Developing a High Performance Cache System Paper Presentation

The research paper Developing a High Performance Cache System Paper Presentation describes the cache memory as a key mechanism in improving the overall performance of the system. The paper aims at developing a high performance cache system.

 What cache does: Cache exploits the reference stream of the typical application. The research paper describes how cache functions in a given locality. Two types of localities are discussed in the research paper

  1. Temporal locality
  2. Spatial locality

The research paper also talks about ‘prefetching mechanism’ that reduces cache misses. Hardware-based prefetching requires some modification to the cache, but almost no modification to the processor core. Its main advantage is that prefetches are handled dynamically at run time without compiler intervention. In contrast software-based approaches rely on compiler technology to perform static program analysis and to selectively insert prefetch instructions.

A SMI cache is constructed in three parts; a conventional direct mapped cache With a small block size, a fully associative buffer with a large block size at the same cache level, and a hardware prefetching unit. The improvement in performance is achieved by exploiting the basic characteristic of locality.

Benefits of cache: Common design objective for the cache are to improve utilization of the temporal and spatial locality inherent in applications. However no single cache organization exploit both temporal and spatial locality optimally because of their contradictory characteristics.

Conclusion:

The research paper basically aims at designing a simple but high performance cache system with low cost, a new caching mechanism for exploiting two types of locality effectively and adaptively is designed: A direct mapped cache with a small block size for exploiting temporal locality and a fully associative spatial buffer with a large block size for exploiting spatial buffer.

Download Developing a High Performance Cache System Paper Presentation.

Advanced Security Measures in a Wireless LAN Computer Seminar

The research paper Advanced Security Measures in a Wireless LAN Computer Seminar is about the Wireless Local Area Networks or WLANs and how they metamorphosed the arena of Computer Networking. The growing demand of mobile computing devices, such as laptops and personal digital assistants, and a subsequent demand for continual network connections without having to “plug in,” are heralding enterprise WLANs.

Benefits of WLAN: Network Managers are vouching for the benefits of WLAN. This research paper talks about the multiple benefits of WLAN. WLANs are extremely useful in a scenario that requires almost a frequent shift of working space, and other geographical and spatial barriers (that interfere with the smooth functioning of processes). WLANs provide the freedom of working without being tethered by wires. The research paper speaks of various technologies that help in accessing networked data.

These days, there are four types of Wireless networks, ranging from slow and inexpensive to fast and expensive. They are: WECA (Wireless Ethernet Compatibility Alliance) -WI-Fi, Bluetooth, IrDA (Infrared Direct Access) and HomeRF.

LAN Security: WLAN security, that has been traditional so far, includes the use of Service Set Identifiers (SSIDs), open or shared-key authentication, static WEP keys and optional Media Access Control (MAC) authentication. This combination offers a basic level of access control and privacy. But like any other security systems this one is not free from shortcomings. The research paper discusses these things in depth.

How WLAN is attacked: Eavesdropping, tampering, utilizing antennas, war driving, malicious association, blue drive attack and some more explained in the research paper show possible threat to WLAN.

Conclusion:

The research paper offers some brilliant security measures. It suggests to have a single access point controlled via secure operating system like Linux. It is suggested in the research paper to occasionally boot up and trap sections of traffic to look for any attack signatures. The user must connect via a VPN, the access point is secured so it cannot be reset, WEP is enabled, and access point is in a position that limits travel of the radio frequency outside of the premises.

Download Advanced Security Measures in a Wireless LAN CSE Computer Science Engineering B Tech/ BE Final Project Paper Presentation and Seminar PPT..

Cyborgs – An advanced Robotic Technology Btech CSE Seminar Presentation

The research paper Cyborgs – An advanced Robotic Technology Btech CSE Seminar Presentation talks about the Cyborgs- An Advanced Robotic Technology. Pictures like Bicentennial Man and the Last Mimzi have glorified the field of Robotics like never before. There has been an upsurge in choosing the career domain as an inevitable career option. There is a breakthrough in the research in Robotics almost daily. Cyborg is one such advanced technology that has many promises to make to the coming generations.

Literally a Cyborg is a hypothetical human being with programmed for an alien or hostile environment. A Cyborg has artificial limbs or other body parts. Hollywood glorified Cyborgs in blockbusters like Terminator. A Cyborg can also be a human being seeking respite in artificial intelligence to overcome his/her physical/mental constraints.

Besides fiction and Hollywood Cyborg acts as a panacea for people who might have suffered a limb/limbs amputation in wars or accidents. iLimb and C-Leg are some major breakthrough in the domain of Cyborgs. The iLimb acts as a prosthetic to help the victim cope with the loss of hand/leg. Besides aiming at helping the victim assume a natural gait the iLimb also has magnetic and cochlear implants that help the victim with sensory perception.

A British Research Scientist Kevin Warwick made 100 electrodes fire his neurons in order to make his mind communicate with the internet. He carried many other researches successfully.

Cyborgs also play a vital role in safeguarding and managing huge records/databases.

