Thursday 4 October 2007

SEMINAR ABSTRACT LIST




Click on the links on the right side of the page to see the abstract of each topic...
50 topics are included in this page...To see more topics go to these links

For more details Contact Praveen...........Ph :- 9847882302(SMS ONLY)
Email : praveenv101@gmail.com
EACH REPORT COSTS Rs - 300 Only



THE LIST OF TOPICS ARE :-


01#THE ARCHITECTURE OF A MOLETRONICS COMPUTER

02#ARTIFICIAL NEURAL NETWORKS BASED DEVNAGRI NUMERAL RECOGNITION

03#DATA SECURITY AN INFORMATION-THEORETIC MODEL FOR STEGANOGRPHY

04#A NOVEL METHOD OF COMPRESSING SPEECH WITH HIGHER BANDWIDTH

05#TRACKING AND POSITIONING OF MOBILES IN TELECOMMUNICATION

06#WIRELESS COMMUNICATION

09#OPTICAL NETWORKING

11#DATA SECURITY IN LOCAL NETWORK USING DISTRIBUTED FIREWALL

12#IMAGE AUTHENTICATION A FEW APPROACHES USING DIGITAL WATERMARKING

13#BORDER SECURITY USING WIRELESS INTEGRATED NETWORK SENSORS

14#COMPUTERIZED PAPER EVALUATION USING NEURAL NETWORK

15#MULTIPLE DOMAIN ORIENTATION

16#NEW DIMENSION OF DATA SECURITY USING NEURAL NETWORKS

17#NANOTECHNOLOGICAL PROPOSAL OF ARTIFICIAL RBC

18#GAIC ALGORITHM FOR IRIS COMPARISON & IMPLEMENTATION

19#IMPLEMENTATION OF FUZZY ART MAP ALGORITHM FOR DATA MINING

20#ARCHITECTURE FOR WIRELESS INTERNET

21#AN ATM WITH AN EYE

22#ANALOG-DIGITAL HYBRID MODULATION FOR IMPROVED EFFICIENCY OVER
BROADBAND WIRELESS SYSTEMS

23#EFFICIENT IMPLEMENTATION OF CRYPTOGRAPHICALLY USEFUL”LARGE”
BOOLEAN FUNCTIONS

24#HOME NETWORKING

25#SMART CAMERAS IN EMBEDDED SYSTEMS

26#TIMING ATTACKS ON IMPLEMENTATIONS OF DIFFIE

27#ARTIFICIAL NEURAL NETWORKS

28#SEMICONDUCTOR DEVICES A NEW REVOLUTION IN MEMORIES

29#DATA SECURITY IN WIRELESS NETWORKS

30#DATASECURITY

31#PALLADIUM CRYPTOGRAPHY (AN ADVANCED DATA SECURITY)

32#BIO-MEDICAL INSTRUMENATION COMPUTER AIDED FIELD OF VISION

33#FACE RECOGNITION USING NEURAL NETWORKS

34#IMPLEMENTATION OF ZOOM FFT IN ULTRASONIC BLOOD FLOW ANALYSIS

35#LOW MEMORY COLOR IMAGE ZERO TREE CODING

36#NANOPOLYMER TECHNOLOGY

37#FUZZY LOGIC

38#ARTIFICIAL NEURAL NETWORKS

39#STEGANOGRAPHY IN IMAGES

40#ELECTRONIC APPLICATIONS OF CARBON NANOTUBES

41#MPEG-4 VIDEO COMPRESSION

42#QUANTUM COMPUTING

43#MILITARY RADARS

44#NANO TECHNOLOGY

45#OPTICAL MOUSE

46#PROTOTYPE SYSTEM DESIGN FOR TELEMEDICINE USING FIXED WIRELESS
INTERNET

47#WIRELESS TECHNOLOGY " BLUETOOTH "

48#THE THOUGHT TRANSLATION DEVICE (TTD)

49#WIRELESS INTERNET ACCESS 3G VS WiFi

50#PSYCHO PHYSIOLOGICAL CREDIBILITY ASSESSMENT

50#PSYCHO PHYSIOLOGICAL CREDIBILITY ASSESSMENT



ABSTRACT


Lies are part of human life! People often tell lies to deceive others. many of us have heard about “lie detector “,some where seen in movies or read it in fiction stories. Does anything of this sort really exist? If yes, does it really detect lies? Yes it does. The first thing that comes to our mind is how an instrument with some electronic components can read out our mind. Though science and technology are growing at the speed of light, has it reached a stage where it can read mind? Not exactly! But it can approach to that stage by monitoring the physiological reaction by plotting graphs.



WHAT IT IS

Polygraph, a multigraph of physiological reaction. Lie detector or polygraph as it is technically called is an instrument that monitors the physiological reaction. It can detect only deceptive behavior of human mapped to lies. The underlying factor of this concept is a person is subjected to stress while trying to decieve.Biomedical technology is used to bring out this deception. Lying is a sort of defense mechanism used by human to avoid trouble but when it is a serious crime like murder, spying on a country, it is necessary to bring out the truth. in such a case polygraph provide a helping hand to the law.


