Technical Seminar Topic on Unix Networking Programming using C

Introduction to Technical Seminar Topic on Unix Networking Programming using C:

UNIX is arrived earlier than Dos & Windows it is stay reverse behind as much as necessary to offer us the Internet, it achieve extraordinary task with a little key strokes. The features of UNIX are Multi-user system, Multi-tasking system, sample matching, system calls libraries and certification In Unix an IPC( Inter process communication) is happen this will helps in the communication among two procedure, they are in Single system and dissimilar system. In Inter Process communication we have dissimilar methods they are Pipes, FIFO (First in First out named pipes), Message queue, Semaphores and shared memory.

           Files are mostly used in the UNIX, Files are developed at a time and it can enter the resource at a moment, file is just a single line containing the sequence amount in ASCII, there are three steps to assign the numbers in sequence they are, It reads a sequence number file and it use the digit and It increments the number and writes it back.

Pipe the method of Inter Process Communication, Pipe is known as the flow of data in single direction, Pipes are work in a different ways of developments they are , Single Process, among two process and Three process in a shell pipe line. Shared memory is the greatest structure of Inter Process Communication that accessible in shared memory the data will be read by the server through input file and this data will be printed as message by the server.

The client will read the data which is send by the server from the Inter Process Communication Channel and that data will be copied from the Clients buffer, the server gets access to shared memory object by using the method called semaphores, the server reads  the data from the input file into the shared memory object. When the data understanding is finished the server notify the user by Semaphores. UNIX requires a dissimilar type of commitment to understand the subject.

Download  Technical Seminar Topic on Unix Networking Programming using C.

Artificial Intelligence Methods in Virus Detection and Recognition Latest CSE Seminar Topic

Introduction to Artificial Intelligence Methods in Virus Detection and Recognition Seminar Topic:

The word MALWARE id derived from Malicious Software, this software is planned to gain access or damage a computer system with no the owner’s well-versed permission. Here we know how to distinguish relatively few malicious software types, it is important to be aware that though all of them are parallel purpose, each performs in a unlike method similar to Viruses, Worms, Trojan horses, etc…Due to dissimilar performance, each malware group uses the alternative behavior of being undetected. These services anti-virus software procedures to develop various solutions and counter measures for computer security.

This management focuses on methods used especially for virus finding, to understand how virus are detect and recognized this are divided into many ways they are Nonresident viruses, Resident virus

Meta heuristic is a technique for solving a general class of computer troubles by combining user given black-box procedures in confidently capable way. Heuristic is a method to help in solving the trouble in a simple method, it is mostly used to elevated speed arrive a solution. General meta heuristic is an significant to memorize that Meta heuristic are worn only for thoughts to solve difficulty not a correct way to perform that trouble .For virus detection or reorganization there is main Meta heuristic is used they are Pattern matching, automatic learning, etc…

There are some disadvantage in specific detections methods like signatures scanning become very capable method of detecting knows pressure, finding specific signatures in code allows scanner to recognize, every virus which signature has been stored in built in database. For avoiding copied positives we have to take this measures that are, set proper scanning depth, Assume that the machine is not contaminated Combine scanning technique, perform scan as early as possible and making judgment after alarm require knowledge.

Download  Artificial Intelligence Methods in Virus Detection and Recognition Latest CSE Seminar Report.

CSE Thesis Submited by IIT Students on Creating Virtual Environment for Interactive Learning

Introduction to Creating Virtual Environment for Interactive Learning Thesis:

Now a day’s Internet was growing fastly and using the internet also increasing. While researching the distance education this internet played important role. By using the innovative uses of the internet in order to deliver the information regarding various learning environments which are running presently. In the internet Virtual classrooms, Virtual workshops and Virtual Universities are jumping up at different locations. The information can be delivered in the form two ways they are synchronous manner and asynchronous manner.

Based on the time gap involved between process of information sending by the instructor and this information is received by the learner. The information delivery in the asynchronous manner is the instructor sends the information at one point of time and the learner receives the data in another point of time. But in the synchronous manner both the sending and receiving the information can be done at same point. This work find out the issue of the synchronous delivery of information in the internet by observing the issues that arise there from finding the solution to those issues.

The main function of this project is to solve the problems from the asynchronous manner. So in order to solve those issues we are using the multimedia tools across the internet and this solution is used for the forward step for the various fields of continuing and distance education over the internet.

In order to increase the effectiveness of distance education using the internet by using the prototype software. It consists of two sets of interfaces to be used at the instructor side and learner side

The people proposed new technology called as “Virtual Lecture Hall” based on this concept in order to increase the effectiveness Distance learning education and solve the different issues generated from it.

Download  CSE Thesis Submited by IIT Students on Creating Virtual Environment for Interactive Learning.

Intelligent Web Search Agent Information Technology Seminar Presentation

Introduction to Intelligent Web Search Agent Seminar Presentation :

Now a day’s the internet has become as a giant supply of information. The difficulty is that searching the information that an individual desires is regularly small difficult, because of the complication in association and the amount of information stored. Information is stored in individually named files located within different named directories on a Website and these names identified by a sequence of four numbers or a matching representative name.

