Welcome, Guest
You have to register before you can post on our site.

Username
  

Password
  





Search Forums

(Advanced Search)

Latest Threads
Anchoring
Last Post: Renukalodam
03-01-2024, 05:01 AM
science day
Last Post: priyaa_patil04
02-27-2024, 10:19 AM
Coupan
Last Post: Aniket
02-27-2024, 09:52 AM
Sir I want to upload a co...
Last Post: Guest
02-11-2024, 05:59 AM
Farewell
Last Post: Guest
01-31-2024, 01:06 PM
English
Last Post: Vaishnavi Rama bade
01-24-2024, 12:49 AM
Rely and electromagnetism...
Last Post: [email protected]
01-18-2024, 02:42 PM
Anchoring script
Last Post: vidisha.bari_18
01-04-2024, 04:19 PM
anchoring script
Last Post: ritu raithatha
12-29-2023, 05:12 AM
Anchoring script in bilin...
Last Post: Krishna
12-26-2023, 01:36 PM

Forum Statistics
» Members: 8,406,   » Latest member: Nhlaka,   » Forum threads: 68,492,   » Forum posts: 153,071,  
Full Statistics

  smart energy meter ppt
Posted by: shruk56 - 08-16-2017, 08:44 PM - Forum: Projects and Seminars - No Replies

To get full information or details of smart energy meter pptplease have a look on the pages

http://seminarsprojects.net/Thread-prepa...ard?page=2

if you again feel trouble on smart energy meter ppt please reply in that page and ask specific fields in smart energy meter ppt

Print this item

  Design and analysis of spindle with Spm-special purpose machine
Posted by: vineethnsuresh - 08-16-2017, 08:44 PM - Forum: Mechanical Engineering Project Ideas - Replies (1)

Design and analysis of spindle with Spm (special purpose machine).

ABSTRACT

The present work is carried out on TWO STATION TWO SPINDLE CAM BORE ROUGHING /FINISHING SPM.It is a SPECIAL PURPOSE MACHINE exclusively used for HEROHONDA in which it is used for fine boring to reduce the oil consumption of the two wheeler.
The objective of my project is to generate a parametric assembly drawing of spindle assembly using Pro-E, and analysis of spindle assembly using ANSYS.
Firstly, we created a solid model of the crankshaft using designing software
Pro-e. Then the model is imported into Ansys and analyzed by applying necessary conditions, which were considered in designing it and then checked for the strength and life. The specifications required for the design are taken from the drafted design
The analysis of spindle assembly includes:
Analysis of spindle deflection due to tensioning of belt
Spindle analysis for deflection due to axial and radial forces
Based on deflection decide an optimum positioning of the spindle bearings

Print this item

  compressed air production using vehicle suspensor pdf
Posted by: aashishak - 08-16-2017, 08:44 PM - Forum: Projects and Seminars - Replies (1)

we need this topic as this our related to project hence will u give me iformation regarding this project..we are so lucky that we have such a great site to gain information.so please its a request to u to share your information

Print this item

  Mailman-A complete mail server
Posted by: kashif - 08-16-2017, 08:44 PM - Forum: Computer Science Seminar Topics - No Replies

Mailman-A complete mail server
A Project Report
Submitted in partial fulfilment of
the requirements for the award of the degree of
Master of Technology
in
Computer Science and Engineering
by
Prasanth.R.S
M105111
Department of Computer Science & Engineering
College of Engineering Trivandrum
Kerala - 695016
2010-11

Abstract
Mailman is a mailserver which is an easy way of transferring mails. An e-mail server is a
computer within our network that works as virtual post office. A mail server usually consists
of a storage area where e-mail is stored for local users, a set of user definable rules which
determine how the mail server should react to the destination of a specific message, a database
of user accounts that the mail server recognizes and will deal with locally, and communications
modules which are the components that actually handle the transfer of messages to and from
other mail servers and email clients.
The system is intended to be a complete email server, with some extended features which
will enable the users of the system to seamlessly communicate with each other through emails.
It is developed as a secured email server which manages the sending and receiving of emails
by the registered users of the system in a way that enforces the security. Security is provided
by using encryption and decryption. It encrypts password and message while sending and in
the receiving side it decrypts the message. Hence high security is provided for users passwords
and messages.It also includes the advanced features like status tracking, which means that,
users can know whether the recipient has read the mail or deleted. There are four status.
They are read, unread, read and deleted and unread and deleted. Users can know the status
of the mail after sending.It also contains another feature, chatting. By using on-line chatting,
users can seamlessly communicates by sending and receiving messages.It also includes a feature
like deleting of mails after a particular date. Senders can send mails with mail destroying
date. When the mail reach the particular date which is already set is automatically removed
from the inbox of the recipient whether it is read or unread.In the Login page link a user have to
login for transferring mails. Next page provides several links. The Home page contains several
links such as my settings, Inbox, Compose, Trash, My folder, Sent Items, spams,Address Book
and Logout.User can add new contacts and signature The user can create new mails and sent
to other user or group of users.An already registered user can simply type in his/her valid
username and password, and then click the submit button. But those visitors who are not
registered have to go to the registration page before they login. In that page user have to enter
First name, Last name, Address, Postal Code, City, Phone number, Username and password.
After registration user can sign in and check or send mail . Logout page link will help the user to
logout from the site.


[attachment=8651]

