Saturday, December 5, 2015

Computer Engineering Seminar Topic List

Latest Seminar Topics For Computer Science:

Computer Science




1.            A cognitive radio approach for using of virtual unlicensed spectrum
2.            Advanced Encryption Standard
3.            Advanced Queue Management Techniques
4.            Agent Mediated E-commerce
5.            Agile Software development
6.            AMD Processors
7.            Analysing Software Life Cycle of Different Program Paradigm
8.            Anrras And Sensors
9.            Ant Colony optimization for routing in Mobile and Adhoc Networks
10.         Anti-meter

11.         Application of ANN in Data Mining of Medical Images
12.         Application of Genetic Algorithms in Network routing
13.         Applications of Graph Theory to Metabolic Pathways
14.         Applications of Soft Computing in Medical Image Analysis
15.         Applications of speech recognition
16.         Approximate string matching for Music retrieval
17.         Archiever Analyzer
18.         ARGUMENTED VIRTUAL REALIT
19.         Arm Architecture
20.         ARM architecture

21.         ARRAS AND SENSORS
22.         Artificial Intelligence in Machines
23.         Artificial Neural Networks
24.         Aspect-oriented programming (Aop
25.         Aspects of Database Security and Program Security
26.         ATM networks
27.         Attacks on Smart Cards
28.         Augmented Reality
29.         AUGMNETED VIRTUAL REALIT
30.         Authentication

31.         Authentication and Key Agreement (AKA
32.         Authoring environments for open source courseware
33.         Automatic number plate recognition
34.         Autonomic computing
35.         Auto-pilots
36.         BARCODES
37.         BEANS
38.         BIO METRICS
39.         Biocomputers
40.         Bio-Metric Authentication
41.         Biometric Secuirty
42.         Biometric Technology
43.         Bit And Bytes
44.         Earning Online Money
45.         Earth Simulator- Fastest Supercomputer
46.         Efficiency / Comparative Study Of Routing Schemes In Event Based Systems
47.         Elliptical Curve Cryptography(Ecc)
48.         Embedded Configurable Operating System
49.         Embedded Linux
50.         Embedded Systems

51.         Embedded Systems And Vlsi An Architectural Approach To Reduce Leakage Energy            In Memory
52.         Embedded Web Server For Remote Access
53.         Embedded Systems
54.         Emergency Health Care System
55.         Emerging Trends In Robotics Using Neural Networks
56.         Encrypted Hard Disks
57.         Encrypted Text Chat Using Bluetooth
58.         Energy Efficient Query Optimization
59.         Enery Efficiency In Wireless Sensor Networks
60.         Enterprise Security
61.         Epsilon Nets And Transversal Of Hypergraphs
62.         Ethernet
63.         Ethical Hacking
64.         Evolution Of Computers
65.         Evolutionary Programming
66.         Ext3 File system
67.         Facial Recognition System
68.         Fault Tolerance In Virtual Machine Environments
69.         Faultolerant Routing In Mobile Ad-Hoc Network
70.         Fiber Channels
71.         Fiber Optic Communicationform Processing
72.         Form Wizard
73.         Franchise Mgnt System
74.         Frequent Itemset Mining
75.         Fusion Memory
76.         Future Of Business Computing
77.         Future Of Satellite Communication
78.         Future Of The Internet
79.         Future Programming Techniques And Concepts
80.         Fuzzified Computer-Automated Crane Control System
81.         Fuzzy Logic
82.         Gabor Wavelet
83.         Gait Recognition
84.         Genetic Algorithm
85.         Genetic Programming
86.         Geographic Versatile Dist
87.         Geometric Invariants In Biological Molecules
88.         Gesture Recognition
89.         Gigabit Networking
90.         Gimp
91.         Global Positioning Response System
92.         Global Positioning System
93.         Global System For Mobiles
94.         Globalization
95.         Gluco Meter
96.         Gnu Emacs
97.         Google Or Yahoo Case Study
98.         Graphical Processing Unit
99.         Grasshopper Operating System
100.      Grid Computing

