Seminars Topics


Latest Seminar Topics For CSE 2014    
Collection of latest seminar topics for CSE 2014. Download full latest seminar topics for CSE 2014 in doc, pdf or ppt format.


Virtual Reality New Seminar Topic

Virtual Reality (VR), sometimes called Virtual Environments (VE) has drawn much attention in the last few years. The Virtual Reality uses a huge number...

Java Ring New Seminar Topic

A Java Ring is a finger ring that contains a small microprocessor with built-in capabilities for the user. It contains an inexpensive microprocessor in a stainless...

Data Recovery New Seminar Topic

Data recovery is the process of salvaging data from damaged, failed, corrupted, or inaccessible secondary storage media when it cannot be accessed normally...

Continuous Neighbour Discovery in Asynchronous Sensor Network. New Seminar Topic

In most sensor networks the nodes are static. Nevertheless, node connectivity is subject to changes because of disruptions in wireless communication...

5 Pen Technology New Seminar Topic

Computer affects our life in a much bigger way then most of us might have thought. It has become a compulsory requirement in most professions to be able to...

Pervasive Computing

Pervasive computing refers to embedding computers and communication in our environment. Pervasive computing provides an attractive...

WEB Operating System

One of the hottest topics that emerged these days between the area of Internet and distributed computing and the area of operating system is Web Operating...

Automatically Generating Models for Botnet Detection

A botnet is a network of compromised hosts that is under the control of a single, malicious entity, often called the botmaster. We present a system that aims...

I-Cloud by Apple

iCloud is the latest branding of Apple's cloud computing services. It has previously been branded as iTools in 2000, .Mac in 2002, and MobileMe in 2008.iCloud...

Data Leakage Detection

A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). Some of the data is leaked and found in an unauthorized...

Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis

Preparing a data set for analysis is generally the most time consuming task in a data mining project, requiring many complex SQL queries, joining tables...

Cybernetic Organism

CYBORG, a compound word derived from cybernetics and organism, is a term coined by Manfred Clynes in 1960 to describe the need for mankind to artificially...

Ethical Hacking

What is hacking? Hacking is unauthorized use of computer and network resources. (The term "hacker" originally meant a very gifted programmer...

Parallel Databases

Parallel machines are becoming quite common and affordable Prices of microprocessors, memory and disks have dropped sharply Recent...

SMS Based Notice Board - Project

In present digitalized world, the exploit of GSM and SMS is popular. Notice Board is primary thing in any institution / organization or public utility places...

Disease Prediction using Data Mining

Data mining is defined as sifting through very large amounts of data for useful information. Some of the most important and popular data mining techniques...

Keyboard without Keys and Board

Computing is now not limited to desktops and laptops, it has found its way into mobile devices like palm tops and even cell phones. But what has not changed...

ZigBee Technolgy

ZigBee is a wireless technology designed for control and sensor networks. It defines a set of communication protocols for low-data-rate Short-range...

Genetic Algorithms

Genetic algorithms are stochastic search algorithms, which act on a population of possible solutions. They are loosely based on the mechanics of population...

Operating System

A program that controls the execution of application programs An interface between applications and hardware Memory Management Process...

MBMS-Multimedia Broadcast Multicast Service

This Document provides an overview of the multimedia broadcast/multicast service (MBMS) for universal mobile telecommunications system (UMTS) networks...

Store Management System - Project

The system creates a standalone system that enables a store to schedule its items purchase operations based on the daily update of sales from its customers...

Bluetooth Technology

Bluetooth is a radio frequency specification for short range, point to point and point to multi point voice and data transfer. Bluetooth technology facilitates...

Application of ANN in IPWISA

There is no universally accepted definition of ANN. But perhaps most people in the field would agree that ANN is a network of many simple processors, each...

Graph Based Search Engine

Search Engine has become a major tool for searching any information from the World Wide Web (WWW). While searching the huge digital library available in...

Synchronization Markup Language

The popularity of mobile computing and communications devices can be traced to their ability to deliver information to users when needed. Users want ubiquitous...

JMX Based Grid Management Services

The paper presents Global Discovery Service (GDS), configuration and deployment tools for Grid infrastructure and advanced monitoring services implemented...

Electronic Banking

E-Banking or electronic banking is A major innovation in the field of banking E-Banking is a facility under which the customers can perform basic banking...

Intorduction To ASP.Net

According to Microsoft, "ASP.NET is a technology for building powerful, dynamic Web applications and is part of the .NET Framework" .NET is language...

