2023 2024 Student Forum > Management Forum > Main Forum

 
  #2  
16th December 2014, 08:46 AM
Super Moderator
 
Join Date: Apr 2013
Re: Computer science engineering seminar topics

Here we are providing some of the topics for seminar in Computer science engineering on your demand:

1.4G TECHNOLOGY
2. MOBILE COMPTING
3.GREEN COMPUTING
3. WIRELESS SENSOR NETWORKS
4. NANO TECHNOLOGY
5. DYNAMIC SOURCE ROUTING PROTOCOL
6. CLOUD COMPUTING
7. BLUE RAY DISKS
8. MIMO TECHNOLOGY
9. BRAIN FINGER
10. CRYONICS
11. DRUG DISCOVERY
12. HOLOGRAPHIC MEMORY
13. RED TACTON
14. ELECTRONIC CARDIO GRAM
15. NANO TECHONOLGY
16. BIO METRICS
17. GRID COMPUTING
18. Cryptography
19. Memory
20. Data Pre Processing
21. Interupts
22. Servelts
23. Servelts
24. Web Technology
25. Multimedia
26. Hacking
27. Web Spam
28. Blogs & their Creation
29. Google or Yahoo Case Study
30. Blogs & their Creation
31. Google or Yahoo Case Study
32. Working of E-Mail
33. Using Regular Expressions In java
34. Earning Online Money
35. Archiever Analyzer
36. Task Management
37. Form Wizard
38. Franchise Mgnt System
39. Leave Mgnt System
40. Blogs & their Creation
41. Google or Yahoo Case Study
42. Working of E-Mail
43. Using Regular Expressions In java
44. Earning Online Money
45. Archiever Analyzer
46. Task Management
47. Form Wizard
48. Franchise Mgnt System
49. Leave Mgnt System
50. Earning Online Money
51. Archiever Analyzer
52. Task Management
53. Form Wizard
54. Franchise Mgnt System
55. MAGIC SQUARES
56. BANKING
57. ELLICA
58. SPYWARE
59. GLUCO METER
60. MOBILE COMPTING
61. WIRELESS SENSOR NETWORKS
62. NANO TECHNOLOGY
63. DYNAMIC SOURCE ROUTING PROTOCOL
64. RSVP
65. Interupts
66. Servelts
67. Servelts
68. Web Technology
69. Multimedia
70. Interupts
71. RSVP
72. CASP
73. WIRELESS MESH NEWORK
74. NETWORK SECURT
75. VIRTUAL REALITY
76. WI-MAX
77. WIRELESS COMMUNICATION
78. MESH NETWORKING
79. SPYWARE
80. HACKERS
81. QOS
82. WATERFALL MODEL
83. WIRELESS SECURITY
84. HIGH SPEED LANS
85. INTERFACES
86. FIBER CHANNELS
87. LAN PROTOCOL ARCHITECTURE
88. TESTING METHODS
89. OOPS CONCEPTS
90. WIRELESS SECURITY
91. HIGH SPEED LANS
92. INTERFACES
93. FIBER CHANNELS
94. LAN PROTOCOL ARCHITECTURE
95. TESTING METHODS
96. OOPS CONCEPTS
97. SERVELTS
98. ARRAS AND SENSORS
99. COMPLIERS
100. CRPTOGRAPHY AND N/W SECURITY
101. LAN PROTOCOL
102. BEANS

1. Real Time Operating Systems on Embedded ICs
2. Real time communication in wireless sensor networks
3. Semi - Supervised Learning using Graph Kernels
4. Collaborative Mobile Environments
5. High Performance Clusters
6. Distributed Computing
7. membrane computing
8. Forecasting
9. Forecasting
10. Middleware architecture for Pervasive computing
11. Query Optimization
12. Software Code Security
13. Query Optimization
14. Network Anomaly
15. Study of TGREP
16. Forecasting
17. Viruses and Worms
18. Netowork Security
19. Inter-Operabilty of 802.11e and 802.11
20. RFID Security
21. Semi Supervised Learning using Gaussian Process
22. Quality of Service Routing in computer networks
23. Wireless Security
24. Wireless MAN
25. multi-wordnets
26. Light-trails
27. Fault Tolerance in Virtual Machine Environments
28. Wireless Connectivity for Rural Areas
29. VOIP Security
30. Semi Supervised Learning using Gaussian Process
31. Efficiency / Comparative study of routing schemes in event based systems
32. Rendering Maths on web with Java Swing
33. Analysing Software Life Cycle of Different Program Paradigm.
34. Authoring environments for open source courseware
35. Integration of Parallel Database in a Service Oriented Architecture
36. Ontological Relation Discovery
37. Issues in Middleware for Pervasive Computing
38. Wireless Connectivity for Rural Areas
39. Energy Efficient query Optimization
40. Semi-supervised Learning using Graph Kernels
41. Comparative study on Authoring Tools
42. network security
43. Security Issues in Wireless Networks
44. Layered versioning for software configuration management
45. Cooperative Adaptive Cruise Control
46. Telephony Routing over IP
47. Virtual Private Networks(VPNs)
48. Holt-Winters technique for Financial Forecasting
49. Fine-grained Access Control in Databases
50. Secure Database Service
51. QoS in Wireless Lans
52. Classification, Clustering and their Application for Damage Detection in Mechanical Structures
53. Middleware in embedded systems
54. Web Search Results' Ranking: PageRank, HITS and Related Work
55. Proactive Anomaly Detection
56. Forecasting using Double Exponential Smoothing Method
57. Enery efficiency in Wireless sensor networks
58. Enterprise Security
59. Seasonal and Adaptive Forecasting
60. Root cause Localization and analysis of faults[Autonomic Computing]
61. RFID : Comparative study of Collision Resolution Protocols
62. Classification clustering and Applications to Intrusion Detection Systems.
63. Faultolerant Routing in Mobile Ad-Hoc Network
64. Channel Allocation Algortihms for Mobile Telephony
65. Middleware for Wireless Sensor Networks
66. Security On Wireless LAN Adaptive cruise control
67. Middleware for Sensor Networks
68. Query Based Fine-grained PageRank
69. Classification, Clustering and Application in Intrusuion Detection System
70. Financial Forecasting
71. Wireless Security
72. Autonomic computing
73. Sensor Networks
74. QoS in VoIP
75. Proactive Network Anomaly Detection
76. RFID
77. Middleware in Embedded Systems
78. Wireless Security
79. Voice Routing over IP Telephony
80. Statistical Forecasting
81. QOS in software server Firewalls
82. Classification, Clustering and their Application for Damage Detection in Mechanical Structures.
83. Fine Grained DataBase Security
84. J2EE Security
85. Reliable and Fault Tolerant Routing on Mobile Ad Hoc Network.
86. VOIP Over Wireless LAN
87. Database Security
88. Reliable Multicast
89. Multicast Congestion Control
90. Capacity of Ad-hoc Wireless Networks
91. Performance Evaluation of IEEE 802.11
92. Quality of service in Differentiated Service Architecture
93. Routing in Sensor Networks
94. TDMA implementation for QoS routing in Ad Hoc Networks
95. case Study : A X-By-Wire System , Communication Bus perspective
96. Approximate string matching for Music retrieval
97. Spectral Methods for Graph Partitioning
98. Signal Processing for Networking
99. Spatial DataMining
100. Bionetric Authentication
101. Aspects of Database Security and Program Security
102. Attacks on Smart Cards
103. Smart Card Standards
104. A Probabilistic Approach to Micropayment
105. Java Security
106. Information Extraction
107. Clustering (Data Mining)
108. Frequent ItemSet Mining
109. Classification Techniques in Data Mining
110. Multi-Relational Data Mining
111. Object Persistence
112. Distributed Garbage Collection
113. Agent Mediated E-commerce
114. Recovery in Main Memory Databases
115. Optimization of Protocol Stack for wireless networks
116. Compressed Domain Processing And Video Information System
117. Introduction to Speech Recognition
118. Reconfigurable Hardware in Wireless communication
119. Applications of speech recognition
120. Geometric Invariants in Biological Molecules
121. Applications of Graph Theory to Metabolic Pathways
122. Computational Geometry in Drug Design
123. Query Processing on Data Streams
124. Multi-application Framework for Smart Cards
125. Semi-supervised Learning
126. Data mining through Active Learning
127. Text Classification Using Semi-supervised and Active Learning
128. Relational Data Mining
129. Dataset Query algorithms in Streaming Mining
130. Mining Document Streams
131. Information Extraction from structured & Semi-structured data
132. Digital Video Editing
133. Determining Global States of Distributed Systems
134. Multi Protocol Label Switching
135. QoS in Wireless LANs
136. Advanced Queue Management Techniques
137. Techniques to aid property specification in Model Checking


