Intelligent Web Search Agent PPT

Intelligent Web Search Agent Paper Presentation:

The paper is about web search agent. In general a web search engine is used in order for searching the relevant information. The users will type their query in search engine for extracting the related information. 

For serving the users, web search engine makes use of automated software concept called spider. This spider is responsible for going in to web and trace the contents of the server and indexes all the documents. The storage of the data in different databases is maintained services such as Alta Vista. They are responsible for breaking the huge indexes that are currently available on the web.

There could be lot of issues when we are finding the relevant information according to the users need and also can result in overload of data when a huge data is returned from the results of search. I.e. while searching information on Alta Vista can give a number of hits where the most of the hits may not be related to the user posted query.  The huge size and coverage of the database can be difficult while searching for the relevant information.

In order to provide a solution to the above problem intelligent searching agents were developed. For its implementation uses the spider technology in a number of new ways. Generally the tools are the spiders which are being trained by the user for searching the web for information resources.  The agent can be personalized by its owner in such a way that it is built by considering likes, dislikes. And also the agent can be autonomous such that he is capable of making judgement for search on related information.

As the feature of the agent the users has capability of reviewing the search results and also reject information sources which are not relevant to him. Similarly over a certain period of time an agent is responsible for building a picture of all users information needs.

Download  Intelligent Web Search Agent PPT.

Semantic Web And Ontologies Paper Presentation for CSE Final Year Students

Introduction to Semantic Web And Ontologies Paper Presentation:

The ontology concept was used in the field of both computers and medicine.Ontology is a specification of a Conceptualization and is the basic structure. There are various tools used for developing ontology.

SEMANTIC WEB:

It is also called as mesh of information that can be easily processed by machines. The data can be represented worldwide in efficient way. The Semantic Web facilitates common framework that allows data to be reusable and shared across application, enterprise, and reused over community.Semantic Web was invented by Tim Berners’s Lee. The system has been developed on the basis of layered architecture.

  Trust  
  Logic And Proof  
  Ontology  
RDF Schema  
RDF  
XML Schema  
XML  
Unicode And URI
                 

 

Unicode and URI:

Unicode and URI are used for the purpose of computer character identification and standard identifying on locating resources. These provide the base line for languages used in web development world-wide.

XML:  The meaning of the data that is communicated through web is designed by XML. It standards are Namespaces and Schemas.

Resource Description Framework: It is first layer of the Web scheme. The relationships are identified using RDF.

Ontologies: This provides more complex constraints.

Logic and Proof: Deduction of resources is made according to the satisfaction.

Trust: It provides trust for the semantic-web. The quality assurance is made.

ONTOLOGY:

The vocabulary for sharing the information about specific domain is called ontology. The concepts of domain are well understood. Basic building blocks of ontology are as follows

  1.   classes or concepts
  2.   properties of each concept describing various features and attributes of the concept
  3.  restrictions on slots  
  4. Ontology is integral part of semantic web.

Basic Steps for Building Ontology:

i. Determine Scope
ii. Consider Reuse
iii. Enumerate Terms
iv. Define Taxonomy
v. Define Properties
vi. Define Facts
vii. Define Instances
viii. Check for Anomalies

 

CONCLUSION: The database design is started with customer requirements indemnification. To identify the set of terms definitions, relationships, and constraints for that application domain are identified.

Download  Semantic Web And Ontologies Paper Presentation for CSE Final Year Students.

Security in Wireless Cellular Networks Computer Science Seminar Report for Final Year Students

Introduction to Security in Wireless Cellular Networks Computer Science Seminar Topic:

Use of the mobile devices has increased. The communication is based on voice over communication. By using the cell phones we can access internet, send text messages. For all this type communication security is very important. Based on the network speed and band width it is classified into three types.

  • GPRS
  • EDGE
  • 3G

Security Issues in Cellular Networks:

The infrastructure of Cellular Networks consists of multiple entities and very massive Limitations of Cellular Networks.

 Open Wireless Access Medium: Because of wireless communication we cannot stop an attacker from hacking.

 Limited Bandwidth: The band width is increasing depending on network but all have share this medium

 System Complexity: Adding of new security vulnerabilities can be introduced.

 Limited Power: They consume lot of battery power so its battery is limited.

Limited Processing Power: The process power is very limited.