101.      Grid Data Farm For Petascale
102.      Gsm Security And Encryption
103.      Hackersintroduction To Speech Recognition
104.      Hadoop
105.      Ipod
106.      Iris Scanning
107.      Issues In Middleware For Pervasive Computing
108.      J2ee Security
109.      Java Class Loader
110.      Java Cryptography Architecture (Jca
111.      Java Messaging Service (Jms
112.      Java Security
113.      Jiro Java-Based Technology
114.      Kerberos
115.      Kinetic Data Structuring
116.      Knowledge Discovery And Data Mining
117.      Lan Protocol Architecture
118.      Layered Versioning For Software Configuration Management
119.      Leave Mgnt System
120.      Light Pen
121.      Light-Trails
122.      Lixto Suite
123.      Loc Technology (Lab On A Chip)
124.      Lucid Linx
125.      Mac Address
126.      Magic Squares
127.      Magnetic Ram
128.      Mail Server Management
129.      Main Frames
130.      Main Memory Databases
131.      Management Information System
132.      Managing Data With Emerging Technologies
133.      Manet:-The Art Of Networking Without A Network
134.      Matlab (Matrix Lab)
135.      Media Gateways
136.      Mesh Based Geometric Data Processing
137.      Methods In Virtual Networking
138.      Methods In Virtual Private Networks
139.      Micro Chip Production Using Extreme Uv Lithography
140.      Micro Hard Disk Drives
141.      Micro Mouse
142.      Micro Total Analysis Systems
143.      Microcontroller Based Automation
144.      Microcontroller Based Power Theft Identification
145.      Middleware Architecture For Pervasive Computing
146.      Middleware For Sensor Networks
147.      Middleware For Wireless Sensor Networks
148.      Middleware In Embedded Systems
149.      Mpeg-7
150.      Nano Computing
151.      Nano Ring Memory
152.      Nano Technology
153.      Nano-Technology And Application
154.      Narrow Band And Broad Band Isdn
155.      Native Command Queuing (NCQ)
156.      Natural Language Processor
157.      Near Filed Communication (NFC)
158.      Network Security
159.      Network Accelerators
160.      Network Anomaly
161.      Network Management And Security
162.      Network Modeling And Simulation
163.      Network Security
164.      Network Security With Cryptography
165.      Neural Networks And Applications
166.      New Age Graphics
167.      New Dimension Of Data Security Using Neural Networks And Numerical    
   Functions
168.      New Storage Strategy = Disk -Disk -Tape Back Up
169.      Night Vision Technology
170.      Nonvolatile Flash Memory
171.      Nvsram- Non Volatile Static Ram
172.      Object Oriented Technologies
173.      Object Persistence
174.      Online Software Distribution
175.      Ontological Relation Discovery
176.      Oops Concepts
177.      Open Source Technology
178.      Oracle Database 10g
179.      Parallel Computations
180.      Parallel Computing
181.      Parallel Computing In Remote Sensing Data Processing
182.      Parasitic Computing
183.      Peer To Peer And Overlay Networks
184.      Peer To Peer Networking
185.      Pen Drive
186.      Performance Evaluation
187.      Performance Evaluation Of Ieee 802
188.      Personal Mass Media Blogging, Syndication, Podcasting, And Vidcasting
189.      Personal Satellite Assistant Systems
190.      Personal Digital Assistance
191.      Pervasive Computing
192.      Plasma Displays
193.      Pluggable Authentication Modules (Pam
194.      Polybot Modular, Self-Reconfigurable Robots
195.      Polymer Memory
196.      Porting Device Drivers For The Solaris
197.      Power Line Networking
198.      Proactive Anomaly Detection
199.      Proactive Computing
200.      Proactive Network Anomaly Detection

201.      Probabilistic I/O Automata
202.      Public Key Encryption And Digital Signature
203.      Qos In Networking Using Active Networks
204.      Qos In Software Server Firewalls
205.      Qos In Voip
206.      Qos In Wireless Lans
207.      Quad Core Module Technology
208.      Quality Of Service In Differentiated Service Architecture
209.      Quality Of Service Routing In Computer Networks
210.      Quantum Computing
211.      Quantum Teleportation
212.      Query Based Fine-Grained Pagerank
213.      Query Optimization
214.      Query Processing On Data Streams
215.      Satellite Communication
216.      Scheduling Algorithm
217.      Scheduling In Embedded Multiprocessors
218.      Search Algorithm
219.      Search Engine
220.      Search Engine Optimization
221.      Search For Extra Terrestrial Intelligence Using Satellite Communication
222.      Seasonal And Adaptive Forecasting
223.      Secure Computing
224.      Secure Database Service
225.      Secure Socket Layer (SSI)
226.      Security Issues In Grid Computing
227.      Security Issues In Wireless Networks
228.      Security Of Open-Source Software
229.      Security On Wireless LAN Adaptive Cruise Control
230.      Security Threats In The World Wide Web
231.      Semi Supervised Learning Using Gaussian Process
232.      Semi-Supervised Learning Using Graph Kernels
233.      Sensor Networks
234.      Spin Monics
235.      Split Range Synchronization
236.      Statistical Forecasting
237.      Stealth Virus
238.      Steganography.
239.      Stereoscopic Projection
240.      Struts Integration
241.      Study Of Tgrep
242.      Super Computer
243.      Surface-Conduction Electron-Emitter Display (Sed
244.      Symbian Operating System
245.      Synchronous Optical Networking
246.      Virtual Keyboards
247.      Virtual Memory
248.      Virtual Network Computing
249.      Virtual Networking
250.      Virtual P.C.
251.      Virtual Private Networks(Vpns)
252.      Virtual Reality
253.      Virtualization Technology
254.      Viruses And Worms
255.      Visual Neuro Prosthetics
256.      Visualization And Computer Graphics
257.      Voice Over Internet Protocol
258.      Voice Portals
259.      Voice Roaming
260.      Voice Routing Over Ip Telephony
261.      VoIP In Mobile Phones
262.      Waterfall Model
263.      Watermarking Digital Audio
264.      Wearable Computers
265.      Web Browsers
266.      Web Data Management
267.      Web Designing With Html
268.      Web Search Results' Ranking: Pagerank, Hits And Related Work
269.      Web Servers
270.      Web Spam
271.      Web Technology
272.      Wi- Fi Technology
273.      Wi-Fi (802.11b
274.      Wi-max
275.      Windows Vista
276.      Wireless Application Protocol
277.      Wireless Applications
278.      Wireless Communication System
279.      Wireless Connectivity For Rural Areas
280.      Wireless Man
281.      Wireless Markup Language(WML)
282.      Wireless Security
283.      Wireless Sensor Network
284.      Wireless Technologies (Bluetooth, 802.11x, Irda)
285.      Wireless Technology


No comments:

Post a Comment

Related Posts Plugin for WordPress, Blogger...