Fwd: list of latest Seminar topics for computer science

538 views
Skip to first unread message

Karthik Karthi

unread,
Aug 13, 2012, 6:56:58 AM8/13/12
to mca20...@googlegroups.com

Hi all,

 

Here is huge list of latest Seminar topics for computer science,prepare anyone of the following and take seminar within this week end (submit written document).....

 

Advanced Encryption Standard

Advanced Queue Management Techniques

Agent Mediated E-commerce

Agile Software development

AMD Processors

Android APPS

Artificial Intelligence in Machines

Artificial Neural Networks

Aspect-oriented programming (Aop

Aspects of Database Security and Program Security

ATM networks

Attacks on Smart Cards

Augmented Reality

AUGMNETED VIRTUAL REALIT

Authentication

Authentication and Key Agreement (AKA

Authoring environments for open source courseware

Automatic number plate recognition

Autonomic Computing

Auto-pilots

Backup and Recovery planning

Bandwidth estimation in broadband access networks

BEANS

BioComputers

Bio-Medical Instrumentation and Signal analysis

Bio metrics IRIS technique

Biometric Technology

Bionetric Authentication

Bio Telemetry

Bit And Bytes

Blogs & their Creation

BLOW FISH

Blue ray disk

Bluetooth

Botnet

Brain computer interface

BRAIN FINGER

BRIAN GATE TECHNOLOGY

Capacity of Ad-hoc Wireless Networks

Captchas

CASP

Cd,dvd,ird

Cell phones

Channel Allocation Algortihms for Mobile Telephony

Chess Algorithm

Choreography

Cluster computing

Clustering

Collaborative Mobile Environments

Comparative study on Authoring Tools

COMPLIERS

Compressed Domain Processing And Video Information System

Computational Geometry in Drug Design

Computational Intelligence and Linguistics

Computational neuroscience

Computational Photography

Computer Forensics

Computer hardware

Computer peripherals

Computer vision

Concurrent Programming and Parallel distributed OS

Content Management

Cooperative Adaptive Cruise Control

Co-operative LINUX

Cross Platform Component Object Model

CRPTOGRAPHY AND N/W SECURITY

Crusoe Processors

Cryogenic Processor

CRYONICS

CRYPTOGRAPHY

Cryptography and steganography

Curl: A Gentle Slope Language For The Web

Cyber Crime and Security

Cyborgs

DataBase Migration

Database Security

Dataflow machines

Datagram Congestion Control Protocol (DCCP

Data Management in Sensor Networks

Data Mining and Data Warehousing

Data Mining concepts & Models

Data mining through Active Learning

Data over Cable System (DOCSIS

Data Pre Processing

Dataset Query algorithms in Streaming Mining

DataWareHosuing

DATA WARE HOSUING & MINING

Data Warehouse

Data warehousing

Datbase management

Determining Global States of Distributed Systems

Digital audio

Digital Imaging

Digital Jewellery

Digital Media Broadcasting

DIGITAL MOVIES

Digital Rights Management

Digital Signal Processing and their applications

Digital Video Editing

Digital Visual Interface

Distributed and Parallel Computing

Distributed Computing

Distributed database management system

Distributed Firewalls

Distributed Garbage Collection

DISTRUBUTED COMPUTING

DNA Based computer

DNA Computing

DRUG DISCOVERY

Dual Energy X-ray Absorptiometry

Dynamic resource allocation in Grid Computing

DYNAMIC SOURCE ROUTING PROTOCOL

Dynamic spectrum access

Earning Online Money

Earth Simulator- Fastest Supercomputer

E-Commerce

Efficiency / Comparative study of routing schemes in event based systems

ELLICA

Elliptical Curve Cryptography(ECC

Embedded Configurable Operating system

Embedded Linux

Embedded systems

Embedded web server for remote access

Embeded Systems

Emergency Health Care System

Emerging trends in robotics using neural networks

E-MINE: A novel web mining approach

Encrypted Hard disks

Encrypted Text chat Using Bluetooth

Energy Efficient query Optimization

Enery efficiency in Wireless sensor networks

Enterprise Security

Epsilon nets and transversal of hypergraphs

Ethernet

Ethical Hacking

Etl tools(informatica)

