Seminar Topics

Download the Seminars
 Download the Seminars
 From Data To Decisions Category: A.I. Download From Data To Decisions Category: A.I.
Artificial Intelligence is all about bringing Common Sense, Expert Knowledge, and Superhuman Reasoning to Computers. For the most part, AI does not produce stand-alone systems, but instead adds knowledge and reasoning to existing applications, databases, and environments, to make them friendlier, smarter, and more sensitive to user behavior and changes in their environments. In the domain of Artificial intelligence, various problem-solving techniques have been developed. Though working towards the common goal of making a computer 'intelligent', all these techniques use different methodologies. Case Based Reasoning is one of these techniques. Computer systems that solve new problems by analogy with old ones are often called Case Based Reasoning (CBR) systems. This paper answers fundamental questions like what is CBR and how is it related to human reasoning, the different issues involved in developing a CBR system and CBR's comparison with other problem-solving techniques.
Rate this Seminar :
No votes yet
 How Facial Recognition Systems Work Download How Facial Recognition Systems Work
A ticket to Super Bowl XXXV in Tampa Bay, Florida, didn't just get you a seat at the biggest professional football game of the year. Those who attended the January 2000 event were also part of the largest police lineup ever conducted, although they may not have been aware of it at the time. The Tampa Police Department was testing out a new technology, called FaceIt, that allows snapshots of faces from the crowd to be compared to a database of criminal mugshots.
Rate this Seminar :
No votes yet
 Embedded Systems : An Overview Download Embedded Systems : An Overview
Embedded systems are increasingly becoming integral parts of almost all technology-oriented applications. Embedded systems are the unsung heroes of much of the technology we use today- video games, washing machines etc. The appliances using embedded systems are pre programmed to perform a dedicated or narrow range of functions as part of a large system, usually with minimal end user interaction and optimum performance. Embedded systems are used in navigation tools like global positioning systems (GPS), automated teller machines(ATM's), networking equipments such as Echo cancellation, facsimile etc. the coming together of embedded systems and the internet, which made possible the networking of several embedded systems to operate as part of a large system across networks- be it a LAN, WAN, or the Internet. This convergence of embedded systems with the Internet is going to transfer the way we live.
Rate this Seminar :
No votes yet
 Software Engineering for Embedded Systems: Design and Evaluation Download Software Engineering for Embedded Systems: Design and Evaluation
Embedded systems are computing devices that are radically different from normal desktop computers in terms of the specific requirements of the application for which they are used. Characteristics such as reactivity, robustness, power, size and cost issues force certain design constraints which are otherwise obviated or trivial. Traditional computer design methodologies do not fully address essential design issues critical to system requirements. Certain issues peculiar to embedded systems have been identified and a few possible guidelines to resolve those issues have been proposed. Issues pertaining to testing and maintenance have been discussed for embedded systems with diverse applications. During the product life cycle optimization of development cost, production cost and performance are important. This can be achieved through careful and proper use of software engineering methodologies
Rate this Seminar :
No votes yet
 E-CRM : The ultimate use of IT to serve the people Download E-CRM : The ultimate use of IT to serve the people
Sometimes eternal truths are forgotten, and then rediscovered by later generation, that thinks it has received a blinding flash of inspiration. Many banks and shopping establishments in India, which carry a quotation from Mahatma Gandhi which stresses that the customer is the key to business. The Internet, the Web, and E-Commerce have changed the very nature of business. Even if your company doesn't do all its business over the Internet, customers want to contact you now by e-mail and the Web. And if Web-based E-Commerce is your business, live intervention at the right moment can dramatically reduce abandoned transactions and make the E-Commerce model more profitable.
Rate this Seminar :
No votes yet
 E-Advertising Tools Download E-Advertising Tools
Today we are living in the in the information age. After green revolution and industrial revolution the world is witnessing the Digital Revolution or the Internet revolution. Those days are long gone when internet was beyond the reach of many, today it is fast becoming a part of our lifestyle and more and more people are increasingly using it for a wide variety of purposes. Internet has also emerged as an important medium to reach to the masses. It is one of the most effective means of providing information to a large number of people. The advertisers have realized its importance throughout the country and a big part of the advertising budget is now being allotted to it. The nature of e-advertising is quite different to that of the normal advertising and to utilize it effectively it is very important to understand the behavior and characteristics demonstrated by the internet surfers.
Rate this Seminar :
Average: 5 (1 vote)
 Digital Signature Guidelines Download Digital Signature Guidelines
In today's commercial environment, establishing a framework for the authentication of computer-based information requires a familiarity with concepts and professional skills from both the legal and computer security fields. Combining these two disciplines is not an easy task. Concepts from the information security field often correspond only loosely to concepts from the legal field, even in situations where the terminology is similar. For example, from the information security point of view, "digital signature" means the result of applying to specific information certain specific technical processes described below. The historical legal concept of "signature" is broader. It recognizes any mark made with the intention of authenticating the marked document. In a digital setting, today's broad legal concept of "signature" may well include markings as diverse as digitized images of paper signatures, typed notations such as "/a/Abb SSh," or even addressing notations, such as electronic mail origination headers.
Rate this Seminar :
No votes yet
 Data Mining In The Applied World Download Data Mining In The Applied World
Nowadays, digital information is relatively easy to capture and fairly inexpensive to store. The digital revolution has seen collections of data grow in size, and the complexity of the data therein increase. Question commonly arising as a result of this state of affairs is, having gathered such quantities of data, what do we actually do with it? It is often the case that large collections of data, however well structured, conceal implicit patterns of information that cannot be readily detected by conventional analysis techniques. Such information may often be usefully analyzed using a set of techniques referred to as knowledge discovery or data mining. These techniques essentially seek to build a better understanding of data, and in building characterizations of data that can be used as a basis for further analysis, extract value from volume.
Rate this Seminar :
Average: 5 (1 vote)
 Cybereconomy : Information Technology and Economy Download Cybereconomy : Information Technology and Economy
It would be an understatement to say that the Information Technology (IT) is having an enormous influence on today's global economy. It would be more appropriate to say that IT is now close to becoming the most important driver of the global economy. The competitiveness of a country's economy and well being is getting closely aligned to its ability to innovate and participate in the IT industry. While the industrial revolution was initiated in the labor-intensive manufacturing industry by automotive pioneers like Ford, it is clear that the third revolution is driven by the knowledge-based services sector.
Rate this Seminar :
No votes yet
 How Computer Viruses Work Download How Computer Viruses Work
Computer viruses are mysterious and grab our attention. On the one hand, viruses show us how vulnerable we are. A properly engineered virus can have an amazing effect on the worldwide Internet. On the other hand, they show how sophisticated and interconnected human beings have become.
Rate this Seminar :
No votes yet