SlideShare a Scribd company logo
1 of 3
Technical Seminar in Department of CSE
Technical Seminar presentation will be conducted for the students of B. Tech. III. It is
compulsory for all the students to present a technical seminar on upcoming tools and
technologies of their choice under the guidance of any faculty in and outside the department. The
format and rules are described below. It is important that students adhere to these guidelines.



Guidelines for Seminar Report
   1. There can be at the most 3 students per group.
   2. Each group is to prepare a synopsis of at least 200 words duly approved by the guide and
      submit it to the concerned faculty coordinator.
   3. Each group is required to write a comprehensive report about the seminar consisting of
      15 to 30 pages describing the topic.
   4. The report duly signed by the guide and spiral bounded along with the CD consisting of
      Presentation and Softcopy of the report should be submitted 2 days prior to the date of
      presentation to the respective Faculty In-charge.
   5. No two seminars should be on the same topic.
   6. Each group will be given maximum 20 minutes for presentation and queries.
   7. The student should be evaluated on regular basis, including the attendance. The
      attendance is compulsory for all the students of the batch.


Criteria for assessment: The candidate will be accessed as per the following criteria:
   1.   The extent to which the content of seminar is technical.                  10
   2.   Clarity of point of the seminar and the work presented.                   10
   3.   Organization of the seminar.                                              10
   4.   Use of the technology.                                                    10
   5.   The way the speaker handled questions from audience.                      10
   6.   Project Report                                                            20
   7.   Response to Queries                                                       20
   8.   Timely Submission and presentation                                        10

Note: Ability to take questions from the audience is part of the assessment. Marks will be
deducted for poor audibility, hurried delivery and a lack of ability to address the audience.
Technical Seminar Report Format
  1.Cover page
  2. Acknowledgement
  3. Table of Contents
  4. Introduction
  5. Chapters related to topics
  6. Conclusion
  References
  Font Specification:
  Font type: Times New Roman
  Chapter Heading: 18 All caps Bold
  Section Heading: 16 Title case Bold
  Sub section: 14 Title case Bold
  Normal Test: 12
  Line Spacing: 1.5
  Page setup: A4, left margin: 1” Right: 1”, Top: 1”, Bottom: 1”
  Header: Title of The seminar at Right side (fontsize: 10 Italics)
TITLE OF SEMINAR
                       <Font Size 22><BOLD><Centralized>


                               A Seminar Report



                                 Submitted by


                       NAME OF THE CANDIDATE
                       <Font Size 16>><BOLD><Centralized>

                                Enrollment No.
                    <Font Size 14><Italic>><BOLD><Centralized>

                            B. Tech. Third Year




           Department of Computer Science & Engineering

          Sir Padampat Singhania University, Udaipur

                                 Session 2011-12




    Guided by:                                               Submitted to:

Name of the Guide                                        Name of the Coordinator
   Department                                                   Department

More Related Content

What's hot

Steganography Project
Steganography Project Steganography Project
Steganography Project
Uttam Jain
 
Mw&oc manual
Mw&oc manualMw&oc manual
Mw&oc manual
vkop100
 

What's hot (20)

Industrial Automation Control Systems Cybersecurity Certification. Chapter II
Industrial Automation Control Systems Cybersecurity Certification.  Chapter IIIndustrial Automation Control Systems Cybersecurity Certification.  Chapter II
Industrial Automation Control Systems Cybersecurity Certification. Chapter II
 
VTU Network & cyber security (1-5 Module) Full notes
VTU Network & cyber security (1-5 Module) Full notesVTU Network & cyber security (1-5 Module) Full notes
VTU Network & cyber security (1-5 Module) Full notes
 
Image authentication techniques based on Image watermarking
Image authentication techniques based on Image watermarkingImage authentication techniques based on Image watermarking
Image authentication techniques based on Image watermarking
 
Cyber security landscape
Cyber security landscapeCyber security landscape
Cyber security landscape
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
THE INTERNET OF THINGS
THE INTERNET OF THINGSTHE INTERNET OF THINGS
THE INTERNET OF THINGS
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security Elements
 
Steganography
SteganographySteganography
Steganography
 
Edge Computing.pptx
Edge Computing.pptxEdge Computing.pptx
Edge Computing.pptx
 
VTU final year project report
VTU final year project reportVTU final year project report
VTU final year project report
 
Security issues and solutions : IoT
Security issues and solutions : IoTSecurity issues and solutions : IoT
Security issues and solutions : IoT
 
A Survey of Image Steganography
A Survey of Image SteganographyA Survey of Image Steganography
A Survey of Image Steganography
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT Security
 
3 d password
3 d password3 d password
3 d password
 
Image steganography and cryptography
Image steganography and cryptographyImage steganography and cryptography
Image steganography and cryptography
 
The Information Warfare: how it can affect us
The Information Warfare: how it can affect usThe Information Warfare: how it can affect us
The Information Warfare: how it can affect us
 
AI In Cybersecurity – Challenges and Solutions
AI In Cybersecurity – Challenges and SolutionsAI In Cybersecurity – Challenges and Solutions
AI In Cybersecurity – Challenges and Solutions
 
CNIT 140: Perimeter Security
CNIT 140: Perimeter SecurityCNIT 140: Perimeter Security
CNIT 140: Perimeter Security
 
Steganography - A smart way to hide data
Steganography - A smart way to hide data Steganography - A smart way to hide data
Steganography - A smart way to hide data
 
Mw&oc manual
Mw&oc manualMw&oc manual
Mw&oc manual
 

Viewers also liked (12)

Ll1 exam structure
Ll1 exam structureLl1 exam structure
Ll1 exam structure
 
Project report format-sem2
Project report format-sem2Project report format-sem2
Project report format-sem2
 
3D password
3D password3D password
3D password
 
3D Internet
3D Internet3D Internet
3D Internet
 
Gi fi seminar Report
Gi fi seminar ReportGi fi seminar Report
Gi fi seminar Report
 
Latest Seminar Topics for Engineering,MCA,MSc Students
Latest Seminar Topics for Engineering,MCA,MSc StudentsLatest Seminar Topics for Engineering,MCA,MSc Students
Latest Seminar Topics for Engineering,MCA,MSc Students
 
Rain technology
Rain technologyRain technology
Rain technology
 
project report on truss bridge
project report on truss bridgeproject report on truss bridge
project report on truss bridge
 
Gi fi technology finl ppt
Gi fi technology finl pptGi fi technology finl ppt
Gi fi technology finl ppt
 
Paper battery
Paper batteryPaper battery
Paper battery
 
Light tree
Light tree Light tree
Light tree
 
Best topics for seminar
Best topics for seminarBest topics for seminar
Best topics for seminar
 

Similar to B tech cs-iii-guidelined for technical seminar

The format for_the_project__training_report
The format for_the_project__training_reportThe format for_the_project__training_report
The format for_the_project__training_report
mohandeepain
 
Letters of Intent
Letters of IntentLetters of Intent
Letters of Intent
crysatal16
 
Scheme g second semester_ej_et_en_ev_ex_is_ic_iu_de_mu_ie_ed_ei
Scheme g second semester_ej_et_en_ev_ex_is_ic_iu_de_mu_ie_ed_eiScheme g second semester_ej_et_en_ev_ex_is_ic_iu_de_mu_ie_ed_ei
Scheme g second semester_ej_et_en_ev_ex_is_ic_iu_de_mu_ie_ed_ei
Anil Bachate
 
NEF1103 – Engineering and the Community .docx
NEF1103 – Engineering and the Community                       .docxNEF1103 – Engineering and the Community                       .docx
NEF1103 – Engineering and the Community .docx
rosemarybdodson23141
 
Introduction to Cisco Routers
Introduction to Cisco RoutersIntroduction to Cisco Routers
Introduction to Cisco Routers
Tom Hall
 

Similar to B tech cs-iii-guidelined for technical seminar (20)

Comp421 final project(students) new
Comp421 final project(students) newComp421 final project(students) new
Comp421 final project(students) new
 
The format for_the_project__training_report
The format for_the_project__training_reportThe format for_the_project__training_report
The format for_the_project__training_report
 
Resume Making Workshop.pptx
Resume Making Workshop.pptxResume Making Workshop.pptx
Resume Making Workshop.pptx
 
Common issues on essay writing - Professional Interview for graduate engineers
Common issues on essay writing - Professional Interview for graduate engineersCommon issues on essay writing - Professional Interview for graduate engineers
Common issues on essay writing - Professional Interview for graduate engineers
 
Letters of Intent
Letters of IntentLetters of Intent
Letters of Intent
 
Guidelines for Final Year Engineering & Technology Project.ppt
Guidelines for Final Year Engineering & Technology  Project.pptGuidelines for Final Year Engineering & Technology  Project.ppt
Guidelines for Final Year Engineering & Technology Project.ppt
 
Scheme g second semester (au)
Scheme   g second semester (au)Scheme   g second semester (au)
Scheme g second semester (au)
 
Scheme g second semester (ae,me,pg,pt,fe,mh,mi,ps)
Scheme   g second semester (ae,me,pg,pt,fe,mh,mi,ps)Scheme   g second semester (ae,me,pg,pt,fe,mh,mi,ps)
Scheme g second semester (ae,me,pg,pt,fe,mh,mi,ps)
 
Format of the project
Format of the projectFormat of the project
Format of the project
 
nba ppt for inspection.pptx
nba ppt for inspection.pptxnba ppt for inspection.pptx
nba ppt for inspection.pptx
 
Scheme g second semester_ej_et_en_ev_ex_is_ic_iu_de_mu_ie_ed_ei
Scheme g second semester_ej_et_en_ev_ex_is_ic_iu_de_mu_ie_ed_eiScheme g second semester_ej_et_en_ev_ex_is_ic_iu_de_mu_ie_ed_ei
Scheme g second semester_ej_et_en_ev_ex_is_ic_iu_de_mu_ie_ed_ei
 
Project report format
Project report formatProject report format
Project report format
 
NEF1103 – Engineering and the Community .docx
NEF1103 – Engineering and the Community                       .docxNEF1103 – Engineering and the Community                       .docx
NEF1103 – Engineering and the Community .docx
 
0. Course Introduction
0. Course Introduction0. Course Introduction
0. Course Introduction
 
Technical presentation
Technical presentationTechnical presentation
Technical presentation
 
Ce341 a prc_l1_08-10-21
Ce341 a prc_l1_08-10-21Ce341 a prc_l1_08-10-21
Ce341 a prc_l1_08-10-21
 
Guidelines for project
Guidelines for projectGuidelines for project
Guidelines for project
 
1182589406
11825894061182589406
1182589406
 
Guidelines for preparing internship report
Guidelines for preparing internship reportGuidelines for preparing internship report
Guidelines for preparing internship report
 
Introduction to Cisco Routers
Introduction to Cisco RoutersIntroduction to Cisco Routers
Introduction to Cisco Routers
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Recently uploaded (20)

DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 

B tech cs-iii-guidelined for technical seminar

  • 1. Technical Seminar in Department of CSE Technical Seminar presentation will be conducted for the students of B. Tech. III. It is compulsory for all the students to present a technical seminar on upcoming tools and technologies of their choice under the guidance of any faculty in and outside the department. The format and rules are described below. It is important that students adhere to these guidelines. Guidelines for Seminar Report 1. There can be at the most 3 students per group. 2. Each group is to prepare a synopsis of at least 200 words duly approved by the guide and submit it to the concerned faculty coordinator. 3. Each group is required to write a comprehensive report about the seminar consisting of 15 to 30 pages describing the topic. 4. The report duly signed by the guide and spiral bounded along with the CD consisting of Presentation and Softcopy of the report should be submitted 2 days prior to the date of presentation to the respective Faculty In-charge. 5. No two seminars should be on the same topic. 6. Each group will be given maximum 20 minutes for presentation and queries. 7. The student should be evaluated on regular basis, including the attendance. The attendance is compulsory for all the students of the batch. Criteria for assessment: The candidate will be accessed as per the following criteria: 1. The extent to which the content of seminar is technical. 10 2. Clarity of point of the seminar and the work presented. 10 3. Organization of the seminar. 10 4. Use of the technology. 10 5. The way the speaker handled questions from audience. 10 6. Project Report 20 7. Response to Queries 20 8. Timely Submission and presentation 10 Note: Ability to take questions from the audience is part of the assessment. Marks will be deducted for poor audibility, hurried delivery and a lack of ability to address the audience.
  • 2. Technical Seminar Report Format 1.Cover page 2. Acknowledgement 3. Table of Contents 4. Introduction 5. Chapters related to topics 6. Conclusion References Font Specification: Font type: Times New Roman Chapter Heading: 18 All caps Bold Section Heading: 16 Title case Bold Sub section: 14 Title case Bold Normal Test: 12 Line Spacing: 1.5 Page setup: A4, left margin: 1” Right: 1”, Top: 1”, Bottom: 1” Header: Title of The seminar at Right side (fontsize: 10 Italics)
  • 3. TITLE OF SEMINAR <Font Size 22><BOLD><Centralized> A Seminar Report Submitted by NAME OF THE CANDIDATE <Font Size 16>><BOLD><Centralized> Enrollment No. <Font Size 14><Italic>><BOLD><Centralized> B. Tech. Third Year Department of Computer Science & Engineering Sir Padampat Singhania University, Udaipur Session 2011-12 Guided by: Submitted to: Name of the Guide Name of the Coordinator Department Department