Types of Cyborgs:

There are two types of Cyborgs- Restorative and Enhanced. As the name suggests the restorative Cyborgs help in restoring the activity of lost limbs, organs etc.  The enhanced Cyborgs works towards maximizing the output of the artificial limb/organ. Cyborgs has also penetrated deeper into fields called as ‘Cryonics’—wherein a patient deemed dead is preserved and treated at a later stage. Cyborgs plays a vital role in military too.

Besides given a lease of life to sports personnel by gifting them with high performance limbs which otherwise might have been amputated in some accident.

Conclusion:

Cyborgs has a great future lying ahead. One may in the future have a machine body with the muscular brain, or a muscular body harboring a computer brain!!

Download Cyborgs – An advanced Robotic Technology  Btech CSE Seminar Presentation.

History of Computers CSE Seminar Topic

The research paper History of Computers CSE Seminar Topic speaks about the History of Computers. Post-modernization if anything has marveled the world it is ‘Computers’. Computers have now become omnipresent. They are omnipresent too. No official work this day is possible without using a computer. Be it extracting money from an ATM or sending mails, presentations or any other valuable data, computers are indispensable to all processes and procedures.

Computers primarily manipulate data and are even used desktop publishing. There has been colossal research in the domain of computers and now it has sophisticated domains like Artificial Intelligence, Robotics and many more. Gaming also is an emerging field that is ingrained in the domain of computers. The first electronic computer, the Electronic Numerical Integrator and Computer (ENIAC), was developed in 1946. It measured 18 feet by 80 feet and weighed 30 tons. Today’s desktop computers weigh much less, can store a million times more information, and are 50,000 times faster. In recent years, notebook-size laptop computers and hand-held Personal Digital Assistants (PDAs) have become popular.

All Parts of Computer:

The computer case is the metal and plastic box that contains the main components of the computer. A desktop case lies flat on a desk, and the monitor usually sits on top of it. A tower case,  is tall and sits next to the monitor or on the floor.

The front of the case usually has an on/off switch and two or more drives. On the back of the computer case are connection ports made to fit only one type of plug-in device. The ports include monitor cable port, keyboard/mouse ports, network cable port, microphone/speaker/auxiliary input ports and printer port (SCSI or Parallel). There’s also a place for the power cord plug.

The monitor, which resembles a television, is where the computer displays text and pictures.

The CPU or the Central Processing Unit is the brain of the computer. Its duty is to carry out the commands. The computer has both input and output devices. CDs, Pen-drives, floppies are input devices. Printers, webcam, scanners are an output device. The short-term memory of a computer is called RAM ( Random Access memory). IT stores memory in the form of MBs or GBs. The hard-disk or the C drive stores more data and information on your computer. Through the ROM ( Read only memory) you can only read but cannot store.

Download History of Computers CSE Seminar Topic.

4G Technology that Gets the World in your Palm CSE Seminar Topic

4G Technology that Gets the World in your Palm CSE Seminar Topic research paper talks about 4g and the future the technology standard has. 4G is the fourth generation wireless communication standard. It has been earlier preceded by 1G, 2G, 3G and 4 G. The 4G applications are characteristically user-driven, user controlled services and context aware applications. In comparison with 3G , 4G has higher data rates and it focuses on one of the primary features ‘QoS’ ( Quality of Service) which is the main criteria in 4G wireless communication.

4G Technology?

A quicker means of networking and communication is what that attracts people to applications like 4G.The technology not only envisages a surge of economy and a landslide improvement in the infrastructure of telecom companies but also assure a better and evolved way of reaching out to the customers and serving them in the best possible way. The emerging new communications standard and of course trendsetter, assumes a user to be able to access services independently of her or his location, in an almost transparent way, with the terminal being able to pick the preferred access technology at current location (ad-hoc, wired, wireless LAN, or cellular), and move between technologies seamlessly i.e. without noticeable disruption. Unified, secure, multi-service, and multiple-operator network architectures are now being developed in a context commonly referenced to as networks Beyond-3G or, alternatively, 4G networks .A 4G Network is routed through a :

  • A user – a person or company with a service level agreement (SLA) contracted with an operator for a specific set of services
  • A MT (Mobile Terminal) – a terminal from where the user accesses services.
  • AR (Access Router) – the point of attachment to the network, Paging Agent (PA), QOS Broker, AAAC System, Network Management System, Interoperator Network Interchange, Mobility of users across terminals, Mobility among multiple terminals, Per hop Behavior ( PHB), Monitory and Measurement functions and above all confidentiality.

A 4G Technology when discussed at an operational level has many subtleties and nuances. This QoS architecture is able to support multi-service, multi-operator environments, handling complex multimedia services, with per user and per service differentiation, and integrating mobility and AAAC aspects. Although the future of 4G is very promising it still has shortcomings owing to its different server orientation. A major issue in 4G systems is to make the high bit rates available in a larger portion of the cell, especially to users in an exposed position in between several base stations.

In current research, this issue is addressed by macro-diversity techniques, also known as group cooperative relays and also by beam division multiple access.

Conclusion

Sprint Nextel, Scartel in Russia, Belarus and Nicaragua use the 4G technology. Ericsson and Nokia Siemens too have come up with some latest versions of  Technology in the Scandinavian part of the world.

Download 4G Technology that Gets the World in your Palm CSE Seminar Topic.