Seminars for you

Seminars

You can download full documentation also.....

The Impact of Information Technology on Diabetic Mellitus in developing  Countries

Abstract
Diabetes mellitus has been on the rise across the world affecting over 150 million people.  Over 20% of diabetics in the world are Indians.  At present, it is higher in developed than in developing countries. At the same time, diabetes has over the last two developments according the spectrum of information technology, Excellent diabetes care and self-management depends heavily on the flow of timely, accurate information to patients and providers are present through Recent developments in information technology, (IT) may therefore, hold great promise. In this article, we have briefly reviewed the computer assisted case interventions and current state of bioinformatics in the understanding of diabetes and its complications.
Wireless Video Surveillance


Abstract



Increasing need for intelligent video surveillance in public, commercial and family applications makes automated video surveillance systems one of the main current application domains in computer vision. Intelligent video surveillance systems deal with the real-time monitoring of persistent and transient objects within a specific environment.
            A low-cost intelligent mobile phone-based wireless video surveillance solution using moving object recognition technology is proposed in this paper. The proposed solution can be applied not only to various security systems, but also to environmental surveillance. Firstly, the basic principle of moving object detecting is given. Limited by the memory consuming and computing capacity of a mobile phone, a background subtraction algorithm is presented for adaptation. Then, a self-adaptive background model that can update automatically and timely to adapt to the slow and slight changes of natural environment is detailed. When the subtraction of the current captured image and the background reaches a certain threshold, a moving object is considered to be in the current view, and the mobile phone will automatically notify the central control unit or the user through phone call, SMS (Short Message System) or other means.
The proposed algorithm can be implemented in an embedded system with little memory consumption and storage space, so it’s feasible for mobile phones and other embedded platforms, and the proposed solution can be used in constructing mobile security monitoring system with low-cost hardware and equipments. Thus our results first emulated in Wireless toolkit and   the results show the effectiveness of proposed solution.
                        
                      Artificial Intelligence
 

Abstract
 computer systems are becoming commonplace; indeed, they are almost ubiquitous. We find them central to the functioning of most business, governmental, military, environmental, and health-care organizations. They are also a part of many educational and training programs. But these computer systems, while increasingly affecting our lives, are rigid, complex and incapable of rapid change. To help us and our organizations cope with the unpredictable eventualities of an ever-more volatile world, these systems need capabilities that will enable them to adapt readily to change. They need to be intelligent. Our national competitiveness depends increasingly on capacities for accessing, processing, and analyzing information. The computer systems used for such purposes must also be intelligent. Health-care providers require easy access to information systems so they can track health-care delivery and identify the most recent and effective medical treatments for their patients' conditions. Crisis management teams must be able to explore alternative courses of action and support decision making. Educators need systems that adapt to a student's individual needs and abilities. Businesses require flexible manufacturing and software design aids to maintain their leadership position in information technology, and to regain it in manufacturing

Software Risk Management is a proactive approach for minimizing the uncertainty and potential loss associated with a project.  A risk is an event or condition that, if it occurs, has a positive or negative effect on a project’s objectives.  The three common characteristics of risk are (1) it represents a future event, (2) it has a probability of occurring of greater than 0%, but less than 100%, and (3) the consequence of the risk must be unexpected or unplanned for.  Future events can be categorized as opportunity-focused (positive risk) if their consequences are favorable, or as threat-focused (negative risk) if their consequences are unfavorable.

AN IMAGE PROCESSING USING SIGNALS & SYSTEMS

Abstract

     A real-time face recognition system can be implemented on an IBM compatible personal computer with a video camera, image digitizer, and custom VLSI image correlator chip. With a single frontal facial image under semi-controlled lighting conditions, the system performs (i) image preprocessing and template extraction, (ii) template correlation with a database of 173 images, and (iii) postprocessing of correlation results to identify the user. System performance issues including image preprocessing, face recognition algorithm, software development, and VLSI hardware implementation are addressed. In particular, the parallel, fully pipelined VLSI image correlator is able to perform 340 Mop/second and achieve a speed up of 20 over optimized assembly code on a 80486/66DX2. The complete system is able to identify a user from a database of 173 images of 34 persons in approximately 2 to 3 seconds. While the recognition performance of the system is difficult to quantify simply, the system achieves a very conservative 88% recognition rate using cross-validation on the moderately varied database.

