Seminar Topic: IP VPN

. Tuesday 31 May 2011
0 comments

Introduction:
A virtual private network (VPN) is a secure way of connecting to a private Local Area Network at a remote location, using the Internet or any insecure public network to transport the network data packets privately, using encryption. The VPN uses authentication to deny access to unauthorized users, and encryption to prevent unauthorized users from reading the private network packets. The VPN can be used to send any kind of network traffic securely, including voice, video or data.

Difficulty : Medium

Download Link : IP VPN

Please refer to the following links for your Seminar preparation:
How to give Seminar
How To create Seminar Report

Seminar Topic: H.264

.
0 comments

Introduction:
H.264/MPEG-4 Part 10 or AVC (Advanced Video Coding) is a standard for video compression, and is currently one of the most commonly used formats for the recording, compression, and distribution of high definition video. The final drafting work on the first version of the standard was completed in May 2003.

Difficulty : Medium

Download Link : H.264

Please refer to the following links for your Seminar preparation:
How to give Seminar
How To create Seminar Report

Seminar Topic: Holographic data storage

.
0 comments

Introduction:
Holographic data storage is a potential replacement technology in the area of high-capacity data storage currently dominated by magnetic and conventional optical data storage. Magnetic and optical data storage devices rely on individual bits being stored as distinct magnetic or optical changes on the surface of the recording medium. Holographic data storage overcomes this limitation by recording information throughout the volume of the medium and is capable of recording multiple images in the same area utilizing light at different angles.

Difficulty : Easy

Download Link : Holographic data storage

Please refer to the following links for your Seminar preparation:
How to give Seminar
How To create Seminar Report

Seminar Topic: IP Telephony

.
0 comments

Introduction:
IP telephony or Voice over Internet Protocol (Voice over IP, VoIP) is one of a family of internet technologies, communication protocols, and transmission technologies for delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet. Other terms frequently encountered and often used synonymously with VoIP are Internet telephony, voice over broadband (VoBB), broadband telephony, and broadband phone.

Difficulty : Medium

Download Link : IP Telephony

Please refer to the following links for your Seminar preparation:
How to give Seminar
How To create Seminar Report

Seminar Topic: Laser Therapy

.
0 comments

Introduction:
Low-level laser therapy (LLLT) is a medical and veterinary treatment that uses low-level lasers or light-emitting diodes to alter cellular function. LLLT is controversial in mainstream medicine with ongoing research to determine the ideal location of treatment (specifically whether LLLT is more appropriately used over nerves versus joints), dose, wavelength, timing, pulsing and duration. The effects of LLLT appear to be limited to a specified set of wavelengths of laser, and administering LLLT below the dose range does not appear to be effective.

Difficulty : Easy

Download Link : Laser Therapy

Please refer to the following links for your Seminar preparation:
How to give Seminar
How To create Seminar Report

Seminar Topic: Medical Robots

.
0 comments

Introduction:
Robotic surgery, computer-assisted surgery, and robot-assisted surgery are terms for various technological developments that currently are developed to support a range of surgical procedures.
Robot-assisted surgery was developed to overcome limitations of minimally invasive surgery. Instead of directly moving the instruments the surgeon uses a computer console to manipulate the instruments attached to multiple robot arms.

Difficulty : Medium

Download Link : Medical Robots

Please refer to the following links for your Seminar preparation:
How to give Seminar
How To create Seminar Report

Project: Audio Book MP3 File Manager

. Monday 30 May 2011
0 comments

Name : Audio Book MP3 File Manager
Platform : Visual Basic

This is a file manager for mp3 files. It has features like dragging-dropping, smart naming of mp3 files, copying, album creation etc.

Download Link
Audio Book MP3 File Manager

You can refer to these links for help in making projects and project reports :
Tutorial : How to make a Final Year Project
Project Synopsis Tutorial
Project Report Tutorial

Seminar Topic: 4G

.
0 comments

Introduction:
In telecommunications, 4G is the fourth generation of cellular wireless standards. It is a successor to the 3G and 2G families of standards. In 2008, the ITU-Rorganization specified the IMT-Advanced (International Mobile Telecommunications Advanced) requirements for 4G standards, setting peak speed requirements for 4G service at 100 Mbit/s for high mobility communication (such as from trains and cars) and 1 Gbit/s for low mobility communication (such as pedestrians and stationary users).

Difficulty : Medium

Download Link : 4G

Please refer to the following links for your Seminar preparation:
How to give Seminar
How To create Seminar Report

Seminar Topic: Fingerprint Verification

.
0 comments

Introduction:
Fingerprint recognition or fingerprint verification refers to the automated method of verifying a match between two human fingerprints. Fingerprints are one of many forms of biometrics used to identify individuals and verify their identity. This article touches on two major classes of algorithms (minutia and pattern) and four sensor designs (optical, ultrasonic, passive capacitance, and active capacitance).

Difficulty : Easy

Download Link : Fingerprint Verification

Please refer to the following links for your Seminar preparation:
How to give Seminar
How To create Seminar Report

Seminar Topic: EDGE

.
0 comments

Introduction:
Enhanced Data rates for GSM Evolution (EDGE) (also known as Enhanced GPRS (EGPRS), or IMT Single Carrier (IMT-SC), or Enhanced Data rates for Global Evolution) is a digital mobile phone technology that allows improved data transmission rates as a backward-compatible extension of GSM. EDGE is considered a pre-3G radio technology and is part of ITU's 3G definition. EDGE was deployed on GSM networks beginning in 2003 — initially by Cingular (now AT&T) in the United States

Difficulty : Medium

Download Link : EDGE

Please refer to the following links for your Seminar preparation:
How to give Seminar
How To create Seminar Report

Seminar Topic: CDMA Technology

.
0 comments

Introduction:
Code division multiple access (CDMA) is a channel access method used by various radio communication technologies. It should not be confused with the mobile phone standards called cdmaOne and CDMA2000 (which are often referred to as simply CDMA), which use CDMA as an underlying channel access method.

Difficulty : Medium

Download Link : CDMA Technology

Please refer to the following links for your Seminar preparation:
How to give Seminar
How To create Seminar Report

News: Pak court issues notice to federal govt on Facebook ban

.
0 comments

PTI | May 26, 2011, 08.24pm IST

LAHORE: A Pakistani court has issued notice to the federal government on a petition seeking a permanent ban on social networking website Facebook for hosting a contest on blasphemous caricatures of Prophet Muhammad.

Justice Sheikh Azmat Saeed of the Lahore High Court yesterday directed Deputy Attorney General Ziaul Qamar Bhatti to submit get a "detailed report" on behalf of the federal government and Information Technology Ministry and to take necessary steps to address the matter by the next hearing on June 24.

Mohammad and Ahmad, a public interest litigation firm, filed the petition through its chairman Mohammad Azhar Siddique and sought a permanent ban on Facebook for hosting contest for drawing blasphemous caricature under the title "2nd Annual Draw Muhammad Day - May 20, 2011".

The petitioner requested that Facebook and all websites resorting to similar acts should be permanently blocked or banned in Pakistan for airing, placing, visualising obscene caricatures of the Prophet.

Siddique also asked the court to direct the federal government to stop the display of material considered blasphemous by followers of any religion or insulting Prophets on Facebook and any other websites.

The Lahore High Court had briefly banned Facebook last year over similar blasphemous cartoons.

Source

News: Hackers breach US defense contractors

.
0 comments

Reuters | May 28, 2011, 03.48pm IST

BOSTON: Unknown hackers have broken into the security networks of Lockheed Martin Corp and several other US military contractors, a source with direct knowledge of the attacks told Reuters.

They breached security systems designed to keep out intruders by creating duplicates to "SecurID" electronic keys from EMC Corp's RSA security division, said the person who was not authorized to publicly discuss the matter.

It was not immediately clear what kind of data, if any, was stolen by the hackers. But Lockheed's and other military contractor networks house sensitive data on future weapons systems as well as military technology currently used in battles in Iraq and Afghanistan.

They are the latest companies to be breached through sophisticated attacks that have pierced the defenses of huge corporations including Sony, Google Inc and EMC Corp. Security experts say that it is virtually impossible for any company or government agency to build a security network that hackers will be unable to pierce.

The Pentagon, which has about 85,000 military personnel and civilians working on cybersecurity issues worldwide, said it also uses a limited number of the RSA security keys, but declined to say how many for security reasons.

The hackers learned how to copy those electronic keys with data stolen from RSA during a sophisticated attack that EMC disclosed in March, according to the source.

EMC declined to comment on the matter, as did executives at major defense contractors.

Lockheed, which employs 126,000 people worldwide and had $45.8 billion in revenue last year, said it does not discuss specific threats or responses as a matter of principle, but regularly took actions to counter threats and ensure security.

Many defense companies, including General Dynamics Corp, use the "SecurID" tokens.

Executives at General Dynamics, Boeing Co, Northrop Grumman Corp, Raytheon Co and other defense companies declined to comment on any security breaches.

"We do not comment on whether or not Northrop Grumman is or has been a target for cyber intrusions," said Northrop spokesman Randy Belote.

Securids
Raytheon spokesman Jonathan Kasle said his company took immediate companywide actions in March when incident information was initially provided to RSA customers.

"As a result of these actions, we prevented a widespread disruption of our network," he said.

Boeing spokesman Todd Kelley said his company had a "wide range" of systems in place to detect and prevent intrusions of its networks. "We have a robust computing security team that constantly monitors our network," he said.

SecurIDs are widely used electronic keys to computer systems that work using a two-pronged approach to confirming the identity of the person trying to access a computer system. They are designed to thwart hackers who might use key-logging viruses to capture passwords by constantly generating new passwords to enter the system.

The SecurID generates new strings of digits on a minute-by-minute basis that the user must enter along with a secret PIN before they can access the network. If the user fails to enter the string before it expires, then access is denied.

EMC disclosed in March that hackers had broken into its network and stolen some information related to its SecurIDs. It said the information could potentially be used to reduce the effectiveness of those devices in securing customer networks.

EMC said it worked with the Department of Homeland Security to publish a note on the March attack and provided Web addresses to help companies identify where the attack might have come from.

