has good speed up performance.

Download Parallel Data Mining Of Association Rules BE / B Tech Seminar.

Spatial Information System for Emergency Btech Seminar

This Spatial Information System for Emergency Btech Seminar describes a method for various Medicare services available. Location Based Services (LBS) is applications which react to the geographical triggers. A geographical trigger may be in the form of any signal produced by a device in regards to any change in physical environment.

The Global Positioning System (GPS) is the device used to place the geographical co-ordinates. The Geographical Information System (GIS) has ability to integrate spatial co-ordinates with non-spatial attributes.

There are many major metropolitan cities in India having a high population density and its suburban limits are increasing day by day. Though many medical services offered in the metropolitans, most of the people are unaware of its facilities. This is inappropriate in times of emergency.

The main issue is to meet the user’s query on the system and this is done by user friendly interface from the Geo database. The Geo database is created by gathering details of all hospitals and clinics in particular places with the help of a GPS device.

The scope of the work of GIS is to organize an emergency management tool on emergency services through mobile network. It provides details about the facilities present in the hospitals and clinics in the city.

The aim of the project is utilization of GI S and GPS to provide quick response to the request from mobile phones/internet through spatial and non -spatial query processing for emergency medical services, to develop a road network and emergency service, and to develop a semi-automated system for emergency management of metropolitan cities.

The GIS application can be developed in the following ways: Database Designing, Data Collection, Interface Designing, Building Road Networks, Vectorization, Shortest Path Routing, and Quickest Path Routing.

Conclusion:

The main application is developed that it must be a user friendly and easily accessible by the layman. The interface provides details of hospitals, departments, facilities, and the       routes from locations to the hospital.

Download Spatial Information System for Emergency Btech Seminar.

Spam Liquidator CSE Technical Topic

This PowerPoint presentation Spam Liquidator CSE Technical Topic shows the execution of Spam liquidator configuration which includes many categories. With this configuration, the user can login with his host, port number, user ID, and password. In Spam Liquidator, the core of the decision making is called a Filter. A filter decides whether the message must be downloaded or not.

Tool of blocking the junk mail is called spam liquidator(SL). To implement Spam Liquidator, we need Operating System, Mail Server, and Mail Client. Core of the project includes Filters, Definition, Types, Subject Mail Filter, Sender Mail Filter, Recipient Mail Filter, Size Mail Filter, and Null Mail Filter.

There are two kinds of filters one is global and other is local. Local filters are related to a maildrop whereas global filters are associated to all maildrops. A filter has a single job to decide whether to download a single message or not. The real decision is made with a sequence of filters. There can be a global filters as per maildrop one.

Spam Liquidator is a tool to remove unwanted mails and it is a user friendly. The optimum utilization of this tool is possible. All basic filters are provided. It reduces the work of user interaction. The wastage of time is reduced. It helps in optimum distribution of funds among users. It is more flexible.

Spam Liquidator is proposed to be developed with WINDOWS-2000 Server as the operating system and Java Mail API of J2EE Technologies.

Conclusion:

In an organization, each employee has a mailbox and any one can send any number of mails to this mailbox. Sometimes, we suffer from lengthy mails, spam mails which need all the memory allotted for the mail box, and so on. These types of mails are controlled by our company administrator since he is responsible to control all mailboxes. Here those constraints are our filters.

Download Spam Liquidator CSE Technical Topic.

SOS Transmission Through Cellular phones to save Accident Victims Seminar

This document SOS Transmission Through Cellular phones to save Accident Victims Seminar describes about an original concept to help users of cellular phone met in an accident. This idea has been developed with considerations of cost and compatibility with this system. The Short Message Service or SMS which is popularly referred is made use of for this purpose.

The Force-Transducer method is the solution offered to detect the victim automatically who is assumed to be unconscious. Based on data collected, the threshold level is set with the experiments.

