Showing posts with label Page. Show all posts
Showing posts with label Page. Show all posts

Friday, December 4, 2015

Zettabyte file System (ZFS)


Zettabyte file System  (ZFS)
 ZFS is a 128-bit file system developed by Sun Microsystems in 2005 for OpenSolaris. A Solaris file system that uses storage pools to manage physical storage. The ZFS pooled storage model eliminates the concept of volumes and the associated problems of partitions, provisioning and stranded storage by enabling thousands of file systems to draw from a common storage pool, using only as much space as it actually needs. ZFS also uses RAID-Z, a data replication model that is similar to RAID-5 but uses variable stripe width to eliminate the RAID-5 write hole-that is stripe corruption due to loss of power between data and parity updates. 

ZFS runs on Solaris, FreeBSD and Linux variants, and includes built-in data services and features such as replication, deduplication, compression, snapshots and data protection. The Sun development team began work on ZFS in 2001 and integrated it into the Unix-based Solaris and open source OpenSolaris operating systems in 2005.

After acquiring Sun in 2010, Oracle Corp. discontinued work on open source ZFS. The company trademarked the name "ZFS" and turned ZFS into its proprietary root file system for Oracle Solaris, Oracle's ZFS Storage Appliances, mainframe storage (VSM) and other Oracle technologies. Oracle continues to develop and add features to its proprietary ZFS. The open source version of ZFS is now known as OpenZFS.

Features  


  • Endless scalability
Well, it’s not technically endless, but it’s a 128-bit file system that’s capable of managing zettabytes (one billion terabytes) of data.  No matter how much hard drive space you have, ZFS will be suitable for managing it.

  • Maximum integrity
Everything you do inside of ZFS uses a checksum to ensure file integrity.  You can rest assured that your files and their redundant copies will not encounter silent data corruption.  Also, while ZFS is busy quietly checking your data for integrity, it will do automatic repairs anytime it can.

  • Drive pooling
The creators of ZFS want you to think of it as being similar to the way your computer uses RAM.  When you need more memory in your computer, you put in another stick and you’re done.  Similarly with ZFS, when you need more hard drive space, you put in another hard drive and you’re done.  No need to spend time partitioning, formatting, initializing, or doing anything else to your disks – when you need a bigger storage “pool,” just add disks.

  • RAID
ZFS is capable of many different RAID levels, all while delivering performance that’s comparable to that of hardware RAID controllers.  This allows you to save money, make setup easier, and have access to superior RAID levels that ZFS has improved upon.



References:-

http://www.webopedia.com/TERM/Z/ZFS.html
http://www.webopedia.com/TERM/Z/ZFS.html
http://www.howtogeek.com/175159/an-introduction-to-the-z-file-system-zfs-for-linux/

Thursday, October 1, 2015

List Of Seminar Topics For Computer Science Page - 8

 List Of Seminar Topics For Computer Science Page - 8


Beowulf


Beowulf is an approach to building a supercomputer as a cluster of commodity off-the-shelf personal computers, interconnected with a local area network technology like Ethernet, and running programs written for parallel processing. The Beowulf idea is said to enable the average university computer science department or small research company to build its own small supercomputer that can operate in the gigaflop (billions of operations per second) range. Beowulf can be implemented with typical personal computers. It is easy to expand for increased performance.

BitTorrent


BitTorrent (often abbreviated to 'BT') is a protocol that allows you to download files quickly and efficiently. It is a peer to peer protocol, which means you download and upload to other people downloading the same file. BitTorrent is often used for distribution of large files or popular content as it is a cheap, fast, efficient way to distribute files to users like you.Using a server and several clients on a network, BitTorrent is clocked alongside two traditional protocols to determine which takes the least amount of time. From its inauspicious start in 2001, bittorrent has grown to one of the major forces on the internet. BitTorrent prevents tampered or broken files from being shared.

Cloud Computing


Cloud computing is the phrase used to describe different scenarios in which computing resource is delivered as a service over a network connection (usually, this is the internet). Cloud computing is therefore a type of computing that relies on sharing a pool of physical and/or virtual resources, rather than deploying local or personal hardware and software. It is somewhat synonymous with the term ‘utility computing’ as users are able to tap into a supply of computing resource rather than manage the equipment needed to generate it themselves; much in the same way as a consumer tapping into the national electricity supply, instead of running their own generator.

Hyper Wiser


In virtualization technology, hypervisor is a software program that manages multiple operating systems (or multiple instances of the same operating system) on a single computer system. The hypervisor manages the system's processor, memory, and other resources to allocate what each operating system requires.  The first hypervisors were introduced in the 1960s to allow for different operating systems on a single mainframe computer. However, its current popularity is largely due to Linux and Unix. Around 2005, Linux and Unix systems started using virtualization technology to expand hardware capabilities, control costs, and improved reliability and security that hypervisors provided to these systems.

OpenFlow


OpenFlow is a protocol that allows a server to tell network switches where to send packets. In a conventional network, each switch has proprietary software that tells it what to do. With OpenFlow, the packet-moving decisions are centralized, so that the network can be programmed independently of the individual switches and data center gear. It is used for applications such as virtual machine mobility, high-security networks and next generation ip based mobile networks. Several established companies including IBM, Google, and HP have either fully utilized, or announced their intention to support, the OpenFlow standard.

