Important Disclaimer

The purpose of this blog is purely to serve as a compilation of good technical material for my students. No financial or other motives are involved. Most of the content in this blog has been reproduced from other sources. I have made every attempt to mention the source link at the beginning of each blog. All readers are requested to kindly acknowledge that source and not this blog, in case you find the post helpful. However, I have not been able to trace the source links for some of my older posts. I wish to emphasize that this is not intentional and any help in this regard would be appreciated.

Jul 27, 2007

Seminar Papers

This post is dedicated to the final year ECE students of VAST

These are some of the recent (and not so recent) topics which have recieved much attention...if you consider them interesting...u can make them the topic of your seminar. I am giving you the topic and a very brief introduction of it. If u feel interested, you can contact me

1.Wireless Sensor Networks

Abstract:
A wireless sensor network (WSN) is a wireless network consisting of spatially distributed autonomous devices using sensors to cooperatively monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants, at different locations. The development of wireless sensor networks was originally motivated by military applications such as battlefield surveillance. However, wireless sensor networks are now used in many civilian application areas, including environment and habitat monitoring, healthcare applications, home automation, and traffic control.

Visit this site for a few ppt's on the topic, good for those of you who are too lazy to even prepare a presentation for the seminar...

http://nesl.ee.ucla.edu/tutorials/mobicom02/


Visit this site for a lot of resources on the topic......

http://wwwcsif.cs.ucdavis.edu/~bharathi/sensor/snw.html

2. Cryptography

Abstract:

Until modern times, cryptography referred almost exclusively to encryption, the process of converting ordinary information (plaintext) into unintelligible gibberish (ie, ciphertext). Decryption is the reverse, moving from unintelligible ciphertext to plaintext. A cipher (or cypher) is a pair of algorithms which perform this encryption and the reversing decryption. The detailed operation of a cipher is controlled both by the algorithm and, in each instance, by a key. This is a secret parameter (ideally, known only to the communicants) for a specific message exchange context. Keys are important as ciphers without variable keys are trivially breakable and so rather less than useful for most purposes. Historically, ciphers were often used directly for encryption or decryption, without additional procedures such as authentication or integrity checks.

In colloquial use, the term "code" is often used to mean any method of encryption or concealment of meaning. However, in cryptography, code has a more specific meaning; it means the replacement of a unit of plaintext (i.e., a meaningful word or phrase) with a code word (for example, apple pie replaces attack at dawn). Codes are no longer used in serious cryptography—except incidentally for such things as unit designations (eg, 'Bronco Flight' or Operation Overlord) —- since properly chosen ciphers are both more practical and more secure than even the best codes, and better adapted to computers as well.

Some use the terms cryptography and cryptology interchangeably in English, while others use cryptography to refer to the use and practice of cryptographic techniques, and cryptology to refer to the subject as a field of study. In this respect, English usage is more tolerant of overlapping meanings and word origins than are several European languages in which meanings of cognate words are more restricted.

Visit this site for a full tutorial (its a very gud tutorial)...

http://www.garykessler.net/library/crypto.html

3. Chaos

Refer to my previous blog post on the same topic.

4. Swarm Intelligence

Abstract:
Swarm intelligence
(SI) is an artificial intelligence technique based around the study of collective behavior in decentralized, self-organized systems. The expression "swarm intelligence" was introduced by Beni & Wang in 1989, in the context of cellular robotic systems.

SI systems are typically made up of a population of simple agents interacting locally with one another and with their environment. Although there is normally no centralized control structure dictating how individual agents should behave, local interactions between such agents often lead to the emergence of global behavior. Examples of systems like this can be found in nature, including ant colonies, bird flocking, animal herding, bacterial growth, and fish schooling.

The application of swarm principles to large numbers of robots is called swarm robotics.

Visit the following sites for more resources:

http://www.sce.carleton.ca/netmanage/tony/swarm.html
http://www.swarmintelligence.org/tutorials.php

5. Wi-Max

Abstract:
WiMAX, the Worldwide Interoperability for Microwave Access, is a telecommunications technology aimed at providing wireless data over long distances in a variety of ways, from point-to-point links to full mobile cellular type access. It is based on the IEEE 802.16 standard, which is also called WirelessMAN. WiMAX allows a user, for example, to browse the Internet on a laptop computer without physically connecting the laptop to a wall jack. The name WiMAX was created by the WiMAX Forum, which was formed in June 2001 to promote conformance and interoperability of the standard. The forum describes WiMAX as "a standards-based technology enabling the delivery of last mile wireless broadband access as an alternative to cable and DSL."

All
the resources you need is available on the wikipedia.org site

6. Holographic memory

The upcoming problems requiring very huge computing power make us today looking properly for new technical solutions not only in terms of CPU enhancement but also in terms of other PC components. Regardless of the technology used for CPU production, the data number transferred for processing are determined also by possibilities of other subsystems. Capacity of modern devices of mass memory reflects this tendency. CDs discs allow storing up to 700 MBytes, the developing technology of DVD-ROM - up to 17 GBytes. Technology of magnetic recording develops quickly as well - for the last year the typical capacity of a hard disc in the desktop computers has increased up to 15-20 GBytes and higher. But in the future computers are to process hundreds of gigabytes and even terabytes - much more than any current CDs or hard discs can accommodate. Servicing of such data volumes and their transfer for processing by ultraspeed processors requires completely new approaches when creating storage devices.

Visit the following sites for more info:

http://www.digit-life.com/articles/memorytwodirections/
http://en.wikipedia.org/wiki/Holographic_memory

7. Virtual Instrumentation

Refer to my previous blog posts

A lot of details are available on the wikipedia site regarding all the above topics, so i will advise you to go thru it too..

8. Supercapacitors

Abstract:

A supercapacitor or ultracapacitor is an electrochemical capacitor that has an unusually high energy density when compared to common capacitors. They are of particular interest in automotive applications for hybrid vehicles and as supplementary storage for battery electric vehicles.

more materials can be found in
www.doc.ic.ac.uk
www.mpoweruk.com

9. Quantum Dot

Abstract:
Quantum dots, also known as nanocrystals, are a special class of materials known as semiconductors, which are crystals composed of periodic groups of II-VI, III-V, or IV-VI materials. Semiconductors are a cornerstone of the modern electronics industry and make possible applications such as the Light Emitting Diode and personal computer. Semiconductors derive their great importance from the fact that their electrical conductivity can be greatly altered via an external stimulus (voltage, photon flux, etc), making semiconductors critical parts of many different kinds of electrical circuits and optical applications. Quantum dots are unique class of semiconductor because they are so small, ranging from 2-10 nanometers (10-50 atoms) in diameter. At these small sizes materials behave differently, giving quantum dots unprecedented tunability and enabling never before seen applications to science and technology.

visit:
www.evidenttech.com
and wikipedia

10. Reconfigurable Computing

contact me !

No comments: