laboratory manuallab manual/ccb–5p2/docs-amu page 3 u sd lab manual: seminar presentation...
Post on 25-May-2020
1 Views
Preview:
TRANSCRIPT
Laboratory Manual B. Sc. (Hons.) Computer Application
V Semester
Seminar Presentation: CCB – 5P2
Department of Computer Science Aligarh Muslim University, Aligarh
LAB MANUAL/CCB–5P2/DoCS-AMU Page 2 A
MU
AM
U
CS
D
Credits
Lab Manual Design Committee:
Prof. Mohammad Ubaidullah Bokhari
Dr. Arman Rasool Faridi
Dr. Faisal Anwar
Dr. Aasim Zafar (Convener)
The Committee thankfully acknowledges the efforts and contributions of
the following teachers:
Dr. Mohammad Sajid
Dr. Mohammad Nadeem
Design & Compilation:
Mr. Sunil Kumar Sharma
First Edition: July 2017
Approved by BoS, Dated– 31/07/2017
Department of Computer Science, A.M.U., Aligarh, (U.P.), India
LAB MANUAL/CCB–5P2/DoCS-AMU Page 3 A
MU
AM
U
CS
D
Lab Manual: Seminar Presentation (CCB-5P2)
Course Description 4
Content 4
Objectives 4
Outcomes 5
Rules and Regulations 6
Topics for 1st Presentation 9
Topics for 2nd
and 3rd
Presentation 15
Tips for Good Seminar Presentation 25
Appendix- I: Template for IEEE-paper format 27
Appendix- II: Template for the Index of Lab File 28
LAB MANUAL/CCB–5P2/DoCS-AMU Page 4 A
MU
AM
U
CS
D
COURSE TITLE: Seminar Presentation COURSE CODE: CCB – 5P2
CREDIT: 2 PERIODS PER WEEK: 3
CONTINUOUS ASSESSMENT: 40 EXAM: 60
COURSE DESCRIPTION
Application of classroom knowledge and skills in computer science to
develop research, technical writing and presentation skills.
CONTENT
This course consists of technical paper writing, which includes planning,
gathering relevant information, drafting, editing and revising to quality
standards, and, where appropriate, research methods and appropriate
citation of sources. Further, it helps in preparing and organizing the
seminar presentation using the concepts of ordering and determining
the central, main and supporting ideas.
OBJECTIVES
To help students develop technical paper writing skill, which
includes planning, gathering relevant information, drafting, editing
and revising to quality standards, and, where appropriate,
research methods and appropriate citation of sources.
To help students plan their seminar presentation by determining
audience needs, and defining presentation purpose.
To help students plan and organize the presentation using the
concepts of ordering and determining the central, main and
supporting ideas.
To help students in writing the introduction and conclusion of the
presentation.
LAB MANUAL/CCB–5P2/DoCS-AMU Page 5 A
MU
AM
U
CS
D
To help students identify the benefits and uses of multimedia aids
in enhancing the presentation.
Use effective verbal and non-verbal techniques when making a
presentation.
To help students effectively field questions and elicit feedback
from the audience.
To help students gain feedback from peers and the
mentor/teacher that will identify strengths and areas for
improvement.
OUTCOMES
After completing this course, the students will be able to:
Effectively produce technical paper for communication and
seminar presentation.
Effectively design documents for presentation, printing and other
electronic means of communication in order to construct
documents meaningful to the audience.
Effectively use standard formats/templates to construct meaningful
documents.
Use multimedia items in effectively constructing meaning in
communication situations.
Effectively negotiate the process of completing technical
documents i.e. planning, drafting, editing and revising to quality
standards, and, where appropriate, research methods and
appropriate citation of sources.
Identify strengths and weaknesses.
LAB MANUAL/CCB–5P2/DoCS-AMU Page 6 A
MU
AM
U
CS
D
RULES AND REGULATIONS
Students are required to strictly adhere to the following rules:
Students are required to give THREE presentations individually
during this course.
1st Presentation: Students may choose any topic of their
interest for giving first presentation.
2nd Presentation: Students are required to select any topic
out of a pool of topics given by the teacher. The topics would
be allotted on first-come-first serve basis.
3rd Presentation: Students will have to select anyone topic
out of given options related to their topic of 2nd Presentation.
Deliverables: For all the three presentations, the students are
required to submit the hard and soft copies of the followings:
Synopsis /Abstract
Technical Paper (4-6 pages) in IEEE-paper format (Appendix-I)
Presentation in PDF format
The same will be maintained in Lab File by the students in the
prescribed format (Appendix-II).
After finalizing the topic for presentation, the student needs to get
it registered to the teacher in-charge. The student would be
assigned a mentor, whom the students may consult and take help
from while preparing the synopsis/abstract, writing the paper and
finalizing the PPT.
The students are required to prepare Synopsis/Abstract of the
paper, and get it approved by the concerned mentor/teacher.
LAB MANUAL/CCB–5P2/DoCS-AMU Page 7 A
MU
AM
U
CS
D
Once the Synopsis/Abstract is approved, the students are required
to write technical paper on the topic in continuous guidance of the
concerned mentor/teacher. Once the paper is finalized and
approved by the mentor/teacher concerned, students would
prepare PPT for presentation.
There will be Zero tolerance for plagiarism. Students will be
making extensive use of external references for their
paper/presentation, and should be vigilant in maintaining high
standards with regard to attribution and avoidance of plagiarism. If
there are questions about how to deal with any such matters, the
student should discuss the matter with the teacher/mentor
concerned to make sure there are no misunderstandings.
All the resources used should properly be referenced in the given
format.
Students are advised to carry on all the activities, related to three
presentations, in parallel. For example, while working on
Presentation#1, you may finalize and register the topic(s) for
Presentation#2 and/or Presentation#3. Thereafter, relevant
resources/materials may be gathered and discussed with the
teacher concerned for timely start and completion of the Paper
writing and PPT preparation.
Presentation will be held as per notified schedule.
Attendance Policy: Attendance is vital for this class, since
discussions and regular oral presentations and progress reports
will have a strong impact on the ability to complete the assigned
task in time. You may be dropped from the course for missing
more than two consecutive scheduled meetings.
LAB MANUAL/CCB–5P2/DoCS-AMU Page 8 A
MU
AM
U
CS
D
Late Policy: Late work will not be accepted. Make arrangements
with the teacher/mentor to turn in assigned task/work early if you
will not be in class on the due date.
At least TWO timely presentations along with all related
documents are compulsory; failing which students would not be
allowed to appear in the final exam or viva-voce for this course.
Final Submission of Lab File: Lab File consisting of all the
deliverables are due on the last day of class before final week.
Evaluation would be done on the basis of :
Timely submission of Abstract/Paper/PPT (20%)
Quality and Originality of content (50%)
Presentation skills (30%)
LAB MANUAL/CCB–5P2/DoCS-AMU Page 9 A
MU
AM
U
CS
D
TOPICS FOR 1ST
PRESENTATION
Students may choose any topic of their interest related to Computer
Science, Information System, Information Technology and/or recent
developments in field of CS&IT for giving their first presentation. The
topics may be related to the followings, but not limited to:
3D Internet
3D Printing
3G-vs-WiFi
4G Technology
4G Wireless System
5 Pen PC Technology
5G Technology
5G Wireless Technology
Advanced Queue Management
Techniques
Advancement in inverter technology
for industrial application
Agent Oriented Programming
Agile Methodology
Aircraft GPS Tracking
Ajax Technology
Anatomy and working of search
engines
Android
Android 7.0 Nougat features
Anti-HIV using nanorobots
Apache Hadoop introduction
AppleTalk