Surface Computing


Surface computing is the term for the use of a specialized computer GUI in which traditional GUI elements are replaced by intuitive, everyday objects. Instead of a keyboard and mouse, the user interacts directly with a touch-sensitive screen.It is a natural user interface. Surface computer was created by Microsoft with surface. The term "surface" describes how it's used. There is no keyboard or mouse. All interactions with the computer are done via touching the surface of the computer's screen with hands or brushes, or via wireless interaction with devices such as smartphones, digital cameras or Microsoft's Zune music player.

Voice Morphing


Voice morphing (also known as voice transformation and voice conversion) is the software-generated alteration of a person's natural voice. The purpose may be to add audio effects to the voice, to obscure the identity of the person or to impersonate another individual. There are basically three inter-dependent issues that must be solved before building a voice morphing system. Firstly, it is important to develop a mathematical model to represent the speech signal so that the synthetic speech can be regenerated and prosody can be manipulated without artifacts. Secondly, the various acoustic cues which enable humans to identify speakers must be identified and extracted. Thirdly, the type of conversion function and the method of training and applying the conversion function must be decided.

FogScreen


The FogScreen is a new invention which makes objects seem to appear and move in thin air! The FogScreen is a suspensible device that creates a thin, smooth fog surface almost instantly when it is switched on. It can be used for image projection just like a conventional screen. FogScreen is, however, a screen you can walk through! The fog, made of ordinary water with no chemicals whatsoever, dissolves in seconds by itself, leaving no trace behind when you switch it off. The viewer can walk through the screen – walk directly into the picture! People and things can be brought into view through the screen. There are numerous other ways to use the FogScreen.

Microsoft Silverlight


Microsoft Silverlight is a cross-browser, cross-platform implementation of the .NET Framework for building and delivering the next generation of media experiences and rich internet applications (RIA) for the Web. Silverlight uses the Extensible Application Markup Language (XAML) to ease UI development (e.g. controls, animations, graphics, layout, etc) while using managed code or dynamic languages for application logic. Silverlight is a browser plug-in approximately 4MB in size, it is client side free software for easy and fast less than 10 sec one time installation available for any client side browsers. Silverlight supports the display of high-definition video files, and sending them over the Net.

Blade server


A blade server is a compact, self-contained server that consists of core processing components that fit into an enclosure with other blade servers. A single blade may consist of hot-plug hard-drives, memory, network cards, input/output cards and integrated lights-out remote management. The modular design of the blade server helps to optimize server performance and reduce energy costs. Each blade typically comes with one or two local ATA or SCSI drives. For additional storage, blade servers can connect to a storage pool facilitated by a network-attached storage (NAS), Fiber Channel, or iSCSI storage-area network (SAN).

Wednesday, September 30, 2015

List Of Seminar Topics For Computer Science Page - 7

List Of Seminar Topics For Computer Science Page - 7


Synthetic Aperture Radar  (SAR)


A Synthetic Aperture Radar (SAR), or SAR, is a coherent mostly airborne or spaceborne sidelooking radar system which utilizes the flight path of the platform to simulate an extremely large antenna or aperture electronically, and that generates high-resolution remote sensing imagery. Over time, individual transmit/receive cycles (PRT's) are completed with the data from each cycle being stored electronically. The signal processing uses magnitude and phase of the received signals over successive pulses from elements of a synthetic aperture. After a given number of cycles, the stored data is recombined (taking into account the Doppler effects inherent in the different transmitter to target geometry in each succeeding cycle) to create a high resolution image of the terrain being over flown.

Scatternet


A scatternet is a type of network that is formed between two or more Bluetooth-enabled devices, such as smartphones and newer home appliances. A scatternet is made up of at least two piconets. Bluetooth devices are peer units that act as slaves or masters. Scatternets are formed when a device in a piconet, whether a master or a slave, decides to participate as a slave to the master of another piconet. This device then becomes the bridge between the two piconets, connecting both networks. In order for a scatternet to form, one Bluetooth unit must submit as a slave to another piconet to become a bridge for both networks. If the master of a piconet is the bridge to another piconet, it functions as a slave in the other piconet, even though it is a master of its own piconet. The device participating in both piconets can relay data between members of both networks.

Wine  (Windows Emulator)


Wine makes it possible to run Windows programs alongside any Unix-like operating system, particularly Linux. At its heart, Wine is an implementation of the Windows Application Programing Interface (API) library, acting as a bridge between the Windows program and Linux. Think of Wine as a compatibility layer, when a Windows program tries to perform a function that Linux doesn't normally understand, Wine will translate that program's instruction into one supported by the system. Wine is primarily developed for Linux, but the Mac OS X, FreeBSD, and Solaris ports are currently (as of January 2009) well maintained. Wine is also available for NetBSD, through pkgsrc, respectively.

Computer Forensics  (Cyber Forensics)


Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law. The goal of computer forensics is to perform a structured investigation while maintaining a documented chain of evidence to find out exactly what happened on a computing device and who was responsible for it. Adding the ability to practice sound computer forensics will help you ensure the overall integrity and survivability of your network infrastructure.

Cyborg


Cyborg, a compound word derived from cybernetics and organism, is a term coined by Manfred Clynes in 1960 to describe the need for mankind to artificially enhance biological functions in order to survive in the hostile environment of Space. Originally, a cyborg referred to a human being with bodily functions aided or controlled by technological devices, such as an oxygen tank, artificial heart valve or insulin pump. Over the years, the term has acquired a more general meaning, describing the dependence of human beings on technology. In this sense, cyborg can be used to characterize anyone who relies on a computer to complete their daily work.

Transactional memory


Transactional memory is a technology of concurrent threads synchronization. It simplifies the parallel programming by extracting instruction groups to atomic transactions. Concurrent threads operate paralleled till they start to modify the same memory chunk. For example, operations of nodes adding to the red/black tree (animation in the heading) can operate in parallel in several threads. Transactional memory allows programmers to de- fine customized read-modify-write operations that apply to multiple, independently-chosen words of memory. It is implemented by straightforward extensions to any multiprocessor cache-coherence protocol.

Internet Protocol Television  (IPTV)


Internet protocol television, or IPTV, uses a two-way digitalbroadcast signal that is sent through a switched telephone or cablenetwork by way of a broadband connection, along with a set top box programmed with software that can handle viewer requests to access media sources. A television is connected to the set top box that handles the task of decoding the IP video and converts it into standard television signals. IPTV primarily uses multicasting with Internet Group Management Protocol (IGMP) version 2 for live television broadcasts and Real Time Streaming Protocol for on-demand programs. Compatible video compression standards include H.264, Windows Media Video 9 and VC1, DivX, XviD, Ogg Theora and the MPEG-2 and -4.

Virtual Keyboard


A virtual keyboard is a keyboard that a user operates by typing (moving fingers) on or within a wireless or optical-detectable surface or area rather than by depressing physical keys. In one technology, the keyboard is projected optically on a flat surface and, as the user touches the image of a key, the optical device detects the stroke and sends it to the computer. The Virtual Keyboard uses light to project a full-sized computer keyboard onto almost any surface,and disappears when not in use. The Virtual Key (VKEY) provides a practical way to do email,word processing and spreadsheet tasks.

Multi-touch


Multi-touch, in a computing context, is an interface technology that enables input through pressure and gestures on multiple points on the surface of a device. Although most commonly used with touch screens on handheld devices, such as smartphonesand tablets, multi-touch has been adapted for other surfaces as well, including touch pads and mice, whiteboards, tables and walls. Gestures for multi-touch interfaces are often selected to be similar to real-life movements, so that the actions are intuitive and easily learned.
 

Electronic nose (e-nose)


An electronic nose (e-nose) is a device that identifies the specific components of an odor and analyzes its chemical makeup to identify it. An electronic nose consists of a mechanism for chemical detection, such as an array of electronic sensors, and a mechanism for pattern recognition, such as a neural network . Electronic noses have been around for several years but have typically been large and expensive. Electronic noses based on the biological model work in a similar manner, albeit substituting sensors for the receptors, and transmitting the signal to a program for processing, rather than to the brain.

Friday, September 25, 2015

List Of Seminar Topics For Computer Science Page - 6

List Of Seminar Topics For Computer Science Page - 6


Windows Azure service platform


Windows Azure service platform is a cloud Platform as a Service (PaaS) by Microsoft. It enables the development and hosting of applications on Microsoft’s managed data center. According to Microsoft, Azure features and services are exposed using open REST protocols. The Azure client libraries, which are available for multiple programming languages, are released under an open source license and hosted on GitHub. Every new mobile application needs a powerful set of server side services to power it. With Windows Azure Cloud Services you have everything you need to build the most robust, scalable APIs you can dream up. Take advantage of instant access to infinite scale so you can handle huge success without having to write any new code.

Protein-based optical computing and memories


The current and potential uses of bacteriorhodopsin in optical computing and memory devices are reviewed. The protein has significant potential for use in these applications due to unique intrinsic photophysical properties, and the range of chemical and genetic methods available for optimizing performance for specific application environments. The intrinsic properties of the native bacteriorhodopsin protein are described. The applications of bacteriorhodopsin in spatial light modulators, integral components in a majority of one-dimensional and two-dimensional optical processing environments, and holographic associative memories are presented.

Object cache


Object cache is a simple module using Drupal's cache API to store and retrieve objects (nodes, comments, users etc) to speed up rendering of pages, to lower the number of requests to the database and so on which benefits both anonymous as authenticated users. Since the Drupal cache API is used, these objects can also live in memcache or any other storage mechanism you can think of. The object-cache element can be used to specify the ObjectCache implementation used by OJB.

Open Moxis


OpenMosix is a Linux kernel extension for single-system image clustering. This kernel extension turns a network of ordinary computers into a supercomputer for Linux applications. Once you have installed openMosix, the nodes in the cluster start talking to one another and the cluster adapts itself to the workload. Processes originating from any one node, if that node is too busy compared to others, can migrate to any other node. openMosix continuously attempts to optimize the resource allocation. OpenMosix achieves this with a kernel patch for Linux, creating a reliable, fast and cost-efficient SSI clustering platform that is linearly scalable and adaptive.

