Mechanica 2011 - IIT Madras

April 9,10 (Mechanical)

Mechanica 2011, an annual technical festival of the Mechanical Engineering Department of IIT Madras, Chennai. At Mechanica, we present to you unparallel oppoirtunities to test your skills.

National Symposium on Rotor Dynamics - IIT Madras

December 19,20,21

Most machines have one or more rotating parts. Rotating machine elements thus form the backbone of industrial infrastructure and therefore play a pivotal role in the growth and development of the country. Rotor Dynamics is the key in design and maintenance of all such rotating machinery. This area has made tremendous strides in recent years.

ObCom 2011 - VIT

September 9

This International Conference is a major event to be conducted following the grand success of series of ObCom conferences during 2003, 2004 and 2006, which were audited by a good number of participants from Academia and Industry across the World. The past ObCom conferences received good contributions from academia, industry and research organizations. Our sponsors included governmental and non-governmental agencies like DRDO, ISTE, DIT, CSIR etc.

Want your College symposium details Here

www.tpapers.blogspot.com

SEND YOUR COLLEGE SYMPOSIUMS, WORKSHOP, CONFERENCE ETC. DETAILS TO totpapers@gmail.com

Technical Papers and Symposium Details

totpapers@gmail.com

Post your papers here. Share your knowledge. Send your papers to totpapers@gmail.com Also send your college symposium, workshop, conferece, etc. Details

Showing posts with label IT. Show all posts
Showing posts with label IT. Show all posts

NEURAL ENSEMBLE BASED CANCER DETECTION

Posted by tpapers On 12:58 am 3 comments
Abstract:
An artificial neural network ensemble is a learning paradigm where several artificial neural networks are jointly used to solve a problem. In this paper, an automatic pathological diagnosis procedure named Neural Ensemble-based Detection (NED) is proposed, which utilizes an artificial neural network ensemble to identify lung cancer cells. The neural algorithm we used is FANNC, which is a fast adaptive neural classifier that performs one-pass incremental learning with fast speed and high accuracy.  The fundamental operation of the artificial neural network is local two-dimensional convolution rather than full connection with weighted multiplication. Weighting coefficients of the convolution kernels are formed by the artificial neural network through back propagated training.  The artificial convolution neural network acted as a final classifier to determine whether the suspected image block contains a lung nodule.

By: VIJAYALAKSHMI .A  (FINAL -Yr, B.E)
      VINODHINI .K (FINAL-Yr, B.E)
      MAHENDRA ENGINEERING COLLEGE FOR WOMEN, KUMARAMANGALAM

To Download Full Paper CLICK HERE
, | | edit post

64 Bit Computing

Posted by tpapers On 3:46 pm 0 comments
Abstract:

The labels "16-bit," "32-bit" or "64-bit," when applied to a microprocessor, characterize the processor's data stream. Although you may have heard the term "64-bit code," this designates code that operates on 64-bit data.


In more specific terms, the labels "64-bit," 32-bit," etc. designate the number of bits that each of the processor's general-purpose registers (GPRs) can hold. So when someone uses the term "64-bit processor," what they mean is "a processor with GPRs that store 64-bit numbers." And in the same vein, a "64-bit instruction" is an instruction that operates on 64-bit numbers. 
Source: www.newtechpapers.com

To Download Full Paper CLICK HERE

Digital Audio Water Marking

Posted by tpapers On 3:41 pm 0 comments
Abstract:

Digital watermarking is the process of embedding copyrighting information into digital media frame, such as text, image, audio and video. They are preferred to be imperceptible to the end user. The need for watermarking arises because of the inherent ease with which digital data can be copied and manipulated.

Digital watermarking find application in areas like copyrighting of information, authentication of data, tracing of illegal copies etc. Audio watermarking refers to applying watermarking on audio signals. The knowledge of the human auditory system i.e. psychoacoustics is of great importance in audio watermarking. This aspect of audio watermarking necessitates it to be treated as a separate topic.
Current watermarking techniques are mainly concerned with spread spectrum type of watermarking.

Source: www.newtechpapers.com

To Download Full Paper CLICK HERE 
Abstract:


Any major industry’s success depends invariably on the location of its bases, production centers and warehouses. Thus locating the sites before establishing these units  is done by facility location and planning unit of the industry. For greater profits the facilities should be located at an optimum distance from the market , raw material procurement sites utilities like water , sand etc.   For these problems involving layout a number of algorithms are in use like ALDEP,CORELAP, CRAFT etc. But since the location of facilities have become very complex due to greater constraints these days a determined search of a good algorithm begins. This can be achieved by using GENETIC ALGORITHMS. This type of evolutionary algorithms have made the computational effort fast and accurate.