1. Application of Genetic Algorithms in Network routing
2. QoS in Networking using active Networks
3. Applications of Soft Computing in Medical Image Analysis
4. Web Data Management
5. Dynamic resource allocation in Grid Computing
6. Network Security â€oe Virtual Private Networks
7. Peer to Peer and Overlay Networks
8. Intelligent Patient Monitoring System
9. Sensor Networks
10. Bio-Medical Instrumentation and Signal analysis
11. Application of ANN in Data Mining of Medical Images
12. Software Architecture Analysis
13. Network Security
14. Multicast Routing
15. Scheduling in Embedded Multiprocessors
16. Ant Colony optimization for routing in Mobile and Adhoc Networks
17. Text Classification
  #3  
25th February 2015, 05:17 PM
Unregistered
Guest
 
Re: Computer science engineering seminar topics

I am a final year student of Computer science engineering . Will you please suggest some Computer science engineering Seminar Topics ?
  #4  
25th February 2015, 05:20 PM
Super Moderator
 
Join Date: Apr 2013
Re: Computer science engineering seminar topics

Here I am providing the list of few Computer science engineering seminar topics for final year students which you are looking for .

3D Imaging Techniques and Multimedia Applications
5 Pen PC Technology
AJAX
Alternative Models Of Computation
Ambient Intelligence
Ambiophonics
Amorphous Computing and Swarm Intelligence
Anonymous Communication
Artificial Neural Network (ANN)
Aspect-oriented programming (Aop)
Asynchronous Chips
Autonomic Computing
3D Printing Technology
64-Bit Computing
AC Performance Of Nano Electronics
Access gateways
Adding Intelligence to Internet
Aeronautical Communication
Airborne Internet

Bacterio-Rhodopsin Memory
Big Data Visualization
BlackBerry Technology
Blade Servers
Blu Ray Disc
Blue Brain
Blue Eyes
Blue Gene
Blue Tooth
Bluetooth Based Smart Sensor Networks
Bluetooth Broadcasting
Brain Chips
Brain Fingerprinting
Bio-inspired Networking
Biological Computers
Biometric Voting System
Bio-metrics
Biometrics Based Authentication
Biometrics in SECURE e-transaction
Bio-Molecular Computing
Biocomputers
BitTorrent
Brain Gate Technology
Brain-Computer Interface
Breaking the Memory Wall in MonetDB
Broad Band Over Power Line
Buffer overflow attack : A potential problem and its Implications
Cable Modems
CAPTCHA
Cellular Communications
Cellular Neural Network
CGI Programming
Chameleon Chip
Cisco IOS Firewall
Clockless Chip
Cloud Computing in Science and Engineering
Cluster Computing

Cloud computing - Securing the Cloud
Code Division Duplexing
Computer Forensics
Computer Intelligence Application
Computer Memory Based on the Protein Bacterio-rhodopsin
Computer Viruses
Computerized Paper Evaluation using Neural Network
Conditional Access System
Cooperative Linux
CorDECT
corDECT Wireless in Local Loop System
Credit Card Fraud Detection Techniques
Combating Link Spam
Compact peripheral component interconnect
Compositional Adaptation
Computational Visual Attention Systems
Compute Unified Device Architecture CUDA
Crusoe
Crusoe Processor
Cyber security
Cyber terrorism
Cyborg Technology
Daknet
Dashboard
Data Security in Local Network using Distributed Firewalls
Database security issues and challenges
D-Blast
Delay Tolerant Networking
Design and Analysis of Algorithms
Design of 2-D Filters using a Parallel Processor Architecture
Development of the Internet
Diamond chip
Digital Audio Broadcasting
Digital Cinema
Digital Jewelry
Digital Light Processing
Digital Rights Management
Digital Scent Technology
Digital Subscriber Line
Digital Video Editing
Direct Memory Access
Distributed Interactive Virtual Environment
DNA Based Computing
DNA chips

Driving Optical Network Evolution
DRM Software Radio
Earth Simulator
E-Ball Technology
E-Cash Payment System
EDGE
Elastic Quotas
Embedded Linux
Ethernet Passive Optical Network
Ethical Hacking
Dual Core Processor
DVD Technology
Dynamic Cache Management Technique
Dynamic Domain Name Service
Dynamic Memory Allocation
Dynamic Synchronous Transfer Mode
Dynamic TCP Connection Elapsing
Dynamic Virtual Private Network
E Paper technology