Next generation network   (NGN)


The next-generation network (NGN) enables the deployment of access independent services over converged fixed and mobile networks – The NGN is packet based and uses IP to transport the various types of traffic (voice, video, data and signalling). By definition, the NGN is essentially a managed IP-based (i.e., packet-switched) network that enables a wide variety of services. The Next Generation Network (NGN) is body of key architectural changes in telecommunication core and access networks. NGN is expected to completely reshape the present structure of communication system.

HDMI  (High Definition Multimedia Interface)


HDMI (High Definition Multimedia Interface) is a specification that combines video and audio into a single digital interface for use with digital versatile disc (DVD) players, digital television (DTV) players, set-top boxes, and other audiovisual devices. The basis for HDMI is High Bandwidth Digital Content Protection (HDCP) and the core technology of Digital Visual Interface (DVI). HDCP is an Intel specification used to protect digital content transmitted and received by DVI-compliant displays. HDMI has the capacity to support existing high-definition video formats such as 720p, 1080i, and 1080p, along with support of enhanced definition formats like 480p, as well as standard definition formats such as NTSC or PAL.

Smart Drive updater v3.0


Smart driver updater v3.0.exe is a type of EXE file associated with Smart Driver Updater developed by DR.Ahmed Saker for the Windows Operating System. The latest known version of Smart driver updater v3.0.exe is 5.0.0.0, which was produced for Windows 7. This EXE file carries a popularity rating of 1 stars and a security rating of "UNKNOWN". EXE ("executable") files, such as smart driver updater v3.0.exe, are files that contain step-by-step instructions that a computer follows to carry out a function. When you "double-click" an EXE file, your computer automatically executes these instructions designed by a software developer (eg. DR.Ahmed Saker) to run a program (eg. Smart Driver Updater) on your PC.

Face Recognition Technology


Face recognition technology is the least intrusive and fastest biometric technology. It works with the most obvious individual identifier – the human face. Facial recognition technology (FRT) has emerged as an attractive solution to address many contemporary needs for identification and the verification of identity claims. It brings together the promise of other biometric systems, which attempt to tie identity to individually distinctive features of the body, and the more familiar functionality of visual surveillance systems. Instead of requiring people to place their hand on a reader(a process not acceptable in some cultures as well as being a source of illness transfer) or precisely position their eye in front of a scanner, face recognition systems unobtrusively take pictures of people's faces as they enter a defined area.

Web 2.0


Web 2.0 is the current state of online technology as it compares to the early days of the Web, characterized by greater user interactivity and collaboration, more pervasive network connectivity and enhanced communication channels. Web 2.0 basically refers to the transition from static HTML Web pages to a more dynamic Web that is more organized and is based on serving Web applications to users. One of the most significant differences between Web 2.0 and the traditional World Wide Web (WWW, retroactively referred to as Web 1.0) is greater collaboration among Internet users, content providers and enterprises.

Smart Camera


Smart camera is a label which refers to cameras that have the ability to not only take pictures but also more importantly make sense of what is happening in the image and in some cases take some action on behalf of the camera user. Smart cameras are generally less expensive to purchase and set up than the PCbased solution, since they include the camera, lenses, lighting (sometimes), cabling and processing. Software tools available with smart cameras are of the point-and-click variety and are easier to use than those available on PC's. Algorithms come pre-packaged and do not need to be developed, thus making the smart camera quicker to setup and use.



 


List Of Seminar Topics For Computer Science Page - 5

List Of Seminar Topics For Computer Science Page - 5


Femtocell Technology


Femto cells or femtocells are small cellular telecommunications base stations that can be installed in residential or business environments either as single stand-alone items or in clusters to provide improved cellular coverage within a building. It is widely known that cellular coverage, especially for data transmission where good signal strengths are needed is not as good within buildings. Femtocells are compatible with CDMA2000,WiMAX or UMTS mobile telephony devices, using the provider's own licensed spectrum to operate. Typically, consumer-oriented femtocells will support no more than four active users, while enterprise-grade femtocells can support up to 16 active users.


Inferno OS


Inferno is an operating system for creating and supporting distributed services. It was originally developed by the Computing Science Research Center of Bell Labs, the R&D arm of Lucent Technologies, and further developed by other groups in Lucent. Inferno was designed specifically as a commercial product, both for licensing in the marketplace and for use within new Lucent offerings. It encapsulates many years of Bell Labs research in operating systems, languages, on-the-fly compilers, graphics, security, networking and portability. Inferno runs directly on native hardware and also as an application providing a Virtual Operating System over other platforms. Applications can be developed and run on all Inferno platforms without modification or recompilation.

i Phones


iPhone is a smartphone made by Apple that combines an iPod, a tablet PC, a digital camera and a cellular phone. The device includes Internet browsing and networking capabilities. The iPhone also includes a 3.5-inch multi-touch screen (4-inch Retina Display on the iPhone 5), rather than a keyboard, that can be manipulated by users with by two finger touches. The iPhone runs on a special version of Apple'sMac OS X operating system. Like iPod, iPhone synchronizes data with a user's personal computer, using iTunes as a client software and Apple's proprietary USB port. Apple says that iPhone carries 8 hours of life on the internal lithium-ion battery for talk or video, and up to 24 hours for music mode.