1 Introduction
E-mail server is a computer within our network that works as virtual post office.A mailserver
which is an easy way of transferring mails.Emails were an easy way to notify end-users of busi-
ness events in an application. With the emergence of new notification channels (such as WAP
Phones, Instant Messaging applications, and SMS Pagers), sending notifications has become
more complicated. Now, applications have to support an ever- changing set of communication
channels that end users would like to be notified on. Additionally, once developers have finished
building the communication mechanisms, they will also need a way of determining where to
contact an end user at what time (i.e. should an email be sent to the users PC).
An email box (also email mailbox, e-mailbox) is the equivalent of a letter box for electronic
mail. It is the destination where electronic mail messages are delivered.A mailbox is identified
by an email address. However, not all email addresses correspond to a storage facility. The term
pseudo-mailbox is sometimes used to refer to an address that does not correspond to a definitive
mail store. Email forwarding may be applied to reach end recipients from such addresses.
Electronic mailing lists and email aliases are typical examples.The term mailbox refers to that
depository. In that sense the terms mailbox and address can be used interchangeably.
An Email client retrieves messages from one or more mailboxes. The database (file, directory,
storage system) in which the client stores the messages is called the local mailbox. Popular
protocols to retrieve messages are:
Post Office Protocol:- A client-server method that is most suitable for reading messages
from a single client computer because message are removed from the server mailbox after
first retrieval.
Internet Message Access Protocol:- Designed to retrieve messages from multiple clients by
allowing remote management of the server mailbox by keeping master copies of messages
on the server but can save a copy in the local mailbox.
Web-based clients exist that retrieve messages from the server on behalf of the website user
and display them to the user in a suitable format in a web browser.
Any kind of database can be used to store email messages. However, some standardization
has resulted in several well-known file formats to allow access to a given mailbox by different
computer programs. There are two kinds of widely used formats:
Mailbox is the original technique of storing all messages in a single file,
Maildir is a newer specification that provides for storing all messages in a directory tree,
with one file for each message.
5
2 SMTP(Simple Mail Transfer Protocol)
SMTP or Simple Mail Transfer Protocol is a way to transfer email reliably and efficiently.
SMTP is a relatively simple, text based protocol, where one or more recipients of a message
are specified (and in most cases verified to exist) and then the message text is transferred. You
can think of SMTP as the language that mail servers use to communicate among themselves.
Since this protocol started out as purely ASCII text based, it did not deal well with binary
files. When the user wants to send a message to someone, the sender SMTP establishes a two
way transmission channel to a receiver SMTP. SMTP commands are generated by the sender
SMTP and sent to the receiver SMTP. SMTP replies are sent from the receiver SMTP to the
sender SMTP in response to the commands. In case a direct connection does not exist between
the sender and the final destination, the message may be sent via one or more relay SMTP
servers. The relay SMTP servers first act as receivers and then relays the message to the next
SMTP.
SMTP server must be supplied with the name of the ultimate destination host as well as
the destination mailbox name. Once the transmission channel is established, the SMTP sender
sends a MAIL command indicating the sender of the mail. If the SMTP receiver can accept
mail it responds with an OK reply. The SMTP sender then sends a RCPT command identifying
a recipient of the mail. If the SMTP receiver can accept mail for that recipient it responds with
an OK reply; if not, it responds with a reply rejecting that recipient (but not the whole mail
transaction). The SMTP sender and SMTP receiver may negotiate several recipients. When
the recipients have been negotiated the SMTP sender sends the mail data, terminating with a
special sequence. If the SMTP receiver successfully processes the mail data it responds with
an OK reply. The dialog is purposely lock step, one at a time.
2.1 SMTP Commands
Given below are some basic commands with their brief descriptions. The SMTP standard
defines many more commands, most of which are optional to implement.
HELLO (HELO)
This is the first command that is sent when a connection is established. It is used to identify
the sender SMTP to the receiver SMTP. The argument field contains the host name of the
sender SMTP.
HELO < SP > < domain > < CRLF >
Note: < SP > stands for a space and < CRLF > stands for a combination of Carriage
Return and Linefeed. The receiver SMTP identifies itself to the sender SMTP in the connection
greeting reply and in the response to this command.
MAIL (MAIL)
6
There are three steps to SMTP mail transactions. The transaction is started with a MAIL
command which gives the sender identification. A series of one or more RCPT commands
follows giving the receiver information. Then a DATA command gives the mail data. And
finally, the end of mail data indicator confirms the transaction.
The first step in the procedure is the MAIL command. The reverse-path contains the source
mailbox.
MAIL < SP > FROM:< reverse path > < CRLF >
If accepted, the receiver SMTP returns a 250 OK reply. The < reverse path > can contain
more than just a mailbox. The < reverse path > is a reverse source routing list of hosts
and source mailbox. The first host in the < reverse path > should be the host sending this
command.
RECIPIENT (RCPT)
This command gives a forward path identifying one recipient. If accepted, the receiver
SMTP returns a 250 OK reply, and stores the forward path. If the recipient is unknown the
receiver SMTP returns a 550 Failure reply. This second step of the procedure can be repeated
any number of times.
RCPT < SP > TO:< f orward path > < CRLF >
The < f orward path > can contain more than just a mailbox. The < f orward path >
is a source routing list of hosts and the destination mailbox. The first host in the < f orward
path > should be the host receiving this command.
DATA (DATA)
DATA (DATA)
The third step in the procedure is the DATA command.
DATA < CRLF >
If accepted, the receiver SMTP returns a 354 Intermediate reply and considers all succeeding
lines to be the message text. When the end of text is received and stored the SMTP receiver
sends a 250 OK reply.Since the mail data is sent on the transmission channel the end of the
mail data must be indicated so that the command and reply dialog can be resumed. SMTP
indicates the end of the mail data by sending a line containing only a period.The mail data
includes the memo header items such as Date, Subject, To, Cc, From etc.
VERIFY (VRFY)
This command asks the receiver to confirm that the argument identifies a user. If it is a
user name, the full name of the user (if known) and the fully specified mailbox are returned.
7
VRFY < SP > < username > < CRLF >
RESET (RSET)
This command specifies that the current mail transaction is to be aborted. The receiver
must send an OK reply.
RSET < CRLF >
NOOP (NOOP)
This command does not affect any parameters or previously entered commands. It specifies
no action other than that the receiver send an OK reply.
NOOP < CRLF >
QUIT (QUIT)
This command specifies that the receiver must send an OK reply, and then close the trans-
mission channel.
QUIT < CRLF >
8
3 SYSTEM ANALYSIS
Requirement analysis can be defined as a detailed study of various operations performed by
a system and their relationship within and outside of the system. One aspect of the analysis
is designing the boundaries of the system and determining whether or not a candidate system
should other related systems. During analysis data are collected on the available files, decision
points and transactions handled by the present system.
3.1 Product Features
The main features of the application are:
Spam filtering
Mail sending/receiving
Status tracking module
Encryption/decryption of mails
Contacts management
chat module
3.2 System Specification
3.2.1 Hardware Configuration
The selection of hardware is very important in the existence and proper working of any software.
When selecting hardware, the size and capacity requirements are also important.
Processors : Pentium 2 or above
Hard Disk : 40 GB Hard Disk
RAM : 256MB
Clock Speed : 550 MHz or above
3.2.2 Software Configuration
One of the most difficult tasks is selecting software, once the system requirements is find out then
we have to determine whether a particular software package fits for those system requirements.
This section summarizes the application requirement
Language : ASP.NET
Back End Tool : SQL Server
Operating System : WINDOWS XP/NT/Vista
9
4 TOOLS
4.1 About ASP.NET
Microsoft .net is a set of software technologies for connecting information, people, system
and devices.
An absolutely new programming model - totally objected oriented; grammar/functionality
independent of each other.
Simplified and consistent architecture - same development methodology may be applied
across plethora of languages without performance loss.
Microsoft .net is a set of software technologies for connecting information, people, system
and devices.
An absolutely new programming model - totally objected oriented; grammar/functionality
independent of each other.
Simplified and consistent architecture - same development methodology may be applied
across plethora of languages without performance loss.
NET is the combination of Framework, Common Language Runtime (CLR), Class libraries,
ASP.NET, Web Services and .NET Enterprise Servers. The means to build the Web the way
you want it. Everybody is doing Web Services. Enterprise Servers it is the future and next
generation of the Internet. Many companies are using Web Services now. With .NET, we think
that you have the best platform to host your Web Services.
4.1.1 .NET Framework
The .NET Framework is a development and execution environment that allows different
programming languages and libraries to work together seamlessly to create applications
that are easier to build, manage, deploy, and integrate with other networked systems.
The .net framework is responsible for providing a basic platform for application.
10
4.1.2 Common Langauge Runtime (CLR)
The Common Language Runtime is responsible for run time services such as language inte-
gration, security enforcement, memory, process, and thread management. In addition, it has
a role at development time when features such as life-cycle management, strong type naming,
cross-language exception handling, dynamic binding, and so on, reduce the amount of code
that a developer must write to turn business logic into a reusable component
4.1.3 C Sharp
C sharp = VB+JAVA (Best of both)
C sharp is an OOP language
Developed by Microsoft