49#WIRELESS INTERNET ACCESS 3G VS WiFi



ABSTRACT:


This paper compares and contrasts two technologies for delivering broadband wireless Internet access services:”3G” VS.”WiFi”. The former, 3G, refers to the collection of third generation mobile technologies that are designed to allow mobile operators to offer integrated data and voice services over mobile networks .The latter, WiFi, refers to the 802.11b wireless Ethernet standard that was designed to support wireless LANs. Although the two technologies reflect fundamentally different service, industry and architectural design goals, origins and philosophies, each has recently attracted a lot of attention as candidates for the dominant platform for providing broadband wireless access to the Internet. It remains an open question as to the extent to which these two technologies are in competition or, perhaps, may be complementary. If they are viewed as in competition, then the triumph of one at the expense of the other would be likely to have profound implications for the evolution of the wireless internet and structure of the service provider industry.

48#THE THOUGHT TRANSLATION DEVICE (TTD)



ABSTRACT:


The thought -translational device (TTD) consists of a training device and spelling program for the completely paralyzed using slow-cortical brain potentials (SCP). During the training phase, the self-regulation of SCPs is learned through visual-auditory feedback and positive reinforcement of SCPs; during the spelling phase, patients select letters or words with their SCPs. A psychophysiological system for detection of cognitive functioning in completely paralyzed patients is an integral part of the TTD. The neurophysiological and anatomical basis of SCP-regulation was investigated by recording of BOLD-response in functional magnetic resonance imaging. Results showed involvement of basal ganglia and premotor cortex for required SCP positivity .The clinical outcome of 11 paralyzed patients using the TTD and quality of life of severely paralyzed patients is described.

47#WIRELESS TECHNOLOGY " BLUETOOTH "



Abstract:

Every new invention in the past ha to contend with various cynics who content that the existing technology is better than the new one or do you recall anyone saying “That won’t work man it’s too Hi-Fi”, Well Blue tooth is also passing through the same phase.

For every new technology to get integrated into the society we have to pass certain phases that are predefined.

1. Scientific discussion: This is the place where the new technology is introduced and born out. Here the papers are presented at scientific seminars. Various problems are ironed out here.

2. Industry standard: Industry standard are developed for the future implementation of the protocol. These have to be cost efficient and readily integrable into the society

3. Billion dollar investment: This is the stage where all the industries make their investment into new technology. The new technology is taken to the targeted segment of the user.

Our blue tooth technology is still in the first phase (i.e., scientific discussion), where the technology is still studied. In this paper what we planned to do is to take part in this crucial segment of scientific discussion.

In this paper we are going to discuss the following regarding blue tooth technology.

Ø What is blue tooth?

Ø How does the technology works?

Ø Network Arrangements & Connection Protocols.

Ø Security & Applications of Bluetooth.

Ø Bluetooth-“Simply the Best!”

Ø Industries interested in this new technology.

46#PROTOTYPE SYSTEM DESIGN FOR TELEMEDICINE USING FIXED WIRELESS INTERNET



ABSTRACT


With the day to day improvement in the field of medicine the urban society is enjoying a healthy life, but for the people of rural and remote areas even the basic health care is not sufficiently available. For the rural masses to enjoy the breakthroughs in the field of medicine, ’Telemedicine’ can be used. The present form of telemedicine does not suit the Indian scenario due to the described factors. To make telemedicine suitable for Indian conditions we design a low cost, efficient prototype system making use of fixed Wireless Internet. In our system we connect the remote or rural areas to the nearest well established hospital through the Fixed Wireless Internet. In the rural center, less trained medical attendant can work upon patients by the guidance given by the efficient doctor guiding him through the fixed wireless Internet. The basic structure of our Telemedicining is achieved through a digital camcorder and VoIP enabled telephones, which are both compatible with Fixed Wireless Internet. For the effective performance of the Fixed Wireless Internet system the design criteria of the transceiver is of utmost importance. The use of Fixed Wireless Internet System as a bridge solves the problem of Band –width requirements and cost effectiveness. With these Telemedicine system remote consultations, monitoring is possible. Depending Upon the infrastructure and the Personnel available in the rural center, telesurgery can become a reality.

45#OPTICAL MOUSE



ABSTRACT

Every day of our computing life, we reach out for our mouse whenever we want to move our cursor or activate something. Our mouse senses our motion and our clicks and sends them to the computer so that it can respond appropriately. It is amazing how simple and effective a mouse is, and it is also amazing how long it took Mice to become a part of everyday life. Given that people naturally point at things -- usually before they speak -- it is surprising that it took so long for a good pointing device to develop. Although originally conceived in the 1960s, it took quite some time for mice to become mainstream. In the beginning there was no need to point because computers used crude interfaces like teletype machines or punch cards for data entry. The early text terminals did nothing more than emulate a teletype (using the screen to replace paper), so it was many years (well into the 1960s and early 1970s) before arrow keys were found on most terminals. Full screen editors were the first things to take real advantage of the cursor keys, and they offered humans the first crude way to point.

In this paper on “ WORKING OF OPTICAL MOUSE “ I’ll take the cover off of this important part of the human-machine interfaces and see exactly what makes it tick!

