School of Information Technology
Indian Institute of Technology Kharagpur
Seminar : Autumn Semester 2005
MTech - Batch 2005
     
SNo
Title
Date
1
10-08-2005
2
10-08-2005
3
10-08-2005
4
17-08-2005
5
17-08-2005
6
17-08-2005
7
24-08-2005
8
24-08-2005
9
24-08-2005
10
31-08-2005
11
31-08-2005
12
31-08-2005
13
07-09-2005
14
07-09-2005
15
07-09-2005
16
07-09-2005
 
Mesh Networking
Abstract   Vipin Mewar
Mesh Networking is based on routing techniques originally developed for battlefield communications. By pushing intelligence decision making to the edge of network, high performance and scalable networks can be built at very low cost. Mesh networking play an important role in the wireless community. It promises self-healing, multi-hop networking capability that lowers node costs and power consumption, and increase reliability in a real-world noisy environment.
     
For the Presentation Slides Clicke here  
Email :
Personal WebPage :
Presentation [ppt]
Report [doc]
 
 
 
Global Positioning System
Abstract   Prateek Rastogi
GPS, which stands for Global Positioning System, is the only system today able to show you your exact position on the Earth anytime, in any weather, anywhere. GPS uses satellite technology to enable a terrestrial terminal to determine its position on the Earth in latitude and longitude. GPS satellites, 24 in all, orbit 11,000 miles above the Earth. Ground stations located worldwide continuously monitor them. The satellites transmit signals that can be detected by anyone with a GPS receiver. Using the receiver, you can determine your location with great precision.
     
For the Presentation Slides Clicke here  
Email :
Personal WebPage :
Presentation [ppt]
Report [doc]
 
 
 
TeleMedicine System
Abstract   Prasad Mane
Many patients with diseases difficult to diagnose and treat come to hospitals for medical help, and the cost of traveling and accommodation is high for them, especially for those from the poor or remote border areas. As networks become more advanced and increase in speed, various nergetic activities have begun to emerge. New networks will cause a major revolution in society, and one area, which is expected to be an effective application of new networks, is telemedicine. In general, Telemedicine can be defined as the delivery of health care and sharing of medical knowledge over a distance using telecommunication means. Telemedicine provides medical information exchange at a distance, to support medical procedure, with the ultimate goal for improving community health care. In these experiments, integrated functions such as the transmission of medical images, collaboration and video conferencing, and provided superb human interfaces for telemedicine. As high-speed broadband networks spread, telemedicine support functions and areas where telemedicine services are available will increase. In the medical field, the emergence of a new format for medicine is expected, to include an equalization of opportunities to receive advanced medical treatment, and providing exacting medical care by linking hospitals and clinics.
     
For the Presentation Slides Clicke here  
Email :
Personal WebPage :
Presentation [ppt]
Report [doc]
 
 
 
Page Ranking Techniques in Search Engines
Abstract   Phapale Gaurav S.
PageRank is the technique used by Google to determine importance of page on the web. It considers all incoming links to a page as votes for PageRank. But if these votes from different sources weighted equally, this will lead to wrong result. Thus, votes from different sources are weighted according to PageRank of voting page and number of links that voting page contains. Founders of Google, Sergey Brin and Lawrence Page have defined PageRank by a formula. Researchers have done lot of experiments and came up with some conclusions. There are conflicts among opinions of different researchers. This paper starts with formula for PageRank calculation. It describes how to use the formula. Then, paper goes through some examples and derives some observations from it. Paper also contains basic ideas to improve PageRank of web site.
     
For the Presentation Slides Clicke here  
Email :
Personal WebPage :
Presentation [ppt]
Report [doc]
 
 
 
Peer-to-Peer Technologies
Abstract   Kunal Goswami
Peer-to-Peer (P2P) is not a new concept but it is not just limited to file distributed resources to perform a critical function in a decentralized manner. P2P aims at avoiding the dependency on centralized points, providing direct communication between peers, enabling resource aggregation and exchange of services. With the growth of unstructured P2P networks like Napster, Gnutella etc., large scale distributed applications such as distributed data storage and cooperative backup are gaining interest.
     
For the Presentation Slides Clicke here  
Email :
Personal WebPage :
Presentation [ppt]
Report [doc]
 
 
 
Bluetooth
Abstract   Sourabh Gupta
Bluetooth is a way to achieve wireless communication basically for Adhoc Networks using FHSS (Frequency Hopping Spread Spectrum). In Bluetooth piconet there can be 8 nodes active at a point of time (1 master and 7 slaves) and can have maximum of 255 nodes as parked one. Two or more piconet when communicate form a scatter net. Development of Bluetooth started with merely connecting peripheral without wires, by some well-known companies like Ericsson, Intel, Nokia etc. Bluetooth has now become a major short range, low power communication technique. There are other wireless communication techniques, viz. IEEE 802.11, Infrared etc. But still Bluetooth is gaining the popularity. Main reasons for that is low range, short power, low cost hardware and many more. Bluetooth uses 2.4 GHz radio frequencies, which is mostly free in different countries. Bluetooth is very popular type of wireless communication but it also has some drawbacks like bluejacking, bluesnarfing, low data rate, Interference etc.
     