3-D Password for More Secure Authentication - Project

Current authentication systems suffer from many weaknesses. Textual passwords are commonly used; however, users do not follow their requirements...

Ambient Intelligence

Ambient Intelligence refers to an exciting new paradigm in information technology, in which people are empowered through a digital environment that...

Dynamic Data Grid Replication Strategy

In data grid, large quantity of data files is produced and data replication is applied to reduce data access time. Efficiently utilizing grid resources...

Phishing Technology

In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords...

Google Glass

Project Glass is a research and development program by Google to develop an augmented reality Head-Mounted Display (HMD). The intended purpose of Project...

Big Data-Enterprise Data

The amount of data in our world has been exploding. Companies capture trillions of bytes of information about their customers, suppliers, and operations...

Peer-to-Peer Systems: The Present and the Future

Nowadays Peer-to-Peer (P2P) systems became an important part of Internet, millions of users have been attracted to use their structures...

Information Protection in Academic Campuses: A Scalable Framework

Problem statement: Most institutions recognize the critical role that information security risk management plays in supporting their missions...

A new Method in Image Steganogray with Improved Quality

“Steganography” is a Greek origin word which means “hidden writing”. Steganography word is classified into two parts: Steganos which means “secret...

Toward a Passive Low-Cost In-Home Gait Assessment System for Older Adults

In this paper, we propose a webcam-based system for in-home gait assessment of older adults. A methodology has been developed to extract gait parameters...

Networked Media and 3D Internet

Also known as virtual worlds, the 3D Internet is a powerful new way for you to reach consumers, business customers, co-workers, partners, and students...

Microsoft Kinect Sensor Evaluation

USB 3.0 has transmission speeds of up to 5 Gbit/s, which is 10 times faster than USB2.0 (480 Mbit/s). USB 3.0 reduces the time required for data transmission...

An Efficient Approach for Mobile Asset Tracking Using Contexts

Due to the heterogeneity involved in smart interconnected devices, cellular applications, and surrounding (GPS-aware) environments there is a need to...

Cryptography-Advance Network Security

Technology is on the ascendancy ever since it came to the foray. New and innovative technologies have been invented all over the world across all sorts of...

Recent Trends in IT

Every day, people use computers in new ways. Computers and other electronic devices are becoming increasingly affordable. They continue to be more powerful...

Andriod Technology

Android is a software stack for mobile devices that includes an operating system, middleware and key applications. Android is a software platform and...

Money Pad-The Future Wallet

"Money in the 21st century will surely prove to be as different from the money of the current century as our money is from that of the previous century. Just...

Hadoop Technologies

Computing in its purest form has changed hands multiple times. First, from near the beginning mainframes were predicted to be the future of computing...

Blue Ray Disc

Blu-ray Disc (official abbreviation BD) is an optical disc storage medium which has a better format than the format of the DVD.  The name Blu-ray Disc...

Network Traffic Analyzer - Project

The rapid growth of Internet Traffic has emerged as a major issue due to the rapid development of various network applications and Internet services...

Mobile WiMAX

The capabilities of emerging technologies based on the IEEE 802.16e-2009 standard are being considered as a potential commercial off-the-shelf solution...

Internet as Marketing Tool

At the beginning of the century, social life was mostly local. It was followed by a period in which commodities were produced on a mass scale. Consumer Marketing...

WIFI Technology

Wi-Fi short for “wireless fidelity”—is the commercial name for the 802.11 products that have flooded the corporate wireless local area network (WLAN)...

I-Mode Technology

First introduced in Japan in February 1999 by NTT DoCoMo, i-mode is one of the world’s most successful servicesoffering wireless web browsing and e-mail...

Electronic Data Interchange In Reinsurance

Do business electronically Move away from paper Store & exchange business information digitally Use...

Cloud Computing PPT only

A Cloud is a graphical representation of Network / Internet Five Key Cloud Attributes:  Shared / pooled resources  Broad...

Ultra SPARC Processor Architecture

UltraSPARC Architecture have RISC Characteristics. But What is RISC ….? Reduced Instruction Set Computing, also called “load-store...

Computer Brain PPT only

Blue brain - The name of the world's first virtual brain. That means a machine that can function as human brain. Today scientists are in...

Current developments in Audio Authentication

Recent developments in the audio- authentication field include basic, preliminary audio analysis and advanced audio- authentication techniques that...

A Novel Method Of Compressing Speech With Higher Bandwidth Efficiency

This paper illustrates a novel method of speech compression and transmission. This method saves the transmission bandwidth required for the speech signal...

Artificial Intelligence and Global Risk

Computer systems are becoming commonplace; indeed, they are almost ubiquitous. We find them central to the functioning of most business, governmental...

Future Memory System

The upcoming problems requiring very huge computing power make us today looking properly for new technical solutions not only in terms of CPU enhancement...

B Tree File System

A method of organizing blocks on a storage device into files and directories. A data structure that translates the physical view of a disc...

Swarm Intelligence

SI is the property of a system whereby the collective behaviors of agents interacting locally with their environment cause coherent functional global patterns...

High Altitude Aeronautical Platforms

High Altitude Aeronautical Platform Stations (HAAPS) is the name of a technology for providing wireless narrowband and broadband telecommunication services...

In Memory Database

The profound improvements in computer architectures over the last decade gave rise to In-Memory Database technology. CPU performance (as measured by circuit...

Really Simple Syndication

RSS works by having a website maintain a list of notifications in the standard way on the website. This list of notifications is called the RSS Feed. To keep track...

Terabit Switching and Routings

The architecture of earliest routers was based on that of a computer as shown in Fig 2. It has a shared central bus, central CPU, memory and the Line cards for input...

Mobile Phones Security

As 3G networks are successfully deployed worldwide, opportunities are arising to deliver to end-users a multitude of services that satisfy their business...

Access Control Mechanism of emtocell

To remain competitive in the wireless communication market, vendors and operators need to take the reduction of both network cost and complexity as a priority...

Light Trees

Today, there is a general consensus that, in the near future, wide area networks (WAN)(such as, a nation wide backbone network) will be based on Wavelength...

Optical Satellite

Satellite cross links generally require narrower bandwidths for increased power concentration. We can increase the power concentration by increasing...

SIPE

Template matching is a classical problem in a scene analysis: given a reference image of an object, decide whether that object exists in a scene image under...

Fingerprints Technology

A fingerprint is an impression of the friction ridges of all or any part of the finger. A friction ridge is a raised portion of the epidermis on the pal mar (palm...

Tempest Echelon

Interception of communications is a method of spying commonly employed by intelligence services, whereas there can now be no doubt that the purpose of the...

Invisibility Technology

“Invisiblity” has not remained a thing of science fiction movie or story. Imagine when one will be able to disappear in the air and no one is able to see him...

Data Base Management System

Accessing audio and video used to be a simple matter - simple because of the simplicity of the access mechanisms and because of the poverty of the sources. An...

Blue Ray Disk

Blu-ray, also known as Blu-ray Disc (BD) is the name of a next-generation optical disc format jointly developed by the Blu-ray Disc Association (BDA), a group...

Bio Chips

Most of us won’t like the idea of implanting a biochip in our body that identifies us uniquely and can be used to track our location. That would be a major loss...

Light Detection And Ranging

LiDAR is an acronym for Light Detection And Ranging, sometimes also referred to as Laser Altimetry or Airborne Laser Terrain Mapping (ALTM). The LiDAR system...

Eye Gaze Communication

Imagine yourself being a intelligent, motivated, and working person in the fiercely competitive market of information technology, but just one problem...

Multi Protocol Label Switching

The devices that participate in the MPLS Protocol mechanisms can be classified into label-edge routers (LERs) and label-switching routers (LSRs). An LSR...

MAEMO

Maemo platform is composed of mainstream Linux and open source software widely deployed in the most popular Linux distributions. At its core is Hildon Application...

Autonomic Computing

Autonomic Computing” is a new vision of computing initiated by IBM. This new paradigm shifts the fundamental definition of the technology age from one of...

Extreme Programming

Extreme Programming (XP) is actually a deliberate and disciplined approach to software development. About six years old, it has already been proven at many...

Biometric Technology

BIOMETRICS refers to the automatic identification of a person based on his or her physiological or behavioral characteristics like fingerprint, or iris...

Futex

For these enterprise applications to run efficiently on Linux, or on any other operating system, the OS must provide the proper abstractions and services...

Parasitic Computing

Parasitic computing is programming technique where a program in normal authorized interactions with another program manages to get the other program to...

Quantum Cryptography

In this report I intend to demonstrate why many scientists now view quantum cryptography as the first ever completely unbreakable cipher, which will allow...

Syndication

In the modern fast paced lifestyle of people, the faster a person gets the information he or she is after, the more satisfied they become. Style of presentation...

Storage Area Network

A storage area network (SAN) is any high-performance network whose primary purpose is to enable storage devices to communicate with computer systems and...

Virtual Keyboard

Virtual Keyboard is a small Java application that lets you easily create multilingual text content on almost any existing platform and output it directly...

Tripwire Intrusion System

Tripwire is a reliable intrusion detection system. It is a software tool that checks to see what has changed in your system. It mainly monitors the key attribute...

XML Encryption

XML Encryption provides end-to-end security for applications that require secure exchange of structured data. XML itself is the most popular technology...

Wireless Internet Security

Internet enabled wireless devices continue to proliferate and are expected to surpass traditional Internet clients in the near future. This has opened up...

Hurd

When we talk about free software, we usually refer to the free software licenses. We also need relief from software patents, so our freedom is not restricted...

Human Computer Interface

The Human-Computer Interface (HCI) deals with the methods by which computers and their users communicate. It is the process of designing interface software...

HP Java

The explosion of java over the last year has been driven largely by its in role in bringing a new generation of interactive web pages to World Wide Web. Undoubtedly...

IPv6 Technology

IPv6 is sometimes also called the Next Generation Internet Protocol or IPng. IPv6 was recommended by the IPng Area Directors of the Internet Engineering Task...

HPCL Components

A simple way to understand how we achieve the separation of the compounds contained in a sample is to view the diagram in Figure G. Frequently called the data...

Multi Touch Technology

Multi-touch technology is an advanced human-computer interaction technique that recogonises multiple touch points and also includes the hardware devices...

Migration From GSM Network to GPRS

The General Packet Radio System (GPRS) is a new service that provides actual packet radio access for mobile Global System for Mobile Communications (GSM)...

Generic Visual Perception Processor

Generic visual perception processor is a single chip modeled on the perception capabilities of the human brain, which can detect objects in a motion video...

Generic Access Network

Generic Access Network (GAN) is a telecommunication system which extends mobile services voice, data and IP Multimedia Subsystem/Session Initiation Protocol...

Security Open Pages Integrated Grace

Open Pages®, an IBM company, is a leading provider of integrated governance, risk, and compliance (GRC) solutions for global corporations. OpenPages provides...

Delay Tolerant Networking

Increasingly, network applications must communicate with counterparts across disparate networking environments characterized by significantly different...

Brain Computer Interface

A brain-computer interface, sometimes called a direct neural interface or a brain machine interface, is a direct communication pathway between a human or...

HAWK Eye Sreeman

Hawk-Eye is the most sophisticated officiating tool used in any sport. It is accurate, reliable and practical: fans now expect and demand it to be a part of every...

Palladium Cryptography

Many organizations posses valuable information they guard closely. As more of this information is stored in computers the need of data security becomes increasingly...

Image Authentication Digital Watermarking

The enormous popularity of the World Wide Web in the early 1990's demonstrated the commercial potential of offering multimedia resources through the digital...

Graphical Passwords Authentication

The most common computer authentication method is to use alphanumerical usernames and passwords. This method has been shown to have significant drawbacks...

Electronic Eye

Eye is one the most important organs of the body.The human eye is an organ which reacts to light for several purposes. The visual system in the brain is too slow...

Remote Administrative Torrents

Remote Administration Trojans, also known as RATs are the most popular type of Trojans today. This type of Trojan allows the creator or who ever is using it to...

Sky X Technology

The Sky X system replaces TCP over satellite link with a protocol optimized for the long latency, high loss and asymmetric bandwidth conditions of the typical...

Face Recognition Technology

Wouldn’t you love to replace password based access control to avoid having to reset forgotten password and worry about the intergrity of your system? Wouldn’t...

ATM Using Fingerprint

Biometrics based authentication is a potential candidate toreplace password-based authentication. Among all the biometrics, fingerprint based identification...

Intel Centrino Mobile Technology

Intel Centrino mobile technology connects without wires. The new Intel Centrino mobile technology allows users to work, play and connect without wires and...

FREENET

This is an attempt to describe Freenet, an adaptive peer-to-peer network application that permits the publication, replication, and retrieval of data while...

EYEOS

The idea behind eyeOS is that the whole system lives in the web browser. The client must have only a web browser to work with eyeOS and all its applications, including...

Smart Card

The smart card is one of the latest additions to the world of information technology. Similar in size to today's plastic payment card, the smart card has a microprocessor...

Silent Sound Technology

You are in a movie theater or noisy restaurant or a bus etc where there is lot of noise around is big issue while talking on a mobile phone. But in the future this...

Self Defending Networks

The foundation for a self-defending network is integrated security - security that is native to all aspects of an organization. Every device in the network...

Iris Scanning

Biometrics is an automated method of capturing a person’s unique biological data that distinguishes him or her from another individual. Iris recognition...

Space Communications Protocol

The goal of the Space Communications Protocol Standards (SCPS) project is to provide a suite of standard data handling protocols which (from a user viewpoint)...

Intrution Detection Systems

A correct firewall policy can minimize the exposure of many networks however they are quite useless against attacks launched from within. Hackers are also...

Plastic Memory

Plastics have long formed the skeletons and skin of products, whereas silicon has supplied the brains. With the advent of polymer and crystalline organic...

Quantum Computing

The history of computer technology has involved a sequence of changes from one type of physical realisation to another --- from gears to relays to valves to...

Free Space Optics

Free Space Optics (FSO) or Optical Wireless, refers to the transmission of modulated visible or infrared (IR) beams through the air to obtain optical communications...

CyberTerrorism

Cyberterrorism is any act of terrorism that uses information systems or digital technology (computers or computer networks) as either an instrument or a...

Computer Virus

Computer Viruses are widely known as evil programs that are meant to corrupt the peaceful environment of a computer. Actually a computer virus is a piece of...

Diamond Chip

Electronics without silicon is unbelievable, but it will come true with the evolution of Diamond or Carbon chip. Now a day we are using silicon for the manufacturing...

E Cash Payment Systems

Electronic payment systems come in many forms including digital checks, debit cards, credit cards, and stored value cards. The usual security features for...

Brain Fingerprinting

Brain fingerprinting is based on finding that the brain generates a unique brain wave pattern when a person encounters a familiar stimulus Use of functional...

CAPCHA

We introduce CAPTCHA, an automated test that humans can pass, but current computer programs can't pass: any program that has high success over a captcha can...

Game Playing in Artificial Intelligence

Game playing was one of the first tasks undertaken in Artificial Intelligence. Game theory has its history from 1950, almost from the days when computers became...

Mobile Iptv

An IPTV signal is a stream of data packets traveling across the Web.Internet TV is relatively new -- there are lots of different ways to get it, and quality, content...

In Vehicle Networking

Today's vehicles contain hundreds of circuits, sensors, and many other electrical components. Communication is needed among the many circuits and functions...

IP Telephony

If you've never heard of Internet Telephony, get ready to change the way you think about long-distance phone calls. Internet Telephony, or Voice over Internet...

Rain Technology

RAIN technology is the most scalable software cluster technology for the Internet marketplace today. There is no limit on the size or the performance of a RAIN...

Internet Access via Cable TV Network

Internet is a network of networks in which various computers connect each other through out the world. The connection to other computers is possible with the...

Laptop Computer

Laptops are becoming as common as your cellular phone, and now they share the hardware industry as that of desktop computers with a number of configurable options...

Palm Vein

An individual first rests his wrist, and on some devices, the middle of his fingers, on the sensor's supports such that the palm is held centimeters above the...

Holographic Memory

Devices that use light to store and read data have been the backbone of data storage for nearly two decades. Compact discs revolutionized data storage in the...

Green Cloud

Cloud computing is offering utility oriented IT services to users worldwide. It enables hosting of applications from consumer, scientific and business...

Nokia Morph

The “Nokia Morph” is a theoretical future device based on nanotechnology that might enable future communication devices. It is intended to demonstrate...

Pill Camera

The aim of technology is to make products in a large scale for cheaper prices and increased quality. The current technologies have attained a part of it, but...

Protein Memory

Since the dawn of time, man has tried to record important events and techniques for everyday life. At first, it was sufficient to paint on the family cave wall...

Smart Memories

Trends in VLSI technology scaling demand that future computing devices be narrowly focused to achieve high performance and high efficiency, yet also target...

Speed Detection of Moving Vehicle Using Speed Cameras

Although there is good road safety performance the number of people killed and injured on our roads remain unacceptably high. So the roads safety strategy...

Spyware

Over the last several years, a loosely defined collection of computer software known as “Spyware” has become the subject of growing public alarm. Computer...

Tablet Personal Computer

A tablet PC is a laptop or slate-formed mobile computer that is outfitted with a touchscreen or screen that can be controlled with a digital pen or stylus, or...

Digital Investigation Process

Digital forensics has been defined as the use of scientifically derived and proven methods towards the preservation, collection, validation, identification...

