Latest Computer Science CSE Seminar Topics

1. 10 Gigabit Ethernet
2. 3D Internet
3. 3d Optical Data Storage
4. 3D password
5. 3D Searching
6. 3D Television
7. 4G Broadband
8. 5 Pen PC Technology
9. 5g Wireless System
10. A Plan For No Spam
11. Adding Intelligence to Internet
12. Airborne Internet
13. AJAX
14. Alternative Models Of Computation
15. Ambient Intelligence
16. Amorphous Computing and Swarm Intelligence
17. Anonymous Communication
18. Asynchronous Chips
19. BEOWULF Cluster
20. Bio-inspired Networking
21. Biological Computers
22. Biometric Voting System
23. Biometrics in SECURE e-transaction
24. BitTorrent
25. BlackBerry Technology
26. Blue Brain
27. Bluejacking
28. Bluetooth Broadcasting
29. Bluetooth V2.1
30. Brain Chips
31. Brain Fingerprinting
32. Brain Gate
33. Breaking the Memory Wall in MonetDB
34. Browser Security
35. Capacitive And Resistive Touch Systems
36. CAPTCHA
37. Case Based Reasoning System
38. Chameleon Chip
39. Cisco IOS Firewall
40. Cloud Computing
41. Combating Link Spam
42. Compositional Adaptation
43. Computational Intelligence in Wireless Sensor Networks
44. Computational Visual Attention Systems
45. Compute Unified Device Architecture CUDA
46. Computer Intelligence Application
47. Confidential Data Storage and Deletion
48. Cooperative Linux
49. CORBA
50. Cyborgs
51. Diamond chip
52. Digital Jewelry
53. Digital Rights Management
54. Digital Scent Technology
55. Distributed Interactive Virtual Environment
56. DNA chips
57. Domain Driven Data Mining
58. DOS Attack
59. Dual Core Processor
60. Dynamic TCP Connection Elapsing
61. E-Ball Technology
62. E-Cash Payment System
63. Elastic Quotas
64. Enhancing LAN Using Cryptography and Other Modules
65. E-Paper Technology
66. Ethical Hacking
67. Example Based Machine Translation
68. Exterminator
69. Eye Movement-Based Human Computer Interaction Techniques
70. Face Recognition Technology
71. Facebook Thrift
72. Fast And Secure Protocol
73. Fiber Channel
74. Finger Tracking In Real Time Human Computer Interaction
75. FireWire
76. Generic Access Network
77. Generic Visual Perception Processor GVPP
78. Gesture Recognition Technology
79. Gi-Fi
80. Global Wireless E-Voting
81. Google App Engine
82. Google Chrome OS
83. Google File System
84. Google Glass
85. Google’s Bigtable
86. GPS
87. Graphical Password Authentication
88. Green Cloud
89. Green Computing
90. GSM Based Vehicle Theft Control System
91. Hadoop
92. HALO
93. Haptic Technology
94. Haptics
95. Hi-Fi
96. High Performance Computing with Accelerators
97. HTAM
98. Humanoid Robot
99. Hurd
100. iCloud
101. IDC
102. iDEN
103. IDS
104. Intel Centrino Mobile Technology
105. Intel Core I7 Processor
106. Intelligent RAM
107. Intelligent Software Agents
108. Intelligent Speed Adaptation
109. Internet Access via Cable TV Network
110. Intrusion Tolerance
111. IP spoofing
112. iPAD
113. Iris Scanning
114. iSCSI
115. Java Database Connectivity
116. JOOMLA and CMS
117. Keil C
118. Lamp Technology
119. Laptop Computer
120. Li-Fi Technology
121. Light emitting polymers
122. Linux Kernel 2.6
123. Linux Kernel 2.6
124. Linux Virtual Server
125. Location Dependent Query Processing
126. Location Independent Naming
127. Longhorn
128. Low Power UART Design for Serial Data Communication
129. LWIP
130. Measuring Universal Intelligence
131. Mesh Radio
132. Microsoft Palladium
133. Middleware
134. Mind-Reading Computer
135. Mobile Ad-Hoc Networks Extensions to Zone Routing Protocol
136. Mobile IP
137. Mobile Jammer
138. Mobile Number Portability
139. Mobile Phone Cloning
140. Mobile TV
141. Mobile WiMax
142. MPEG Video Compression
143. MPEG-7
144. Multiparty Nonrepudiation
145. Multiprotocol Label Switching
146. Multi-Touch Interaction
147. Nano Cars Into The Robotics
148. Nanorobotics
149. Neural Interfacing
150. Next Generation Secure Computing Base
151. NGSCB
152. Nvidia Tegra 250 Developer Kit Hardware
153. NVIDIA Tesla Personal Supercomputer
154. On-line Analytical Processing (OLAP)
155. Packet Sniffers
156. Palm Vein Technology
157. Parallel Virtual Machine
158. Param 10000
159. PHANToM
160. Phishing
161. Pill Camera
162. Pivot Vector Space Approach in Audio-Video Mixing
163. Pixie Dust
164. Plagiarism Detection Techniques
165. Privacy Preserving Data Publishing
166. Public Key Infrastructure
167. Rain Technology
168. Real Time Application Interface
169. Reconfigurable computing
170. Refactoring
171. Remote Administration Trojan's
172. RESTful Web Services
173. Robotic Surgery
174. Rover Technology
175. SAM
176. Satellite Radio
177. SATRACK
178. Seam Carving for Media Retargeting
179. Secure ATM by Image Processing
180. Security Features of ATM
181. Self Defending Networks
182. Self Organizing Maps
183. Self-Managing Computing
184. Semantic Digital Library
185. Semantic Web
186. Sensitive Skin
187. Sensors on 3D Digitization
188. Silverlight
189. Sixth Sense Technology
190. Skinput Technology
191. Sky X Technology
192. Slammer Worm
193. Smart Client Application Development using .NET
194. Smart Memories
195. Smart Skin for Machine Handling
196. Sniffer for detecting lost mobiles
197. Socket Programming
198. Soft Computing
199. Software Reuse
200. Spawning Networks
201. SPCS
202. SPECT
203. Speed protocol processors
204. Strata flash Memory
205. Surface Computer
206. Survivable Networks Systems
207. Swarm Intelligence
208. Synthetic Aperture Radar System
209. System in Package
210. Telepresence
211. Tempest and Echelon
212. Text Mining
213. The Callpaper Concept
214. The Deep Web
215. Thermography
216. Tool Command Language
217. Transactional Memory
218. Tripwire
219. Tsunami Warning System
220. Ubiquitous Networking
221. Unicode And Multilingual Computing
222. Unified Modeling Language (UML)
223. Unlicensed Mobile Access
224. Virtual Campus
225. Virtual Retinal Display
226. Visible Light Communication
227. VoCable
228. Voice Browser
229. VoiceXML
230. Wardriving
231. Web 2.0
232. Web Clustering Engines
233. Wibree
234. Windows DNA
235. Wine
236. Wireless LAN Security
237. Wireless USB
238. Wireless Video Service in CDMA Systems
239. Wolfram Alpha
240. Word Sense Disambiguation
241. X- Internet
242. XML Encryption
243. Y2K38
244. Yii Framework
245. Zenoss Core
246. Zettabyte FileSystem
247. zForce Touch Screen

No comments:

Post a Comment