Technical Seminors Provides you 100 Technical seminors Download for free

List Of 100 B Tech computer science,IT and MCA / BCA Paper Presentations and seminars free download



2.Wearable Computers:

3.4G Wireless Technology:


5.SKY X Technology:



8. Augmented Reality:



2.Night Vision Technology


4.Chameleon Chips


6. Remote Media Immersion (RMI)

7.Optical Switching


9. Quantum Dot Lasers

10. Organic light emitting diodes (OLED):

11.Universal Mobile Telecommunications System (UMTS)

12.Wireless Energy Transfer using Magnetic Resonance :


14.Paper Battery:

15.STARFAST: a Wireless Wearable EEG Biometric System based on the ENOBIO Sensor :

16. Plastic Memory:

17.Space Robotics

18.Generalized Multiprotocol Label Switching (GMPLS):

19.Microwave Superconductivity




Download Full Article Intrusion Detection
In the last three years, the networking revolution has finally come of age. More than ever before, we see that the Internet is changing computing as we know it. The possibilities and opportunities are limitless; unfortunately, so too are the risks and chances of malicious intrusions.
It is very important that the security mechanisms of a system are designed so as to prevent unauthorized access to system resources and data. However, completely preventing breaches of security appear, at present, unrealistic. We can, however, try to detect these intrusion attempts so that action may be taken to repair the damage later. This field of research is called Intrusion Detection.
Anderson, while introducing the concept of intrusion detection in 1980, defined an intrusion attempt or a threat to be the potential possibility of a deliberate unauthorized attempt to
·         access information,
·         manipulate information, or
·         render a system unreliable or unusable.
Since then, several techniques for detecting intrusions have been studied. This paper discusses why intrusion detection systems are needed, the main techniques, present research in the field, and possible future directions of research.
A Security Policy defines what is permitted and what is denied on a system. There are two basic philosophies behind any security policy:
·         Prohibitive where everything that is not expressly permitted is denied.
·         Permissive where everything that is not expressly denied is permitted.
Elements of a System’s Security
A computer system can be considered as a set of resources which are available for use by authorized users. A paper by Donn P outlines six elements of security that must be addressed by a security administrator. It is worth evaluting any tool by determining how it address these six elements.
·         Availability – the system must be available for use when the users need it. Similarly, critical data must be available at all times.
·         Utility – the system, and data on the system, must be useful for a purpose.
·         Integrity – the system and its data must be complete, whole, and in a readable condition.
·         Authenticity – the system must be able to verify the identity of users, and the users should be able to verify the identity of the system.
·         Confidentiality – private data should be known only to the owner of the data, or to a chosen chosen few with whom the owner shares the data.
·         Possession – the owners of the system must be able to control it. Losing control of a system to a malicious user affects the security of the system for all other users.
Download Full Article Intrusion Detection

LASER Communication

Download Full Article LASER Communication
Laser communications offer a viable alternative to RF communications for inter satellite links and other applications where high-performance links are a necessity. High data rate, small antenna size, narrow beam divergence, and a narrow field of view are characteristics of laser communications that offer a number of potential advantages for system design.
Lasers have been considered for space communications since their realization in 1960. Specific advancements were needed in component performance and system engineering particularly for space qualified hardware. Advances in system architecture, data formatting and component technology over the past three decades have made laser communications in space not only viable but also an attractive approach into inter satellite link applications.
Information transfer is driving the requirements to higher data rates, laser cross -link technology explosions, global development activity, increased hardware, and design maturity. Most important in space laser communications has been the development of a reliable, high power, single mode laser diode as a directly modulable laser source. This technology advance offers the space laser communication system designer the flexibility to design very lightweight, high bandwidth, low-cost communication payloads for satellites whose launch costs are a very strong function of launch weigh. This feature substantially reduces blockage of fields of view of most desirable areas on satellites. The smaller antennas with diameter typically less than 30 centimeters create less momentum disturbance to any sensitive satellite sensors. Fewer on board consumables are required over the long lifetime because there are fewer disturbances to the satellite compared with heavier and larger RF systems. The narrow beam divergence affords interference free and secure operation.