The number of directories and files is restricted only storage capacity and content availability. Finding the correct page and that containing the information that is required in one of those distinctively named files, via its Uniform Resource Locator. Luckily by using some search engines such as Alta Vista  Yahoo  Hot Bot and many others have made navigating the Web easier. The main part of a search engine is the search agent, it brings the information and placed it in the database. 

The main aim of this project is to launch the reader. To the fundamental elements of an clever agent, and then  apply those elements to a  search agent to supply the structure for the creation of a simple effective search agent. An general idea of characteristic synthetic effective search algorithms will be offered and presentation metrics will be discussed. This project presents a collection of ideas to assets that will confidently provide some imminent and foundation for further examination into the subject matter.

Many of the ideas offered are fairly sensitive and there are many sources obtain in the Internet that put the complete search agent system, design considerations, and other valuable resources. The cited sources in this project are by no means inclusive — readers are giving the confidence  to follow the Internet links to find out the more useful information and data

Download  Intelligent Web Search Agent Information Technology Seminar Presentation.

An over View on .NET Framework Technical Seminar Presentation

Introduction to An over View on .NET Framework Technical Seminar Presentation:

The platform for construction, deploying, and organization Web Services and applications is a Microsoft .NET Framework. It make available a highly fruitful, standards-based, multi-language environment for integrating presented investments with coming generation application and services as well as the quickness to get to the bottom of the challenges of deployment and process of Internet-scale applications. The .net framework mainly consists of two main parts The common language runtime, A hierarchical set of unified class libraries. the common language runtime and the hierarchical set of unified class libraries. The common language runtime is the invention of the .NET Framework.

We can illustrate about the runtime as an means that manages code at execution instance, on condition that core services such as memory management, thread management, and removing, while also implementing severe type security and other forms of code accuracy that promote security and sturdiness. The additional main component of the .NET Framework is a wide-ranging, object-oriented collection of reusable types that you can make use to build up applications.

The .NET Framework security system gives fine-grained, evidence-based control over what applications can and can’t do. When we downloaded .NET Framework application to a system, for instance, it will ask for a set of permissions. The runtime collects evidence about what an application are able and not able to do based on the following information: Who wrote the code, what the purpose of the code, where it is installed from, who is trying to run the code and finally whether it was signed with an Authenticode signature.

The .NET Framework shortens Windows software development. It provides developers with a particular approach to make together desktop applications and Web-based applications. The .NET Framework can also diminish conflicts among applications by serving incompatible software components coexist. Improved Reliability, Increased Performance, Developer Productivity, Powerful, Granular Security, Ease of Deployment, Supports for More Than 20 Programming Languages, Flexible Data Access are reasons for the users to use .net framework.

Download  An over View on .NET Framework Technical Seminar Presentation.

Technical Seminar Presentation on Mining Web Logs to Improve Website Organizations

Introduction to Technical Seminar Presentation on Mining Web Logs to Improve Website Organizations:

Now a day’s website users are enlarged. Increasing services to users for searching the pages in the website is too hard to manage. Users searching WebPages from different locations by using some algorithms it provide hyperlinks to access the WebPages from other locations. These Navigation links gives good result and increase the usage of website. The main goals of this project are to searching the estimated locations and reducing the number of directing links.

For searching the expected locations, here two models are used those are Visitor search patterns and recognizing the target pages. We use hash table concept for hoarding the locations. In this table dividing the weblog by visitor and sort the weblog file by visitor ID as primary key and time as secondary key, partitioning it based on the visitors ID and sorts each table separately,   scan the weblog and extract sequence of pages. For every guest and target page locate any anticipated locations for that page.

For decreasing the set of direction links three ways those are First Only, Reduce benefit, reduce time. First only algorithm count the hold for all the pages sort the pages by the maintaining and present all pages whose hold is better than or identical to S to the administrator. Advantage is estimated on fraction of people who give up on not finding a page.

Optimize time is group of pages that reduce the number of times the guest has to backtrack. For the future website are developed based on some higher technologies like ASP,PHP so these technologies gives some advantages like sitemap navigation and some rich controls for the WebPages. 

Download Technical Seminar Presentation on Mining Web Logs to Improve Website Organizations.

Computer Science Final Year Seminar on Staganography with Report

Introduction to Staganography Seminar Topic:

Cryptography is the process of transferring secret codes through a insecure channel and the secret codes are decoded at the receiver by using some decoder keys. By using this method we can transmit the secret message over the communication channel by embedded in the image or the video and audio files or in web pages. In this paper we will see how the secret message is encrypted in the method for decrypting the message ate the receiver.

Brief on cryptography:

In cryptography we use stenography method for transmitting secret messages over the communication channel. To encrypt the message into the carrier audio watermarking and finger printing methods are used. The sender embeds the hidden message into a graphic file and transmits to the receiver. The sender has to send the stegokey secretly along with the graphic file or he shout tell the decrypting method for reading the hidden message.

