Tuesday, August 31, 2010

Seminar report on "Body Area Network (BAN)"

A Body Area Network is formally defined by IEEE 802.15 as, "a communication standard optimized for low power devices and operation on, in or around the human body (but not limited to humans) to serve a variety of applications including medical,
consumer electronics / personal entertainment and other" [IEEE 802.15]. In more common terms, a Body Area Network is a system of devices in close proximity to a persons body that cooperate for the benefit of the user. This paper discusses several uses of the BAN technology As IEEE mentioned, the most obvious application of a BAN is in the medical sector, however there are also more recreational uses to BANs. This paper will discuss the technologies surrounding BANs, as well as several common applications for BANs. At the end of the paper we will briefly discuss the challenges associated with BANs and some solutions that are on the horizon.

BAN technology is still an emerging technology, and as such it has a very short history.
BAN technology emerges as the natural byproduct of existing sensor network technology
and biomedical engineering. Professor Guang-Zhong Yang was the first person to
formally define the phrase "Body Sensor Network" (BSN) with publication of his book
Body Sensor Networks in 2006. BSN technology represents the lower bound of power
and bandwidth from the BAN use case scenarios. However, BAN technology is quite
flexible and there are many potential uses for BAN technology in addition to BSNs.

  Download :     Reports & Presentation (.zip)

Seminar report on "Intelligent Voice Response System (IVRS)"

  In today’s competitive world any business must build flexible systems that adapt easily to evolving requirements of the critical business processes. IVRS is one such system that
transforms the traditional business model into customer centric model. IVRS is historically interactive speech memory driven that walk the caller through a series of prompts where they respond to questions by pressing the combination of one or more buttons of the phone keypad.
The decision tree associated with the prompts and the responses will route the caller to information they desire. These IVRS systems are typically utilized to check bank account balance, buy and sell stocks, check the show times for your favorite movie. In telephony, Intelligent Voice Response, or IVR, is a phone technology that allows a computer to detect voice and touch tones using a normal phone call. The IVR system can respond with pre-recorded or dynamically generated audio to further direct callers on how to proceed. IVR systems can be used to control almost any function where the interface can be broken down into a series of simple menu choices. Once constructed IVR systems generally scale well to handle large call volumes.


  Download :     Full Report (.pdf)

Seminar report on "Web Spoofing"

 The Web is currently the pre-eminent medium for electronic service delivery to remote users. As a consequence, authentication of servers is more important than ever. Even sophisticated users base their decision whether or not to trust a site on browser cues—such as location bar information, SSL icons, SSL warnings, certificate information, response time, etc.
In the seminal work on web spoofing, Felten et al showed how a malicious server could forge some of these cues—but using approaches that are no longer reproducible. However, subsequent evolution of Web tools has not only patched security holes—it has also added new
technology to make pages more interactive and vivid. In this paper, we explore the feasibility of
web spoofing using this new technology—and we show how, in many cases, every one of the
above cues can be forged.

Nearly every aspect of social, government, and commercial activity is moving into electronic
settings. TheWorldWideWeb is the de facto standard medium for these services. Inherent
properties of the physical world make it sufficiently difficult to forge a convincing storefront or
ATM that successful attacks create long-cited anecdotes . As a consequence, users of physical
services—stores, banks, newspapers—have developed a reasonably effective intuition of when to trust that a particular service offering is exactly what it appears to be. However, moving from
“bricks and mortar” to electronic introduces a fundamental new problem: bits are malleable.
Does this intuition still suffice for the new electronic world? When one clicks on a link that says“Click Here to go to TrustedStore.Com,” how does one know that’s where one has been taken?
Answering these questions require examining how users make judgments about whether
to trust a particular Web page for a particular service. Indeed, the issue of user trust judgment is largely overlooked; research addressing how to secure Web servers, how to secure the client-server connection, and how to secure client-side management risk being rendered moot, if the final transmission of trust information the human user is neglected.


  Download :     Full Report (.pdf)

Secured Data Transmission using Cryptographic and Steganographic Techniques

 ‘The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not on the chance of his not attacking, but rather on the fact that we have made our position unassailable.’

