DNA Computing PPT Presentation

Introduction to DNA Computing Presentation:

The main objective of this paper is to give idea of DNA computing. The framework which is being used from the room sized computers to present is same. This gave rise to researchers to develop new computational models. Hence, DNA computers are developed. DNA computing is similar parallel computing. These computers are faster and smaller when compared to others. In these computers many different molecules of DNA are used so that this can perform many operations simultaneously.

Brief into DNA Computing

DNA structure consists of a particular bond of adenine and cytosine bases. Watson-Crick complementarily is followed by these bonds. DNA strand is composed by  four nucleotides adenine, guanine ,cytosine and thymine  . The ends of DNA strand structure determine its polarity. 

The computation takes place on a DNA computer which has test tubes and it is provide with DNA strand as input for encoding the information. This computation is done step by step in series which involves synthesizing, mixing, melting, copying, separating, substituting, extracting, modifying and cloning the DNA strands.

Advantages and Disadvantages:

 We can perform many operations simultaneously and we can search parallel. These are not expensive when compared to silicon chip computers. It consists of a separate memory block to encode bits. The storage capacity is high because only one template strand is used. These computers cannot be programmed. Very large amount of data is required because it generates solution sets even for simple operations.

Download  DNA Computing PPT Presentation .

ECE Seminar Topic and Report on VHDL

Introduction to Seminar Topic on VHDL:

Central electronics engineering research institute was started in the year 1953, and is designing various products required for the electronic industry needs. The CEERI is been undertaking the research and development in the areas of electronic systems and semiconductors and microwave tubes area.

All these design patterns come under VLSI and we program the devices using VHDL process.. In this paper we will see how electronic components are designed using the VHDL process. We will also look into the switching theory and logic design used for designing the combinational circuits.

Brief into VHDL:

VHDL is a verilog hardware description language used for programming the electronic systems. It is used for modeling digital systems and is similar to the programming language like C++. A synthesizer is used in VHDL for converting the source code to hardware description language the code which gets implemented in the circuit. To write a VHDL program we should design a circuit manually and there types of approaches for writing the code.

To describe the hardware modules we will use an entity in VHDL. By using the entity declaration we will declare the user interface function and by using the architecture we will know about the elements present in the design. We have data flow modeling and behavioral and structuring models by which we write the code. For storing the present and the past inputs we will use the sequential or combinational circuits required for the design.

Conclusions:

Thus we can conclude that verilog hardware description language is the most efficient programming method for designing the electronic systems. To design a robust code we can use any of the required data flow or the structural or the behavioral styles for writing the code.

Distributed Database Architecture for Global Roaming in Next Generation Mobile Network

Introduction to Distributed Database Architecture for Global Roaming in Next Generation Mobile Network  Project:

The main objective of this paper is to give idea of global roaming in mobile network. As usage of mobile phones are increasing day to day , the subscriber of a particular network expect more services from provider. For example, if user moves from one location to another he can’t change the personal telecommunication number every time. Portability is one of the main services which user expects. Hence, Global roaming came into existence. Global roaming is defined as the basic service which supports terminal mobility, personal mobility, and service provider.    

Brief into Distributed Database Architecture for Global Roaming in  Next –Generation Mobile

In global roaming, the database which is used is wireless. Since it is wireless each and every region will have a node and tower. The node in the region stores the information.  Whenever the subscriber moves from one region to another region  mobile switching station will update the location information, this allows the user to receive services without any interruption.

This database consists of  index file and a direct file. The index file is used to determine the database access time . Direct file is considered as perfect hashing due to its collision-free. This is used in DB0 also because it can give fast response and implementation is easy.

Advantages

The database architecture used in this is scalable, robust and easy to expand than other conventional networks. By using this network there will not be be any interruption for the user while using the service.

Download  Distributed Database Architecture for Global Roaming in Next Generation Mobile Network .

Latest CSE Seminar Report on Distributed Software Systems with CORBA

Introduction to Seminar Topic on Distributed Software Systems with CORBA:

In our growing technological needs the distributed database system has become a wide spread. To meet challenges of providing transparency and security to the computers in the network the object management group came with the corba architecture. The distributed software systems appear as a single coherent system for the user. In this paper we will see types of distributed architectures and the characteristics of designing a distributed system.