Source

Fun Zone: Funny Engineering SMS

. Sunday 29 May 2011
0 comments

Banner in front of Engineering collage...........
By its chairman
" Drive slowly don't kill the student, leave them to us its our duty. we do it in a legal way....."


THEORY IS WHEN WE KNOW SMTHNG BUT IT DONT WORKS.......................... PRACTICAL IS WHEN SMTHNG WORKS BUT WE DONT KNOW WHY............................ WE ENGINEERS COMBINES BOTH THEORY AND PRACTICALS... ""NOTHING WORKS AND WE DONT KNOW WHY?""


What is the definition of an ENGINEER?
Someone who solves a problem you didn't know you had! and in such a way you don't understand!!!!!


Doc. nd engg. loved da same gal..
Doc. gives her a rose
Bt engg. gives her an apple daily.
Dr. asks- y??
Engr- AN APPLE A DAY KEEPS THE DOC AWAY!!!
:lol:
Engineers rocks...


There are 3 kinds of engineers in this world...
Some make wonders happen..!
Some see wonders happen..!
Others wonder what happened..!!


What is the difference between Mechanical Engineers and Civil Engineers?
Mechanical Engineers build weapons, Civil Engineers build targets.


U Can B
Dr Save Life
Lawyer Defend Life
Soldier Protect Life
But Y2 Play Wid Others Life
Just B An Engineer ScrewUp Ur Own Life -)


A Notice in a factory for girl workers :
" If your skirt is long, protect yourself from engines...
and
if it is short, protect yourself from engineers...." :P :D

News: NASA makes history with spacewalk, station finale

. Saturday 28 May 2011
0 comments

Reuters | May 28, 2011, 07.02am IST

HOUSTON: NASA astronauts made history twice on Friday, venturing on the final spacewalk of the agency's 30-year shuttle program and completing assembly of the $100 billion International Space Station.

Astronauts Mike Fincke and Greg Chamitoff floated outside the orbiting outpost's Quest airlock for the fourth and final spacewalk planned during shuttle Endeavour's 16-day mission, the next to last in the US space shuttle program.

After Fincke and Chamitoff transferred the shuttle's 50-foot (15-metre) inspection boom to the station, doubling the reach of the station's robotic crane, shuttle commander Mark Kelly called Mission Control in Houston to mark the milestone -- after 12 years of efforts.

"Space station assembly is complete," Kelly said. It was the last spacewalk that shuttle-bound astronauts will undertake before NASA turns over Endeavour and sister ships Discovery and Atlantis to museums. Space station crew will continue to make spacewalks for maintenance and repair tasks.

Later, Chamitoff used a special camera with a wide-angle "fish eye" lense to photograph the space station and paused to reflect on the event.

"We're floating here on the shoulders of giants," said Chamitoff. "This space station is the pinnacle of human achievement and international cooperation."

The spacewalk was the 159th in support of assembly and maintenance of the station, which began with the robotic attachment of the US. Unity node with the Russian Zarya base block in 1998.

Since then, the project of 16 nations has grown to more than 1 million pounds (455,000 kg) of hardware orbiting 220 miles (355 km) above Earth.

In over 1,000 hours worth of ventures in the dark vacuum of space, dressed in bulky spacesuits and wielding all manner of tools and gadgets, astronauts have steadily bolted the station together.

Its interior has grown to the size of a Boeing 747 jet and the wingspan of its power-generating solar wings would nearly cover the surface of a US football field.

NASA will set yet another orbital milestone later on Friday. Fincke, a veteran of two long-duration stays on the station, will eclipse fellow NASA astronaut Peggy Whitson's record of 377 days in space, more than any other US spacefarer.

Bitter sweet

Officials have repeatedly used the term "bitter sweet" to describe the current mind-set at NASA.

"I am sad to see the three space shuttles be rolled into a museum here shortly," Kelly said during an in-flight news conference. "I think it's a necessary step so we can go on and do some more exciting things."

NASA plans to save the shuttles' $4 billion annual operating budget and develop new vehicles that can travel beyond the station's orbit where the shuttles cannot go.

In the meantime, NASA astronauts will hitch a ride to the station on board Russian Soyuz capsules, at a cost of about $50 million a seat.

Endeavour and its six-man crew are due to leave the station late on Sunday.

The shuttle delivered the station's premiere science experiment, the $2 billion Alpha Magnetic Spectrometer particle detector, and spare parts.

Landing is scheduled for 2:32am EDT (0632 GMT) on Wednesday at the Kennedy Space Center in Florida. Shuttle Atlantis is targeted to launch on July 8 for NASA's 135th and final flight.

Source

News: eBay, PayPal sue Google over trade secrets

.
0 comments

Reuters | May 27, 2011, 11.11am IST

NEW YORK: eBay and its online payment unit PayPal Inc filed suit against Google Inc and two executives for trade secret misappropriation related to mobile payment systems.

The two executives, Osama Bedier and Stephanie Tilenius, were formerly with PayPal, and led the launch of Google's own mobile payment system.

The suit said Bedier worked for nine years at PayPal, most recently serving as vice president of platform, mobile and new ventures. He joined Google on January 24. Tilenius was at eBay from 2001 to October 2009 and served as a consultant to the company until March 2010.

