Model checking for Securing E-commerce transaction

ABSTRACT

The rapid growth of electronic commerce (e-commerce) has necessitated the development of e-commerce protocols. These protocols ensure the confidentiality and integrity of information exchanged. In addition, researchers have identified other desirable properties, such as, money atomicity, goods atomicity and validated receipt that must be satisfied by e-commerce protocols. This seminar shows how model checking can be used to obtain an assurance about the existence of these properties in an e-commerce protocol. It is essential that these desirable properties be satisfied, even in the presence of site or communication failure. Using the model checker we evaluate which failures cause the violation of one or more of the properties. The results of the analysis are then used to propose a mechanism that handles the failures to make the protocol failure resilient.

If you are you interested in this seminar topic, mail to us to get

the full report * of the seminar topic.

Mail ID: - contact4seminars@gmail.com 

* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)

Advertisements

What Networking of Information Can Do for Cloud Computing

ABSTRACT

Cloud computing is making it possible to separate the process of building an infrastructure for service provisioning from the business of providing end user services. Today, such infrastructures are normally provided in large data centers and the applications are executed remotely from the users. One reason for this is that cloud computing requires a reasonably stable infrastructure and networking environment, largely due to management reasons. Networking of Information (NetInf) is an information centric networking paradigm that can support cloud computing by providing new possibilities for network transport and storage. It offers direct access to information objects through a simple API, independent of their location in the network. This abstraction can hide much of the complexity of storage and network transport systems that cloud computing today has to deal with. In this paper we analyze how cloud computing and NetInf can be combined to make cloud computing infrastructures easier to manage, and potentially enable deployment in smaller and more dynamic networking environments. NetInf should thus be understood as an enhancement to the infrastructure for cloud computing rather than a change to cloud computing technology as such. To illustrate the approach taken by NetInf, we also describe how it can be implemented by introducing a specific name resolution and routing mechanism.

If you are you interested in this seminar topic, mail to us to get

the full report * of the seminar topic.

Mail ID: - contact4seminars@gmail.com 

* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)

PILL CAMERA

ABSTRACT

The aim of technology is to make products in a large scale for cheaper prices and increased quality. The current technologies have attained a part of it, but the manufacturing technology is at macro level. The future lies in manufacturing product right from the molecular level. Research in this direction started way back in eighties. At that time manufacturing at molecular and atomic level was laughed about. But due to advent of nanotecnlogy we have realized it to a certain level. One such product manufactured is PILL CAMERA, which is used for the treatment of cancer, ulcer and anemia. It has made revolution in the field of medicine.

This tiny capsule can pass through our body, without causing any harm.

It takes pictures of our intestine and transmits the same to the receiver of the Computer analysis of our digestive system. This process can help in tracking any kind of disease related to digestive system. Also we have discussed the drawbacks of PILL CAMERA and how these drawbacks can be overcome using Grain sized motor and bi-directional wireless telemetry capsule .Besides this we have reviewed the process of manufacturing products using nanotechnology.

Some other important applications are also discussed along with their potential

impacts on various fields.

If you are you interested in this seminar topic, mail to us to get

the full report * of the seminar topic.

Mail ID: - contact4seminars@gmail.com 

* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)

Image Compression Using Wedgelets

ABSTRACT

Images typically contain strong geometric features, such as edges, that impose a structure on pixel values and wavelet coefficients. Modeling the joint coherent behavior of wavelet coefficients is difficult, and standard image coders fail to fully exploit this geometric regularity. i.e. Most wavelet-based image coders fail to model the joint coherent behavior of wavelet coefficients near edges. Wedgelet is introduced as a geometric tool for image compression. Wedgelets offer a convenient parameterization for the edges in an image, Wedgelets offer piecewiselinear approximations of edge contours and can be efficiently encoded.

If you are you interested in this seminar topic, mail to us to get

the full report * of the seminar topic.

