 Home  Sign up!  Projects  Seminars  Research Notes  Today's Lecture  About 
Seminar ID: 60 Course: Topology Topic: Poincare's Model of Hyperbolic Geometry
 Description: The object of this seminar is to explore Poincare's model of hyperbolic geometry as a perfectly consistent alternative to the usual Euclidean geometry we learn in school (all those theorems about congruent triangles ABC!). If you think about it, one is fre ... 
Seminar ID: 58 Course: Database Design Topic: MySQL's FullText Search Feature
 Description: For anybody who wishes to make MySQL as the backend for a database driven website, here's a very cool application.
It's called the fulltext search feature. And it is exactly what it sounds like. MySQL can, just by way of a query, prove to be a ... 
Seminar ID: 57 Course: MS Project Topic: Some conversations with Eliza
 Description: Conversation 1
User: Who are you, Eliza?
Eliza: DOES THAT QUESTION INTEREST YOU?
User: Are you a machine?
Eliza: WOULD YOU PREFER IT IF I WERE NOT A MACHINE?
User: yes
Eliza: I SEE
User: Are you offended?
... 
Seminar ID: 56 Course: Algorithm Design II Topic: N Queens Problem
 Description: In chess, a queen can move as far as she pleases, horizontally, vertically, or diagonally. A conventional chess board has 8 rows and 8 columns. But when a mathematician looks at a problem like this one, then he always likes to generalize it. The standard N ... 
Seminar ID: 55 Course: Algorithm Design  II Topic: Knight’s Tour Problem
 Description: This problem asks you to place a knight any place you like on a chess board and then move it around the board so that you visit each position on the board exactly once. A reentrant tour requires that you are able to get back to the starting square ... 
Seminar ID: 54 Course: Algorithm Design  II Topic: Fermat's Little Theorem
 Description: Fermat's little theorem states that if p is a prime number, then for any integer n, p divides n^{p}n. This means that if you take some number n, multiply it by itself p times and subtract n, the result is divisib ... 
Seminar ID: 53 Course: Algorithm Design II Topic: Mersenne Primes
 Description: Many early writers felt that the numbers of the form 2^n1 were prime for all primes n, but in 1536 Hudalricus Regius showed that 2^111 = 2047 was not prime (it is 23.89). By 1603 Pietro Cataldi had correctly verified that 2^171 and 2^191 were both prim ... 
Seminar ID: 52 Course: Probability & Statistics Topic: The Prisoner's Dilemma
 Description: Cooperation is usually analyzed in game theory by means of a nonzerosum game called the "Prisoner's Dilemma" (Axelrod, 1984).
How did the game get its name?
The game got its name from the following hypothetical situat ... 
Seminar ID: 51 Course: Computer Networks Topic: Client  Server Application
 Description: I demonstrated a Client  Server chat application that I designed using Java. The Client and the Server are both run from the command prompt. During the seminar the application was run on the local host IP ADDRESS 127.0.0.1. However, the application can be ... 
Seminar ID: 50 Course: Algorithm Design  II Topic: The Mandelbrot Set
 Description: The Mandelbrot set was named after the mathematician Benoit Mandelbrot. The Mandelbrot set is one of the most famous examples of a fractal and the process of generating it is based on an extremely simple equation involving complex numbers.
The M ... 
Seminar ID: 49 Course: MS Project Topic: MS Project  Progress Report II
 Description: I presented a seminar on Jan. 15, '04 to apprise the faculty supervisor and classmates of the progress made on my MS Project pertaining to Data Mining. The following is a brief description of the things discussed in the seminar:
When it c ... 
Seminar ID: 48 Course: Computer Networks Topic: Hamming codes ( Error Detection & correction Codes)
 Description: Hamming Code for Error Detection & Correction Codes was invented by Richard Hamming. This error detection and Correction method detects and corrects a singlebit error. Hamming Code Algorithm While transmitting the data
1. Tak ... 
Seminar ID: 47 Course: Computer Networks Topic: Fourier Series
 Description: Generally it is the physical layer through which data is transmitted from one computer to the other. Wires are attached to the physical layer. For example if we have to transmit the letter b, the ASCII CODE is 98. We will convert
it into binary, i.e. 1 mu ... 
Seminar ID: 46 Course: MS Project Topic: Neural Networks
 Description:
Seminar 2: I gave a seminar on Hamming Networks and talked about the Feedforward and Recurrent layers. I also explained how Hamming Networks work in context to my orange/apple sorter. ... 
Seminar ID: 45 Course: Algorithm Design II Topic: Magic Squares
 Description: A Magic Square is an arrangement of the distinct positive integers 1, 2, ..., n^{2} such that the sum of all the rows, columns and main diagonals is always the same number.
This Number that all Rows, C ... 
Seminar ID: 44 Course: Algorithm DesignII Topic: Monty Hall Paradox
 Description: The Game:
Monty Hall's game show Let's Make A Deal took place sometime during the seventies. Imagine that the set of Monty Hall's game show has three closed doors. Behind one of these doors is a car; behind th ... 
Seminar ID: 43 Course: Information Systems Topic: The Enigma Cipher
 Description: Gunjan and I gave a seminar on Enigma Cipher. We started by giving an introduction to Substitution Cipher
Substitution Cipher : It involves substituting one letter for another according to some rule. This is the principle underlying ... 
Seminar ID: 42 Course: Database Systems Topic: Database Security
 Description: Rachit Bhatia and I presented a seminar on Database Security in which we covered the following areas:
Introduction
Database Security refers to the protection of data against unauthorized disclosure, alteration or destruction.

Seminar ID: 41 Course: Database Systems Topic: Why Are There Exactly 5 Platonic Solids?
 Description: Proof: Take any Platonic Solid.
 Face is some regular polygon or ngon with r edges meeting at each vertex.
So n>=3 and r>=3.
 Count the Edges:
N*F=2E( Because each edges makes 2 faces so each edge is counted twice in n*F).
 Le ...

Seminar ID: 40 Course: Database Systems Topic: Firewalls (To be given)
 Description: A Firewall is the combination of the two words Fire and Wall, as it is a wall that generates heat or fire to protect the system from the outside world.
 Need of Firewalls
 What are Firewalls ?
 Firewalls Design ...

Seminar ID: 39 Course: Information Systems Topic: Complexity
 Description: This was the second seminar presented by me along with my partner
Atika Shirkot. As mentioned in the earlier seminar description, "Complexity"
is linked to the concept of "Towers of Hanoi".
During the course of this seminar, we first explained what ... 
Seminar ID: 38 Course: Information Systems Topic: Towers of Hanoi
 Description: This seminar on "Towers of Hanoi" was given by me along with Atika Shirkot as my partner.Towers of Hanoi is basically a game which has a legend associated with it i.e." How can the hermits shift 64 discs from one peg (source) to the third peg (destination) ... 
Seminar ID: 37 Course: Information Systems Topic: Algorithms and Number Theory
 Description: Ankit and I gave a seminar on algorithms and number theory. We covered the following topics.
 Perfect Numbers.
 Amicable Numbers.
 Goldbach conjecture.
 Mersenne Primes.
 How to swap two values without using ...

Seminar ID: 36 Course: Database Systems Topic: MySQL Queries
 Description: Ankit and I gave a seminar on following SQL queries.
 Update
 Insert
 Where
 Alter
... 
Seminar ID: 35 Course: Information Systems Topic: Seven bridges of Königsberg
 Description: This seminar was given by me and my group partner Dev Agarwal on November 20, 2003:
Historical Problem:
In the town of Koenigsberg there was a river with two islands and seven bridges.
Each Sunday people would go for a ... 
Seminar ID: 33 Course: Database Systems Topic: Flexible Reporting
 Description: I will present a seminar on this topic. Basically
flexible reporting is where the user requires reports:
There are two types of Reprting
a)Uniform Reporting Perfomance:This reporting performance be not sigificantly degraded by increasing the number of ... 
Seminar ID: 29 Course: Probability and Statistics Topic: Control Charts
 Description: This was one of the seminars under our main project  Quality Control. I worked upon all the kinds of control charts, variations (common and special), structure of control charts, basic assumptions and gave the procedure behind the application of control c ... 
Seminar ID: 28 Course: Probability and Statistics Topic: Deming
 Description: This is yet another part of the project undertaken by me and Ashish. Here we concentrated on Deming (the Father of Quality Control), his short biography and his famous 14points:
 1."Create constancy of purpose towards improvement". Replace short ...

Seminar ID: 27 Course: MS Project Topic: Eliza Program
 Description: Presentation of Weizenbaum's paper on "ELIZA  A Computer Program For the Study of Natural Language Communication Between Man and Machine" to the class.

How Eliza works:

User gives input statement S.

...

Seminar ID: 25 Course: Information Systems Topic: Euler`s Formula
 Description: Jasdeep and I had given a seminar on Euler’s Formula and further on the basis of Euler`s Formula we had proved why there are exactly 5 Platonic solids.
First We will prove Euler’s Formula which is
V + F  E = 2. (where E=Edges, V=Vertices and F = ... 
Seminar ID: 24 Course: Database Systems Topic: SSL, FTP and Certificates
 Description: Jasdeep and I gave this Seminar on 6th November, 2003.
SSL stands for Secure Socket Layer Protocol. This was created by Netscape in order to secure all possible transactions between the servers and the Browsers
Certificate: A certificate, con ... 
Seminar ID: 23 Course: Database Systems Topic: Error Detection and Correction Codes
 Description: Seminar byDeepika Saxena and Kulmeet K.
While transmission of data, due to certain reasons data is lost or data transmitted generates errors and incorrect data reaches the destination.To detect these errors error detection codes are used.As the erro ... 
Seminar ID: 22 Course: Database Systems Topic: Oracle (2)
 Description: My partner Hartajinder Singh Bindra and I presented a seminar on Oracle. My partner started the seminar by talking about Oracle and its products.It was then my turn to show everyone how to create a table on Oracle.
In the AIT lab, the user ID is s ... 
Seminar ID: 19 Course: Database Systems Topic: Cascading Style Sheets
 Description: Rachit Bhatia and I presented a seminar on CSS (Cascading Style Sheets). These are few of the
dimensions on this topic that we had covered during the seminar.
What do they do?
Cascading Style Sheets are a way to separate the ... 
Seminar ID: 18 Course: Database Systems Topic: Oracle
 Description: The seminar consisted of two parts. The first part started with an introduction to "Oracle as a company."Then I showed the advancements of Oracle through the passage of time and how it became the Oracle we know today.I talked about its product features whi ... 
Seminar ID: 17 Course: Information Systems Topic: SSL and FTP
 Description: Dev Agarwal and I presented this seminar on 6th November, 2003.
SSL: Digital certificates encrypt data using Secure Sockets Layer (SSL) technology, the industrystandard method for protecting web communications developed by Netscape Communicatio ... 
Seminar ID: 16 Course: Database Systems Topic: Error Correcting Codes
 Description: Consider a Hamming code to detect and correct for singlebit errors assuming each codeword contains a sevenbit data field, e.g. an ASCII character. for example. Such a coding scheme requires four check bits since, with this scheme, the check bits occu ... 
Seminar ID: 15 Course: Database Systems Topic: MS Project  Progress Report I
 Description:
Data mining refers to extracting or ‘mining’ interesting knowledge from large amounts of data.
Some other terms:
 knowledge mining from databases, or
 knowledge extraction, or
 data/pattern analysis ...