Evolutionary Programming

Evolution of computers

E-wallet

Ext3 Filesystem

eXtensible Bindings Language (XBL

Facial Recognition System

Faultolerant Routing in Mobile Ad-Hoc Network

Fault Tolerance in Virtual Machine Environments

FIBER CHANNELS

Fiber optic communication

Financial Forecasting

Fine-grained Access Control in Databases

Fine Grained DataBase Security

Fingerprint recognition system by neural networks

Firewalls

Flexible CRT Displays

Fluorescent Multilayer Disc (FMD

Fluorescent Multilayer Optical Data Storage

Forecasting

Forecasting using Double Exponential Smoothing Method

Form Processing

Form Wizard

Franchise Mgnt System

Frequent ItemSet Mining

Fusion Memory

Future of business Computing

Future of Satellite Communication

Future of the internet

Future Programming Techniques and Concepts

Fuzzified Computer-Automated Crane Control System

Fuzzy Logic

GABOR Wavelet

GAIT RECOGNITION

Generic algorithm

Genetic Programming

Geographic Versatile Dist

Geometric Invariants in Biological Molecules

Gesture recognition

Gigabit networking

GIMP

Globalization

Global positioning response system

Global Positioning System

Global System for Mobiles

GLUCO METER

Gnu Emacs

Google or Yahoo Case Study

Graphical Processing Unit

GRASSHOPPER Operating System

Grid computing

Grid Computing

Grid Data Farm for Petascale

GSM Security And Encryption

Hackers prospectivs

Hapics

High Altitude Aeronautical Platforms

High Performance Clusters

High Performance Computing

High Performance DSP Architectures

High Speed Data In Mobile Networks

HIGH SPEED LANS

HOLOGRAPHIC MEMORY

Holographic Versatile Disc

Holt-Winters technique for Financial Forecasting

Home Networking

HONE POTS

Honeypots

HONEY POTS

How E-learning Works

HUMAN AREA NETWORK

Hyper-Threading Technology

HYPER THREAD TECHNOLOGY

IDMA The Future of Wireless Technology

Image compression

Image processing and applications

Improving tcp performance over mobile ad hoc networks

Information Extraction from structured & Semi-structured data

Information Extraction modes & techniques

INFORMATION SECURITY

Integrating Structural Design and Formal Methods in RealTime System Design

Integration of Parallel Database in a Service Oriented Architecture

Intelligent Patient Monitoring System

Intelligent RAM : IRAM

Intel MMX Technology

INTERFACES

Internet Cryptopraphy

Internet Networking

Internet Telephony

Internet version 2

Inter-Operabilty of 802

Interupts

Introduction to LaTeX

Introduction to Speech Recognition

Ipod

Iris scanning

Issues in Middleware for Pervasive Computing

J2EE Security

Java Class Loader

Java Cryptography Architecture (JCA

Java JBOSS

Java Messaging Service (JMS

JAVA Ring

Java Security

JIRO Java-based technology

Kerberos

Kinetic data structuring

Knowledge discovery and Data Mining

LAN PROTOCOL

LAN PROTOCOL ARCHITECTURE

Layered versioning for software configuration management

Leave Mgnt System

Light Pen

Light-trails

Lixto suite

LOC technology (Lab On a Chip

Lucid Linx

MAC address

MAGIC SQUARES

Magnetic RAM

Mail server Management

MAIN FRAMES

Main memory databases

Management Information System

Managing Data with emerging technologies

MANET:-The Art of Networking without a Network

Matlab (matrix lab)

