Pages

Friday, September 25, 2009

QIP Short-Term Course on Supply Chain Management & E-Business November 23 - 28, 2009

QIP Short-Term Course on Supply Chain Management & E-Business
November 23 - 28, 2009

Department of Industrial Engineering and Management
Indian Institute of Technology Kharagpur


Introduction

Supply chain management (SCM), in recent time has been able to draw maximum attention from both academia and industry for its vast potential to provide benefits to the business organizations. In the competitive business environment, many companies have realized the magnitude of savings that can be achieved by planning and managing their supply chains effectively. As the supply chain covers the entire gamut of business activities, the problems associated with SCM are also complex in nature. The complexity of the supply chain problems unleashes challenges to the academicians and the practitioners for developing newer solution approaches to the problems. In the last two decades, many models and tools have been developed to solve such problems for effective and efficient management of the supply chains.

Recent developments in information and communication technologies have also brought in many concepts such as e-business and enterprise integration that has directly influenced the way the supply chains work. Exposure to some of these advances will enable the participants from academics to introduce such topics in their curriculum and carry on research activities in these fields. The industry participants may directly apply the tools, technique and technologies to enhance their supply chain operations

Objectives of the Course

· To introduce the participants to the fundamentals of supply chain management.

· To expose the participants to the recent developments in the principles and practices in the field of SCM.

· To enable the participants to take advantage of the existing theories and quantitative techniques of SCM.

Pedagogy

The five day course consists of lecture sessions, case studies, and laboratory session. Faculties will be drawn from academics as well as industries.

Course Content

The contents of the course can be broadly classified into three components: Fundamentals of supply chain management, Advanced topics in supply chain management, Laboratory sessions.

Fundamentals of supply chain management

Introduction; issues related to inbound logistics: materials management functions, sourcing decisions, outsourcing; issues related to supply chain operation: demand forecasting and collaborative planning, bullwhip effect; Outbound logistics: Physical distribution functions, distribution network planning, finished goods delivery.

Advanced topics in supply chain management

Impact of e-business on supply chain management, e-procurement, e-auctions and negotiations coordination mechanisms: supply chain contract; Technological issues in supply chain integration: EDI, Web services, security issues, electronic payment systems, Introduction to RFID in supply chain.


Laboratory sessions

Simulation of supply chain systems, problem solving using quantitative techniques, exercises on case studies, playing supply chain games( bear game) to understand bullwhip effect, a game on understanding the information sharing modes.

Eligibility

Teachers from the government and AICTE recognized engineering colleges and management institutes. Executives and engineers from industries practicing or planning supply chain management activity.


Application & Fee

The interested participants can apply to one of the coordinators by filling in the Registration Form. The total number of seats is restricted to 50. The completed application form should reach the coordinator by 15th of October 2009.

There is no course fee for participants from AICTE recognized institutes. The course fee for industry and other engineering colleges (not recognized by AICTE) is Rs. 12, 000/- only. The fee includes course materials and participation fee and excludes boarding and lodging for the participants. The payment is to be made through a bank draft drawn in favour of “CEP-STC, IIT, Kharagpur”, payable at Kharagpur.


Accommodation

The accommodation for 40 participants on twin sharing basis has been arranged in the Institute. The accommodation will be provided on a first come first served basis. Accommodation is free for the participants form AICTE recognized institutes.

Travel

The participants from AICTE recognized institutes will be paid 3rd AC train fair in the shortest route.

Contact

Prof. S.P. Sarmah

Principal Coordinator

Department of Industrial Engineering and Management

Indian Institute of Technology Kharagpur

West Bengal: 721 302

Tel: 03222-283734 (O), 03222-283735 (R), 09434061796(M)

Email: spsarmah@iem.iitkgp.ernet.in

Prof. Mamata Jenamani

Co-Coordinator

Department of Industrial Engineering and Management

Indian Institute of Technology Kharagpur

West Bengal: 721 302

Tel: 03222-283740 (O), 03222-283073 (R), 094342-17846(M)

Email: mamatajenamani@yahoo.co.in

Summer School On Statistical Modelling For Data Analysis(November 30 to December 11, 2009)

Summer School On Statistical Modelling For Data Analysis(November 30 to December 11, 2009)

Vinod Gupta School of Management (VGSOM)
Indian Institute of Technology, Kharagpur
West Bengal 721302
IIT Kharagpur


OBJECTIVE

Statistical modelling is an important branch in mathematical sciences, which finds utility in almost all areas of sciences, engineering, management and social sciences. The rapid development of computing technology has further raised its importance and placed great demands on its application to real life problems, particularly in the line with industrial and economic development of the country. The objective of this workshop is to emphasize the broad range of statistical model development and to foster multi-disciplinary research in these areas.

AREAS TO BE COVERED

* Module 1: Research design and sampling
* Module 2: Understanding and presenting data
* Module 3: Estimation and hypothesis testing
* Module 4: Univariate statistical modelling
* Module 5: Bivariate statistical modelling
* Module 6: Multivariate statistical modelling
* Module 7: Time series modelling
* Module 8: Soft computing

RESOURCE PERSONS

The lists of resource persons include experts from the school of management and sister departments of IIT Kharagpur, IIMs, ISI and some other universities.

COURSE MATERIALS

Necessary course materials will be provided to the participants during the course.

WHO CAN APPLY?

Teachers of AICTE approved Engineering and Management Colleges/ Universities.

HOW TO APPLY?

Download the registration form. Filled in registration form should reach the course coordinator on or before November 15, 2009. The original copy of the filled in registration form may be sent by post. A confirmation letter will be send to the participant by email once we have received your registration form by email/post.

Download Registration Form

IMPORTANT DATES

Last date for receiving application November 15, 2009
Course dates November 30, 2009 to December 11, 2009

REGISTRATION FEE

No Registration Fee will be charged from the teachers of AICTE approved Engineering and Management Colleges/Universities.

TA

The selected teachers from AICTE approved Engineering Colleges/Universities will be paid TA (limited to a maximum of AC-3 tier by the shortest route).

FOOD & ACCOMMODATION

Selected participants will be provided food (breakfast, lunch, dinner) & accommodation in one of our Institute guest houses. Details of accommodation will be sent to the participants after we have received the completed registration form.

COURSE COORDINATOR

Dr. Rudra P. Pradhan
Vinod Gupta School of Management
Indian Institute of Technology, Kharagpur
Kharagpur- 721 302, West Bengal, India
Phone: +91 3222 282316/ 282317; Mobile: 09733742104
Fax: +91 3222 278027/ 255303
Email: rudrap@vgsom.iitkgp.ernet.in and pradhanrp@yahoo.com

Short Term Course on Language, Cognition and Communication 2nd December - 8th December, 2009

Short Term Course on Language, Cognition and Communication
2nd December - 8th December, 2009

Department of Humanities and Social Sciences
Indian Institute of Technology
Kharagpur - 721302
(West Bengal)

Introduction

Human language is different from animal communication by virtue of its being intentionally communicative. This indicates that it is not a bundle of unintentionally informative signals, but it also communicates the speakers attitudes and intentions. In order to participate in communicative activities successfully, therefore, it becomes imperative that one acquires not only the knowledge of the internal organization of this cognitive activity called language, but also the knowledge of the use of language in appropriate contexts, more importantly in discourse. In a successful discourse, the interlocutors share a number of norms, conventions and socio-cultural values, and they also know how they can be taken care of in their language and behavior. An insight into the organization of linguistic structures and their cognitive implications will enable one to understand the subtleties of language and also their applications to communication.

The course is intended to bring out the details of the organization of language, their cognitive implications, and show how linguistic knowledge can be put to actual use, or how the knowledge of linguistics is helpful in communication.

Areas to be Covered

* The characteristics of language
* Language as a cognitive behavior
* The organization of language: the sound-meaning relationship
* The structure of language
* The difference between conceptual meaning and contextual meaning
* Invisible meaning or the communicative intentions of speakers
* Interpreting contexts: deixis, reference, inference, anaphora, presupposition
* Interpreting discourse: Cohesion, speech events
* Cognitive categories in language: Their expression and function in communication

Registration Fees

# Teachers sponsored by AICTE approved colleges/universities :Nil However, a DD of Rs. 400.00 should be enclosed with the application which will be refunded to the candidate who will be attending the course.
# Teachers NOT sponsored by AICTE approved Colleges : Rs. 5000
# Personnel from industry - Rs 6500
# Research scholars/PG students - Rs 3000

Course fees are to be paid strictly by bank draft in favor of ‘CEP-STC, IIT Kharagpur’ payable at Kharagpur.

Food and Accomodation

Participants will be provided food (breakfast, lunch, dinner) and accommodation in Guest House of the Institute. Details of accommodation will be sent to the participants after we have received the completed registration form.

TA

The selected teachers from AICTE approved Colleges/Universities will be paid TA (limited to a maximum of AC-III tier by the shortest route).

Important Dates

Last date for registration : November 15th, 2009
[Complete application should be received by the coordinator by this date]
Course Duration : 2nd December - 8th December, 2009

Course Material :

Necessary course materials will be provided to the participants during the course.

Certificate :

The participants will be provided certificates on successful completion of the programme.

Who can Apply :

Teachers of AICTE approved Colleges/ Universities, research scholars/PG students, personnel from industry

How to Apply :

Download the registration form. Filled in registration form should reach the course coordinator on or before November 15th, 2009. The original copy of the filled in registration form may be sent by post.

Mailing Address

Prof. Jayshree Chakraborty
Coordinator, Short Term Course on Language,Cognition and Communication,
Department of Humanities and Social Sciences
Indian Institute of Technology
Kharagpur - 721302
(West Bengal) Phone: +91-3222-281810 / 283513
Email: shree@hss.iitkgp.ernet.in

Location

Situated 116Km away from Kolkata, IIT Kharagpur boasts of being the oldest and the largest IIT. Its green, tranquil campus provides a refreshing contrast to the polluted city life. Kharagpur is an important junction in the South-Eastern Railways, and is connected to all major cities in India. Local and express trains connect it to Howrah Station. The IIT is about 5km from Kharagpur railway station, and is accessible by rickshaws, autos, and taxis from the station. The beach town of Digha on the Bay of Bengal is 120 Km from Kharagpur.

Download Registration Form

International Conference on Recent Trends in Materials and Characterization (RETMAC) February 14-15, 2010

International Conference on Recent Trends in Materials and Characterization (RETMAC) February 14-15, 2010
National Institute of Technology Karnataka, Surathkal, India.

Location:

The RETMAC conference will be held in Surathkal, India. at the National Institute of Technology Karnataka, Surathkal.


Theme:

RETMAC – 2010 is an international conference with a focus on materials science in general and materials characterization. It provides a forum for interaction and exchange of ideas among scientists, engineers, researchers, and users actively engaged in the broad area of materials science. The international conference would be held during February 14-15, 2010 at National Institute of Technology Karnataka (NITK) located in Surathkal near Mangalore, India. The conference would include invited lectures from eminent scientists from India and abroad, contributed papers from participants through oral and poster presentations and exhibition by equipment vendors. There will be a best paper award consisting of a citation and cash prize.

National Institute of Technology Karnataka (NITK) is a premier technical institute located near the port city of Mangalore in the south Indian state of Karnataka, offering undergraduate, postgraduate and doctoral programmes in engineering, sciences and management. The details of the institute are available at www.nitk.ac.in. The institute is celebrating its Golden Jubilee year from Aug 2009 to Aug 2010 and this conference is a part of it.

Scope of the Conference:

The conference would consist of a number of invited lectures in areas of current interest in materials science. Researchers are welcome to submit contributory papers covering original research related to topics of interest for the conference. The conference would cover a wide range of topics including the following:

# Nanomaterials
# Photonic & Electronic Materials
# Organic & Polymer Materials
# Metals & Composites
# Ceramics & Glasses
# Bio-Materials
# Energy Materials
# Smart materials
# Electron Diffraction
# X-ray Techniques
# Electron Microscopy Techniques
# Spectroscopic Techniques
# Electrochemical Techniques
# Surface Characterization
# Optical Characterization

Important Dates:

October 03, 2009 Deadline for submission of one page Abstract.
October 10, 2009 Notification of acceptance of Abstract.
October 31, 2009 Deadline for submission of 6-page camera ready paper.
November 30, 2009 Deadline for submission of revised manuscript.
December 15, 2009 Notification of acceptance of paper.
December 31, 2009 Finalized technical program.
January 15, 2010 Deadline for confirmation of participation in exhibition.
February 14-15, 2010 Conference Dates.

Registration Fee:

All participants including contributory paper authors are required to register and pay the registration fee applicable as per the following:

R & D Organizations / Industry Rs. 3000
Students Rs. 1000
Faculty (from India) Rs. 2000
Foreign Delegates USD 200
Exhibition Rs. 25,000 per stall
Foreign Exhibitors USD 1000
For Indian partcipants-Registration fee may be paid in form of DD drawn in favour of “RETMAC2010″ payable at Surathkal.

Registration form in pdf

Registration form in word

For further information, please contact :

Prof. G. Umesh
Chief Coordinator
Email: umesh52@gmail.com;
Phone: +91-824-2474000 ext.3276
Phone: +91-9901184376(mobile)
Fax: +91-824-2474082

Hotels and Travel Information:

Download hotel information in MS word format

Tourist places nearby NITK surathkal DK District Bekal Fort

Short Term Courses CNC Programming and PLC Training

Short term Course on CNC Programming

CNC Technology is the heart of manufacturing technology in industries to improve the quality of product and to reduce the cost of production with less lead time. This course is designed to ignite and accelerate the knowledge and skill level of technicians in CNC lathe / Machining centre. The course will enhance the employment potential of an individual. Participants will be trained on the most advanced CNC machines with modern production concepts by experienced professionals for the easy transition into the industries.

Course Contents


Theory


· Introduction to CNC machines, application and advantages of CNC technology
· Principle and operation of CNC machines
· Fundamentals of programming
· Programming concepts of CNC machines
· Cutting parameters
· Cutting tools and its selection
· Simple maintenance procedures

Practical

Participants will be trained in production grade CNC machines to understand the latest manufacturing techniques relevant to the industries.


Eligibility:

ITI (fitter, turner, machinist)
Diploma (Mechanical, Tool & Die making, Mechatronics, Automobile)
Degree in (Mechanical, Mechatronics & Production Engg.)

Timings: 8:00AM to 4.30PM



Course Duration

Course fee (Inclusive of Taxes)

CNC Lathe (week days) 6 days Rs.3400/CNC
lathe & Machining centre (week days) 8 days Rs.4400/
CNC lathe & Machining centre (8 Sundays) 8 days Rs.4400/



Certificate
:

Course certificate will be awarded to the successful Participants.

For further details, please contact:


Mr.M.Maheswaran
NTTF Electronics city centre,
No:40/40A, Electronics City, Hosur Road, Bangalore – 560100
Phone : Phone: 080 – 28520171 / 28520010 , Cell : +91 9880529461 ,
Email : maheswaran22@gmail.com ,
Website: www.nttftrg.com,

Short term Training program on PROGRAMMABLE LOGIC CONTROLS (PLC)


About the Course



• Today's world revolves around high technology & most companies are running by investing substantially in highly sophisticated Automated Plant . Most manufacturing companies are looking for competent engineers with basic aptitude towards automation and ability to work on varied brands of PLCs, Drives, MMI and SCADA. High level of technical training and skills are required to keep it going in operations & maintenance.
• This course is specially designed for persons who need to have the right knowledge of PLC applications , instructions, programming, trouble shooting and interfacing.
• This hitech course is designed to ignite and accelerate the knowledge and skill level of technicians in PLC controls.
• This course will increase the employment potential of an individual.
• Participants will be trained on the most Advanced PLC controls with Basics of Hydraulics and Pneumatics by experienced professionals for the easy transition into the Industries.


Course contents :


• Introduction to Automation, Basics of Hydraulics & Pneumatics,
• History of PLC, difference between relay, contactor & PLC logic, PLC architecture.
• A detail description of different PLC modules & cards.
• Introducing the basic ladder logic. Inputs, outputs, contacts, coils, and PLC scan.
• All the PLC instructions such as NO/NC, Set, Reset, Timers, Counters, Comparison, Arithmetic, Logical & Move functions will be covered. Each instruction being illustrated by application specific program examples.
• Simulation of PLC program using different PLC software.
• Interfacing of the PLC with hardware Electronic modules.
• Interfacing of the PLC with Hydraulic, and pneumatic module.
• PLC’s interface with hardware fault finding and probable causes
• Fundamentals of AC Drive, block diagram of AC drive, configuration of different
drives. Control of drive with and without PLC.

Eligibility :

ITI (Machinist, Electrician, Electronics), Diploma (Mechanical,
Mechatronics, Electrical & Electronics Engg.) Degree (Mechanical,
Mechatronics, Production Engg. Electrical & Electronics Engg.)


Duration :

6 days Regular /8 days (week end program)

Course Fee :

for 6 days Rs.5000/+12.24% Service Tax
for 8 days Rs.6000/+ 12.24% Service Tax


Mode of Payment:


Fees should be paid in full at the time of regi stration through DD in favour of NTTF payable at Bangalore


Timings :

9 am to 5 pm


For enquires & Registration, please contact


NTTF Electronics City Centre
40/40A, Electronics City, Hosur Road,
Bangalore – 560 100
Ph:08028520171/
28520010
Cell: 9902254216/ 9740530926
Email: jingade_ashok@rediffmail.com
Web site: www.nttftrg.com

Saturday, September 12, 2009

EDGE PRESERVING IMAGE COMPRESSION FOR MAGNETIC RESONANCE IMAGES USING DANN-BASED NEURAL NETWORKS

EDGE PRESERVING IMAGE COMPRESSION FOR MAGNETIC RESONANCE IMAGES USING DANN-BASED NEURAL NETWORKS

ABSTRACT

This seminar report gives us an overview of the image compression of Magnetic Resonance Images. It gives us the steps involved in image compression and the characteristics of an appropriate image compression scheme. It covers the DCT Technique and Vector Quantization .

The seminar report covers the data compression using Neural Networks and gives the architecture of Edge Preserving Image Compressor.
It gives the compressor and de-compressor overview. The report also covers the goals for developing a compression architecture.

The report addresses the use of DANN-Network for the compression of Magnetic Resonance Images. It covers the features for improving EPIC upon the DANN architecture. The report gives details about the Modified DANN Training procedure. It also covers the Epic Compression Algorithms.

Finally the report gives the advantages of Epic Compression scheme and also the future enhancements.

Ecommerce Transaction on Mobile

Ecommerce Transaction on Mobile

ABSTRACT

Ecommerce Transaction on Mobile consists conducting information and transaction by means of mobile devices. One such service is mobile banking, which offers the user the possibility to inquire personal bank accounts, stock exchanges information as well as transfer funds from one account to another.
Advanced technologies such as the SIM Application Toolkit and the wireless application protocol, enable new user friendly value added services via mobile phones. Various technologies and there possible services that can be built upon them are described in this paper. I conclude by drawing out possibilities for market evolution and technologies in the area of Ecommerce on mobile computing environment and will make a link to the multimedia services over UMTS.

COMPONENT BASED SOFTWARE ARCHITECTURE FOR SUPPLY CHAIN MANAGEMENT SYSTEM

COMPONENT BASED SOFTWARE ARCHITECTURE FOR SUPPLY CHAIN MANAGEMENT SYSTEM

ABSTRACT

The supply chain environment is very flexible due to changing demand and pressure from competitors. This article determines that a software architecture is needed to allow information systems to be realigned with the changing supply chain without effort or delay. The characteristics and requirements of the supply chain of the future matches the advantages and characteristics of a software component architecture. The software engineering methodology of component based development, which builds systems using the software structures Components, allows the underlying software architecture to be rapidly changeable. We show how components can be optimized for inter-operability,facilitating the integration of information systems as the supply chain view extends outside of the company. The required specialization of components before they are applicable to supply chain software is explained.

Proof-Carrying Code for Mobile Code Security

Proof-Carrying Code for Mobile Code Security

ABSTRACT

Mobile code is code that traverses a network during its lifetime and executes at the destination machine. In its most powerful guise, the same piece of mobile code is able to run on multiple platforms (both Unix boxes and Win32 machines, for example). This code need not be compiled to tens of platforms and distributed only after determining the target platform. Instead, mobile code is written once and then runs wherever it ends up. There are many well-known systems for creating and using mobile code, including Java, JavaScript, VBScript.
The risks of downloading and running a random person’s code on your machine are clear. If the code has a virus attached, it can infect your machine. This has to address threats due to rogue code being loaded and run. Proof carrying code is a technique by which a code consumer (e.g. host can verify that code provided by an untrusted code producer (e.g. untrusted Internet agent) adhenes to predefined set of safety. A code receiver establishes a set of safety rules that guarantee safe behavior of programs, and the code producer creates a formal safety proof that proves, for the untrusted code, adherence to the safety rules. Then, the receiver is able to use a simple and fast proof validator to check, with certainty that the proof is valid and hence the untrusted code is safe to execute.

VMware Servers

VMware Servers

ABSTRACT

VMware Server is a thin software layer designed tomultiplex hardware resources efficiently among virtual machinesrunning unmodified commodity operating systems. The topic introduces several novel ESX Server mechanisms and policies for managing memory. A ballooning technique reclaims the pages considered least valuable by the operating system running in a virtual machine.

An idle memory tax achieves efficient memory utilization while maintaining performance isolation guarantees. Content-based page sharing and hot I/O page remapping exploit transparent page remapping to eliminate redundancy and reduce copying overheads. These techniques are combined to efficiently support virtual machine workloads that overcommit memory

VIRTUAL PRIVATE NETWORK FOR QUALITY OF SERVICE

VIRTUAL PRIVATE NETWORK FOR QUALITY OF SERVICE


ABSTRACT

This seminar report is about “VIRTUAL PRIVATE NETWORK for QUALITY of SERVICE”. In this we review today’s corporate networks and how VPN can be used for corporate networking. These introduce with VPN Technology, its types, and also describe the various components, its need and functioning with its working in detail.

In this we mainly explain the quality of service for virtual private network, so that they explain why quality of service is needed? And its components are described. They provide an introduction to quality of service architecture for VPNs including rich classification, policing, shaping, queuing, and congestion avoidance.

In quality of service how its parameter are reflected from tunnel packets with their types. In this we detail study about its advantages, disadvantages, features dedicated and benefit of the VPN. Also see how data kept secure with help of IP protocol.

SOFYWARE QUALITY AND RELIABILITY

SOFYWARE QUALITY AND RELIABILITY

ABSTRACT

It gives the general view about Software-Quality and Reliability. Software Quality includes Quality models, Quality factor its procedural flow and calculation. Its also tells about Software metrics to improve SW Quality. Under Software Reliability comes importance of Software Reliability, Software Reliability models, Software reliability metrics and measuring reliability and availability.
Under Software Quality Assurance comes Quality Assurance, cost of quality and SQA activities. Analyzing, measuring and assessing SW Quality with logic-based graphical framework, it includes hierarchy theory, function modeling, approach to quality assessment and GDQA framework.
It further includes Software trust ability assessment, failures/errors affecting software quality and reliability also tools to improve SW Quality and Reliability and future of Software Quality and Reliability for next 10 years.
If Software Quality and Reliability is improved it will run anywhere, any line on any platform.

Wi-Fi WIRELESS NETWORK

Wi-Fi WIRELESS NETWORK

ABSTRACT

The IEEE 802.11 working group published the 802.11 standard for wireless LANs in 1999. 802.11b is a supplement to 802.11 that specifies a higher data rate and is currently the industry-accepted standard for WLANs. 802.11b products that meet a base standard of interoperability are certified by the Wireless Ethernet Compatibility Alliance (WECA) with the Wi-Fi™ logo. Several IEEE 802.11 working groups are creating standards for improvements in data rates, quality of service, and security.
Wi-Fi is not a fully wireless LAN. It is an extension to the existing wired network. By using device called Access Point (AP) wireless nodes can be connected to the wired network. Otherwise wireless nodes has to be connected in AdHoc style. Its typical coverage area is 100 to 500 feet.
Wireless LANs give the enterprise more mobility and flexibility by allowing workers to stay connected to the Internet and to the network as they roam from one coverage area to another. This increases efficiency by allowing data to be entered and accessed on site.

JAVA 2 MICRO EDITION (J2ME) TECHNOLOGY

JAVA 2 MICRO EDITION (J2ME) TECHNOLOGY

1 INTRODUCTION

On the 15th of June 1999, Sun Microsystems announced a redefined architecture for the Java™ platform at the Java One conference in San Francisco.
The architecture was targeted to a wide variety of markets and at the same time expected to provide developers, service providers and device manufacturers extra benefits by making it simpler and specific to the market.J2ME is a set of J2SE & J2EE.

1.1 Basic constraints of Java Technologies

Each Java™ edition defines a set of technology and tools that can be used with a particular product:
• Java virtual machines that fit inside a wide range of computing devices;
• libraries and APIs specialized for each kind of computing device; and
• tools for deployment and device configuration.

There are mainly 3 editions of the Java Technology.
1. Java 2 Standard Edition (J2SE),
2. Java 2 Enterprise Edition (J2EE),
3. Java 2 Micro Edition (J2ME).

1.2 Overview of J2SE & J2EE

1.2.1 Java 2 Standard Edition (J2SE)

J2SE is a feature complete development and deployment foundation for building client side enterprise applications. These applications include both web applications such as applets and standalone desktop applications. In addition to standard components of Java platform (JVM, Java programming language, Java packages) J2SE includes java applet viewer, java debugger and other tools. One of such tools found in version 1.3 of J2SE is Java plug-ins. J2SE platform consists of two binary deliverables: Java 2 Standard Development Kit (JDK) and Java 2 Runtime Environment (JRE). JDK consists of Java compiler and is used for application development whereas JRE consists of only those components, which are mandatory in running a Java application or a Java applet.

1.2.2 Java 2 Enterprise Edition (J2EE)

J2EE is a foundation for server side of enterprise application development. Traditionally, enterprise applications are based on two-tier model, generally the client and the server. As the complexity of the applications grow tremendously and the customers demand flexibility, the two-tier applications model started to migrate to a multi-tier application model. In a multi-tier model, the business logic is kept separate from both the client side user interface and the server side system services and it occupies the middle tier(s). The server side system services can be either new services or some existing Enterprise Information Systems (EIS). These middle tiers take the role of middleware and provide services to both the client-tier and EIS-tier without them knowing the details of how these services are implemented. J2EE architecture is based on multi-tier model. The client user interface is implemented as the first tier, the EIS tier stores business critical data and the middle tier implements enterprise services such as database access, Common Gateway Interface (CGI) behavior and implementation of easily configurable and reusable components as multi-tier applications. These multi-tier applications are expected to provide scalability, accessibility and manageability. In order to achieve this model, the J2EE platform provides a lot of standard system services whereas the developers are responsible for implementing business and presentation logic.

1.3 Introduction to Java™ 2 Platform Micro Edition (J2ME™)

To meet the demand for information appliances in the rapidly developing consumer and embedded markets, Sun has extended the scope of Java technology with the introduction of Java™ 2 Platform, Micro Edition (J2ME™) technology.
The versatility of the Java application development environment is now enabling the development of many new and powerful information appliance products. Java technology enables users, service providers, and device manufacturers to take advantage of a rich portfolio of application content that can be delivered to the user’s device on demand, by either physically connected (wired) or wireless connections.
Java 2 Micro Edition (J2ME™)—for the combined needs of:
1. Consumer and embedded device manufacturers who build a diversity of information devices.
2. Service providers who wish to deliver content to their customers over those devices.
3. Content creators who want to make compelling content for small, resource-constrained devices.

PREFILLING A CACHE: A SATELLITE OVERVIEW

PREFILLING A CACHE: A SATELLITE OVERVIEW

1. Introduction

The topics detailed here follow the first experiments that were conducted in 1998 related to cache prefilling in a satellite context [1]. This work has already been presented during the IETF 44th meeting in the working groups UniDirectional Link Routing (UDLR) and Web Replication and Caching (WREC).
This document describes the multicast cache content delivery service designed and currently under test at France Telecom. This service works on an intranet and uses a network infrastructure that now associates terrestrial and satellite nodes. It also uses the cache prefilling module previously developed.
The first goal of the work was to extend the previously created satellite platform by associating it with a terrestrial Internet Protocol (IP) multicast network. The multicast diffusion of a predefined content to be prefilled within a cache was then tested on this platform using the reliable multicast protocol MFTP [2] over a heterogeneous network.
Afterwards, the work consisted of designing and testing the multicast cache content delivery service based on the following components:
• The multicast diffusion platform.
• TOP 100: Automatic cache feeding service of up-to-date web pages targeted for specific communities of interest.
• Cache content diffusion to users with mobility constraints.
• Security features when delivering cache content over satellite links.
For complete efficiency, this service needs to be easily integrated into a company’s information data system. For this reason, integration tests with the Tivoli software distribution framework were performed.

Intelligent Distributed Information Management System (IDIoMS)

Intelligent Distributed Information Management System (IDIoMS)

Introduction

Although the Internet provides access to a vast repository of information, the search and retrieval of specific, useful information and the management of heterogeneous information sources on the Internet is becoming increasingly difficult. This paper presents an Intelligent Distributed Information Management System (IDIoMS) that supports the sharing, managing, searching, and delivery of widely distributed information.
IDIoMS, developed jointly by Fujitsu Laboratories and British Telecommunications (BT), makes significant use of software agent technology, integrated using Internet technologies. Advanced management of distributed information resources is provided by Fujitsu Laboratories’ Open Agent Middleware platform, while personalized information management and delivery is performed by BT’s Personal Agent Framework.
IDIoMS will benefit users through the automatic provision of timely and relevant information with minimal need for users to search for and find that information. The system will also benefit service providers through the plug-and-play provision of information services with minimal need for providers to make their services widely available.

Hop Integrity in Computer Networks

Hop Integrity in Computer Networks

INTRODUCTION

A computer network is said to provide hop integrity if and only if when any router p in the network receives a message m supposedly from an adjacent router q, then p can check that m was indeed sent by q, was not modified after it was sent, and was not a replay of an old message sent from q to p. In this paper, we describe three protocols that can be added to the routers in a computer network so that the network can provide hop integrity. These three protocols are a secret exchange protocol, a weak integrity protocol, and a strong integrity protocol. All three protocols are stateless, require small overhead, and do not constrain the network protocol in the routers in any way.

Encryption

Encryption

Introduction

This standard specifies the Rijndael algorithm, a symmetric block cipher that can process data blocks of 128 bits, using cipher keys with lengths of 128, 192, and 256 bits. Rijndael was designed to handle additional block sizes and key lengths, however they are not adopted in this standard.

Throughout the remainder of this standard, the algorithm specified herein will be referred to as “the AES algorithm.” The algorithm may be used with the three different key lengths indicated above, and therefore these different “flavors” may be referred to as “AES-128”, “AES-192”, and “AES-256”.

Background

What is Encryption?


Encryption is the process of transforming information from an unsecured form (”clear” or “plaintext”) into coded information (”ciphertext”), which cannot be easily read by outside parties. The transformation process is controlled by an algorithm and a key. The process must be reversible so that the intended recipient can return the information to its original, readable form, but reversing the process without the appropriate encryption information should be impossible. This means that details of the key must also be kept secret.
Encryption is generally regarded as the safest method of guarding against accidental or purposeful security breaches. The strength of the encryption method is often measured in terms of work factor - the amount of force that is required to ‘break’ the encryption. A strong system will take longer to break, although this can be reduced by applying greater force (the more effort that is put into the attack, the less time required to break the code).

DOMAIN NAME SYSTEM (DNS)

DOMAIN NAME SYSTEM (DNS)

ABSTRACT

The essence of DNS is the invention of a hierarchical ,domain based naming scheme and a distributed database system for implementing this naming scheme.The naming scheme is interesting for two reasons. First ,it has been used to assign machine names through out the global internet. Second ,because it uses a geographically distributed set of servers to map names to address, the implementation of the name mapping mechanism provides a large scale example og the client-server paradigm. It is primarily used for mapping host names and email destinations to IP addresses but can also be used for other puposes . DNS is defined in RFCs 1034 and 1035.
The way DNS is used is as follows. To map a name onto an IP address,an applicaton program calls a library procedure called the resolver , passing it the name as parameter. The resolver sends a UDP packet to a local DNS server, which then looks up the name and returns the IP address to the resolver , which then returns it to the caller.Armed with the IP addess,the program can then establish a TCP connection with the destination ,or send it UDP packets.

DIGITAL WATERMARK

DIGITAL WATERMARK

ABSTRACT

Legalization of any physical entity like any product, research paper (traditional media) you can use logos, holograms, trademark, letterhead, serial-no.
What about digital media?
So you need some technique, some way to legalize your copy of digital material. That give birth to technique called digital watermark.
In this paper we are going to study Techniques of embedding a secret imperceptible signal, directly into the original data in such a way that always remains present, called Digital watermark Here, we can know what actually watermark is? and It’s applications. The most obvious application is to use watermarks to encode information, which can prove ownership, e.g., copyrights. However, digital watermarks can also be used to encode copy or read permissions and quality control information.
In this paper, we stick to image watermarking, an image authentication technique by embedding each image with a signature so as to discourage unauthorized copying is proposed but we found some misuse of this technique in hidden communication in branch of steganography.

DVD, or Digital Versatile Disc

DVD, or Digital Versatile Disc

Abstract

DVD, or Digital Versatile Disc,& not digital vidio disk, is the next generation optical disc storage technology. It has been long journey of storage technology. First was gramophone records, then came magnetic tapes, then came CDs-first step in optical disc storage technology. Right now are DVDs.
As per name, versatile in the sense that it can store any kind of digital data, such as high quality video databases, motion pictures, document images, audio recordings, multimedia titles, and so on.
As we all know that DVDs provide storage capacity in GBs, which is very high as compared to CDs providing storage capacity in MBs. The DVD format provides several configurations of data layers, moving from 2D storage towards 3D storage

Digital Subscriber Line

Digital Subscriber Line

Abstract

Imagine giving employees immediate, around-the-clock access to all the data they need — the Internet, local area networks (LANs) or wide area networks (WAN) — with no more waiting for dial-up modems to connect, and no more busy signals. Imagine giving them the power to use a single phone line to access data while simultaneously talking on the phone or sending a fax. And imagine doing it without investing in a major system overhaul.
You can do it all with Digital Subscriber Line (DSL) — from BellSouth. DSL service is a new modem technology that transforms a regular copper twisted-pair telephone line into an ultra high-speed conduit for simultaneous voice and data transmissions. Now you can use DSL service to speed up your data communications to and from the Internet, Intranet and corporate network. Tasks that would normally take minutes or longer can now be completed in mere seconds, thanks to BellSouth Business DSL speeds of up to 1.5 Mbps downstream and 256 Kbps upstream for our standard product offering.
DSL uses the existing phone line and in most cases does not require an additional phone line. This gives “always-on” Internet access and does not tie up the phone line. DSL offers users a choice of speeds ranging from 144 Kbps to 1.5Mbps. This is 2.5x to 25x times faster than a standard 56Kbps dial-up modem.
This digital service can be used to deliver bandwidth-intensive applications like streaming audio/video, online games, application programs, telephone calling, video conferencing and other high-bandwidth services.
Today DSL is for the first time putting high-speed Internet access within the reach of the home, small and medium-size businesses. DSL takes existing voice cables that connect customer premises to the phone company’s central office (CO) and turns them into a high-speed digital link.
Over any given line, the maximum DSL speed is determined by the distance between the customer site and the Central Office (CO). Most ISP’s offer Symmetric DSL (SDSL) data services at speeds that vary from 144 Kbps to 1.54 Mbps, and now even faster up to 6.0 Mbps–so customers can choose the rate that meets their specific needs. At the customer premises, a DSL router or modem connects the DSL line to a local-area network (LAN) or an individual computer. Once installed, the DSL router provides the customer site with continuous connection to the Internet and use of the telephone at the same time