Seminar ID: 14 Course: Java Programming Topic: Artificial Neural Network
 Description: A seminar on what exactly are ANN's and what are the things that go into the making of ANN's. An absolutely riveting topic.Those interested should also read PREY a scifi novel by Micheal Crichton. ... 
Seminar ID: 12 Course: Information Systems Topic: Tim Berners Lee's Invention
 Description: Tim Berners Lee is the inventer of WWW (World Wide Web) i.e the internet and also HTML (Hyper Text Markup Language). He is one of the inventers who did not take credit for his work. he is has invented a technology which is being logged everyday by billions ... 
Seminar ID: 11 Course: Information Systems Topic: Queuing Theory
 Description: I will be giving a seminar on queuing theory which will explain the relation in the increament and decreament of queus.simple examples will be taken explaining the topic.My partners are mayank bhargav and sharat sirohi.This will be given on 3/11/03. ... 
Seminar ID: 10 Course: Information Systems Topic: Queuing Theory
 Description: I will be giving a seminar on queuing theory along with shantanu chikara and mayank bhargav on coming monday(3/11/03).we will be explaining this concept using simple examples.
eg: Railway ticket counter. ... 
Seminar ID: 9 Course: Information Systems Topic: Towers of Hanoi
 Description: This seminar on "Towers of Hanoi" was given by me along with Superna Sharma as my partner.Towers of Hanoi is basically a game which has a legend associated with it i.e." How can the hermits shift 64 discs from one peg (source) to the third peg (destination ... 
Seminar ID: 8 Course: MS Project Topic: RSA Encryption
 Description: My seminar will basically include information about my project .I'll be highlighting the calculations involved in the compuation of 128 bit pattern.The mathematical calculations used will work towards making the encryption formula simpler and increase the ... 
Seminar ID: 7 Course: MS Project Topic: Neural Networks
 Description:
Seminar 1: I have given a seminar on Neural Networks in which I explained the neural network, its history and also about the different types of neural networks. I also talked about my project and explained how the neural network will so ... 
Seminar ID: 6 Course: Information Systems Topic: Queuing theory
 Description: The topic of my seminar was Queuing theory. In my seminar I covered Queues and their types. I also mentioned applications of queues. I also made a programme which demonstrates the concept of queues.
I think the response from the audience was very good ... 
Seminar ID: 5 Course: Information Systems Topic: Turing Machines
 Description: (With Sudeep Tomar) We talked about the computer scientist, mathematician and visionary Alan Turing. We explained the concept and demonstrated an actual Turing Machine for Addition (C++ source code was provided by Ashay Sir). The following picture shows th ... 
Seminar ID: 4 Course: Information Systems Topic: Dennis Ritchie
 Description: Dennis Ritchie works in the Computing Sciences Research Center of Bell Labs. He developed the C programming language and the UNIX operating system. When he joined in 1967, Bell Labs was a corporation jointly owned by American Telephone and Telegraph Compan ... 
Seminar ID: 2 Course: Probability and Statistics Topic: Buffon's Needle
 Description: Buffon's
needle is a classic experiment in the field of Geometric Probability Theory.
A needle of length 1 is thrown on a floor made of planks of width 2. The
problem is to determine the probability p of the event that the needle
will fall acro ... 
Seminar ID: 1 Course: Database Systems Topic: Example  RSA Encryption
 Description: In reality, we would secretly select two very large primes P and
Q. For illustration, we

Select prime P=5

Select prime Q=7

Find E such that gcd(E,(P1)*(Q1))=1 and E%2!=0: Found E=5

Find D such that ...

Number of queries performed on the database: 246519 Database last updated on Wednesday, 26th March 2014, 04:23:01 PM
Prof. Ashay Dharwadker

