Saturday 15 February 2014

Computer Science Engineering Seminar Topics - 503 Numb

By    


  1. Google Chrome Laptop or Chrome Book
  2. Femtocell
  3. xMax Technology
  4. EyePhone
  5. XBOX 360 System
  6. iSphere
  7. Teradata
  8. zForce Touch Screen
  9. Wireless Body Area Network
  10. E-Ball Technology
  11. Google Glass
  12. Apache Cassandra
  13. Symbian Mobile Operating System
  14. Multiple Access Control Protocol
  15. Digital Preservation
  16. E-Paper Technology
  17. Smart Skin for Machine Handling
  18. Nvidia Tegra 250 Developer Kit Hardware
  19. Zenoss Core
  20. 5g Wireless System
  21. 3D Internet
  22. Mobile Jammer
  23. Mind-Reading Computer
  24. 5 Pen PC Technology
  25. High Performance Computing with Accelerators
  26. iPAD
  27. Browser Security
  28. Google File System
  29. Measuring Universal Intelligence
  30. Fast And Secure Protocol
  31. Case Based Reasoning System
  32. Mobile Number Portability
  33. Mobile TV
  34. Mobile WiMax
  35. Mobile Phone Cloning
  36. Nano Cars Into The Robotics
  37. Exterminator
  38. Bluetooth V2.1
  39. DOS Attack
  40. Privacy Preserving Data Publishing
  41. Transactional Memory
  42. Example Based Machine Translation
  43. Microsoft Palladium
  44. iCloud
  45. 3D Searching
  46. Biological Computers
  47. Rain Technology
  48. Bluetooth Broadcasting
  49. 3d Optical Data Storage
  50. Web 2.0
  51. Li-Fi Technology
  52. Multi-Touch Interaction
  53. Gesture Recognition Technology
  54. CORBA
  55. BlackBerry Technology
  56. Facebook Thrift
  57. Bluejacking
  58. Multiparty Nonrepudiation
  59. Domain Driven Data Mining
  60. Web Clustering Engines
  61. Confidential Data Storage and Deletion
  62. Computational Intelligence in Wireless Sensor Networks
  63. Capacitive And Resistive Touch Systems
  64. Wireless Video Service in CDMA Systems
  65. JOOMLA and CMS
  66. Intrusion Tolerance
  67. Green Computing
  68. NVIDIA Tesla Personal Supercomputer
  69. Zettabyte FileSystem
  70. Breaking the Memory Wall in MonetDB
  71. Enhancing LAN Using Cryptography and Other Modules
  72. Generic Access Network
  73. RESTful Web Services
  74. Google’s Bigtable
  75. Cloud Computing
  76. Google App Engine
  77. Keil C
  78. Intel Core I7 Processor
  79. Wine
  80. Airborne Internet
  81. Sixth Sense Technology
  82. Security Features of ATM
  83. Brain Gate
  84. Palm Vein Technology
  85. Sniffer for detecting lost mobiles
  86. Packet Sniffers
  87. Brain Chips
  88. Phishing
  89. Pill Camera
  90. Blue Brain
  91. Hadoop
  92. Generic Visual Perception Processor GVPP
  93. Google Chrome OS
  94. Yii Framework
  95. Word Sense Disambiguation
  96. Wolfram Alpha
  97. Wardriving
  98. Tool Command Language
  99. Text Mining
  100. Computational Visual Attention Systems
  101. Software Reuse
  102. Soft Computing
  103. Visible Light Communication
  104. Skinput Technology
  105. Semantic Digital Library
  106. Seam Carving for Media Retargeting
  107. Ambient Intelligence
  108. Public Key Infrastructure
  109. Plagiarism Detection Techniques
  110. Neural Interfacing
  111. Middleware
  112. Location Dependent Query Processing
  113. Fiber Channel
  114. Compute Unified Device Architecture CUDA
  115. Combating Link Spam
  116. Bio-inspired Networking
  117. Anonymous Communication
  118. Java Database Connectivity
  119. Tsunami Warning System
  120. iDEN
  121. Hi-Fi
  122. Intelligent Speed Adaptation
  123. GSM Based Vehicle Theft Control System
  124. Global Wireless E-Voting
  125. Green Cloud
  126. Digital Jewelry
  127. Biometric Voting System
  128. 3D Television