For the Presentation Slides Clicke here  
Email :
Personal WebPage :
Presentation [ppt]
Report [doc]
 
 
 
Intrusion Detection Techiniques
Abstract   Pusparaj Mohapatra
Today’s information systems in government and commercial sectors are distributed and highly interconnected via local area and wide area computer networks. While indispensable, these networks provide potential avenues of attack by hackers, international competitors, and other adversaries. The increasingly frequent attacks on Internet visible systems are attempts to breach information security requirements for protection of data. Intrusion detection technology allows organizations to protect themselves from losses associated with network security problems. Intrusion detection systems (IDSs) attempt to identify attacks by comparing collected data to predefined signatures known to be malicious (misuse-based IDSs) or to a model of legal behavior (anomaly-based IDSs). Anomaly-based approaches have the advantage of being able to detect previously unknown attacks, but they suffer from the difficulty of building robust models of acceptable behavior which may result in a large number of false alarms. Almost all current anomaly-based intrusion detection systems classify an input event as normal or anomalous by analyzing its features, utilizing a number of different models.
     
For the Presentation Slides Clicke here  
Email :
Personal WebPage :
Presentation [ppt]
Report [doc]
 
 
 
Sensor Networks
Abstract   K. Subrahamanyam Sreshti
Advances in hardware and wireless network technologies have created low-cost, low-power, multifunctional miniature sensor devices. Sensor networks are dense wireless networks of small sensors, which collect and disseminate environmental data. The collected data or information is processed, interpreted and accordingly actions are performed. Wireless sensor networks facilitate monitoring and controlling of physical environments from remote locations with better accuracy. Even they have applications in a variety of fields such as environmental monitoring, military purposes and gathering sensing information from hostile locations. Sensor nodes have various energy and computational constraints because of their inexpensive nature and ad hoc method of deployment. Some challenging areas in the sensor networks are reduced energy consumption methods and effective routing techniques.
     
For the Presentation Slides Clicke here  
Email :
Personal WebPage :
Presentation [ppt]
Report [doc]
 
 
 
IP Telephony
Abstract   Nitesh Jain
The limitations of the circuit-switching techniques of conventional telephony may now be overcome through integration with IP technologies. Internet Telephony is a powerful and economical communication option by combination of the telephone networks and data networks. IP telephony used to send audio, video, fax etc between two or more users in real time via packet switched network. The main motivation of IP telephony is Cost savings and ease of developing and integrating new services. Four type of IP telephony according to terminal equipment and types of network is PC to PC, Phone to Phone, PC to Phone, Phone to PC. There are many standard based on IP telephony like SIP (session intonation protocol) and H.323 and many more.H.323 is currently the most widely supported IP telephony signaling protocol. Terminals, gateways, gatekeepers, multipoint control units are the basic component of H.323 standard. Audio CODECs, video CODECs, H.225 registration, admission, and status (RAS), H.225 call signaling, H.245 control signaling, real-time transfer protocol (RTP), real-time control protocol (RTCP) are the protocol used in H.323 for IP telephony.
     
For the Presentation Slides Clicke here  
Email :
Personal WebPage :
Presentation [ppt]
Report [doc]
 
 
 
 
Network Security Assessment
Abstract   Nagarendra Rao Katoori
The lack of a standard gauge for quantifying computer system vulnerability is a hindrance to communicating information about vulnerabilities. The inability to address this issue through uniform semantics often leads to uncoordinated efforts. This presents a feasible approach for resolving this problem by introducing a standardized assessment. It introduces a method, termed the System Vulnerability Index (SVI) that analyzes a number of factors that affect security. These factors are evaluated and combined, through the use of special rules, to provide a measure of vulnerability. The strength of this method is in its abstraction of the problem, which makes it applicable to various operating systems and hardware implementations. User and super user actions, as well as clues to a potentially breached state of security, serve as the basis for the security relevant factors. Facts for Network Security Assessment are presented in a form suitable for implementation in a rule-based expert system.
     
For the Presentation Slides Clicke here  
Email :
Personal WebPage :
Presentation [ppt]
Report [doc]
 
 
 
MPLS
Abstract   Ayan Kumar Roy
In early 1997, the Internet Engineering Task Force (IETF) established the Multi-protocol Label Switching (MPLS) working group to produce a unified and interoperable multilayer switching standard as each vendor (Cisco Systems, Lucent, and so on) developed a proprietary multilayer switching solution, maintaining the IP control component and label-swapping components in different ways. The majority of these multilayer switching solutions required an ATM transport because they could not operate over mixed media infrastructures, such as Frame Relay, PPP, SONET, and LANs. Multi Protocol Label Switching (MPLS) is a versatile solution to address the problems faced by present day networks – speed, scalability, Quality of Service (QoS) management, traffic engineering. MPLS performs a number of functions, such as, 1) it specifies mechanisms to manage traffic flows of various granularities, such as flows among different hardware, machines, or even flows among different applications. 2) It remains independent of the Layer 2 and Layer 3 protocols. 3) It provides a means to map IP addresses to simple, ixed-length labels used by different packet-forwarding and packet-switching technologies. 4) It interfaces to existing routing protocols such as Resource Reservation Protocol (RSVP) and Open Shortest Path First (OSPF). 5) It supports the IP, ATM, and frame-relay Layer 2 protocols. In this presentation, the concept of MPLS will be delivered.
     
