Seminar Report on Digital Smell Technology

Introduction to Seminar Topi on Digital Smell Technology:

Due to the advancement in the computer technology the need of virtual technology is increasing. The computer is able to sense the touch vision and sight, now we introduce digital smell which evaluates the gases. Iscent digital scent technology is new software by which we can send scent messages through web. By using this technology we can create and modify fragrances and send them through emails or we can post on the social networking sites. In this paper we will see how digital smell device is designed and the advantages of using digital smell.

Brief into the digital smell technology:

A smell synthesizer is a device which can generate gases by using a computer. In the market different types of smell synthesizers are available which are manufactured by dig scents company. Ismell is peripheral device which generates fragrances is connected to a computer by using a serial USB. It will be in the size of a speaker which uses cartridges to generate vapors.

Ismell consists of palette composed of 128 chemicals on a cartridge which emits the vapors through a fan. Scent stream is a driver program which is used to active the device on the computer. Scent spectrum is a chemical makeup of the odors which is a digital file used for broadcasting over the network. For designing of the fragrances ascent ware software is used which is a combination of both software and hardware.

Applications of digital smell:

The digital smell technology can be used for sending emails with fragrances. This can also be used in a advertisements of perfumes where the consumer can smell the fragrance when the add comes. This can also be used in designing scent based video games.

 Download  Seminar Report on Digital Smell Technology.

Latest CSE Seminar Topic on Desktop Streaming

Introduction to Seminar Topic on Desktop Streaming:

This is an advance technique for solving the consumer problems through screen sharing rather than conventional methods. By using desktop streaming technique the customers can get problems solved. In this method the consumers screen and mouse are controlled and the problems are solved directly.  This is a web based remote application method that allows the customer support to remotely access the users system. In this paper we will see how the desktop streaming works and the advantages of using this application.

Brief into the working of desktop streaming:

By using the desktop streaming smart box the user initiates by submitting the question and when the customer support accept the message the can remotely control the user system. A viewer is present on the customer support system which displays the screen of the users system. To make the screen sharing process to receive and sent files a file transfer protocol is used.

To make communication process to run we employ web servers which run on java servelts. The entire design is made by using expertcity architecture which ensures high performance and flexibility. Expertcity architecture provides the high security for the sharing of data between the user and the customer support.

Advantages of using desktop streaming:

By using desktop streaming application we can solve the problems of the users effectively as we are remotely operating the users system. The conventional method like phone call method cannot solve the problems of the users effectively. Desktop streaming application is a secure application and a available at low cost.

 Download  Latest CSE Seminar Topic on Desktop Streaming.

Seminar Report on ERP SAP

Introduction to Seminar Topic on ERP SAP:

ERP SAP is an integrated enterprise software planning application which targets the business software requirements including small scale to large scale industries and organizations in all sectors. ERP SAP is fully loaded software package which includes inventory reduction lead time reductions, business processes, customer service and profitability management which can enhance the business needs in the competitive world.

Brief on SAP:

SAP is system applications and products developed by IBM employees in the year 1970 and have undergone many changes in the coming years. It consists of ABAP in which all the upper layer applications are developed like business applications, sales and management and finance and human resources.

The basis is of kernel or middle layer which interfaces with the basic operating system and has system administration tools and handles batch jobs and cross module applications. The SAP follows a client server approach where the work load gets distributed across several cooperating computer programs. We find a SAP dispatcher which is a control program which manages the resources of the applications and it acts as a transaction monitor which sends the information to the work process and also receives them.

The SAP uses a message server service for processing the internal messages. A database interface is used which can support relational database systems of different vendors and the database interface converts the SQL requests into its own database requests.

Conclusions:

The ERP SAP is the best application to meet the business needs and by using this we can easily manage the data of the customers. The SAP consists of HR module application which can manage the organizations human resource requirements like maintain payroll and accounts.

 Download  Seminar Report on ERP SAP.

Seminar Report on Demand Based Bluetooth Scheduling

Introduction to Seminar Topic on Demand Based Bluetooth Scheduling:

The main objective of this paper is to give idea of Bluetooth scheduling.  As the wireless communication is advancing day to day, blue tooth technology has been developed. Bluetooth is defined as a wireless communication technology between devices which are Bluetooth enabled. The communication through this Bluetooth device is  possible within a range of 10m. Each cluster of blue tooth device is called as piconet.

Brief into Demand Base Bluetooth Scheduling

Generally, this Bluetooth technology operates in ISM band. Bluetooth employs Time Division Duplex for communication between devices. Since this band is so noisy, to reduce noise frequency hopping is used. Each piconet consists of one master and up to 7 slaves in which each master and slave communicate by using TDD slots. 

Piconet is identified by the Master Bluetooth Address and clock. If the blue tooth participates in two piconets then a bridge formed between them and this is called a scatter nets. Demand based Bluetooth scheduling is achieved by fixing the polling positions of synchronous and shared slaves. The polling period is updated based on the traffic of the master or slave. The simulation of Demand-based scheduling is done by considering only ADS slaves. 

Advantages and Disadvantage:

The Demand-based Bluetooth scheduling increases the throughput of the piconet and reduces the power consumption of the piconet. This scheduling increases the access latency of the slaves. If the access latency of the slaves increases, this may lead to losing a packet.

 Download  Seminar Report on Demand Based Bluetooth Scheduling.

Demand Response Scheduling By Stochastic SCUC Project Abstract

Introduction to Demand Response Scheduling By Stochastic SCUC Project:

Many independent system operators have designed programs to utilize the services provided by the demand response. Demand responses are provides with the demand response providers which manages the customer responses. In this we will look into a stochastic model which utilizes the reserves provided by the demand response in the markets.

Brief on Demand response scheduling:

We find two types of demand response programs they are time based demand response programs and incentive based demand response programs. Time based demand response programs are designed for independent system operators which contain the programs like time of use tariffs, critical peak pricing and real time pricing.

Whereas the incentive based programs have a market based structure and can be offered in both retail and whole sale markets. Most of the incentive base programs have its own goal of operation and san over long term, midterm and short term. A stochastic mixed integer programming model is suggested in which the first stage involves a network constrained unit and the second stage involves security system scenarios.

Advantages and Drawbacks in the existing system:

The demand response providers participate in the electricity markets which act as a medium between the retail consumers and independent system operators. The demand response programs offer aggregate response in the independent system operators. Many independent system operators have the requirement of minimum curtailment level but the demand response programs are lagging this. The demand response programs don’t provide security to the system.

 Download  Demand Response Scheduling By Stochastic SCUC Project Abstract.

Seminar Topic and Report on Deep Ocean Assessment And Reporting Of Tsunamis

Introduction to DART:

In the recent years due to the occurrence of tsunami thousands   lost their lives and caused a lot of destruction in the coastal areas. In order to save the lives of the people the occurrence of the tsunami should be known in advance which is possible by DART.

The deep ocean assessment systems are mainly used for detecting signals in advance which cause the occurrence of tsunami. The DART system monitors the water levels in the oceans and also checks the relevant location for the occurrence of tsunami propagation.

Working of DART:

DART system consists of sensors which are placed at the bottom of the sea which detect the signals which cause earth quakes in the sea bed and transmit the data. A specific acoustic data transmission protocol is used in the design of DART system.

The olden DART systems deployed hundred of buoys for the research in oceanographic and metro logical research.

The recent DART systems are using only six buoy array method for the calculation of the data. Software is developed for the tsunami detection algorithm which is present in tsunameter device which monitors the pressure and the water level changes in the ocean and detects the signals and sends the information analogously to the transmitting device for giving warning alarm.

Advantages of using DART:

This is an efficient device for the detection of tsunami signals and generates a warning alarm. As the device is capable of detecting low wavelength signals which can even detect the earthquake signals which are faster than tsunami signals. this device can also be used for the research in metro logical and oceanography as it can monitor the water levels and the pressure in the oceans.

 Download  Seminar Topic and Report on Deep Ocean Assessment And Reporting Of Tsunamis.

Related Projects Links:

Tsunami and Earthquake Alert System Through Iridium Satellite System

Seminar Topic on DDR2 SDRAM

Introduction to DDR2 SDRAM:

The development DRAM is double data rate two synchronous dynamic random access memory. It has many advantages when compare to dynamic random access memory. It belongs to the family of SDRAM and has many DRAM implementations. In this data is transmitted twice per one clock. In this paper we will discuss about the design and processing speed of synchronous dynamic random access memory.

