Lab Manual
B.Sc. (CA)
SEMESTER - VI
DEPARTMENT OF COMPUTER SCIENCE CCB-6S1: VIVA
ALIGARH MUSLIM UNIVERSITY ALIGARH
2019
Look forward, learn modern knowledge, and
do not waste time in studies of old subjects of
no values.
CREDITS
Lab Manual Design Committee:
Prof. Mohammad Ubaidullah Bokhari
Dr. Arman Rasool Faridi
Dr. Faisal Anwar
Dr. Aasim Zafar (Convener)
Editor:
Dr. Aasim Zafar
Design & Compilation:
Mr. Sunil Kumar Sharma
First Edition: July 2017
Approved by BoS, Dated– 31/07/2017
Department of Computer Science, A.M.U., Aligarh, (U.P.), India
Lab Manual – Viva (CCB-6S1)
Course Description 3
Content 3
Objectives 3
Outcomes 4
Rules and Regulations 5
Topics for 1
stPresentation 8
Topics for 2
ndand 3
rdPresentation 14
Tips for Good Seminar Presentation 24
Appendix- I: Template for IEEE-paper format 26
Appendix- II: Template for the Index of Lab File 27
COURSE TITLE: Viva COURSE CODE: CCB – 6S1
CREDIT: 2 PERIODS PER WEEK: 3
CONTINUOUS ASSESSMENT: 40 EXAM: 60
COURSE DESCRIPTION
Application of classroom knowledge and skills in computer science to develop research, technical writing and presentation skills.
CONTENT
This course consists of technical paper writing, which includes planning, gathering relevant information, drafting, editing and revising to quality standards, and, where appropriate, research methods and appropriate citation of sources. Further, it helps in preparing and organizing the seminar presentation using the concepts of ordering and determining the central, main and supporting ideas.
OBJECTIVES
To help students develop technical paper writing skill, which includes planning, gathering relevant information, drafting, editing and revising to quality standards, and, where appropriate, research methods and appropriate citation of sources.
To help students plan their seminar presentation by determining audience needs, and defining presentation purpose.
To help students plan and organize the presentation using the concepts of ordering and determining the central, main and supporting ideas.
To help students in writing the introduction and conclusion of the
presentation.
To help students identify the benefits and uses of multimedia aids in enhancing the presentation.
Use effective verbal and non-verbal techniques when making a presentation.
To help students effectively field questions and elicit feedback from the audience.
To help students gain feedback from peers and the mentor/teacher that will identify strengths and areas for improvement.
OUTCOMES
After completing this course, the students will be able to:
Effectively produce technical paper for communication and seminar presentation.
Effectively design documents for presentation, printing and other electronic means of communication in order to construct documents meaningful to the audience.
Effectively use standard formats/templates to construct meaningful documents.
Use multimedia items in effectively constructing meaning in communication situations.
Effectively negotiate the process of completing technical documents i.e. planning, drafting, editing and revising to quality standards, and, where appropriate, research methods and appropriate citation of sources.
Identify strengths and weaknesses.
RULES AND REGULATIONS
Students are required to strictly adhere to the following rules:
Students are required to give THREE presentations individually during this course.
1
stPresentation: Students may choose any topic of their interest for giving first presentation.
2
ndPresentation: Students are required to select any topic out of a pool of topics given by the teacher. The topics would be allotted on first-come-first serve basis.
3
rdPresentation: Students will have to select anyone topic out of given options related to their topic of 2
ndPresentation.
Deliverables: For all the three presentations, the students are required to submit the hard and soft copies of the followings:
Synopsis /Abstract
Technical Paper (4-6 pages) in IEEE-paper format (Appendix-I)
Presentation in PDF format
The same will be maintained in Lab File by the students in the prescribed format (Appendix-II).
After finalizing the topic for presentation, the student needs to get it registered to the teacher in-charge. The student would be assigned a mentor, whom the students may consult and take help from while preparing the synopsis/abstract, writing the paper and finalizing the PPT.
The students are required to prepare Synopsis/Abstract of the
paper, and get it approved by the concerned mentor/teacher.
Once the Synopsis/Abstract is approved, the students are required to write technical paper on the topic in continuous guidance of the concerned mentor/teacher. Once the paper is finalized and approved by the mentor/teacher concerned, students would prepare PPT for presentation.