For the Presentation Slides Clicke here  
Email :
Personal WebPage :
Presentation [ppt]
Report [doc]
 
 
 
Network Traffic Management
Abstract   Lt. Cdr. Samit Mehra
The purpose of this seminar is to discuss issues related to Network Traffic Management. A relatively new category of network management is fast becoming a necessity in converged business Networks. Mid-sized and large organizations are finding they must control network traffic behavior to assure that their strategic applications always get the resources they need to perform optimally. Controlling network traffic requires limiting bandwidth to certain applications, guaranteeing minimum andwidth to others, and marking traffic with high or low priorities. This exercise is called Network Traffic Management.
     
For the Presentation Slides Clicke here  
Email :
Personal WebPage :
Presentation [ppt]
Report [doc]
 
 
 
Multilingual Web Search
Abstract   Dhage Manoj M.
Today Internet has large information contained within it. Different countries connected to Internet may have information pages in their native languages or any widely used language like English. So when users in any particular country want to search on a particular topic, the search engine should not limit the search, to the native language of the user or the language of the country, in which the search engine has engineered. Creating a site for a global audience is also a significant challenge. We need to be ready to answer requests in foreign languages. Web pages can be written in any language. A single web page can contain information in multiple languages. One language may represent sentences in left to right, other may represent in right to left. If a webpage contains languages like this then pattern-matching algorithm should be able to work accordingly. Special cautions have to be taken while accessing information on these pages. User should be able to query in any language, and he must get information contained in pages written in other languages also. A search engine should be able to provide translation of web pages on user’s demand. Also the translation of user queries and search results should be accurate enough to preserve original theme and meaning. The underlying heterogeneous character representations should be transparent to user.
     
For the Presentation Slides Clicke here  
Email :
Personal WebPage :
Presentation [ppt]
Report [doc]
 
 
 
Universal Networking Language
Abstract   Pantha Kanti Nath
The Universal Networking Language (UNL) project is an international enterprise under the auspices of the Institute of Advanced Studies (IAS) of the United Nations University in Tokyo. This project seeks to provide the methods and tools for overcoming the language barrier on the Internet. It is a computer language that enables computers to process information and knowledge across the language barriers. It is an artificial language that replicates, in the cyber world, the functions of natural languages in human communication. As a result, it enables people to express all knowledge conveyed by natural languages. It also enables computer to intercommunicate, thus providing people with a linguistic infrastructure for distributing, receiving and understanding multilingual information.
     
For the Presentation Slides Clicke here  
Email :
Personal WebPage :
Presentation [ppt]
Report [doc]
 
 
 
Distributed Software systems with CORBA
Abstract   Shruti Srivastava
One can define a distributed system as a system in which components located in networked computers communicate and coordinate their actions only by passing messages. So, the main challenge in making a distributed system is the heterogeneity of the components, their security, concurrency of components and transparency. To meet up with this challenge the Object Management Group (OMG) came up with an architecture called CORBA (Common Object Request Broker Architecture) in 1991. As the name suggests CORBA is not a distributed system but is a specification for a distributed system. This seminar first of all deals with what a distributed system is, what are the main types of distributed system architecture and then what is CORBA? . This seminar also describes the features of CORBA that renders it useful for a distributed system and its comparison with other architectures.
     
For the Presentation Slides Clicke here  
Email :
Personal WebPage :
Presentation [ppt]
Report [doc]
 
 
 
Introduction to Nanotechnology
Abstract   Lt. Cdr. V. Pravin
Nanotechnology is the ability to manipulate individual atoms and molecules to produce nano structured materials and sub-micron objects that have applications in the real world. Nanotechnology involves the production and application of physical, chemical and biological systems at scales ranging from individual atoms or molecules to about 100 nanometers, as well as the integration of the resulting nanostructures into larger systems. Nanotechnology is likely to have a profound impact on our economy and society in the early 21st century, perhaps comparable to that of information technology or advances in cellular and molecular biology. Science and engineering research in nanotechnology promises breakthroughs in areas such as materials and manufacturing, electronics, medicine and healthcare, energy and the environment, biotechnology, information technology and national security. It is widely felt that nanotechnology will lead to the next industrial revolution.
     
For the Presentation Slides Clicke here  
Email :
Personal WebPage :
Presentation [ppt]
Report [doc]
 
 
All rights Reserved. ©2005.
School of Information Technology