Project Natal 


Project Natal is Microsoft's 3D camera for Xbox 360. It tracks people's motions in three dimensions and has a microphone capable of voice recognition. It is to be used as a controller-free method of playing video games, tracking the player's body movements and voice and transferring that information directly to the gaming console. Microsoft has described the code name as having several sources. "The name "Project Natal" has several sources. Project Natal will allow users to interact with other users using its camera. Project Natal can recognize more than one person at a time.

Next-Generation Secure Computing Base  (NGSCB)


The Next Generation Secure Computing Base (NGSCB) is a part of the Microsoft Vista operating system (OS) that employs a trusted platform module (TPM), a specialized chip that can be installed on the motherboard of a personal computer (PC) or server for the purpose of hardware authentication. The TPM stores information specific to the host system, such as encryption keys, digital certificates and passwords. NGSCB employs a unique hardware and software design to enable new kinds of secure computing capabilities to provide enhanced data protection, privacy and system integrity.

Photosynth


Microsoft have released a new application called photosynth. Any smartphone that has a compass and tilt reading capability can use it. Photosynth offers two styles for creating immersive 3D experiences: panoramas and synths. Shoot a panorama when you can capture everything from a single location with a single zoom level. Great for giving a sense of what it feels like to be in one particular place. Can be 360° in both directions, but doesn't have to be.

Deep Web


Current automatic wrappers using DOM tree and visual properties of data records to extract the required information from the deep web generally have limitations such as the inability to check the similarity of tree structures accurately. Data records located in the deep web do not only share similar visual properties and tree structures, but they are also related semantically in their contents.There's a part of the Internet is known as the deep web. Deep web is called the deep web because of its massive size, it's literally 'deep'. According to the guardian, you can only access 0.03% of the Internet via search engines like Google and the rest is what makes up the deep web.

Semantic web


In addition to the classic “Web of documents” W3C is helping to build a technology stack to support a “Web of data,” the sort of data you find in databases. The ultimate goal of the Web of data is to enable computers to do more useful work and to develop systems that can support trusted interactions over the network. The term “Semantic Web” refers to W3C’s vision of the Web of linked data. Semantic Web technologies enable people to create data stores on the Web, build vocabularies, and write rules for handling data. In addition to the classic “Web of documents” W3C is helping to build a technology stack to support a “Web of data,” the sort of data you find in databases. The ultimate goal of the Web of data is to enable computers to do more useful work and to develop systems that can support trusted interactions over the network. 

HTML 5


HTML 5 is a revision of the Hypertext Markup Language (HTML), the standard programming language for describing the contents and appearance of Web pages. HTML5 was developed to solve compatibility problems that affect the current standard, HTML4. One of the biggest differences between HTML5 and previous versions of the standard is that older versions of HTML require proprietary plugins and APIs. (This is why a Web page that was built and tested in one browser may not load correctly in another browser.) HTML5 provides one common interface to make loading elements easier.

Ethical Hacking


Ethical hacking is also known as penetration testing, intrusion testing and red teaming. It is also known as detecting, reporting, exploiting, security vulnerabilities. The state of security on the internet is bad and getting worse. One reaction to this state of affairs is termed as Ethical Hacking which attempts to increase security protection by identifying and patching known security vulnerabilities on systems owned by other parties. Ethical hacking is solely done to find system vulnerabilities, to find weak areas in system security which can cause loss of vital information. It is different from peripheral defense and network defense, which enables system owners to adopt stronger security, measures in a way so that an attacker knows if he is committing an attack.

 


Tuesday, September 22, 2015

List Of Seminar Topics For Computer Science Page - 4

List Of Seminar Topics For Computer Science Page - 4


Biochip


A biochip is a collection of miniaturized test sites (microarrays) arranged on a solid substrate that permits many tests to be performed at the same time in order to achieve higher throughput and speed. Typically, a biochip's surface area is no larger than a fingernail. Like a computer chip that can perform millions of mathematical operations in one second, a biochip can perform thousands of biological reactions, such as decoding genes, in a few seconds. Biochips are commonly defined as devices that contain tens of millions of individual sensor elements or biosensors. These sensors are packed together into a package of a micron size. Thus, the biochips are arrays of biological material fixed to a solid surface with a high density of integration. These biochips are often made using the same micro fabrication technology as used in making of conventional microchips.

Autonomic Computing


Autonomic computing is a computer's ability to manage itself automatically through adaptive technologies that further computing capabilities and cut down on the time required by computer professionals to resolve system difficulties and other maintenance such as software updates. he goal of autonomic computing is to create systems that run themselves, capable of high-level functioning while keeping the system's complexity invisible to the user. Autonomic computing is one of the building blocks of pervasive computing, an anticipated future computing model in which tiny - even invisible - computers will be all around us, communicating through increasingly interconnected networks.

Artificial Passenger  (AP)


The AP is an artificial intelligence-based companion that will be resident in software and chips embedded in the automobile dashboard. The heart of the system is a conversation planner that holds a profile of you, including details of your interests and profession. IBM has developed a prototype that holds a conversation with a driver, telling jokes and asking questions intended to determine whether the driver can respond alertly enough. Assuming the IBM approach, an artificial passenger would use a microphone for the driver and a speech generator and the vehicle's audio speakers to converse with the driver.

