School of Information Technology
Indian Institute of Technology Kharagpur
Seminar : Autumn Semester 2004
SNo
Title
Guide
1
Web Services
AG
2
Challenges in Mobile Ad-Hoc Networks
AG
3
Internet Traffic Managment
AG
4
Web Catching Strategies
AG
5
Mobile databases
DS
6
BioMetrics and Applications
DS
7
Visualizing web searching results in 3D
DS
8
Mobile SuperComputer- Scope and Challenges
DS
9
Human Computer Interaction
DS
10
Intrusion detection and containment in DB Systems
SS
11
Object track in video screens
SS
12
Approx nearlest neighbourhood search in HD data
SS
13
e-Vouting
CRM
14
IPV6- Next generation IP
SKG
15
Internet Telphony
SKG
16
W-CDMA - Tech for 3G Cellular Systems
SKG
17
Compressed domain analysis
SKG
 
  Web Services
Abstract Partha Goswami 04IT6015

The Internet has created the foundation for a networked economy—an extended business community in which vendors, partners, and customers interact and collaborate. But while the Internet Protocol (IP) standard has created a universal link between data and voice networks, companies uses business applications built from a complex array of diverse platforms, operating systems, programming languages, and vendors. Now, the software industry wants to fix this with Web services. Web services are self-contained, self-describing, modular applications that can be published, located, and invoked across the web. Web services perform functions, which can be anything from simple requests to complicated business processes. We shall present the Motivation for Web services, Web services architecture: XML, SOAP, and WS-Addressing, Discovery, Current Challenges, Future Vision

For the Report and Presentation Slides Clicke here

 
Report
[pdf] [doc]
Email : parthag@sit.iitkgp.ernet.in
Personal WebPage : http://sit.iitkgp.ernet.in/~parthag
Presentation
[pdf] [ppt]
 
  Challenges in Mobile Ad-Hoc Networks
Abstract

Abhinav Srivastava

04IT6014

In the near future, a pervasive computing environment can be expected based on the recent progresses and advances in computing and communication technologies. Next generation of mobile communication will include both popular infrastructured wireless networks and novel infrastructureless mobile ad-hoc networks (MANETs). A MANET is a collection of wireless nodes that can dynamically form a network to exchange information without using any pre-existing fixed network infrastructure. Wireless ad-hoc networks are increasingly being used in the battlefield, emergency search, rescue missions. The special features of MANET bring great opportunities together with severe challenges. This report describes the concept, features, status and fundamental problems of ad hoc networking. Special attention is paid on network layer routing strategy and intrusion detection in MANETs.

For the Report and Presentation Slides Clicke here

 
Report
[pdf] [doc] Email : abhinavs@sit.iitkgp.ernet.in
Personal WebPage : http://sit.iitkgp.ernet.in/~abhinavs
Presentation
[pdf] [ppt]
 
  Internet Traffic Managment
Abstract Prafull Suryawanshi 04IT6008

The purpose of this seminar is to discuss issues related to traffic in Internet. As we know today’s computing world mostly rely on internet for its day-to-day activity. Almost each organization in world use internet for its operation. But as internet provides limited resources, there is a sort of competition of accessing resources. It provides traffic in the internet. If this traffic is not handled carefully then it will result in congestion. So one must consider the facts related measuring and handling Internet traffic. Measuring the traffic of internet can start this traffic management. Anglicizing of output of previous step may provide good simulation. This further useful to model traffic and use certain ways to provide good traffic management. Traffic management is key for quality of service. So one must consider the importance of work in this field. As in real world traffic inspectors control the vehicle traffic on the roads, same in internet this work is done by traffic engineers. They control the traffic to provide best quality of service.

For the Report and Presentation Slides Clicke here

 
Report
[pdf] [doc] Email : prafulls@sit.iitkgp.ernet.in
Personal WebPage : http://sit.iitkgp.ernet.in/~prafulls
Presentation
[pdf] [ppt]
 
  Web Caching
Abstract Sai Rahul Reddy P 04IT6011

Caching popular objects close to the users provides an opportunity to combat this latency by allowing users to fetch data from a nearby cache rather than from a distant server. Web caching has been recognized as one of the effective schemes to alleviate the service bottleneck and reduce the network traffic, thereby minimize the user access latency.

In this seminar I would like to give about why we need web caching, desirable properties of the web cache, cache resolution, cache replacement policies, cache coherency and about caching of dynamic data.

