#1
15th December 2014, 01:29 PM
| |||
| |||
Computer science engineering seminar topics
From where I can get topics info for seminar in Computer science engineering?
|
#2
16th December 2014, 08:46 AM
| |||
| |||
Re: Computer science engineering seminar topics
Here we are providing some of the topics for seminar in Computer science engineering on your demand: 1.4G TECHNOLOGY 2. MOBILE COMPTING 3.GREEN COMPUTING 3. WIRELESS SENSOR NETWORKS 4. NANO TECHNOLOGY 5. DYNAMIC SOURCE ROUTING PROTOCOL 6. CLOUD COMPUTING 7. BLUE RAY DISKS 8. MIMO TECHNOLOGY 9. BRAIN FINGER 10. CRYONICS 11. DRUG DISCOVERY 12. HOLOGRAPHIC MEMORY 13. RED TACTON 14. ELECTRONIC CARDIO GRAM 15. NANO TECHONOLGY 16. BIO METRICS 17. GRID COMPUTING 18. Cryptography 19. Memory 20. Data Pre Processing 21. Interupts 22. Servelts 23. Servelts 24. Web Technology 25. Multimedia 26. Hacking 27. Web Spam 28. Blogs & their Creation 29. Google or Yahoo Case Study 30. Blogs & their Creation 31. Google or Yahoo Case Study 32. Working of E-Mail 33. Using Regular Expressions In java 34. Earning Online Money 35. Archiever Analyzer 36. Task Management 37. Form Wizard 38. Franchise Mgnt System 39. Leave Mgnt System 40. Blogs & their Creation 41. Google or Yahoo Case Study 42. Working of E-Mail 43. Using Regular Expressions In java 44. Earning Online Money 45. Archiever Analyzer 46. Task Management 47. Form Wizard 48. Franchise Mgnt System 49. Leave Mgnt System 50. Earning Online Money 51. Archiever Analyzer 52. Task Management 53. Form Wizard 54. Franchise Mgnt System 55. MAGIC SQUARES 56. BANKING 57. ELLICA 58. SPYWARE 59. GLUCO METER 60. MOBILE COMPTING 61. WIRELESS SENSOR NETWORKS 62. NANO TECHNOLOGY 63. DYNAMIC SOURCE ROUTING PROTOCOL 64. RSVP 65. Interupts 66. Servelts 67. Servelts 68. Web Technology 69. Multimedia 70. Interupts 71. RSVP 72. CASP 73. WIRELESS MESH NEWORK 74. NETWORK SECURT 75. VIRTUAL REALITY 76. WI-MAX 77. WIRELESS COMMUNICATION 78. MESH NETWORKING 79. SPYWARE 80. HACKERS 81. QOS 82. WATERFALL MODEL 83. WIRELESS SECURITY 84. HIGH SPEED LANS 85. INTERFACES 86. FIBER CHANNELS 87. LAN PROTOCOL ARCHITECTURE 88. TESTING METHODS 89. OOPS CONCEPTS 90. WIRELESS SECURITY 91. HIGH SPEED LANS 92. INTERFACES 93. FIBER CHANNELS 94. LAN PROTOCOL ARCHITECTURE 95. TESTING METHODS 96. OOPS CONCEPTS 97. SERVELTS 98. ARRAS AND SENSORS 99. COMPLIERS 100. CRPTOGRAPHY AND N/W SECURITY 101. LAN PROTOCOL 102. BEANS 1. Real Time Operating Systems on Embedded ICs 2. Real time communication in wireless sensor networks 3. Semi - Supervised Learning using Graph Kernels 4. Collaborative Mobile Environments 5. High Performance Clusters 6. Distributed Computing 7. membrane computing 8. Forecasting 9. Forecasting 10. Middleware architecture for Pervasive computing 11. Query Optimization 12. Software Code Security 13. Query Optimization 14. Network Anomaly 15. Study of TGREP 16. Forecasting 17. Viruses and Worms 18. Netowork Security 19. Inter-Operabilty of 802.11e and 802.11 20. RFID Security 21. Semi Supervised Learning using Gaussian Process 22. Quality of Service Routing in computer networks 23. Wireless Security 24. Wireless MAN 25. multi-wordnets 26. Light-trails 27. Fault Tolerance in Virtual Machine Environments 28. Wireless Connectivity for Rural Areas 29. VOIP Security 30. Semi Supervised Learning using Gaussian Process 31. Efficiency / Comparative study of routing schemes in event based systems 32. Rendering Maths on web with Java Swing 33. Analysing Software Life Cycle of Different Program Paradigm. 34. Authoring environments for open source courseware 35. Integration of Parallel Database in a Service Oriented Architecture 36. Ontological Relation Discovery 37. Issues in Middleware for Pervasive Computing 38. Wireless Connectivity for Rural Areas 39. Energy Efficient query Optimization 40. Semi-supervised Learning using Graph Kernels 41. Comparative study on Authoring Tools 42. network security 43. Security Issues in Wireless Networks 44. Layered versioning for software configuration management 45. Cooperative Adaptive Cruise Control 46. Telephony Routing over IP 47. Virtual Private Networks(VPNs) 48. Holt-Winters technique for Financial Forecasting 49. Fine-grained Access Control in Databases 50. Secure Database Service 51. QoS in Wireless Lans 52. Classification, Clustering and their Application for Damage Detection in Mechanical Structures 53. Middleware in embedded systems 54. Web Search Results' Ranking: PageRank, HITS and Related Work 55. Proactive Anomaly Detection 56. Forecasting using Double Exponential Smoothing Method 57. Enery efficiency in Wireless sensor networks 58. Enterprise Security 59. Seasonal and Adaptive Forecasting 60. Root cause Localization and analysis of faults[Autonomic Computing] 61. RFID : Comparative study of Collision Resolution Protocols 62. Classification clustering and Applications to Intrusion Detection Systems. 63. Faultolerant Routing in Mobile Ad-Hoc Network 64. Channel Allocation Algortihms for Mobile Telephony 65. Middleware for Wireless Sensor Networks 66. Security On Wireless LAN Adaptive cruise control 67. Middleware for Sensor Networks 68. Query Based Fine-grained PageRank 69. Classification, Clustering and Application in Intrusuion Detection System 70. Financial Forecasting 71. Wireless Security 72. Autonomic computing 73. Sensor Networks 74. QoS in VoIP 75. Proactive Network Anomaly Detection 76. RFID 77. Middleware in Embedded Systems 78. Wireless Security 79. Voice Routing over IP Telephony 80. Statistical Forecasting 81. QOS in software server Firewalls 82. Classification, Clustering and their Application for Damage Detection in Mechanical Structures. 83. Fine Grained DataBase Security 84. J2EE Security 85. Reliable and Fault Tolerant Routing on Mobile Ad Hoc Network. 86. VOIP Over Wireless LAN 87. Database Security 88. Reliable Multicast 89. Multicast Congestion Control 90. Capacity of Ad-hoc Wireless Networks 91. Performance Evaluation of IEEE 802.11 92. Quality of service in Differentiated Service Architecture 93. Routing in Sensor Networks 94. TDMA implementation for QoS routing in Ad Hoc Networks 95. case Study : A X-By-Wire System , Communication Bus perspective 96. Approximate string matching for Music retrieval 97. Spectral Methods for Graph Partitioning 98. Signal Processing for Networking 99. Spatial DataMining 100. Bionetric Authentication 101. Aspects of Database Security and Program Security 102. Attacks on Smart Cards 103. Smart Card Standards 104. A Probabilistic Approach to Micropayment 105. Java Security 106. Information Extraction 107. Clustering (Data Mining) 108. Frequent ItemSet Mining 109. Classification Techniques in Data Mining 110. Multi-Relational Data Mining 111. Object Persistence 112. Distributed Garbage Collection 113. Agent Mediated E-commerce 114. Recovery in Main Memory Databases 115. Optimization of Protocol Stack for wireless networks 116. Compressed Domain Processing And Video Information System 117. Introduction to Speech Recognition 118. Reconfigurable Hardware in Wireless communication 119. Applications of speech recognition 120. Geometric Invariants in Biological Molecules 121. Applications of Graph Theory to Metabolic Pathways 122. Computational Geometry in Drug Design 123. Query Processing on Data Streams 124. Multi-application Framework for Smart Cards 125. Semi-supervised Learning 126. Data mining through Active Learning 127. Text Classification Using Semi-supervised and Active Learning 128. Relational Data Mining 129. Dataset Query algorithms in Streaming Mining 130. Mining Document Streams 131. Information Extraction from structured & Semi-structured data 132. Digital Video Editing 133. Determining Global States of Distributed Systems 134. Multi Protocol Label Switching 135. QoS in Wireless LANs 136. Advanced Queue Management Techniques 137. Techniques to aid property specification in