lab manual b.sc. (ca)lab manual b.sc. (ca) semester - v department of computer science ccb-5p2:...
TRANSCRIPT
Lab Manual
B.Sc. (CA) SEMESTER - V
DEPARTMENT OF COMPUTER SCIENCE
CCB-5P2: SEMINAR PRESENTATION
ALIGARH MUSLIM UNIVERSITY ALIGARH
2018
Look forward,
learn modern
knowledge, and
do not waste
time in studies
of old subjects of
no values.
Lab Manual Design Committee:
Prof. Mohammad Ubaidullah Bokhari
Dr. Arman Rasool Faridi
Dr. Faisal Anwar
Dr. Aasim Zafar (Convener)
Editor:
Dr. Aasim Zafar
Design & Compilation:
Mr. S. K. Sharma
Second Edition: July 2018
Approved by BoS, Dated-……………………
Department of Computer Science
A.M.U., Aligarh, (U.P.), India
C r e d i t s
Lab Manual: Seminar Presentation (CCB-5P2)
Course Description
Content
Objectives
Outcomes
Rules and Regulations
Topics for 1st Presentation
Topics for 2nd and 3rd Presentation
Tips for Good Seminar Presentation
Appendix- I: Template for IEEE-paper format
Appendix- II: Template for the Index of Lab File
COURSE TITLE: Seminar Presentation COURSE CODE: CCB – 5P2
CREDIT: 2 PERIODS PER WEEK: 3
CONTINUOUS ASSESSMENT: 40 EXAMS: 60
COURSE DESCRIPTION
Application of classroom knowledge and skills in computer
science to develop research, technical writing and presentation skills.
CONTENT
This course consists of technical paper writing, which includes
planning, gathering relevant information, drafting, editing and
revising to quality standards, and, where appropriate, research
methods and appropriate citation of sources. Further, it helps in
preparing and organizing the seminar presentation using the
concepts of ordering and determining the central, main and
supporting ideas.
OBJECTIVES
To help students develop technical paper writing skill, which
includes planning, gathering relevant information, drafting,
editing and revising to quality standards, and, where
appropriate, research methods and appropriate citation of
sources.
To help students plan their seminar presentation by
determining audience needs, and defining presentation
purpose.
To help students plan and organize the presentation using the
concepts of ordering and determining the central, main and
supporting ideas.
To help students in writing the introduction and conclusion of
the presentation.
To help students identify the benefits and uses of multimedia
aids in enhancing the presentation.
Use effective verbal and non-verbal techniques when making
a presentation.
To help students effectively field questions and elicit
feedback from the audience.
To help students gain feedback from peers and the
mentor/teacher that will identify strengths and areas for
improvement.
OUTCOMES
Upon successful completion of this course students will be able to:
Effectively produce technical paper for communication and
seminar presentation.
Effectively design documents for presentation, printing and
other electronic means of communication in order to construct
documents meaningful to the audience.
Effectively use standard formats/templates to construct
meaningful documents.
Use multimedia items in effectively constructing meaning in
communication situations.
Effectively negotiate the process of completing technical
documents i.e. planning, drafting, editing and revising to
quality standards, and, where appropriate, research methods
and appropriate citation of sources.
Identify strengths and weaknesses.
RULES AND REGULATIONS
Students are required to strictly adhere to the following rules:
Students are required to give THREE presentations
individually during this course.
1st Presentation: Students may choose any topic of their
interest for giving first presentation.
2nd Presentation: Students are required to select any
topic out of a pool of topics given by the teacher. The
topics would be allotted on first-come-first serve basis.
3rd Presentation: Students will have to select anyone
topic out of given options related to their topic of 2nd
Presentation.
Deliverables: For all the three presentations, the students are
required to submit the hard and soft copies of the followings:
Synopsis /Abstract
Technical Paper (4-6 pages) in IEEE-paper format
(Appendix-I)
Presentation in PDF format
The same will be maintained in Lab File by the students in the
prescribed format (Appendix-II).
After finalizing the topic for presentation, the student needs to
get it registered to the teacher in-charge. The student would be
assigned a mentor, whom the students may consult and take
help from while preparing the synopsis/abstract, writing the
paper and finalizing the PPT.
The students are required to prepare Synopsis/Abstract of the
paper, and get it approved by the concerned mentor/teacher.