To Download Full Paper CLICK HERE

FIREWALLS SYSTEM

Posted by tpapers On 5:53 pm 0 comments
Abstract:

Interconnectivity is no longer an option for most organizations. The information and services available are essential to the organizations. Moreover, individual users within the organization want and need Internet access, and if this is not provided via LAN, they will use dial-up capability from their PC to an Internet service provider (ISP). However, while Internet access provides benefits to the organization, it enables the outside world to reach and interact with local network assets. This creates a threat to the organization. While it is possible to equip each workstation and server in the premises network with strong security features, such as intrusion protection, this is not a practical approach. Consider a network with hundreds or even thousands of systems, running a mix of various versions of UNIX, plus Windows. When a security flaw is discovered, each potentially affected system must be upgraded to fix this flaw. The alternative, increasingly accepted, is the firewall. The firewall is inserted between the premises network and the Internet to establish a controlled link and to erect an outer security wall or perimeter. The aim of this perimeter is to protect the premises network from Internet-based attacks and to provide a single choke point where security and audit can be imposed. The firewall may be a single computer system or a set of two or more systems that cooperate to perform the firewall function.

To Download full Paper CLICK HERE

TOOL COMMAND LANGUAGE

Posted by tpapers On 5:34 pm 0 comments
Abstract:

TCL/TKs (Tool Command Language/Tool Kit) strength is that it is a small, interpreted, language that can be embedded, access graphics and system features, and is extensible. It also is multiplatform and has very wide support.  It can be downloaded on the NET, and it runs TCL scripts for backend processing. TCL is a language, called the Tool Command Language.  TK is a set of extensions or "widgets"(the actual official designation) that happened to be written by TCL’s author to add graphic capability to his TCL interpreter they include things like list boxes, entry boxes, radio buttons, check boxes, etc.... In fact, prior to TCL/TK 8.0, TCL was at version 7.3, and TK was at version 4, as I recall. In a way, TCL’s relationship to TK is kind of like VBs relationship to activex(which ALSO has controls as mentioned above, and are sold as one package). In fact, a VB user can program for a long time without realizing that he or she is using activex components all over the place.  
Tcl was originally intended to be a reusable command language. Its developers had been creating a number of interactive tools, each requiring its own command language. Since they were more interested in the tools themselves than the command languages they would employ, these command languages were constructed quickly, without regard to proper design.

To Download Full Paper CLICK HERE

Ethical Hacking

Posted by tpapers On 4:35 pm 0 comments
Abstract:

The explosive growth of the Internet has brought many good things: electronic commerce, easy access to vast stores of reference material, collaborative computing, e-mail, and new avenues for advertising and information distribution, to name a few. As with most technological advances, there is also a dark side: criminal hackers. Governments, companies, and private citizens around the world are anxious to be a part of this revolution, but they are afraid that some hacker will break into their Web server and replace their logo with pornography, read their e-mail, steal their credit card number from an on-line shopping site, or implant software that will secretly transmit their organization's secrets to the open Internet. With these concerns and others, the ethical hacker can help. This paper describes ethical hackers: their skills, their attitudes, and how they go about helping their customers find and plug up security holes. The ethical hacking process is explained, along with many of the problems that the Global Security Analysis Lab has seen during its early years of ethical hacking for IBM clients.

To Download Full Paper CLICK HERE 

Ajax Technology

Posted by tpapers On 11:51 pm 0 comments
Abstract:

In recent years, information system based on browse/server architecture (namely B/S architecture) received more favor by enterprises. Ajax technology consists of five parts. They are HTML(Hiper Text Markup Language), JavaScript, DHTML(Dynamic Hiper Text Markup Language), DOM(Document Object Model) and XML(Extensible Markup Language). With the help of cooperation and collaboration of these technologies, they can optimize the conventional enterprise information system by using an asynchronous way. Meanwhile, a quickly-responded and smoother user interface was provided. Enterprise information system with Ajax can be operated in a more efficient way, which means even use the current hardware, it can provide more load capacity, be more stable and serve more clients in parallel. In this paper: we present two kinds of information system models, one use conventional B/S architecture and the other use Ajax enhanced B/S architecture.

To Download Full Paper CLICK HERE

SEMANTIC WEB

Posted by tpapers On 7:14 pm 0 comments
Abstract:
The  web today  enables  people  to access  documents and services  on  the  Internet  but  today’s  methods  require human intelligence. The semantic  web augments  the  current web with  formalized knowledge  and well  formatted data thatcan be processed by computers. . The semantic web is a vision of information  that  is  understandable  by  computers,  so that  they can  perform  more of the tedious work involved in  finding, combining, and acting upon information on the web. Data that is generally hidden away in HTML files is often useful in some contexts,  but  there  is  no global  system  for  publishing data in such  a way  that  it  can  be  easily  processed by  anyone.  This makes Semantic Web a rational solution for the problem.. This will  enable  computers  to  assist  human  users  in  tasks and understand data the way they cannot today. The  layered  architecture  serves  as  the  basic  building block of  the  system  and supports  the  vision  of  a Web imbued with  meaning.  The  similarities  that  it  shares  with  the  object oriented programming language has  made  the  Unified Modelling  Language  usable  by  both  object-oriented Programming and semantic web development and the  Semantic Web  Browsers,  extend the  notion  of  the  Web browser  into  the Semantic Web. There will also be creation of more open market in  information  processing and computer  services  enabling the creation of new applications and services from combinations of existing service.

To Download Full Paper CLICK HERE