• No results found

Lab Manual

N/A
N/A
Protected

Academic year: 2022

Share "Lab Manual"

Copied!
28
0
0

Loading.... (view fulltext now)

Full text

(1)

Lab Manual

B.Sc. (CA)

SEMESTER - VI

DEPARTMENT OF COMPUTER SCIENCE CCB-6S1: VIVA

ALIGARH MUSLIM UNIVERSITY ALIGARH

2019

Look forward, learn modern knowledge, and

do not waste time in studies of old subjects of

no values.

(2)

CREDITS

Lab Manual Design Committee:

Prof. Mohammad Ubaidullah Bokhari

Dr. Arman Rasool Faridi

Dr. Faisal Anwar

Dr. Aasim Zafar (Convener)

Editor:

Dr. Aasim Zafar

Design & Compilation:

Mr. Sunil Kumar Sharma

First Edition: July 2017

Approved by BoS, Dated– 31/07/2017

Department of Computer Science, A.M.U., Aligarh, (U.P.), India

(3)

Lab Manual – Viva (CCB-6S1)

Course Description 3

Content 3

Objectives 3

Outcomes 4

Rules and Regulations 5

Topics for 1

st

Presentation 8

Topics for 2

nd

and 3

rd

Presentation 14

Tips for Good Seminar Presentation 24

Appendix- I: Template for IEEE-paper format 26

Appendix- II: Template for the Index of Lab File 27

(4)

COURSE TITLE: Viva COURSE CODE: CCB – 6S1

CREDIT: 2 PERIODS PER WEEK: 3

CONTINUOUS ASSESSMENT: 40 EXAM: 60

COURSE DESCRIPTION

Application of classroom knowledge and skills in computer science to develop research, technical writing and presentation skills.

CONTENT

This course consists of technical paper writing, which includes planning, gathering relevant information, drafting, editing and revising to quality standards, and, where appropriate, research methods and appropriate citation of sources. Further, it helps in preparing and organizing the seminar presentation using the concepts of ordering and determining the central, main and supporting ideas.

OBJECTIVES

 To help students develop technical paper writing skill, which includes planning, gathering relevant information, drafting, editing and revising to quality standards, and, where appropriate, research methods and appropriate citation of sources.

 To help students plan their seminar presentation by determining audience needs, and defining presentation purpose.

 To help students plan and organize the presentation using the concepts of ordering and determining the central, main and supporting ideas.

 To help students in writing the introduction and conclusion of the

presentation.

(5)

 To help students identify the benefits and uses of multimedia aids in enhancing the presentation.

 Use effective verbal and non-verbal techniques when making a presentation.

 To help students effectively field questions and elicit feedback from the audience.

 To help students gain feedback from peers and the mentor/teacher that will identify strengths and areas for improvement.

OUTCOMES

After completing this course, the students will be able to:

 Effectively produce technical paper for communication and seminar presentation.

 Effectively design documents for presentation, printing and other electronic means of communication in order to construct documents meaningful to the audience.

 Effectively use standard formats/templates to construct meaningful documents.

 Use multimedia items in effectively constructing meaning in communication situations.

 Effectively negotiate the process of completing technical documents i.e. planning, drafting, editing and revising to quality standards, and, where appropriate, research methods and appropriate citation of sources.

 Identify strengths and weaknesses.

(6)

RULES AND REGULATIONS

Students are required to strictly adhere to the following rules:

 Students are required to give THREE presentations individually during this course.

1

st

Presentation: Students may choose any topic of their interest for giving first presentation.

2

nd

Presentation: Students are required to select any topic out of a pool of topics given by the teacher. The topics would be allotted on first-come-first serve basis.

3

rd

Presentation: Students will have to select anyone topic out of given options related to their topic of 2

nd

Presentation.

Deliverables: For all the three presentations, the students are required to submit the hard and soft copies of the followings:

 Synopsis /Abstract

 Technical Paper (4-6 pages) in IEEE-paper format (Appendix-I)

 Presentation in PDF format

 The same will be maintained in Lab File by the students in the prescribed format (Appendix-II).