 

Artificial Intelligence & Global Risk

Abstract
 computer systems are becoming commonplace; indeed, they are almost ubiquitous. We find them central to the functioning of most business, governmental, military, environmental, and health-care organizations. They are also a part of many educational and training programs. But these computer systems, while increasingly affecting our lives, are rigid, complex and incapable of rapid change. To help us and our organizations cope with the unpredictable eventualities of an ever-more volatile world, these systems need capabilities that will enable them to adapt readily to change. They need to be intelligent. Our national competitiveness depends increasingly on capacities for accessing, processing, and analyzing information. The computer systems used for such purposes must also be intelligent. Health-care providers require easy access to information systems so they can track health-care delivery and identify the most recent and effective medical treatments for their patients' conditions. Crisis management teams must be able to explore alternative courses of action and support decision making. Educators need systems that adapt to a student's individual needs and abilities. Businesses require flexible manufacturing and software design aids to maintain their leadership position in information technology, and to regain it in manufacturing
AUTOMATED GEOSPATIAL CONFLATION OF VECTOR ROAD MAPS TO HIGH RESOLUTIONARY IMAGE
ABSTRACT:

            As the availability of various geospatial data increases, there is an urgent need to integrate multiple datasets to improve spatial analysis. However, since these datasets often originate from different sources and vary in spatial accuracy, they often do not match well to each other. In addition, the spatial discrepancy is often nonsystematic such that a simple global transformation will not solve the problem. Manual correction is T labor-intensive and time-consuming and often not practical. In this paper, we present an innovative solution for a vector-to-imagery conflation problem by integrating several vector-based and image-based algorithms. We only extract the different types of road intersections and terminations from imagery based on spatial contextual measures. We eliminate the process of line segment detection which is often troublesome. The vector road intersections are matched to these detected points by a relaxation labeling algorithm. The matched point pairs are then used as control points to perform a piecewise rubber-sheeting transformation. With the end points of each road segment in correct positions, a modified snake algorithm maneuvers intermediate vector road vertices toward a candidate road image. Finally a refinement algorithm moves the points to center each road and obtain better cartographic quality. To test the efficacy of the automated conflation algorithm, we used U.S. Census Bureau’s TIGER vector road data and U.S. Department of Agriculture’s 1-m multi-spectral near infrared aerial photography in our study. Experiments were conducted over a variety of rural, suburban, and urban environments. The results demonstrated excellent performance. The average correctness measure increased from 20.6% to 95.5% and the average root-mean-square error decreased from 51.2 to 3.4 m.

  BIOMETRIC FACE   RECOGNITION
Abstract:
         
        As one of the most successful applications of image analysis and understanding, face recognition has recently received significant attention, and has an important advantage over other biometric technologies as it is a non -intrusive and easy to use method.
One of the fastest growing areas of advanced security involves biometric face recognition technologies. The art of picking a face out of a crowd is a time honored skill. Applying technology to such a pursuit has to date proven both fruitful and frustrating. Biometric face recognition technology offers great promise in its ability to identify a single face, from multiple lookout points,
from a sea of hundreds of thousands of other faces. In addition to serving as a information access control tool, biometric face recognition technologies are being used to safeguard international borders, financial ATM transactions, prevent benefits and identity fraud, and help combat terrorism.