In this design, a major problem is the technique to detect the victim’s position. The Global Positioning System (GPS) is considered costly so, an unorthodox design is described using Radio Direction Finders (RDF) and beacon signals. The Goniometer or Crossed Loop Antenna is needed for this purpose which reduces cost effectively.

This article proceeds to suggest a view of the robot required to do the Save Our Souls (SOS) message routing task. It has a special hierarchical message dispatch system by which people who are nearby, likely to help, are contacted. This software robot also acts as a proxy to the victim that monitors responses for him.

It provides a cost-effective, high performance system introduced in the market if cellular companies would encourage it. Cellular phones are becoming a menace on the road. It is a major problem for the cellular phone manufacturers. It is a cost-effective foolproof solution.

Conclusion:

In case of four wheelers, the system requires the user should connect the transducer to the vehicle. The system deals with a question of life or death is more important so this seem as if taking choice from the user. The system requires detailed surveying to decode the location of a user in polar coordinates to actual position however; it is a one time job. This system does not handle multiple victims at a time so priority is allocated to users depending on the force measured.

Download SOS Transmission Through Cellular phones to save Accident Victims Seminar.

Software Testing Technical White Paper

Software Testing Technical White Paper: The main goal of Testing is to create robust application which works according to specifications. Testing has no impact on quality of software. It gives much realistic predictions in project completion. It can update code after alterations have been made.

For representing a model, FURPS is an acronym for classifying software quality attributes. FURPS is expressed in expanded form as Functionality, Usability,     Reliability, Performance, and Supportability. FURPS are important for making the tests limited and must be a part of project documentation.

There are various software tests such a Unit tests, Business logic, GUI, Web, security, load, and deploy scenarios. Unit test is implemented by developer to validate the work. Business logic test is difficult to test and usually implemented by customer before takeover. GUI is very difficult to identify the user interaction and program flow. Web test is number of requests made in predefined order. Security is implemented in design time. Load test is to mention minimum hardware requirement and must also specify bottle necks. Deploy scenarios will enable support team to confront difficulties before end user does.

There are two basic types of tests, one is Positive (easy) which validate the function and another one is Negative (difficult) which does error handling of function. It gives robustness to application program.

The requirements of tests are clean environment, Specifications, scenarios, manuals, code comments, Test data (quantity and contents), and Limits.

Conclusion:

Software Testing needs a lot of bug. Testing is one of the ways that are derived as a cost center on a project and a struggle is done to justify testing cost. Testing should not be an excuse to write poor code for programmers. It extends development time and shortens support time. The test accomplished extends the time to complete the project but reduces money costs. It allows predict and solve problems.

Download Software Testing Technical White Paper.

Software Project Requirements Documentation

Software Project Requirements Documentation: The method of establishing the services required by customer from a system is nothing but Software Requirement and also, the constraints under which it is developed and operated. The descriptions of the system services are the requirements and constraints which are generated during the requirements engineering process.

When a company leads a contract for a software project then it should mention its needs in an abstract method that a solution is not pre-defined. The requirements should be written such that many contractors should be able to bid for the offering, contract, different methods of interacting with the client needs. This method may be called requirements for the system.

It may vary from a high-level abstract statement of a system constraint to a complete mathematical functional specification. This is inevitable because requirements may provide a dual function. It should be open to interpretation. It must be defined in detail. Combining these statements is called requirements.

There are two kinds of requirements. They are User requirements and System requirements. User requirement is statements in natural language and diagrams of the services and its operational constraints. It is written for customers. A detailed description of the system’s functions, services, and operational constraints is system requirement. It defines what must be implemented between client and contractor.

Conclusion:

Requirement is set out in such a way that the system should define and do constraints on its implementation and operation. The set out services provided by the system is Functional requirements. The system being developed or development process is constrained by Non-functional requirements. User requirements are high-level statements which are used by system. It should be written with natural language, tables and diagrams. System requirements are used to communicate the functions provided by the system. A software requirements document is an agreed statement of the system requirements.

Download Software Project Requirements Documentation