Thursday, 11 August 2011

CSE & EEE SEMINORS


CSE Seminors

1.MOBILE PHONE CLONING:
Seminar Description:Mobile communication has been readily available for several years, and is major business today. It provides a valuable service to its users who are willing to pay a considerable premium over a fixed line phone, to be able to walk and talk freely. Because of its usefulness and the money involved in the business, it is subject to fraud. Unfortunately, the advance of security standards has not kept pace with the dissemination of mobile communication. Some of the features of mobile communication make it an alluring target for criminals. It is a relatively new invention, so not all people are quite familiar with its possibilities, in good or in bad. Its newness also means intense competition among mobile phone service providers as they are attracting customers. The major threat to mobile phone is from cloning. Cell phone cloning is copying the identity of one mobile telephone to another mobile telephone.Usually this is done for the purpose of making fraudulent telephone calls. The bills for the calls go to the legitimate subscriber. The cloner is also able to make effectively anonymous calls, which attracts another group of interested users. Cloning is the process of taking the programmed information that is stored in a legitimate mobile phone and illegally programming the identical information into another mobile phone. The result is that the "cloned" phone can make and receive calls and the charges for those calls are billed to the legitimate subscriber. The service provider network does not have a way to differentiate between the legitimate phone and the "cloned" phone.

2.Wearable Computers:
Seminar Description:Computer subsumed into personal space of the user, controlled by the user, and has both operational and interactional constancy Always on and accessible, body/mind extension Different from wrist watches, PDAs, wearable radios etc :– they are fully functional computers Need :- today’s computers are not ‘personal’ A person's "personal" computer should be always available, and interact with the user based on context of the situation  

3.4G Wireless Technology:
Seminar Description: As the virtual centre of excellence in mobile and personal communications (Mobile VCE) moves into its second core research programme it has been decided to set up a fourth generation (4G) visions group aimed at harmonising the research work across the work areas and amongst the numerous researchers working on the programme. This paper outlines the initial work of the group and provides a start to what will become an evolving vision of 4G. A short history of previous generations of mobile communications systems and a discussion of the limitations of third generation (3G) systems are followed by a vision of 4G for 2010 based on five elements: fully converged services, ubiquitous mobile access, diverse user devices, autonomous networks and software dependency. This vision is developed in more detail from a technology viewpoint into the key areas of networks and services, software systems and wireless access. The major driver to change in the mobile area in the last ten years has been the massive enabling implications of digital technology, both in digital signal processing and in service provision. The equivalent driver now, and in the next five years, will be the all pervasiveness of software in both networks and terminals. The digital revolution is well underway and we stand at the doorway to the software revolution. Accompanying these changes are societal developments involving the extensions in the use of mobiles. Starting out from speech-dominated services we are now experiencing massive growth in applications involving SMS (Short Message Service) together with the start of Internet applications using WAP (Wireless Application Protocol) and i-mode. The mobile phone has not only followed the watch, the calculator and the organiser as an essential personal accessory but has subsumed all of them. With the new Internet extensions it will also lead to a convergence of the PC, hi-fl and television and provide mobility to facilities previously only available on one network.

4.Tripwire:
Seminar Description: Tripwire is a reliable intrusion detection system. It is a software tool that checks to see what has changed in your system. It mainly monitors the key attribute of your files; by key attribute we mean the binary signature, size and other related data. Security and operational stability must go hand in hand; if the user does not have control over the various operations taking place, then naturally the security of the system is also compromised. Tripwire has a powerful feature which pinpoints the changes that has taken place, notifies the administrator of these changes, determines the nature of the changes and provide you with information you need for deciding how to manage the change. Tripwire Integrity management solutions monitor changes to vital system and configuration files. Any changes that occur are compared to a snapshot of the established good baseline. The software detects the changes, notifies the staff and enables rapid recovery and remedy for changes. All Tripwire installation can be centrally managed. Tripwire software’s cross platform functionality enables you to manage thousands of devices across your infrastructure.

ELECTRICAL SEMINORS

7.MOCT (Magneto-Optical Current Transformer):
                         Seminar Description: An accurate electric current transducer is a key component of any power system instrumentation. To measure currents power stations and substations conventionally employ inductive type current transformers with core and windings. For high voltage applications, porcelain insulators and oil-impregnated materials have to be used to produce insulation between the primary bus and the secondary windings. The insulation structure has to be designed carefully to avoid electric field stresses, which could eventually cause insulation breakdown. The electric current path of the primary bus has to be designed properly to minimize the mechanical forces on the primary conductors for through faults. The reliability of conventional high-voltage current transformers have been questioned because of their violent destructive failures which caused fires and impact damage to adjacent apparatus in the switchyards, electric damage to relays, and power service disruptions.

8.MEMRISTERS:
                            Seminar Description:Memristor theory was formulated and named by Leon Chua in a 1971 paper. Chua strongly believed that a fourth device existed to provide conceptual symmetry with the resistor, inductor, and capacitor. This symmetry follows from the description of basic passive circuit elements as defined by a relation between two of the four fundamental circuit variables. A device linking charge and flux (themselves defined as time integrals of current and voltage), which would be the memristor, was still hypothetical at the time. However, it would not be until thirty-seven years later, on April 30, 2008, that a team at HP Labs led by the scientist R. Stanley Williams would announce the discovery of a switching memristor. Based on a thin film of titanium dioxide, it has been presented as an approximately ideal device.

9.Micro Electro Mechanical Systems:

                            Seminar Description:"Micromechatronic is the synergistic integration of microelectromechanical systems, electronic technologies and precision mechatronics with high added value." This field is the study of small mechanical devices and systems .they range in size from a few microns to a few millimeters. This field is called by a wide variety of names in different parts of the world: micro electro mechanical systems (MEMS), micromechanics, Microsystems technology (MST), micro machines .this field which encompasses all aspects of science and technology, is involved with things one smaller scale. Creative people from all technical disciplines have important contributions to make. Welcome to the micro domain, a world now occupied by an explosive new technology known as MEMS (Micro Electro Mechanical systems), a World were gravity and inertia are no longer important, but the effects of atomic forces and surface science dominate.

10.FINFET:

                              Seminar Description:Since the fabrication of MOSFET, the minimum channel length has been shrinking continuously. The motivation behind this decrease has been an increasing interest in high speed devices and in very large scale integrated circuits. The sustained scaling of conventional bulk device requires innovations to circumvent the barriers of fundamental physics constraining the conventional MOSFET device structure. The limits most often cited are control of the density and location of dopants providing high I on /I off ratio and finite subthreshold slope and quantum-mechanical tunneling of carriers through thin gate from drain to source and from drain to body. The channel depletion width must scale with the channel length to contain the off-state leakage I off. This leads to high doping concentration, which degrade the carrier mobility and causes junction edge leakage due to tunneling. Furthermore, the dopant profile control, in terms of depth and steepness, becomes much more difficult. The gate oxide thickness tox must also scale with the channel length to maintain gate control, proper threshold voltage VT and performance. The thinning of the gate dielectric results in gate tunneling leakage, degrading the circuit performance, power and noise margin.

No comments:

Post a Comment