LED wireless

Download Full Article LED wireless
Billions of visible LEDs are produced each year, and the emergence of high brightness AlGaAs and AlInGaP devices has given rise to many new markets. The surprising growth of activity in, relatively old, LED technology has been spurred by the introduction of AlInGaP devices. Recently developed AlGaInN materials have led to the improvements in the performance of bluish-green LEDs, which have luminous efficacy peaks much higher than those for incandescent lamps. This advancement has led to the production of large-area full-color outdoors LED displays with diverse industrial applications.
                                The novel idea of this article is to modulate light waves from visible LEDs for communication purposes. This concurrent use of visible LEDs for simultaneous signaling and communication, called iLight, leads to many new and interesting applications and is based on the idea of fast switching of LEDs and the modulation visible-light waves for free-space communications. The feasibility of such approach has been examined and hardware has been implemented with experimental results. The implementation of an optical link has been carried out using an LED traffic-signal head as a transmitter. The LED traffic light (fig 1 below) can be used for either audio or data transmission.
Audio messages can be sent using the LED transmitter, and the receiver located at a distance around 20 m away can play back the messages with the speaker. Another prototype that resembles a circular speed-limit sign with a 2-ft diameter was built. The audio signal can be received in open air over a distance of 59.3 m or 194.5 ft. For data transmission, digital data can be sent using the same LED transmitter, and the experiments were setup to send a speed limit or location ID information.
                                The work reported in this article differs from the use of infrared (IR) radiation as a medium for short-range wireless communications. Currently, IR links and local-area networks available. IR transceivers for use as IR data links are widely available in the markets. Some systems are comprised of IR transmitters that convey speech messages to small receivers carried by persons with severe visual impairments. The Talking Signs system is one such IR remote signage system developed at the Smith-Kettlewell Rehabilitation Engineering Research center. It can provide a repeating, directionally selective voice message that originates at a sign. However, there has been very little work on the use of visible light as a communication medium.
                                The availability of high brightness LEDs make the visible-light medium even more feasible for communications. All products with visible-LED components (like an LED traffic signal head) can be turned into an information beacon. This iLight technology has many characteristics that are different from IR. The iLight transceivers make use of the direct line-of-sight (LOS) property of visible light, which is ideal in applications for providing directional guidance to persons with visual impairments. On the other hand, IR has the property of bouncing back and forth in a confined environment. Another advantage of iLight is that the transmitter provides easy targets for LOS reception by the receiver. This is because the LEDs, being on at all times, are also indicators of the location of the transmitter. A user searching for information has only to look for lights from an iLight transmitter. Very often, the device is concurrently used for illumination, display, or visual signage. Hence, there is no need to implement an additional transmitter for information broadcasting. Compared with an IR transmitter, an iLight transmitter has to be concerned with even brightness. There should be no apparent difference to a user on the visible light that emits from an iLight device.