Optical camouflage


Optical camouflage is a hypothetical type of active camouflage currently only in a very primitive stage of development. The idea is relatively straightforward: to create the illusion of invisibility by covering an object with something that projects the scene directly behind that object. Camouflage is a method of crypsis (hiding). It allows an otherwise visible organism or object to remain unnoticed, by blending with its environment. Optical camouflage uses the retro-reflective projection technology, a projection-based augmented-reality system composed of a projector with a small iris and a retro-reflective screen. The object that needs to be made transparent is painted or covered with retro-reflective material. Then a projector projects the background image on it making the masking object virtually transparent.

Green Computing  (Green IT)


Green computing is an umbrella term, referring to an eco-conscious way of developing, using and recycling technology, as well as utilizing resources in a more planet-friendly manner. It is "the study and practice of designing, manufacturing, using, and disposing of computers, servers, and associated subsystems—such as monitors, printers, storage devices, and networking and communications systems—efficiently and effectively with minimal or no impact on the environment. Green IT also strives to achieve economic viability and improved system performance and use, while abiding by our social and ethical responsibilities. Thus, green IT includes the dimensions of environmental sustainability, the economics of energy efficiency, and the total cost of ownership, which includes the cost of disposal and recycling. It is the study and practice of using computing resources efficiently."

Space Mouse


The SpaceMouse is a peripheral tool for controlling three-dimensional objects created by computer programmers. This tool represents part of the vanguard of a class of three-dimensional mouse products that allow users to use more natural movements in manipulating three-dimensional objects on a screen. A three-dimensional mouse has its own system of controls and its own signals that need to be interpreted by an operating system and/or application. Space Mouse is a professional 3D controller specifically designed for manipulating objects in a 3D environment. It permits the simultaneous control of all six degrees of freedom - translation rotation or a combination. . The device serves as an intuitive man-machine interface.

MPEG 7  (Multimedia Content Description Interface)


MPEG-7, formally known as the Multimedia Content Description Interface, includes standardized tools (descriptors, description schemes, and language) enabling structural, detailed descriptions of audio-visual information at different granularity levels (region, image, video segment, collection) and in different areas (content description, management, organization, navigation, and user interaction). It aims to support and facilitate a wide range of applications, such as media portals, content broadcasting, and ubiquitous multimedia. We present a high-level overview of the MPEG-7 standard. More specifically, MPEG-7 specifies color, texture, object shape, global motion, or object motion features for this purpose.

Smart quill


Smart quill is the one of the most important type of pen that can remember the words that can be used to write and helpful to transform the same words into the computer text. In this way Smart Quill is related to the computer. It is absolutely related to the new millennium era. Smart quill is very different from digital pens and it is a fountain pen sized handheld computer. This is developed by Williams a scientist from Microsoft research laboratory. Smart quill can be said as the pen computer which was a working prototype. Smart Quill contains sensors that record movement by using the earth's gravity system, irrespective of the platform used. The pen records the information inserted by the user.

Co-operative Linux


Cooperative Linux is the first working free and open source method for optimally running Linux on Microsoft Windows natively. More generally, Cooperative Linux (short-named coLinux) is a port of the Linux kernel that allows it to run cooperatively alongside another operating system on a single machine. Cooperative Linux allows the use of native Linux applications without having to switch operating systems, rebooting, or using more resource-consuming full virtualization solutions. It also ensures continued full compatibility with Windows applications.

Universal Robotic System (URCS)


The design and development of a universal robot control system (URCS) that would enable computation-intensive control algorithms to be implemented and modified is reported. This required shifting from hardware to software, using high-performance computing platforms. In general, multiprocessing has been found to be a cost-effective method for increasing performance, especially when the control algorithm can be composed into concurrent computational tasks. The URCS was developed using the University of Toronto Multiprocessor System (TUNIS) as the computing platform.











 





 



Saturday, September 19, 2015

List Of Seminar Topics For Computer Science Page - 3

List Of Seminar Topics For Computer Science Page - 3


E Paper


E-paper (sometimes called radio paper or just electronic paper) is a portable, reusable storage and display medium that looks like paper but can be repeatedly written on (refreshed) - by electronic means - thousands or millions of times. E-paper will be used for applications such as e-books, electronic newspapers, portable signs, and foldable, rollable displays. Information to be displayed is downloaded through a connection to a computer or a cell phone, or created with mechanical tools such as an electronic "pencil". An e-paper display actually uses no power when the image is not changing.

Smart Fabrics


The term “Smart Fabrics” refers to a broad and somewhat ill-defined field of study and products that extend the functionality and usefulness of fabrics. Humanity has used various types of fabrics for thousands of years to keep warm, provide comfort, and protect from the elements of nature. For most of recorded history, fabrics have also provided a means of self-expression through colors, patterns, cuts, and other stylistic elements. The basic technological elements of smart fabric are conductive or semiconductive threads and yarns, nanoelectronics applied directly to fibers, yarns, or woven elements, and chemical treatments that provide different features.smart fabrics are designed to maximise characteristics such as lightness, breathability, waterproofing etc, or to react to heat or light. They are usually manufactured using microfibres.