  129. 3D password
  130. Voice Browser
  131. Gi-Fi
  132. Graphical Password Authentication
  133. 4G Broadband
  134. Finger Tracking In Real Time Human Computer Interaction
  135. Eye Movement-Based Human Computer Interaction Techniques
  136. Ethical Hacking
  137. E-Cash Payment System
  138. Cyborgs
  139. Brain Fingerprinting
  140. Biometrics in SECURE e-transaction
  141. X- Internet
  142. Surface Computer
  143. Secure ATM by Image Processing
  144. Mobile Ad-Hoc Networks Extensions to Zone Routing Protocol
  145. Wibree
  146. Telepresence
  147. System in Package
  148. Smart Memories
  149. Slammer Worm
  150. Sensitive Skin
  151. Pixie Dust
  152. Linux Kernel 2.6
  153. Lamp Technology
  154. Humanoid Robot
  155. HTAM
  156. Haptic Technology
  157. Elastic Quotas
  158. Diamond chip
  159. Digital Rights Management
  160. A Plan For No Spam
  161. BEOWULF Cluster
  162. Digital Scent Technology
  163. Distributed Interactive Virtual Environment
  164. Dynamic TCP Connection Elapsing
  165. CAPTCHA
  166. Virtual Retinal Display
  167. Wireless LAN Security
  168. Chameleon Chip
  169. Haptics
  170. Intelligent RAM
  171. iSCSI
  172. Linux Kernel 2.6
  173. Real Time Application Interface
  174. GPS
  175. HALO
  176. BitTorrent
  177. Compositional Adaptation
  178. Rover Technology
  179. Self Defending Networks
  180. Semantic Web
  181. Computer Intelligence Application
  182. Cooperative Linux
  183. Longhorn
  184. Mesh Radio
  185. Parallel Virtual Machine
  186. Linux Virtual Server
  187. Location Independent Naming
  188. PHANToM
  189. Multiprotocol Label Switching
  190. Next Generation Secure Computing Base
  191. NGSCB
  192. Reconfigurable computing
  193. Sky X Technology
  194. Spawning Networks
  195. SPCS
  196. Speed protocol processors
  197. Strata flash Memory
  198. Swarm Intelligence
  199. The Callpaper Concept
  200. IP spoofing
  201. Internet Access via Cable TV Network
  202. Face Recognition Technology
  203. FireWire
  204. Param 10000
  205. The Deep Web
  206. Virtual Campus
  207. VoiceXML
  208. Wireless USB
  209. Refactoring
  210. On-line Analytical Processing (OLAP)
  211. Pivot Vector Space Approach in Audio-Video Mixing
  212. MPEG-7
  213. Adding Intelligence to Internet
  214. Silverlight
  215. DNA chips
  216. Remote Administration Trojan's
  217. Thermography
  218. AJAX
  219. Alternative Models Of Computation
  220. Amorphous Computing and Swarm Intelligence
  221. Windows DNA
  222. Laptop Computer
  223. Intelligent Software Agents
  224. Self-Managing Computing
  225. Hurd
  226. Intel Centrino Mobile Technology
  227. MPEG Video Compression
  228. Survivable Networks Systems
  229. Self Organizing Maps
  230. Mobile IP
  231. Iris Scanning
  232. LWIP
  233. Unified Modeling Language (UML)
  234. Nanorobotics
  235. Dual Core Processor
  236. Cisco IOS Firewall
  237. Socket Programming
  238. SAM
  239. 10 Gigabit Ethernet
  240. Tripwire
  241. Ubiquitous Networking
  242. Unicode And Multilingual Computing
  243. XML Encryption
  244. Y2K38
  245. VoCable
  246. Tempest and Echelon
  247. Synthetic Aperture Radar System
  248. Unlicensed Mobile Access
  249. IDS
  250. IDC
  251. SATRACK
  252. Asynchronous Chips
  253. Low Power UART Design for Serial Data Communication
  254. SPECT
  255. Satellite Radio
  256. Light emitting polymers
  257. Sensors on 3D Digitization
  258. Robotic Surgery
  259. Buffer overflow attack : A potential problem and its Implications
  260. Smart card
  261. Quantum Information Technology
  262. Money Pad, The Future Wallet
  263. HVAC