The suit says Tilenius joined Google in February, 2010 as vice president of e-commerce. Bedier is accused in the suit of having "misappropriated PayPal trade secrets by disclosing them within Google and to major retailers".

The suit accused Tilenius of recruiting Bedier, thereby breaking a contractual agreement with eBay. It also claims Bedier attempted to recruit former colleagues still at PayPal.

The suit claims that PayPal and Google had worked closely together for three years until this year on developing a commercial deal where PayPal would serve as a payment option for mobile app purchases on Google's Android phones.

It said Bedier was the senior PayPal executive leading negotiations with Google on Android during this period.

"At the very point when the companies were negotiating and finalising the Android-PayPal deal, Bedier was interviewing for a job at Google -- without informing PayPal of this conflicting position," the suit claimed.

The suit was filed at Superior Court of the State of California, county of Santa Clara, Case No: CV20l863.

Source

Project: Simple Student Record System

.
0 comments

Name : Simple Student Record System
Platform : Php

This is a simple student record system that can be used to store the information related to students in the database, good for startup programmers.

Download Link
Simple Student Record System

You can refer to these links for help in making projects and project reports :
Tutorial : How to make a Final Year Project
Project Synopsis Tutorial
Project Report Tutorial

Project: Banking System

.
0 comments

Name : Banking System
Platform : Java

This is a basic banking system with all the basic features that any common bank has.

Download Link
Banking System

You can refer to these links for help in making projects and project reports :
Tutorial : How to make a Final Year Project
Project Synopsis Tutorial
Project Report Tutorial

Project: Billing System

.
0 comments

Name : Billing System
Platform : .Net

A simple billing system in C# which can be used for making bills and also printing them.

Download Link
Billing System

You can refer to these links for help in making projects and project reports :
Tutorial : How to make a Final Year Project
Project Synopsis Tutorial
Project Report Tutorial

Project: Shopping Cart

.
1 comments

Name : Shopping Cart
Platform : .Net

A shopping cart system made in .Net. This can be used at any place where there is need of computer based shopping cart.

Download Link
Shopping Cart

You can refer to these links for help in making projects and project reports :
Tutorial : How to make a Final Year Project
Project Synopsis Tutorial
Project Report Tutorial

News: Net creates 2.4 jobs for every job it kills: Study

. Friday 27 May 2011
0 comments

May 26, 2011, 03.49pm IST

NEW DELHI: The Internet, which has transformed the way we live, work, shop, socialise and now, is also emerging as a powerful catalyst for job creation, says a survey by global management consultancy McKinsey.

According to a report by McKinsey Global Institute, the Net has a sweeping impact on growth, prosperity and has "created 2.4 jobs for every job that it has destroyed".

"The Internet is a contributer to net job creation," McKinsey Global Institute said in its report, titled, 'Internet matters: The Net's Sweeping Impact on Growth, Jobs and Prosperity'.

"While jobs have been destroyed by the emergence of Internet, many more have been created during the same period, including jobs directly linked to the Internet, such as software engineers and online marketers as well as more traditional jobs -- logistics to deliver online purchases," it added.

McKinsey further noted that notwithstanding the fact that some jobs have been destroyed by the emergence of the Internet, a detailed analysis of the French economy showed that while the Internet has destroyed 500,000 jobs over the past 15 years, it has created 1.2 million other jobs.

"A net addition of 700,000 jobs, or 2.4 jobs created for every job destroyed...," it said.

This result was also reflected in another McKinsey survey of more than 4,800 SMEs, which showed that 2.6 jobs were created for every one destroyed, confirming the Internet's capacity to create jobs across all sectors.

McKinsey examined the impact of the Internet on 13 countries -- the members of the G8, Brazil, China, India, South Korea and Sweden.

In the 13 countries that the survey covered, the Internet contributed an average 3.4 per cent to the GDP, more than agriculture, energy and other better established industries.

Meanwhile, the United Nations, in its millennium development goals, lists Internet penetration as a key metric in efforts to reduce poverty and encourage rational development.

Around two billion people are now connected to the Internet and the number is growing by 200 million each year.

India and China are strengthening their position in the global Internet ecosystem rapidly and are showing growth rates of more than 20 per cent in terms of new connections.

Source

News: Google Street View comes to India

.
0 comments

May 26, 2011, 03.58pm IST

BANGALORE: Google announced that it will begin imagery collection in Bangalore for the Street View feature in Google Maps.

Google cars and trikes will begin driving and taking street level photographs of public locations around the city.

The images will be made available at a later date in Street View on Google Maps.

Street View is a popular feature of Google Maps, already available in more than 27 countries. It allows users to virtually explore and navigate a neighborhood through panoramic street-level images. It is also available on Google Maps for mobile.

In countries where Street View is available, the user can access street-level imagery by zooming into the lowest level on Google Maps, or by dragging the orange "Pegman" icon on the left-hand side of the map onto a blue highlighted street.

In addition to the cars, the Google Trike - a specially designed three-wheel pedi-cab with a camera system mounted on top - will start gathering images from select locations in the area such as the Nrityagram Dance Village over the next few weeks. The Trike has already collected imagery from dozens of famed places around the world, including Stonehenge in the United Kingdom, Pompei in Italy, Legoland in California, and Versailles in France.

