Techincal Events...


paper presentation

        Its a paper presentation competition which is the best platform for you to show your talent. So friends don't miss it. Click on the 'Read more' to see the rules and regulations.



PAPER PRESENTATION

A paper presentation contest that gives you the opportunities to present your innovations of today and inventions of tomorrow to the right audience...This event provides you with the perfect exposure to the best in industry and wonderful platform to showcase your talents...

    • Cyber Crime & Network Security
    • Mobile Computing
    • AI & Neural Networks & Fuzzy Logic
    • S/W Testing & Quality Assurence
    • Data Mining & Data Warehousing
    • Image Processing & Bio Metrics
    • Network Security
    • Pervasive Computing
    • Cosmic Computing

or any other topic related to computer sciences and engineering.


  • The event will be held in two phases.
  • The paper must be strictly in IEEE format
  • All the papers sent for this event must be in the ".pdf" or the ".doc" or the ".docx" formats.
  • A Paper must contain a maximum of 10 pages, on A-4 page size,1.5 spacing, one side document
  • Here we are providing the sample paper in IEEE format. Click here to download

  • First you have to register for the event.
  • Then you must submit your Paper here using the registration userId and the author informationt submit paper
  • During the main event, the contestants will get 8 minutes to present their paper, at the end of which there will be a question-answer session of at least two minutes.
  • The presentation(on the day of event) should be in the ".ppt" or ".pps" formats.
  • Every paper registered will receive a participation certificate.


    POSTER PRESENTATION

    Posters are a legitimate and popular presentation format to materialize your creativity. They efficiently communicate concepts and data to an audience using a combination of visuals and text. Make the best use of the opportunity to express your ideas.


    Format 1: Technical

    • Cyber Crime & Network Security
    • Mobile Computing
    • AI & Neural Networks & Fuzzy Logic
    • S/W Testing & Quality Assurance
    • Data Mining & Data Warehousing
    • Image Processing & Bio Metrics
    • Network Security
    • Pervasive Computing
    • Cosmic Computing

  • The event will be held in two formats.
  • All the abstracts sent for this event must be in the ".pdf" or the ".doc" or the ".docx" formats.
  • First you have to register for  event.
  • Then you must submit your Paper

  • Team size is restricted to only two members.
  • The poster topic must be from one of the categories Mentioned alongside and if any other then should be linked up with described domain.
  • Posters can be prepared on ordinary A4, A5, or 8 1/2" x 11" size paper. Larger sheets may also be used.
  • All lettering and diagrams should be large enough to be read from a minimum of 2 meters (6 feet).
  • Authors are urged to use colors, symbols and schemes to improve clarity.
  • Failure to abide by the above rules will disqualify the Poster.
Judging criteria (100):
  • Choice of topic (10)
  • Content (20)
  • Presentation (30)
  • Question and Answers (20)
  • Poster Format and Appearance (20)
POWER POINT PRESENTATION

For power point presentations first you need to select the topic of your choice and have to prepare the slides of about to explain for 8 minutes and send the abstract to us.




Tweak-0-XP


Tweak O XP the technical extravaganza, is set to thrill you all computer Triumphs��
All u need to be is an efficient computerdexter� .if u r realy confident about your capability. Then take up this task as a challenge.
There will be questions on shortcuts, troubleshooting, enabling the disability features, disabling the enabled features and much more�.

Here is a chance to showcase your creativity in tweaking one of the worlds most adorable operating system - windows XP.

  • Its an pair event.
  • Register for the event
  • Next, Register for the tweak O XP
  • Events will be bounded with in the time limit provided on the spot.

  • Each team has of 2 members.
  • Event has 3 rounds.
  • 1st round has 10 tasks .Teams getting through this round are eligible for 2nd round.
  • 2nd round has 8 tasks.
  • 3rd is a rapid fire round.


Judgment Criteria:

Choice of topic (10)

  • Content (20)
  • Presentation (30)
  • Question and Answers (20)
  • Poster Format and Appearance (20)

100 Sample B.tech Paper presentations and seminars Free download below exclusively for our PITS Students.Just click on the title and download it.