43#MILITARY RADARS


ABSTRACT


RADAR (Radio Detection and Ranging) is basically a means of gathering information about distant objects by transmitting electromagnetic waves at them and analyzing the echoes. Radar has been employed on the ground, in air, on the sea and in space. Radar finds a number of applications such as in airport traffic control, military purposes, coastal navigation, meteorology and mapping etc. The development of the radar technology took place during the World War II in which it was used for detecting the approaching aircraft and then later for many other purposes which finally led to the development of advanced military radars being used these days. Military radars have a highly specialized design to be highly mobile and easily transportable, by air as well as ground.

In this paper we will discuss about the advanced features and benefits of military radar, system configuration of a typical military radar, operating the radar, system functions, various terminal equipments used along with their functions and some of the important parts of the radar such as transmitter, receiver, antenna, AFC (Automatic Frequency Control) etc.

42#QUANTUM COMPUTING


Abstract


Imagine a computer whose memory is exponentially larger than its apparent physical size; a computer that can manipulate an exponential set of inputs simultaneously; a computer that computes in the twilight zone of Hilbert space. You would be thinking of a quantum computer. Relatively few and simple concepts from quantum mechanics are needed to make quantum computers a possibility. The subtlety has been in learning to manipulate these concepts. Is such a computer an inevitability or will it is too difficult to build?

The subject of quantum computing brings together ideas from classical information theory, computer science, and quantum physics. This review aims to summarize not just quantum computing, but the whole subject of quantum information theory. It turns out that information theory and quantum mechanics fit together very well. In order to explain their relationship, the review begins with an introduction to classical information theory and computer science, including Shannon's theorem, error correcting codes, Turing machines and computational complexity. The principles of quantum mechanics are then outlined, and the EPR experiment described. The EPR-Bell correlations and quantum entanglement in general, form the essential new ingredient which distinguishes quantum from classical information theory, and, arguably, quantum from classical physics. Basic quantum information ideas are described, including key distribution, teleportation, data compression, quantum error correction, the universal quantum computer and quantum algorithms. The common theme of all these ideas is the use of quantum entanglement as a computational resource. Experimental methods for small quantum processors are briefly sketched, concentrating on ion traps, high Q cavities, and NMR. The review concludes with an outline of the main features of quantum information physics, and avenues for future research.

41#MPEG-4 VIDEO COMPRESSION



ABSTRACT

MPEG-4 is an ISO/IEC standard being developed by MPEG (Moving Picture Experts Group), the committee which also developed the Emmy Award winning standards known as MPEG-1 and MPEG-2. These standards made interactive video on CD-ROM and Digital Television possible. MPEG-4 will be the result of another international effort involving hundreds of researchers and engineers from all over the world. MPEG-4, whose formal ISO/IEC designation will be ISO/IEC 14496, is to be released in November 1998 and will be an International Standard in January 1999.

MPEG-4 is building on the proven success of three fields: digital television, interactive graphics applications (synthetic content) and the World Wide Web (distribution of and access to content) and will provide the standardized technological elements enabling the integration of the production, distribution and content access paradigms of the three fields.

40#ELECTRONIC APPLICATIONS OF CARBON NANOTUBES



ABSTRACT

The remarkable properties of carbon nanotubes may allow them to play a crucial role in the relentless drive towards miniaturization at the nanometre scale.

Nanotechnology is predicted to spark a series of industrial revolutions in the next two decades that will transform our lives to a far greater extent than silicon microelectronics did in the 20th century. Carbon nanotubes could play a pivotal role in this upcoming revolution if their remarkable electrical and mechanical properties can be exploited.

Since the first measurements were made in 1997, these rolled up sheets of graphite have captured the imagination of researchers around the world. Progress in understanding the basic physics and chemistry of nanotubes has advanced at a phenomenal rate - and shows no signs of slowing.

Carbon nanotubes can be considered as a single sheet of graphite rolled in the form of a tube, though it is not actually made by rolling one. They were first observed by a Japanese scientist Sumio Iijima in the early part of the 1990’s. The tubes that consist of a single layer of graphite is termed as ‘Single walled nanotubes’ and the ‘Multi-walled tubes are those consisting of more than a single layer in the form of concentric cylinders.

Both these types have their respective fields of applications in the industry and the scientific scenario. Nanotubes have an impressive list of attributes. They can behave like metals or semiconductors, can conduct electricity better than copper, can transmit heat better than diamond, and they rank among the strongest materials known - not bad for structures that are just a few nanometres across. Several decades from now we may see integrated circuits with components and wires made from nanotubes, and maybe even buildings that can snap back into shape after an earthquake.

39#STEGANOGRAPHY IN IMAGES



ABSTRACT:



In this paper, we aim to present a general introduction to steganography or data-hiding as it is sometimes just known. We then turn to data-hiding in images. When examining these data-hiding techniques, we bear in mind Bender's specifications, such as degradation of the cover data must be kept to a minimum, and the hidden data must be made as immune as possible to possible attack from manipulation of the cover data.

