Friday, July 15

Computer Cluster Seminar Reports

About Computer Cluster

A computer cluster is a group of loosely coupled computers that work together closely so that in many respects it can be viewed as though it were a single computer. Clusters are commonly connected through fast local area networks. Clusters are usually deployed to improve speed and/or reliability over that provided by a single computer, while typically being much more cost-effective than single computers of comparable speed or reliability. 

Cluster computing has emerged as a result of convergence of several trends including the availability of inexpensive high performance microprocessors and high speed networks, the development of standard software tools for high performance distributed computing. Clusters have evolved to support applications ranging from ecommerce, to high performance database applications. Clustering has been available since the 1980s. Cluster computing can also be used as a relatively low-cost form of parallel processing for scientific and other applications that lend themselves to parallel operations.

Talking Email

Talking Email allows users to record a free voice message of up to 30 seconds in duration and send it as an email message. The service has the capability to deliver the message to thousands of users simultaneously. Additionally, users can post their voice message as a link embedded on a Web page. As the popularity of this service grew, meeting the demand require a scalable computing platform architecture.

Parallel And Distributed Data Mining

Clusters have proved themselves to be very effective for a variety of data mining applications. The data mining process involves both compute and data intensive operations.
Read More

Sunday, November 22

iPAD - Computer Science Engineering


The iPad is a tablet computer designed and developed by Apple. It is particularly marketed for consumption of media such as books and periodicals, movies, music, and games, and for general web and e-mail access. At around 700 grams its size and weight are intermediate between most contemporary smartphones and laptop computers. Sales of the iPad tablet are strong.


Apple is best known for the hardware products which includes mac computers ,iphone the ipod and now another revolutionary product called the Ipad. It is particularly marketed as a platform for audio and visual media such as books, periodicals, movies, music, and games as well as web content. It has been designed to fill the illusive gap between the notebooks and the smartphones. It has got the features of both the laptops and the iphone . Like iPhone and iPod Touch, the iPad is controlled by a multitouch display — a break from most previous tablet computers, which used a pressure-triggered stylus. All of the built-in apps on iPad were designed from the ground up to take advantage of the large Multi-Touch screen and advanced capabilities of iPad. And they work in any orientation. So you can do things with these apps that you can’t do on any other device. Its hard to believe how something so thin and light can be so capable.

iPAD - Computer Science Seminar Topic

Power And Battery

The iPad uses an internal rechargeable lithium-ion polymer battery. The batteries are made in Taiwan by Simplo Technology, which makes 60% of them, and Dynapack International Technology. The iPad is designed to be charged with a high current (2 amperes) using the included USB 10 W power adapter. While it can be charged by a standard USB port from a computer, these are limited to 500 milliamperes (half an amp). As a result, if the iPad is turned on while being charged with a normal USB computer port, it will charge much more slowly, if at all.


The iPad can use Wi-Fi network trilateration from Skyhook Wireless to provide location information to applications such as Google Maps. The3G model contains A-GPS to allow its position to be calculated with GPS or relative to nearby cellphone towers; it also has a black plastic accent on the back side to improve 3G radio sensitivity For wired connectivity, the iPad has a dock connector; it lacks the Ethernet and USB ports of larger computers.

Software Specifications

Like the iPhone, with which it shares a development environment (iPhone SDK, or software development kit, version 3.2 onwards), the iPad only runs its own software, software downloaded from Apple's App Store, and software written by developers who have paid for a developer's license on registered devices.The iPad runs almost all thirdparty iPhone applications, displaying them at iPhone size or enlarging them to fill the iPad's screen. Developers may also create or modify apps to take advantage of the iPad's features. Application developers use iPhone SDK for developing applications for iPad.

Ipad Applications - IBOOKS

Download the iBooks app free from the App Store. More than a great ebook reader, it’s also an amazing place to browse and shop for books day or night. Tap the iBooks icon and your bookshelf appears. Tap the Store button and the bookshelf flips around like a secret passageway to reveal the iBookstore, where you can browse tens of thousands of books — many of them free. Browse by title, author, or genre. View what’s featured on the iBookstore, the New York Times best-seller lists, and more. When you find a book you like, tap it to see more details, peruse reviews, even read a sample. Download the book and it appears on your bookshelf, ready to read. Books you download will also be available for your iPhone and iPod touch, so you’ll never be without your favorite reads.