Brief on DDR2 SDRAM:

The DDR has 2 bits wide of prefetch and DDR2 has 4 bits wide prefetch buffer. The DDR2 consumes less power has the operating voltage dropped from 2.5v for DDR to 1.8V. Fine pitch ball grid array package is present on the DDR2 chips and these occupy very less memory modules.

These have lower thermal resistance between the packages which prevents the ship from overheating.  The FBGA packages have very shorter distances which develops the lower inductance property due to which the unwanted distortion signals gets eliminated. The DDR2 employs CAS and adaptive latency which makes the command and data bus efficient for sustainable bandwidths. Differential strobe signals are used by DDR2 which have higher drive performance due to which higher transition time responses are achieved.

Advantages of DDR2 SDRAM:

The DDR2 achieves higher bandwidths than the available random access memory models. It consumes very less power as it operates at a low operating frequency of 1.8V.      Due to the fine pitch ball grid array package present in the design it offers higher densities. As the mirror signals are eliminated the noise present is very negligible. 

 Download  Seminar Topic on DDR2 SDRAM.

Seminar Report on Distributed Database Management System

Introduction to Seminar Topic on Distributed Database Management System:

Distributed database has become wide spread due to the growing requirement in the data base management systems. In order to increase the response times of the systems the distributed database is employed. Distributed database is the best method for handling the data in the network and it reduces the load on the single server. A central control will be present to organize the distributed data. In this paper we will see how the data gets distributed over the network and how they are used when they are required.

Brief into the distributed database:

In the distributed database the entire data will not be connected to a single cpu they get distributed over the entire network. The operations occurring on the network gets distributed when the application tasks run. This design uses a distributed processing architecture for running the front end and back end tasks.

By the distribution database the user will be transparent and cannot know the physical location of the data. The central link between the user and the distributed data is a database link, which allows the user to access the logical database.

Advantages and disadvantages:

Distributed database increases the reliability and the availability of the databases. As the data gets distributed in the network the response time gets improved. By employing the distribution database we can perform continuous processing of the data. It does make the make the users to rely on the central site for the databases. As the data gets distributed over the network it becomes complex to provide security to the distributed data.

 Download  Seminar Report on Distributed Database Management System.

Blue Eyes Technology Documentation

Introduction to Blue Eyes Technology Seminar Topic:

A blue eye is the technology developed to make the computer interact with the human being. The computer observes the facial expression of the human being and responds to it accordingly. By the blue technology the computer can be operated without the need of mouse or a keyboard. In this paper we see how blue eyes technology works and its uses in today’s world.

Brief into blue eyes:

The research on human computer interface has been going on since a long and development was confines to a particular field and goal of human computer interface is to design a complete interacting device with the human being. Rosalind picard developed the computing algorithm which detects the facial and body expressions of the person and calculates them and responds accordingly.

The cameras observe the expressions of the human being and calculate them with the physical expressions and then respond. In the past a perfect algorithm was not available for the computer to analyze the expressions of the humans so the development was confined to certain limits.

Advantages:

As the machines interact with the persons directly there is a better possibility for generating a productive environment. By the blue eyes technology a better working environment can be created and reduces the time consumption for obtaining the results. Thus we can conclude that the blue eyes technology can laid down a path for further developments.

 Download  Blue Eyes Technology Documentation.

Seminar on Data Structures

Introduction to Seminar on Data Structures:

A data structure allows organizing the data in a considered manner and creates relationship with each other. Data structures are very important for handling the data in all platforms. Arrays are used for storing similar type of data but by using data structures we can store data which is not similar. In this paper we will see how dissimilar data is stored using structures and the applications of structures in various fields.

Brief on data structures:

We often come across situations we the data is of different types of entities and we store these data by constructing an array to each entity but the code length becomes huge and the processing speed gets reduced so we use data structures where we can declare all the entities in a structure and the processing speed is also increases. We can even declare in structures for storing the similar elements. The structure elements are always stored in contagious memory locations.

The major application of data structures is in relational database management systems for storing the organizational details and employ details etc. structures can also be screen interactive applications. For performing the insertion and deletion operations on the nodes we use binary tree structure in data structures.

Applications of Data structures:

Data structures are extensively used in compiler design and operating systems and in artificial intelligence systems. In data base management systems for storing of huge data in volumes we use data structures. Data structures are also used in numerical analysis packages and in statistical analysis. Data structures are also used for purpose of simulation. 

 Download  Seminar on Data Structures.