Application of Genetic Algorithms in
Network routing
Application of LED for Domestic
Applications
Application of microcontroller in
vehicle monitoring and security
system
Applications of Graph Theory to
Metabolic Pathways
Applications of Soft Computing in
Medical Image Analysis
Aqua communication using modem
ARQ Schemes for Wireless Data
Communications
Artificial Eye
Artificial immune system
Artificial Intelligence (AI)
Artificial intelligence for speech
recognition
Artificial Intelligence in Machines
Artificial intelligence on expert
systems
LAB MANUAL/CCB–5P2/DoCS-AMU Page 10 A
MU
AM
U
CS
D
Artificial Neural Network (ANN)
Aspects of Database Security and
Program Security
Asynchronous Chips
Attacks on Smart Cards
Attendance Monitoring Intelligent
Classroom
Augmented Reality
Augmented Reality vs Virtual Reality
Authentication and securing the
systems
Automated network address
assignment
Automatic Conveyor for Industrial
Automation
Automatic device driver synthesis and
verification
Automatic Mobile Recharger Station
Automatic number plate recognition
Automatic number plate recognition
Automatic sound-based user grouping
for real-time online forums
Automatic Video Surveillance
Systems
Autonomic Computing
Backup and Recovery planning
Big Data
Biochips
Bio-computers/Bimolecular Computers
Biomass gasifier for thermal and
electrical applications
Biomedical instrumentation and signal
analysis
Biometric Authentication Technology
Biometric Security System
Biometrics-Based Authentication
Blackberry Technology
Blue Brain
Blue Eyes Technology
Blue Gene
Blue ray Disc
Bluejacking
Bluetooth Technology
Brain Computer Interface (BCI)
Brain port device
Brain-controlled car for disabled using
artificial intelligence
Braingate technology
CAD/CAM
Carbon Nano Technology
Client Server Architecture
Cloud Computing
Cluster computing
Common Gateway Interface (CGI)
LAB MANUAL/CCB–5P2/DoCS-AMU Page 11 A
MU
AM
U
CS
D
Computer Forensics
Computer Networks
Computer Peripheral
Computer Virus
Concurrent Programming
and Parallel distributed O.S.
Conditional Access System
CORBA
Cross Platform Component Object
Model
Cryptography
Cryptography and Network Security
Cyber Crime
Cyber Crime and Security
Daknet
Data Management in Sensor
Networks
Data Mining
Data Mining concepts & model
Data over Cable Service (DOCSIS)
Data Storage On Fingernail
Data Warehousing
Database Management System
(DBMS)
Datagram Congestion Control
Protocol (DCCP)
Deploying a wireless sensor network
on an active volcano
Detection of digital photo image
forgery
Detection of Reviews using sentiment
analysis
Diamond Chip
Digital Cinema
Digital Jewellery
Digital Light Processing
Digital Signature
Digital Watermarking
Direct Memory Access (DMA)
Distributed Computing
Distributed denial-of-service attack
(DDoS)
Distributed Systems
DNA Computing
Domain Name System (DNS)
E-ball Technology
Embedded Systems
Enterprise Resource Planning (ERP)
E-Paper Technology
Extreme Programming (EP)
FERROELECTRIC RAM (FRAM)
Firewall
Free net
LAB MANUAL/CCB–5P2/DoCS-AMU Page 12 A
MU
AM
U
CS
D
Futex
Generations of Computer
Genetic Engineering
Gi-Fi Technology
Google App Engine
Google Chrome OS
Google Glass
Google Wave
Graphics Processing Unit (GPU)
Green Computing
Grid Computing
GSM (Global System for Mobile
Communications)
GSM Security And Encryption
Hadoop
History of Computers
Holographic Memory
HTML/XML
Human Computer Interface
Humanoid Robots
Image Processing
Indian Regional Navigation Satellite
System (IRNSS)
Interferometric Modulator (IMOD)
Intrusion Detection Systems (IDS)
Invisibility Cloaks
IP Spoofing
IP Telephony
iPad
iPhone
Java
Java Ring
Jini Technology
Kerberos
LAMP Technology
Linux Operating Systems
Login application in Java using MVC
architecture and MySQL database
Meta Search Engine
Microsoft Surface
Middleware Technologies
Mind Reading
Mobile Computing
Mobile Jammer
Mobile Number Portability (MNP)
Mobile Phone Cloning
Nanomaterials
Nanoparticles