Once the Synopsis/Abstract is approved, the students are
required to write technical paper on the topic in continuous
guidance of the concerned mentor/teacher. Once the paper is
finalized and approved by the mentor/teacher concerned,
students would prepare PPT for presentation.
There will be Zero tolerance for plagiarism. Students will be
making extensive use of external references for their
paper/presentation, and should be vigilant in maintaining high
standards with regard to attribution and avoidance of
plagiarism. If there are questions about how to deal with any
such matters, the student should discuss the matter with the
teacher/mentor concerned to make sure there are no
misunderstandings.
All the resources used should properly be referenced in the
given format.
Students are advised to carry on all the activities, related to
three presentations, in parallel. For example, while working on
Presentation#1, you may finalize and register the topic(s) for
Presentation#2 and/or Presentation#3. Thereafter, relevant
resources/materials may be gathered and discussed with the
teacher concerned for timely start and completion of the Paper
writing and PPT preparation.
Presentation will be held as per notified schedule.
Attendance Policy: Attendance is vital for this class, since
discussions and regular oral presentations and progress
reports will have a strong impact on the ability to complete the
assigned task in time. You may be dropped from the course for
missing more than two consecutive scheduled meetings.
Late Policy: Late work will not be accepted. Make
arrangements with the teacher/mentor to turn in assigned
task/work early if you will not be in class on the due date.
At least TWO timely presentations along with all related
documents are compulsory; failing which students would not
be allowed to appear in the final exam or viva-voce for this
course.
Final Submission of Lab File: Lab File consisting of all the
deliverables are due on the last day of class before final week.
Evaluation would be done on the basis of :
Timely submission of Abstract/Paper/PPT (20%)
Quality and Originality of content (50%)
Presentation skills (30%)
TOPICS FOR 1ST PRESENTATION
Students may choose any topic of their interest related to Computer
Science, Information System, Information Technology and/or recent
developments in field of CS&IT for giving their first presentation. The
topics may be related to the followings, but not limited to:
3D Internet
3D Printing
3G-vs-WiFi
4G Technology
4G Wireless System
5 Pen PC Technology
5G Technology
5G Wireless Technology
Advanced Queue
Management Techniques
Advancement in inverter
technology for industrial
application
Agent Oriented Programming
Agile Methodology
Aircraft GPS Tracking
Ajax Technology
Anatomy and working of
search engines
Android
Android 7.0 Nougat features
Anti-HIV using nanorobots
Apache Hadoop introduction
AppleTalk
Application of Genetic
Algorithms in Network routing
Application of LED for
Domestic Applications
Application of microcontroller
in vehicle monitoring and
security system
Applications of Graph Theory
to Metabolic Pathways
Applications of Soft
Computing in Medical Image
Analysis
Aqua communication using
modem
ARQ Schemes for Wireless
Data Communications
Artificial Eye
Artificial immune system
Artificial Intelligence (AI)
Artificial intelligence
for speech recognition
Artificial Intelligence in
Machines
Artificial intelligence on
expert systems
Artificial Neural Network
(ANN)
Aspects of Database Security
and Program Security
Asynchronous Chips
Attacks on Smart Cards
Attendance Monitoring
Intelligent Classroom
Augmented Reality
Augmented Reality vs Virtual
Reality
Authentication and securing
the systems
Automated network address
assignment
Automatic Conveyor for
Industrial Automation
Automatic device driver
synthesis and verification
Automatic Mobile Recharger
Station
Automatic number plate
recognition
Automatic number plate
recognition
Automatic sound-based user
grouping for real-time online
forums
Automatic Video Surveillance
Systems
Autonomic Computing
Backup and Recovery
planning
Big Data
Biochips
Bio-computers/Bimolecular
Computers
Biomass gasifier for thermal
and electrical applications
Biomedical instrumentation
and signal analysis
Biometric Authentication
Technology
Biometric Security System
Biometrics-Based
Authentication
Blackberry Technology
Blue Brain
Blue Eyes Technology
Blue Gene
Blue ray Disc
Bluejacking
Bluetooth Technology
Brain Computer
Interface (BCI)
Brain port device
Brain-controlled car for
disabled using artificial
intelligence
Braingate technology
CAD/CAM
Carbon Nano Technology
Client Server Architecture
Cloud Computing
Cluster computing
Common Gateway Interface
(CGI)
Computer Forensics
Computer Networks
Computer Peripheral
Computer Virus
Concurrent Programming
and Parallel distributed O.S.