Model Checking 1. Application of Genetic Algorithms in Network routing 2. QoS in Networking using active Networks 3. Applications of Soft Computing in Medical Image Analysis 4. Web Data Management 5. Dynamic resource allocation in Grid Computing 6. Network Security â€oe Virtual Private Networks 7. Peer to Peer and Overlay Networks 8. Intelligent Patient Monitoring System 9. Sensor Networks 10. Bio-Medical Instrumentation and Signal analysis 11. Application of ANN in Data Mining of Medical Images 12. Software Architecture Analysis 13. Network Security 14. Multicast Routing 15. Scheduling in Embedded Multiprocessors 16. Ant Colony optimization for routing in Mobile and Adhoc Networks 17. Text Classification |
#3
25th February 2015, 05:17 PM
| |||
| |||
Re: Computer science engineering seminar topics
I am a final year student of Computer science engineering . Will you please suggest some Computer science engineering Seminar Topics ?
|
#4
25th February 2015, 05:20 PM
| |||
| |||
Re: Computer science engineering seminar topics Here I am providing the list of few Computer science engineering seminar topics for final year students which you are looking for . 3D Imaging Techniques and Multimedia Applications 5 Pen PC Technology AJAX Alternative Models Of Computation Ambient Intelligence Ambiophonics Amorphous Computing and Swarm Intelligence Anonymous Communication Artificial Neural Network (ANN) Aspect-oriented programming (Aop) Asynchronous Chips Autonomic Computing 3D Printing Technology 64-Bit Computing AC Performance Of Nano Electronics Access gateways Adding Intelligence to Internet Aeronautical Communication Airborne Internet Bacterio-Rhodopsin Memory Big Data Visualization BlackBerry Technology Blade Servers Blu Ray Disc Blue Brain Blue Eyes Blue Gene Blue Tooth Bluetooth Based Smart Sensor Networks Bluetooth Broadcasting Brain Chips Brain Fingerprinting Bio-inspired Networking Biological Computers Biometric Voting System Bio-metrics Biometrics Based Authentication Biometrics in SECURE e-transaction Bio-Molecular Computing Biocomputers BitTorrent Brain Gate Technology Brain-Computer Interface Breaking the Memory Wall in MonetDB Broad Band Over Power Line Buffer overflow attack : A potential problem and its Implications Cable Modems CAPTCHA Cellular Communications Cellular Neural Network CGI Programming Chameleon Chip Cisco IOS Firewall Clockless Chip Cloud Computing in Science and Engineering Cluster Computing Cloud computing - Securing the Cloud Code Division Duplexing Computer Forensics Computer Intelligence Application Computer Memory Based on the Protein Bacterio-rhodopsin Computer Viruses Computerized Paper Evaluation using Neural Network Conditional Access System Cooperative Linux CorDECT corDECT Wireless in Local Loop System Credit Card Fraud Detection Techniques Combating Link Spam Compact peripheral component interconnect Compositional Adaptation Computational Visual Attention Systems Compute Unified Device Architecture CUDA Crusoe Crusoe Processor Cyber security Cyber terrorism Cyborg Technology Daknet Dashboard Data Security in Local Network using Distributed Firewalls Database security issues and challenges D-Blast Delay Tolerant Networking Design and Analysis of Algorithms Design of 2-D Filters using a Parallel Processor Architecture Development of the Internet Diamond chip Digital Audio Broadcasting Digital Cinema Digital Jewelry Digital Light Processing Digital Rights Management Digital Scent Technology Digital Subscriber Line Digital Video Editing Direct Memory Access Distributed Interactive Virtual Environment DNA Based Computing DNA chips Driving Optical Network Evolution DRM Software Radio Earth Simulator E-Ball Technology E-Cash Payment System EDGE Elastic Quotas Embedded Linux Ethernet Passive Optical Network Ethical Hacking Dual Core Processor DVD Technology Dynamic Cache Management Technique Dynamic Domain Name Service Dynamic Memory Allocation