Body Area Network for Device Control

Abstract:

               Using electro-physiological signals like EMG or EOG for device control is a promising research area. The application in practice however has the disadvantage that electrodes have to be attached to the user and all electrodes have to be wired to biosignal amplifiers and the device to be controlled. To minimizethe effort of electrode application and to avoidwiring at all a set of biosignal amplifiers with bodyarea network connectivity is being developed. In the first stage an EMG module and the base station of the body area network is demonstrated.




Challenges and Solutions on Routing in Multichannel 
Wireless Mesh Networks
Abstract: 
 Wireless mesh networks have emerged as a promising solution to providing cost-effective last-mile connectivity. Employing multiple channels is shown to be an effective approach to overcoming the problem of capacity degradation in multihop wireless networks. However, existing routing schemes that are designed for single channel multihop wireless networks may lead to inefficient routing paths in multichannel WMNs. To fully exploit the capacity gain due to multiple channels, one must consider the availability of multiple channels and distribute traffic load among channels as well as among nodes in routing algorithms. In this article we focus on the routing problem in multichannel WMNs. We highlight the challenges in designing routing algorithms for multichannel WMNs and examine existing routing metrics that are designed for multichannel WMNs, along with a simulation-based performance study. We also address some open research issues related to routing in multichannel WMNs.
Computer Forensics
Abstract:
In today’s day and age, there is no such thing as 100% secure. But with the stroke of a key, the bad guys can erase all of their data and hide their tracks when using computers for not so legal purposes, or can they? Just because you hit the delete key doesn’t mean that the evidence is gone. Today, there is a growing demand for computer forensics professionals to aid in the fight against those that would use the very technology we depend on against us.
           We see the evidence every day, identity theft, viruses, malware, computer intrusion and more. But what about the things we don’t think or hear about? The emails, downloaded programs, or even the corporate espionage that we only used to read about. What about those threats such as the latest and greatest viruses that attack our cell phones, PDAs, etc.
MOBILE IRIS RECOGNITION SYSTEM BY USING 

ABSTRACT:
In this paper we describe a mobile iris recognition system, where a mobile camera is used in iris recognition system. The demand for high confidence authentication of human identity using biometric technique has grown steadily in the recent past. But the big problem lies in implementing these biometric systems is it can be implemented only in costly mobiles especially 3G mobiles. In mobile iris recognition system a mobile device with camera is used to capture the iris image. Captured image is transmitted to IServer via GPRS. (General Packet Radio Service).It can also be used as mobile tracker by using GPRS and also for security purposes.

        CRYPTOGRAPHY IN SMART CARDS FOR  NETWORK SECURITY
                                               ABSTRACT


            In the age of universal electronic connectivity, of viruses and hackers of electronic eaves dropping and electronic fraud there is indeed no time at which security does not matter. The issue of security and privacy is not a new one however, and the age-old science of cryptography has been in use, since people had information that they wish to hide. Cryptography has naturally been extended into realm of computers, and provides a solution electronic security and privacy issue.

            As the technology increases, Smart Cards (e.g.: SIM cards, Bank cards, Health cards) play very important role in processing many transactions with high level of security.
This security level achieved by means of Cryptography. In this paper i am presenting an introduction to cryptography, basics of Smart Cards, the role of cryptography in Smart Cards, and the processing of an example transaction involving security (Bank Card).

CYBER CRIMES
Abstract:

The revolution in information technologies has changed society fundamentally and will probably continue to do so in the foreseeable future. Many tasks have become easier to handle. Where originally only some specific sectors of society had rationalised their working procedures with the help of information technology, now hardly any sector of society has remained unaffected. Information technology has in one way or the other pervaded almost every aspect of human activities.
The developments have given rise to an unprecedented economic and social changes, but they also have a dark side: the emergence of new types of crime as well as the commission of traditional crimes by means of new technologies that we called “Cyber crime”. Moreover, the consequences of criminal behaviour can be more far-reaching than before because they are not restricted by geographical limitations or national boundaries. The recent spread of detrimental computer viruses all over the world has provided proof of this reality.  Other than computer viruses, cyber crime also consists of specific crimes dealing with computers and networks (such as hacking) and the facilitation of traditional crime through the use of computers (child pornography, hate crimes, telemarketing /Internet fraud)
DATA WAREHOUSING AND DATA MINING  TECHNOLOGY FOR BUSINESS INTELLIGENCE
 
Abstract
The information economy puts a premium on high quality actionable information - exactly what business intelligence (BI) tools like data warehousing, data mining, and OLAP can provide to the retailers. A close look at the different retail organizational functions suggests that BI can play a crucial role in almost every function. It can give new and often surprising insights about customer behavior; thereby helping the retailers meet their ever-changing needs and desires. On the supply side, BI can help retailers identify their best vendors and determine what separates them from not so good vendors. It can give retailers better understanding of inventory' and its movement and also help improve storefront operations through better category management Through a host of analyses and reports, BI can also improve retailers' internal organizational support functions like finance and human resource management. 
  Mining With Noise Knowledge: Error-Aware Data Mining
AbstractReal-world data mining deals with noisy information sources where data collection inaccuracy, device limitations, data transmission and discretization errors, or man-made perturbations frequently result in imprecise or vague data. Two common
practices are to adopt either data cleansing approaches to enhance the data consistency or simply take noisy data as quality sources and feed them into the data mining algorithms. Either way may substantially sacrifice the mining performance. In this paper, we consider an error-aware (EA) data mining design, which takes advantage of statistical error information (such as noise level and noise distribution) to improve data mining results.We assume that such noise knowledge is available in advance, and we propose asolution to incorporate it into the mining process. More specifically, we use noise knowledge to restore original data distributions, which are further used to rectify the model built from noisecorrupted data. We materialize this concept by the proposed EA naive Bayes classification algorithm. Experimental comparisonson real-world datasets will demonstrate the effectiveness of this design.


“Efficient Algoritham for Hirarchical Online mining of Association Rules”

Abstract:-Several multi-pass algorithms have been proposed for Association Rule Mining from static repositories. However, such algorithms are incapable of online processing of transaction streams. In this paper we introduce an efficient single-pass algorithm for mining association rules, given a hierarchical classification amongst items. Processing efficiency is achieved by utilizing two optimizations, hierarchy-aware counting and transaction reduction, which become possible in the context of hierarchical classification. We also propose a modified algorithm for the rule generation phase which avoids the construction of an explicit adjacency lattice. 

Multi resolution Watermark Based On Wavelet Transform For 
Digital Images
Abstract:
The overabundant and easily accessible digital data on the internet has made it the most vulnerable information-store subject to piracy. Digital watermarking is a tool developed to fight piracy. The rapid expansion of the internet in the recent years has rapidly increased the availability of digital data such as audio, images and videos to the public. As we have witnessed in the past few months, the problem of protecting multimedia information becomes more and more important and a lot of copyright owners are concerned about protecting any illegal duplication of their data or work. Some serious work has to be done to maintain the availability of multimedia information and at the same time protecting the intellectual property of creators, distributors or simple owners of such data. This is an interesting challenge and is probably the reason why so much attention has been drawn toward the development of digital images protection schemes.
Platform Virtualization
ABSTRACT

                                    Virtualization is a proven software technology that is rapidly transforming the IT landscape and fundamentally changing the way that people compute. Today’s powerful x86 computer hardware was designed to run a single operating system and a single application. This leaves most machines vastly underutilized. Virtualization lets you run multiple virtual machines on a single physical machine, sharing the resources of that single computer across multiple environments. Different virtual machines can run different operating systems and multiple applications on the same physical computer.  
                                     We use a desktop which runs on a single operating system. We also see systems which have more than one operating system installed, but run on one via dual boot. The utilization percentage of these systems is much low when compared to the level of their capability.
 RECENT ADVANCES IN SOFTWARE ENGINEERING
                           
ABSTRACT:



Much of current software engineering practice and research is done in a value-neutral setting, in which every requirement, use case, object, and defect is treated as equally important; methods are presented and practiced as largely logical activities; and a “separation of concerns” is practiced, in which the responsibility of software engineers is confined to turning software requirements into verified code. In earlier times, when software decisions had relatively minor influences on a system’s cost, schedule, andvalue, the value-neutral approach was reasonably workable. But today and increasingly in the future, software has a major influence on most systems’ cost, schedule, and value; and value-neutral software decisions can seriously degrade project outcomes. This paper presents an agenda for a discipline of Value-Based Software Engineering. It accepts the challenge of integrating value considerations into all of the existing and emerging software engineering principles and practices, and of developing an overall framework in which they compatibly reinforce each
other. Example elements of this agenda include value-based requirements engineering, architecting, design and development, verification and validation, planning and control, risk management, quality management, and people management. It presents seven key elements that provide candidate foundations for value based software engineering: Benefits Realization Analysis; Stakeholder Value Proposition Elicitation and Reconciliation; Business Case Analysis; Continuous Risk and Opportunity Management; Concurrent System and Software Engineering; Value-Based Monitoring and Control; and Change as Opportunity.
RED TACTON
Abstract

Technology is making many things easier. We can say that this concept is standing example for that. So far we have seen LAN, MAN, WAN, INTERNET & many more but here is new concept of  “ RED TACTON ” which  makes the human body  as a  communication  network  by  name .... HAN (Human Area Network). Red Tacton is a new Human Area networking technology that uses the surface of the human body as a safe, high speed network transmission path. Red Tacton uses the minute electric field generated by human body as medium for transmitting the data. The chips which will be embedded in various devices contain transmitter and receiver built to send and accept data in digital format. In this paper we will discuss about red tacton, and its working states, and applications of red tacton various fields. And we will compare our red tacton with the other technology for data transmission and know about human area network.



Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols   

ABSTRACT:

In an ad hoc network, mobile computers (or nodes) cooperate to forward packets for each other, allowing nodes to communicate beyond their direct wireless transmission range. Many proposed routing protocols for ad hoc networks operate in an on-demand fashion, as on-demand routing protocols have been shown to often have lower overhead and faster reaction time than other types of routing based on periodic (proactive) mechanisms. Significant attention recently has been devoted to developing secure routing protocols for ad hoc networks, including a number of secure on-demand routing protocols, that defend against a variety of possible attacks on network routing. In this paper, we present the rushing attack, a new attack that results in denial-of-service when used against all previous on-demand ad hoc network routing protocols. For example, DSR, AODV, and secure protocols based on them, such as Ariadne, ARAN, and SAODV, are unable to discover routes longer than two hops when subject to this attack. This attack is also particularly damaging because it can be performed by a relatively weak attacker. We analyze why previous protocols fail under this attack. We then develop Rushing Attack Prevention (RAP), a generic defense against the rushing attack for on-demand protocols. RAP incurs no cost unless the underlying protocol fails to find a working route, and it provides provable security properties even against the strongest rushing attackers.
SUPER WORMS AND CRYPTO VIROLOGY: A DEADLY COMBINATION
Abstract:
Understanding the possible extent of the future attacks is the key to successfully protecting against them. Designers of protection mechanisms need to keep in mind the potential ferocity and sophistication of viruses that are just around the corner. That is why we think that the potential destructive capabilities of fast spreading worms like the Warhol worm, Flash worm and Curious Yellow need to be explored to the maximum extent possible. While re-visiting some techniques of viruses from the past, we can come across some that utilize cryptographic tools in their malicious activity. That alarming property, combined with the speed of the so-called “super worms”, is explored in the present work. Suggestions for countermeasures and future work are given.
VIRTUAL UNIVERSITIES

ABSTRACT:
This report is based on “internet and web applications.”As nowadays internet is playing a key role in all fields, so we would like to give a presentation on the applications of the internet and web.
We selected the topic “VIRTUAL UNIVERSITIES”, one of the most important applications of the internet.
In our presentation, we concentrate on the virtual universities, how they are working, some examples, how the students are connecting to the internet, the advantages and the disadvantages of the virtual universities.
This is very helpful to future generations in this computer era. Simply by sitting in the home, we get the information in the entire world and also helpful for getting education.
Many countries in the world are implementing these types of universities. In India also some universities are providing these virtual study courses. 

