
Seminar topics for computer science 2011 & 2012
- 1. Struts Integration
- 2. Application of ANN in Data Mining of Medical Images
- 3. Smart Card Standards
- 4. Internet Searching
- 5. Distributed Garbage Collection
- 6. Software advances in wireless communication (Cognitive Radio, Dynamic spectrum Access, etc.
- 7. Image compression
- 8. Twd radar satellite communications
- 9. Dual Energy X-ray Absorptiometry
- 10. Molecular Keypad Lock
- 11. Internet version 2
- 12. Internet Networking
- 13. Unbiquitos Smart Homes
- 14. Grid Computing
- 15. Software Code Security
- 16. Microcontroller Based Power Theft Identification
- 17. LAN PROTOCOL ARCHITECTURE
- 18. LAN PROTOCOL
- 19. Multi Protocol Label Switching
- 20. Recognition of VoIP Speech
- 21. VOIP Over Wireless LAN
- 22. ARGUMENTED VIRTUAL REALIT
- 23. Object oriented technologies
- 24. Blue Ray
- 25. GIMP
- 26. Computer peripherals
- 27. Online software Distribution
- 28. Virtual memory
- 29. New Dimension of Data Security using Neural Networks and Numerical Functions
- 30. The Mbone And Multicasting
- 31. Reliable Multicast
- 32. Wimax
- 33. JIRO Java-based technology
- 34. Surface-conduction Electron-emitter Display (SED
- 35. Gesture recognition
- 36. AMD Processors
- 37. GABOR Wavelet
- 38. Revolutions in the Operating System and Servers
- 39. Nano Ring Memory
- 40. Bluetooth technology
- 41. Gigabit networking
- 42. Computational Geometry in Drug Design
- 43. Voice Roaming
- 44. HONE POTS
- 45. Genetic Algorithm
- 46. Network Management and Security
- 47. AUGMNETED VIRTUAL REALIT
- 48. Unified Communication
- 49. Third Generation
- 50. Multimedia Broadcasting via Satellite
- 51. Web Spam
- 52. BRIAN GATE TECHNOLOGY
- 53. Wearable Computers
- 54. Embedded systems
- 55. Fuzzy Logic
- 56. Search Engine Optimisation
- 57. Improving tcp performance over mobile ad hoc networks
- 58. Optical Disc Data Security
- 59. Blogs & their Creation
- 60. Spectral Methods for Graph Partitioning
- 61. Embedded web server for remote access
- 62. Root cause Localization and analysis of faults[Autonomic Computing]
- 63. Financial Forecasting
- 64. Open Source Technology
- 65. ARRAS AND SENSORS
- 66. GSM Security And Encryption
- 67. Storm botnet
- 68. BRAIN FINGER PRINT TECHNOLOG
- 69. Satellite Networks
- 70. Open ‘ssh’
- 71. Peer to peer Networking
- 72. SPINTRONICS
- 73. multimedia-oriented web based instructional system
- 74. SUNSPOT (wireless sensor network
- 75. GRASSHOPPER Operating System
- 76. Multiple Domain Orientation
- 77. Secure Computing
- 78. Tracking and Positioning of Mobiles in Telecommunication
- 79. Advanced Queue Management Techniques
- 80. Bandwidth estimation in broadband access networks
- 81. Software model checking
- 82. The Architecture of a Moletronics Computer
- 83. Semi Supervised Learning using Gaussian Process
- 84. Parallel Computations
- 85. Mesh Based Geometric data processing
- 86. Teleportation
- 87. Performance Evaluation of IEEE 802
- 88. ORACLE DATABASE 10g
- 89. Digital Signal Processing and their applications
- 90. DataWareHosuing
- 91. Voice Routing over IP Telephony
- 92. Cyber Crime and Security
- 93. Serial ATA (SATA
- 94. Managing Data with emerging technologies
- 95. Ubiquitous computing
- 96. DRUG DISCOVERY
- 97. USB Tape Drives
- 98. BAR CODES
- 99. Clustering
- 100. Authentication and Key Agreement (AKA
- 101. Cell phones
- 102. Application of Genetic Algorithms in Network routing
- 103. Stereoscopic Projection Systems
- 104. Multi-application Framework for Smart Cards
- 105. ARM architecture
- 106. Artificial Neural Networks
- 107. NANO TECHONOLGY
- 108. Energy Efficient query Optimization
- 109. Acid rains
- 110. Frequent ItemSet Mining
- 111. Query Based Fine-grained PageRank
- 112. Signal Processing for Networking
- 113. Quantum computing
- 114. Wireless Application Protocol