Media gateways

membrane computing

Mesh Based Geometric data processing

Methods in virtual networking

Methods in virtual private networks

Micro chip production using extreme uv lithography

Microcontroller Based Automation

Microcontroller Based Power Theft Identification

Micro Hard disk Drives

Micro Mouse

Micro Total analysis systems

Middleware architecture for Pervasive computing

Middleware for Sensor Networks

Middleware for Wireless Sensor Networks

Middleware in Embedded Systems

Mining Document Streams

Mining the Web: Searching, Integration and Discovery

Mobile ad hoc network

Mobile agent

Mobile Casts

Mobile communication

Mobile Computing

Mobile Infrastructure Management

Mobile Library Management

Mobile Networking

Mobile Paradigm

Molecular Keypad Lock

MPEG-7

Multi-application Framework for Smart Cards

Multicast Congestion Control

Multicast Routing

Multimedia

Multimedia Broadcasting via Satellite

multimedia-oriented web based instructional system

Multiple client’s communication

Multiple Domain Orientation

Multi Protocol Label Switching

Multi-Relational Data Mining

multi-wordnets

Nano computing

Nano Ring Memory

Nano-technology and application

NANO TECHONOLGY

Narrow Band and Broad Band ISDN

Native Command Queuing (NCQ

Natural Language Processor

Near Filed Communication (NFC

Netowork Security

Network Accelerators

Network Anomaly

Network Management and Security

Network Modeling and Simulation

NETWORK SECURITY

Network security with cryptography

Neural networks and applications

New Age Graphics

New Dimension of Data Security using Neural Networks and Numerical Functions

New storage strategy = Disk -Disk -Tape Back up

Night Vision Technology

Nonvolatile Flash Memory

NVSRAM- Non Volatile Static RAM

Object oriented technologies

Object Persistence

Online software Distribution

Ontological Relation Discovery

OOPS CONCEPTS

OpenGL-application programming interface

Open Source Technology

Open ‘ssh’

Operating systems

Optical canoflague

Optical Disc Data Security

Optical networking

Optimization of Protocol Stack for wireless networks

ORACLE DATABASE 10g

Oracle RDBMS

Orthogonal Frequency Division Multiplplexing

Ovonic Unified Memory

Packet Interception

Parallel Computations

Parallel computing

Parallel Computing In Remote Sensing Data Processing

Parasitic computing

Peer to Peer and Overlay Networks

Peer to peer Networking

Pen Drive

Performance Evaluation

Performance Evaluation of IEEE 802

Personal Mass Media Blogging, Syndication, Podcasting, and Vidcasting

Personal Satellite assistant Systems

Personel Digital assistance

Pervasive computing

Plasma Displays

Plasmonics

PolyBot Modular, self-reconfigurable robots

Polymer Memory

Porting Device Drivers For The Solaris

Power Line Networking

Proactive Anomaly Detection

Proactive computing

Proactive Network Anomaly Detection

Probabilistic I/o Automata

Public Key Encryption And Digital Signature

QoS in Networking using active Networks

QOS in software server Firewalls

QoS in VoIP

QoS in Wireless LANs

Quad core Module technology

Quality of service in Differentiated Service Architecture

Quality of Service Routing in computer networks

Quantum computing

Quantum teleportation

Query Based Fine-grained PageRank

Query Optimization

Query Processing on Data Streams

Radio Astronomy

Real time communication in wireless sensor networks

Real Time Operating Systems on Embedded ICs

Real Time Speech Translation

Recognition of VoIP Speech

Reconfigurable computing

Reconfigurable Hardware in Wireless communication

Recovery in Main Memory Databases

RED TACTON

Relational Data Mining

Reliable and Fault Tolerant Routing on Mobile Ad Hoc Network

Reliable Multicast

Rendering Maths on web with Java Swing

Revolutions in the Operating System and Servers

RFID : Comparative study of Collision Resolution Protocols

RFID Security

RHEV - the Redhat Virtualization

Robocode

Root cause Localization and analysis of faults[Autonomic Computing]

