Posts: 14,118
Threads: 61
Joined: Oct 2014
Seminars Topics
Latest Seminar Topics For Computer Science 2013
Collection of latest seminar topics for computer science 2013. Download full latest seminar topics for computer science 2013 in doc, pdf or ppt format.
Virtual Reality New Seminar Topic
Virtual Reality (VR), sometimes called Virtual Environments (VE) has drawn much attention in the last few years. The Virtual Reality uses a huge number...
Java Ring New Seminar Topic
A Java Ring is a finger ring that contains a small microprocessor with built-in capabilities for the user. It contains an inexpensive microprocessor in a stainless...
Data Recovery New Seminar Topic
Data recovery is the process of salvaging data from damaged, failed, corrupted, or inaccessible secondary storage media when it cannot be accessed normally...
Continuous Neighbour Discovery in Asynchronous Sensor Network. New Seminar Topic
In most sensor networks the nodes are static. Nevertheless, node connectivity is subject to changes because of disruptions in wireless communication...
5 Pen Technology New Seminar Topic
Computer affects our life in a much bigger way then most of us might have thought. It has become a compulsory requirement in most professions to be able to...
Pervasive Computing
Pervasive computing refers to embedding computers and communication in our environment. Pervasive computing provides an attractive...
WEB Operating System
One of the hottest topics that emerged these days between the area of Internet and distributed computing and the area of operating system is Web Operating...
Automatically Generating Models for Botnet Detection
A botnet is a network of compromised hosts that is under the control of a single, malicious entity, often called the botmaster. We present a system that aims...
I-Cloud by Apple
iCloud is the latest branding of Apple's cloud computing services. It has previously been branded as iTools in 2000, .Mac in 2002, and MobileMe in 2008.iCloud...
Data Leakage Detection
A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). Some of the data is leaked and found in an unauthorized...
Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis
Preparing a data set for analysis is generally the most time consuming task in a data mining project, requiring many complex SQL queries, joining tables...
Cybernetic Organism
CYBORG, a compound word derived from cybernetics and organism, is a term coined by Manfred Clynes in 1960 to describe the need for mankind to artificially...
Ethical Hacking
What is hacking? Hacking is unauthorized use of computer and network resources. (The term "hacker" originally meant a very gifted programmer...
Parallel Databases
Parallel machines are becoming quite common and affordable Prices of microprocessors, memory and disks have dropped sharply Recent...
SMS Based Notice Board - Project
In present digitalized world, the exploit of GSM and SMS is popular. Notice Board is primary thing in any institution / organization or public utility places...
Disease Prediction using Data Mining
Data mining is defined as sifting through very large amounts of data for useful information. Some of the most important and popular data mining techniques...
Keyboard without Keys and Board
Computing is now not limited to desktops and laptops, it has found its way into mobile devices like palm tops and even cell phones. But what has not changed...
ZigBee Technolgy
ZigBee is a wireless technology designed for control and sensor networks. It defines a set of communication protocols for low-data-rate Short-range...
Genetic Algorithms
Genetic algorithms are stochastic search algorithms, which act on a population of possible solutions. They are loosely based on the mechanics of population...
Operating System
A program that controls the execution of application programs An interface between applications and hardware Memory Management Process...
MBMS-Multimedia Broadcast Multicast Service
This Document provides an overview of the multimedia broadcast/multicast service (MBMS) for universal mobile telecommunications system (UMTS) networks...
Store Management System - Project
The system creates a standalone system that enables a store to schedule its items purchase operations based on the daily update of sales from its customers...
Bluetooth Technology
Bluetooth is a radio frequency specification for short range, point to point and point to multi point voice and data transfer. Bluetooth technology facilitates...
Application of ANN in IPWISA
There is no universally accepted definition of ANN. But perhaps most people in the field would agree that ANN is a network of many simple processors, each...
Graph Based Search Engine
Search Engine has become a major tool for searching any information from the World Wide Web (WWW). While searching the huge digital library available in...
Synchronization Markup Language
The popularity of mobile computing and communications devices can be traced to their ability to deliver information to users when needed. Users want ubiquitous...
JMX Based Grid Management Services
The paper presents Global Discovery Service (GDS), configuration and deployment tools for Grid infrastructure and advanced monitoring services implemented...
Electronic Banking
E-Banking or electronic banking is A major innovation in the field of banking E-Banking is a facility under which the customers can perform basic banking...
Intorduction To ASP.Net
According to Microsoft, "ASP.NET is a technology for building powerful, dynamic Web applications and is part of the .NET Framework" .NET is language...
3-D Password for More Secure Authentication - Project
Current authentication systems suffer from many weaknesses. Textual passwords are commonly used; however, users do not follow their requirements...
Ambient Intelligence
Ambient Intelligence refers to an exciting new paradigm in information technology, in which people are empowered through a digital environment that...