Mail ID: - contact4seminars@gmail.com 

* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)

Multi Touch

ABSTRACT


Multi-touch technology is an advanced human-computer interaction technique that recognizes multiple touch points and also includes the hardware devices that implement it, which allow users to compute without conventional input devices . Multi-touch consists of a touch screen (screen, table, wall, etc.) or touchpad, as well as a software that recognizes multiple simultaneous touch points, as opposed to the standard touch screen which recognizes only one touch point at a time.
Multi touch using Frustrated Total Internal Reflection is a simple, inexpensive, and scalable technique for enabling high-resolution multi touch sensing on rear-projected interactive surfaces. Different applications for multi-touch interfaces both exist and are being proposed. Some uses are individualistic e.g. iPhone, iPod touch, MacBook Pro, MacBook Air. The use of multi-touch technology is expected to rapidly become common place.



If you are you interested in this seminar topic, mail to us to get
the full report * of the seminar topic.
Mail ID: - contact4seminars@gmail.com
* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)



Robotic Surgery

ABSTRACT


The field of surgery is entering a time of great change, spurred on by remarkable recent advances in surgical and computer technology. Only recently have robotic systems made their way into the operating room as dexterity-enhancing surgical assistants and surgical planners, in answer to surgeons’ demands for ways to overcome the surgical limitations of minimally invasive laparoscopic surgery.
The first generation of surgical robots is already being installed in a number of operating rooms around the world. These aren’t true autonomous robots, but they are lending a mechanical helping hand to surgeons. Remote control and voice activation are the methods by which these surgical robots are controlled. Robotics is being introduced to medicine because they allow for unprecedented control and precision of surgical instruments in minimally invasive procedures. The ultimate goal of the robotic surgery field is to design a robot that can be used to perform closed-chest, beating-heart surgery.
Robots in the field of surgery have dramatically changed the procedures for the better. The most significant advantage to Robotic Surgery to the patient is the decrease in pain and scaring. The smallness of the incisions also causes many other advantages that make Robotic Surgery worth the risk. Besides the obvious rewards to the patient, Robotic Surgery is also very advantageous to the surgeon and hospital.



If you are you interested in this seminar topic, mail to us to get
the full report * of the seminar topic.
Mail ID: - contact4seminars@gmail.com
* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)



Artificial passenger

ABSTRACT


In this seminar , we are giving some basic concepts about smart cards. An artificial passenger (AP) is a device that would be used in a motor vehicle to make sure that the driver stays awake. IBM has developed a prototype that holds a conversation with a driver, telling jokes and asking questions intended to determine whether the driver can respond alertly enough. Assuming the IBM approach, an artificial passenger would use a microphone for the driver and a speech generator and the vehicle’s audio speakers to converse with the driver. The conversation would be based on a personalized profile of the driver. A camera could be used to evaluate the driver’s “facial state” and a voice analyzer to evaluate whether the driver was becoming drowsy. If a driver seemed to display too much fatigue, the artificial passenger might be programmed to open all the windows, sound a buzzer, increase background music volume, or even spray the driver with ice water. One of the ways to address driver safety concerns is to develop an efficient system that relies on voice instead of hands to control Telematics devices. It has been shown in various experiments that well designed voice control interfaces can reduce a driver’s distraction compared with manual control situations. One of the ways to reduce a driver’s cognitive workload is to allow the driver to speak naturally when interacting with a car system (e.g.when playing voice games, issuing commands via voice). It is difficult for a driver to remember a syntax, such as “What is the distance to JFK?””Or how far is JFK?” or “How long to drive to JFK?” etc.). This fact led to the development of Conversational Interactivity for Telematics (CIT) speech systems at IBM Research.
CIT speech systems can significantly improve a driver-vehicle relationship and contribute to driving safety. But the development of full fledged Natural Language Understanding (NLU) for CIT is a difficult problem that typically requires significant computer resources that are usually not available in local computer processors that car manufacturer provide for their cars.
To address this, NLU components should be located on a server that is accessed by cars remotely or NLU should be downsized to run on local computer devices (that are typically based on embedded chips).Some car manufacturers see advantages in using upgraded NLU and speech processing on the client in the car, since remote connections to servers are not available everywhere, can have delays, and are no trobust. Our department is developing a “quasi-NLU”component – a “reduced” variant of NLU that can be run in CPU systems with relatively limited resources.



If you are you interested in this seminar topic, mail to us to get
the full report * of the seminar topic.
Mail ID: - contact4seminars@gmail.com
* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)



  • © 2008 – 2013 seminars4you,

  • All rights reserved.