Visual Mining

            Abstract :

Data mining strategies are usually applied to collected data and frequently focus on the discovery of structure such as clusters, bumps, trends, periodicities, associations and correlations, quantization and granularity, and other structures for which a visual data analysis is very appropriate and quite likely to yield insight. However, data mining strategies often applied to massive data sets where visualization may not be very successful because of the limits of both screen  resolution, human visual system resolution as well as the limits of available computational resources. In this paper we suggest some strategies for overcoming such limitations and illustrate visual data mining with some examples of successful attacks on high-dimensional and large data sets.



MINING CUSTOMER VALUE FROM DECISION TREES



                                                                          Most data mining algorithms and tools stop at discovered customer models, producing distribution information on customer profiles. Such techniques, when applied to industrial problems such as customer relationship management (CRM), are useful in pointing out customers who are likely attritors and customers who are loyal, but they require human experts to post process the discovered knowledge manually. Most of the post processing techniques have been limited to producing visualization results, but they do not directly suggest actions that would lead to an increase in the objective function such as profit. In this paper, we present novel algorithm that suggest actions to change customers from an undesired status (such as attritors) to a desired one (such as loyal) while maximizing an objective function: the expected net profit. These algorithms can discover cost effective actions to transform customers from undesirable classes to desirable ones. The approach we take integrates data mining and decision making tightly by formulating the decision making problems directly on top of the data mining results in a post processing step. To improve the effectiveness of the approach, we also present an ensemble of decision trees which is shown to be more robust when the training data changes.

Click here to download...

REMOTE PROCEDURE CALL

                                                  Remote procedure call (RPC) is an Inter-process communication technology that allows a compute program to cause a subroutine procedure to execute in another address space (commonly on another computer on a shared network) without the programmer explicitly coding the details for this remote interaction. That is, the programmer would write essentially the same code whether the subroutine is local to the executing program, or remote. When the software in question is written using object-oriented principles, RPC may be referred to as remote invocation or remote method invocation. RPC is a powerful technique for constructing distributed, client-server based applications. It is based on extending the notion of conventional, or local procedure calling, so that the called procedure need not exist in the same address space as the calling procedure. The two processes may be on the same system, or they may be on different systems with a network connecting them. By using RPC, programmers of distributed applications avoid the details of the interface with the network.
 

Click here to download..

Mobi pads




                                                             Traditionally, middleware technologies, such as CORBA, Java RMI, and Microsoft’s DCOM, have provided a set of distributed computing services that essentially abstract the underlying network services to a monolithic “black box.” In a mobile operating environment, the fundamental assumption of middleware abstracting a unified distributed service for all types of applications operating over a static network infrastructure is no longer valid. In particular, mobile applications are not able to leverage the benefits of adaptive computing to optimize its computation based on current contextual situations. In this paper, we introduce the Mobile Platform
for Actively Deployable Service (MobiPADS) system. MobiPADS is designed to support context-aware processing by providing an executing platform to enable active service deployment and reconfiguration of the service composition in response to environments of varying contexts.
Unlike most mobile middleware, MobiPADS supports dynamic adaptation at both the middleware and application layers to provide flexible configuration of resources to optimize the operations of  mobile applications. Within theMobiPADS system, services are configured as chained service objects to provide augmented services to the underlying mobile applications so as to alleviate the adverse conditions of a wireless environment.

3 comments:

  1. execellent ,..............

    ReplyDelete
  2. Refer Seminars for u tab for Seminar Topics its very nice...........

    ReplyDelete