Designed for .net, rather than adapted.
Simple operator overloading
Basic statement identical to C++, java.
C Sharp is simple, powerful, type-safe, and object-oriented. With its many innovations, C Sharp
enables rapid application development while retaining the expressiveness and elegance of C style
languages Visual Studio supports Visual C Sharp with a full-featured Code Editor, project
templates, designers, code wizards, a powerful and easy-to-use debugger, and other tools. The
.NET Framework class library provides access to a wide range of operating system services and
other useful, well-designed classes that speed up the development cycle significantly. The C
Sharp language is clearly the star of the whole .Net mega-production, with Visual Basic.Net as
its sidekick. C Sharp and its Java-like qualities such as garbage collection and hierarchical
namespaces have received lots of attention.
11
4.2 DBMS Description
4.2.1 SQL Server
SQL Server is the native data store of ASP.NET. Every business enterprise maintains large
volumes of data for its operations. With more and more people accessing data for their work, the
need to maintain its integrity and relevance increases. Normally with the traditional methods
of storing data and information in files, the chances that the data loses, its integrity and validity
are very high SQL SERVER offers capabilities of both relational and object-oriented database
systems. In general, objects can be defined as reusable software calls which can be location
independent and perform a specific task on any application environment with little or on change
to the code.
SQL Server products are based on a concept known as Client Server Technology . A
client of front-end database applications also interacts with the database by requesting and
receiving information from the database server. It acts as an interface between the user and
the database. The database Server or back-end is used to manage the database tables optimally
among multiple clients who concurrently request the server for same data. It also enforces data
integrity across all client applications and controls database access and other.
Microsoft SQL Server extends the performance, reliability, and quality and ease-of-use of
Microsoft SQL Server version 8.00194 Microsoft SQL Server includes several new features that
make it an excellent database platform for large-scale online transactional processing (OLTP),
data warehousing, and e-commerce applications.
The Repository component available in SQL Server version 7.0 is now called Microsoft SQL
Server Meta Data Services. References to the component now use the term Meta Data Services.
The term repository is used only in reference to the repository engine within Meta Data Services.
Microsoft SQL Server features include:
Internet Integration. The SQL Server database engine includes integrated XML support..
The SQL Server programming model is integrated with the Windows DNA architecture
for developing Web applications, and SQL Server supports features such as English Query
and the Microsoft Search Service to incorporate user-friendly queries and powerful search
capabilities in Web applications.
Scalability and Availability. The same database engine can be used across platforms rang-
ing from laptop computers running Microsoft Windows 98 through large, multiprocessor
servers running Microsoft Windows 2000 Data Center Edition. SQL Server Enterprise
Edition supports features such as federated servers, indexed views, and large memory
support that allow it to scale to the performance levels required by the largest Web sites.
Enterprise-Level Database Features.
The SQL Server relational database engine supports the features required to support
demanding data processing environments. The database engine protects data integrity
while minimizing the overhead of managing thousands of users concurrently modifying
the database. SQL Server distributed queries allow you to reference data from multi-
ple sources as if it were a part of a SQL Server database, while at the same time, the
distributed transaction support protects the integrity of any updates of the distributed
data.
12
Ease of installation, deployment, and use. SQL Server includes a set of administrative
and development tools that improve upon the process of installing, deploying, managing,
and using SQL Server across several sites. SQL Server also supports a standards-based
programming model integrated with the Windows DNA, making the use of SQL Server
databases and data warehouses a seamless part of building powerful and scalable systems.
These features allow you to rapidly deliver SQL Server applications that customers can
implement with a minimum of installation and administrative overhead.
4.3 Features of OS
4.3.1 Microsoft Windows 2000 Server
Windows 2000 Server The Microsoft Windows 2000 Server operating system includes inte-
grated Web and application services. These include Internet Information Services (IIS) 5.0,
and technologies such as COM+, Message Queuing, and data access. This combination allows
developers to use a wide variety of programming languages and tools to build applications that
can easily integrate with existing systems, while taking advantage of emerging technologies. By
integrating these technologies with enhanced performance, scalability, and reliability, as well
as infrastructure features including Microsoft Active Directory Service and end-to-end security,
Windows 2000 provides an application server platform well suited for the next generation of
Web-enabled applications.
The Microsoft Windows operating system platform has become a standard foundation for
building and deploying software applications. Its broad programming language support, large
third-party developer community, and cost efficiency have helped make Windows the main-
stream business operating system and application server platform. With Windows 2000, appli-
cation developers can use the tools and skills they already have write the new Internet-enabled
applications that are increasingly required by businesses.From Web sites to high-volume trans-
actional applications, Windows 2000 delivers the productivity benefits of component-based
development and takes advantage of industry standards for greater interoperability, flexibility,
and tools support. These application services are tightly integrated into the operating system to
deliver the reliability and manageability that the most demanding traditional and Web-enabled
applications require.
4.3.2 Internet Information Server 5.0
Windows 2000 Server includes the built-in Web service, Internet Information Services (IIS)
5.0, which is accessible from popular browsers. IIS 5.0 is the reliable, scalable HTTP portal
through which Web sites and Web applications communicate with the outside world. IIS 5.0
provides all the standard services users expect from a Web server as well as support for the
latest Internet standards, including HTTP 1.1, HTTP Compression, Secure Sockets Layer,
and Common Gateway Interface (CGI), and the new Internet collaboration standard, Web
Distributed Authoring and Versioning (WebDAV).
In addition, IIS 5.0 goes further than a simple Web server by providing the environment and
services application developers need to quickly create sophisticated Web-enabled applications.
One of the most significant application development technologies included in IIS 5.0 is Active
Server Pages.An ASP page contains a simple program-a script-written in a powerful scripting
language, such as VBScript, and executed at the server. ASP pages in IIS 5.0 offer developers
many benefits:
13
Greatly improved scalability and reliability With IIS Reliable Restart and other enhance-
ments, IIS in Windows 2000 allows developers to build applications that support more
users and stay running.
Access to COM+ objects Because an ASP page can create and use COM+ objects, the
entire world of component-based applications is accessible to it.
Integration with COM+-based applications Because ASP is a COM+ application, all
COM+ applications and capabilities are available in ASP.
Transactional ASP scripts COM+ integration allows creation of ASP pages that are
transactional, meaning that all operations performed by the script can succeed or fail as
a unit.
Process isolation ASP pages can run in the same process as IIS, offering the best perfor-
mance, or in a separate process, offering greater isolation in the event of failures. IIS now
supports three application protection modes: High Medium and Low, allowing developers
to balance overall Web server reliability with application performance.
Support for standard, well-known languages Because VBScript is a subset of Visual Basic,
millions of developers are familiar with VBScript today. ASP pages can also be written
in JavaScript, another popular and well-supported language.
Ability to distribute processing load across servers By using Windows Load Balancing
Service (WLBS), included with Windows 2000 Advanced Server, processor-intensive ASP
applications can be run on multiple machines to support higher numbers of users. New
ASP features in Windows 2000 Server improve performance and make it easier to write
applications that use IIS 5.0 and ASP. These features include:
Error handling ASP now has new error handling that lets developers trap errors in a
custom error message .asp file. Using the new error method, developers can display
useful information, such as an error description or the line number in an .asp file where
the error occurred
Scriptless ASP ASP pages that don t contain server-side script are processed as if they
were static HTML pages.
Flow control Rather than redirecting requests, which requires a performance-impacting
roundtrip to the client, Web developers can transfer requests directly to an .asp file
without ever leaving the server.
Performance-enhanced objects IIS provides updated performance enhanced versions of
popular installable components.
Self-tuning IIS can determine when executing requests need additional resources and
automatically provide more threads when required.
14
5 Design Notations
5.1 Data Flow Diagram
15
DFD Level 1
16
6 Conclusion
The Mailman system, once in place, is expected to provide a more convenient and reliable service
compared to traditional mail servers. Status tracking module will help to ensure the delivery of
critical emails and help us make prompt action in case of non-receipt.Security is provided by using
encryption and decryption. It encrypts password and message while sending and in the receiving
side it decrypts the message.It also contains another feature, chatting. By using on-line chatting,
users can seamlessly communicates by sending and receiving messages.It also includes a feature to
delete mails after a particular date. While sending ,senders can specify the destruction date. On the
predefined date the mail is automatically removed from the inbox of the recipient whether it is read
or unread.This set of enhancements adds a layer of premium functionality over email communication
thus taking the entire system to next level.
17
References
[1] http://powermta.port25windows-email server/. March 2002.
[2] http://whatismyipaddressmail server. April 1999.
18