Conditional Access System
CORBA
Cross Platform Component
Object Model
Cryptography
Cryptography and Network
Security
Cyber Crime
Cyber Crime and Security
Daknet
Data Management in Sensor
Networks
Data Mining
Data Mining concepts & model
Data over Cable Service
(DOCSIS)
Data Storage On Fingernail
Data Warehousing
Database Management
System (DBMS)
Datagram Congestion Control
Protocol (DCCP)
Deploying a wireless sensor
network on an active volcano
Detection of digital photo
image forgery
Detection of Reviews using
sentiment analysis
Diamond Chip
Digital Cinema
Digital Jewellery
Digital Light Processing
Digital Signature
Digital Watermarking
Direct Memory Access (DMA)
Distributed Computing
Distributed denial-of-service
attack (DDoS)
Distributed Systems
DNA Computing
Domain Name System (DNS)
E-ball Technology
Embedded Systems
Enterprise Resource Planning
(ERP)
E-Paper Technology
Extreme Programming (EP)
FERROELECTRIC RAM
(FRAM)
Firewall
Free net
Futex
Generations of Computer
Genetic Engineering
Gi-Fi Technology
Google App Engine
Google Chrome OS
Google Glass
Google Wave
Graphics Processing Unit
(GPU)
Green Computing
Grid Computing
GSM (Global System for
Mobile Communications)
GSM Security And Encryption
Hadoop
History of Computers
Holographic Memory
HTML/XML
Human Computer Interface
Humanoid Robots
Image Processing
Indian Regional Navigation
Satellite System (IRNSS)
Interferometric Modulator
(IMOD)
Intrusion Detection Systems
(IDS)
Invisibility Cloaks
IP Spoofing
IP Telephony
iPad
iPhone
Java
Java Ring
Jini Technology
Kerberos
LAMP Technology
Linux Operating Systems
Login application in Java using
MVC architecture and MySQL
database
Meta Search Engine
Microsoft Surface
Middleware Technologies
Mind Reading
Mobile Computing
Mobile Jammer
Mobile Number Portability
(MNP)
Mobile Phone Cloning
Nanomaterials
Nanoparticles
Nanotechnology
Network Security
Network Topology
Night Vision Technology
Object Oriented
Programming (OOP)
Online Voting System
Online/Internet Marketing
Operating System
Optical Coherence
Tomography
Phishing
Pill Camera
Podcast
Polymer Memory
Project Loon
Quantum Computing
Random Access Memory
(RAM)
Restful Web Services
Robotics
Rover Technology
Satrack
SDLC (Software Development
life cycle)
Search Engine
Search Engine
Optimization(SEO)
Service Oriented Architecture
(SOA)
Sixth Sense Technology
Smart Fabrics
Smart Grid
Smart Memories
SNMP
Software Reuse
Software Testing
Space Mouse
Speech Processing
Speech Recognition
Steganography
Storage Area Network (SAN)
Tidal Energy
Tizen Operating System –
One OS for everything
Tripwire
Universal Serial Bus (USB)
UNIX Operating System
Virtual Private Network (VPN)
Virus and Anti Viruses
Voice over Internet Protocol
(VoIP)
Wearable Computing
Web Services on Mobile
Platform
Wibree
WIMAX
Wireless Application Protocol
Wireless Communication
Wireless Fidelity
Wireless Mesh Network
Wireless Sensor Networks
(WSN)
X-MAX Technology
Zigbee
TOPICS FOR 2ND & 3RD PRESENTATIONS
S.