Security Issues in Cellular Networks:

Authentication: Authentication necessary for all subscribers for right networking. Since the purpose of 3G technology is communicate from anywhere in the world.

Integrity: The data like SMS chats should not be modified.

Confidentiality:  Due to increased network communication security must be high

Viruses and Malware: The mobile devices should be protected from malware attacks.

Device Security: Security for the devices should be maintained to avoided unauthorized access.

Types of Attacks:

Denial of Service (DOS):  This can bring entire network structure down. These also results in the unable to access the network.

Distributed Denial Of Service (DDOS):  DOS must cannot be controlled from a single host. For this number host can be launched.

Channel Jamming: This is the one of the attack used by the hackers.

Unauthorized Access: If proper authentication is not present then hackers can easily attack network services.

Session Hijacking:  The communication session can be easily hijacked without proper security.

Download  Security in Wireless Cellular Networks Computer Science Seminar Report for Final Year Students.

Five Models of Symmetric Key Algorithm CSE Seminar Idea for Final Year Students

The abstract focuses on the five models of symmetric key algorithm. The cryptography is encapsulating the data with a security key for both encrypting and decrypting. First the plain text is converted in to cipher text by a key and it is send to the receiver side after that the receiver decrypts by the key which was sent by the sender.

Five Models:

Ø  Data Encryption Standard (DES)

  • Advanced Encryption Standard (AES)
  • International Data Encryption Algorithm (IDEA)
  • Blow Fish
  • CAST

Data Encryption Standard (DES):

DES is also called as digital standard encryption system. DES encrypts or Decrypts the data using 56-bit key. The 64-bit text is taken as input and 64-bit cipher text is produced as output. The algorithm uses both substations and permutations. The strengths of DES are

  • Triple DES
  • DESX

Advanced Encryption Standard (AES):

For the government application purpose the AES encryption standard system was invented. AES uses an SKC scheme called Rijndael. The key lengths are 128, 192, 256 bit encryptions.. The AES algorithm of 128-bit was approved by the NIST in 2001.

International Data Encryption Algorithm (IDEA):

IDEA is an method of encryption algorithm. It is a 64-bit block cipher text. It uses 128-bit key. The key length is very difficult to break the code. It is resistant to linear and differential analysis.

Blow Fish:

Blowfish is a algorithm  Which has high encryption standards? It over the weak points in the encrypting algorithms. Blowfish has block of 64-bit and a variable key length from between 32 to 4480 bits. It is considered to faster than DES.

CAST:

CAST full form is Carlisle Adams and Stafford Tavares. It uses 64-bit cipher encryption.CAST-128 is a DES-like Substitution-Permutation Network crypto system. It supports the length between 40 to 128 bits.

Download  Five Models of Symmetric Key Algorithm CSE Seminar Idea for Final Year Students.

Inplant Training on Latest Technologies for CSE Students

Introduction to Inplant Training on Latest Technologies:

The aim of this abstract is to give basic idea of current technologies to the students.

TOPICS COVERED:

  • JAVA

ORACLE

C AND C++

NETWORKING

.NET

LINUX 

JAVA: java is a platform independent language that works on any OS. Java follows top-down approach and uses objects. It is also called as object oriented programming language. Java is most widely used in developing web apps and JQUERY and mobile applications. It has features like data encapsulation, inheritance, polymorphism, abstraction. 

There are so many versions of JAVA like

.J2ee

.J2ME

.JEE

.REFELCTION API 

ORACLE: ORACLE is used as GUI application builder. With the oracle graphics, databases, and reports and forms can be created. In many companies oracle is used as data-base server. AS a web based server application its uses are:Simplified and productive development, Extreme performance and scalability, Unified management and monitoring,

C AND C++:-

A C program basically has the following form:

  • Preprocessor Commands
  • Type definitions
  • Function prototypes — declare function types and variables passed to function.
  • Variables
  • Functions

C is developed in bell laboratories at AT&T. it is invented by Dennis ritche. C language is used in many applications and after that bjarne staoustrup invented c++.

NETWORKING:

            Networking means interconnecting of two or more systems together by medium like optical fiber. There are so many networks based on its quality bandwidth and speed. The network is built with software and hardware combinations. Some of them are

  PROTOCALS

  IP ADDRESS

 HUBS,SWITCH,ROUTER

  FIREWALL

.NET:

The .net framework is a software frame work that runs on many windows based OS. It supports many programming libraries. >NET frame work executes in software environment in runtime.