Print this item

  online hospital management poject in j2ee page flow
Posted by: Reshma B.M - 08-16-2017, 08:44 PM - Forum: Projects and Seminars - Replies (2)

(06-27-2013, 01:22 PM)Guest Wrote: Online Hospital management system is a web based software system that will control every aspect of a hospital. This system should have following facilities :

>Superintendent of the hospital must have the following functionalities :
see status of beds at each ward, patient list in a ward , view patient details given the patient id .

>Nurses:
uses the system to do the following : information about a pathological test(ex what is the price of USG) View list of pathological test given a patient id . Entry of pathological test for a patient. view patient details given the patient id .

>Accountants task: Generate bill for a patient (this means discharging)

>Engineer:
Each engineer has their own account by which they can login. Engineer can view the problem assigned to him by HOD . Engineer can update the status of the problem addressed by him . i. e. whether it solved or any thing . They can see list of all the problems attended by him/her.

>HOD:
HOD has his own account Can see list of all problems registered HOD can allocate a problem to engineer. Can find out list of problems assigned to engineer

Print this item

  Operational and technical aspects of cluster munitions
Posted by: wazilmankara - 08-16-2017, 08:44 PM - Forum: Electronics Seminar Topics - No Replies

[attachment=5863]
Operational and technical aspects of cluster munitions

Mark HIZNAY


Many military establishments believe that cluster munitions increase the efficiency of suppressing, killing or destroying multiple targets within an area and they remain a key military equity. First used in the Second World War and used in 21 states since then, their technology has evolved and they are today perceived as a significant component in the self-defense capability of many states. However, cluster munitions have also demonstrated several limitations and liabilities, which can affect, and hinder, operations. When cluster munitions have been used in populated areas, civilians have died, either as a direct result of the attack and its area effect or as a result of post-attack unexploded ordnance (UXO). While all types of explosive ordnance fail to function at some rate, the failure rates for cluster munitions are distinct as they are so high; they are increasingly documented, and are now accounted for in the planning of military operations. Many types of cluster munitions were not designed to reduce or minimize UXO, as the weapons were not intended to be used in areas to which users would be returning: it was not until the Gulf War, that the requirement for military forces to conduct operations in areas containing their own UXO was widely recognized. It took even longer to establish UXO minimization as a requirement in cluster-munitions development.1 Today, the perceived need for cluster munitions is diminishing but has not been eliminated with the evolution of tactics, techniques and procedures for the use of other munitions. Advances in sensor and guidance technologies that transform unitary munitions into guided weapons are creating one alternative to the earlier-generation cluster munitions. Some states have removed problematic types of cluster munitions from service due to age or reliability concerns. But there is no military or legal requirement to dispose of these cluster munitions until the end of their extended shelf-life: large quantities of cluster munitions with known accuracy problems or high failure rates remain in global stockpiles. Types and utility of cluster munitions Cluster munitions are weapons that open in mid-air and scatter sub munitions, which usually number in the dozens or hundreds, into an area. Technical and functionally descriptive definitions of cluster munitions exist, but there is as yet no common legal understanding of the weapon among states. Germany introduced a draft definition of cluster munitions in talks within the Convention on Certain Conventional Weapons

Print this item

  asp net aptech online exam paper
Posted by: hit777 - 08-16-2017, 08:44 PM - Forum: Projects and Seminars - Replies (3)

To get full information or details of asp net aptech online exam paper please have a look on the pages

http://careerrideasp-net-multiple-choice-questions.aspx

if you again feel trouble on asp net aptech online exam paper please reply in that page and ask specific fields in asp net aptech online exam paper

Print this item

  future scope of digital image processing
Posted by: ABHA GURU - 08-16-2017, 08:44 PM - Forum: Projects and Seminars - No Replies

To get full information or details of digital image processing please have a look on the pages

http://seminarsprojects.net/Thread-digit...ing--30121

http://seminarsprojects.net/Thread-digit...e=threaded

http://seminarsprojects.net/Thread-digit...matlab-ppt

http://seminarsprojects.net/Thread-digit...e=threaded

http://seminarsprojects.net/Thread-digit...ort?page=3

http://seminarsprojects.net/Thread-digit...e=threaded

http://seminarsprojects.net/Thread-digit...ort?page=3

http://seminarsprojects.net/Thread-digit...531?page=5

http://seminarsprojects.net/Thread-digit...sing--9857

http://seminarsprojects.net/Thread-digit...e=threaded

http://seminarsprojects.net/Thread-digit...531?page=3

http://seminarsprojects.net/Thread-digit...ull-report

if you again feel trouble on digital image processing please reply in that page and ask specific fields in digital image processing

Print this item

  Swarm Intelligence
Posted by: peterparkars - 08-16-2017, 08:44 PM - Forum: Computer Science Seminar Topics - Replies (9)

Swarm Intelligence
Aravind Raj D & Sarath B V
Electronics & Communication Department
Mohandas College Of Engineering&Technology

[attachment=10167]

Abstract
Swarm intelligence (SI) involves multiple simple agents interacting with each other and the environment to
solve complex problems through their collective global behaviour. This is inspired by the intelligent
behaviour seen in swarms of animals such as a colony of ants, flocks of birds or schools of fish.
SI systems can handle many problems that are not suitable by traditional means. These include problems
that are dynamic, non predictable, not defined or computationally hard. SI systems have a number of
features such as flexibility,robustness,decentralized and self organization.
Introduction
As SI systems are inspired by natural biological
swarms, standard algorithms are based on the
search for food. The differences in food searching
techniques lead to different SI algorithms,
including:

Ant Colony Optimisation (Aco)
ACO replicate the natural behaviour of ants. Ants
will randomly spread out and search for food.
When food is discovered an ant will return to its
base leaving a pheromone trail. Upon finding a
pheromone trail another ant will follow that train
and if it finds food on this trail it too will return to
base, leaving its own pheromone trail. If an ant is
on a pheromone trail and crosses a stronger
pheromone trail it will follow the stronger trail.
Pheromones decay over time allowing the removal
of non optimal solutions. The ACO algorithm finds
optimal solutions because shorter paths are traveled

over faster and hence more often quickly leading to
strong pheromone trails. Introducing new ants
randomly over time allows responses to dynamic
changes in the environment. ACO is typically used
to find an optimal path.

