| Home | Sign up! | Projects | Seminars | Research Notes | Today's Lecture | About |
Seminars (50):

Seminar ID: 60
Course: Topology
Topic: Poincare's Model of Hyperbolic Geometry
Description: The object of this seminar is to explore Poincare's model of hyperbolic geometry as a perfectly consistent alternative to the usual Euclidean geometry we learn in school (all those theorems about congruent triangles ABC!). If you think about it, one is fre ...

Seminar ID: 58
Course: Database Design
Topic: MySQL's Full-Text Search Feature
Description: For anybody who wishes to make MySQL as the backend for a database driven website, here's a very cool application.

It's called the full-text search feature. And it is exactly what it sounds like. MySQL can, just by way of a query, prove to be a ...

Seminar ID: 57
Course: MS Project
Topic: Some conversations with Eliza
Description: Conversation 1

User: Who are you, Eliza?
User: Are you a machine?
User: yes
Eliza: I SEE
User: Are you offended?

Seminar ID: 56
Course: Algorithm Design II
Topic: N Queens Problem
Description: In chess, a queen can move as far as she pleases, horizontally, vertically, or diagonally. A conventional chess board has 8 rows and 8 columns. But when a mathematician looks at a problem like this one, then he always likes to generalize it. The standard N ...

Seminar ID: 55
Course: Algorithm Design - II
Topic: Knight’s Tour Problem
Description: This problem asks you to place a knight any place you like on a chess board and then move it around the board so that you visit each position on the board exactly once. A re-entrant tour requires that you are able to get back to the starting square ...

Seminar ID: 54
Course: Algorithm Design - II
Topic: Fermat's Little Theorem
Description: Fermat's little theorem states that if p is a prime number, then for any integer n, p divides np-n. This means that if you take some number n, multiply it by itself p times and subtract n, the result is divisib ...

Seminar ID: 53
Course: Algorithm Design II
Topic: Mersenne Primes
Description: Many early writers felt that the numbers of the form 2^n-1 were prime for all primes n, but in 1536 Hudalricus Regius showed that 2^11-1 = 2047 was not prime (it is 23.89). By 1603 Pietro Cataldi had correctly verified that 2^17-1 and 2^19-1 were both prim ...

Seminar ID: 52
Course: Probability & Statistics
Topic: The Prisoner's Dilemma
Description: Cooperation is usually analyzed in game theory by means of a non-zero-sum game called the "Prisoner's Dilemma" (Axelrod, 1984).

How did the game get its name?
The game got its name from the following hypothetical situat ...

Seminar ID: 51
Course: Computer Networks
Topic: Client - Server Application
Description: I demonstrated a Client - Server chat application that I designed using Java. The Client and the Server are both run from the command prompt. During the seminar the application was run on the local host IP ADDRESS However, the application can be ...

Seminar ID: 50
Course: Algorithm Design - II
Topic: The Mandelbrot Set
Description: The Mandelbrot set was named after the mathematician Benoit Mandelbrot. The Mandelbrot set is one of the most famous examples of a fractal and the process of generating it is based on an extremely simple equation involving complex numbers.

The M ...

Seminar ID: 49
Course: MS Project
Topic: MS Project - Progress Report II
Description: I presented a seminar on Jan. 15, '04 to apprise the faculty supervisor and classmates of the progress made on my MS Project pertaining to Data Mining. The following is a brief description of the things discussed in the seminar:

When it c ...

Seminar ID: 48
Course: Computer Networks
Topic: Hamming codes ( Error Detection & correction Codes)
Description: Hamming Code for Error Detection & Correction Codes was invented by Richard Hamming. This error detection and Correction method detects and corrects a single-bit error.
Hamming Code Algorithm-
While transmitting the data-
1. Tak ...

Seminar ID: 47
Course: Computer Networks
Topic: Fourier Series
Description: Generally it is the physical layer through which data is transmitted from one computer to the other. Wires are attached to the physical layer. For example if we have to transmit the letter b, the ASCII CODE is 98. We will convert it into binary, i.e. 1 mu ...

Seminar ID: 46
Course: MS Project
Topic: Neural Networks

Seminar 2: I gave a seminar on Hamming Networks and talked about the Feedforward and Recurrent layers. I also explained how Hamming Networks work in context to my orange/apple sorter. ...

Seminar ID: 45
Course: Algorithm Design II
Topic: Magic Squares
Description: A Magic Square is an arrangement of the distinct positive integers 1, 2, ..., n2 such that the sum of all the rows, columns and main diagonals is always the same number.

This Number that all Rows, C ...

Seminar ID: 44
Course: Algorithm Design-II
Topic: Monty Hall Paradox
The Game:
Monty Hall's game show Let's Make A Deal took place sometime during the seventies. Imagine that the set of Monty Hall's game show has three closed doors. Behind one of these doors is a car; behind th ...

Seminar ID: 43
Course: Information Systems
Topic: The Enigma Cipher
Description: Gunjan and I gave a seminar on Enigma Cipher. We started by giving an introduction to Substitution Cipher
Substitution Cipher : It involves substituting one letter for another according to some rule. This is the principle underlying ...