For the Report and Presentation Slides Clicke here

 
Report
[pdf] [doc] Email : sair@sit.iitkgp.ernet.in
Personal WebPage : http://sit.iitkgp.ernet.in/~sair
Presentation
[pdf] [ppt]
 
  IRIS Biometrics for Person Identification
Abstract Lakshmi Supriya D 04IT6002

A wide variety of systems require reliable personal recognition schemes to either conform or determine the identity of an individual requesting their services. The purpose of such schemes is to ensure that only a legitimate user, access the rendered service. In this paper, we will see many Biometric authentications and conclude that Iris biometric is effective, fast and reliable for the person recognition compare to any other well-known biometrics. And this Iris recognition is a new system for person identification. On this iris recognition we have high confidence because it won’t make any false matches, despite so many chances in several million comparisons.. Since this iris recognition is accurate and efficient in person identification.

For the Report and Presentation Slides Clicke here

 
Report
[pdf] [doc]
Email : lakshmis@sit.iitkgp.ernet.in
Personal WebPage : http://sit.iitkgp.ernet.in/~lakshmis
Presentation
[pdf] [ppt]
 
  Visualization of web search results in 3D
Abstract Kotaiah Choudary Ravipati 04IT6010

The popular technique for finding information on the WWW is to use one of the content-based search tools (Google, yahoo, Msn, Excite, Altavista, etc.). These search tools attempt to index the entire web via its content, where they define content to be the words in a page. The exponential growth in Web sites is making it increasingly difficult to extract useful information on the Internet using existing search engines. When searching the Web, the user typically enters one or more keywords and in return is presented with a list of matching pages, rank ordered according to how well they match. Despite a wide range of sophisticated indexing and data retrieval features, search engines often deliver satisfactory results only when users know precisely what they are looking for. It may be difficult for the user to compare the results returned by different queries by matching successive or multiple combinations of keywords in search pages. Search engines proprietary ranking algorithms often do not reflect individual user preferences.

For the Report and Presentation Slides Clicke here

 
Report
[pdf] [doc]
Email : kotaiahc@sit.iitkgp.ernet.in
Personal WebPage : http://sit.iitkgp.ernet.in/~kotaiahc
Presentation
[pdf] [ppt]
 
  Human Computer Interaction
Abstract Dhiren Parmar 04IT6005

Human-computer interaction (HCI) is the study of how people design, implement, and use interactive computer systems and how computers affect individuals, organizations, and society. This encompasses not only ease of use but also new interaction techniques for supporting user tasks, providing better access to information, and creating more powerful forms of communication. It involves input and output devices and the interaction techniques that use them; how information is presented and requested; how the computer’s actions are controlled and monitored; all forms of help, documentation, and training; the tools used to design, build, test, and evaluate user interfaces; and the processes that developers follow when creating Interfaces.

For the Report and Presentation Slides Clicke here

 
Report
[pdf] [doc] Email : parmarm@sit.iitkgp.ernet.in
Personal WebPage : http://sit.iitkgp.ernet.in/~parmarm
Presentation
[pdf] [ppt]
 
  Intrusion Detection and Containment in Database Systems
Abstract Abhijit Bhosale 04IT6013

Today many approaches are used to protect the data as well as the networks from attackers. These are mainly security methods from password protected access up to firewalls which are used as per the needs. Many times these are not enough and the systems and networks are always under the thread. One way to make data more secure is using Intrusion Detection Systems (ISD) on critical systems. The ISDs work for early detection of attacks and make the recovery of lost or damaged data simpler. Many researchers are working on increasing the intrusion detection efficiency and accuracy. But most of these efforts are to detect the intrusions at network or operating system level. They are not capable of detecting corruption data due to malicious transactions in databases. We will discuss different ways of detecting the malicious transactions and ways to recover the data from those malicious transactions. Mainly we will see the data mining solution proposed by Yi Hu et al for database intrusion detection and solution by Paul Ammann et al for recovery from the malicious transactions.

For the Report and Presentation Slides Clicke here

 
Report
[pdf] [doc] Email : abhijitb@sit.iitkgp.ernet.in
Personal WebPage : http://sit.iitkgp.ernet.in/~abhijitb
Presentation
[pdf] [ppt]
 
  Object tracking in video scenes
Abstract Alok k. Watve 04IT6012

In the field of computer vision, tracking and motion estimation of 3D objects take on a significant place. Object tracking is the process of identifying an object of interest, finding position of that object, and following the motion of the object. A lot of applications, especially in robotics, transport or in the military domain, require an accurate knowledge of localization and motion of the objects in the scene. Many works were carried out on the subject, from which emerge 3 classes of methods. Feature-based methods aim at extracting characteristics such as points, line segments from image sequences, tracking stage is then ensured by a matching procedure at every time instant. Differential methods are based on the optical flow computation, i.e. on the apparent motion in image sequences, under some regularization assumptions. The third class uses correlation to measure interimage displacements. Selection of a particular approach largely depends on the domain of the problem. The seminar takes a brief overview of important steps in object tracking. It also takes a look at certain methods employed by various researchers to solve particular problems in the field. The basic objective of this discussion is to understand what object tracking is and what are the fundamental operations involved in the process of tracking.