Touch Screens

Touch-screens are typically found on larger displays, in phones with integrated PDA features. Most are designed to work with either your finger or a special...

Universal Broadband Connectivity

This paper outlines a migration path towards Universal Broadband Connectivity, motivated byhighlighting the advantages of and policy implications for...

Smart Quill

Lyndsay Williams of Microsoft Research's Cambridge UK lab is the inventor of the Smartquill,a pen that can remember the words that it is used to write, and then...

Gi-Fi

Gi-Fi will helps to push wireless communications to faster drive. For many years cables ruled the world. Optical fibers played a dominant role for its higher...

Chameleon Chip

A reconfigurable processor is a microprocessor with erasable hardware that can rewire itself dynamically. This allows the chip to adapt effectively to the...

Broadband over Power Line

Broadband over Power Line (BPL), also known as Power Line Communications (PLC) is a disruptive communications technology that enables power line infrastructure...

Steganography

Steganography is the art and science of communicating in a way which hides the the existence of the secret message communication. It aims to hide information...

Open Storage Leverages Soft

As a general term, open storage refers to storage systems built with an open architecture using industry-standard hardware and open-source software. In...

Detecting and Disabling Digital Cameras

The system locates the camera, and then neutralizes it. Every digital camera has an image sensor known as a CCD, which is retro reflective and sends light backing...

SIP - Session Initiation Protocol

SIP – A protocol that allows voice, data, fax, video, instant messaging and even online gaming to be integrated with web-based applications. The session...

Cloud Computing

Cloud computing has gained a lot of hype in the current world of I.T. Cloud computing is said to be the next big thing in the computer world after the internet.In...

Smart Quill

SmartQuill is slightly larger than an ordinary fountain pen. Users can enter information into these applications by pushing a button on the pen and writing...

Dense Wavelenth Division Multiplexing

The technology of combining a number of optical wavelengths and then transmitting the same through a single fibre is called wavelength division multiplexing...

IP-TV

Over the last few years, video over broadband in its various forms has been associated with the hype around convergence. Content digitization, new Broadband...

Rover Technology

Location-aware computing involves the automatic tailoring of information and services based on the current location of the user. We have designed and implemented...

Nano RAM

NRAM has a density, at least in theory, similar to that of DRAM. DRAM consists of a number of capacitors, which are essentially two small metal plates with...

Ubiquitous Networking

Mobile computing devices have changed the way we look at computing. Laptops and personal digital assistants (PDAs) have unchained us from our desktop computers...

Ultra Wide Band

UWB is a wireless technology that transmits binary data—the 0s and 1s that are the digital building blocks of modern information systems. It uses low-energy...

Mobile IP

The exponential growth of the Internet and the inexorable increase in native computing power of laptop computers and other digital wireless data communication...

Honeypots

Honeypot is an exciting new technology with enormous potential for the security community.It is resource which is intended to be attacked and compromised...

Digital Broadcasting Televisions

As digital broadcasting televisions are increasing and the high definition audiovisual content becomes popular rapidly, the data size of the audiovisual...

Distributed Databases

Users have access to the portion of the database at their location so that they can access the data relevant to their tasks without interfering with the work...

Discovering Conditional CFD

This paper investigates the discovery of conditional functional dependencies (CFDs). CFDs are a recent extension of functional dependencies (FDs) by supporting...

Digital Watermarking

A digital watermark is a digital signal or pattern inserted into a digital document such as text, graphics or multimedia, and carries information unique to...

Mobile Radio

Mobile radio or mobiles refer to wireless communications systems and devices which are based on radio frequencies, and where the path of communications is...

Linking and Loading Tech.

The basic job of any linker or loader is simple: it binds more abstract names to more concrete names, which permits programmers to write code using the more abstract...

Security Through Obscurity

As the information age progresses and data becomes more and more valuable, methods need to be discovered to protect and secure sensitive data. An original...

Flash Memory

Flash memory stores information in an array of memory cells made from floating-gate transistors. In traditional single-level cell (SLC) devices, each cell...

Data Warehousing

Data entering the data warehouse comes from operational environment in almost every case.Data warehousing provides architectures and tools for business...

GPRS

The GPRS specifications are written by the European Telecommunications Standard Institute (ETSI), the European counterpart of the American National...

Mind Reading Computer

A computer can, in a very real sense, read human minds. Although the dot's gyrations are directed by a computer, the machine was only carrying out the orders...

Image Identification System

Authentication is the first line of defense against compromising confidentiality and integrity . Though traditional login/password based schemes are...