No. TOPICS FOR 2nd
PRESENTATION
RELATED TOPICS FOR 3rd
PRESENTATION
1 Trends in e-Commerce and e-
Business
E-Government & E-Governance,
Health Service Management & E-
Health
Future Trends and Issues in e-
Learning
Security, Privacy and Trust for e-
Service
Enterprise Systems Security
2 Internet of Things
Internet of Things Security
Wireless Sensor Networks
Smartphone and Mobile Applications
Security
Security of Web-based Applications
and Services
Data Management in Sensor Networks
3 Network Security
Intrusion Detection and Prevention
Cryptography and Privacy
Ad-hoc Networks Security
Pretty Good Privacy (PGP) and Email
Security
4 Web Security
Social Network Security
Bluetooth Technology Security
SSL-The Secure Sockets Layer
Cyber Defense & Information
Technology
5 Information Hiding and Digital
Forensics
Wireless Network Security
Wireless Surveillance
Fraud and Cyber crime Control
Cyber Crime and Security
6 Information Retrieval
Web Search: Technical and Social
Issues
Web mining
Google Search Engine Algorithms
Hummingbird algorithm
Hyper-induced topic search
7 Grid & Cloud Computing
Cloud Computing Techniques for Big
Data
Grid and Cloud Applications Security
Cloud/Grid/Stream Data Mining- Big
Velocity Data
Fog Computing
8 Free and Open Software
Systems
IPR and Legal Implications in Open
Systems
Business Models & Strategies in Open
Systems
Innovation in Open Systems
Case studies of Open Systems
deployment and migration models
Big Data Open Platforms
9 Big Data Computing
Novel Theoretical Models for Big Data
New Computational Models for Big
Data
Data and Information Quality for Big
Data
New Data Standards
Big Data Applications in smart cities,
Healthcare and Transportation
10 Stream Computing for Big Data
High Performance/Parallel Computing
Platforms for Big Data
Energy-efficient Computing for Big
Data
Programming Models and
Environments for Cluster, Cloud, and
Grid Computing to Support Big Data
Software Techniques and
Architectures in Cloud/Grid/Stream
Computing
New Programming Models for Big
Data beyond Hadoop/MapReduce,
STORM
Software Systems to Support Big Data
Computing
11 Data Analytics and Visualization
Visualization Analytics for Big Data
Big Data Analytics in Small Business
Enterprises (SMEs),
Big Data Analytics and Metrics
12 Business Intelligence
Data Mining
Data Analytics Models
e-business and New Media
Future Trends and Issues in Data
Analytics
13 Machine Learning
Machine learning based on Big Data
Adaptive websites
Affective computing.
Bioinformatics
Cheminformatics
Computer vision, including object
recognition.
14 Infrastructure, Architecture and
Tools for e-Management
Innovative Models in e-Management
e-Payment Systems
Future Trends and Issues in e-
Management
Digital Waste/e-Waste Management
15 Technological details of RFID
System
Logistics, Transport and Traffic
Management
Inventory Management
RFID Security and Privacy
16 Mobile networking technologies
4G Broadband Technology
GSM and WCDMA
GSM Security And Encryption
Location Based Systems as Context-
aware Systems
18 Digital Signatures
Authentication protocols
Management of Public keys
Authentication and Digital Signatures
in Mobile Networks
19 Semantic Web
Ontologies and Semantic Web
Knowledge Representation in
Semantic Web
Semantic Web Applications
20 Business Process Re-
Engineering
Business Intelligence Tools &
Applications
Process modelling, management,
assessment and improvement
Infrastructure and processes for
iterative or incremental software
delivery
21 Image Processing
Neural and Evolutionary Computing
Speech Recognition
Machine Reading of Handwritten Texts
22 Artificial Intelligence
Driverless cars
Intelligent computer games
Recommender systems
23 Imperative programming
languages
Visual programming
Languages for mobiles
Animation
24 Wireless media/network
Li-Fi
5G technology
Satellites
25 Computer Multimedia
3D printing
Virtual reality
Social networking
26 Robotics
Google glass
Wearable computer
Blue brain
27 Computers in Agriculture Sector
GPS
Remote sensing
Radar
Weather forecasting
28 Social networking
Sentiment analysis
Social media optimization
Social media marketing
29 Artificial neural network
Supervised recurrent network
Unsupervised self-organizing map
Swarm Intelligence
30 Support Vector Machine
Behaviour of various Kernels
Non-binary classification using SVM
SVM Applications
31 Parallel computing
Parallel Computer Architecture -
Models
Parallel Computing Applications
High Performance Computing
32 Social Network Analysis
Physiological analysis of social
networking
Opinion mining
Social Network Analytics
33 Programming paradigm
Software Architecture Patterns
MVC architecture
Agile and Component-based software
development methods
Aspect-oriented and Mashup software
development methods