Routing in Sensor Networks

Ruby on Rails RoR

SALT (Speech Application Language Tags

Samba Fileserver(38

Sand Box Technology

Satellite communication

Satellite Networks

Scheduling algorithm

Scheduling in Embedded Multiprocessors

Search algorithm

Search Engine

Search Engine Optimisation

Search for extra terrestrial intelligence using satellite communication

Seasonal and Adaptive Forecasting

Secure Computing

Secure Database Service

Secure Socket Layer (SSL

Security Issues In GRID COMPUTING

Security Issues in Wireless Networks

Security of Open-Source Software

Security On Wireless LAN Adaptive cruise control

Security threats in the World Wide Web

Semi Supervised Learning using Gaussian Process

Semi-supervised Learning using Graph Kernels

Sensor fusion for video surveillance

Sensor Networks

Serial ATA (SATA

Serial Attached SCSI

SERVELTS (JAVA)

Server side Java

Server virtualization

Session Initiation Protocol (SIP

Signal Integrity Fundamentals for Digital Design

Signal Processing for Networking

SIMPUTERS

Site Search Engine

SMART CARDS

Smart Card Standards

Smart Dust

SMART QUILL

Sniffers

Soft computing

Software Architecture Analysis

Software Code Security

Software model checking

Software Testing & Quality Assurance

Spatial DataMining

Spectral Methods for Graph Partitioning

Spin monics

SPINTRONICS

Split Range Synchronization

SPYWARE

SSL-TLS

Statistical Forecasting

Stealth Virus

Steganography The art of hiding information

Stereoscopic Projection Systems

Storage Farms

Storm botnet

Struts Integration

Study of TGREP

SUNSPOT (wireless sensor network

SUPER COMPUTER

Surface-conduction Electron-emitter Display (SED

S/w life cycle/affiliated programs

Symbian OS

Synchronous Optical Networking

Tablet-pc

Tablet PC

Tape Drive Technologies LTO

Task Management

TDMA implementation for QoS routing in Ad Hoc Networks

Techniques for analysis, verification, validation of digital systems

Techniques to aid property specification in Model Checking

Technotask management

Telephony Routing over IP

Teleportation

TESTING METHODS

TETRA-Terrestrial Enhanced Trunked Radio

Text Classification

Text Classification Using Semi-supervised and Active Learning

The Architecture of a Moletronics Computer

The MBMS

The Mbone And Multicasting

Third Generation

Time Complexity

Torents

Touch Screen

TOUCH SCREEN SSTEM

Touch screen technology

Tracking and Positioning of Mobiles in Telecommunication

Transient Stability Assessment using Neural Networks

Trends in Compiler Construction

Trends in Mobiles & PC’s

Trusted Network Connect (TNC

Turbo Codes

Twd radar satellite communications

Ubiquitous computing

UMA (Unlicensed Mobile Access

Unbiquitos Smart Homes

Unified Communication

Uniprocessor Virtual Memory Without TLBS

USB Tape Drives

Using Regular Expressions In java

Vertical Cavity Surface Emitting Laser

VHDL (VHSIC Hardware Description Language

Video conference

Virtualization Technology

Virtual Keyboards

Virtual memory

Virtual Network Computing

Virtual networking

Virtual PC

Virtual Private Networks(VPNs)

VIRTUAL REALITY

Viruses and Worms

Visualization and Computer Graphics

Visual Neuro Prosthetics

Voice Over Internet Protocol

Voice Portals

Voice Roaming

Voice Routing over IP Telephony

VoIP in mobile phones

VOIP Over Wireless LAN

VOIP Security

VQ In Converging Telephony And Ip Networks

WATERFALL MODEL

Watermarking Digital Audio

Wearable Computers

Web browsers

Web Data Management

Web Designing with HTML

Web Search Results' Ranking: PageRank, HITS and Related Work

Web servers

Web Spam

Web Technology

Working of E-Mail

X-By-Wire System , Communication Bus perspective

X-Internet

ZFS File system

 

We will update with latest seminar topics for computer science 2012..

 

Good luck for your students seminar!





hardi...@gmail.com

unread,
Apr 16, 2014, 6:34:54 PM4/16/14
to mca20...@googlegroups.com
need ppt on cluster computing with report.
as soon as possible
Reply all
Reply to author
Forward
0 new messages