  264. Terrestrial Trunked Radio
  265. Swarm intelligence & traffic Safety
  266. Facility Layout Design using Genetic Algorithm
  267. Human Computer Interface
  268. HPJava
  269. Gaming Consoles
  270. Fluorescent Multi-layer Disc
  271. Futex
  272. Extreme Programming (XP)
  273. Earth Simulator
  274. Compact peripheral component interconnect
  275. corDECT Wireless in Local Loop System
  276. Motes
  277. Modular Computing
  278. MiniDisc system
  279. Migration From GSM Network To GPRS
  280. M-Commerce
  281. IP Telephony
  282. RPR
  283. Broad Band Over Power Line
  284. Rapid Prototyping
  285. Dashboard
  286. Code Division Duplexing
  287. Delay Tolerant Networking
  288. EDGE
  289. Holographic Data Storage
  290. Integer Fast Fourier Transform
  291. NRAM
  292. Orthogonal Frequency Division Multiplplexing
  293. Ovonic Unified Memory
  294. Pervasive Computing
  295. RAID
  296. Real Time Systems with Linux/RTAI
  297. Real-Time Obstacle Avoidance
  298. Symbian OS
  299. Teleportation
  300. Turbo Codes
  301. Utility Fog
  302. Cluster Computing
  303. Wireless Application Protocol
  304. Light Tree
  305. Smart Pixel Arrays
  306. Project Oxygen
  307. Wearable Bio-Sensors
  308. Mobile Virtual Reality Service
  309. QoS in Cellular Networks Based on MPT
  310. Wireless Fidelity
  311. Voice morphing
  312. Radio Frequency Light Sources
  313. Speed Detection of moving vehicle using speed cameras
  314. Optical Packet Switching Network
  315. Storage Area Networks
  316. Smart Note Taker
  317. Crusoe Processor
  318. Optical Satellite Communication
  319. Optical packet switch architectures
  320. Optical Switching
  321. FRAM
  322. Virtual Private Network
  323. Clockless Chip
  324. Layer 3 Switching
  325. IMode
  326. Blue Gene
  327. Access gateways
  328. Computer Forensics
  329. Direct Memory Access
  330. Crusoe
  331. Digital Subscriber Line
  332. Computer Memory Based on the Protein Bacterio-rhodopsin
  333. DNA Based Computing
  334. Free Space Optics
  335. Freenet
  336. Fiber Distributed Data Interface
  337. Dynamic Virtual Private Network
  338. Introduction to the Internet Protocols
  339. Graphic processing Unit
  340. High Altitude Aeronautical Platforms
  341. Aspect-oriented programming (Aop)
  342. Intel MMX Technology
  343. Hyper-Threading technology
  344. IMAX
  345. Brain-Computer Interface
  346. InfiniBand
  347. Multicast
  348. Inverse Multiplexing
  349. Blue Tooth
  350. Holographic Memory
  351. Jini Technology
  352. Bio-metrics
  353. Magnetic Random Access Memory
  354. Intrution Detection System
  355. Multiterabit Networks
  356. Neural Networks And Their Applications
  357. Quantum Computers
  358. Small Computer System Interface
  359. OpenRAN
  360. Quadrics Interconnection Network
  361. Plan 9 Operating System
  362. Structured Cabling
  363. Quantum Cryptography
  364. Speech Application Language Tags
  365. Real- Time Systems and Real- Time Operating Systems
  366. Parallel Computing In India
  367. Steganography
  368. Virtual LAN Technology
  369. Artificial Neural Network (ANN)
  370. Tele-immersion
  371. VHDL
  372. Blue Eyes
  373. Voice Over Internet Protocol
  374. The Tiger SHARC processor
  375. Autonomic Computing
  376. Wearable Computers
  377. Voice Portals
  378. Tamper Resistance
  379. CGI Programming
  380. DRM Software Radio
  381. Firewalls
  382. Handheld Computers
  383. Modems and ISDN
  384. Optical Free Space Communication
  385. Planar Separators
  386. Wireless Internet
  387. DVD Technology
  388. MPEG-4 Facial Animation