- The art of war, Sun Tzu

As we enter the age of universal electronic connectivity, electronic eavesdropping and electronic fraud threaten the prosperity of corporations and individuals. Thus, the role of digital security has become increasingly important. The security requirements within an organization have undergone major changes in the last few decades. Before the widespread use of data processing equipment, data and information valuable to an organization were made invulnerable primarily by physical and administrative means. With the advent of computer networks and the internet however, the design of automated tools which ensure security and privacy of information transferred across networks was inevitable. Though there are several security techniques in use, two of the most prominent ones are steganography and cryptography. In this paper , we discuss these two techniques and how their combination can result in an efficient and secure data transfer software.

  Download :     Full Report (.doc)

Seminar report on "Blue Tooth"

 Bluetooth wireless technology is a cable replacement technology that provides wireless communication between portable devices, desktop devices and peripherals. It is used to swap data and synchronize files between devices without having to connect each other with cable. The wireless link has a range of 10m which offers the user mobility. This technology can be used to make wireless data connection to conventional local area networks (LAN) through an access point. There is no need for the user to open an application or press button to initiate a process. Bluetooth wireless technology is always on and runs in the background. Bluetooth devices scan for other Bluetooth devices and when these devices are in range they start to exchange messages so they can become aware of each others capabilities. These devices do not require a line of sight to transmit data with each other. Within a few years about 80 percent of the mobile phones are expected to carry the Bluetooth chip. The Bluetooth transceiver operates in the globally available unlicensed ISM radio band of 2.4GHz. The ISM bands include frequency range at 902MHz to 928MHz and 2.4GHz to 2.484GHZ which do not require operator license from a regulatory agency. This means that Bluetooth technology can be used virtually anywhere in the world. Another type of wireless technology that is being used nowadays is infrared signals. The choice of using either one of the wireless technology will depend on the application for which it is being used. Bluetooth is an economical, wireless solution that is convenient, reliable, easy to use and operates over a longer distance than infrared. The initial development started in 1994 by Ericsson. Bluetooth now has a special interest group (SIG) which has 1800 companies worldwide. Bluetooth technology enables voice and data transmission in a short-range radio. There is a wide range of devises which can be connected easily and quickly without the need for cables. Soon people world over will enjoy the convenience, speed and security of instant wireless connection. Bluetooth is expected to be embedded in hundreds of millions mobile phones, PCs, laptops and a whole range of other electronic devices in the next few years. This is mainly because of the elimination of cables and this makes the work environment look and feel comfortable and inviting. 

   Download :     Full Report (.doc)

Seminar report on "Cluster Computing"

The recent advances in high-speed networks and improved microprocessor performance are making clusters or networks of workstations an appealing vehicle for cost effective parallel computing. Clusters built using commodity hardware and software components are playing a major role in redefining the concept of supercomputing.A cluster is a type of parallel or distributed processing system, which consists of a collection of interconnected stand-alone computers cooperatively working together as a single, integrated computing resource.
This cluster of computers shares common network characteristics like the same namespace and it is available to other computers on the network as a single resource. These computers are linked together using high-speed network interfaces between themselves and the actual binding together of the all the individual computers in the cluster is performed by the operating system and the software used.

   Download :     Full Report (.doc)

Seminar report on "HP Java"

  HPJava is a programming language extended from Java to support parallel programming, especially (but not exclusively) data parallel programming on message passing and distributed memory systems, from multi-processor systems to workstation clusters. 

Although it has a close relationship with HPF, the design of HPJava does not inherit the HPF programming model. Instead the language introduces a high-level structured SPMD programming style--the HPspmd model. A program written in this kind of language explicitly coordinates well-defined process groups. These cooperate in a loosely synchronous manner, sharing logical threads of control. As in a conventional distributed-memory SPMD program, only a process owning a data item such as an array element is allowed to access the item directly. The language provides special constructs that allow programmers to meet this constraint conveniently. 

Besides the normal variables of the sequential base language, the language model introduces classes of global variables that are stored collectively across process groups. Primarily, these are distributed arrays. They provide a global name space in the form of globally subscripted arrays, with assorted distribution patterns. This helps to relieve programmers of error-prone activities such as the local-to-global, global-to-local subscript translations which occur in data parallel applications. 



   Download :     Full Report (.doc)