Lynne Fernandez, Managing Trustee, Nrityagram Dance Village said, "We are very excited to be on Street View. I understand that the Trike can go off the beaten path to photograph some of the most remote and beautiful places on earth, so anyone can explore them from anywhere. It will provide a scenic virtual view of Nrityagram and that's the closest to actually being here!"

Vinay Goel, Product Head, Google India said, "We decided to start driving in Bangalore because it is the IT capital of India and feel that the IT savvy users will be able to leverage the benefits of the product to the fullest. Street View is useful for urban development planners, law enforcement agencies, househunters, and travelers.

It lets users check out restaurants before arriving, make travel plans and arrange meeting points. Businesses can also benefit from the Street View technology by embedding Google Maps directly into their site for free. Hotels can use it to show off the convenience of their location, and restaurants can use it to raise awareness."

Google has developed technology that effectively blurs human faces and number plates of vehicles to render them unidentifiable. Street View is designed to comply with all local laws including those related to security and privacy in India.

Vinay Goel added, "We are committed to balancing the needs of our users with concerns about security. At Google, we recognize the sensitivity associated with certain locations and are committed to working with relevant stakeholders to ensure that their concerns are addressed."

Source

Seminar Topic: Virtual Reality

.
0 comments

Introduction:
Virtual reality (VR) is a term that applies to computer-simulated environments that can simulate physical presence in places in the real world, as well as in imaginary worlds. Most current virtual reality environments are primarily visual experiences, displayed either on a computer screen or through specialstereoscopic displays, but some simulations include additional sensory information, such as sound through speakers or headphones.

Difficulty : Medium

Download Link : Virtual Reality

Please refer to the following links for your Seminar preparation:
How to give Seminar
How To create Seminar Report

Seminar Topic: Video Compression

.
0 comments

Introduction:
Video compression refers to reducing the quantity of data used to represent digital video images, and is a combination of spatial image compression and temporalmotion compensation. Video compression is an example of the concept of source coding in Information theory. This article deals with its applications: compressed video can effectively reduce the bandwidth required to transmit video via terrestrial broadcast, via cable TV, or via satellite TV services.

Difficulty : Medium

Download Link : Video Compression

Please refer to the following links for your Seminar preparation:
How to give Seminar
How To create Seminar Report

Seminar Topic: Unified Modeling Language (UML)

.
0 comments

Introduction:
Unified Modeling Language (UML) is a standardized general-purpose modeling language in the field of object-oriented software engineering. The standard is managed, and was created by, the Object Management Group. UML includes a set of graphic notation techniques to create visual models of object-oriented software-intensive systems.

Difficulty : Medium

Download Link : Unified Modeling Language (UML)

Please refer to the following links for your Seminar preparation:
How to give Seminar
How To create Seminar Report

Seminar Topic: Switching System

.
0 comments

Introduction:
A switching system or switching hub is a computer networking device that connects network segments. The term commonly refers to a multi-port network bridge that processes and routes data at the data link layer (layer 2) of the OSI model. Switches that additionally process data at the network layer (Layer 3) and above are often referred to as Layer 3 switches or multilayer switches.

Difficulty : Medium

Download Link : Switching System

Please refer to the following links for your Seminar preparation:
How to give Seminar
How To create Seminar Report

Seminar Topic: Swarm Intelligence

.
0 comments

Introduction:
Swarm intelligence (SI) is the collective behaviour of decentralized, self-organized systems, natural or artificial. The concept is employed in work on artificial intelligence. The expression was introduced by Gerardo Beni and Jing Wang in 1989, in the context of cellular robotic systems.

Difficulty : Medium

Download Link : Swarm Intelligence

Please refer to the following links for your Seminar preparation:
How to give Seminar
How To create Seminar Report

News: Nokia to launch first Windows Phone this year

. Thursday 26 May 2011
0 comments

Reuters | May 25, 2011, 02.16pm IST

TAIPEI: Nokia has planned to launch its first smartphone using Microsoft's Windows Phone 7 at the end of the year, according to Taiwan's Commercial Times, which did not identify a source.

The newspaper also said Taiwanese handset contract maker Compal Communications was the sole company to receive orders for Nokia's Window phones and would start shipment in the fourth quarter.

Two models of Window phones were on Nokia's plan -- one with a full touchscreen and another sleek one with a keypad.

The world's largest handset maker announced in February it would use Microsoft's Windows phone software in all of its smartphones, and said it would start volume shipments of these smartphones in 2012.

Source

News: 16-year-old from Hyderabad youngest IIT-JEE topper

.
0 comments

May 26, 2011, 01.37am IST

MUMBAI: Like the past six years, IIT-Bombay zone, home to Kota, will send the largest pool of students to the Indian Institutes of Technology. Top honours, however, went to the southern zone that produced possibly the youngest-ever rank 1 – 16-year-old Prudhvitej Immadi of Hyderabad – and bagged four other slots in the top 10.

Of the seven zones (sliced on the basis of the old IITs), the western region saw the highest number of students qualify – 3,336. IIT-Madras zone will send 3,126 candidates to the 15 tech schools. Delhi zone took third place with 2,138 successful candidates, with Dravyansh Sharma of DPS Ghaziabad ranking seventh overall.

Among the top-100 students, 32 come from the western zone while 30 are from the south. The IIT-Bombay zone has the highest number of candidates in the top 1,000 ranks — 290. The best ratio of number of students who appeared to those who qualified in the JEE went to IIT-Madras zone. In all, 13,602 students cleared the exam.

"Only 481 students of the 8,325 students who took the JEE from Mumbai city qualified. Another 1,508 candidates out of 39,483 from Rajasthan, many of whom prepared from coaching centres in Kota, made the cut," said Jaya Joshi, IIT-Bombay's public relation officer.

In all, of the 4.68 lakh students who took the JEE in April, 13,602 qualified; another 400-odd candidates have been shortlisted to join the year-long preparatory course.

Rajasthan boy Shubham Mehta topped the IIT-Bombay zone at AIR2 (All India Rank); Dravyansh Sharma (rank 7) from the IIT-Delhi region; Archit Gupta (rank 14) was on top in the IIT-Kanpur area; Ankit Jalan (rank 45) from the IIT-Kharagpur zone; Kunal Chawla (rank 6) from the IIT-Roorkee region and Amol (rank 41) from the IIT-Guwahati zone were the region-wise toppers.

Overall scores and subject-wise cut-offs went up a bit. Faculty attributed the rise to the errors in the question paper, for which the IITs had no option but to give marks to everyone.

IIT-Kanpur director said across India, the performance of reserved category students improved. Of the 2,545 OBC candidates who qualified, 1,540 made it to the common merit list. In case of SC students, of the 1,950 who qualified, 122 made it without the handicap of score relaxation and of the 645 ST candidates shortlisted to join the IITs, 33 made it to the common rank list.

In all, the 15 IITs, IT-BHU and ISM Dhanbad, have 9,618 seats. Of these, 4,858 are for the general category, 2,597 for OBCs, 1442 for SCs and 721 for STs.

Source

Seminar Topic: Software Re-Engineering

.
0 comments

Introduction:
The reengineering of software was described by Chikofsky and Cross in their 1990 paper, as "The examination and alteration of a system to reconstitute it in a new form". Less formally, reengineering is the modification of a software system that takes place after it has been reverse engineered, generally to add new functionality, or to correct errors.

Difficulty : Easy

Download Link : Software Re-Engineering

Please refer to the following links for your Seminar preparation:
How to give Seminar
How To create Seminar Report

Seminar Topic: Sms(Short Message Service)

.
0 comments

Introduction:
Sms
Short Message Service (SMS) is the text communication service component of phone, web, or mobile communication systems, using standardized communications protocols that allow the exchange of short text messages between fixed line or mobile phone devices. SMS text messaging is the most widely used data application in the world, with 2.4 billion active users, or 74% of all mobile phone subscribers.[citation needed] The term SMS is used as a synonym for all types of short text messaging as well as the user activity itself in many parts of the world.

Difficulty : Medium

Download Link : Sms

Please refer to the following links for your Seminar preparation:
How to give Seminar
How To create Seminar Report

Seminar Topic: Robotics

.
0 comments

Introduction:
Robotics
Robotics is the branch of technology that deals with the design, construction, operation, structural disposition, manufacture and application of robots. Robotics is related to the sciencesof electronics, engineering, mechanics, and software. The word "robot" was introduced to the public by Czech writer Karel Čapek in his play R.U.R. (Rossum's Universal Robots), published in 1920. The term "robotics" was coined by Isaac Asimov in his 1941 science fiction short-story "Liar!"

Difficulty : Medium

Download Link : Robotics

Please refer to the following links for your Seminar preparation:
How to give Seminar
How To create Seminar Report

Seminar Topic: Search Engine

.
0 comments

Introduction:
Search Engines
A web search engine is designed to search for information on the World Wide Web and FTP servers. The search results are generally presented in a list of results and are often called hits. The information may consist of web pages, images, information and other types of files. Some search engines also mine data available indatabases or open directories. Unlike web directories, which are maintained by human editors, search engines operate algorithmically or are a mixture of algorithmic and human input.

Difficulty : Easy

Download Link : Search Engine

Please refer to the following links for your Seminar preparation:
How to give Seminar
How To create Seminar Report

Seminar Topic: Parallel Computing

.
0 comments

Introduction:
Parallel computing is a form of computation in which many calculations are carried out simultaneously, operating on the principle that large problems can often be divided into smaller ones, which are then solved concurrently ("in parallel"). There are several different forms of parallel computing: bit-level, instruction level, data, and task parallelism. Parallelism has been employed for many years, mainly in high-performance computing, but interest in it has grown lately due to the physical constraints preventing frequency scaling. As power consumption (and consequently heat generation) by computers has become a concern in recent years, parallel computing has become the dominant paradigm in computer architecture, mainly in the form of multicore processors.

Difficulty : Medium

Download Link : Parallel Computing

Please refer to the following links for your Seminar preparation:
How to give Seminar
How To create Seminar Report

Seminar Topic: Object Oriented Programming

.
0 comments

Introduction:
Object-oriented programming (OOP) is a programming paradigm using "objects" – data structures consisting of data fields and methods together with their interactions – to design applications and computer programs. Programming techniques may include features such as data abstraction, encapsulation, messaging, modularity, polymorphism, andinheritance. Many modern programming languages now support OOP.