Intel Santa Rosa


As with all Centrino platforms, Santa Rosa is the codename given to a combination of Intel components: CPU, chipset and wireless Ethernet. With Santa Rosa there's a new optional fourth component, now called Intel Turbo Memory but at one point it was known as Robson. The Santa Rosa CPU is the same 65nm Merom based Core 2 Duo processor that was introduced last year with a few minor changes. The most noticeable change is that Santa Rosa CPUs can support up to an 800MHz FSB, up from 667MHz. The Core 2 Duo is a data hungry CPU, and thus giving it a faster FSB should improve overall performance when plugged in. A faster FSB is also necessary as Intel increases clock speeds; the faster your CPU runs, the faster it needs data to work on in order to operate efficiently.

Optical Computers 


An optical computer (also called a photonic computer) is a device that uses the photons in visible light or infrared ( IR ) beams,rather than electric current, to perform digital computations. An electric current flows at only about 10 percent of the speed of light. This limits the rate at which data can be exchanged over long distances, and is one of the factors that led to the evolution of optical fiber .The computers we use today use transistors and semiconductors to control electricity. Computers of the future may utilize crystals and metamaterials to control light. Optical computers make use of light particles called photons.

Plasmonics


Plasmonics is the study of the interaction between electromagnetic field and free electrons in a metal. Free electrons in the metal can be excited by the electric component of light to have collective oscillations. However, due to the Ohmic loss and electron-core interactions, loss are inevitable for the plasmon oscillation, which is usually detrimental to most plasmonic devices. Meanwhile, the absorption of light can be enhanced greatly in the metal by proper designing metal patterns for SP excitation. Plasmonics takes advantage of the coupling of light to charges like electrons in metals, and allows breaking the diffraction limit for the localization of light into subwavelength dimensions enabling strong field enhancements.

Wireless USB



Wireless USB (WUSB) is a form of Universal Serial Bus ( USB ) technology that uses radio-frequency ( RF ) links rather than cables to provide the interfaces between a computer and peripherals, such as monitors, printers, external drives, head sets, MP3 players and digital cameras. The WUSB technology is based on the WiMedia ultra wideband common radio platform. An advantage of using a wireless USB is the ability to sync to a multiple media devices. The disadvantages to using a wireless USB is the device may run slower than normal, there is a risk of damage because of the USB is sticking out of the computer, and there is a greater risk of having information hacked.

Ajax  (Asynchronous JavaScript and XML)


AJAX is not a new programming language, but a new way to use existing standards. AJAX is the art of exchanging data with a server, and updating parts of a web page - without reloading the whole page. AJAX is a new technique for creating better, faster, and more interactive web applications with the help of XML, HTML, CSS, and Java Script. Ajax uses XHTML for content, CSS for presentation, along with Document Object Model and JavaScript for dynamic content display. Ajax is a client-side script that communicates to and from a server/database without the need for apostback or a complete page refresh.

ZIGBEE


ZigBee is the wireless language that everyday devices use to connect to one another. ZigBee is designed for wireless Automation and other lower data tasks, such assmart home automation and remote monitoring. ZigBee is a low-cost, low-power,wireless mesh networking standard. The low cost allows the technology to be widelydeployed in wireless control and monitoring applications, the low power usage allowslonger life with smaller batteries, and the mesh networking provides high reliability andlarger range. Due to the low-cost and low-power usage this wireless technology is widelyused in Home Automation, Smart Energy, Telecommunication Applications, PersonalHome, Hospital Care. ZigBee enables new opportunities for wireless sensors and controlnetworks. ZigBee is standard based,low cost, can be used globally, reliable and self healing, supports large number of nodes, easy to deploy ,very long battery life and secure.


Polymer Memory


Polymer memory refers to memory technologies based on the use of organic polymers. Some of these technologies use changes in the resistance of conducting polymers under read/write control. Other architectures are based on ferroelectric polymers. The properties of polymer memory are low-cost and high-performance, and have the potential for 3D stacking and mechanical flexibility. Variants can be write-once or multiple-write. Printed versions of this technology already exist and are used in low-density applications such as toys.

Bio - Computer



BIO computer use system of biologically derived molecules such as DNA and protein to perform computational caculations, retreiving and processing data. Biocomputing is one of the upcoming field in the areas of mole-cularelectronics and nanotechnology. The idea behind blending biology with technology is due to the limitations faced by the semiconductor designers in decreasing the size of the silicon chips, which directly affects the processor speed. Biocomputers consists of biochips unlike the normal computers, which are silicon-based computers. This biochip consists of biomaterial such as nucleic acid, enzymes, etc.

List Of Seminar Topics For Computer Science - Page 2

List Of Seminar Topics For Computer Science - Page 2


Zettabyte file System  (ZFS)


ZFS - the Zettabyte File System - is an enormous advance in capability on existing file systems. It provides greater space for files, hugely improved administration and greatly improved data security.Files stored on a computer are managed by the file system of the operating system. When a computer is used to store illegal data such as child pornography, it is important that the existence
of the illegal data can be proven even after the data is deleted. In this study, a new functionality is added to the Zettabyte File System (ZFS) debugger, which digs into the physical disk of the computer without using the file system layer of the operating system.