Nanotechnology
Network Security
Network Topology
LAB MANUAL/CCB–5P2/DoCS-AMU Page 13 A
MU
AM
U
CS
D
Night Vision Technology
Object Oriented Programming (OOP)
Online Voting System
Online/Internet Marketing
Operating System
Optical Coherence Tomography
Phishing
Pill Camera
Podcast
Polymer Memory
Project Loon
Quantum Computing
Random Access Memory (RAM)
Restful Web Services
Robotics
Rover Technology
Satrack
SDLC (Software Development life
cycle)
Search Engine
Search Engine Optimization(SEO)
Service Oriented Architecture (SOA)
Sixth Sense Technology
Smart Fabrics
Smart Grid
Smart Memories
SNMP
Software Reuse
Software Testing
Space Mouse
Speech Processing
Speech Recognition
Steganography
Storage Area Network (SAN)
Tidal Energy
Tizen Operating System – One OS
for everything
Tripwire
Universal Serial Bus (USB)
UNIX Operating System
Virtual Private Network (VPN)
Virus and Anti Viruses
Voice over Internet Protocol (VoIP)
Wearable Computing
Web Services on Mobile Platform
Wibree
WIMAX
Wireless Application Protocol
Wireless Communication
Wireless Fidelity
LAB MANUAL/CCB–5P2/DoCS-AMU Page 14 A
MU
AM
U
CS
D
Wireless Mesh Network
Wireless Sensor Networks (WSN)
X-MAX Technology
Zigbee
LAB MANUAL/CCB–5P2/DoCS-AMU Page 15 A
MU
AM
U
CS
D
TOPICS FOR 2ND
& 3RD
PRESENTATION
S.
No. TOPICS FOR 2nd
PRESENTATION
RELATED TOPICS FOR 3rd
PRESENTATION
1 Trends in e-Commerce and e-
Business
E-Government & E-Governance,
Health Service Management & E-
Health
Future Trends and Issues in e-
Learning
Security, Privacy and Trust for e-
Service
Enterprise Systems Security
2 Internet of Things
Internet of Things Security
Wireless Sensor Networks
Smartphone and Mobile Applications
Security
Security of Web-based Applications
and Services
Data Management in Sensor
Networks
3 Network Security
Intrusion Detection and Prevention
Cryptography and Privacy
Ad-hoc Networks Security
Pretty Good Privacy (PGP) and Email
Security
4 Web Security Social Network Security
Bluetooth Technology Security
LAB MANUAL/CCB–5P2/DoCS-AMU Page 16 A
MU
AM
U
CS
D
SSL-The Secure Sockets Layer
Cyber Defense & Information
Technology
5 Information Hiding and Digital
Forensics
Wireless Network Security
Wireless Surveillance
Fraud and Cyber crime Control
Cyber Crime and Security
6 Information Retrieval
Web Search: Technical and Social
Issues
Web mining
Google Search Engine Algorithms
Hummingbird algorithm
Hyper-induced topic search
7 Grid & Cloud Computing
Cloud Computing Techniques for Big
Data
Grid and Cloud Applications Security
Cloud/Grid/Stream Data Mining- Big
Velocity Data
Fog Computing
8 Free and Open Software
Systems
IPR and Legal Implications in Open
Systems
Business Models & Strategies in Open
Systems
Innovation in Open Systems
Case studies of Open Systems
deployment and migration models
LAB MANUAL/CCB–5P2/DoCS-AMU Page 17 A
MU
AM
U
CS
D
Big Data Open Platforms
9 Big Data Computing
Novel Theoretical Models for Big Data
New Computational Models for Big
Data
Data and Information Quality for Big
Data
New Data Standards
Big Data Applications in smart cities,
Healthcare and Transportation
10 Stream Computing for Big Data
High Performance/Parallel
Computing Platforms for Big Data
Energy-efficient Computing for Big
Data
Programming Models and
Environments for Cluster, Cloud, and
Grid Computing to Support Big Data
Software Techniques and
Architectures in Cloud/Grid/Stream
Computing
New Programming Models for Big
Data beyond Hadoop/MapReduce,
STORM
Software Systems to Support Big Data
Computing
11 Data Analytics and
Visualization
Visualization Analytics for Big Data
Big Data Analytics in Small Business
Enterprises (SMEs),
Big Data Analytics and Metrics
LAB MANUAL/CCB–5P2/DoCS-AMU Page 18 A
MU
AM
U
CS
D
12 Business Intelligence
Data Mining
Data Analytics Models
e-business and New Media
Future Trends and Issues in Data
Analytics
13 Machine Learning
Machine learning based on Big Data
Adaptive websites
Affective computing.
Bioinformatics
Cheminformatics
Computer vision, including object
recognition.
14 Infrastructure, Architecture and
Tools for e-Management
Innovative Models in e-Management
e-Payment Systems
Future Trends and Issues in e-
Management
Digital Waste/e-Waste Management
15 Technological details of RFID
System
Logistics, Transport and Traffic
Management
Inventory Management
RFID Security and Privacy
16 Mobile networking technologies
4G Broadband Technology
GSM and WCDMA
GSM Security And Encryption
Location Based Systems as Context-
aware Systems
LAB MANUAL/CCB–5P2/DoCS-AMU Page 19 A
MU
AM
U
CS
D
18 Digital Signatures
Authentication protocols
Management of Public keys
Authentication and Digital Signatures
in Mobile Networks
19 Semantic Web
Ontologies and Semantic Web
Knowledge Representation in
Semantic Web
Semantic Web Applications
20 Business Process Re-
Engineering
Business Intelligence Tools &
Applications
Process modelling, management,
assessment and improvement
Infrastructure and processes for
iterative or incremental software
delivery
21 Image Processing
Neural and Evolutionary Computing
Speech Recognition
Machine Reading of Handwritten
Texts
22 Artificial Intelligence
Driverless cars
Intelligent computer games
Recommender systems
23 Imperative programming
languages
Visual programming
Languages for mobiles
LAB MANUAL/CCB–5P2/DoCS-AMU Page 20 A
MU
AM
U
CS
D
Animation
24 Wireless media/network
Li-Fi
5G technology
Satellites
25 Computer Multimedia
3D printing
Virtual reality
Social networking
26 Robotics
Google glass
Wearable computer
Blue brain
27 Computers in Agriculture Sector
GPS
Remote sensing
Radar
Weather forecasting
28 Social networking
Sentiment analysis
Social media optimization
Social media marketing
29 Artificial neural network
Supervised recurrent network
Unsupervised self-organizing map
Swarm Intelligence
30 Support Vector Machine Behaviour of various Kernels
Non-binary classification using SVM
LAB MANUAL/CCB–5P2/DoCS-AMU Page 21 A
MU
AM
U
CS
D
SVM Applications
31 Parallel computing
Parallel Computer Architecture -
Models
Parallel Computing Applications
High Performance Computing
32 Social Network Analysis
Physiological analysis of social
networking
Opinion mining
Social Network Analytics
33 Programming paradigm
Software Architecture Patterns
MVC architecture
Agile and Component-based software
development methods
Aspect-oriented and Mashup software
development methods
34 Remote Sensing
Geo-informatics
Spectral Imaging
Remote Sensing Applications
35 Algorithmic paradigms
Approximation algorithm
Metaheuristic algorithm
Dynamic Programming
Greedy Method
36 Bioinformatics Docking Algorithms
Molecular Evolution
LAB MANUAL/CCB–5P2/DoCS-AMU Page 22 A
MU
AM
U
CS
D
Computational Intelligence
Techniques in Bioinformatics
37 Quantum Computing
Quantum Algorithms
Quantum Complexity
Quantum Information Theory
Spin-based Quantum Information
processing
Optical Quantum
Information Processing
Quantum Cryptography
38 Cognitive Science
Systems Neuroscience
Cellular/Molecular neuroscience
Brain Research
Collective Intelligence
Human Cognition Information
Processing
(Cognitive Processing)
Multiple Intelligences
Biologically-Inspired Computer Vision
39 Supercomputers
TOP500 Supercomputers
GREEN500 Supercomputers
GRAPH500 Supercomputers
40 Theory of Computation
Algorithmic algebra
Approximation algorithms
Coding theory
Combinatorial geometry
Computational geometry
LAB MANUAL/CCB–5P2/DoCS-AMU Page 23 A
MU
AM
U
CS
D
Computational topology
Randomized algorithms
41 Continuous and Discrete
optimization
Network optimization
Integer programming
Combinatorial optimization
Matroid theory
Stochastic optimization
Portfolio optimization
42 Web of Things
Embedded Web Resources
Ubiquitous computing
Distributed systems
Cyber-physical systems
Pervasive computing
Embedded systems
43 Simulation and Modeling
Multi-resolution Modeling
Agent Based Modeling
Modeling and Simulation techniques
44 Cyber Law and Ethics
Cyber Forensic
Cyber Law and Crime
Cyberethics
Intellectual property rights
Digital rights management (DRM)
Accessibility, censorship and filtering
45 Expert systems Knowledge management System
Knowledge Discovery
LAB MANUAL/CCB–5P2/DoCS-AMU Page 24 A
MU
AM
U
CS
D
Intelligent Decision Support Systems
46 Human Computer Interaction
Gesture Recognition
Input Devices and Interaction
Techniques for Advanced Computing
Gestural Input
New Human-Computer Interaction
Techniques
47 Natural Language Processing
Text Mining
Detecting and Extracting Events
Interactive Learning for Semantic
Parsing
48 Computer Forensic
Cyber Crime and Cyber Security
Cyber Forensic
Security Vulnerabilities
Ethical Hacking
49 Context-aware Systems
Context-aware Security
Context-aware mobile computing
Context-aware Search
50 Advanced Graphics and
Computer Games
Photorealism - the future of video
game visuals
Virtual Reality
Augmented Reality
Games in e-learning
LAB MANUAL/CCB–5P2/DoCS-AMU Page 25 A
MU
AM
U
CS
D
TIPS FOR GOOD SEMINAR PRESENTATION
Preparation
Attend some presentations by others and write a report on
each of the presentations you attended. Pay extra attention
to what impressed you and what did not. Share the report
with your mentor.
Think of an important and interesting topic for your own
presentation. It should be compatible with the level of the
audience.
Before the presentation, try to familiarize yourself with the
room, the computer system, laser pointers etc.
Organization
Title- should not be too long and should not contain
acronyms that many people may not be familiar with. It
should provide a glimpse into your presentation in a short
sentence.
Your name, affiliation and position, email address
Outline
Main body of the presentation. Do not make the slides too
crowded. Make the first couple of slides fairly easy. It will
help ease the early nervousness.
Conclusions
Delivery Style
Say a few words to thank the organizers for the opportunity
to make a presentation.
Use computer presentation.
LAB MANUAL/CCB–5P2/DoCS-AMU Page 26 A
MU
AM
U
CS
D
Do not use too many colors or too much technology.
Generally three colors are ideal.
Use graphs and illustrations.
Maintain a level of professionalism. Do not try to be too
informal.
Do not stretch the presentation beyond the allotted time.
Allow audience time to ask questions. In fact you should
invite questions.
Mannerism
Dress professionally.
Do not use lazy posture.
Maintain eye contact with all sections of the audience.
Do not show irritation with any question from the audience.
Remain polite.
If you do not know the answer to a question, do not try to
pretend that you know it. Say something like “I have not
thought about it”.
LAB MANUAL/CCB–5P2/DoCS-AMU Page 27 A
MU
AM
U
CS
D
APPENDIX-I
Template for IEEE-paper format
You may use any of the below given samples of IEEE-paper
format for preparation of your technical paper.
https://www.ieee.org/documents/trans_jour.docx
www.amity.edu/aiit/icrito2013/ieee-format.doc
https://www.ieee.org/documents/Transmag.doc
LAB MANUAL/CCB–5P2/DoCS-AMU Page 28 A
MU
AM
U
CS
D
APPENDIX-II
Template for the Index of Lab File
S.
NO. ACITIVITIES
SCHEDULED
DATE
DATE OF
SUBMISSION
SIGNATURE
OF THE
TEACHER
REMARKS
1.
PRESENTATION #1
TOPIC:
AC
TIV
ITIE
S Topic Registration
Abstract Submission
Paper Submission
Presentation
2.
PRESENTATION #2
TOPIC:
AC
TIV
ITIE
S Topic Registration
Abstract Submission
Paper Submission
Presentation
3.
PRESENTATION #3
TOPIC:
AC
TIV
ITIE
S Topic Registration
Abstract Submission
Paper Submission
Presentation
top related