computer science seminars topics and briefs
#1

VOWIFI: vowifi is used to reference a Wi-Fi-based VoIP service
76.
VOICE MORPHING : The method of transforming the source speakerâ„¢s
speech to that of the target speaker is usually referred as voice morphing or
voice transformation or voice conversion
77.
ROBOCODE: Robocode is an open source educational game by Mathew
nelson (originally r was provided by IBM). it is designed to help people learn
to program in java and enjoy the experience
78.
JAVA CRYPTOGRAPHY ARCHITECTURE (JCA) : The java
cryptography architecture (JCA) is a framework for working with
cryptography using the java programming language
79.
ZOMBIE: In the world of UNIX, a zombie refers to a 'child' program that
was started by a 'parent' program but then abandoned by the parent. Zombie
is also used to describe a computer that has been implanted with a daemon
that puts it under the control of a malicious hacker without the knowledge of
the computer owner.Page 3

80.
WISENET: It is a wireless sensor network that monitors the environmental
conditions such as light, temperature, and humidity. This network is
comprised of nodes called motes that form an ad-hoc network to transmit
this data to a computer that function as a server.
81.
WOLFPACK: Officially known as Microsoft cluster server (MSCS), it was
released in September, 1997 as part of Windows NT 4.0, enterprise edition.
wolf pack is the codename used for Microsoftâ„¢s clustering solution
82.
COOPERATIVE LINUX : Employing the novel idea of a co-operative
virtual machine(CVM) co-operative Linux or colinx can support the kernel of
both the Microsoft windows and the Linux, to run parallel on the same
machine
83.
TRANS EUROPEAN SERVICES FOR TELEMATICS BETWEEN
ADMINISTRATIONS (TESTA) :
The trans European services for
telematics between administrations (TESTA) system is the private ip-based
network of the European community. TESTA is a telecommunications
interconnection platform for secure information exchange between the
European public administrations
84.
MOIP : Mobile communications over internet protocol is designed to be
totally mobile-centric, and is optimized specifically for mobile-handsets
environment rather than the pc
85.
HOLOGRAPHIC VERSATILE DISC (HVD) : It's an optical disc
technology still in the childhood stages of research called as the collinear
holography, would soon gain upper hand over the existing technologies like
the blue-ray and hd DVD optical disc systems with respect to its storage
capacity
86.
CYBORGS: Topic regarding the artificial living parts.
87.
AKA: AKA stands for the authentication and key agreement security
protocol. it is a mechanism which performs authentication and session key
distribution in universal mobile telecommunications system (umts) networks
88.
EXPONENTIAL KEY EXCHANGE :
89.
CRYPTOGRAPHIC AUTHENTICATION: Cryptographic authentication
schemes and protocols have been developed to provide authenticated key
agreement to prevent man-in-the-middle and related attacks.
90.
DATA GRAM CONGESTION CONTROL PROTOCOL (DCCP)
91.
PERVASIVE COMPUTING:
Ubiquitous computing or pervasive
computing is the result of computer technology advancing at exponential
speeds -- a trend toward all man-made and some natural products having
hardware and software. The main aim of pervasive computing, which
combines current network technologies with wireless computing, voice
recognition, internet capability and artificial intelligence, is to create an
environment where the connectivity of devices is embedded in such a way
that the connectivity is unobtrusive and always available.
92.
STREAM COMPUTING: The main task is to pull in streams of data,
process the data and stream it back out as a single flow and thereby analyzes
multiple data streams from many sources live.
94.
PIXIE DUST : pixie dust is the informal name that ibm is using for its
antiferromagnetically-coupled (AFC) media technology, which can increasePage 4

