Saturday, September 19, 2015

List Of Seminar Topics For Computer Science - Page 2

List Of Seminar Topics For Computer Science - Page 2


Zettabyte file System  (ZFS)


ZFS - the Zettabyte File System - is an enormous advance in capability on existing file systems. It provides greater space for files, hugely improved administration and greatly improved data security.Files stored on a computer are managed by the file system of the operating system. When a computer is used to store illegal data such as child pornography, it is important that the existence
of the illegal data can be proven even after the data is deleted. In this study, a new functionality is added to the Zettabyte File System (ZFS) debugger, which digs into the physical disk of the computer without using the file system layer of the operating system.

MRAM  (Magnetic RAM / Magnetoresistive RAM)


MRAM (magnetoresistive random access memory) is a method of storing data bits using magnetic charges instead of the electrical charges used by DRAM (Dynamic Random Access Memory). Scientists define a metal as magnetoresistive if it shows a slight change in electrical resistance when placed in a magnetic field. By combining the high speed of static RAM and the high density of DRAM, proponents say MRAM could be used to significantly improve electronic products by storing greater amounts of data, enabling it to be accessed faster while consuming less battery power than existing electronic memory.

Voice XML 


VoiceXML is an application of the Extensible Markup Language (XML) which, when combined with voice recognition technology, enables interactive access to the Web through the telephone or a voice-driven browser. An individual session works through a combination of voice recognition and keypad entry.VoiceXML is designed for creating audio dialogs that feature synthesized speech, digitized audio, recognition of spoken and DTMF key input, recording of spoken input, telephony, and mixed initiative conversations. Its major goal is to bring the advantages of Web-based development and content delivery to interactive voice response applications.

JMX  (Java Management Extensions)


JMX (Java Management Extensions) is a set of specifications for application and network management in the J2EE development and application environment. JMX defines a method for Java developers to integrate their applications with existing network management software by dynamically assigning Java objects with management attributes and operations. By encouraging developers to integrate independent Java management modules into existing management systems, the Java Community Process (JCP) and industry leaders hope that developers will consider non-proprietary management as a fundamental issue rather than as an afterthought. A management interface, as defined by JMX, is composed of named objects - called MBeans (Management Beans). MBeans are registered with a name (an Object Name) in an MBeanServer.

Vtion Wireless Tech AG 


Vtion Wireless Technology AG, through its subsidiaries, provides wireless data card solutions for mobile computing through broadband wireless networks in the People's Republic of China. The company operates in three segments: Wireless Data Terminals, Wireless Intelligent Terminals, and All Others. The company primarily supplies wireless data card products and related after sales service support for the mobile use of computers; and interface conversion card products. It provides a range of 3G wireless data cards that fit PCMCIA, USB, Mini-USB, Express Card 34, and PCI Express Mini interfaces of laptops or personal computers. The company’s data cards are used primarily by business customers and governmental organizations to enable their employees to access a range of applications, including the Internet, e-mail, corporate intranet, remote databases, and corporate applications. I

HVD (Holographic Versatile Disc) 


HVD (Holographic Versatile Disc) is the next generation in optical disk technology. HVD is still in a research phase that would phenomenally increase the disk storage capacities over the currently existing HD DVD and Blu-ray optical disk systems. According to published statistics, when produced in full scale, HVDs will have a storage capacity of 3.9 terabytes (39,000 GB) and a data transfer rate of 1 GB/s, which is at least six times more than the speed of DVD players. This would, without a doubt, become a giant step in revolutionizing the disk storage industry. Holographic versatile disc (HVD) is a holographic storage format that looks like a DVD but is capable of storing far more data.

Tempest & Echelon


TEMPEST and ECHELON are the method of spying in a sophisticated manner; both are developed by National Security Agency (NSA) for monitoring the people. These technologies are originally developed for pure military espionage, but hackers use them now for spying in to other people’s activities.TEMPEST is a code word that relates to specific standards used to reduce electromagnetic emanations. Echelon is the technology for sniffing through the messages sent over a network or any transmission media, even it is wireless messages. Tempest is the technology for intercepting the electromagnetic waves over the air. It simply sniffs through the electromagnetic waves propagated from any device, even it is from the monitor of a computer screen.

DCCP (Datagram Congestion Control Protocol)


The Datagram Congestion Control Protocol (DCCP) is a transport protocol that provides bidirectional unicast connections of congestion-controlled unreliable datagrams. DCCP is suitable for applications that transfer fairly large amounts of data and that can benefit from control over the tradeoff between timeliness and reliability. DCCP is intended for applications such as streaming media that can benefit from control over the tradeoffs between delay and reliable in-order delivery. DCCP is a packet stream protocol, not a byte stream protocol. The application is responsible for framing.

Robotic Surgery


Robotic surgery is a method to perform surgery using very small tools attached to a robotic arm. The surgeon controls the robotic arm with a computer. Robotic surgery is similar to laparoscopic surgery. It can be performed through smaller cuts than open surgery. The small, precise movements that are possible with this type of surgery give it some advantages over standard endoscopic techniques.
The surgeon can make small, precise movements using this method. This can allow the surgeon to do a procedure through a small cut that once could be done only with open surgery.

Resilient packet ring system 


Resilient Packet Ring (RPR) technology is optimized for robust and efficient packet networking over a fiber ring topology. This technology incorporates extensive performance monitoring. Resilient Packet Ring (RPR) is a network topology being developed as a new standard for fiber optic rings. The Institute of Electrical and Electronic Engineers (IEEE) began the RPR standards (IEEE 802.17) development project in December 2000 with the intention of creating a new Media Access Control layer for fiber optic rings. The IEEE working group is part of the IEEE's local area network (LAN) and metropolitan area network (MAN) Committee. Fiber optic rings are widely deployed as part of both MANs and wide area networks (WANs); however, these topologies are dependent on protocols that aren't optimized or scalable to meet the demands of packet-switched networks.


1 comment:

  1. Interesting list! I have never heard about some points. Really interesting.
    I would also add the topic about data security systems and breaches within them. It is well known that business is suffering from hacker attacks and none of the data security systems can guarantee 100% defense. The most reliable are virtual data rooms (e.g. Ideals) for both small and big businesses.

    ReplyDelete