Dynamic Synchronous Transfer Mode Dynamic TCP Connection Elapsing Dynamic Virtual Private Network E Paper technology Extended Mark Up Language Extreme Programming (XP) Firewalls FireWire Fluorescent Multi-layer Disc Foundation DB FRAM Free Space Laser Communications Free Space Optics Freenet Futex Gaming Consoles Generic Framing Procedure Generic Visual Perception Processor GVPP Gesture Recognition Technology (Gaze data visualization) Eye Movement-Based Human Computer Interaction Techniques Eye Tribe Face Recognition Technology Facebook Thrift Facility Layout Design using Genetic Algorithm Fast Convergence Algorithms for Active Noise Control in Vehicles Fiber Channel Fiber Distributed Data Interface Finger Tracking In Real Time Human Computer Interaction Gi-Fi Gigabit Ethernet Global Wireless E-Voting Graph Separators Graphic processing Unit Graphical Password Authentication Greendroid Green Cloud Green Computing GSM GSM Based Vehicle Theft Control System GSM Security And Encryption Hadoop HALO Handheld Computers Haptic Technology Haptics Haptics in Rehabilitation Hi-Fi High Altitude Aeronautical Platforms High Performance DSP Architectures High Performance DSP Architectures Holographic Data Storage Holographic Memory Holographic Versatile Disc Home Networking HPJava Human Computer Interface Humanoid Robot (1) Google App Engine Google Glass Google Loon (Google Baloon) Google Chrome OS Google Glass GPS Humanoid Robot (2) Hurd HVAC Hyper Transport Technology iCloud IDC iDEN IDS Image Processing Image Processing & Compression IMAX IMode Implementation Of Zoom FFT Industrial Applications using Neural Networks Intelligent Software Agents Intelligent Speed Adaptation Interactive Public Displays Internet Access via Cable TV Network Internet Censorship and Control Internet Protocol Television Internet Telephony Policy in INDIA Introduction to the Internet Protocols Intrusion Detection System Inverse Multiplexing IP spoofing IP Telephony Ipv6 - The Next Generation Protocol Iris Scanning ISP Peering iSCSI Itanium Processor Java Database Connectivity Java Ring Java Servlets Jini Technology Lamp Technology Laptop Computer Laser Communications Layer 3 Switching Leap Motion, sensor motion detector technology Li-Fi Technology Light emitting polymers Light Tree Linux Kernel 2.6 Linux Virtual Server InfiniBand Infinite Dimensional Vector Space Instant Messaging Integer Fast Fourier Transform Integrated Voice and Data Intel Centrino Mobile Technology Intel Core I7 Processor Intel MMX Technology Intelligent RAM Local Multipoint Distribution Service Location Dependent Query Processing Location Independent Naming Mind-Reading Computers MiniDisc system Mobile Ad-Hoc Networks Extensions to Zone Routing Protocol Mobile Computing Meets the Cloud Mobile IP Mobile Jammer Mobile Phone Cloning Mobile TV Mobile Virtual Reality Service Mobile WiMax Modems and ISDN Modular Computing Money Pad, The Future Wallet Motes MPEG Video Compression MPEG-4 Facial Animation MPEG-7 Multicast Multicore Memory Coherence Multiple Domain Orientation Multiprotocol Label Switching Multiterabit Networks Multi-Touch Interaction Nano Cars Into The Robotics Nanorobotics Longhorn Low Power UART Design for Serial Data Communication LWIP Magic Square Algorithm Magnetic Random Access Memory MANET MariaDB MariaDB and MySQL M-Commerce Mesh Radio Microsoft Palladium Middleware Migration From GSM Network To GPRS Millipede Network Attached Storage Neural Interfacing Neural Networks And Their Applications Next Generation Secure Computing Base Next-Generation Mobile Computing NGSCB Night Vision Technology Nokia Morph Technology Optical Free Space Communication Optical Mouse Optical Networking and Dense Wavelength Division Multiplexing Optical packet switch architectures Optical Packet Switching Network Optical Satellite Communication Optical Switching Orthogonal Frequency Division Multiplexing Ovonic Unified Memory Packet Sniffers