Difficulty : Easy

Download Link : Object Oriented Programming

Please refer to the following links for your Seminar preparation:
How to give Seminar
How To create Seminar Report

News: IBM beats Microsoft in market value

. Wednesday 25 May 2011
0 comments

Reuters | May 24, 2011, 10.21am IST

SEATTLE: International Business Machines edged past old rival Microsoft Corp in market value for the first time since April 1996, marking the latest twist in the fluctuating fortunes of two of the world's most storied technology companies.

IBM ruled the computer industry for decades until it hired the tiny, unknown Microsoft to provide an operating system for its new range of personal computers in the early 1980s.

Bill Gates parlayed that breakthrough into industry dominance -- proving his theory that software would be more valuable than hardware -- so that by the end of 1999 Microsoft's market value was three times that of IBM's, and bigger than any other US company.

Throughout Seattle-based Microsoft's rise, IBM was pilloried as an old-fashioned, immobile Goliath that could not keep up with the computing revolution.

Since the Internet technology bubble burst in 2000, the tables have been reversed and Microsoft's stock has been stagnant as investors doubt its ability to move beyond its Windows operating system and Office suite of software, while younger rivals such as Google Inc and Facebook steal the limelight.

In the meantime, "Big Blue" refashioned itself as a specialist in business software, servers and consulting, jettisoning its PC business along the way, building on a turnaround engineered by CEO Louis Gerstner in the 1990s.

An investor putting $100,000 into both stocks 10 years ago would now have about $143,000 in IBM stock and about $69,000 in Microsoft stock.

Resurgent Apple Inc moved past Microsoft in terms of market value almost exactly a year ago, and is now by far the world's biggest tech company.

According to Reuters data, Apple's market value stood at $309.2 billion on Monday, IBM at $203.8 billion and Microsoft at $203.7 billion.

IBM is now ranked fourth in terms of market value in the United States, behind oil giant Exxon Mobil Corp at $397.4 billion, Apple, and industrial and finance conglomerate General Electric Co at $205.6 billion.

IBM shares ended down 1.1 per cent at $168.26 while Microsoft fell 1.3 per cent to $24.17.

Source

Seminar Topic: Neurocomputers

.
0 comments

Introduction:
A type of computer designed to mimic the action of the human brain by use of an electronic neural network Also called neural computer. Inventor of one of the earliest neurocomputers, defines a neural network as a computing system made up of a number of simple, highly interconnected processing elements which process information by their dynamic state responses to external inputs.

Difficulty : Medium

Download Link : Neurocomputers

Please refer to the following links for your Seminar preparation:
How to give Seminar
How To create Seminar Report

Seminar Topic: Mobile commerce

.
0 comments

Introduction:
Mobile Commerce, also known as M-Commerce or mCommerce, is the ability to conduct commerce using a mobile device, such as a mobile phone, a Personal digital assistantPDA, a smartphone, or other emerging mobile equipment such as dashtop mobile devices. Mobile Commerce has been defined as follows:
"Mobile Commerce is any transaction, involving the transfer of ownership or rights to use goods and services, which is initiated and/or completed by using mobile access to computer-mediated networks with the help of an electronic device.

Difficulty : Easy

Download Link : Mobile commerce

Please refer to the following links for your Seminar preparation:
How to give Seminar
How To create Seminar Report

Seminar Topic: Internet security

.
0 comments

Introduction:
Internet security is a branch of computer security specifically related to the Internet. Its objective is to establish rules and measures to use against attacks over the Internet. The Internet represents an insecure channel for exchanging information leading to a high risk of intrusion or fraud, such as phishing. Different methods have been used to protect the transfer of data, including encryption.

Difficulty : Easy

Download Link : Internet security

Please refer to the following links for your Seminar preparation:
How to give Seminar
How To create Seminar Report

Seminar Topic: Flash memory

.
0 comments

Introduction:
Flash memory is a non-volatile computer storage chip that can be electrically erased and reprogrammed. It is primarily used inmemory cards, USB flash drives, MP3 players and solid-state drives for general storage and transfer of data between computers and other digital products. It is a specific type of EEPROM (electrically erasable programmable read-only memory) that is erased and programmed in large blocks; in early flash the entire chip had to be erased at once.

Difficulty : Medium

Download Link : Flash memory

Please refer to the following links for your Seminar preparation:
How to give Seminar
How To create Seminar Report

Seminar Topic: File Slack and Disk Slack

.
0 comments

Introduction:
The space between the end of a file and the end of the disk cluster it is stored in. Also called "file slack," it occurs naturally because data rarely fill fixed storage locations exactly, and residual data occur when a smaller file is written into the same cluster as a previous larger file. In computer forensics, slack space is examined because it may contain meaningful data.

Difficulty : Easy

Download Link : File Slack and Disk Slack

Please refer to the following links for your Seminar preparation:
How to give Seminar
How To create Seminar Report

Seminar Topic: Digital Signature

.
1 comments

Introduction:
A digital signature or digital signature scheme is a mathematical scheme for demonstrating the authenticity of a digital message or document. A valid digital signature gives a recipient reason to believe that the message was created by a known sender, and that it was not altered in transit. Digital signatures are commonly used for software distribution, financial transactions, and in other cases where it is important to detect forgery or tampering.

Difficulty : Easy

Download Link : Digital Signature

Please refer to the following links for your Seminar preparation:
How to give Seminar
How To create Seminar Report

Fun Zone: A Picture is Worth a Thousand Words

. Tuesday 24 May 2011
0 comments

A picture of worth a thousand words about engineering life...!!


Off Topic: Know your mind

.
0 comments

The mind has many layers, and each layer serves a different function. In the old way of thinking, the mind was present only in the physical organ called the brain, and it sent instructions to the rest of the body through the nerves, which the body carried out like a machine, with out understanding.

However, now it is believed that the mind is found in every part of the body. Modern medicine is able to explain the mind only up to this level, whereas the ancient sciences also explain things like clairvoyance and special memory. The physical or gross mind: This has the ability to pick up signals that are important for survival, such as hunger and pain, and the urge to procreate.

The sensory layer: This is concerned with sensory impulses, such as the sensation of fullness, the feeling of pressure, pain, sound, taste and sight.

The thinking layer: This is the layer that works things out logically. It is connected to worldly wisdom. This layer of the mind also gives us our egos – our sense of ourselves as individuals. When we say ‘I’ and ‘I am like this’, it is the product of this layer of the mind. This part is hurt when our egos are bruised.

The empathy layer: This is about compassion and a love for others in a non-contractual way, where what we do for other creatures is not limited by thoughts of what we get in return.

The special gifts layer: Things like a high degree of creativity and clairvoyance are the products of this layer of the mind. People show evidence of these gifts only if they remain clear of the clutter of thoughts raised by the lower layers.

The special wisdom layer: This is the layer of the mind that can see the past, present and future. It is connected to the cosmic mind and has at its disposal the wisdom of the past, present and future. This is the ultimate layer of the mind, ready to experience enlightenment. The ultimate mind is the mind that experiences and lives in bliss. It is the pinnacle of knowledge, wisdom, the senses and stillness.

Source

News: Now, access Facebook without internet

.
0 comments

New Delhi, May 18, 2011
Love chatting with your friends on facebook and want to stay connected on social networking? Now you can do all this and not even worry about spending money on internet usage. Singapore-based software applications developer, U2opia Mobile, has developed a new application for mobile phones that will

allow them to access Facebook on all kinds of handsets, without paying for a data connection.
Unstructured Supplementary Data (USSD) is the technology used by telecom players to send alerts to their users. The technology will help users send and view updates on their friends’ Facebook walls. U2opia launched this application on Tuesday with telecom major Bharti Airtel.

While Airtel customers can update their Facebook status through this USSD service free of cost, Rs1 per day will be applicable for accessing the full-feature application, which enables viewing news feeds, commenting on or liking news feed stories, posting on friends’ walls, confirming friend requests, viewing notifications and adding friends.

'In India, where the penetration of smart phones is relatively low and the use of internet on mobiles is limited to key cities, many users are excluded from accessing their Facebook accounts via mobile phones,' said Shireesh Joshi, Bharti Airtel, director of marketing, Mobile Services, in a statement.

Source

Seminar Topic: Data communication

.
0 comments

Introduction:
A computer network, often simply referred to as a network, is a collection of computers and devices interconnected by communications channels that facilitate communications and allows sharing of resources and information among interconnected devices. Computer networking or Data communications (Datacom) is the engineering discipline concerned with the computer networks.

Difficulty : Medium

Download Link : Data communication

Please refer to the following links for your Seminar preparation:
How to give Seminar
How To create Seminar Report

Seminar Topic: Computer Networking

.
0 comments

Introduction:
A computer network, often simply referred to as a network, is a collection of computers and devices interconnected by communications channels that facilitate communications and allows sharing of resources and information among interconnected devices. Computer networking or Data communications (Datacom) is the engineering discipline concerned with the computer networks.

Difficulty : Medium

Download Link : Computer Networking

Please refer to the following links for your Seminar preparation:
How to give Seminar
How To create Seminar Report

Seminar Topic: Data Communication and Networking

.
0 comments

Introduction:
A computer network, often simply referred to as a network, is a collection of computers and devices interconnected by communications channels that facilitate communications and allows sharing of resources and information among interconnected devices.

Difficulty : Medium

Download Link : Data Communication and Networking

Please refer to the following links for your Seminar preparation:
How to give Seminar
How To create Seminar Report

Seminar Topic: Database management system

.
0 comments

Introduction:
A Database Management System (DBMS) is a software package with computer programsthat control the creation, maintenance, and the use of a database. It allows organizations to conveniently develop databases for various applications by database administrators (DBAs) and other specialists. A database is an integrated collection of data records, files, and other database objects needed by an application. A DBMS allows different user application programs to concurrently access the same database. DBMSs may use a variety of database models, such as the relational model or object model, to conveniently describe and support applications.

Difficulty : Medium

Download Link : Database management system

Please refer to the following links for your Seminar preparation:
How to give Seminar
How To create Seminar Report