Brief on Corba:

In distributed software systems we find client server architecture in which the client interacts with the server to use the shared resources. Whereas in distributed object architecture the interaction between the servers and clients is irrelevant. In distributed software systems the components are located in networked computers and they communicate by passing messages in between them.

The communication between the systems is made by passing messages and the systems use a shared memory for running the threads. Common object request broker architecture is a middle ware software application which allows the application programs to interact with each other irrespective of their programming language. The object modeling architecture consists of object model and reference model which makes the hardware and software specification to fit so as to make interactions with the objects.

Conclusions:

The cobra architecture is a suitable architecture and has many advantages than DCOM. The DCOM architecture is a Microsoft package developed by group of developers, whereas the OMG is developed by members from all over the word  as this is a open group and it developers working on different platforms.

Download  Latest CSE Seminar Report on Distributed Software Systems with CORBA.

Seminar Report on Database Management System

Introduction to Seminar Topic on Database Management System:

The database has many applications in the client server model. In order to increase the data retrieving speed we employ distributed database technique. Distributed database has become wide spread due to the growing requirement in the data base management systems. In order to increase the response times of the systems the distributed database is employed.

Distributed database is the best method for handling the data in the network and it reduces the load on the single server. A central control will be present to organize the distributed data. In this paper we will see how the data gets distributed over the network and how they are used when they are required.

Brief into the distributed database:

In the distributed database the entire data will not be connected to a single cpu they get distributed over the entire network. The operations occurring on the network gets distributed when the application tasks run. This design uses a distributed processing architecture for running the front end and back end tasks.

By the distribution database the user will be transparent and cannot know the physical location of the data. The central link between the user and the distributed data is a database link, which allows the user to access the logical database.

Advantages and disadvantages:

Distributed database increases the reliability and the availability of the databases. As the data gets distributed in the network the response time gets improved. By employing the distribution database we can perform continuous processing of the data.

It does make the make the users to rely on the central site for the databases. As the data gets distributed over the network it becomes complex to provide security to the distributed data.

Download  Seminar Report on Database Management System.

CSE Technical Seminar Topic on DCOM Technology

Introduction to Technical Seminar Topic on DCOM Technology:

DCOM is a Microsoft application which supports the communication of different computers on a network like LAN, WAN and even internet also. The DCOM is extension COM( component object model). By using distributed application we can run the components on the client side and on the server side when required or in necessary situations. The distributed applications can use a single server for running all the components and these provide flexibility for the system administrator. In this paper we will see how distributed applications work and the advantages of using distributed applications for consumer applications.

Brief on DCOM architecture and working:

Distributed component object model has added advantages than COM and adds more complexity. The component object model is used to define the interaction between the client and the component without the need of any intermediate system. In  operating systems the process between each other are shielded and direct calls cannot be between the client and the components but DCOM connects  them through intercept calls and the communication is transparent to the user.

The DCOM replaces the local inter process communication through network protocol when the component and the client reside on different systems. The DCOM maintains a reference count of each component which are used by single clients or which are shared by multiple clients. The DCOM can use any protocols like connection less and connection oriented and this application is completely protocol neutral.

Advantages of using Distributed object models:

The type of models provide flexibility for the system manager and these are very scalable than other applications. This application can be easily extended depending upon the requirements. It makes a proper use of bandwidth for handing the communication to the end users. Provides a high symmetric communication between the components and is highly secure.

Download  CSE Technical Seminar Topic on DCOM Technology.

Latest CSE Seminar Reports 2012 on Communication and Invocation in Distributed Systems

Introduction to Communication and Invocation in Distributed Systems:

Communication is a remote procedure application which involves many demands they include client server and end system and group communication. The quality of the communication depends upon the bandwidth and the latency period and the security provided by the service. Different operating system kernels different types of communication primitives like do operation and get request and send reply combination and send receive combination. The initiation of different protocol mechanisms occur through invocation process. In this paper we will see how different communication processes are implemented and the use of the invocation mechanism in the communication service.

Brief on communication and invocation:

Invocation mechanisms involves methods of making a local call procedure and sending messages over the service and remote procedure calling and invoking a method in an object by sending a message. Invocation mechanisms can be either synchronous or asynchronous and this involves the mechanisms of making the code to be executed of the scope of the calling procedure or the communication of the arguments of the code and the return of the data values to the caller.

The invocation mechanisms to make communication across the network they employ thread scheduling and switching techniques. The communication processes include various file operation techniques and marshaling techniques for storage of the data and transfer of the data over the networks.

Conclusions:

The communication mechanism is involved in every area of the technological field. Depending upon the requirement different communication methods are implanted to achieve the output. The quality of the communication over the networks varies with the bandwidth and the latency and the security provided for the communication channel.

  Download  Latest CSE Seminar Reports 2012 on Communication and Invocation in Distributed Systems.

Seminar Report on Diskless Linux Computers

Introduction to Seminar Report on Diskless Linux Computers:

Due to the availability of network cards with high speeds at lower costs the idea of diskless computers came into existence. The diskless computer does not have any floppy drives or hard disks and it downloads the necessary software from the client through LTSP server when the terminal boots and it runs on the self contained pc. In this paper we will see how the diskless computers are designed and about its working.

Working of Diskless computers:

There is a availability of 100 megabit network cards at low cost and in the future there will be a availability of 1000 megabit network cards by which remote access will be as fast as local disk access. Diskless computers will have a network boot ROM’s and are provide with unique Ethernet address. The diskless computers use a boot protocol for obtaining the Ethernet address.

A trivial file transfer protocol is used for block oriented stem transfer. A network file system is mounted on the remote machine which makes a disk partitions like of local hard drives and this allows the sharing of files over the network.

The remote systems start the boot process by executing the ROM code which loads the kernel and executes it. The administrator maintains the directory list that could be mounted from server to the client and based on the client request he mounts the respective file system.

Advantages of using Diskless computers:

The cost of maintenance of diskless computers is very less than the cost of the computer. In diskless computers all the backups are made on a single server and the server is highly secured. As the diskless computers do not have any hard disks there are no chances of virus attacks.

  Download  Seminar Report on Diskless Linux Computers.

Digital Signature Seminar Report

Introduction to digital signature seminar Topic:

Digital signature is cryptography method used for converting the data into different form and the data can be read by using a key. The digital signature is authentication process to accept a license on a online interface. Digital signatures are different from electronic signatures and these are based on mathematical algorithms.

The digital signature is a document which is based on the owner’s private key. In this paper we will see how digital signature cryptography algorithms are implemented and how they are transmitted over the network. 

Information on digital signature types, key hash algorithm, uses are explained in digital signature power point presentation.

Digital signature conversion process:

The digital signature cryptography process is done by using symmetric cryptography and asymmetric cryptography methods. The messages are converted using a code in which the message is placed in alternative characters and the other way is by using cipher in which the whole message is converted.

In symmetric cryptography process the receiver and sender knows the key which they use for encrypting and decrypting the message. Whereas in asymmetric cryptography process there are two keys present, they are a private key which only the owner knows and the other is the public key which is known by everybody. Direct approach or arbitrated approaches are proposed for obtaining the digital signature function.

Conclusions of digital signature usage:

Digital signatures are used for used in biometric identifiers. The usage of digital signature has been growing in areas of security agencies and in law enforcement and in consumer marketing agencies. This is secure method for performing the license agreements on a online basis.

Digital Stenography Seminar

Introduction to Digital Stenography Seminar:

Stenography is the process by which the message is hidden in a carrier like a audio file or image file and sent to the receiver. This kind of hidden messaging activities are done the civil organizations and also by the terrorists for sending their messages without knowing to the government. In this paper we will see how the message is encrypted in the carrier and transmitted to the receiver and how are they decrypted at the receiver.

Brief into stenography:

To encrypt the message into the carrier audio watermarking and finger printing methods are used. The sender embeds the hidden message into a graphic file and transmits to the receiver. The sender has to send the stegokey secretly along with the graphic file or he shout tell the decryption method for reading the hidden message.

The receiver can extract the received message if there is stegokey. To make the encrypting of the message on the carrier in a effective manner data clunking method is used. To recombine the entire chunk files the file recombination method is used at the receiver. The stenography process is implemented in images, audio files and text messages. There are several methods to find the stenographic messages sent in the carrier files. Certain stegokey algorithms are followed for decryption the message in the carrier.

Conclusion:

Thus we can conclude that the stenography message actives are performed by illegal organizations. There are several color coding techniques available for decryption the messages sent in the carrier files.

Download  Digital Stenography Seminar.