Electro Dynamic Suspension Electro Magnetic Suspension

The research paper Electro Dynamic Suspension Electro Magnetic Suspension speaks about Magnetic Levitation (Maglev) in which automobiles do not run over wheels/tyres but they surf over an electromagnetic wave. Maglev enabled automobiles run at a speed of 330 miles/hour. The research paper talks about two types of Magnetic Levitation.

1.      Electro Dynamic Suspension ( EDS)

2.      Electro Magnetic Suspension (EMS)

EDS is known as repulsive levitation and EMS is known as attractive levitation. The maglev enabled vehicles run over specific guideways although they can adapt themselves to respective topography. However the construction cost of such automobiles may definitely be on the higher side with respect to construction costs, electricity that is very efficiently stored in electromagnets, The magnetic levitation is a breakthrough research which will enable a train run over a electromagnetic track not touching it. Since commuting through air is not possible, magnetic levitation can give a very close traveling experience like that. A magnetic levitated train will run at a speed of 60 km per hour in simpler words a person aspiring to reach Delhi from Hyderabad will reach Delhi in flat 4 hours!

How Maglev works: In the EMS-attractive system, the electromagnets which do the work of levitation are attached on the top side of a casing that extends below and then curves back up to the rail that is in the center of the track. The rail, which is in the shape of an inverted T, is a ferromagnetic rail. When a current is passed through it, and the electromagnet switched on, there is attraction, and the levitation electromagnets, which are below the rail, raise up to meet the rail. The car levitates. The gap between the bottom of the vehicle and the rail is only 3/8″ and an electronic monitoring system, by controlling the amount of attractive force, must closely control the size of the gap. 

Conclusion: Although magnetic levitated vehicles are seeing the light of the day in other countries it might take some time for the concept to hit India.

Download Electro Dynamic Suspension Electro Magnetic Suspension.

Distributed Virtual Disks

Description: The research paper Distributed Virtual Disks talks about Petal as an ideal storage system. It is not a bad thing if one dreams of having a high performance system. A system that has a greater storage capacity, a system that is globally accessible, unlimited performance and it has capacity to hold multitudes of customers and is available all the time. Such a thing will not be lesser than dream come true.

An ideal system like this is always available and has an intrinsic potential to expand unimaginably.

 There has been increase in the production of low cost, scalable and high-performance networks that bring us very close to the dream of having an ideal system. Managing large storage systems is a costly and intricate process. Various estimates suggest that for $1 of storage $5-$10 is spent to manage it. It is that adding a new storage device frequently requires a dozen or more distinct steps, many of which require reasoning about the system as a whole and are, therefore, difficult to automate. Often a single component failure can stop the entire system, and requires considerable time and effort to recommence operation. For instance, in a network using a ring topology or a star topology, the hub acts like a server through which all the transactions occur. Thus, hub is a single element whose failure may result in a system halt. Moreover, the capacity and performance of individual components in the system must be monitored from time to time and equipoised to reduce fragmentation and removal of hot spots.

Conclusion: The research paper concludes on a note that Petal is indeed a very effective scalable storage system. With almost a very good potential to expand and perform incessantly. It does has some disadvantages and can be eliminated in the future. Nevertheless petal has emerged has an efficient storage device.

Download Distributed Virtual Disks Technical Paper Presentation.

Distributed Computing and Advantages & Distributed Systems Architecture

Description: The research abstract Distributed Computing and Advantages & Distributed Systems Architecture speaks about distributed computing and its advantages. The research paper says that distributed computing comes close to the working of super computers although much more has to be achieved in the field. It is not just the application standards that sets distributed computing far away from Super Computer but also the cost that is incurred by maintaining a colossal application like that.

The distributed computing models greatest advantage is that it works on scalability. Distributed computing works on increasing CPU powers and communications bandwidth.