Dynamic Data Grid Replication Strategy
In data grid, large quantity of data files is produced and data replication is applied to reduce data access time. Efficiently utilizing grid resources...
Phishing Technology
In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords...
Google Glass
Project Glass is a research and development program by Google to develop an augmented reality Head-Mounted Display (HMD). The intended purpose of Project...
Big Data-Enterprise Data
The amount of data in our world has been exploding. Companies capture trillions of bytes of information about their customers, suppliers, and operations...
Intrution Detection Systems
A correct firewall policy can minimize the exposure of many networks however they are quite useless against attacks launched from within. Hackers are also...
Plastic Memory
Plastics have long formed the skeletons and skin of products, whereas silicon has supplied the brains. With the advent of polymer and crystalline organic...
Quantum Computing
The history of computer technology has involved a sequence of changes from one type of physical realisation to another --- from gears to relays to valves to...
Free Space Optics
Free Space Optics (FSO) or Optical Wireless, refers to the transmission of modulated visible or infrared (IR) beams through the air to obtain optical communications...
CyberTerrorism
Cyberterrorism is any act of terrorism that uses information systems or digital technology (computers or computer networks) as either an instrument or a...
Computer Virus
Computer Viruses are widely known as evil programs that are meant to corrupt the peaceful environment of a computer. Actually a computer virus is a piece of...
Diamond Chip
Electronics without silicon is unbelievable, but it will come true with the evolution of Diamond or Carbon chip. Now a day we are using silicon for the manufacturing...
E Cash Payment Systems
Electronic payment systems come in many forms including digital checks, debit cards, credit cards, and stored value cards. The usual security features for...
Brain Fingerprinting
Brain fingerprinting is based on finding that the brain generates a unique brain wave pattern when a person encounters a familiar stimulus Use of functional...
CAPCHA
We introduce CAPTCHA, an automated test that humans can pass, but current computer programs can't pass: any program that has high success over a captcha can...
Game Playing in Artificial Intelligence
Game playing was one of the first tasks undertaken in Artificial Intelligence. Game theory has its history from 1950, almost from the days when computers became...
Mobile Iptv
An IPTV signal is a stream of data packets traveling across the Web.Internet TV is relatively new -- there are lots of different ways to get it, and quality, content...
In Vehicle Networking
Today's vehicles contain hundreds of circuits, sensors, and many other electrical components. Communication is needed among the many circuits and functions...
IP Telephony
If you've never heard of Internet Telephony, get ready to change the way you think about long-distance phone calls. Internet Telephony, or Voice over Internet...
Rain Technology
RAIN technology is the most scalable software cluster technology for the Internet marketplace today. There is no limit on the size or the performance of a RAIN...
Internet Access via Cable TV Network
Internet is a network of networks in which various computers connect each other through out the world. The connection to other computers is possible with the...
Laptop Computer
Laptops are becoming as common as your cellular phone, and now they share the hardware industry as that of desktop computers with a number of configurable options...
Palm Vein
An individual first rests his wrist, and on some devices, the middle of his fingers, on the sensor's supports such that the palm is held centimeters above the...
Holographic Memory
Devices that use light to store and read data have been the backbone of data storage for nearly two decades. Compact discs revolutionized data storage in the...
Green Cloud
Cloud computing is offering utility oriented IT services to users worldwide. It enables hosting of applications from consumer, scientific and business...
Nokia Morph
The “Nokia Morph” is a theoretical future device based on nanotechnology that might enable future communication devices. It is intended to demonstrate...
Pill Camera
The aim of technology is to make products in a large scale for cheaper prices and increased quality. The current technologies have attained a part of it, but...
Protein Memory
Since the dawn of time, man has tried to record important events and techniques for everyday life. At first, it was sufficient to paint on the family cave wall...
Smart Memories
Trends in VLSI technology scaling demand that future computing devices be narrowly focused to achieve high performance and high efficiency, yet also target...
Speed Detection of Moving Vehicle Using Speed Cameras
Although there is good road safety performance the number of people killed and injured on our roads remain unacceptably high. So the roads safety strategy...
Spyware
Over the last several years, a loosely defined collection of computer software known as “Spyware” has become the subject of growing public alarm. Computer...
Tablet Personal Computer
A tablet PC is a laptop or slate-formed mobile computer that is outfitted with a touchscreen or screen that can be controlled with a digital pen or stylus, or...
Digital Investigation Process
Digital forensics has been defined as the use of scientifically derived and proven methods towards the preservation, collection, validation, identification...
Touch Screens
Touch-screens are typically found on larger displays, in phones with integrated PDA features. Most are designed to work with either your finger or a special...
Universal Broadband Connectivity
This paper outlines a migration path towards Universal Broadband Connectivity, motivated byhighlighting the advantages of and policy implications for...