 After finalizing the topic for presentation, the student needs to get it registered to the teacher in-charge. The student would be assigned a mentor, whom the students may consult and take help from while preparing the synopsis/abstract, writing the paper and finalizing the PPT.

 The students are required to prepare Synopsis/Abstract of the

paper, and get it approved by the concerned mentor/teacher.

(7)

Once the Synopsis/Abstract is approved, the students are required to write technical paper on the topic in continuous guidance of the concerned mentor/teacher. Once the paper is finalized and approved by the mentor/teacher concerned, students would prepare PPT for presentation.

 There will be Zero tolerance for plagiarism. Students will be making extensive use of external references for their paper/presentation, and should be vigilant in maintaining high standards with regard to attribution and avoidance of plagiarism. If there are questions about how to deal with any such matters, the student should discuss the matter with the teacher/mentor concerned to make sure there are no misunderstandings.

 All the resources used should properly be referenced in the given format.

 Students are advised to carry on all the activities, related to three presentations, in parallel. For example, while working on Presentation#1, you may finalize and register the topic(s) for Presentation#2 and/or Presentation#3. Thereafter, relevant resources/materials may be gathered and discussed with the teacher concerned for timely start and completion of the Paper writing and PPT preparation.

 Presentation will be held as per notified schedule.

 Attendance Policy: Attendance is vital for this class, since

discussions and regular oral presentations and progress reports

will have a strong impact on the ability to complete the assigned

task in time. You may be dropped from the course for missing

more than two consecutive scheduled meetings.

(8)

 Late Policy: Late work will not be accepted. Make arrangements with the teacher/mentor to turn in assigned task/work early if you will not be in class on the due date.

 At least TWO timely presentations along with all related documents are compulsory; failing which students would not be allowed to appear in the final exam or viva-voce for this course.

Final Submission of Lab File: Lab File consisting of all the deliverables are due on the last day of class before final week.

 Evaluation would be done on the basis of :

 Timely submission of Abstract/Paper/PPT (20%)

 Quality and Originality of content (50%)

 Presentation skills (30%)

(9)

TOPICS FOR 1

ST

PRESENTATION

Students may choose any topic of their interest related to Computer Science, Information System, Information Technology and/or recent developments in field of CS&IT for giving their first presentation. The topics may be related to the followings, but not limited to:

3D Internet

3D Printing

3G-vs-WiFi

4G Technology

4G Wireless System

5 Pen PC Technology

5G Technology

5G Wireless Technology

Advanced Queue Management Techniques

Advancement in inverter technology for industrial application

Agent Oriented Programming

Agile Methodology

Aircraft GPS Tracking

Ajax Technology

Anatomy and working of search engines

Android

Android 7.0 Nougat features

Anti-HIV using nanorobots

Apache Hadoop introduction

AppleTalk

Application of Genetic Algorithms in Network routing

Application of LED for Domestic Applications

Application of microcontroller in vehicle monitoring and security system

Applications of Graph Theory to Metabolic Pathways

Applications of Soft Computing in Medical Image Analysis

Aqua communication using modem

ARQ Schemes for Wireless Data Communications

Artificial Eye

Artificial immune system

Artificial Intelligence (AI)

Artificial intelligence for speech recognition

Artificial Intelligence in Machines

Artificial intelligence on expert systems

(10)

Artificial Neural Network (ANN)

Aspects of Database Security and Program Security

Asynchronous Chips

Attacks on Smart Cards

Attendance Monitoring Intelligent Classroom

Augmented Reality

Augmented Reality vs Virtual Reality

Authentication and securing the systems

Automated network address assignment

Automatic Conveyor for Industrial Automation

Automatic device driver synthesis and verification

Automatic Mobile Recharger Station

Automatic number plate recognition

Automatic number plate recognition

Automatic sound-based user grouping for real-time online forums

Automatic Video Surveillance Systems

Autonomic Computing

Backup and Recovery planning

Big Data

Biochips

Bio-computers/Bimolecular Computers

Biomass gasifier for thermal and electrical applications

Biomedical instrumentation and signal analysis

Biometric Authentication Technology

Biometric Security System

Biometrics-Based Authentication

Blackberry Technology

Blue Brain

Blue Eyes Technology

Blue Gene

Blue ray Disc

Bluejacking

Bluetooth Technology

Brain Computer Interface (BCI)

Brain port device

Brain-controlled car for disabled using artificial intelligence

Braingate technology

CAD/CAM

Carbon Nano Technology

Client Server Architecture

Cloud Computing

Cluster computing

Common Gateway Interface (CGI)

(11)

Computer Forensics

Computer Networks

Computer Peripheral

Computer Virus

Concurrent Programming and Parallel distributed O.S.

Conditional Access System

CORBA

Cross Platform Component Object Model

Cryptography

Cryptography and Network Security

Cyber Crime

Cyber Crime and Security

Daknet

Data Management in Sensor Networks

Data Mining

Data Mining concepts & model

Data over Cable Service (DOCSIS)

Data Storage On Fingernail

Data Warehousing

Database Management System (DBMS)

Datagram Congestion Control Protocol (DCCP)

Deploying a wireless sensor network on an active volcano

Detection of digital photo image forgery

Detection of Reviews using sentiment analysis

Diamond Chip

Digital Cinema

Digital Jewellery

Digital Light Processing

Digital Signature

Digital Watermarking

Direct Memory Access (DMA)

Distributed Computing

Distributed denial-of-service attack (DDoS)

Distributed Systems

DNA Computing

Domain Name System (DNS)

E-ball Technology

Embedded Systems

Enterprise Resource Planning (ERP)

E-Paper Technology

Extreme Programming (EP)

FERROELECTRIC RAM (FRAM)

Firewall

Free net

(12)

Futex

Generations of Computer

Genetic Engineering

Gi-Fi Technology

Google App Engine

Google Chrome OS

Google Glass

Google Wave

Graphics Processing Unit (GPU)

Green Computing

Grid Computing

GSM (Global System for Mobile Communications)

GSM Security And Encryption

Hadoop

History of Computers

Holographic Memory

HTML/XML

Human Computer Interface

Humanoid Robots

Image Processing

Indian Regional Navigation Satellite System (IRNSS)

Interferometric Modulator (IMOD)

Intrusion Detection Systems (IDS)

Invisibility Cloaks

IP Spoofing

IP Telephony

iPad

iPhone

Java

Java Ring

Jini Technology

Kerberos

LAMP Technology

Linux Operating Systems

Login application in Java using MVC architecture and MySQL database

Meta Search Engine

Microsoft Surface

Middleware Technologies

Mind Reading

Mobile Computing

Mobile Jammer

Mobile Number Portability (MNP)

Mobile Phone Cloning

Nanomaterials

Nanoparticles

Nanotechnology

Network Security

Network Topology

(13)

Night Vision Technology

Object Oriented Programming (OOP)

Online Voting System

Online/Internet Marketing

Operating System

Optical Coherence Tomography

Phishing

Pill Camera

Podcast

Polymer Memory

Project Loon

Quantum Computing

Random Access Memory (RAM)

Restful Web Services

Robotics

Rover Technology

Satrack

SDLC (Software Development life cycle)

Search Engine

Search Engine Optimization(SEO)

Service Oriented Architecture (SOA)

Sixth Sense Technology

Smart Fabrics

Smart Grid

Smart Memories

SNMP

Software Reuse

Software Testing

Space Mouse

Speech Processing

Speech Recognition

Steganography

Storage Area Network (SAN)

Tidal Energy

Tizen Operating System – One OS for everything

Tripwire

Universal Serial Bus (USB)

UNIX Operating System

Virtual Private Network (VPN)

Virus and Anti Viruses

Voice over Internet Protocol (VoIP)

Wearable Computing

Web Services on Mobile Platform

Wibree

WIMAX

Wireless Application Protocol

Wireless Communication

Wireless Fidelity

(14)

Wireless Mesh Network

Wireless Sensor Networks (WSN)

X-MAX Technology

Zigbee

(15)

TOPICS FOR 2

ND

& 3

RD

PRESENTATIONS

S.