LINUX:

LINUX is developed by AT&T it is multasking OS. It is very simple to use .UNIX is written completely in c language later it was modified. UNIX is also called LINUX. 

DIFFERENT TYPES of UNIX: 

AIX (for IBM machines)

HP-UX (for HP machines)

OSF/1

Sun Solaris (for Sun Spark machines)

 SCO UNIX

LINUX

Download  Inplant Training on Latest Technologies for CSE Students.

DES Algorithm CSE Seminar Idea for Final Year CSE Students

Introduction to DES Algorithm CSE Seminar Idea:

The abbreviation for DES is Data Encryption Standard. This is the most widely used encryption algorithm. This DES algorithm is most successful algorithm for encrypting the data by a 220,000$ machine this DES encrypting algorithm was cracked. Up to that it was used by the government for security purpose. The government is lived on the banking system for years and after that Triple-DES technique was used.

There are various steps involved in the DES encryption algorithm. Since the design of this DES encryption algorithm many encryption algorithms emerged out. This algorithm works on the binary data. The group of numbers makes a base 16 number. The DES algorithm works on basis of 64 bit messages. Which is equal to 16 hex decimal numbers? In this algorithm every 8th key bit is ignored. The effective key size is 56.

How DES Works in Detail:

DES converts the plain text into block of cipher text. It per mutate 2^64 that means 64th power of 2. Each 64 bits is divided into 32 bits a right half block and left half block.

Let M be the plain text message M = 0123456789ABCDEF, where M is in hexadecimal (base 16) format. Rewriting M in binary format, we get the 64-bit block of text:

M = 0000 0001 0010 0011 0100 0101 0110 0111 1000 1001 1010 1011 1100 1101 1110 1111
L = 0000 0001 0010 0011 0100 0101 0110 0111
R = 1000 1001 1010 1011 1100 1101 1110 1111

The first bit of M is “0”. The last bit is “1”. We read from left to right.

The keys are stored using 64-bits long. But whenever the sub keys are created the eight bit is created. The mode of encryption mode used is Electronic code book method. The other two modes are cipher feed back.

Download  DES Algorithm CSE Seminar Idea for Final Year CSE Students.

Main approaches of Steganography Thesis for CSE Final Year Students

The new steganography technique is based on the dividing the image into number of layers. According to this technique the host image is divided into number of blocks and the secret data is inserted in to the image by the binary representation of pixel values. The system performs the scan of rows and columns of each pixel by pixel finding most similar column location and differences from secret bit message location and the data will be modified by minimal number of LSB blocks. In different experiments the messages are embed into theimage. The stegnalaysis is evaluated through distorted pixels representation.

Approaches in Steganography:

Substitution Technique.

2. Transform Domain Technique.

3. Spread Spectrum Technique.

4. Statistical Techniques.

5. Distortion Techniques.

6. Cover Generation Technique.

7. LSB: Changing the least significant bit of each image, to match that    of the message being steganised.

8. Pseudo random (Patchwork)

The steganography is a process of hiding the important messages in the form invisible or covered form. Steganography was invented to hide secret message in olden days by messengers for communication between the Kingdoms. They used some fruit juice for writing messages and they are visible only under fire. Some of them used wax covering on letters engraved on wood. But in this new generation to avoid the piracy of digital media and for sending important messages the process is being used. The approaches defined above are some of the steganography techniques.

The images are hidden in other images by hiding the adjacent pixels. Due to increasing in piracy the steganography is most widely used in many fields. Depending on the steganography technique used the digital media is that much safer only the decrypting known person can only decrypt the original image normal humans cannot find the original image unless they know the technique.

Download  Main approaches of Steganography Thesis for CSE Final Year Students.

Chaotic Algorithm for Image Encryption CSE Seminar Report

The algorithm was developed by Henon chaotic for the purpose secure image transfer. The image is encrypted by this algorithm cannot be known until the decrypting process is known. The algorithm encrypts the image by pixel substation of adjacent pixels.