34 Remote Sensing Geo-informatics
Spectral Imaging
Remote Sensing Applications
35 Algorithmic paradigms
Approximation algorithm
Metaheuristic algorithm
Dynamic Programming
Greedy Method
36 Bioinformatics
Docking Algorithms
Molecular Evolution
Computational Intelligence Techniques
in Bioinformatics
37 Quantum Computing
Quantum Algorithms
Quantum Complexity
Quantum Information Theory
Spin-based Quantum Information
processing
Optical Quantum
Information Processing
Quantum Cryptography
38 Cognitive Science
Systems Neuroscience
Cellular/Molecular neuroscience
Brain Research
Collective Intelligence
Human Cognition Information
Processing
(Cognitive Processing)
Multiple Intelligences
Biologically-Inspired Computer Vision
39 Supercomputers TOP500 Supercomputers
GREEN500 Supercomputers
GRAPH500 Supercomputers
40 Theory of Computation
Algorithmic algebra
Approximation algorithms
Coding theory
Combinatorial geometry
Computational geometry
Computational topology
Randomized algorithms
41 Continuous and Discrete
optimization
Network optimization
Integer programming
Combinatorial optimization
Matroid theory
Stochastic optimization
Portfolio optimization
42 Web of Things
Embedded Web Resources
Ubiquitous computing
Distributed systems
Cyber-physical systems
Pervasive computing
Embedded systems
43 Simulation and Modeling
Multi-resolution Modeling
Agent Based Modeling
Modeling and Simulation techniques
44 Cyber Law and Ethics
Cyber Forensic
Cyber Law and Crime
Cyberethics
Intellectual property rights
Digital rights management (DRM)
Accessibility, censorship and filtering
45 Expert systems
Knowledge management System
Knowledge Discovery
Intelligent Decision Support Systems
46 Human Computer Interaction
Gesture Recognition
Input Devices and Interaction
Techniques for Advanced Computing
Gestural Input
New Human-Computer Interaction
Techniques
47 Natural Language Processing
Text Mining
Detecting and Extracting Events
Interactive Learning for Semantic
Parsing
48 Computer Forensic
Cyber Crime and Cyber Security
Cyber Forensic
Security Vulnerabilities
Ethical Hacking
49 Context-aware Systems
Context-aware Security
Context-aware mobile computing
Context-aware Search
50 Advanced Graphics and
Computer Games
Photorealism - the future of video
game visuals
Virtual Reality
Augmented Reality
Games in e-learning
TIPS FOR GOOD SEMINAR PRESENTATION
Preparation
Attend some presentations by others and write a report on
each of the presentations you attended. Pay extra attention
to what impressed you and what did not. Share the report
with your mentor.
Think of an important and interesting topic for your own
presentation. It should be compatible with the level of the
audience.
Before the presentation, try to familiarize yourself with the
room, the computer system, laser pointers etc.
Organization
Title- should not be too long and should not contain
acronyms that many people may not be familiar with. It
should provide a glimpse into your presentation in a short
sentence.
Your name, affiliation and position, email address
Outline
Main body of the presentation. Do not make the slides too
crowded. Make the first couple of slides fairly easy. It will
help ease the early nervousness.
Conclusions
Delivery Style
Say a few words to thank the organizers for the opportunity
to make a presentation.
Use computer presentation.
Do not use too many colors or too much technology.
Generally three colors are ideal.
Use graphs and illustrations.
Maintain a level of professionalism. Do not try to be too
informal.
Do not stretch the presentation beyond the allotted time.
Allow audience time to ask questions. In fact you should
invite questions.
Mannerism
Dress professionally.
Do not use lazy posture.
Maintain eye contact with all sections of the audience.
Do not show irritation with any question from the audience.
Remain polite.
If you do not know the answer to a question, do not try to pretend that
you know it. Say something like “I have not thought about it”.
APPENDIX-I
Template for IEEE-paper format
You may use any of the below given samples of IEEE-paper format
for preparation of your technical paper.
https://www.ieee.org/documents/trans_jour.docx
www.amity.edu/aiit/icrito2013/ieee-format.doc
https://www.ieee.org/documents/Transmag.doc
APPENDIX-II
Template for the Index of Lab File
S.
NO. ACITIVITIES
SCHEDULED
DATE
DATE OF
SUBMISSION
SIGNATURE
OF THE
TEACHER
REMARKS
1.
PRESENTATION #1
TOPIC:
AC
TIV
IT
IES
Topic Registration
Abstract
Submission
Paper Submission
Presentation
2.
PRESENTATION #2
TOPIC:
AC
TIV
IT
IES
Topic Registration
Abstract
Submission
Paper Submission
Presentation
3.
PRESENTATION #3
TOPIC:
AC
TIV
IT
IES
Topic Registration
Abstract
Submission
Paper Submission
Presentation
Department of Computer Science
Aligarh Muslim University Aligarh