- 115. Web Designing with HTML
- 116. Enery efficiency in Wireless sensor networks
- 117. Backup and Recovery planning
- 118. Ethical Hacking
- 119. E-wallet
- 120. BARCODES
- 121. Comparative study on Authoring Tools
- 122. Smart Dust
- 123. Optical networking
- 124. Management Information System
- 125. Advanced Encryption Standard
- 126. Determining Global States of Distributed Systems
- 127. Data Management in Sensor Networks
- 128. SERVELTS
- 129. Semi-supervised Learning using Graph Kernels
- 130. MAIN FRAMES
- 131. Search for extra terrestrial intelligence using satellite communication
- 132. Public Key Encryption And Digital Signature
- 133. Steganography. The art of hiding information
- 134. Digital Visual Interface
- 135. Flexible CRT Displays
- 136. Ethernet
- 137. Bio-Medical Instrumentation and Signal analysis
- 138. Channel Allocation Algortihms for Mobile Telephony
- 139. HAVi: Home Audio Video Interoperability
- 140. A Probabilistic Approach to Micropayment
- 141. Transient Stability Assessment using Neural Networks
- 142. BEANS
- 143. Global System for Mobiles
- 144. DYNAMIC SOURCE ROUTING PROTOCOL
- 145. Internet Telephony
- 146. Light Pen
- 147. RFID : Comparative study of Collision Resolution Protocols
- 148. Network Accelerators
- 149. Scheduling in Embedded Multiprocessors
- 150. NETWORK SECURITY
- 151. Real Time Speech Translation
- 152. Facial Recognition System
- 153. Digital Video Editing
- 154. Blue Tooth Technology
- 155. Packet Interception
- 156. Earning Online Money
- 157. membrane computing
- 158. Viruses and Worms
- 159. VIRTUAL REALITY
- 160. Plasma Displays
- 161. Classification, Clustering and their Application for Damage Detection in Mechanical Structures
- 162. Micro Mouse
- 163. ELECTRONIC CARDIO GRAM
- 164. Middleware in Embedded Systems
- 165. Evolution of computers
- 166. Kerberos
- 167. Digital Rights Management
- 168. Wireless MAN
- 169. OpenGL-application programming interface
- 170. Optical canoflague
- 171. HomeRF- localized wireless technology optimized for the home environment
- 172. CASP
- 173. Narrow Band and Broad Band ISDN
- 174. Wireless sensor network
- 175. MAGIC SQUARES
- 176. Neural networks and applications
- 177. Bio metrics IRIS technique
- 178. SMART CARDS
- 179. Graphical Processing Unit
- 180. BLU-RA DISC
- 181. Dataset Query algorithms in Streaming Mining
- 182. Information Extraction modes & techniques
- 183. eXtensible Bindings Language (XBL
- 184. Orthogonal Frequency Division Multiplplexing
- 185. Lucid Linx
- 186. Computer Forensics
- 187. Scheduling algorithm
- 188. Botnet
- 189. Fine-grained Access Control in Databases
- 190. Power Line Networking
- 191. Study of TGREP
- 192. Real time communication in wireless sensor networks
- 193. Blue-ray disk
- 194. Image processing and applications
- 195. Web Data Management
- 196. Nano computing
- 197. Form Wizard
- 198. Virtual Keyboards
- 199. Bionetric Authentication
- 200. Stealth Virus
- 201. Parallel Computing In Remote Sensing Data Processing
- 202. Server side Java
- 203. How E-learning Works
- 204. Archiever Analyzer
- 205. Light-trails
- 206. Sensor fusion for video surveillance
- 207. Web Technology
- 208. Information Extraction from structured & Semi-structured data
- 209. Classification, Clustering and Application in Intrusuion Detection System
- 210. OOPS CONCEPTS
- 211. Encrypted Hard disks
- 212. E-Commerce
- 213. Data over Cable System (DOCSIS
- 214. ATM networks
- 215. SUPER COMPUTER
- 216. Agent Mediated E-commerce
- 217. Personel Digital assistance
- 218. HUMAN AREA NETWORK
- 219. Secure Database Service
- 220. Genetic Programming
- 221. Split Range Synchronization
- 222. Digital Jewellery
- 223. Fuzzified Computer-Automated Crane Control System
- 224. SIMPUTERS
- 225. Encrypted Text chat Using Bluetooth
- 226. RED TACTON
- 227. Samba Fileserver(38