Palladium Palm Vein Technology Parallel Computing In India NRAM NVIDIA Tesla Personal Supercomputer Neuro Sky Technology Object Oriented Concepts On-line Analytical Processing (OLAP) OpenRAN Opera (web browser) Optical Burst Switching Optical Computer Optical Fibre Cable Parallel Virtual Machine Param 10000 Parasitic Computing Performance Testing Pervasive Computing PHANToM Phishing Pill Camera Pivot Vector Space Approach in Audio-Video Mixing Pixie Dust Plagiarism Detection Techniques Plan 9 Operating System Planar Separators PON Topologies Project Oxygen Pruning the power grid Prototype System Design for Tele medicine Public Key Infrastructure QoS in Cellular Networks Based on MPT Quadrics Interconnection Network Quantum Computers Real Time Systems with Linux/RTAI Real-Time Obstacle Avoidance Reconfigurable computing Refactoring Remote Administration Trojan's Resilient Packet Ring Technology Robotic Surgery Rover Technology RPR Safety Critical Systems SAM Satellite Radio SATRACK Seam Carving for Media Retargeting Secure ATM by Image Processing Security Features of ATM Self Defending Networks Self Organizing Maps Self-Managing Computing Semantic Digital Library Semantic Web Quantum Cryptography Quantum Information Technology Radio Frequency Light Sources Radio Network Controller RAID Rain Technology Rapid Prototyping RD RAM Real Time Application Interface Real time image processing applied to traffic queue detection algorithm Real- Time Systems and Real- Time Operating Systems Satellite networks Sense-Response Applications Sensitive Skin Sensors on 3D Digitization Short Message Service (SMS) Significance of real-time transport Protocol in VOIP Silverlight Sixth Sense Technology Skinput Technology Sky X Technology Slammer Worm Small Computer System Interface Smart Cards Smart Client Application Development using .NET Smart Dust Smart Fabrics Smart Memories Smart Note Taker Smart Pixel Arrays Smart Quill Sniffer for detecting lost mobiles SOA Architecture Socket Programming Soft Computing Software Frameworks Software Reuse Software-Defined Radio Space Mouse Spam Assassin Spawning Networks SPCS SPECT Speech Application Language Tags Speed Detection of moving vehicle using speed cameras Speed protocol processors Steganography Steganography - the art of hiding information Stereoscopic Imaging Storage Area Network Storage Area Networks Strata flash Memory Structured Cabling Surface Computer Surround Systems Survivable Networks Systems Swarm Intelligence Swarm intelligence & traffic Safety Symbian OS Synchronous Optical Networking SyncML Syntax Highlighting in IDE Synthetic Aperture Radar System System in Package Tamper Resistance Touch Screens Tracking and Positioning of Mobiles in Telecommunication Transient Stability Assessment using Neural Networks Tripwire Trustworthy Computing Tsunami Warning System Turbo Codes Ubiquitous Networking Ultra-Wideband Unicode And Multilingual Computing Unified Modeling Language (UML) Unlicensed Mobile Access Utility Fog VHDL Virtual Campus TCP/ IP TCPA / Palladium Tele-immersion Teleportation Telepresence Tempest and Echelon Terrestrial Trunked Radio Text Mining The Callpaper Concept The Deep Web The Tiger SHARC processor Thermography Third Generation Timing Attacks on Implementations Tool Command Language Virtual Instrumentation Virtual keyboard Virtual LAN Technology Virtual Private Network Virtual Retinal Display Visible Light Communication VoCable Voice Browser Voice morphing Voice Over Internet Protocol Voice Portals Voice Quality Voice XML, VoiceXML Wardriving Wearable Bio-Sensors Wearable Computers Web 2.0 Web Services Zenoss Core Zettabyte File System zForce (neonode) touch screen Wibree Windows DNA Wireless Application Protocol Wireless Fidelity Wireless Internet Wireless LAN Security Wireless Networked Digital Devices Wireless USB Wisenet Wolfram Alpha Word Sense Disambiguation X- Internet XML Encryption Y2K38 Yii Framework |
|