Steganography in images has truly come of age with the invention of fast, powerful computers. Software is readily available off the Internet for any user to hide data inside images. These softwares are designed to fight illegal distribution of image documents by stamping some recognisable feature into the image.The most popular technique is Least Significant Bit insertion, which we will look at. Also, we look at more complex methods such as masking and filtering, and algorithms and transformations, which offer the most robustness to attack, such as the Patchwork method which exploits the human eye's weakness to luminance variation.

we will take a brief look at steganalysis, the science of detecting hidden messages and destroying them. We conclude by finding that steganography offers great potential for securing of data copyright, and detection of infringers. Soon, through steganography,personal messages,files, all artistic creations, pictures, and songs can be protected from piracy.

37#FUZZY LOGIC



ABSTRACT

With the advent of modern computer technology, the field of Artificial Intelligence is showing a definite utility in all spectrum of life. In the field of control, there is always a need for optimality with improved controller performance. In this paper, the feasibility of Fuzzy Logic as an effective control tool for DC motors is dealt with.

This Fuzzy Logic Controller (FLC) is showing a better performance than conventional controllers in the form of increased robustness.

In this paper, the role of Fuzzy Logic as a controller and its implementation is studied.

36#NANOPOLYMER TECHNOLOGY



Abstract

Nanotechnology involves working with matter at the scale of one-billionth of a meter (1 nanometer). It refers to the manipulation of matter on the minutest scale, i.e. atoms and molecules.

According to Moore’s law, the number of transistors on a chip doubles every 18 months. Going by this law, current standards would no longer be feasible. Carbon Nanotubes technology is under progress and it will take quit a lot of time for practical implementation.

NEW NANOPOLYMER CONCEPT

0’s and 1’s make up the digital information and we try to cram as much information as possible. Our Nanopolymer setup uses thousands of nano-sharp tips to punch indentations representing individual bits into a thin plastic polymer film. The result is similar to a nanotech version of the 'punch card' but this technology is re-writeable and may be able to store more than 3 billion bits of data in the space occupied by just one hole in a standard punch card. The indentations that are left on the polymer film measure about 10 nanometers each and carry a digitized version of the data. A punched indentation may refer to as 0 or 1. Practical implementation of this technology is possible.

35#LOW MEMORY COLOR IMAGE ZERO TREE CODING



ABSTRACT:

This paper presents a zero tree coding method for color images that uses no lists during encoding and decoding,permitting the omission of the lists requirement in Said and Pearlman’s Set Partitioning In Hierarchical Trees (SPIHT) algorithm [3]. Without the lists, the memory requirement in a VLSI implementation is reduced significantly. This coding algorithm is also developed to reduce the circuit complexity of an implementation. Our experimental results show only a minor reduction of PSNR values when compared with the PSNR values obtained by the SPIHT codec illustrating well the trade-off between memory requirement and hardware simplicity.

34#IMPLEMENTATION OF ZOOM FFT IN ULTRASONIC BLOOD FLOW ANALYSIS



ABSTRACT

An adequate blood flow supply is necessary for all organs of the body. Analysis of the blood flow finds its importance in the diagnoses of diseases. There are many techniques for analyzing the blood flow. These techniques are not affordable by the poor people because of their high expense. So we have implemented a technique called Zoom-FFT. This technique is simple and affordable to detect the blood clots and other diseases.

Human with his potential tries to get whichever is unexplored, explored, and till now we are managing and succeeding using some technical ways. In the same way this is one of the explorations made for scanning the intra details of some specific objects using ultrasound named SONOGRAPHY, which is used as an alternative to x-ray photography. In this paper, the method to zoom the image or the scanned data-using zoom FFT has been discussed. It also explains the algorithm to get ZOOM FFT and how it can be obtained via simulation. Real time experimentation and its applications, with basics of ultrasound scanning are also explained. Here a specific application will be dealt i.e., ultrasonic blood flow analyzer using ZOOM FFT.

Blood flow analysis is done by passing a high frequency ultrasonic wave in the blood vessels through a transducer (transmitter) .The reflected signal; from the receiver transducer has a different frequency due to the Doppler principle. This signal is passed to a DSP processor to find the frequency spectrum. Because of the high frequency of the ultrasonic wave, the resolution of the frequency spectrum output will not be good. Therefore we go for advanced Zoom FFT technique, wherein a very small frequency change due to the clot formation can be obtained with a good resolution. It can be used to locate the initial presence of a blood clot. All of these tasks must be achieved with a single DSP chip in order for the system to be both cost-effective and power

efficient and thus widely accepted.

This paper proposes:

1.Study of Bio-medical signal processing

2.Mixing down the input signal to the base band frequency using Hilbert Transform

3. Finding the down sampling using the decimation process

4.Obtaining the spectrum output using fast Fourier transform

5.Simulation is done by Matlab/C.

6.TMS320C5X/6X DSP processor does real time implementation.

33#FACE RECOGNITION USING NEURAL NETWORKS



ABSTRACT

Today, Internet rules the world. The Internet is used to access the complete facility of transferring the information, besides maintaining the secrecy of the document. Since the network is considered to be insecure, the encryption and authentication are used to protect the data while it is being transmitted. The security is insufficient when the codes for encryption and decryption are revealed. There comes the necessity of increasing the security through face recognition using neural network. Though it is costlier, it provides the high advantage of tight security. This paper deals with the recognition of images using neural networks. It is used in identifying particular people in real time or allows access to a group of people and denies access to the rest.

The system combines local image sampling, the self-organizing map neural network, and a convolutional neural network. The self-organizing map provides the quantization of image samples into a topological space where inputs that are nearby in the original space are also in the output space, thereby providing dimensionality reduction and invariance to minor changes in the image sample. All these features are implemented using MATLAB v 6.5. The convolutional neural network provides for the partial invariance to translational, rotation, scale, and deformation. Hence it is analyzed that by implementing face recognition in security systems, the business transaction via Internet can be improved.

32#BIO-MEDICAL INSTRUMENATION COMPUTER AIDED FIELD OF VISION



ABSTRACT:

This paper focuses on the need to measure the field of vision. For every individual this plays a vital role.

Thus Bio-Medical Instrumentation shows its role and here ‘The Field of Vision’.

As the world’s population grows the need for health care increases. In recent years progress in medical care has been rapid,especially in such fields as Ophthalmology’s major reason for this progress has been the manage of two important disciplines: Medicine and Engineering.

There are similarities between these two disciplines and there are differences,but there is no doubt that cooperation between them has produced excellent results.This fact can be well attested to by man or woman who has received many more years of useful life because of the help of a prosthetic device,or from careful and meaningful monitoring during a critical illness

31#PALLADIUM CRYPTOGRAPHY (AN ADVANCED DATA SECURITY)



ABSTRACT

As we tend towards a more and more computer centric world, the concept of data security has attained a paramount importance. Though present day security systems offer a good level of protection, they are incapable of providing a “trust worthy” environment and are vulnerable to unexpected attacks. Palladium is a content protection concept that has spawned from the belief that the pc, as it currently stands, is not architecturally equipped to protect a user forms the pitfalls and challenges that an all-pervasive network such as the Internet poses.

As a drastic change in pc hardware is not feasible largely due to economic reasons, palladium hopes to introduce a minimal change in this front. A paradigm shift is awaited in this scenario with the advent of usage of palladium, thus making content protection a shared concern of both software and hardware. In the course of this paper the revolutionary aspects of palladium are discussed in detail.

A case study to restructure the present data security system of JNTU examination system using palladium is put forward.

30#DATASECURITY

ABSTRACT

Nowadays, “SECURITY” become a more sensible issue either it may be in the “REAL WORLD” or in the “CYBER WORLD”. As citizens are using network for banking, shopping, filing their tax returns and other purposes, network security is looming on the horizon as a potentially massive problem.

Data security involves not only protection, but also detecting offends of secured communication and attacks on the infrastructure, and then responding to these attacks. The main problems that occurred in network security are secrecy, authentication, non-repudiation and integrity control.

This paper discusses with a perspective view of how a continuous cycle of protection, detection and response can be consistently maintained. Also concerns about different types of security attacks such as spoofing, virus, worm and security mechanisms such as firewalls, cryptography and describes about how security provided in mobile networks.

Cryptography is defined as information hiding. Cryptography allows two parties to exchange sensitive information in a secure manner. Cryptography has naturally been extended into the realm of computers such as secure access to private networks, electronic commerce, and health care, and provides a solution to the electronic security and privacy issue.

This paper mainly concerns about two types of cryptographic standards such as symmetric and asymmetric algorithms and also the specification and implementation of above methods. And also explained Encryption and Decryption Methods, Digital Signatures, Authentication and Keys. The implementation of public key cryptography requires several supporting components to handle key creation, distribution and revocation –Public Key Infrastructure (PKI).While the implementation of private key cryptography requires encryption and decryption methods which are also specified. Today’s new cryptography systemadvanced elliptic curve technology in smartcard technology are also specified.

29#DATA SECURITY IN WIRELESS NETWORKS

ABSTRACT: -

Wireless Wide Area Networks (WAN) are a popular method of wirelessly accessing data over the Internet. A major concern for many corporate users of wireless WANs is data security and how to protect data that is transmitted over these wireless networks.

There are many features of these wireless networks, which provide user and data security. This paper discusses the security features for CDPD, CDMA, and GPRS networks, as well as an introduction to virtual private networks (VPN) and how these applications can be used to enhance the overall security of data on wireless networks.

For each of the technologies presented in this paper, a brief overview of the wireless network is given, followed by a discussion of each of the features of that network that contribute to the overall security of the network.

28#SEMICONDUCTOR DEVICES A NEW REVOLUTION IN MEMORIES

ABSTRACT

Over the years semiconductor devices have set a new trend in the field of

electronics and created waves in the existing technology of memory storage.

Flash memorywhich has been in use for long now , is now being replaced by new

advents in technology of memory such as Ferro Electric Memory, Magneto

resistive Type Memory and Ovonic Unified Memory. This paper contrasts the

working of flash kind of memory used in Dynamic - RAMS with that of the other

types mentioned above . In brief , advantages over the flash kind of memory are

evaluated and justified.

In a world where “nanoseconds ” matter a lot , ‘the new


Technology ’ awaits recognition and exposure . In short , this paper provides


an overall view about the different kinds of memories and their working .

27#ARTIFICIAL NEURAL NETWORKS

ABSTRACT


Just as life attempts to understand itself better by modeling it, and in the process create something new, so Neural computing is an attempt at modeling the workings of a brain and this presentation is an attempt to understand the basic concept of artificial neural networks.

.

In this paper, a small but effective overall content of artificial neural networks is presented . .First,the history of Neural Networks which deals with the comparative study of how vast the Neural Networks have developed over the years is presented. Next, having known what exactly is a neural network with the help of a MLP model, we proceed to next session: resemblance with brain where in the comparison between brain and neural networks as well as neurons and perceptrons are made with the help of figures. The most basic component of a neural network is the perceptron, which is called the artificial neuron, is studied and depicted in the Structure of a Neural Network section which is followed by architecture. The most important concept of the neural networks are its wide range of its applications, a few of which will be dealt in the consequent sections and then its limitations. The main question of interest to us would be “What will be the future of Neural Networks, Will it survive or will it rule us?”—This section leads us to a brief conclusion and we end the paper with the references.

26#TIMING ATTACKS ON IMPLEMENTATIONS OF DIFFIE

Abstract


By carefully measuring the amount of time required to perform private key operations, attackers may be able to find fixed Diffie-Hellman exponents, factor RSA keys, and break other cryptosystems.Against a vulnerable system, the attack is computationally inexpensive and often requires only known ciphertext. Actual systems are potentially at risk, including cryptographic tokens, network-based cryptosystems, and other applications where attackers can make reasonably accurate timing measurements. Techniques for preventing the attack for RSA and Diffie-Hellman are presented. Some cryptosystems will need to be re-vised to protect against the attack, and new protocols and algorithms may need to incorporate measures to prevent timing attacks. Keywords: timing attack, cryptanalysis, RSA, Diffie-Hellman, DSS.

25#SMART CAMERAS IN EMBEDDED SYSTEMS

ABSTRACT


A smart camera performs real-time analysis to recognize scenic elements. Smart cameras are useful in a variety of scenarios: surveillance, medicine, etc.We have built a real-time system for recognizing gestures. Our smart camera uses novel algorithms to recognize gestures based on low-level analysis of body parts as well as hidden Markov models for the moves that comprise the gestures. These algorithms run on a Trimedia processor. Our system can recognize gestures at the rate of 20 frames/second. The camera can also fuse the results of multiple cameras

24#HOME NETWORKING

ABSTRACT




Home Networking is the collection of elements that process, manage, transport, and store information, enabling the connection and integration of multiple computing, control, monitoring, and communication devices in the home. The price of home computers keep falling, while the advantages for consumers from being connected online investing and shopping, keeping in touch with long distance friends and tapping the vast resource of the Internet CE keep multiplying. No wonder an increasing number of households own two or more PCs.Until recently, the home network has been largely ignored. However, the rapid proliferation of personal computers (PCs) and the Internet in homes, advancements in telecommunications technology, and progress in the development of smart devices have increasingly emphasized the need for an in home networking. Furthermore, as these growth and advancement trends continue, the need for simple, flexible, and reliable home networks will greatly increase.

23#EFFICIENT IMPLEMENTATION OF CRYPTOGRAPHICALLY USEFUL”LARGE” BOOLEAN FUNCTIONS

ABSTRACT

The art and science of keeping messages secure is cryptography and it is practitioned by cryptographers. Cryptography is used to solve problems. It solves problems involving secrecy, authentication and integrity. We present a low cost hardware architecture consisting of large Boolean functions and stream ciphers for implementing cryptography. The main idea of implementing cryptography using this technique centers around the generation of pseudorandom bits using Linear Feedback Shift Registers implemented through the pipeline concept. This technique is based on symmetric key algorithm. We have presented the reasons for implementing cryptography using symmetric key algorithm rather then going for public key algorithm. Using this technique we can achieve cryptography using a low cost hardware architecture which is very efficient for providing security to our data.

22#ANALOG-DIGITAL HYBRID MODULATION FOR IMPROVED EFFICIENCY OVER BROADBAND WIRELESS SYSTEMS

Abstract


This paper seeks to present ways to eliminate the inherent quantization noise component in digital communications, instead of conventionally making it minimal. It deals with a new concept of signaling called the Signal Code Modulation (SCM) Technique. The primary analog signal is represented by: a sample which is quantized and encoded digitally, and an analog component, which is a function of the quantization component of the digital sample. The advantages of such a system are two sided offering advantages of both analog and digital signaling. The presence of the analog residual allows for the system performance to improve when excess channel SNR is available. The digital component provides increased SNR and makes it possible for coding to be employed to achieve near error-free transmission.

21#AN ATM WITH AN EYE

ABSTRACT

There is an urgent need for improving security in banking region. With the advent of ATM though banking became a lot easier it even became a lot vulnerable. The chances of misuse of this much hyped ‘insecure’ baby product (ATM) are manifold due to the exponential growth of ‘intelligent’ criminals day by day. ATM systems today use no more than an access card and PIN for identity verification. This situation is unfortunate since tremendous progress has been made in biometric identification techniques, including finger printing, retina scanning, and facial recognition. This paper proposes the development of a system that integrates facial recognition technology into the identity verification process used in ATMs. The development of such a system would serve to protect consumers and financial institutions alike from fraud and other breaches of security.

20#ARCHITECTURE FOR WIRELESS INTERNET

Abstract

In this age of high speed communications it has become quite necessary for a person to stay connected to internet where ever and whenever possible. To fulfill these needs of the people, WAP is being used. Using this technology, web pages can be viewed in simple hand-held, WAP enabled devices. This is made possible by using various communication architectures like GSM, CDMA etc. Recently a new standard for Wireless Internet called 1xEV-DO, has been adopted which is being billed as the basis for the next generation high-speed wireless internet access systems. In this paper we briefly introduce the working of a typical WAP enabled system and later investigate as to how the recently adopted 1xEV-DO outperforms the existing architectures. We also study its compatibility with different operating systems and its efficient utilization of the bandwidth with minimum spectrum usage.

19#IMPLEMENTATION OF FUZZY ART MAP ALGORITHM FOR DATA MINING

Bio Informatics

Bio informatics is the application of information technology to the management of bio logical data. It is interdisciplinary area of science where mathematics , statistics,and computer science are applied to data produced by experimental work in bio chemistry,cell,biology and genetics. The need for merging of the biological sciences with the world of It and computer science has mainly arisen due to the huge amount of information being produced from the study of genetic material .

KEYWORDS:

Mapping is the process of splitting each chromosome into smaller fragments,which could be propagated and characterized and placed back in correct order on each chromosome. Sequencing is a process of determination of the order of the nucleotides(base sequences) in DNA or RNA molecule,the order of amino acids protein. Genomics refers to the number of genes ,the function of genes the location and regulation of genes.

Role Of Engineers

The IT applications used by various Bio Tech companies and research organizations can be roughly split into three areas.

Ø The intial data acquisition , mapping and sequencing usually facilitated via modular programs

Ø The storage and implementation of central data bases containing base sequence information

Ø The software that allows manipulation of this data.this software can be split into two areas :

Sequence searc hand retrival programs,and data visualization packages.

The second and third areas together contribute to the data mining.

18#GAIC ALGORITHM FOR IRIS COMPARISON & IMPLEMENTATION

ABSTRACT

This paper aims at providing an efficient solution module for iris scanning techniques employed in security systems. It provides a powerful algorithm for iris comparison technique and thereby giving a satisfactory detection technique. With a strong mathematical background and quantitative analysis, it provides a promising method “GAIC” algorithm, which would enable efficient security in the growing trends. The above said algorithm has been simulated and implemented for the verification in the platforms of MATLAB. Our algorithm proves more efficient over all the other algorithms available.

17#NANOTECHNOLOGICAL PROPOSAL OF ARTIFICIAL RBC

ABSTRACT

Molecular manufacturing promises precise control of matter at the atomic and molecular level, allowing the construction of micron-scale machines comprised of nanometer-scale components.

Medical nanomachines will be among the earliest applications. The artificial red blood cell or "respirocyte" proposed here is a bloodborne spherical 1-micron diamondoid 1000-atm pressure vessel with active pumping able to deliver 236 times more oxygen to the tissues per unit volume than natural red cells and to manage carbonic acidity. An onboard nanocomputer and numerous chemical and pressure sensors enable complex device behaviors remotely reprogrammable by the physician via externally applied acoustic signals.

Primary applications will include transfusable blood substitution; partial treatment for anemia, perinatal/neonatal and lung disorders; enhancement of cardiovascular/neurovascular procedures, tumor therapies and diagnostics; prevention of asphyxia; artificial breathing; and a variety of sports, veterinary, battlefield and other uses.

16#NEW DIMENSION OF DATA SECURITY USING NEURAL NETWORKS AND NUMERICAL FUNCTIONS

Abstract:

Data hiding, embeds data into digital media for the purpose of identification, annotation, and copyright. New possibilities of digital imaging and data hiding open wide prospects in modern imaging science, content management and secure communications. Our objective is to hide large volumes of data in the host, in a manner that causes minimal perceptual distortion, and is robust to survive benign and malicious attacks, and make sure to hide as much information as possible into the host. In this paper we identify the prospects of the hidden information being detected and introduce a new approach for hiding any text without any embedding, by the method of Multiple key functions and Newton Forward Difference Technique so that it passes unnoticed by the existing stochastic detection techniques. By this approach, the size of the data that can be hidden will be larger than all the size that all the existing techniques support. This approach derives a polynomial function that generates the bit position in the host where the data bits matches with the host bits. Since the approach uses the original bits of the host to hide the data, the conventional embedding is not done and so the host does not undergo any perceptual degradation and thus escapes all the existing stochastic detection techniques.

15#MULTIPLE DOMAIN ORIENTATION

Abstract:


Due to the omnipresent nature of computers, the necessity for an efficient and larger storage has been drastically on the rise. The more the complex the system is, the more the storage requirements become. Hard disks have a major role in satisfying the needs of the computer users. Since storage density of hard disk is increasing at rate of 60% per year [1] and is approaching its atomic level saturation, there is a need for adapting some other technique to make maximum utilization of the available space. With not many solutions in hand, this paper is a novel approach. The basis of this idea is that when an external magnetic field is applied to an Elongated Single Domain (ESD), the domains get oriented in the direction of the external field. This specific property can account for the existence of more than two states. The domains are oriented in different directions each representing a new state unlike the conventional hard disks where only two directions are made use of. Thus each individual bit field* of the memory is capable of representing more than one state thus allowing octal, decimal, hexadecimal etc. representations instead of binary representation. The merits and demerits of this technology have also been discussed.

Keywords:

bit field* : The smallest possible storage area.

14#COMPUTERIZED PAPER EVALUATION USING NEURAL NETWORK

Abstract:


This paper addresses the issue of exam paper evaluation using neural network. This paper foresees the possibility of using adaptive real time learning through computers viz. the student is made to feed his answers in a restricted format to the computer to the questions it puts up and the answers are evaluated instantaneously. This is accomplished by connecting the computers to a Knowledge Server. This server has actually connections to various authenticated servers (encyclopedias) that contain valid information about all the subjects. The information in the server is organized in a specific manner. The exam is adaptive in the sense that the computer asks distinct questions to each individual depending upon their specialization. This paper also analyzes the role of existing neural network models like Adaptive Resonance Theory (ART), Back Propagation, Perceptron, Self-Organizing Feature Map (SOFM) can be optimized to implement such an evaluation system.

13#BORDER SECURITY USING WIRELESS INTEGRATED NETWORK SENSORS

ABSTRACT

Wireless Integrated Network Sensors (WINS) now provide a new monitoring and control capability for monitoring the borders of the country. Using this concept we can easily identify a stranger or some terrorists entering the border. The border area is divided into number of nodes. Each node is in contact with each other and with the main node. The noise produced by the foot-steps of the stranger are collected using the sensor. This sensed signal is then converted into power spectral density and the compared with reference value of our convenience. Accordingly the compared value is processed using a microprocessor, which sends appropriate signals to the main node. Thus the stranger is identified at the main node. A series of interface, signal processing, and communication systems have been implemented in micro power CMOS circuits. A micro power spectrum analyzer has been developed to enable low power operation of the entire WINS system.

Thus WINS require a Microwatt of power. But it is very cheaper when compared to other security systems such as RADAR under use. It is even used for short distance communication less than 1 Km. It produces a less amount of delay. Hence it is reasonably faster. On a global scale, WINS will permit monitoring of land, water, and air resources for environmental monitoring. On a national scale, transportation systems, and borders will be monitored for efficiency, safety, and security.

12#IMAGE AUTHENTICATION A FEW APPROACHES USING DIGITAL WATERMARKING

ABSTRACT


You thought images that you pick up are all yours? Think again, they may be secure enough with a Watermark that could be very well traced down.

A digital Watermark is a digital signal or pattern inserted into a digital image. Since this signal or pattern is present in each unaltered copy of the original image, the digital Watermark may also serve as a digital signature for the copies. The desirable characteristics of a Watermark are

· Watermark should be resilient to standard manipulations of any nature.

· It should be statistically irremovable

Every Watermarking system consists at least two different parts:

· Watermark Embedding Unit

· Watermark Detection and Extraction Unit

In this paper, we discuss an algorithm for embedding and detecting the Watermark in a still image. A robust, secure, invisible Watermark is imprinted on the image I, and the Watermarked image WI, is distributed. The author keeps the original image I. To prove that an image WI' or a portion of it has been pirated, the author shows that W' contains his Watermark (to this purpose, he could but does not have to use his original image I). The best a pirate can do is to try to remove the original W Watermark (which is impossible if the Watermark is secure).

There can be another way out for the pirate, as to embed his signature in the image. But this does not help him too much because both his "original" and his Watermarked Image will contain the author's Watermark (due to robustness property), while the author can present an image without pirate's Watermark. Thus, the ownership of the image can be resolved in the court of law.

We have done the implementation in MATLAB and doing the simulation in C++..

11#DATA SECURITY IN LOCAL NETWORK USING DISTRIBUTED FIREWALL

ABSTRACT

Computers and Networking have become inseparable by now. A number of confidential transactions occur every second and today computers are used mostly for transmission rather than processing of data. So Network Security is needed to prevent hacking of data and to provide authenticated data transfer. Network Security can be achieved by Firewall. Conventional firewalls rely on the notions of restricted topology and controlled entry points to function. Restricting the network topology, difficulty in filtering of certain protocols, End-to-End encryption problems and few more problems lead to the evolution of Distributed Firewalls.

A distributed firewall is a mechanism to enforce a network domain security policy through the use of a policy language, a policy distribution scheme enabling policy control from a central point and certificates, enabling the identification of any member of the network policy domain.

Distributed firewalls secure the network by protecting critical network endpoints, exactly where hackers want to penetrate. It filters traffic from both the Internet and the internal network because the most destructive and costly hacking attacks still originate from within the organization.They provide virtually unlimited scalability. In addition, they overcome the singlepoint-of-failure problem presented by the perimeter firewall.

In our paper we deal with distributed firewall concepts, its evolution, its components, policies and a sample of the designed policy along with implementation. A distributed firewall gives complete security to the network.