b tech seminar topics

find suitable seminar topics from here.

  • Semiar Reports

    Read More

61. Browser Security Seminar report


Branch : ECE, EEE, IC, CSE


The initial design of internet and web protocols assumed an environment where servers, clients, and routers cooperate and follow standard protocols except for unintentional errors. However, as the amount sensitivity of usage increased, concerns about security, fraud and attacks became important. In particular, since currently internet access is widely available, it is very easy for attackers to obtain many client (and even host) connections and addresses, and use them to launch different attacks, both on the networking itself and on other hosts and clients. Today's attackers are more likely to host their malicious files on the web. They may even update those files constantly using automated tools. When you are surfing the Internet, it is easy to visit sites you think are safe but are not. These sites can introduce malware when you click the site itself, when you download a file from the site manually and install it, or worse, when you are conned into believing the site you are visiting is a real site, but in fact is nothing more than a fake used to garner your personal information. From a network security perspective, a browser is essentially a somewhat controlled hole in your organization’s firewall that leads to the heart of what it is you are trying to protect. While browser designers do try to limit what attackers can do from within a browser, much of the security relies far too heavily on the browser user, who often has other interests besides security. There are limits to what a browser developer can compensate for, and browser users will not always accept the constraints of security that a browser establishes.


Browser security



Read More

62. CAPTCHA Seminar report

Branch: ECE, EEE, IC, CSE
CAPTCHA is an acronym for "Completely Automated Public Turing test to tell Computers and Humans Apart." It is a type of challenge-response test used in computing to ensure that the response is not generated by a computer. The process usually involves one computer (a server) asking a user to complete a simple test which the computer is able to generate and grade. Because other computers are unable to solve the CAPTCHA, any user entering a correct solution is presumed to be human. A common type of CAPTCHA requires that the user type letters or digits from a distorted image that appears on the screen.


CAPTCHA technology



Read More

63. Case Based Reasoning System Seminar report

Branch : ECE, EEE, IC, CSE
Case-based reasoning is a recent approach to problem solving and learning that has got a lot of attention over the last few years. Originating in the US, the basic idea and underlying theories have spread to other continents, and we are now within a period of highly active research in case-based reasoning. Case-based reasoning means using old experiences to understand and solve new problems. In case-based reasoning, a reasoner remembers a previous situation similar to the current one and uses that to solve the new problem. In this a descriptive framework of CBR system is explained along with steps needed to build a CBR system. Guidelines for using CBR system and advantages of using it are also discussed in this topic.


Case Based Reasoning System

Read More

64. Cluster Computing Seminar report

Branch : CE, EEE, IC, CSE
A computer cluster is a group of linked computers, working together closely so that in many respects they form a single computer. The components of a cluster are commonly, but not always, connected to each other through fast local area networks. Clusters are usually deployed to improve performance and/or availability over that provided by a single computer, while typically being much more cost-effective than single computers of comparable speed or availability. The major objective in the cluster is utilizing a group of processing nodes so as to complete the assigned job in a minimum amount of time by working cooperatively. The main and important strategy to achieve such objective is by transferring the extra loads from busy nodes to idle nodes. The seminar will contain the concepts of cluster computing and the principles involved in it.

cluster computing



Read More


65. Cold Boot Attacks on Encryption Keys Seminar report

Branch : ECE, CSE
Contrary to popular assumption, DRAMs used in most modern computers retain their contents for several seconds after power is lost, even at room temperature and even if removed from a motherboard. Although DRAMs become less reliable when they are not refreshed, they are not immediately erased, and their contents persist sufficiently for malicious (or forensic) acquisition of usable full-system memory images. This phenomenon limits the ability of an operating system to protect cryptographic key material from an attacker with physical access. We can use cold reboots to mount successful attacks on popular disk encryption systems using no special devices or materials. We can also find cryptographic keys in memory images and correct errors caused by bit decay using algorithms. Here we discuss several strategies for partially mitigating these risks, but there is no simple remedy that would eliminate them.


Cold Boot Attacks on Encryption Keys



Read More


66. Computational Intelligence in Wireless Sensor Networks Seminar report

Branch : ECE, CSE



Wireless sensor networks (WSNs) are networks of distributed autonomous devices that can sense or monitor physical or environmental conditions cooperatively. WSNs face many challenges, mainly caused by communication failures, storage and computational constraints and limited power supply. Paradigms of Computational Intelligence (CI) have been successfully used in recent years to address various challenges such as optimal deployment, data aggregation and fusion, energy aware routing, task scheduling, security, and localization. CI provides adaptive mechanisms that exhibit intelligent behaviour in complex and dynamic environments like WSNs. CI brings about flexibility, autonomous behaviour, and robustness against topology changes, communication failures and scenario changes. However, WSN developers can make use of potential CI algorithms to overcome the challenges in Wireless Sensor Network. The seminar includes some of the WSN challenges and their solutions using CI paradigms.


wireless sensor networks
Read More

67 . Computer Clothing Seminar report

Branch : CSE


Recent advancements in miniature devices have fostered a dramatic growth of interest of wearable technology. Wearable Bio-Sensors (WBS) will permit continuous cardiovascular (CV) monitoring in a number of novel settings. WBS could play an important role in the wireless surveillance of people during hazardous operations (military , firefighting , etc) or such sensors could be dispensed during a mass civilian casualty occurrence . They typically rely on wireless, miniature sensors enclosed in ring or a shirt. They take advantage of handheld units to temporarily store physiological data and then periodically upload that data to a database server via wireless LAN or a cradle that allow internet connection and used for clinical diagnosis.


Computer Clothing

Read More

68. Confidential Data Storage and Deletion Seminar report

Branch : CSE


With the decrease in cost of electronic storage media, more and more sensitive data gets stored in those media. Laptop computers regularly go missing, either because they are lost or because they are stolen. These laptops contain confidential information, in the form of documents, presentations, emails, cached data, and network access credentials. This confidential information is typically far more valuable than the laptop hardware, if it reaches right people. There are two major aspects to safeguard the privacy of data on these storage media/laptops. First, data must be stored in a confidential manner. Second, we must make sure that confidential data once deleted can no longer be restored. Various methods exist to store confidential data such as encryption programs, encryption file system etc. Microsoft BitLocker Drive Encryption provides encryption for hard disk volume and is available with Windows Vista Ultimate and Enterprise editions. This seminar describes the most commonly used encryption algorithm, Advanced Encryption System (AES) which is used for many of the confidential data storage methods. This seminar also describes some of the confidential data erasure methods such as physical destruction, data overwriting methods and Key erasure.


Confidential Data Storage

Read More

69. Co-operative Linux Seminar report

Branch : CSE


This seminar describes Cooperative Linux, a port of the Linux kernel that allows it to run as an unprivileged lightweight virtual machine in kernel mode, on top of another OS kernel. It allows Linux to run under any operating system that supports loading drivers, such as Windows or Linux, after minimal porting efforts. The paper includes the present and future implementation details, its applications, and its comparison with other Linux virtualization methods. Among the technical details, it also presents the CPU-complete context switch code, hardware interrupt forwarding, the interface between the host OS and Linux, and the management of the VM‘s pseudo physical RAM.




Co-operative Linux Read More

70. Coming soon

Branch :....








Read More