  389. Internet Telephony Policy in INDIA
  390. PON Topologies
  391. Smart Cards
  392. Surround Systems
  393. TCPA / Palladium
  394. Trustworthy Computing
  395. Sense-Response Applications
  396. Optical Computer
  397. Graph Separators
  398. Extended Mark Up Language
  399. Cellular Communications
  400. Virtual Instrumentation
  401. Voice Quality
  402. Cable Modems
  403. Dynamic Memory Allocation
  404. Optical Mouse
  405. Generic Framing Procedure
  406. Dynamic Cache Management Technique
  407. Ethernet Passive Optical Network
  408. Synchronous Optical Networking
  409. Development of the Intenet
  410. Design and Analysis of Algoritms
  411. Infinite Dimensional Vector Space
  412. Instant Messaging
  413. Optical Fibre Cable
  414. GSM
  415. Ambiophonics
  416. Palladium
  417. Computer Viruses
  418. Third Generation
  419. Object Oriented Concepts
  420. Night Vision Technology
  421. TCP/ IP
  422. Dynamic Synchronous Transfer Mode
  423. Integrated Voice and Data
  424. Java Servlets
  425. Smart Quill
  426. Spam Assassin
  427. Stereoscopic Imaging
  428. Zigbee
  429. Ultra-Wideband
  430. Home Networking
  431. Internet Protocol Television
  432. Bacterio-Rhodopsin Memory
  433. Blade Servers
  434. Digital Cinema
  435. Holographic Versatile Disc
  436. Itanium Processor
  437. Local Multipoint Distribution Service
  438. Network Attached Storage
  439. Night Vision Technology
  440. Opera (web browser)
  441. Parasitic Computing
  442. Performance Testing
  443. Java Ring
  444. RD RAM
  445. GSM Security And Encryption
  446. Fast Convergence Algorithms for Active Noise Controlin Vehicles
  447. 3G vs WiFi
  448. Data Security in Local Network using Distributed Firewalls
  449. Computerized Paper Evaluation using Neural Network
  450. Bluetooth Based Smart Sensor Networks
  451. Laser Communications
  452. Multiple Domain Orientation
  453. Industrial Applications using Neural Networks
  454. Implementation Of Zoom FFT
  455. Image Processing
  456. Virtual keyboard
  457. Transient Stability Assessment using Neural Networks
  458. Tracking and Positioning of Mobiles in Telecommunication
  459. Timing Attacks on Implementations
  460. Prototype System Design for Telemedicine
  461. Optical Networking and Dense Wavelength Division Multiplexing
  462. Optical Burst Switching
  463. Image Processing & Compression
  464. Cyberterrorism
  465. Ipv6 - The Next Generation Protocol
  466. Driving Optical Network Evolution
  467. Cellular Neural Network
  468. Radio Network Controller
  469. Digital Audio Broadcasting
  470. Significance of real-time transport Protocol in VOIP
  471. Space Mouse
  472. Resilient Packet Ring Technology
  473. Wireless Networked Digital Devices
  474. Design of 2-D Filters using a Parallel Processor Architecture
  475. Hyper Transport Technology
  476. CorDECT
  477. Storage Area Network
  478. High Performance DSP Architectures
  479. Smart Dust
  480. MANET
  481. Biometrics Based Authentication
  482. Software-Defined Radio
  483. Digital Video Editing
  484. D-Blast
  485. Aeronautical Communication
  486. Gigabit Ethernet
  487. Wisenet
  488. Digital Light Processing
  489. Free Space Laser Communications
  490. Millipede
  491. AC Performance Of Nanoelectronics
  492. 4G Wireless Systems
  493. Blu Ray Disc
  494. Smart Fabrics
  495. Daknet
  496. Conditional Access System
  497. SyncML
  498. High Performance DSP Architectures
  499. Short Message Service (SMS)
  500. MANET
  501. Worldwide Inter operatibility for Microwave Access
  502. 64-Bit Computing
  503. Bio-Molecular Computing

0 comments