Light Trees

Download Full Article  LIGHT TREES
Today, there is a general consensus that, in the near future, wide area networks (WAN)(such as, a nationwides backbone network) will be based on Wavelength Division Multiplexed (WDM) optical networks. One of the main advantages of a WDM WAN over other optical technologies, such as, Time Division Multiplexed (TDM) optical networks, is that it allows us to exploit the enormous bandwidth of an optical fiber (up to 50 terabits bits per second) with requiring electronic devices, which operate at extremely high speeds.
               Depending on the underlying physical topology networks can be classified into three generations:
ü    First Generation: these networks do not employ fiber optic technology; instead they employ copper-based or microwave technology. E.g. Ethernet.
ü    Second Generation: these networks use optical fibers for data transmission but switching is performed in electronic domain. E.g. FDDI.
ü      Third Generation: in these networks both data transmission and switching is performed in optical domain. E.g. WDM.
Download Full Article WAP
WAP: An Introduction                                                           
The Wireless Application Protocol (WAP) is a new advanced intelligent messaging service for digital mobile phones and other mobile terminals that will allow you to see Internet content in special text format on special WAP-enabled mobile phones. Enabling information access from handheld devices requires a deep understanding of both technical and market issues that are unique to the wireless environment. The WAP specification was developed by the industry’s best minds to address these issues. Wireless devices represent the ultimate constrained computing device with limited CPU, memory and battery life and a simple user interface. Wireless networks are constrained by low bandwidth, high latency and unpredictable availability and stability. The WAP specification addresses these issues by using the best of existing standards and developing new extensions when needed. The WAP solution leverages the tremendous investment in web servers, web development tools, web programmers and web applications while solving the unique problems associated with the wireless domain. The specification ensures that this solution is fast, reliable and secure. The WAP specification is developed and supported by the wireless telecommunication community so that the entire industry and its subscribers can benefit from a single, open specification. 
 The WAP forum                        
The WAP specification was developed by the WAP forum, a consortium founded by the telecommunication giants Nokia, Ericsson, and Motorola. The WAP forum’s membership roster now includes computer industry heavyweights such as Microsoft, Oracle, IBM and Intel along with several hundred other companies. The WAP forum is an industry group dedicated to the goal of enabling sophisticated telephony and information services on handheld wireless devices. The WAP forum has drafted a global wireless protocol specification for all wireless networks and is contributing it to various industry groups and standard bodies.  This WAP specification by the WAP forum enables manufacturers, network operators, content providers and application developers to offer compatible products and secure services on all devices and networks, resulting in greater economies of scale and universal access to information.   
         Download Full Article WAP   
    Download Full Article 3g
Marconi’s innovative perception of electromagnetic waves and the air interface in 1897 was the first milestone on the important road to shared use of the radio spectrum. But only after almost a century later did mobile wireless communication start to take off. Despite a series of disappointing false starts, communication world in the late 1980’s was rapidly becoming more mobile for a much wider segment of communication users than ever before. With the advent of wireless technology, a transition from point-to-point communication toward person to-person communication (i.e.; independent of position) has begun. Testimony to this is the rapidly increasing penetration of cellular phones all across the world. In anticipation of the growing consumer demands, the next generation of wireless systems endeavors to provide person-to-person communication of the circuit and packet multimedia data.
The first generation cellular networks, which were based on analog technology with FM modulation, have been successfully deployed since the early and mid 1980’s. A typical example of a first generation cellular telephone system ( 1G ) is the Advanced Mobile Phone Services ( AMPS) . Second generation ( 2G ) wireless systems employ digital modulation and advanced call-processing capabilities. In view of the processing complexity required for these digital systems, two offered advantages are the possibility of using spectrally efficient radio transmission schemes such as Time Division Multiple Access ( TDMA ) or Code Division Multiple Access ( CDMA ), in comparison to the analog Frequency Division Multiple Access ( FDMA ) schemes previously employed and the provision for implementation of a wide variety of integrated speech and data services such as paging and low data rate network access. Examples of 2 G  wireless systems include the Global System for Mobile communication ( GSM ), TDMA IS-54/IS-136 and Personal Digital Cellular ( PDC ).
Third Generation ( 3G ) wireless systems will evolve from mature 2G networks with the aim of providing universal access and global roaming. More important these systems are expected to support multi dimensional (multi-information media, multi-transmission media, and multi-layered networks) high-speed wireless communication- an important milestone toward achieving the grand vision of ubiquitous personal communications. Introduction of wide band packet-data services for wireless Internet up to 2Mbps will be the main attribute of 3G system.
                 Download Full Article 3g



** subscribe this site to get alerts to mobile **


Twitter Delicious Facebook Digg Stumbleupon Favorites More

Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | Premium Wordpress Themes