Online Voting System

voter can use hisher voting right online without any difficulty. HeShe has to fill a registration form to register himselfherself. All the entries is checked...

Network Security Firewalls

Initially, there were not many threats to network security. With the Internet becoming more popular, more companies are doing business over the web. In addition...

Network Management Protocol

The Simple Network Management Protocol (SNMP), issued in 1988, was designed to provide an easily implemented, low-overhead foundation for multivendor...

Smart Email Security

Electronic Mail is one of the most used tools when it comes to business and personal communication in the world today. Notes, Messages and even Pictures can...

Space Mouse

The predecessor of the spacemouse was the DLR controller ball. Spacemouse has its origins in the late seventies when the DLR (German Aerospace Research Establishment)...

Tele Immersion

Tele immersion is a technology that will be implemented with Internet2 It will enable users in different geographical locations to come together and interact...

Ultrabook

Ultrabook device specification and roadmap changes made to the Intel®Core™ processors are enabling this new breed of devices. Ultrabook systems carry...

Virtualization Security in Cloud Computing

Virtualization is one of most important elements that makes Cloud computing. Virtualization is a technology to helping IT organizations optimize their...

Underwater Wireless

While wireless communication technology today has become part of our daily life, the idea of wireless undersea communications may still seem far-fetched...

Virtual Private Network

A Virtual Private Network connects the components of one network to another. Using tunneling or public network, a Virtual Private Network as name suggests...

Virtual Surgery

Rapid change is under way on sever fronts I medicine and surgery. Advance in computing power have enable continued growth in virtual reality, visualization...

Virus and Anti Viruses

Viruses: A virus is basically an executable file which is designed such that first of all it should be able to infect documents, then it has to have the ability...

Voice Browsers

A voice browser is a “device which interprets a (voice) markup language and is capable of generating voice output and/or interpreting voice input, and possibly...

WIMAX

There are several ways to get a fast Internet connection to the middle of nowhere. Until not too long ago, the only answer would have been "cable" — that is...

Voice Portals

In its most generic sense a voice portal can be defined as “speech enabled access to Web base information”. In other words, a voice portal provides telephone...

Windows DNA

Microsoft Windows Distributed interNet Applications Architecture (Windows DNA) is the application development model for the Windows platform. Windows...

Y2K38 Bug

The Y2k38 bug was detected a few months ago, but there was no actual testing done to prove that this will affect our current computers. Now this bug can actually...

WIRELESS USB

The Universal Serial Bus (USB), with one billion units in the installed base, is the most successful interface in PC history. Projections are for 3.5 billion...

Zero Knowledge Protocols and Proof Systems

Zero-knowledge protocols allow identification, key exchange and other basic cryptographic operations to be implemented without leaking any secret information...

WISENET

WISENET is a wireless sensor network that monitors the environmental conditions such as light, temperature, and humidity. This network is comprised of...

Migration to 4G

Second-generation (2G) mobile systems were very successful in the previous decade. Their success prompted the development of third generation (3G) mobile...

Embedded Systems and Information Appliances

Infact most microcomputers used within embedded systems- systems that perform some other function. The range of embedded systems is vast and includes all...

EDGE

EDGE is the next step in the evolution of GSM and IS- 136. The objective of the new technology is to increase data transmission rates and spectrum efficiency...

Dynamic Virtual Private Netwarks

Based on internet technology, intranets are becoming an essential part of corporate information systems today. However, internets were not originally...

IPv6 Protocol

The Internet is one of the greatest revolutionary innovations of the twentieth century. It made the 'global village Utopia ' a reality in a rather short span...

Symbian OS

Symbian OS is designed for the mobile phone environment. It addresses constraints of mobile phones by providing a framework to handle low memory situations...

Spectrum Pooling

Public mobile radio spectrum is a scarce resource while wide spectral ranges are only rarely used. Here, we consider a new strategy called Spectrum Pooling...

GPS

The GPS (Global Positioning System) is a “constellation” of 24 well-spaced satellites that orbit the Earth and make it possible for people with ground...

Wireless Application Protocol

WAP is a hot topic that has been widely hyped in the mobile industry and outside of it. It has become imperative for all Information Technology companies in Nordic...

Circuit Breakers By Software

Circuit breakers are crucial components for power system operation. The currently adapted time-directed maintenance strategy and the emerging new condition-based...

Border Security Using Wireless Integrated Network Sensors

Wireless Integrated Network Sensors (WINS) now provide a new monitoring and control capability for monitoring the borders of the country. Using this concept...