How distributed computing works: A distributed computing works on many software agents installed on client systems. There needs to be a dedicated clients’ management server. There may also be requesting clients with software that allows them to submit jobs along with lists of their required resources. An agent running on a processing client detects when the system is idle, notifies the management server that the system is available for processing, and usually requests an application package. The client then receives an application package from the server and runs the software when it has spare CPU cycles, and sends the results back to the server. If the user of the client system needs to run his own applications at any time, control is immediately returned, and processing of the distributed application package ends.

Conclusion: The research paper concludes on a note specifying the advantages of distributed computing. It says that Distributed computing provides efficient solutions to the clients within the company’s firewall. Distributed computing primarily focuses on increasing the memory of the computers by leaps and bounds and increasing the CPU powers of the computer alongside communication bandwidth. Much has been done in the arena and still much has to be done until it reaches somewhere close to the Super Computer.

Download Distributed Computing and Advantages & Distributed Systems Architecture.

Distributed Computing

Description: The research paper Distributed Computing talks about Distributed Computing and Super Computer like tasks that it undertakes. Distributed computing has received whole new attention where in there are multiple experts working on an intensive problem. Distributive computing increases the scope of desktop CPU and improves the memory of systems by a thousand times and facilitates many users work on an intensive problem.

Although there has been enormous scope in the field of distributed computing not much has been achieved due to lack of sophisticated applications. There have been many problems pertaining to bandwidth bottlenecks coupled with significant security, management and standardization challenges.

How distributed computing works: A distributed computing works on many software agents installed on client systems. There needs to be a dedicated clients’ management server. There may also be requesting clients with software that allows them to submit jobs along with lists of their required resources. An agent running on a processing client detects when the system is idle, notifies the management server that the system is available for processing, and usually requests an application package. The client then receives an application package from the server and runs the software when it has spare CPU cycles, and sends the results back to the server. If the user of the client system needs to run his own applications at any time, control is immediately returned, and processing of the distributed application package ends.

Conclusion: The research abstract ends on a note that distributed computing offers viable solutions to a large group of experts working on an intensive problem. It could offer a viable substitute for supercomputer, although much has to be still done in the field. The research abstract identifies ‘scalability’ as one interesting and commendable feature of distributed computing network.  The most commendable advantages of distributed computers is that it harnesses the systems resources within the firewall.

Download Distributed Computing Technical Paper Presentation.

Digital Signature

 Description: The research paper Digital Signature talks about the role of Digital Signature as a supreme measure to safeguard all the valuable information pertaining to your financial transaction or for that matter any other transaction. With exponential rise of information shared and e-transactions facilitating lucrative deals at the tip of the finger, there’s every chance of some kind of forgery seeking in corrupting the faith that you have had in the entire system. In a scenario like this having a unique and personalized security measures are very important and indispensable to transactions of these kind.

 Cryptography is one best technology that has made giant strides in protecting data and information in recent years. Cryptography is the science of securing your information by means of a code. Cryptography provides an encryption for the data and information that passes via single/multiple channels. This is done to keep the data from any external or third party influence.

 There are three different ways to decrypt the encrypted information:

Switch key mode: This mode allows using a single key for both encryption and decryption.

Public key mode: Has two keys for encryption and decryption.

Hash keys mode: Uses a mathematical algorithm to lock the data irreversibly.

Since anyone could forge a manual signature and that can be done very easily the necessity to develop a digital signature increases. These days when transaction of any kind keep happening almost at an exponential rate creating a digital signature becomes very necessary. Digital signature kind of encrypts your signature that is specific to you and saves it from forgery of any kind.

Conclusion: Digital signatures are an essential breakthrough in the spheres of biometrics and cryptography. Wherever there is a smart card the use of a digital signature almost becomes indispensable. A digital signature is very unique and is one very effective means of safeguarding your transaction concerns. Digital signature is a very effective way of securing all your financial transactions.

Download Digital Signature technical paper Presentation.

Cryptography Digital Signature IT Seminar Downloads

Description: Cryptography is one of the essential tools to secure the information. With the increasing flow of information witnessed like never before, and colossal use of smart cards like Bank cards, insurance cards, and health cards, ways to identify effective security tools is something that is happening almost continuously. Concerns for security arise in order to safeguard the user’s trust and integrity over the functioning of certain systems.