- 228. Mail server Management
- 229. Digital Media Broadcasting
- 230. Holographic Versatile Disc
- 231. Applications of Graph Theory to Metabolic Pathways
- 232. Brain computer interface
- 233. MPEG-7
- 234. Reliable and Fault Tolerant Routing on Mobile Ad Hoc Network
- 235. Autonomic Computing
- 236. Software Testing & Quality Assurance
- 237. Methods in virtual networking
- 238. Quad core Module technology
- 239. Personal Mass Media Blogging, Syndication, Podcasting, and Vidcasting
- 240. High Performance Clusters
- 241. Global Positioning System
- 242. Web browsers
- 243. Automatic number plate recognition
- 244. Future of business Computing
- 245. Holt-Winters technique for Financial Forecasting
- 246. Touch screen technology
- 247. Security On Wireless LAN Adaptive cruise control
- 248. Vertical Cavity Surface Emitting Laser
- 249. Fingerprint recognition system by neural networks
- 250. Lixto suite
- 251. Security Issues In GRID COMPUTING
- 252. COMPLIERS
- 253. Sand Box Technology
- 254. Emergency Health Care System
- 255. Wireless Applications
- 256. Visual Neuro Prosthetics
- 257. Rendering Maths on web with Java Swing
- 258. New Age Graphics
- 259. Interupts
- 260. Dynamic resource allocation in Grid Computing
- 261. Multicast Routing
- 262. Quality of service in Differentiated Service Architecture
- 263. Computer vision
- 264. Elliptical Curve Cryptography(ECC
- 265. Emerging trends in robotics using neural networks
- 266. Mobile Library Management
- 267. Wireless Technologies (bluetooth, 802.11x, IRDA
- 268. Mobile Networking
- 269. Distributed database management system
- 270. Firewalls
- 271. Applications of speech recognition
- 272. Cryptography and steganography
- 273. Data mining through Active Learning
- 274. Internet Cryptopraphy
- 275. BLUE RAY DISKS
- 276. Distributed Computing
- 277. Mobile ad hoc network
- 278. Honeypots
- 279. Mobile Infrastructure Management
- 280. Multimedia
- 281. BioComputers
- 282. Reconfigurable computing
- 283. Site Search Engine
- 284. Cooperative Adaptive Cruise Control
- 285. New storage strategy = Disk -Disk -Tape Back up
- 286. CRPTOGRAPHY AND N/W SECURITY
- 287. Global positioning response system
- 288. MAC address
- 289. Bio Telemetry
- 290. E-MINE: A novel web mining approach
- 291. Ant Colony optimization for routing in Mobile and Adhoc Networks
- 292. Porting Device Drivers For The Solaris
- 293. HIGH SPEED LANS
- 294. Network Anomaly
- 295. Auto-pilots
- 296. iSCSI: The future of Network Storage
- 297. Content Management
- 298. Statistical Forecasting
- 299. CRYONICS
- 300. Captchas
- 301. Datbase management
- 302. Wi- Fi Technology
- 303. DNA Computing
- 304. Voice Over Internet Protocol
- 305. Cd,dvd,ird
- 306. Task Management
- 307. Integration of Parallel Database in a Service Oriented Architecture
- 308. Authoring environments for open source courseware
- 309. TDMA implementation for QoS routing in Ad Hoc Networks
- 310. Cyborgs
- 311. High Performance Computing
- 312. Tablet PC
- 313. Text Classification Using Semi-supervised and Active Learning
- 314. Middleware architecture for Pervasive computing
- 315. Near Filed Communication (NFC
- 316. Visualization and Computer Graphics
- 317. Ovonic Unified Memory
- 318. Virtual networking
- 319. IPODS
- 320. Satellite communication
- 321. Biometrics
- 322. HONEY POTS
- 323. IDMA The Future of Wireless Technology
- 324. Faultolerant Routing in Mobile Ad-Hoc Network
- 325. Natural Language Processor
- 326. Time Complexity
- 327. Mobile agent
- 328. Dynamic spectrum access
- 329. BIO METRICS
- 330. Enterprise Security
- 331. X-By-Wire System , Communication Bus perspective
- 332. Geographic Versatile Dist
- 333. J2EE Security
- 334. ZFS File system
- 335. Etl tools(informatica)
- 336. Query Processing on Data Streams
- 337. Geometric Invariants in Biological Molecules