Extended Mark Up Language
Extreme Programming (XP)
Firewalls
FireWire
Fluorescent Multi-layer Disc
Foundation DB
FRAM
Free Space Laser Communications
Free Space Optics
Freenet
Futex
Gaming Consoles
Generic Framing Procedure
Generic Visual Perception Processor GVPP
Gesture Recognition Technology (Gaze data visualization)
Eye Movement-Based Human Computer Interaction Techniques
Eye Tribe
Face Recognition Technology
Facebook Thrift
Facility Layout Design using Genetic Algorithm
Fast Convergence Algorithms for Active Noise Control in Vehicles
Fiber Channel
Fiber Distributed Data Interface
Finger Tracking In Real Time Human Computer Interaction

Gi-Fi
Gigabit Ethernet
Global Wireless E-Voting
Graph Separators
Graphic processing Unit
Graphical Password Authentication
Greendroid
Green Cloud
Green Computing
GSM
GSM Based Vehicle Theft Control System
GSM Security And Encryption
Hadoop
HALO
Handheld Computers
Haptic Technology
Haptics
Haptics in Rehabilitation
Hi-Fi
High Altitude Aeronautical Platforms
High Performance DSP Architectures
High Performance DSP Architectures
Holographic Data Storage
Holographic Memory
Holographic Versatile Disc
Home Networking
HPJava
Human Computer Interface
Humanoid Robot (1)
Google App Engine
Google Glass
Google Loon (Google Baloon)
Google Chrome OS
Google Glass
GPS
Humanoid Robot (2)
Hurd
HVAC
Hyper Transport Technology
iCloud
IDC
iDEN
IDS

Image Processing
Image Processing & Compression
IMAX
IMode
Implementation Of Zoom FFT
Industrial Applications using Neural Networks
Intelligent Software Agents
Intelligent Speed Adaptation
Interactive Public Displays
Internet Access via Cable TV Network
Internet Censorship and Control
Internet Protocol Television
Internet Telephony Policy in INDIA
Introduction to the Internet Protocols
Intrusion Detection System
Inverse Multiplexing
IP spoofing
IP Telephony
Ipv6 - The Next Generation Protocol
Iris Scanning
ISP Peering
iSCSI
Itanium Processor
Java Database Connectivity
Java Ring
Java Servlets
Jini Technology
Lamp Technology
Laptop Computer
Laser Communications
Layer 3 Switching
Leap Motion, sensor motion detector technology
Li-Fi Technology
Light emitting polymers
Light Tree
Linux Kernel 2.6
Linux Virtual Server
InfiniBand
Infinite Dimensional Vector Space
Instant Messaging
Integer Fast Fourier Transform
Integrated Voice and Data
Intel Centrino Mobile Technology
Intel Core I7 Processor
Intel MMX Technology
Intelligent RAM

Local Multipoint Distribution Service
Location Dependent Query Processing
Location Independent Naming
Mind-Reading Computers
MiniDisc system
Mobile Ad-Hoc Networks Extensions to Zone Routing Protocol
Mobile Computing Meets the Cloud
Mobile IP
Mobile Jammer
Mobile Phone Cloning
Mobile TV
Mobile Virtual Reality Service
Mobile WiMax
Modems and ISDN
Modular Computing
Money Pad, The Future Wallet
Motes
MPEG Video Compression
MPEG-4 Facial Animation
MPEG-7
Multicast
Multicore Memory Coherence
Multiple Domain Orientation
Multiprotocol Label Switching
Multiterabit Networks
Multi-Touch Interaction
Nano Cars Into The Robotics
Nanorobotics
Longhorn
Low Power UART Design for Serial Data Communication
LWIP
Magic Square Algorithm
Magnetic Random Access Memory
MANET
MariaDB
MariaDB and MySQL
M-Commerce
Mesh Radio
Microsoft Palladium
Middleware
Migration From GSM Network To GPRS
Millipede
Network Attached Storage
Neural Interfacing
Neural Networks And Their Applications
Next Generation Secure Computing Base
Next-Generation Mobile Computing

NGSCB
Night Vision Technology
Nokia Morph Technology
Optical Free Space Communication
Optical Mouse
Optical Networking and Dense Wavelength Division Multiplexing
Optical packet switch architectures
Optical Packet Switching Network
Optical Satellite Communication
Optical Switching
Orthogonal Frequency Division Multiplexing
Ovonic Unified Memory
Packet Sniffers
Palladium
Palm Vein Technology
Parallel Computing In India
NRAM
NVIDIA Tesla Personal Supercomputer
Neuro Sky Technology
Object Oriented Concepts
On-line Analytical Processing (OLAP)
OpenRAN
Opera (web browser)
Optical Burst Switching
Optical Computer
Optical Fibre Cable
Parallel Virtual Machine
Param 10000
Parasitic Computing
Performance Testing
Pervasive Computing
PHANToM
Phishing
Pill Camera
Pivot Vector Space Approach in Audio-Video Mixing
Pixie Dust
Plagiarism Detection Techniques
Plan 9 Operating System
Planar Separators
PON Topologies
Project Oxygen
Pruning the power grid
Prototype System Design for Tele medicine
Public Key Infrastructure

QoS in Cellular Networks Based on MPT
Quadrics Interconnection Network
Quantum Computers
Real Time Systems with Linux/RTAI
Real-Time Obstacle Avoidance
Reconfigurable computing
Refactoring
Remote Administration Trojan's
Resilient Packet Ring Technology
Robotic Surgery
Rover Technology
RPR
Safety Critical Systems
SAM
Satellite Radio
SATRACK
Seam Carving for Media Retargeting
Secure ATM by Image Processing
Security Features of ATM
Self Defending Networks
Self Organizing Maps
Self-Managing Computing
Semantic Digital Library
Semantic Web
Quantum Cryptography
Quantum Information Technology
Radio Frequency Light Sources
Radio Network Controller
RAID
Rain Technology
Rapid Prototyping
RD RAM
Real Time Application Interface
Real time image processing applied to traffic queue detection algorithm
Real- Time Systems and Real- Time Operating Systems
Satellite networks
Sense-Response Applications
Sensitive Skin
Sensors on 3D Digitization
Short Message Service (SMS)
Significance of real-time transport Protocol in VOIP
Silverlight
Sixth Sense Technology

Skinput Technology
Sky X Technology
Slammer Worm
Small Computer System Interface
Smart Cards
Smart Client Application Development using .NET
Smart Dust
Smart Fabrics
Smart Memories
Smart Note Taker
Smart Pixel Arrays
Smart Quill
Sniffer for detecting lost mobiles
SOA Architecture
Socket Programming
Soft Computing
Software Frameworks
Software Reuse
Software-Defined Radio
Space Mouse
Spam Assassin
Spawning Networks
SPCS
SPECT
Speech Application Language Tags
Speed Detection of moving vehicle using speed cameras
Speed protocol processors
Steganography
Steganography - the art of hiding information
Stereoscopic Imaging
Storage Area Network
Storage Area Networks
Strata flash Memory
Structured Cabling
Surface Computer
Surround Systems
Survivable Networks Systems
Swarm Intelligence
Swarm intelligence & traffic Safety
Symbian OS
Synchronous Optical Networking

SyncML
Syntax Highlighting in IDE
Synthetic Aperture Radar System
System in Package
Tamper Resistance
Touch Screens
Tracking and Positioning of Mobiles in Telecommunication
Transient Stability Assessment using Neural Networks
Tripwire
Trustworthy Computing
Tsunami Warning System
Turbo Codes
Ubiquitous Networking
Ultra-Wideband
Unicode And Multilingual Computing
Unified Modeling Language (UML)
Unlicensed Mobile Access
Utility Fog
VHDL
Virtual Campus
TCP/ IP
TCPA / Palladium
Tele-immersion
Teleportation
Telepresence
Tempest and Echelon
Terrestrial Trunked Radio
Text Mining
The Callpaper Concept
The Deep Web
The Tiger SHARC processor
Thermography
Third Generation
Timing Attacks on Implementations
Tool Command Language
Virtual Instrumentation
Virtual keyboard
Virtual LAN Technology
Virtual Private Network
Virtual Retinal Display
Visible Light Communication
VoCable
Voice Browser
Voice morphing
Voice Over Internet Protocol
Voice Portals
Voice Quality
Voice XML, VoiceXML

Wardriving
Wearable Bio-Sensors
Wearable Computers
Web 2.0
Web Services
Zenoss Core
Zettabyte File System
zForce (neonode) touch screen

Wibree
Windows DNA
Wireless Application Protocol
Wireless Fidelity
Wireless Internet
Wireless LAN Security
Wireless Networked Digital Devices
Wireless USB
Wisenet
Wolfram Alpha
Word Sense Disambiguation
X- Internet
XML Encryption
Y2K38
Yii Framework


Quick Reply
Your Username: Click here to log in

Message:
Options




All times are GMT +5. The time now is 03:47 PM.


Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2024, vBulletin Solutions Inc.
SEO by vBSEO 3.6.0 PL2

1 2 3 4