For the Report and Presentation Slides Clicke here

 
Report
[pdf] [doc] Email : alokw@sit.iitkgp.ernet.in
Personal WebPage : http://sit.iitkgp.ernet.in/~alokw
Presentation
[pdf] [ppt]
 
  e-Vouting
Abstract Dhaval Patel 04IT6006

This Seminar has been developed in an attempt to provide an objective introduction to the issues of E-Voting surrounding the introduction of information technologies into the voting process. Voters’ trust in elections comes from a combination of the Mechanisms and procedures we use to record and tally votes. In this seminar I am going to present the various Electronic voting Method like voting by kiosk, Internet, telephone, punch card, and optical scan ballot, Proms and Cons of all voting types. I have also described how the evolution of various voting machines has been carried out in last 100 eras. There is a discussion on some of the problem found in e-voting machine like Florida’s butterfly ballots design problem. As the new problem known to the people, what is a reaction of the people toward this voting process? Like I have discussed some the well-known issues like Voter Verifiable result, Mercuri Method, Ballot Design Issues and etc.. At the end I have illustrated IEEE performance standard for voting machine.

 

For the Report and Presentation Slides Clicke here

 
Report
[pdf] [doc] Email : patelc@sit.iitkgp.ernet.in
Personal WebPage : http://sit.iitkgp.ernet.in/~patelc
Presentation
[pdf] [ppt]
 
  IPv6 : Next Generation IP
Abstract N Ranjith Kumar 04IT6003

The need for a new Internet Protocol is well understood and accepted in the networking industry. Requirements for more address space, simpler address design and handling at the IP layer, better QoS( Quality of service) support, greater security, and an increasing number of media types and Internet-capable devices have all contributed to drive the development of Internet Protocol version 6 (IPv6). IPv4, the current version of the Internet Protocol deployed worldwide, has proven remarkably robust, easy to implement, and interoperable with a wide range of protocols and applications. Though substantially unchanged since it was first specified in the early 1980s, IPv4 has supported the scaling of the Internet to its current global proportions. However, the ongoing explosive growth of the Internet and Internet services has exposed deficiencies in IPv4 at the Internet’s current scale and complexity. IPv6 was developed specifically to address these deficiencies, enabling further Internet growth and development.

 

For the Report and Presentation Slides Clicke here

 
Report
[pdf] [doc] Email : nrk@sit.iitkgp.ernet.in
Personal WebPage : http://sit.iitkgp.ernet.in/~nrk
Presentation
[pdf] [ppt]
 
  Internet Telephony
Abstract Nitin Prakash Sharma 04IT6004

Communication via packet and data networks such as IP, ATM, Frame Relay has become a preferred strategy for both corporate and public networks. Experts predict that data traffic will soon exceed telephone traffic if it already hasn’t. As a result of this there has been considerable interest in transmitting traditional telephone traffic over data
networks. Internet Telephony is a powerful and economical communication options. It is a general term for the technologies that use the Internet Protocol's packet-switched connections to exchange voice, fax, and other forms of information that have traditionally been carried over the dedicated circuit-switched connections of the public switched telephone network (PSTN). It is based on IP networking, which offers the potential for much more than just telephony. ). The seminar will attempt to provide a basic understanding of what Internet telephony is and some of the protocols used in it. It also covers type of connections and addressing used for those connections in Internet telephony, with a brief description of requirements for Internet telephony management.

For the Report and Presentation Slides Clicke here

 
Report
[pdf] [doc]
Email : nitins@sit.iitkgp.ernet.in
Personal WebPage : http://sit.iitkgp.ernet.in/~nitins
Presentation
[pdf] [ppt]
 
  W-CDMA : Wireless Code Division Multiple Access
Abstract Pradipta Biswas 04IT6007

W-CDMA (Wideband Code-Division Multiple Access), an ITU standard derived from Code Division Multiple Access, is officially known as IMT-2000 direct spread. W-CDMA is a third-generation mobile wireless technology that promises much higher data speeds to mobile and portable wireless devices than commonly offered in today's market. The present seminar discusses the applicability of WCDMA system with respect to 3G mobile system. The reason for the popularity of spread spectrum technique is addressed and the evolution of WCDMA over CDMA is also pointed out. The protocol architecture of WCDMA, WCDMA network architecture and the compatibilty of existing GSM system with WCDMA system are also discussed in brief. Keywords: Code Division Multiple Access, Wideband Code Division Multiple Access, Protocol architecture, Radio Access Network, Global System Miobile.

For the Report and Presentation Slides Clicke here

 
Report
[pdf] [doc] Email : pbiswas@sit.iitkgp.ernet.in
Personal WebPage : http://sit.iitkgp.ernet.in/~pbiswas
Presentation
[pdf] [ppt]

All rights Reserved. ©2004.
School of Information Technology