Decompiler’s

Decompiler’s

Abstract

This seminar presents an overview of Decompiler’s, a program which performs exact reverse process of compilers i.e. creating high level language code from a machine /assembly language code. Decompiler’s comes into picture when user needs source code from executables during number of occasion. Decompiler’s mainly deals with Reverse Engineering, which can be used for positive as well as negative purposes depending on application user uses it for. Hence we also needs ways to protect our code from Decompiler’s to avoid misuse. In Industry people’s are taking Decompilation quite seriously like any other department while discovering it’s usability. In this seminar I find I have a foot in two different camps, as a programmer I’m interested in understanding how others achieve interesting effects but from a business point of view I’m not too keen on someone reusing my code and selling them onto third parties as their own. This paper presents an overview of the Decompiler’s working and area of usability.

DATA CENTER - “NEXT GENERATION HIGH STORAGE”

DATA CENTER - “NEXT GENERATION HIGH STORAGE”
Abstract

In now a days, the demand for ‘Internet’ & ‘Intranet’ is increases continually, the data transfer on the network increases to store such a large data, storage required is also high. Also as On-Line-Transaction-Process (OLTP) increases, the storage required again increases. To solve the problem of the high storage required to store the data, ‘Data center’ are developed all
over the world. The capacity of the data center depends on the size of the data center. In India also, the data center development increases continually. Also, bigger Organization or enterprises also requires a high storage that is provided by the ‘data center’. In next 10 years, the data center is growing with very fast speed.

BREW (Binary Runtime Environment for Wireless )

BREW (Binary Runtime Environment for Wireless )



Abstract

All of we knows what is the importance of the wireless networks. Today no one can apart from this technology. We can’t imagine the world without it.
The intension of this seminar is to understand whole this network, its requirement and the problems in it. This seminar gives the idea about the how the network can be used efficiently by using the term BREW.
This seminar not concerns with the the technologies like WAP, 3G,Bluetooth and lot more. But it describes all this thing in some different and in generalize manner.
Along with whole discussion, the main focus of the seminar towards the change of developers view in the wireless industry.

BIONIC AGE

BIONIC AGE

Abstract:

Bionic age is basically a technology combining biology and electronics. Advanced Bionics Corporation, in sylmar, CA, announced the U.S. Food and Drug Administration (FDA) have approved Bionic Ear System. The new technology is approved for use in children and adults with profound hearing loss in both ears. An estimated 460,000 to 740,000 people in the United States who are severely or profoundly hearing impaired may benefit from bionic ear surgery.
SPEAR3 (Speech Processor for Electrical and Acoustic Research), is an advanced body-worn speech processor developed by the CRC for Cochlear Implant and Hearing Aid Innovation to enable high-level speech processing research applicable to cochlear implants and/or hearing aids.

The purpose of seminar to give the idea of bionic age and detailed of bionic ear and speech processor used in cochlear implant.

BIOCHIP

BIOCHIP

ABSTRACT

A biochip is a collection of miniaturized test sites (microarrays) arranged on a solid substrate that permits many tests to be performed at the same time in order to achieve higher throughput and speed. Typically, a biochip's surface area is no larger than a fingernail. Like a computer chip that can perform millions of mathematical operations in one second, a biochip can perform thousands of biological reactions, such as decoding genes, in a few seconds.

Introduction

A genetic biochip is designed to "freeze" into place the structures of many short strands of DNA (deoxyribonucleic acid), the basic chemical instruction that determines the characteristics of an organism. Effectively, it is used as a kind of "test tube" for real chemical samples. A specially designed microscope can determine where the sample hybridized with DNA strands in the biochip. Biochips helped to dramatically accelerate the identification of the estimated 80,000 genes in human DNA, an ongoing world-wide research collaboration known as the Human Genome Project. The microchip is described as a sort of "word search" function that can quickly sequence DNA.
In addition to genetic applications, the biochip is being used in toxicological, protein, and biochemical research. Biochips can also be used to rapidly detect chemical agents used in biological warfare so that defensive measures can be taken. The biology was evolving rapidly towards an information base, and it reminded him of quantum mechanics in the 1930s,and idea that it would now be possible to calculate the properties of all materials under all conditions from these mathematical equations. That was true, he said, but it took years to advance materials science and computational chemistry to where they are today, and that this came about by transferring the practical applications of the equations from
mathematicians and theoretical physicists to other disciplines where they were looked at from new perspectives. The same was now true of biology. Important advances would now come as physicists mathematicians and engineers joined with biologists to attain the future that in principle they now know is possible.

AUTOMATED TELLER MACHINE

AUTOMATED TELLER MACHINE




ABSTRACT

In simple words, an ATM can be described as a m/c which dispenses money on reading information from a card which is inserted into the machine. ATMs can now be seen at many places. This seminar focuses on the working of an ATM. That is what happens since the card is inserted & till the money is received is explained in detail. Other features like parts of an ATM , security of an ATM are also covered.



1. INTRODUCTION

1.1 Need for noteless transaction :

Usually the transactions that take place are either direct cash payments or through checks or demand drafts. Many-a-times it so happens that we run out of cash & to avoid this we carry extra cash with us all the time. It is risky to carry cash with us all the time. The weight of the cash also becomes a problem. An alternative to this is ATM cards, credit cards.


1.2 Difference between ATM card & check card :

As an alternative to writing checks & using a credit card many companies have started issuing what is called as the ‘check card’. The basic difference between a check card & an ATM card is that a ATM card can be used only at a ATM or some stores whereas the check card can be used at any retailer that accepts credit cards like book stores, grocery stores, ticket counters, hotels, etc. Check cards are also known as debit cards because of how they work : instead of getting credit for your purchase and receiving a monthly bill, like you do with a credit card, a check/debit card deducts money from your checking or savings account. It's easy to tell the difference between a plain ATM card and a check card : A check card has your name, "credit" account number, the credit company's logo, the bank's logo and "Check Card" printed across the front of it; an ATM card has only your name, account number and bank's logo on the front of it.