There will be Zero tolerance for plagiarism. Students will be making extensive use of external references for their paper/presentation, and should be vigilant in maintaining high standards with regard to attribution and avoidance of plagiarism. If there are questions about how to deal with any such matters, the student should discuss the matter with the teacher/mentor concerned to make sure there are no misunderstandings.
All the resources used should properly be referenced in the given format.
Students are advised to carry on all the activities, related to three presentations, in parallel. For example, while working on Presentation#1, you may finalize and register the topic(s) for Presentation#2 and/or Presentation#3. Thereafter, relevant resources/materials may be gathered and discussed with the teacher concerned for timely start and completion of the Paper writing and PPT preparation.
Presentation will be held as per notified schedule.
Attendance Policy: Attendance is vital for this class, since
discussions and regular oral presentations and progress reports
will have a strong impact on the ability to complete the assigned
task in time. You may be dropped from the course for missing
more than two consecutive scheduled meetings.
Late Policy: Late work will not be accepted. Make arrangements with the teacher/mentor to turn in assigned task/work early if you will not be in class on the due date.
At least TWO timely presentations along with all related documents are compulsory; failing which students would not be allowed to appear in the final exam or viva-voce for this course.
Final Submission of Lab File: Lab File consisting of all the deliverables are due on the last day of class before final week.
Evaluation would be done on the basis of :
Timely submission of Abstract/Paper/PPT (20%)
Quality and Originality of content (50%)
Presentation skills (30%)
TOPICS FOR 1
STPRESENTATION
Students may choose any topic of their interest related to Computer Science, Information System, Information Technology and/or recent developments in field of CS&IT for giving their first presentation. The topics may be related to the followings, but not limited to:
3D Internet
3D Printing
3G-vs-WiFi
4G Technology
4G Wireless System
5 Pen PC Technology
5G Technology
5G Wireless Technology
Advanced Queue Management Techniques
Advancement in inverter technology for industrial application
Agent Oriented Programming
Agile Methodology
Aircraft GPS Tracking
Ajax Technology
Anatomy and working of search engines
Android
Android 7.0 Nougat features
Anti-HIV using nanorobots
Apache Hadoop introduction
AppleTalk
Application of Genetic Algorithms in Network routing
Application of LED for Domestic Applications
Application of microcontroller in vehicle monitoring and security system
Applications of Graph Theory to Metabolic Pathways
Applications of Soft Computing in Medical Image Analysis
Aqua communication using modem
ARQ Schemes for Wireless Data Communications
Artificial Eye
Artificial immune system
Artificial Intelligence (AI)
Artificial intelligence for speech recognition
Artificial Intelligence in Machines
Artificial intelligence on expert systems
Artificial Neural Network (ANN)
Aspects of Database Security and Program Security
Asynchronous Chips
Attacks on Smart Cards
Attendance Monitoring Intelligent Classroom
Augmented Reality
Augmented Reality vs Virtual Reality
Authentication and securing the systems
Automated network address assignment
Automatic Conveyor for Industrial Automation
Automatic device driver synthesis and verification
Automatic Mobile Recharger Station
Automatic number plate recognition
Automatic number plate recognition
Automatic sound-based user grouping for real-time online forums
Automatic Video Surveillance Systems
Autonomic Computing
Backup and Recovery planning
Big Data
Biochips
Bio-computers/Bimolecular Computers
Biomass gasifier for thermal and electrical applications
Biomedical instrumentation and signal analysis
Biometric Authentication Technology
Biometric Security System
Biometrics-Based Authentication
Blackberry Technology
Blue Brain
Blue Eyes Technology
Blue Gene
Blue ray Disc
Bluejacking
Bluetooth Technology
Brain Computer Interface (BCI)
Brain port device
Brain-controlled car for disabled using artificial intelligence
Braingate technology
CAD/CAM
Carbon Nano Technology
Client Server Architecture
Cloud Computing
Cluster computing
Common Gateway Interface (CGI)
Computer Forensics
Computer Networks
Computer Peripheral
Computer Virus
Concurrent Programming and Parallel distributed O.S.
Conditional Access System
CORBA
Cross Platform Component Object Model
Cryptography
Cryptography and Network Security
Cyber Crime
Cyber Crime and Security
Daknet
Data Management in Sensor Networks
Data Mining
Data Mining concepts & model
Data over Cable Service (DOCSIS)
Data Storage On Fingernail
Data Warehousing
Database Management System (DBMS)
Datagram Congestion Control Protocol (DCCP)
Deploying a wireless sensor network on an active volcano
Detection of digital photo image forgery
Detection of Reviews using sentiment analysis
Diamond Chip
Digital Cinema
Digital Jewellery
Digital Light Processing
Digital Signature
Digital Watermarking
Direct Memory Access (DMA)
Distributed Computing
Distributed denial-of-service attack (DDoS)
Distributed Systems
DNA Computing
Domain Name System (DNS)
E-ball Technology
Embedded Systems
Enterprise Resource Planning (ERP)
E-Paper Technology
Extreme Programming (EP)
FERROELECTRIC RAM (FRAM)
Firewall
Free net
Futex
Generations of Computer
Genetic Engineering
Gi-Fi Technology
Google App Engine
Google Chrome OS
Google Glass
Google Wave
Graphics Processing Unit (GPU)
Green Computing
Grid Computing
GSM (Global System for Mobile Communications)
GSM Security And Encryption
Hadoop
History of Computers
Holographic Memory
HTML/XML
Human Computer Interface
Humanoid Robots
Image Processing
Indian Regional Navigation Satellite System (IRNSS)
Interferometric Modulator (IMOD)
Intrusion Detection Systems (IDS)
Invisibility Cloaks
IP Spoofing
IP Telephony
iPad
iPhone
Java
Java Ring
Jini Technology
Kerberos
LAMP Technology
Linux Operating Systems
Login application in Java using MVC architecture and MySQL database
Meta Search Engine
Microsoft Surface
Middleware Technologies
Mind Reading
Mobile Computing
Mobile Jammer
Mobile Number Portability (MNP)
Mobile Phone Cloning
Nanomaterials
Nanoparticles
Nanotechnology
Network Security
Network Topology
Night Vision Technology
Object Oriented Programming (OOP)
Online Voting System
Online/Internet Marketing
Operating System
Optical Coherence Tomography
Phishing
Pill Camera
Podcast
Polymer Memory
Project Loon
Quantum Computing
Random Access Memory (RAM)
Restful Web Services
Robotics
Rover Technology
Satrack
SDLC (Software Development life cycle)
Search Engine
Search Engine Optimization(SEO)
Service Oriented Architecture (SOA)
Sixth Sense Technology
Smart Fabrics
Smart Grid
Smart Memories
SNMP
Software Reuse
Software Testing
Space Mouse
Speech Processing
Speech Recognition
Steganography
Storage Area Network (SAN)
Tidal Energy
Tizen Operating System – One OS for everything
Tripwire
Universal Serial Bus (USB)
UNIX Operating System
Virtual Private Network (VPN)
Virus and Anti Viruses
Voice over Internet Protocol (VoIP)
Wearable Computing
Web Services on Mobile Platform
Wibree
WIMAX
Wireless Application Protocol
Wireless Communication
Wireless Fidelity
Wireless Mesh Network
Wireless Sensor Networks (WSN)
X-MAX Technology
Zigbee
TOPICS FOR 2
ND& 3
RDPRESENTATIONS
S.
No.
TOPICS FOR 2
ndPRESENTATION
RELATED TOPICS FOR 3
rdPRESENTATION
1 Trends in e-Commerce and e- Business
E-Government & E-Governance,
Health Service Management & E- Health
Future Trends and Issues in e- Learning
Security, Privacy and Trust for e- Service
Enterprise Systems Security
2 Internet of Things
Internet of Things Security
Wireless Sensor Networks
Smartphone and Mobile Applications Security
Security of Web-based Applications and Services
Data Management in Sensor Networks
3 Network Security
Intrusion Detection and Prevention
Cryptography and Privacy
Ad-hoc Networks Security
Pretty Good Privacy (PGP) and Email Security
4 Web Security Social Network Security
Bluetooth Technology Security
SSL-The Secure Sockets Layer
Cyber Defense & Information Technology
5 Information Hiding and Digital Forensics
Wireless Network Security
Wireless Surveillance
Fraud and Cyber crime Control
Cyber Crime and Security
6 Information Retrieval
Web Search: Technical and Social Issues
Web mining
Google Search Engine Algorithms
Hummingbird algorithm
Hyper-induced topic search
7 Grid & Cloud Computing
Cloud Computing Techniques for Big Data
Grid and Cloud Applications Security
Cloud/Grid/Stream Data Mining- Big Velocity Data
Fog Computing
8 Free and Open Software Systems
IPR and Legal Implications in Open Systems
Business Models & Strategies in Open Systems
Innovation in Open Systems
Case studies of Open Systems deployment and migration models
Big Data Open Platforms
9 Big Data Computing
Novel Theoretical Models for Big Data
New Computational Models for Big Data
Data and Information Quality for Big Data
New Data Standards
Big Data Applications in smart cities, Healthcare and Transportation
10 Stream Computing for Big Data
High Performance/Parallel
Computing Platforms for Big Data
Energy-efficient Computing for Big Data
Programming Models and
Environments for Cluster, Cloud, and Grid Computing to Support Big Data
Software Techniques and
Architectures in Cloud/Grid/Stream Computing
New Programming Models for Big Data beyond Hadoop/MapReduce, STORM
Software Systems to Support Big Data Computing
11 Data Analytics and Visualization
Visualization Analytics for Big Data
Big Data Analytics in Small Business Enterprises (SMEs),
Big Data Analytics and Metrics
12 Business Intelligence
Data Mining
Data Analytics Models
e-business and New Media
Future Trends and Issues in Data Analytics
13 Machine Learning
Machine learning based on Big Data
Adaptive websites
Affective computing.
Bioinformatics
Cheminformatics
Computer vision, including object recognition.
14 Infrastructure, Architecture and Tools for e-Management
Innovative Models in e-Management
e-Payment Systems
Future Trends and Issues in e- Management
Digital Waste/e-Waste Management
15 Technological details of RFID System
Logistics, Transport and Traffic Management
Inventory Management
RFID Security and Privacy
16 Mobile networking technologies
4G Broadband Technology
GSM and WCDMA
GSM Security And Encryption
Location Based Systems as Context- aware Systems
18 Digital Signatures
Authentication protocols
Management of Public keys
Authentication and Digital Signatures in Mobile Networks
19 Semantic Web
Ontologies and Semantic Web
Knowledge Representation in Semantic Web
Semantic Web Applications
20 Business Process Re- Engineering
Business Intelligence Tools &
Applications
Process modelling, management, assessment and improvement
Infrastructure and processes for iterative or incremental software delivery
21 Image Processing
Neural and Evolutionary Computing
Speech Recognition
Machine Reading of Handwritten Texts
22 Artificial Intelligence
Driverless cars
Intelligent computer games
Recommender systems
23 Imperative programming languages
Visual programming
Languages for mobiles
Animation
24 Wireless media/network
Li-Fi
5G technology
Satellites
25 Computer Multimedia
3D printing
Virtual reality
Social networking
26 Robotics
Google glass
Wearable computer
Blue brain
27 Computers in Agriculture Sector
GPS
Remote sensing
Radar
Weather forecasting
28 Social networking
Sentiment analysis
Social media optimization
Social media marketing
29 Artificial neural network
Supervised recurrent network Unsupervised self-organizing map
Swarm Intelligence
30 Support Vector Machine Behaviour of various Kernels
Non-binary classification using SVM
SVM Applications
31 Parallel computing
Parallel Computer Architecture - Models
Parallel Computing Applications
High Performance Computing
32 Social Network Analysis
Physiological analysis of social networking
Opinion mining
Social Network Analytics
33 Programming paradigm
Software Architecture Patterns
MVC architecture
Agile and Component-based software development methods
Aspect-oriented and Mashup software development methods
34 Remote Sensing
Geo-informatics
Spectral Imaging
Remote Sensing Applications
35 Algorithmic paradigms
Approximation algorithm
Metaheuristic algorithm
Dynamic Programming
Greedy Method
36 Bioinformatics Docking Algorithms
Molecular Evolution
Computational Intelligence Techniques in Bioinformatics
37 Quantum Computing
Quantum Algorithms
Quantum Complexity
Quantum Information Theory
Spin-based Quantum Information processing
Optical Quantum Information Processing
Quantum Cryptography
38 Cognitive Science
Systems Neuroscience
Cellular/Molecular neuroscience
Brain Research
Collective Intelligence
Human Cognition Information Processing
(Cognitive Processing)
Multiple Intelligences
Biologically-Inspired Computer Vision
39 Supercomputers
TOP500 Supercomputers
GREEN500 Supercomputers
GRAPH500 Supercomputers
40 Theory of Computation
Algorithmic algebra
Approximation algorithms
Coding theory
Combinatorial geometry
Computational geometry
Computational topology
Randomized algorithms
41 Continuous and Discrete optimization
Network optimization
Integer programming
Combinatorial optimization
Matroid theory
Stochastic optimization
Portfolio optimization
42 Web of Things
Embedded Web Resources
Ubiquitous computing
Distributed systems
Cyber-physical systems
Pervasive computing
Embedded systems
43 Simulation and Modeling
Multi-resolution Modeling
Agent Based Modeling
Modeling and Simulation techniques
44 Cyber Law and Ethics
Cyber Forensic
Cyber Law and Crime
Cyberethics
Intellectual property rights
Digital rights management (DRM)
Accessibility, censorship and filtering
45 Expert systems Knowledge management System
Knowledge Discovery
Intelligent Decision Support Systems
46 Human Computer Interaction
Gesture Recognition
Input Devices and Interaction
Techniques for Advanced Computing
Gestural Input
New Human-Computer Interaction Techniques
47 Natural Language Processing
Text Mining
Detecting and Extracting Events
Interactive Learning for Semantic Parsing
48 Computer Forensic
Cyber Crime and Cyber Security
Cyber Forensic
Security Vulnerabilities
Ethical Hacking
49 Context-aware Systems
Context-aware Security
Context-aware mobile computing
Context-aware Search
50 Advanced Graphics and Computer Games
Photorealism - the future of video game visuals
Virtual Reality
Augmented Reality
Games in e-learning
TIPS FOR GOOD SEMINAR PRESENTATION
Preparation
Attend some presentations by others and write a report on each of the presentations you attended. Pay extra attention to what impressed you and what did not. Share the report with your mentor.
Think of an important and interesting topic for your own presentation. It should be compatible with the level of the audience.
Before the presentation, try to familiarize yourself with the room, the computer system, laser pointers etc.
Organization
Title- should not be too long and should not contain acronyms that many people may not be familiar with. It should provide a glimpse into your presentation in a short sentence.
Your name, affiliation and position, email address
Outline
Main body of the presentation. Do not make the slides too crowded. Make the first couple of slides fairly easy. It will help ease the early nervousness.
Conclusions
Delivery Style
Say a few words to thank the organizers for the opportunity to make a presentation.
Use computer presentation.
Do not use too many colors or too much technology.
Generally three colors are ideal.
Use graphs and illustrations.
Maintain a level of professionalism. Do not try to be too informal.
Do not stretch the presentation beyond the allotted time.
Allow audience time to ask questions. In fact you should invite questions.
Mannerism
Dress professionally.
Do not use lazy posture.
Maintain eye contact with all sections of the audience.
Do not show irritation with any question from the audience.
Remain polite.
If you do not know the answer to a question, do not try to
pretend that you know it. Say something like “I have not
thought about it”.
APPENDIX-I
Template for IEEE-paper format
You may use any of the below given samples of IEEE-paper format for preparation of your technical paper.
https://www.ieee.org/documents/trans_jour.docx
www.amity.edu/aiit/icrito2013/ieee-format.doc
https://www.ieee.org/documents/Transmag.doc
APPENDIX-II Template for the Index of Lab File
S.
NO. ACITIVITIES SCHEDULED
DATE
DATE OF SUBMISSION
SIGNATURE OF THE TEACHER
REMARKS
1.
PRESENTATION #1
TOPIC:
ACTIVITIES Topic Registration Abstract Submission Paper Submission Presentation
2.
PRESENTATION #2 TOPIC:
ACTIVITIES Topic Registration Abstract Submission Paper Submission Presentation
3.
PRESENTATION #3
TOPIC:
ACTIVITIES Topic Registration Abstract Submission Paper Submission Presentation