The Ipad And The Ipod Touch 

The iPad runs iPhone OS. It will use many of the same APIs to write your iPad apps that we use to write apps for the iPhone. So isn’t the iPad just a big iPod touch? It’s certainly true that an iPad is much bigger than an iPhone. An iPad is about the size of the printed version of this book—about half an inch taller and a little thinner, but roughly the same size. The iPhone is much smaller. Here’s a picture that shows the relative size of two iPhone screens to the iPad screen. So the iPad is a big iPod touch—it’s just not just a big iPod touch. Being bigger is the key to what makes it special.
Read More

Sunday, June 28

Cell Phone Jammer : Seminar Report|PPT|PDF|DOC|Presentation|Free Download

A GSM Jammer or cell phone jammer is a device that transmit signal on the same frequency at which the GSM system operates, the jamming success when the mobile phones in the area where the jammer is located are disabled. 

Communication jamming devices were first developed and used by military. Where tactical commanders use RF communications to exercise control of their forces, an enemy has interest in those communications. This interest comes from the fundamental area of denying the successful transport of the information from the sender to the receiver. 

Nowadays the mobile jammer devices or cell phone jammer software are becoming civilian products rather than electronic warfare devices, since with the increasing number of the mobile phone users the need to disable mobile phones in specific places where the ringing of cell phone would be disruptive has increased. These places include worship places, university lecture rooms, libraries, concert halls, meeting rooms, and other places where silence is appreciated 

Construction of Mobile Jammer

Jamming devices overpower the cell phone by transmitting a signal on the same frequency as the cell phone and at a high enough power that the two signals collide and cancel each other out. Cell phones are designed to add power if they experience low-level interference, so the jammer must recognize and match the power increase from the phone. Cell phones are full-duplex devices, which mean they use two separate frequencies, one for talking and one for listening simultaneously. Some jammers block only one of the frequencies used by cell phones, which has the effect of blocking both. The phone is tricked into thinking there is no service because it can receive only one of the frequencies. Less complex devices block only one group of frequencies, while sophisticated jammers can block several types of networks at once to head off dual-mode or tri-mode phones that automatically switch among different network types to find an open signal. Some of the high-end devices block all frequencies at once and others can be tuned to specific frequencies. 

To jam a cell phone, all you need is a device that broadcasts on the correct frequencies. Although different cellular systems process signals differently, all cell-phone networks use radio signals that can be interrupted. GSM, used in digital cellular and PCS-based systems, operates in the 900-MHz and 1800-MHz bands in Europe and Asia and in the 1900-MHz (sometimes referred to as 1.9-GHz) band in the United States. Jammers can broadcast on any frequency and are effective against AMPS, CDMA, TDMA, GSM, PCS, DCS, iDEN and Nextel systems. Old-fashioned analog cell phones and today's digital devices are equally susceptible to jamming. Disrupting a cell phone is the same as jamming any other type of radio communication. A cell phone works by communicating with its service network through a cell tower or base station. Cell towers divide a city into small areas, or cells. As a cell phone user drives down the street, the signal is handed from tower to tower 

Cell Phone Jammer

A jamming device transmits on the same radio frequencies as the cell phone, disrupting the communication between the phone and the cell-phone base station in the town 

It's a called a denial-of-service attack . The jammer denies service of the radio spectrum to the cell-phone users within range of the jamming device. Older jammers sometimes were 

limited to working on phones using only analog or older digital mobile phone standards. Newer models such as the double and triple band jammers can block all widely used systems (AMPS, iDEN, GSM, etc) and are even very effective against newer phones which hop to different frequencies and systems when interfered with. As the dominant network technology and frequencies used for mobile phones vary worldwide, some work only in specific regions such as Europe or North America. 

The power of the jammer's effect can vary widely based on factors such as proximity to towers, indoor and outdoor settings, presence of buildings and landscape, even temperature and humidity play a role. There are concerns that crudely designed jammers may disrupt the functioning of medical devices such as pacemakers. However, like cell phones, most of the devices in common use operate at low enough power output (<1W) to avoid causing any problems

Type "A" Device: JAMMERS :

In this device we overpower cell phone's signal with a stronger signal, This type of device comes equipped with several independent oscillators transmitting ‘jamming signals' capable of blocking frequencies used by paging devices as well as those used by cellular/PCS systems' control channels for call establishment. When active in a designated area, such devices will (by means of RF interference) prevent all pagers and mobile phones located in that area from receiving and transmitting calls. This type of device transmits only a jamming signal and has very poor frequency selectivity, which leads to interference with a larger amount of communication spectrum than it was originally intended to target. Technologist Jim Mahan said, “There are two types. One is called brute force jamming, which just blocks everything. The problem is, it's like power-washing the airwaves and it bleeds over into the public broadcast area. The other puts out a small amount of interference, and you could potentially confine it within a single cell block. You could use lots of little pockets of small jamming to keep a facility under control.” 