MRAM  (Magnetic RAM / Magnetoresistive RAM)


MRAM (magnetoresistive random access memory) is a method of storing data bits using magnetic charges instead of the electrical charges used by DRAM (Dynamic Random Access Memory). Scientists define a metal as magnetoresistive if it shows a slight change in electrical resistance when placed in a magnetic field. By combining the high speed of static RAM and the high density of DRAM, proponents say MRAM could be used to significantly improve electronic products by storing greater amounts of data, enabling it to be accessed faster while consuming less battery power than existing electronic memory.

Voice XML 


VoiceXML is an application of the Extensible Markup Language (XML) which, when combined with voice recognition technology, enables interactive access to the Web through the telephone or a voice-driven browser. An individual session works through a combination of voice recognition and keypad entry.VoiceXML is designed for creating audio dialogs that feature synthesized speech, digitized audio, recognition of spoken and DTMF key input, recording of spoken input, telephony, and mixed initiative conversations. Its major goal is to bring the advantages of Web-based development and content delivery to interactive voice response applications.

JMX  (Java Management Extensions)


JMX (Java Management Extensions) is a set of specifications for application and network management in the J2EE development and application environment. JMX defines a method for Java developers to integrate their applications with existing network management software by dynamically assigning Java objects with management attributes and operations. By encouraging developers to integrate independent Java management modules into existing management systems, the Java Community Process (JCP) and industry leaders hope that developers will consider non-proprietary management as a fundamental issue rather than as an afterthought. A management interface, as defined by JMX, is composed of named objects - called MBeans (Management Beans). MBeans are registered with a name (an Object Name) in an MBeanServer.

Vtion Wireless Tech AG 


Vtion Wireless Technology AG, through its subsidiaries, provides wireless data card solutions for mobile computing through broadband wireless networks in the People's Republic of China. The company operates in three segments: Wireless Data Terminals, Wireless Intelligent Terminals, and All Others. The company primarily supplies wireless data card products and related after sales service support for the mobile use of computers; and interface conversion card products. It provides a range of 3G wireless data cards that fit PCMCIA, USB, Mini-USB, Express Card 34, and PCI Express Mini interfaces of laptops or personal computers. The company’s data cards are used primarily by business customers and governmental organizations to enable their employees to access a range of applications, including the Internet, e-mail, corporate intranet, remote databases, and corporate applications. I

HVD (Holographic Versatile Disc) 


HVD (Holographic Versatile Disc) is the next generation in optical disk technology. HVD is still in a research phase that would phenomenally increase the disk storage capacities over the currently existing HD DVD and Blu-ray optical disk systems. According to published statistics, when produced in full scale, HVDs will have a storage capacity of 3.9 terabytes (39,000 GB) and a data transfer rate of 1 GB/s, which is at least six times more than the speed of DVD players. This would, without a doubt, become a giant step in revolutionizing the disk storage industry. Holographic versatile disc (HVD) is a holographic storage format that looks like a DVD but is capable of storing far more data.

Tempest & Echelon


TEMPEST and ECHELON are the method of spying in a sophisticated manner; both are developed by National Security Agency (NSA) for monitoring the people. These technologies are originally developed for pure military espionage, but hackers use them now for spying in to other people’s activities.TEMPEST is a code word that relates to specific standards used to reduce electromagnetic emanations. Echelon is the technology for sniffing through the messages sent over a network or any transmission media, even it is wireless messages. Tempest is the technology for intercepting the electromagnetic waves over the air. It simply sniffs through the electromagnetic waves propagated from any device, even it is from the monitor of a computer screen.

DCCP (Datagram Congestion Control Protocol)


The Datagram Congestion Control Protocol (DCCP) is a transport protocol that provides bidirectional unicast connections of congestion-controlled unreliable datagrams. DCCP is suitable for applications that transfer fairly large amounts of data and that can benefit from control over the tradeoff between timeliness and reliability. DCCP is intended for applications such as streaming media that can benefit from control over the tradeoffs between delay and reliable in-order delivery. DCCP is a packet stream protocol, not a byte stream protocol. The application is responsible for framing.

Robotic Surgery


Robotic surgery is a method to perform surgery using very small tools attached to a robotic arm. The surgeon controls the robotic arm with a computer. Robotic surgery is similar to laparoscopic surgery. It can be performed through smaller cuts than open surgery. The small, precise movements that are possible with this type of surgery give it some advantages over standard endoscopic techniques.
The surgeon can make small, precise movements using this method. This can allow the surgeon to do a procedure through a small cut that once could be done only with open surgery.

Resilient packet ring system 


Resilient Packet Ring (RPR) technology is optimized for robust and efficient packet networking over a fiber ring topology. This technology incorporates extensive performance monitoring. Resilient Packet Ring (RPR) is a network topology being developed as a new standard for fiber optic rings. The Institute of Electrical and Electronic Engineers (IEEE) began the RPR standards (IEEE 802.17) development project in December 2000 with the intention of creating a new Media Access Control layer for fiber optic rings. The IEEE working group is part of the IEEE's local area network (LAN) and metropolitan area network (MAN) Committee. Fiber optic rings are widely deployed as part of both MANs and wide area networks (WANs); however, these topologies are dependent on protocols that aren't optimized or scalable to meet the demands of packet-switched networks.