Adaptive Brain Interface

Adaptive Brain Interface

Abstract

In simple words ABI can be defined as a human computer interface that accepts voluntary commands directly from the brain. The central aim of ABI is to extend the capabilities of physically impaired people. The brain-computer interface provides new ways for individuals to interact with their environment. The computer will continue to be a necessary component as long as detecting a brain response reliably remains a complex analytical task. In most cases, the brain response itself is not new, just the means of detecting it and applying it as a control. However, the necessary feedback associated with experimental trials frequently resulted in improved, or at least changed performance. Little is known about the long-term effects of such training either from an individual difference, or from a basic human physiology point of view.
A brain-computer interface (BCI) is a system that acquires and analyzes neural (brain) signals with the goal of creating a high bandwidth communications channel directly between the brain and the computer. The objective of the ABI project is to use EEG signals as an alternative means of interaction with computers. As such, the goal is to develop a brain-actuated mouse.

ACTIVE DIRECTORY SERVICES IN WINDOWS 2000

ACTIVE DIRECTORY SERVICES IN WINDOWS 2000

Abstract

We use directory service to uniquely identify users and resources on a network. Active Directory in Microsoft Windows 2000 is a significant enhancement over the directory services provided in previous versions of Windows. Active Directory provides a single point of network management, allowing us to add, remove and relocate users and different resources easily.
Windows 2000 uses Active Directory to provide directory services. It is important to understand the overall purpose of Active Directory and the key features it provides. Understanding the interactions of Active Directory architectural components provides the basis for understanding how Active Directory stores and retrieves the data. This seminar concentrates on the Active Directory functions, its features and architecture.

Tuesday, September 1, 2009

Sensor network security emerging trends

Sensor network security emerging trends
Abstract:-

Sensor networks are expected to become a major tool for various security and/or surveillance applications. Although it is expected that eventually they may be used as fully autonomous systems, in a more realistic scenario, sensors network are devices supporting human decisions with data that have been preliminarily analyzed and interpreted.


The paper reports security of sensor network with the
1. Secure Aggregation.
2. Secure multiparty computation.
3. Multimedia processing in which.
- Secure Scalable coding and progressive encryption.
- Watermarking/steganography.
4. Threshold secret sharing.
5. Visual cryptography.
6. Encryption and compression.
7 I- frame coding and Sign scrambling.


Using these techniques we are trying to become our network (wireless sensor network) secure.
The presented results are an example of a distributed sensor network combining reasonable energy requirements with a relatively high level of intelligence in the paper. Sensor networks promise viable solutions to many monitoring problems. However, the practical deployment of sensor networks faces many challenges imposed by real-world demands. Sensor nodes often have limited computation and communication resources and Battery power. Moreover, in many applications sensors are deployed in open environments, and hence are vulnerable to physical attacks, potentially compromising the sensor’s cryptographic keys.
One of the basic and indispensable functionalities of sensor network is the ability to answer queries over the data acquired by the sensors. The resource constraints and security issues make designing mechanisms for information aggregation in large sensor networks particularly challenging.

Java Security Policies for network based Applications

Java Security Policies for network based Applications
Abstract:

Security is important in almost any application especially in those that are accessible to the network. This paper focus on the basic security policies to design network based application in Java.
Java provides the capability to specify a security policy for both Applets & application. This capability gives s/w developers a great deal of flexibility in the functionality that they can incorporate into their Applets & Applications. In this paper we introduce Java Security on the network & shortly describe The Sandbox Model. We focus on the Cryptography & Key In fracture & Security Extensions in Java, to communicate on the Network. The problem of mallious Applet & its solution is also discussed. A new mechanism for security- A Protection Domain is included with Advance technologies in new version of java for Network Security.

Cryptography

Cryptography
Abstract

Everyone has secrets; some have more than others. When it becomes necessary to transmit those secrets from one point to another, it’s important to protect the information while it’s in transit. There are many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting passwords. One essential aspect for secure communications is that of cryptography.
In the past, cryptography is heavily used for military applications to keep sensitive information secret from enemies.
Cryptography presents various methods for taking legible, readable data, and transforming it into unreadable data for the purpose of secure transmission, and then using a key to transform it back into readable data when it reaches its destination. The most secure techniques use a mathematical algorithm and a variable value known as a ‘key’. Cryptography uses a single key to encrypt i.e. changing data so that it is unrecognizable and useless to an unauthorized person and decrypt a message i.e. changing it back to its original form.
There are several ways of classifying cryptographic algorithms Secret Key Cryptography, which uses a single key for both encryption and decryption. Public Key Cryptography, which uses one key for encryption and another for decryption. Hash Functions uses a mathematical transformation to irreversibly “encrypt” information.
The goal of cryptography extends beyond merely making data unreadable; it also extends into user authentication, Privacy/confidentiality, Integrity, Non-repudiation.

Network Security

Network Security

Introduction

Network security is the process of preventing and detecting unauthorized use of your network. Prevention measures help you to stop unauthorized users (also known as “intruders”) from accessing any part of your computer system.
Detection helps you to determine whether or not someone attempted to break into your system, if they were successful, and what they may have done.

Need of Network Security :-
We use Network for everything from banking and investing to shopping and communicating with others through email or chat programs.
• Although you may not consider your communications “top secret,” you probably do not want strangers reading your email. using your computer to attack other systems, sending forged email
on your Network, or examining personal information stored on your Network.
• Protecting data from being read by unauthorized persons.
• Preventing unauthorized person from inserting or deleting messages.
• Verifying the sender of each message.

Security Technologies:-

With the rapid growth of interest in the Internet, network security has become a major concern to companies throughout the world. The fact that the information and tools needed to penetrate the security of corporate networks are widely available has increased that concern.
Because of this increased focus on network security, network administrators often spend more effort protecting their networks than on actual network setup and administration. So there are many security technologies which are generally used for security purposes.

Types of Network Security :-

• Fire-Wall
• Virtual Private Network
• Security Socket Layer
• Work Station Security
• Network Device Security
• Wireless Network Security
• Operating System Security
• Physical Security