Unlike jammers, Type “B” devices do not transmit an interfering signal on the control channels. The device, when located in a designated ‘quiet' area, functions as a ‘detector'. It has a unique identification number for communicating with the cellular base station. When a Type “B” device detects the presence of a mobile phone in the quiet room; the ‘filtering' (i.e. the prevention of authorization of call establishment) is done by the software at the base station. 

When the base station sends the signaling transmission to a target user, the device after detecting simultaneously the presence of that signal and the presence of the target user, signals the base station that the target user is in a ‘quiet' room; therefore, do not establish the communication. Messages can be routed to the user's voice- mail box, if the user subscribes to a voice-mail service. This process of detection and interruption of call establishment is done during the interval normally reserved for signaling and handshaking. For ‘emergency users', the intelligent detector device makes provisions for designated users who have emergency status. These users must pre-register their phone numbers with the service providers. When an incoming call arrives, the detector recognizes that number and the call are established for a specified maximum duration, say two minutes. The emergency users are also allowed to make out going calls. Similarly, the system is capable of recognizing and allowing all emergency calls routed to “911”. 

It should be noted that the Type “B” detector device being an integral part of the cellular/PCS systems, would need to be provisioned by the cellular/PCS service providers or provisioned by a third-party working cooperatively with full support of the cellular/PCS service providers .
Read More

Thursday, June 18

Fluid Amplifiers Electronics Seminar Topics

Updated on 18/6/2015

Basic Principle Of Fluid Amplifier

          Most popular application of fluidics is amplifiers. A fluid amplifier is basically a flat piece of metal or plastic in which shallow passages are engraved for the flow of fluid.

The arrangement of these passages differs for each type of fluid amplifiers, but in principle all the amplifiers have a main power stream, which changes its direction of control jet.

          The tendency of fluid to chose one side of a symmetrically diverging channel and flow in an asymmetric way is called “Conda effect” in honor of the first man (in 1930’s) to observe and utilize the phenomenon. Subsequent work has shown that, if symmetrically placed splitter is very close to the entrance part of the main power jet, then this jet is divided equally in both channels.

Fluid Amplification

          Amplification function can be achieved by employing fluid amplifier. The amplifiers may be electronic or fluidic. Amplifier is a device which gives a large change in output of either pressure or both as a result of small change in control input. In other words we can say that amplifies its input signals.

Generally amplifiers are of following types.
     1. Digital amplifiers
     2. Analogue amplifiers


This method is used to blow the whistle at pre adjusted time and employs NOT-AND logic functions.

Supply tubes are counted to the clock from the rear at 12 points (at 5 minute intervals). The output tubes are fixed in the clock glass exactly opposite to the supply tubes. The minute hand moved in the gap between these supply tubes and output tubes. These minute hands interrupt the passage of the jet.

Air is supplied to all the 12 supply tubes and to any one of the output tubes. The output tube is connected to the NOT element through a flexible pipe. In the normal position (when minute hand is not interrupting the jet) input signal remains on’ which results switching off the output. Thus the NOT element normally remains ‘off’ and it starts when the minute hand interrupts the air system.

When the lever valve is on position and supply from it is on, AND element will not operates until NOT elements also supplies the output as shown in the figure. Thus when both signals are supplied (i.e. at the point when minute hand interrupts the air system) the AND unit will operate the step up relay which then blow the whistle.

Thus the whistle can be blow at any preset time, by providing the interruptible jet at that particular position on the dial. Timing –with the minute hand interrupting the jet, output tube at 3 (at 15 minute position) and lower valve is in on position, AND function is complete, whistle is blowing.

Logical Function NOT

This logic function can also be achieved by employing one turbulent amplifier. If one input signal is used, the result is NOT i.e. No output will be available. This is also known as ‘signal inversion’.

Logical Function OR

This logic function can be achieved by two turbulent amplifiers. If an input signal either A or B or C or D is applied to turbulent amplifier X, then output from this amplifier will be off. As shown in figure this will cause the input signal E to turbulent amplifier T to be off. This will result in output from the amplifier.


1. Nuclear application: - Neutron flux detector                                                                
2. Industrial application:-Sewing machine control. 