the data capacity of hard drives to up to four times the density possible with
current drives
95.
CUCKOO EGG: The term and the concept of cuckoo egg is quiet strange.
When you download copy protected songs, you may come across cuckoo egg
yourself. In the first 30 seconds of the downloaded song you may hear
something other than the initial song which could be the cuckoo clock sound
effects or a series of random sounds and noises that are free of any copyright
ownership. this happens for not buying the cd in the first place
96.
OFDMA: orthogonal frequency division multiple access (ofdma) is a
multiple access scheme for ofdm systems. it works by assigning a subset of
subcarriers to individual users.
97.
ROUTING :
98.
FULLSTREAM TECHNOLOGY:
when transmitting video data some
users on a slower internet connect may experience blocky views, artifacts and
pixilation effects during playback. ati full stream technology detects the
edges of these visible blocks and smoothes them over using a sophisticated
hardware accelerated filtering method to improve the performance and visual
quality of streaming video playback.
99.
THE "JITTERS": jitter buffers (and jitter filters) in tech terminology refers
to a hardware device or software process that eliminates jitter caused by
transmission delays in an internet telephony (VoIP) network.
100. THIN PROVISIONING: thin provisioning is most commonly used in
centralized large storage systems such as sans and in storage virtualization
environments where administrators plan for both current and future storage
requirements and often over-purchase capacity, which can result in wasted
storage, so in short it is used to describe the consolidation and automated
process of allocating just 'the exact required amount' of server space at the
time it is required.
101. CHOKE PACKET : It is used to describe a specialized packet that is used
for flow control along a network
102. SIGNCRYPTION : Signcryption is a new paradigm in public key
cryptography that simultaneously fulfils both the functions of digital
signature and public key encryption in a logically single step, and with a cost
significantly lower than that required by the traditional signature and
encryption approach
103. BEWIP : The Microsoft active sync based address book present in bewip is
based on the pocket outlook address book which makes the synchronization
easier
104. THE DATAGRAM DELIVERY PROTOCOL (DDP)
:
Datagram
delivery and routing service to higher layer protocols are the functions of
ddp. ddp frame headers can use short format headers which carry only the
source and destination service socket numbers, or the long format ddp
headers also carry the source and destination network and node addresses
needed for routing capability
105. LIN (LOCAL INTERCONNECT NETWORK): LIN is low cost serial
holistic communication system concepts for local interconnect networks in
vehicles which complements the existing portfolio of automotive multiplex
networksPage 5

108. BLOB. : Blob is the abbreviation for binary large object, a collection of
binary data stored as a single entity in a database management system.
109. WI-FI5 : wireless lan products based on the ieee 802.11a specification that
operates in the 5ghz radio frequency band were referred to as wi-fi5, a term
created by the wi-fi alliance
110. ANISOTROPIC FILTERING:
AF, is a technique in 3d graphics to
improve image quality in computer video games
111. GOOGLEWHACK : The goal of a googlewhack is to perform search
queries that will produce only one single search result in the Google search
engine
112. JAVA MANAGEMENT EXTENSIONS (JMX)
113. LUCENT VISION:
lucent vision is a real-time networked visual
information system that archives sports action using visual processing.
114. AUTHENTICATION BASED ON IRIS RECOGNITION:
iris
recognition is related to scanning eyes and authenticating similar to finger
print authentication. We scan the top layer of the eye that is iris and
authenticate the person.
115. IMAGE
PROCESSING UNDER EDGE
DETECTION AND
CORRECTION ALGORITHM FOR 3D CT IMAGES
116. AUTOMATED THEOREM PROVING (ATP) :
117. ELLIPTICAL CURVE CRYPTOGRAPHY (ECC) : this innovative
technology can produce smaller, faster and efficient cryptographic keys using
the break through technique of elliptic curve equation rather than employing
the traditional method of producing the key as the product of very large prime
numbers
118. 3D PC GLASSES: they do the job of influencing the brain to think that the
monitor is showing a real three dimensional object.
119. NCURSES: Ncurses is a programming library providing an API, allowing
the programmer to write text user interfaces in a terminal-independent
manner. It also optimizes screen changes, in order to reduce the latency
experienced when using remote shells
1.
Web searching
2.
Web Crawling
3.
Real Time Systems
4.
Network Computing Systems
5.
Distributed Hash Tables.
6.
Re-architecting & Internet Protocols.
7.
Bluetooth
8.
Storage Area Network
9.
Distributed database.
10.
Neural Computations.
11.
Artificial Neural Network
12.
Bioinformatics
13.
Cluster Computing
14.
DNA Computing in Security
15.
Face Recognition
16.
4g Wireless Systems
17.
Home Networking.
18.
Zigbee
19.
Stenography and Digital Watermarking.
20.
Multimedia Broadcasting via satellite.
21.
Surface Computer
22.
Data Mining
23.
Data Ware housing
24.
Parallel Computing.
25.
Multimedia Broadcast Multicast Services
26.
Holographic versatile disc.
27.
Wireless Technology.
28.
Bio-molecular Computers
29.
Fuzzy Logic.
30.
Genetic Algorithm.
31.
Elliptical Curve Cryptography(ECC)
32.
Blade Servers.
33.
NAS
34.
DELAY tolerant networks.
35.
Java Ring
36.
Tripwire
37.
Virtual Surgery.
38.
Wireless Application Protocol.
39.
Internet Telephony.
40.
Home Automation.
41.
Printable Computers.
42.
I modePage 2