Seminar ID: 42
Course: Database Systems
Topic: Database Security
Description: Rachit Bhatia and I presented a seminar on Database Security in which we covered the following areas:
Introduction Database Security refers to the protection of data against unauthorized disclosure, alteration or destruction.

Seminar ID: 41
Course: Database Systems
Topic: Why Are There Exactly 5 Platonic Solids?
Description: Proof: Take any Platonic Solid.
  • Face is some regular polygon or n-gon with r edges meeting at each vertex. So n>=3 and r>=3.
  • Count the Edges: N*F=2E( Because each edges makes 2 faces so each edge is counted twice in n*F).
  • Le ...

Seminar ID: 40
Course: Database Systems
Topic: Firewalls (To be given)
Description: A Firewall is the combination of the two words Fire and Wall, as it is a wall that generates heat or fire to protect the system from the outside world.
  1. Need of Firewalls
  2. What are Firewalls ?
  3. Firewalls Design ...

Seminar ID: 39
Course: Information Systems
Topic: Complexity
Description: This was the second seminar presented by me along with my partner Atika Shirkot. As mentioned in the earlier seminar description, "Complexity" is linked to the concept of "Towers of Hanoi".
During the course of this seminar, we first explained what ...

Seminar ID: 38
Course: Information Systems
Topic: Towers of Hanoi
Description: This seminar on "Towers of Hanoi" was given by me along with Atika Shirkot as my partner.Towers of Hanoi is basically a game which has a legend associated with it i.e." How can the hermits shift 64 discs from one peg (source) to the third peg (destination) ...

Seminar ID: 37
Course: Information Systems
Topic: Algorithms and Number Theory
Description: Ankit and I gave a seminar on algorithms and number theory. We covered the following topics.
  • Perfect Numbers.
  • Amicable Numbers.
  • Goldbach conjecture.
  • Mersenne Primes.
  • How to swap two values without using ...

Seminar ID: 36
Course: Database Systems
Topic: MySQL Queries
Description: Ankit and I gave a seminar on following SQL queries.
  • Update
  • Insert
  • Where
  • Alter

Seminar ID: 35
Course: Information Systems
Topic: Seven bridges of Königsberg
Description: This seminar was given by me and my group partner Dev Agarwal on November 20, 2003:

Historical Problem:

In the town of Koenigsberg there was a river with two islands and seven bridges. Each Sunday people would go for a ...

Seminar ID: 33
Course: Database Systems
Topic: Flexible Reporting
Description: I will present a seminar on this topic. Basically flexible reporting is where the user requires reports: There are two types of Reprting a)Uniform Reporting Perfomance:This reporting performance be not sigificantly degraded by increasing the number of ...

Seminar ID: 29
Course: Probability and Statistics
Topic: Control Charts
Description: This was one of the seminars under our main project - Quality Control. I worked upon all the kinds of control charts, variations (common and special), structure of control charts, basic assumptions and gave the procedure behind the application of control c ...

Seminar ID: 28
Course: Probability and Statistics
Topic: Deming
Description: This is yet another part of the project undertaken by me and Ashish. Here we concentrated on Deming (the Father of Quality Control), his short biography and his famous 14-points:
  • 1."Create constancy of purpose towards improvement". Replace short ...

Seminar ID: 27
Course: MS Project
Topic: Eliza Program
Description: Presentation of Weizenbaum's paper on "ELIZA -- A Computer Program For the Study of Natural Language Communication Between Man and Machine" to the class.
  • How Eliza works:
    • User gives input statement S.
    • ...

Seminar ID: 25
Course: Information Systems
Topic: Euler`s Formula
Description: Jasdeep and I had given a seminar on Euler’s Formula and further on the basis of Euler`s Formula we had proved why there are exactly 5 Platonic solids.
First We will prove Euler’s Formula which is V + F - E = 2. (where E=Edges, V=Vertices and ...

Seminar ID: 24
Course: Database Systems
Topic: SSL, FTP and Certificates
Description: Jasdeep and I gave this Seminar on 6th November, 2003.
SSL stands for Secure Socket Layer Protocol. This was created by Netscape in order to secure all possible transactions between the servers and the Browsers
Certificate: A certificate, con ...

Seminar ID: 23
Course: Database Systems
Topic: Error Detection and Correction Codes
Description: Seminar by-Deepika Saxena and Kulmeet K.

While transmission of data, due to certain reasons data is lost or data transmitted generates errors and incorrect data reaches the destination.To detect these errors error detection codes are used.As the erro ...

Seminar ID: 22
Course: Database Systems
Topic: Oracle (2)
Description: My partner Hartajinder Singh Bindra and I presented a seminar on Oracle. My partner started the seminar by talking about Oracle and its products.It was then my turn to show everyone how to create a table on Oracle.
In the AIT lab, the user ID is s ...

Seminar ID: 19
Course: Database Systems
Topic: Cascading Style Sheets
Description: Rachit Bhatia and I presented a seminar on CSS (Cascading Style Sheets). These are few of the dimensions on this topic that we had covered during the seminar.