The receiver can extract the received message if there is stegokey. To make the encrypting of the message on the carrier in a effective manner data chunking method is used. To recombine the entire chunk files the file recombination method is used at the receiver. The stenography process is implemented in images, audio files and text messages. There are several methods to find the stenographic messages sent in the carrier files.

Certain stegokey algorithms are followed for decrypting the message in the carrier. We can even use other stenographic methods like null clipper method in which we encrypt the secret code in the first letter or last letter or in the sequence of each word. We can also use this method for hiding messages in web pages.

Conclusion:

Thus we can conclude that the stenography message actives are performed by illegal organizations. There are several color coding techniques available for decrypting the messages sent in the carrier files. Cryptography is used by intelligence organizations for making communication among them.

CSE Project Topic on Data Migration via Parallel Data Compression Method

Data migration technique is used in organizations when the systems are upgraded or a makeover is done. Data compression technique reduces the time taken for transferring the data the storage. This technique is used for transferring the data between two end systems bade on specified format. In this paper we will look into the migration types and various compression techniques followed for transferring the data.

Brief on data migration and data compression techniques:

We use certain simulation codes for transfer of the data and various parallel compression algorithms are used for sending the data in a specified format at particular bandwidths. . In application migration we use this technique where is the platform is changed and the data migrated supports each model in the new transformation. In data migration the transfer of data is checked in a parallel mechanism whether the data has reached correctly in the specified format in the end system.

We use ROMIO implementation which employs two phase input output method for transferring the data which is the best parallel mechanism technique used. The data compression we find lossless and lossy compression methods. In data compression technique snapshot is stored which is used for simulation of data of the image and to make future visualizations and analysis. If any crash occurs we can restore from the point where the crash occurred using a checkpoint. Based on the requirement we follow client side compression method or server side compression method for transferring the data between the end systems.

Applications and Advantages:

As the data is transferred in a parallel mechanism there are very less chances for errors to occur and it verifies whether the data has reached in a specified format or not. By using compression technique we can transfer huge data by compressing which saves the storage space and the increase the transfer rate. These are used when there is change of servers or transformation of applications and these are used in internet for processing data.

Download  CSE Project Topic on Data Migration via Parallel Data Compression Method .

Enhancing Data Migration Performance via Parallel Data Compression CSE Seminar Report

Introduction to Enhancing Data Migration Performance via Parallel Data Compression Seminar:

Data migration is the process of transferring data between two computer systems in a specified format. Data migration technique is used in organizations when the systems are upgraded or a makeover is done. Data compression technique reduces the time taken for transferring the data the storage. In this paper we will see how data migration technique works and the use of data compression technique for transferring the data.

Brief on data migration and data compression techniques:

Data migration technique is employed based on the migration purpose, in database migration when the server is updated there is need for transformation of data and this does not affect the behavior of the application. In application migration we use this technique where is the platform is changed and the data migrated supports each model in the new transformation. In data migration the transfer of data is checked in a parallel mechanism whether the data has reached correctly in the specified format in the end system.

We apply data compression techniques so that the data gets compressed and it can be transferred easily and requires less storage space. The data compression we find lossless and lossy compression methods. In data compression technique snapshot is stored which is used for simulation of data of the image and to make future visualizations and analysis. If any crash occurs we can restore from the point where the crash occurred using a checkpoint.

Applications and Advantages:

By using this technique we can transform huge data without any errors and it does not vary the behavior of the new application. By using compression technique we can transfer huge data by compressing which saves the storage space and the increase the transfer rate. These are used when there is change of servers or transformation of applications and these are used in internet for processing data.

Download  Enhancing Data Migration Performance via Parallel Data Compression CSE Seminar Report.

Technical Seminar Topic on Data Everywhere Dealing Data from Sensors Network with PPT

Introduction to Technical Seminar Topic on Data Everywhere Dealing Data from Sensors Network:

The paper is about dealing with the data and also in detail about sensor network. This includes the introduction, background, network aggregation, network storage the architecture of the sensor networks and much more.

We can define the sensor network as, continuous collection and also communication of the data string to the database. In real life the applications can be seen in tracking the phenomenon such as climate, which also includes finding the concentration of the contaminants, also the building structure including the response to the earthquakes.

The sensor network will operate as the black-boxes which are capable of recording the diagnostic data, also capable of the performing data, includes history of object which can be used in different vehicles, mobile phones and also computers.

The work done by the sensor network includes the gathering techniques of the data with the use of the various network primitives, also involves the data cleaning techniques and the methods followed are cleaning, also the querying of the noisy data, handles the incomplete data and also the sensors with errors.

The limitations include the usage of the battery with the limited life, also can create problem in case of the wide storage and when using the data handling algorithms with the high processing capacities. The limitations can also depend on the availability of the resources and packet loss in case of the data transmission.

The two phases involved in the data aggregation includes the distribution and collection phase. In the distribution phase, the query is distributed at each and every node in the network. In the collection phase, the parent is capable of collecting data at each and every child in specific intervals of time.

In this paper we have made a survey on the storage and also in gathering of the sensor data, various techniques in cleaning of the data, also the architecture of the sensor streams.

Download  Technical Seminar Topic on Data Everywhere Dealing Data from Sensors Network with PPT.