Concerns for security arise in order to safeguard the user’s trust and integrity over the functioning of certain systems.

Cryptography Digital Signature IT Seminar Downloads has made many advances by means of encrypting the information in order to safeguard it from hackers. Switch key mode of cryptography allows only one key for encrypting and decrypting. 

Public key mode makes use of two different keys for encryption and decryption and Hash keys make use of algorithms that encrypt information ‘irreversibly’.

Why Digital Signature: Since anyone could forge a manual signature and that can be done very easily the necessity to develop a digital signature increases. 

These days when the transaction of any kind keeps happening almost at an exponential rate creating a digital signature becomes very necessary. Digital signature kind of encrypts your signature that is specific to you and saves it from forgery of any kind.

Properties of Digital Signature:

  • The Digital Signature must verify the author and the date and time of signature.
  • The Digital Signature must authenticate the contents at the time of signature.
  • The Digital Signature must be verifiable by third parties, to resolve disputes.

Thus the digital function includes the authentication function.

Conclusion: Digital signatures are an essential breakthrough in the spheres of biometrics and cryptography. Wherever there is a smart card the use of a digital signature almost becomes indispensable. A digital signature is unique and is one very effective means of safeguarding your transaction concerns. A digital signature is a very effective way of securing all your financial transactions.

Processing Methods of Digital Image Processing

Description: The research paper Processing Methods of Digital Image Processing suggests that the methods adopted for image processing in the yore are still being used as the fundamental concepts although digital technology has revolutionized image processing techniques. Optical applications such as holography are still in use. Digital processing allows enhancing the quality of required features while attenuating the features that are of negligible interest and consideration.

Digital image processing is a subset of the electronic domain wherein the image is converted to an array of small integers, called pixels, representing a physical quantity such as scene radiance, stored in a digital memory, and processed by computer or other digital hardware. Digital image processing, either as enhancement for human observers or performing autonomous analysis, offers compensation in cost, speed, and flexibility, and with the rapidly falling price and rising performance of personal computers it has become the dominant method in use.

What is Digital Image Processing?

An image may be defined as a two-dimensional function, f(x, y), where x and y are spatial  (Plane) coordinates, and the amplitude of f at any pair of coordinates (x, y) is called the intensity or  Gray level of the image at that point. When (x, y) and amplitude values of f are all finite, discrete Quantities, we call the image a digital image. The field of digital image processing refers to processing digital images by means of a digital computer. Note that a digital image is com- posed of a finite number of elements, each of which has a particular location and value. These elements are referred to as picture elements, image elements, pixels, and pixels. Pixel is the term most widely used to denote the elements of a digital image.

Conclusion: The research paper concludes by saying that today image processing field is one of the fastest growing fields and has many promises to make in the future.

Download Processing Methods of Digital Image Processing Technical CSE Paper Presentation.

Data Mining Engineering Seminar Report

Description: The DATA MINING Engineering Seminar Report gives a basic insight into the concept of data-mining. It suggests that there has been a data flood owing to data generated from Banks, telecom industry, scientific labs, astronomical data, population statistics and many many more. The data generated from the e-world is also flood like with enormous data and information being churned out from web, text, e-commerce.

Why data is captured: The presentation suggests that more and more data is captured owing to greater storage and security techniques. These techniques have become cheaper and now there are sophisticated data base management systems which facilitate greater data storage with more accuracy and security.

Some laws have been mentioned in the presentation. According to Moore’s law computer speed doubles in every 18 months. And total storage doubles every nine months.