No.

TOPICS FOR 2

nd

PRESENTATION

RELATED TOPICS FOR 3

rd

PRESENTATION

1 Trends in e-Commerce and e- Business

 E-Government & E-Governance,

 Health Service Management & E- Health

 Future Trends and Issues in e- Learning

 Security, Privacy and Trust for e- Service

 Enterprise Systems Security

2 Internet of Things

 Internet of Things Security

 Wireless Sensor Networks

 Smartphone and Mobile Applications Security

 Security of Web-based Applications and Services

 Data Management in Sensor Networks

3 Network Security

 Intrusion Detection and Prevention

 Cryptography and Privacy

 Ad-hoc Networks Security

 Pretty Good Privacy (PGP) and Email Security

4 Web Security  Social Network Security

 Bluetooth Technology Security

(16)

 SSL-The Secure Sockets Layer

 Cyber Defense & Information Technology

5 Information Hiding and Digital Forensics

 Wireless Network Security

 Wireless Surveillance

 Fraud and Cyber crime Control

 Cyber Crime and Security

6 Information Retrieval

 Web Search: Technical and Social Issues

 Web mining

 Google Search Engine Algorithms

 Hummingbird algorithm

 Hyper-induced topic search

7 Grid & Cloud Computing

 Cloud Computing Techniques for Big Data

 Grid and Cloud Applications Security

 Cloud/Grid/Stream Data Mining- Big Velocity Data

 Fog Computing

8 Free and Open Software Systems

 IPR and Legal Implications in Open Systems

 Business Models & Strategies in Open Systems

 Innovation in Open Systems

 Case studies of Open Systems deployment and migration models

(17)

 Big Data Open Platforms

9 Big Data Computing

 Novel Theoretical Models for Big Data

 New Computational Models for Big Data

 Data and Information Quality for Big Data

 New Data Standards

 Big Data Applications in smart cities, Healthcare and Transportation

10 Stream Computing for Big Data

 High Performance/Parallel

Computing Platforms for Big Data

 Energy-efficient Computing for Big Data

 Programming Models and

Environments for Cluster, Cloud, and Grid Computing to Support Big Data

 Software Techniques and

Architectures in Cloud/Grid/Stream Computing

 New Programming Models for Big Data beyond Hadoop/MapReduce, STORM

 Software Systems to Support Big Data Computing

11 Data Analytics and Visualization

 Visualization Analytics for Big Data

 Big Data Analytics in Small Business Enterprises (SMEs),

 Big Data Analytics and Metrics

(18)

12 Business Intelligence

 Data Mining

 Data Analytics Models

 e-business and New Media

 Future Trends and Issues in Data Analytics

13 Machine Learning

 Machine learning based on Big Data

 Adaptive websites

 Affective computing.

 Bioinformatics

 Cheminformatics

 Computer vision, including object recognition.

14 Infrastructure, Architecture and Tools for e-Management

 Innovative Models in e-Management

 e-Payment Systems

 Future Trends and Issues in e- Management

 Digital Waste/e-Waste Management

15 Technological details of RFID System

 Logistics, Transport and Traffic Management

 Inventory Management

 RFID Security and Privacy

16 Mobile networking technologies

 4G Broadband Technology

 GSM and WCDMA

 GSM Security And Encryption

 Location Based Systems as Context- aware Systems

(19)

18 Digital Signatures

 Authentication protocols

 Management of Public keys

 Authentication and Digital Signatures in Mobile Networks

19 Semantic Web

 Ontologies and Semantic Web

 Knowledge Representation in Semantic Web

 Semantic Web Applications

20 Business Process Re- Engineering

 Business Intelligence Tools &

Applications

 Process modelling, management, assessment and improvement

 Infrastructure and processes for iterative or incremental software delivery

21 Image Processing

 Neural and Evolutionary Computing

 Speech Recognition

 Machine Reading of Handwritten Texts

22 Artificial Intelligence

 Driverless cars

 Intelligent computer games

 Recommender systems

23 Imperative programming languages

 Visual programming

 Languages for mobiles

(20)

 Animation

24 Wireless media/network

 Li-Fi

 5G technology

 Satellites

25 Computer Multimedia

 3D printing

 Virtual reality

 Social networking

26 Robotics

 Google glass

 Wearable computer

 Blue brain

27 Computers in Agriculture Sector

 GPS

 Remote sensing

 Radar

 Weather forecasting

28 Social networking

 Sentiment analysis

 Social media optimization

 Social media marketing

29 Artificial neural network

 Supervised recurrent network Unsupervised self-organizing map

 Swarm Intelligence

30 Support Vector Machine  Behaviour of various Kernels

 Non-binary classification using SVM

(21)

 SVM Applications

31 Parallel computing

 Parallel Computer Architecture - Models

 Parallel Computing Applications

 High Performance Computing

32 Social Network Analysis

 Physiological analysis of social networking

 Opinion mining

 Social Network Analytics

33 Programming paradigm

 Software Architecture Patterns

 MVC architecture

 Agile and Component-based software development methods

 Aspect-oriented and Mashup software development methods

34 Remote Sensing

 Geo-informatics

 Spectral Imaging

 Remote Sensing Applications

35 Algorithmic paradigms

 Approximation algorithm

 Metaheuristic algorithm

 Dynamic Programming

 Greedy Method

36 Bioinformatics  Docking Algorithms

 Molecular Evolution

(22)

 Computational Intelligence Techniques in Bioinformatics

37 Quantum Computing

 Quantum Algorithms

 Quantum Complexity

 Quantum Information Theory

 Spin-based Quantum Information processing

 Optical Quantum Information Processing

 Quantum Cryptography

38 Cognitive Science

 Systems Neuroscience

 Cellular/Molecular neuroscience

 Brain Research

 Collective Intelligence

 Human Cognition Information Processing

 (Cognitive Processing)

 Multiple Intelligences

 Biologically-Inspired Computer Vision

39 Supercomputers

 TOP500 Supercomputers

 GREEN500 Supercomputers

 GRAPH500 Supercomputers

40 Theory of Computation

 Algorithmic algebra

 Approximation algorithms

 Coding theory

 Combinatorial geometry

 Computational geometry

(23)

 Computational topology

 Randomized algorithms

41 Continuous and Discrete optimization

 Network optimization

 Integer programming

 Combinatorial optimization

 Matroid theory

 Stochastic optimization

 Portfolio optimization

42 Web of Things

 Embedded Web Resources

 Ubiquitous computing

 Distributed systems

 Cyber-physical systems

 Pervasive computing

 Embedded systems

43 Simulation and Modeling

 Multi-resolution Modeling

 Agent Based Modeling

 Modeling and Simulation techniques

44 Cyber Law and Ethics

 Cyber Forensic

 Cyber Law and Crime

 Cyberethics

 Intellectual property rights

 Digital rights management (DRM)

 Accessibility, censorship and filtering

45 Expert systems  Knowledge management System

 Knowledge Discovery

(24)

 Intelligent Decision Support Systems

46 Human Computer Interaction

 Gesture Recognition

 Input Devices and Interaction

Techniques for Advanced Computing

 Gestural Input

 New Human-Computer Interaction Techniques

47 Natural Language Processing

 Text Mining

 Detecting and Extracting Events

 Interactive Learning for Semantic Parsing

48 Computer Forensic

 Cyber Crime and Cyber Security

 Cyber Forensic

 Security Vulnerabilities

 Ethical Hacking

49 Context-aware Systems

 Context-aware Security

 Context-aware mobile computing

 Context-aware Search

50 Advanced Graphics and Computer Games

 Photorealism - the future of video game visuals

 Virtual Reality

 Augmented Reality

 Games in e-learning

(25)

TIPS FOR GOOD SEMINAR PRESENTATION

Preparation

 Attend some presentations by others and write a report on each of the presentations you attended. Pay extra attention to what impressed you and what did not. Share the report with your mentor.

 Think of an important and interesting topic for your own presentation. It should be compatible with the level of the audience.

 Before the presentation, try to familiarize yourself with the room, the computer system, laser pointers etc.

Organization

 Title- should not be too long and should not contain acronyms that many people may not be familiar with. It should provide a glimpse into your presentation in a short sentence.

 Your name, affiliation and position, email address

 Outline

 Main body of the presentation. Do not make the slides too crowded. Make the first couple of slides fairly easy. It will help ease the early nervousness.

 Conclusions

Delivery Style

 Say a few words to thank the organizers for the opportunity to make a presentation.

 Use computer presentation.

(26)

 Do not use too many colors or too much technology.

Generally three colors are ideal.

 Use graphs and illustrations.

 Maintain a level of professionalism. Do not try to be too informal.

 Do not stretch the presentation beyond the allotted time.

 Allow audience time to ask questions. In fact you should invite questions.

Mannerism

 Dress professionally.

 Do not use lazy posture.

 Maintain eye contact with all sections of the audience.

 Do not show irritation with any question from the audience.

Remain polite.

 If you do not know the answer to a question, do not try to

pretend that you know it. Say something like “I have not

thought about it”.

(27)

APPENDIX-I

Template for IEEE-paper format

You may use any of the below given samples of IEEE-paper format for preparation of your technical paper.

https://www.ieee.org/documents/trans_jour.docx

www.amity.edu/aiit/icrito2013/ieee-format.doc

https://www.ieee.org/documents/Transmag.doc

(28)

APPENDIX-II Template for the Index of Lab File

S.

NO. ACITIVITIES SCHEDULED

DATE

DATE OF SUBMISSION

SIGNATURE OF THE TEACHER

REMARKS

1.

PRESENTATION #1

TOPIC:

ACTIVITIES Topic Registration Abstract Submission Paper Submission Presentation

2.

PRESENTATION #2 TOPIC:

ACTIVITIES Topic Registration Abstract Submission Paper Submission Presentation

3.

PRESENTATION #3

TOPIC:

ACTIVITIES Topic Registration Abstract Submission Paper Submission Presentation

References

Related documents

 To help students develop technical paper writing skill, which includes planning, gathering relevant information, drafting, editing and revising to quality standards,

 To help students develop technical paper writing skill, which includes planning, gathering relevant information, drafting, editing and revising to quality

 To help the students in learning the concepts of functions in C++.  To help the students in implementing and handling about writing your own functions with the help

 To help students develop technical paper writing skill, which includes planning, gathering relevant information, drafting, editing and revising to quality

(2-}ifl)i7)1siBtma)OittT aBiSae-oraexow oJoocaiglRA <YjooT<yl s i g j oignBOD aj1iy1<fl.oo (vj(Dafij>rnAoej« mnnog^ onanjsis ((^lca>s>aj§

(2003) Play and Learn Football, Khel Sahity Kendra, New Delhi. 3) Skill School Training Manual: Fundamental Ball Skills. US Youth Soccer Technical Department Widdows, R.

These culture experiments have been done by introducing Vagments of the seed rhSterial in the twists of coir ropes which are fabricated in the form of 5 x 2 metre size nets and

1.2 Subject to the provisions of the Act, all citizens shall have the right to information and Section 4(1) (b) of the Act casts an obligation on each public authority to publish a