What do they do?
Cascading Style Sheets are a way to separate the ...

Seminar ID: 18
Course: Database Systems
Topic: Oracle
Description: The seminar consisted of two parts. The first part started with an introduction to "Oracle as a company."Then I showed the advancements of Oracle through the passage of time and how it became the Oracle we know today.I talked about its product features whi ...

Seminar ID: 17
Course: Information Systems
Topic: SSL and FTP
Description: Dev Agarwal and I presented this seminar on 6th November, 2003.

SSL: Digital certificates encrypt data using Secure Sockets Layer (SSL) technology, the industry-standard method for protecting web communications developed by Netscape Communicatio ...

Seminar ID: 16
Course: Database Systems
Topic: Error Correcting Codes
Description: Consider a Hamming code to detect and correct for single-bit errors assuming each codeword contains a seven-bit data field, e.g. an ASCII character.
for example. Such a coding scheme requires four check bits since, with this scheme, the check bits occu ...

Seminar ID: 15
Course: Database Systems
Topic: MS Project - Progress Report I
Description: Data mining refers to extracting or ‘mining’ interesting knowledge from large amounts of data.

Some other terms:
  • knowledge mining from databases, or
  • knowledge extraction, or
  • data/pattern anal ...

Seminar ID: 14
Course: Java Programming
Topic: Artificial Neural Network
Description: A seminar on what exactly are ANN's and what are the things that go into the making of ANN's. An absolutely riveting topic.Those interested should also read PREY a sci-fi novel by Micheal Crichton. ...

Seminar ID: 12
Course: Information Systems
Topic: Tim Berners Lee's Invention
Description: Tim Berners Lee is the inventer of WWW (World Wide Web) i.e the internet and also HTML (Hyper Text Markup Language). He is one of the inventers who did not take credit for his work. he is has invented a technology which is being logged everyday by billions ...

Seminar ID: 11
Course: Information Systems
Topic: Queuing Theory
Description: I will be giving a seminar on queuing theory which will explain the relation in the increament and decreament of queus.simple examples will be taken explaining the topic.My partners are mayank bhargav and sharat sirohi.This will be given on 3/11/03. ...

Seminar ID: 10
Course: Information Systems
Topic: Queuing Theory
Description: I will be giving a seminar on queuing theory along with shantanu chikara and mayank bhargav on coming monday(3/11/03).we will be explaining this concept using simple examples. eg: Railway ticket counter. ...

Seminar ID: 9
Course: Information Systems
Topic: Towers of Hanoi
Description: This seminar on "Towers of Hanoi" was given by me along with Superna Sharma as my partner.Towers of Hanoi is basically a game which has a legend associated with it i.e." How can the hermits shift 64 discs from one peg (source) to the third peg (destination ...

Seminar ID: 8
Course: MS Project
Topic: RSA Encryption
Description: My seminar will basically include information about my project .I'll be highlighting the calculations involved in the compuation of 128 bit pattern.The mathematical calculations used will work towards making the encryption formula simpler and increase the ...

Seminar ID: 7
Course: MS Project
Topic: Neural Networks

Seminar 1: I have given a seminar on Neural Networks in which I explained the neural network, its history and also about the different types of neural networks.

I also talked about my project and explained how the neural network will so ...

Seminar ID: 6
Course: Information Systems
Topic: Queuing theory
Description: The topic of my seminar was Queuing theory. In my seminar I covered Queues and their types. I also mentioned applications of queues. I also made a programme which demonstrates the concept of queues.
I think the response from the audience was very good ...

Seminar ID: 5
Course: Information Systems
Topic: Turing Machines
Description: (With Sudeep Tomar) We talked about the computer scientist, mathematician and visionary Alan Turing. We explained the concept and demonstrated an actual Turing Machine for Addition (C++ source code was provided by Ashay Sir). The following picture shows th ...

Seminar ID: 4
Course: Information Systems
Topic: Dennis Ritchie
Description: Dennis Ritchie works in the Computing Sciences Research Center of Bell Labs. He developed the C programming language and the UNIX operating system. When he joined in 1967, Bell Labs was a corporation jointly owned by American Telephone and Telegraph Compan ...

Seminar ID: 2
Course: Probability and Statistics
Topic: Buffon's Needle
Description: Buffon's needle is a classic experiment in the field of Geometric Probability Theory.

A needle of length 1 is thrown on a floor made of planks of width 2. The problem is to determine the probability p of the event that the needle will fall acro ...

Seminar ID: 1
Course: Database Systems
Topic: Example - RSA Encryption
Description: In reality, we would secretly select two very large primes P and Q. For illustration, we
  • Select prime P=5
  • Select prime Q=7
  • Find E such that gcd(E,(P-1)*(Q-1))=1 and E%2!=0: Found E=5
  • Find D such that ...

Number of queries performed on the database: 273529

Database last updated on Wednesday, 26th March 2014, 04:23:01 PM

Prof. Ashay Dharwadker