43.
Hyper Transport Technology.
44.
Rapid prototyping.
45.
Management Information System.
46.
Digital Visual Interface.
47.
iSCSI-Future of network Storage.
48.
Genetic Engineering.
49.
Wireless markup Language.
50.
ATM Virtual Connections.
51.
Biometrics.
52.
Voice over Internet Protocol.
53.
MEMs in space.
54.
SALT ( Speech Application Language Tags)
55.
Voice Portals.
56.
Real Time Operating System.
57.
FREENET
58.
Benefits of Parallel and Distributed Computing
59.
Soft Computing.
60.
Data Compression with Huffman Algorithms.
61.
Human Verses Neural Network.
62.
E-Commerce.
63.
E-Governance.
64.
Sensor Network
65.
Enterprise Resource Planning.
66.
Network Security and its Principles.
67.
Cryptography Application.
68.
Impact of Information Technology on India
69.
Importance of e-commerce.
70.
Impact of Computers on Business
71.
Embedded System
72.
GIS
73.
GPRS.
74.
Adhoc Network
75.
120. VIRTUAL KEYBOARD
121. NANOROBOTICS
122. BLUE- RAY DISC
123. D PROGRAMMING LANGUAGE
124. DUAL CORE PROCESSOR
125. THE DESIGN AND IMPLEMENTATION OF A VIRTUAL MACHINE
OPERATING SYSTEM USING A VIRTUAL ACCESS METHOD
126. DIGITAL SIGNATURE :
127. FUTURE USE OF BIOMETRIC TECHNOLOGY FOR SECURITY AND
AUTHONTICATION
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: seminar topics for computer science on erp solutions, wireless communication seminar topics for computer science, topics for seminars in anatomy, seminar topics and prtocols, computer science seminar topics on nfcr, computer science seminar topics about c, ncurses cygwin,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  network security seminars report computer science technology 14 20,379 24-11-2018, 01:19 AM
Last Post:
  computer networks full report seminar topics 8 42,002 06-10-2018, 12:35 PM
Last Post: jntuworldforum
  Block Chain and Data Science jntuworldforum 0 7,955 06-10-2018, 12:15 PM
Last Post: jntuworldforum
  Optical Computer Full Seminar Report Download computer science crazy 46 66,322 29-04-2016, 09:16 AM
Last Post: dhanabhagya
  Computer Sci Seminar lists7 computer science crazy 4 11,408 17-07-2015, 10:29 AM
Last Post: dhanyasoubhagya
  Computer Architecture Requirements? shakir_ali 1 26,965 07-04-2015, 12:04 PM
Last Post: Kishore1
  Computer Architecture ACS Project? shakir_ali 0 7,505 30-10-2014, 12:01 AM
Last Post: shakir_ali
  eye gaze human computer interface shabeer 22 20,126 26-02-2014, 03:19 AM
Last Post: Guest
  Modular Computing seminars report computer science crazy 4 21,441 08-10-2013, 04:32 PM
Last Post: Guest
  BRAIN COMPUTER INTERFACE A SEMINAR REPORT Computer Science Clay 53 72,038 28-02-2013, 02:09 PM
Last Post: seminar details

Forum Jump: