Wednesday, September 30, 2015

List Of Seminar Topics For Computer Science Page - 7

List Of Seminar Topics For Computer Science Page - 7


Synthetic Aperture Radar  (SAR)


A Synthetic Aperture Radar (SAR), or SAR, is a coherent mostly airborne or spaceborne sidelooking radar system which utilizes the flight path of the platform to simulate an extremely large antenna or aperture electronically, and that generates high-resolution remote sensing imagery. Over time, individual transmit/receive cycles (PRT's) are completed with the data from each cycle being stored electronically. The signal processing uses magnitude and phase of the received signals over successive pulses from elements of a synthetic aperture. After a given number of cycles, the stored data is recombined (taking into account the Doppler effects inherent in the different transmitter to target geometry in each succeeding cycle) to create a high resolution image of the terrain being over flown.

Scatternet


A scatternet is a type of network that is formed between two or more Bluetooth-enabled devices, such as smartphones and newer home appliances. A scatternet is made up of at least two piconets. Bluetooth devices are peer units that act as slaves or masters. Scatternets are formed when a device in a piconet, whether a master or a slave, decides to participate as a slave to the master of another piconet. This device then becomes the bridge between the two piconets, connecting both networks. In order for a scatternet to form, one Bluetooth unit must submit as a slave to another piconet to become a bridge for both networks. If the master of a piconet is the bridge to another piconet, it functions as a slave in the other piconet, even though it is a master of its own piconet. The device participating in both piconets can relay data between members of both networks.

Wine  (Windows Emulator)


Wine makes it possible to run Windows programs alongside any Unix-like operating system, particularly Linux. At its heart, Wine is an implementation of the Windows Application Programing Interface (API) library, acting as a bridge between the Windows program and Linux. Think of Wine as a compatibility layer, when a Windows program tries to perform a function that Linux doesn't normally understand, Wine will translate that program's instruction into one supported by the system. Wine is primarily developed for Linux, but the Mac OS X, FreeBSD, and Solaris ports are currently (as of January 2009) well maintained. Wine is also available for NetBSD, through pkgsrc, respectively.

Computer Forensics  (Cyber Forensics)


Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law. The goal of computer forensics is to perform a structured investigation while maintaining a documented chain of evidence to find out exactly what happened on a computing device and who was responsible for it. Adding the ability to practice sound computer forensics will help you ensure the overall integrity and survivability of your network infrastructure.

Cyborg


Cyborg, a compound word derived from cybernetics and organism, is a term coined by Manfred Clynes in 1960 to describe the need for mankind to artificially enhance biological functions in order to survive in the hostile environment of Space. Originally, a cyborg referred to a human being with bodily functions aided or controlled by technological devices, such as an oxygen tank, artificial heart valve or insulin pump. Over the years, the term has acquired a more general meaning, describing the dependence of human beings on technology. In this sense, cyborg can be used to characterize anyone who relies on a computer to complete their daily work.

Transactional memory


Transactional memory is a technology of concurrent threads synchronization. It simplifies the parallel programming by extracting instruction groups to atomic transactions. Concurrent threads operate paralleled till they start to modify the same memory chunk. For example, operations of nodes adding to the red/black tree (animation in the heading) can operate in parallel in several threads. Transactional memory allows programmers to de- fine customized read-modify-write operations that apply to multiple, independently-chosen words of memory. It is implemented by straightforward extensions to any multiprocessor cache-coherence protocol.

Internet Protocol Television  (IPTV)


Internet protocol television, or IPTV, uses a two-way digitalbroadcast signal that is sent through a switched telephone or cablenetwork by way of a broadband connection, along with a set top box programmed with software that can handle viewer requests to access media sources. A television is connected to the set top box that handles the task of decoding the IP video and converts it into standard television signals. IPTV primarily uses multicasting with Internet Group Management Protocol (IGMP) version 2 for live television broadcasts and Real Time Streaming Protocol for on-demand programs. Compatible video compression standards include H.264, Windows Media Video 9 and VC1, DivX, XviD, Ogg Theora and the MPEG-2 and -4.

Virtual Keyboard


A virtual keyboard is a keyboard that a user operates by typing (moving fingers) on or within a wireless or optical-detectable surface or area rather than by depressing physical keys. In one technology, the keyboard is projected optically on a flat surface and, as the user touches the image of a key, the optical device detects the stroke and sends it to the computer. The Virtual Keyboard uses light to project a full-sized computer keyboard onto almost any surface,and disappears when not in use. The Virtual Key (VKEY) provides a practical way to do email,word processing and spreadsheet tasks.

Multi-touch


Multi-touch, in a computing context, is an interface technology that enables input through pressure and gestures on multiple points on the surface of a device. Although most commonly used with touch screens on handheld devices, such as smartphonesand tablets, multi-touch has been adapted for other surfaces as well, including touch pads and mice, whiteboards, tables and walls. Gestures for multi-touch interfaces are often selected to be similar to real-life movements, so that the actions are intuitive and easily learned.
 

Electronic nose (e-nose)


An electronic nose (e-nose) is a device that identifies the specific components of an odor and analyzes its chemical makeup to identify it. An electronic nose consists of a mechanism for chemical detection, such as an array of electronic sensors, and a mechanism for pattern recognition, such as a neural network . Electronic noses have been around for several years but have typically been large and expensive. Electronic noses based on the biological model work in a similar manner, albeit substituting sensors for the receptors, and transmitting the signal to a program for processing, rather than to the brain.

1 comment:

  1. Thank You some Advanced Topics also available at ThesisScientist.com

    ReplyDelete