Present

Theory:

For the purpose of digital security cryptography was invented.  It stores the messages by encrypting them. DES is the cryptography algorithm it uses 56 Bits and 16 iteration and the resultant block size is 64 bits. There are so many disadvantages in this technique it takes lot of processing time and also it cannot encrypt large text and image files effectively. This technique also decrypted by Brute-Force attack and proven to be inefficient.

Overcome:

The chaotic algorithm uses a special technique that shuffles the image pixels. This algorithm derived a fast and secure method for encryption of images. It is found to be one of the best encryption algorithms.

Advantages:

  • This algorithm provides efficient way for image encryption.
  • Provides security for image transmission.

Disadvantages:

  • Network speed is low then it won’t work out.
  • Consumes lot of time depending on file size.

Proposed System:

The encryption algorithm proceeds in two steps one is fusion is completed between the key image and source image. Pixel values of fusion image are encrypted according to chaotic algorithm.

Image fusion:

In image fusion graphic technique was used. Image fusion technique can be used for same size of images.

E(i,j)=w*(K(i,j)-O(i,j))+O(i,j) 

 0<=w<=1 

wis parameter, K(i, j) is the pixel values of the key-image ,O(i, j) is the pixel values of the original-image, and E(i, j) is the pixel values of the fusion-image.

Encryption by Henon chaotic:

                                                              It was first discovered in 1978 by henon chaotic 

xi+1=1-axi2+yi

Yi+1=bxi, i=0, 1, 2…n

Conclusion:

The algorithm is useful for secure image transfer and confidential images transfer purpose.

Download  Chaotic Algorithm for Image Encryption CSE Seminar Report.

Technical Seminar Report on Wireless Intelligent Network

Introduction to Technical Seminar Topic on Wireless Intelligent Network:

It is the wireless network developed by the standard committee of telecommunication industry. It used advanced technology for the intelligent network. The main aim of such network is to deploy the new service in to present technology, attract telecom vendors, develop mobile network that can overcome the limitation of the wired applications. Now operators can customized there service as they want and can attract more and more clients to it network. There are many changes that have taken place in the networks.

POTS: this service was used in the late 1960s.

SPC:it was updating of POTS. It uses switching systems that are programmable and the logic used is hard wired.

CCSN: it was used in the 1970s.  They use packets links and packet data for signaling the data.

CCS: it introduced the trunks between the switching systems and caller ID that is the information of the client.

This service is also known as 800 services which always offer new service to be added. It is based on the IP, SCP or SN.

WIN services:

–          Automatic time and bill management.

–          Routing of calls

–          Call tracing if necessary

–          Identification of client and processing incoming and outgoing calls.

–          Voice controlling, also includes hot line.

Functions: ACF: it provide authentication to the data service and service logic. CCF: it provides switching capabilities that consist of incoming and outgoing calls. LRFV: it provides mobility to the uses and manages the service logic functions. MACF:it stores the data of the subscribers that user the services.

This is the intelligent network that uses switching technique. It uses resources nicely and provides best services like text- to- speech conversion and speech recognition. Services are deployed very fast.

Download  Technical Seminar Report on Wireless Intelligent Network.

Research Paper for CSE Students on Wi-Fi Technology

It is the wireless network that is fast and reliable and can be used from any place like from home or school or college or from hotel room anywhere. You just need aWi-Fi installed computer or laptop or mobiles. You must use certifies Wi-Fi in your computer.

Wi-Fi is also known as 802.11 as it is developed by IEEE. It can work on two modes ad hoc and infrastructure. In ad hoc different computers are connected to form the network and they are fixed. Ever node can communicate to the rest of the nodes. Or you can say that it peer to peer connection. This network is used for small area like you are in meeting then you can create this network. Infrastructure mode used RF enabled node. It this you can use mobiles node to connect with the different access points. You can freely with your mobile devices in the network area. Usually Wi-Fi uses 2.4 GHz of frequency.

To have Wi-Fi connection use need and station that provide network to the area and create access point for the connection. An AP might one interface that in necessary for the connection and the STA. Bridging software that work between the user and servers. This network similar to the mobile network, antenna is required to send the radio signals and many ports are defined for the connections. Port is used to connect point to point with the device.Network has multiple ports and multiple devices can be connected together.

They radio waves that are fast and low power consumption’s  This connection is not end to end secure they just secure their wireless network from outside interference or unwanted users. For that they use PIN number or password in access points.

Download  Research Paper for CSE Students on Wi-Fi Technology.