- 338. Mobile communication
- 339. Magnetic RAM
- 340. High Altitude Aeronautical Platforms
- 341. Virtualization Technology
- 342. Layered versioning for software configuration management
- 343. Main memory databases
- 344. TETRA-Terrestrial Enhanced Trunked Radio
- 345. CRYPTOGRAPHY
- 346. Night Vision Technology
- 347. Personal Satellite assistant Systems
- 348. Data Mining and Data Warehousing
- 349. Security of Open-Source Software
- 350. Technotask management
- 351. QoS in Networking using active Networks
- 352. Future of the internet
- 353. Fine Grained DataBase Security
- 354. Touch Screen
- 355. Earth Simulator- Fastest Supercomputer
- 356. Pen Drive
- 357. Web Search Results' Ranking: PageRank, HITS and Related Work
- 358. Data Mining concepts & Models
- 359. Aspect-oriented programming (Aop
- 360. Embedded Linux
- 361. Multiple client’s communication
- 362. Mobile Paradigm
- 363. The MBMS
- 364. X-Internet
- 365. Datagram Congestion Control Protocol (DCCP
- 366. Wireless Markup Language(WML
- 367. Robocode
- 368. Agile Software development
- 369. Crusoe Processors
- 370. Storage Farms
- 371. SSL-TLS
- 372. Windows Vista
- 373. Artificial Intelligence in Machines
- 374. HOLOGRAPHIC MEMORY
- 375. SALT (Speech Application Language Tags
- 376. Fiber optic communication
- 377. Antimeter
- 378. INTERFACES
- 379. QoS in VoIP
- 380. Ipod
- 381. Intel MMX Technology
- 382. Reconfigurable Hardware in Wireless communication
- 383. Spin monics
- 384. Data Warehouse
- 385. Tablet-pc
- 386. Forecasting
- 387. Wireless Security
- 388. Epsilon nets and transversal of hypergraphs
- 389. Media gateways
- 390. TESTING METHODS
- 391. QoS in Wireless LANs
- 392. Proactive Anomaly Detection
- 393. Seasonal and Adaptive Forecasting
- 394. Text Classification
- 395. GLUCO METER
- 396. DataBase Migration
- 397. Intelligent Patient Monitoring System
- 398. Approximate string matching for Music retrieval
- 399. Signal Integrity Fundamentals for Digital Design
- 400. Watermarking Digital Audio
- 401. QOS in software server Firewalls
- 402. Hacking
- 403. Efficiency / Comparative study of routing schemes in event based systems
- 404. Wi-Fi (802.11b
- 405. Leave Mgnt System
- 406. Curl: A Gentle Slope Language For The Web
- 407. Hackers prospectivs
- 408. Applications of Soft Computing in Medical Image Analysis
- 409. Grid Data Farm for Petascale
- 410. Java Class Loader
- 411. Turbo Codes
- 412. Middleware for Wireless Sensor Networks
- 413. Fault Tolerance in Virtual Machine Environments
- 414. Fluorescent Multilayer Disc (FMD
- 415. Analysing Software Life Cycle of Different Program Paradigm
- 416. Web servers
- 417. Compressed Domain Processing And Video Information System
- 418. Chess Algorithm
- 419. Recovery in Main Memory Databases
- 420. Choreography
- 421. Using Regular Expressions In java
- 422. Torents
- 423. Introduction to Speech Recognition
- 424. Trends in Mobiles & PC’s
- 425. Biometric Technology
- 426. Computational Intelligence and Linguistics
- 427. Co-operative LINUX
- 428. High Speed Data In Mobile Networks
- 429. Embedded systems and vlsi an architectural approach to reduce leakage energy in memory
- 430. Biometric Secuirty
- 431. Inter-Operabilty of 802
- 432. Micro Hard disk Drives
- 433. Cross Platform Component Object Model
- 434. Micro chip production using extreme uv lithography
- 435. Forecasting using Double Exponential Smoothing Method
- 436. Mining Document Streams
- 437. DIGITAL MOVIES
- 438. Ontological Relation Discovery
- 439. A cognitive radio approach for using of virtual unlicensed spectrum
- 440. Cluster computing
- 441. DNA Based computer
- 442. Iris scanning
- 443. Netowork Security
- 444. Sniffers
- 445. Real Time Operating Systems on Embedded ICs
- 446. GAIT RECOGNITION
- 447. Distributed Firewalls
- 448. Concurrent Programming and Parallel distributed O.S.