Biometrics

Reliable user authentication is becoming an increasingly important task in the Web-enabled world. The consequences of an insecure authentication system...

Haptics Technology

HAPTICS (pronounced HAP-tiks) is the science of applying touch (tactile) sensation and control to interaction with computer applications. By using special...

Automatic number plate recognition.

Automatic number plate recognition is a mass surveillance method that uses optical character recognition on images to read the licence plates on vehicles...

Neural Networks

Neural networks, as used in artificial intelligence, have traditionally been viewed as simplified models of neural processing in the brain, even though...

Data Compression Techniques

Data compression is the technique of converting an input data stream or the original data into another data stream which is shorter in length. There are many...

Broadband Technology

ICT and Bridging Digital Divide Bridging the digital divide initiatives’ between urban and rural in Malaysia have been significant since rise of Information...

Computerised Paper Evaluation Using Neural Network

Computers have revolutionized the field of education. The rise of internet has made computers a real knowledge bank providing distant education, corporate...

Computer Clothing

Wearable computer comprises of a computer built within an ordinary clothing. This transformation allows it to be worn constantly, with the goal of becoming...

Blue Brain

Human brain, the most valuable creation of God. The man is called intelligent because of the brain .Today we are developed because we can think, that other animals...

Bio-Molecular Computers

Molecular computing is an emerging field to which chemistry, biophysics, molecular biology, electronic engineering, solid state physics and computer...

Bandwidth Recycling

IEEE 802.16 standard was designed to support the bandwidth demanding applications with quality of service (QoS). Bandwidth is reserved for each application...

Artificial Passenger

The AP is an artificial intelligence–based companion that will be resident in software and chips embedded in the automobile dashboard. The heart of the...

3D Searching

From computer-aided design (CAD) drawings of complex engineering parts to digital representations of proteins and complex molecules, an increasing amount...

Artificial Consciousness

Artificial consciousness is a relatively new branch of computer science. But the idea is centuries old. A.C is a very philosophical area. There has been no...

An ATM with an Eye

The rise of technology in India has brought into force many types of equipment that aim at more customer satisfaction. ATM is one such machine which made money...

Airborne Internet

Airborne Internet is a private, secure and reliable peer-to-peer aircraft communications network that uses the same technology as the commercial Internet...

3D Password

Normally the authentication scheme the user undergoes is particularly very lenient or very strict. Throughout the years authentication has been a very interesting...

5G Technology

Mobile and wireless networks have made tremendous growth in the last fifteen years. Nowadays many mobile phones have also a WLAN adapter. One may suppose that...

3G vs WIFI

The two most important phenomena impacting telecommunications over the past decade have been explosive parallel growth of both the internet and mobile telephone...

Brain Gate

BrainGate is a brain implant system developed by the bio-tech company Cyberkinetics in 2003 in conjunction with the Department of Neuroscience at Brown University...

Bluetooth Configuration of an FPGA

Self-Reconfigurable modular robotics represents a new approach to robotic hardware. Instead of designing a new and different mechanical robot for each...

Bluetooth Based Smart Sensor Networks

The communications capability of devices and continuous transparent information routes are indispensable components of future oriented automation concepts...

Blue Eyes

The U.S. computer giant,IBM has been conducting research on the Blue Eyes technology at its Almaden Research Center (ARC) in San Jose, Calif., since 1997...

Viruses and Antiviruses

A computer program that causes it to be classified as a virus is not its ability to destroy data, but its ability to gain control of the computer and make a fully...

Bluejacking

Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers, sending...

Barcode Technology

BARCODE is a method of automatic identification & data collection, also known as the “Universal Product Code” (UPC). BARCODE is use the Binary System...

Artificial Intelligence

Artificial intelligence (AI) is defined as intelligence exhibited by an artificial entity. Such a system is generally assumed to be a computer. Although...

Antivirus Solutions

Virus attacks and intrusion attempts have been causing lots of troubles and serious damages to almost all the computer users. Ever the day, one starts using...

Android Technology

A mobile operating system, also referred to as mobile OS, is the operating system that operates a Smartphone, tablet, PDA, or other digital mobile devices...

Analog Communication Systems

Analog And Digital System Analog System: A string tied to a doorknob would be an analog system. They have a value that changes steadily...

Aeronautical Communication

The demand for making air traveling more 'pleasant, secure and productive for passengers is one of the winning factors for airlines and aircraft industry...