3. Marine application:-Turbine speed sensors.
4. Medical application: - Artificial heart and lung ventilators.

Read More

Saturday, June 6

Computer Science(CSE) Engineering Seminar with Abstract

Seminar Topic Title for Computer Science(CSE) Engineering
Seminar Topic Title for Computer Science(CSE) Engineering

·         64 bit Computing 
·         Blu RayDisc 
·         GoogleWave 
·         GraphicalPassword Authentication  
·         Captcha
·         EyePhone 
·         3G  
·         CiscoIOS Firewall
·         BlueEyes     
·         ComputerForensics    
·         AJAX     
·         ReverseEngineering Techniques
·         DigitalWatermarking  
·         GoogleApp Engine      
·         CorDECT 
·         Google Glass
·         Bittorrent     
·         A Plan ForNo Spam
·         3DOptical Data Storage
Read More

Saturday, May 16

Wave Energy Converter

Abstract: - Wave Energy Converter :- 

The Wave Energy Converter - WEC is a new, highly efficient technology that harnesses the immense, renewable energy contained in ocean waves. Its unique ability to extract and convert energy from both the rising and falling of waves, represents a technological breakthrough.

A wave energy conversion apparatus comprises at least two devices , each comprising a surface float , at least one of the surface floats being rigidly attached to a submerged body . The movement between the at least two devices preferably effects an energy generation which is harnessed by the linkages.

The apparatus may also include mooring systems that maintain the complete apparatus in a position that is consistent with statutory requirements and not significantly inhibit its efficient operation.

Machine Configuration

Two types of magnet fixation methods, surface mounting and burying magnets between pole efficiency and low material usage is desired. The electromagnetic efficiency includes hysteresis losses, eddy current losses and resistive losses. Furthermore, a low load angle is desired. A machine with inherently low load angle has better performance at both normal and transient conditions and is less affected by changing loads and varying frequencies. The four rotor concepts are simulated for different magnet dimensions and various pole widths. Output power, voltage and stator width are held constant in the simulation and the vertical length of the rotor is iterated to fulfill these conditions, usage such as total magnet volume, stator steel.

Wave Energy Converter Seminar Topics

Magnet Dimensions

Different heights to width relations of the magnets have been investigated in order to see if there is an optimum. The magnet volume of single magnet is kept constant and the electromagnetic efficiency and total magnet weight is plotted for different height to width relations of the magnets. As can be seen the electromagnetic efficiency is steadily increasing and the total magnet weight is decreasing with increasing magnet width for the surface mounted magnets. The pole width limits the magnet width and no optimum is reach for the surface mounted magnets. 

Floating Wave Energy Extractor 

Another variation of a wave energy converter, which uses the vertically exerted force of a wave, is a Floating wave energy extractor.

About the technology

The floating wave energy extractor is also a method for the maximum exploitation of the wave energy and it is designed for distant offshore with very unstable sea surface. The system is consists of a rectangular shaped huge mass floating body supported by a large number of floating air columns. The air column’s extensions are connected to pistons. The pistons are placed its own cylinders and it can move up and down through the cylinders when the floating air columns moves with the up-down movements of the waves. The upper side of the cylinders has two valves. One to a high-pressure fluid pipe and it will open when the floating air column on crest. One valve is to the low-pressure fluid pipe and it will open when the floating air column on the trough. The whole system is anchored to the sea bottom.  


When the wave moves through the floating air columns, it to oscillate the floating air columns. When some of the air columns (air columns that on the crest) move upward, the whole weight of the floating system will be supported through that air columns. Also, now some floating air columns (the air columns that on the trough) will move downward. As some of the air columns move upward, the pistons of those air columns to pressurize its corresponding cylinders and the hydraulic fluid inside of the cylinders rush to the high-pressure fluid pipe with high pressure (now the valves to the low-pressure fluid pipe will be closed). Since the whole of the high-pressure fluid pipes are interconnected, the net pressure will focus on the turbine and the turbine will rotate. As the floating air columns that on the trough move down ward because of the gravity, the valves to the high-pressure fluid pipe will be closed and the valves to the low-pressure fluid pipe (the low-pressure fluid pipes are also interconnected) will be open. Now the low-pressure fluid will enter to the cylinders and will be filled. As the turbine rotate, the generator connected to the turbine generate electricity. 


      moorings – long-term fatigue of lines and connections; 

      standard couplings for quick-release and re-attachment of moorings and cables; 

      reduced-cost production of cables, construction and laying offshore;
Read More
Home About-us Computer Science Electronics Mechanical Electrical IT Civil
Copyright © 2016 | All Rights Reserved. Design By Templateclue