- 449. Virtual Private Networks(VPNs)
- 450. Issues in Middleware for Pervasive Computing
- 451. Google or Yahoo Case Study
- 452. LOC technology (Lab On a Chip
- 453. NVSRAM- Non Volatile Static RAM
- 454. IP SPOOFING
- 455. Spatial DataMining
- 456. Computer hardware
- 457. Ruby on Rails RoR
- 458. Data warehousing
- 459. Cryogenic Processor
- 460. Wireless communication system
- 461. Intelligent RAM : IRAM
- 462. WATERFALL MODEL
- 463. Multicast Congestion Control
- 464. S/w life cycle/affiliated programs
- 465. Embeded Systems
- 466. Optimization of Protocol Stack for wireless networks
- 467. UMA (Unlicensed Mobile Access
- 468. VQ In Converging Telephony And Ip Networks
- 469. Uniprocessor Virtual Memory Without TLBS
- 470. Mobile Casts
- 471. Kinetic data structuring
- 472. Sensor Networks
- 473. ELLICA
- 474. MANET:-The Art of Networking without a Network
- 475. Techniques to aid property specification in Model Checking
- 476. Security Issues in Wireless Networks
- 477. Trusted Network Connect (TNC
- 478. Mobile Computing
- 479. Capacity of Ad-hoc Wireless Networks
- 480. Future Programming Techniques and Concepts
- 481. Digital audio
- 482. Oracle RDBMS
- 483. Soft computing
- 484. Trends in Compiler Construction
- 485. Evolutionary Programming
- 486. Pluggable Authentication Modules (Pam
- 487. Synchronous Optical Networking
- 488. VOIP Security
- 489. Multi-Relational Data Mining
- 490. Secure Socket Layer (SSL
- 491. Parallel computing
- 492. TOUCH SCREEN SSTEM
- 493. Digital Imaging
- 494. Tape Drive Technologies LTO
- 495. Bit And Bytes
- 496. Peer to Peer and Overlay Networks
- 497. Attacks on Smart Cards
- 498. Server virtualization
- 499. PolyBot Modular, self-reconfigurable robots
- 500. Network Modeling and Simulation
- 501. Java Security
- 502. Hyper-Threading Technology
- 503. Nano-technology and application
- 504. Telephony Routing over IP
- 505. Session Initiation Protocol (SIP
- 506. Dataflow machines
- 507. Authentication
- 508. Introduction to LaTeX
- 509. RFID Security
- 510. Proactive Network Anomaly Detection
- 511. Middleware for Sensor Networks
- 512. Techniques for analysis, verification, validation of digital systems
- 513. Pervasive computing
- 514. Microcontroller Based Automation
- 515. Computational neuroscience
- 516. INFORMATION SECURITY
- 517. Database Security
- 518. Polymer Memory
- 519. Relational Data Mining
- 520. VHDL (VHSIC Hardware Description Language
- 521. Franchise Mgnt System
- 522. DISTRUBUTED COMPUTING
- 523. Operating systems
- 524. Generic algorithm
- 525. Collaborative Mobile Environments
- 526. Augmented Reality
- 527. Plasmonics
- 528. BRAIN FINGER PRINT TECHNOLOGY
- 529. Fluorescent Multilayer Optical Data Storage
- 530. Computational Photography
- 531. High Performance DSP Architectures
- 532. Working of E-Mail
- 533. Parasitic computing
- 534. Search Engine
- 535. Network security with cryptography
- 536. Symbian OS
- 537. Embedded Configurable Operating system
- 538. VoIP in mobile phones
- 539. Virtual P.C.
- 540. DATA WARE HOSUING & MINING
- 541. multi-wordnets
- 542. Search algorithm
- 543. Java Cryptography Architecture (JCA
- 544. Future of Satellite Communication
- 545. HACKERS
- 546. Integrating Structural Design and Formal Methods in RealTime System Design
- 547. HYPER THREAD TECHNOLOGY
- 548. Query Optimization
- 549. Matlab (matrix lab)
- 550. Mining the Web: Searching, Integration and Discovery
- 551. Serial Attached SCSI
- 552. Knowledge discovery and Data Mining
- 553. SPYWARE
- 554. SMART QUILL
- 555. Fusion Memory
- 556. Quality of Service Routing in computer networks
- 557. Wireless technology
- 558. Methods in virtual private networks
- 559. Data Pre Processing
- 560. Video conference
- 561. Nonvolatile Flash Memory
- 562. Aspects of Database Security and Program Security
- 563. BLOW FISH
- 564. Hapics
- 565. Native Command Queuing (NCQ
- 566. Voice Portals
- 567. Probabilistic I/o Automata
- 568. BRAIN FINGER
- 569. Proactive computing
- 570. Performance Evaluation
- 571. Micro Total analysis systems
- 572. Routing in Sensor Networks
- 573. Java Messaging Service (JMS
- 574. FIBER CHANNELS
- 575. Wireless Connectivity for Rural Areas
- 576. Virtual Network Computing
- 577. Object Persistence
- 578. Gnu Emacs
- 579. Security threats in the World Wide Web
- 580. Distributed and Parallel Computing
- 581. Globalization
- 582. Radio Astronomy
- 583. Form Processing
- 584. Software Architecture Analysis
- 585. Quantum teleportation
- 586. Ext3 Filesystem