Particle Swarm Optimisation (Pso)
This form of Swarm intelligence is based on
schools of fish and flocks of birds finding food.
PSO is used to find an optimal point in space.
Agents begin by being randomly spread out in the
environment with random velocities. As the agents
move they examine the area around them and
communicate with the other agents their
evaluations. This communication can either be a
global communication or a local neighbourhood
communication. Based on their own findings and
the findings communicated to them, agents will
adjust their velocities to follow better solutions.
As a result agents will begin to head into areas
where the best solutions are being found and this
leads to an optimal solution.

Intelligent Water Drops
Intelligent Water Drops algorithm (IWD) is a
swarm-based nature-inspired optimization
algorithm, which has been inspired from natural
rivers and how they find almost optimal paths to
their destination.These near optimal or optimal
paths follow from actions and reactions occurring
among the water drops and the water drops with
their riverbeds. In the IWD algorithm, several
artificial water drops cooperate to change their
environment in such a way that the optimal path is
revealed as the one with the lowest soil on its links.
The solutions are incrementally constructed by the
IWD algorithm. Consequently, the IWD algorithm
is generally a constructive population-based
optimization algorithm.

System Design
The difficult task in swarm intelligence is to answer
the question:
How do we program an individual agent so the
entire global system behaves as we want it to?
The techniques to design and control individual
agents are a standard AI problem and techniques
like reinforcement learning, fuzzy logic, neural
networks etc, can be used.
When designing an SI system both the individual
agents ability to search and evaluate its area as
well as a means for communication need to be
considered. Many of the global emergent
behaviour are difficult to predict.The major steps in
SI system design are:
Identification of analogies: in swarm
biology and IT systems
Understanding: computer modelling of
realistic swarm biology
Engineering: model simplification and
tuning for IT applications

Applications& Scope
Swarm Intelligence is utilised in the following
areas:
Swarm robotics:
It is a new approach to the coordination of
multirobot systems which consist of large numbers

of mostly simple physical robots. It is supposed that
a desired collective behavior emerges from the
interactions between the robots and interactions of
robots with the environment. This approach
emerged on the field of artificial swarm
intelligence, as well as the biological studies of
insects, ants and other fields in nature, where
swarm behaviour occurs.
One project that might deploy such methods in the
near future is ANTS Autonomous Nano
Technology Swarm. The acronym is apt, because
ANTS is all about collective, emergent intelligence
of the sort that appears in insect colonies. What
scientists at NASA s Goddard Space Flight Center
envision is a massive cluster of tiny probes that use
artificial intelligence to explore the asteroid belt.
Each probe, weighing perhaps 1 kilogram (2.2
pounds) would have its role while a small
number of them direct the exploration, perhaps 900
of the probes would proceed to do the work, with
only a few returning to Earth with data.One key
factor here is redundancy; the mission succeeds
even if a large number of individual probes are lost.
ANTS could serve as a testbed for numerous
technologies as it spreads computing intelligence
across intelligent, networked spacecraft. In
particular, computer autonomy would be critical to
ensuring the success of the mission.
Crowd simulation :
It is the process of simulating the movement of a
large number of objects or characters, now often
appearing in 3D computer graphics for film. While
simulating these crowds, observed human behavior
interaction is taken into account, to replicate the
collective behavior.
The need for crowd simulation arises when a scene
calls for more characters than can be practically
animated using conventional systems, such as
skeletons/bones. Simulating crowds offer the
advantages of being cost effective as well as allow
for total control of each simulated character or
agent.
The actual movement and interactions of the crowd
is typically done in one of two ways:

Read the report for further details.

References
1.wikipidea.org
2. Science Daily. 2008 (April 1). "Planes, Trains
and Ant Hills: Computer scientists simulate activity
of ants to reduce airline delays.

Print this item

  project topics in estate management
Posted by: ajith1237 - 08-16-2017, 08:44 PM - Forum: Projects and Seminars - Replies (1)

To get full information or details of estate management please have a look on the pages

http://seminarsprojects.net/Thread-estat...e=threaded

if you again feel trouble on estate management please reply in that page and ask specific fields in estate management

Print this item


Online Users
There are currently 407 online users. » 0 Member(s) | 404 Guest(s)
Applebot, Bing, Google

Powered By MyBB, © 2002-2024 iAndrew & Melroy van den Berg.