Data mining has been defined in the presentation as a process that identifies valid, novel, potentially useful, and understandable patterns of data. Search Engines and Telephone directories are not part of data mining. Since competitive pressure is strong data mining is gaining a never like before advantage.Data mining allows collection and storage of data at enormous speed. The information collected is from sources like

  • remote sensors on a satellite
  • telescopes scanning the skies
  • microarrays generating gene
    expression data
  • scientific simulations
    generating terabytes of data

Some Major Tasks of data mining : ( as mentioned in the presentation)

  • Classification: predicting an item class
  • Associations: e.g. A & B & C occur frequently
  • Visualization: to facilitate human discovery
  • Estimation: predicting a continuous value
  • Deviation Detection: finding changes
  • Link Analysis:  finding relationships

Data Mining techniques are used in fraud detection, direct marketing,

Conclusion: The presentation ends by quoting some challenges of data mining are privacy preservation, data quality, dimensionability, data ownership and distribution.

Download Data Mining Computer Science Engineering Seminar Report.

Cryptography in Smart Cards ECE CSE Seminar

Description: Cryptography is the science of encryption. It is science of securing the information and data from third party access. We know that we live in global world where e-transactions are in vogue. In a given situation like this securing the data and safeguarding it in order not to mess up with transactions and savor losses becomes so very important. The research paper discusses data encryption standard that provides an utmost secure environment for flow of information.

The research paper Cryptography in Smart Cards ECE CSE Seminar also talks about quantum key distribution that provides complete and secure encryption of data passing through private channels.

The paper talks about smart cards like ATM cards, health cards and many more that have facilitated e-transactions. These cards play a major role in passing through the public key infrastructure. These cards have memory and cryptographic coprocessors. A smart card helps in money transaction and non-money transactions like securing some important information and data.

A smart card is a card of a bank card’s size with an inbuilt integrated circuit. The smart card is an effective means of encrypting data via authentication and signature recognition.

The main structure of Smart card is based on three components:

  1. Master File
  2. Dedicated File
  3. Elementary File

Quantum cryptography is the breakthrough in the arena of cryptography wherein information is transmitted in the form of light. To construct Quantum cryptography one needs a polarizing filter to generate photons. There’s also a need to receive by means of a filter to measure the polarization. Quantum transmissions can pass through several kilometers of optical fiber.

Conclusion: New technology, breakthroughs will emerge owing to smartcards. The research paper promises evolution of more standardized and sophisticated techniques. Quantum cryptography has many effective promises to make for the future.

Download Cryptography in Smart Cards ECE CSE Seminar.

Zigbee Technology Seminar Presentation

Zigbee Technology Seminar Presentation is specified for a suite of high level communication protocols with the help of small and low-power digital radios. The Zigbee technology is purposed to be simpler and cheaper than Bluetooth. ZigBee is the most new specifications that have low data rates and consume very low power.

 With the help of ZigBee technology, interoperability will be enabled in multi-purpose self-organizing mesh networks. ZigBee is standard for embedded application software. The bandwidth of Bluetooth is 1 Mbps whereas ZigBee has one-fourth of this value. ZigBee has long battery life and low costs. ZigBee is meant to cater to the sensors and remote controls market and battery operated products.

 It is designed for sensors and remote controls which are numerous. It requires small data packets and extreme low power consumption for long life. It consists of three different types of ZigBee device. They are ZigBee coordinator (ZC), ZigBee Router (ZR), and ZigBee End Device (ZED).

 The ZigBee Standard composed of three sets of solutions called layers. These layers has features such as low cost, easy implementation, reliable data transfer, short-range operations, very low power consumption and adequate security. The three layers of Zigbee are Network and Application Support layer, Physical (PHY) layer, and Media access control (MAC) layer.

The topologies included in Zigbee are star, peer-to-peer, and mesh. There are four frame structures. They are Beacon frame, Data frame, Acknowledgement frame, and MAC command frame. Zigbee has four characters which are Low cost, Range and obstruction issue avoidance, Multisource products, and Low power consumption.

Its application includes Home Entertainment and Control, Home Awareness, Mobile Services, Commercial Building, and Industrial Plant.

Conclusion:

ZigBee is a communication protocol formulated by the relevant task force. It has many features like low cost, low power consumption, simply implemented. Zigbee devices will be highly ecological than its predecessors. It has high density of nodes per network.

Download Zigbee Technology Seminar Presentation.