- Title Page
- Content Page
- Introduction & Motivation
- Definition
- History or Technical Background
- Diagram (Draw neately)
- Tables (Can be used for comparison..)
- Applications
- Advantages and Disadvantages or issues
- Conclusion (like short summary)
- Reference (Books or Journals and Websites)
- Note: Write neatly with proper document alignment. Include Page numbers at the bottom of the page.
GROUP ASSIGNMENT - PRESENTATION GUIDELINES
- The Presentation should last about 15-20 minutes, not including questions
- The Presentation should consist of 20 to 30 slides (or the equivalent amount of material)
- The Presentation should include diagrams and graphic illustrations
- The quickest way to create a presentation is in PowerPoint.
- Do not go overboard with animations, sounds, or other forms of show business
- As an editor, PowerPoint is even worse than Word.
- As an editor, PowerPoint is even worse than Word.
- The presentation should be in English
- The lecture should cover the following issues:
- Introduction to the topic under discussion, including
- Motivation: why this topic is needed or interesting, and how it will be used
- Overview of the talk: what you will be talking about
- Technological background
- Review of the environment in which the topic system will be applied
- Technical details of the environment required to understand the topic
- Overview of the topic: hardware aspects, software aspects, protocols, etc.
- Technical details of the topic system
- Hardware details
- Software details
- Protocol details
- Information flow and how the system functions in its environment
- Practical Issues
- Is the technology well-defined, effective, efficient?
- Is the technology available and has it been accepted?
- Short Summary and Future Scope
- References (Books & Websites)
TOPICS
- Wearable Computing Technology
- Zigbee Wireless Technology
- Role of IP Telephony for voice and data networks
- Digital Audio Broadcasting: Digital Radio and High-Definition Radio
- Intelligent Vehicular Transport Systems
- Goal of Wireless Solar Mobile Charger
- GSM Based Remote Switching System for monitoring and controlling devices
- Cyber Security and Attacks
- Internet Protocol Television : IPTV for streaming data packets across the web
- Wireless Mobile Charger
- Google Glass: An Augmented Reality Head - Mounted Display
- Securing Wireless Sensor Network Security
- Humanoid Robot
- 3D Holographic Projection Technology
- Multicore Processor Technology
- GPS for Environmental Management in 20th Century
- Touchscreen technology
- Mobile Number Portability for Mobile Telephone Customers
- 5G Technology for high - bandwidth users
- Underwater Wirless Communication
- Li-Fi (Light Fidelity)-The future technology In Wireless communication
- Fingerprint Technology for high security
- Managing Security in Mobile Phones
- Cellular Digital Packet Data (CDPD) systems
- Cellphone Jammer
- Electronic Toll Collection (ETC) Technology
- High Speed Mobile Data Connectivity
- Automation Technology for Productivity and Profitability
- Mobile Radio Services
- Laser Communications for High performance links
- Automatic Vehicular Locating (AVL)
- Border Security using Wireless Integrated Network Sensors (WINS)
- Data Compression
- Radio Frequency Identification
- Artificial Intelligence for Speech Recognition
- Automatic Number Plate Recognition for Surveillance
- Intelligent Wireless Video Camera Monitoring System
- LTE Technology in Mobile Communication
- Home Appliance Control System by Mobile
- Temperature monitoring system
- MIMO wireless channels
- Mobile IPv6
- Human robot interaction
- Data loggers
- Confidential data storage and deletion
- E-mail alert system
- Big data visualization
- Cyber security
- Personal Area Network
- Voice recognition based on artificial neural networks
- Virtual Reality
- 3D image technique and multimedia application
- Augmented reality
- Mesh Networking
- Semantic Web
- IPTV vs Mobile TV : Design and Application
- Thunderbolt - An incredibly fast input/output technology
- Swarm Intelligence Systems and Application
- Blue Eyes Technology - Human Operator Monitoring System
- Intelligent Machine To Machine Communication In A Smart Grid
- Smart Antennas for Mobile Communication
- Potential Threats to Mobile Network Security
- Enhanced Data For Global Evolution (EDGE)
- Telephone Conversation Recorder
- Cache Compression
- Biochips based information tracking
- Smart Card Technology
- Wireless LAN Security
- Applications of sensor networks
- Biometrics based authentication
- Data security in local network using firewalls
- DNA computing in security
- Identity-based encryption
- Digital Watermarking Applications and Advantages
- Computational Methods for Bankruptcy Prediction
- Prevention measures for Intrusion Detection
- Embedded Bluetooth based Smart Sensor Networks
- IP spoofing
- Pervasive computing
- Speed control of vehicle in the accidental zone
- The challenges of software reliability & modeling
- Tracking and positioning of mobiles in telecommunication
- Virtual LAN technology
- Voice over internet protocol
- Web service standards for data mining
- Wireless battery charging system using radio frequency energy
- Wireless USB
- XML encryption
- Modular Embedded Internet Software Support
- WIMAX Transreceivers
- Smart Cards and its applications
- Radar and Navigation System
- Communication technology in magnetic disk storage
- Fiber Optics sensor system
- Solid State Drives
- Wireless Application Protocol
- Ipv6 - The Next Generation Protocol
- Low energy efficient wireless communication network design
- Role of Internet Technology in Future Mobile Data System
- Push Message Technology in Mobile Communication
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.