  1. WIRELESS APPLICATION PROTOCOL
  2. WAVELET TRANSFORMS
  3. VOICE OVER INTERNET PROTOCOL
  4. WiMAX
  5. ARTIFICIAL NEURAL NETWORK
  6. ATM
  7. 64-BIT MICRO PROCESSOR
  8. ADAPTIVE CONTROL SYSTEM
  9. COMPOSITE MATERIALS
  10. 3D MACHINE VISION SYSTEM
  11. AIR BRAKE SYSTEM
  12. GENETIC ALGORITHM
  13. FUEL CELLS
  14. INTELLIGENT COOLING SYSTEM
  15. DIESEL ENGINE
  16. METALLURGICAL CHANGES IN SYSTEMS
  17. SIX SIGMA
  18. LIQUID NITROGEN
  19. MICROELECTROMECHANICAL SYSTEMS
  20. NEURAL NETWORKS
  21. AUTOMATIC SPEED CONTROL SYSTEM
  22. AUTOCONFIGURING ARTIFICIAL NEURAL NETWORK
  23. BLUETOOTH TECHNOLOGY
  24. BLUETOOTH TECHNOLOGY IN WIRELESS COMMUNICATIONS
  25. CODING OF DIGITAL AUDIO
  26. CONTACTLESS SMART CARD
  27. DCOM TECHNICAL OVERVIEW
  28. CODE DIVISION MULTIPLE ACCESS
  29. DIGITAL IMAGE PROCESSING
  30. DOMAIN NAME SYSTEM
  31. DIGITAL DISPLAY TECHNOLOGY
  32. DISTRIBUTED SYSTEMS
  33. DIGITAL SIGNATURE
  34. E-CASH PAYMENT
  35. EMBEDDED SYSTEMS
  36. FREE SPACE OPTICS
  37. Fuzzy Coordination of FACTS
  38. EDGE Compact and EDGE Classic Packet Data Performance
  39. ATM
  40. FUZZY LOGIC CONTROL DESIGN
  41. GSM
  42. FUZZY LOGIC
  43. FUZZY LOGIC IN EMBEDDED SYSTEMS
  44. HOLOGROPHY
  45. HIDING DATA IN IMAGES BY SIMPLE SUBSTITUTION
  46. INTELLIGENT WIRELESS VIDEO CAMERA
  47. HIGH PERFORMANCED DSP CAPABILITY
  48. IMAGE PROCESSING
  49. MULTIMEDIA MESSAGING SERVICE
  50. MOBILE ADHOC NETWORK
  51. LATEST SMART CARD FEATURES
  52. MICRO CONTROLLERS CABLE MODEMS
  53. IPV4-IPV6 TRANSITION TECHNOLOGY
  54. MOBILE COMPUTING
  55. MULTI RESOLUTION WATERMARK BASED ON WAVELET
  56. NANOTECHNOLOGY
  57. NEW TRENDS IN CRYPTOGRAPHY
  58. NETWORK CUSTODY SYSTEM
  59. RSA ALGORITHM
  60. ORTHOGONAL FREQUENCY DIVISION MULTIPLEXING
  61. ORGANIC LED
  62. PUBLIC KEY INFRASTRUCTURE
  63. SATELLITE COMMUNICATIONS
  64. SLAMMER WORM: THE FASTEST SPREADING BOMBSHELL ON THE INTERNET
  65. SECURITY ISSUES
  66. SECURE INTERNET VERIFICATION BASED ON IMAGE PROCESSING
  67. SMART ANTENNA
  68. SILICON ON PLASTIC
  69. TACTILE SENSING SYSTEM USING NEURAL SYSTEM
  70. SMART CARD
  71. SOCKET INTERFACE
  72. SPEECH RECOGNITIONS USING DSP
  73. STORAGE AREA NETWORK
  74. WAVELET TRANSFORMS
  75. WIRELESS WLAN SECURITY
  76. 3G WIRELESS TECHNOLOGY
  77. VOICE OVER INTERNET PROTOCOL
  78. TOOL COMMAND LANGUAGE
  79. ENTERPRISE SECURITY
  80. CURRENT DIFFERENTIAL PROTECTION
  81. APPLICATION OF GENETIC ALGORITHM TO ECONOMIC LOAD DISPATCH
  82. ARTIFICIAL INTELLIGENCE TECHNIQUES IN POWER SYSTEMS
  83. APPLICATION OF SHUNT ACTIVE POWER FILTER
  84. AN EXPERT SYSTEM FOR POWER PLANTS
  85. AUTOMATIC VEHICLE LOCATOR
  86. NANO TECHNOLOGY IN MEMORY DEVICES
  87. DIGITAL SIGNAL PROCESSORS
  88. BIOCHIPS
  89. EMBEDDED SYSTEM DIGITAL BIKE OPERATING SYSTEM
  90. VLSI DESIGN
  91. 4G COMMUNICATION
  92. ADAPTIVE MISSILE GUIDANCE
  93. BATTERY MODEL FOR EMBEDDED SYSTEMS
  94. PC TO PC COMMUNICATION WITH INFRARED
  95. SOFTWARE DEFINED RADIO
  96. HUMAN COMPUTER INTERFACE
  97. CYBER CRIMES
  98. SMART QUILL
  99. TSUNAMI WARNING SYSTEM
  100. JAVA DATABASE CONNECTIVITY

-The above are the sample and Exclusively collected for all PITS students which are helpful for participating in our college as well as any other college FESTS.

-Collected By

 Vamshi  (  CSE 3rd year )


 
Make a Free Website with Yola.