You are on page 1of 21

seminar topics for computer science 1. 3 - Dimensional Printing 2. Case Based Reasoning 3. Storage Virtualization 4. Wingate Vpn 5.

Thin Client 6. Location Aware Computing 7. Ldap( Lightweight Directory Access Protocol ) 8. Ubiquitous Computing 9. Gps 10. Honeypots &Honeynet 11. Data Mining 12. Virtual Linux 13. Virtual Lan 14. Rfid 15. Wireless Security 16. Virtual Private Lan Service 17. Web Intelligence 18. Jiro - The Java Based Technology 19. Nano Technology 20. Data Warehousing 21. Kerberos 22. VoipOverWlan 23. Process Migration 24. Snake Robot

25. Wusb( Wireless Universal Serial Bus ) 26. Speaker Recognition 27. Deep Blue 28. Intrusion Prevention System 29. Wireless Mesh Networks 30. Genetic Programming 31. Dos ( Denial Of Services ) 32. Sprite Os 33. Peer-To-Peer Architecture Using Autonomous Agent 34. Quantum Computers 35. Public Key Infrastructure 36. Mobi Desk 37. Soft Computing 38. Mobile Adhoc Network 39. Embedded Technology 40. The Network Ram Disk 41. Human Computer Interaction 42. Edge 43. Dns Security 44. 3 Gp 45. 4 G ( Forth Generation ) 46. Optical Computing 47. Cyborgs 48. Web Mining 49. Audio Fingerprinting

50. Winfs 51. Wireless Application Protocol 52. Inference Engine For Semantic Web 53. Virtual Network Computing 54. Embedded Internetworking 55. Amoeba : Distributed Operating System 56. Blackboard Technology 57. Introduction To Ajax 58. Text Mining 59. Dna Computer 60. Ss7 ( Singaling System 7 ) 61. Expansion Bus 62. Digital Object Identifier 63. Blu-Ray Disk 64. Video Fingerprinting And Encryption Principles For Drm 65. Wireless Lan 66. Mobile Agents 67. Ibutton 68. Free Space Optics 69. Ddos 70. 3d Graphics Apis 71. Embedded Systems 72. Rtos 73. Ospf 74. Tcp-Ip Puzzling

75. Smart Dust 76. Bio-Metrics 77. J2ee 78. M-Ram 79. Rfid 80. Spam 81. Java Card 82. Speech Processing 83. Cdma-2000 1x Evdo Technology 84. Distributed Operating Systems 85. Wireless Application Protocol 86. Virtual Machine 87. Software Agents 88. Java Cryptography 89. Grid Computing 90. Vpn 91. Wimax 92. Virtual Reality Paradigm 93. Quantum Computing And Its Application In Cryptography 94. Wireless Atm 95. J2me 96. Personal Digital Assistant 97. Session Identification Protocol 98. Virtual Keyboard 99. Ai AndNeno Technology Solution

100. Cable Modem 101. Digital Watermarking 102. Wireless Network Security 103. Gigabit Networking 104. Intrusion Detection System 105. Data Compression 106. Data Backup And Recovery 107. Windows Dna 108. Virus And Anti-Virus 109. D-Programming Language 110. Olap 111. Secure Communication Protocol 112. Amoeba System 113. Protein Memory 114. SysmbainOs 115. Mobile Ipv6 116. Blue-Eyes 117. Ipng 118. Cidr 119. Gsm 120. Server Clustering 121. Windows Longhon 122. Lottery Scheduling 123. Corba 124. EjbCorba

125. Virtual Lan 126. Multi Agent Systems 127. 64 Bit Computing 128. Virus - Antivirus : Race Not COmpleted 129. Holographic Memory 130. Wireless Fidelity 131. Asynchronous Transfer Mode (ATM) 132. Flash Memory 133. Smart Dust 134. Call Center 135. Smart Networking 136. Global Access File System 137. C# (C Sharp) 138. Direct Access File System 139. Computer Busses 140. Virtual Network Computing 141. Biometric Identification & Authentication 142. Gmlts 143. Data Minning 144. Gigabit Ethernet 145. Spam 146. Syncml 147. Dsl Modem 148. Dna Computer 149. Win (Wireless Intelligence Network)

150. Steganography 151. General Packet Radio System 152. Advance Database 153. Cluster Validation For Compact Rule Extraction From Trained Neural N/W 154. Data Warehousing 155. Mpls (Multi Protocol Label Switching) 156. Mobile Ip 157. E-Learning 158. Network Address Translation 159. Project Jxta 160. Imode Wireless 161. Natural Language Processing 162. Kerberos 163. Mobile Computing 164. Erp (Enterprise Resource Planning) 165. Speech Application Language Technology 166. Active Server Pages 167. Jini 168. Fram 169. Java 2 Micro Edition 170. Network Ram 171. Morphine 172. Network Intrusion Detection System 173. Quantum Cryptography 174. Wml (Wireless Markup Language)

175. Virus On Mobile 176. Advance Peer To Peer Network 177. Ospf (Open Shortest Path First Protocol) 178. Ipv6 179. Human Computer Interfacing (Hci) 180. Com And Com+ 181. Home - Plug 182. Pda 183. Grid Computing 184. Digital Water Marking 185. Linux Device Driver 186. Hyper Threading 187. Iscsi 188. Road Signal Reorganization By Color Imaginary 189. Meteor Burst Communication 190. Augmented Reality 191. Geographical Information System (Gis) 192. Voip (Voice OverIp) 193. Distributed Database Management System 194. I Button 195. ICEBERG 196. J2ME 197. RMI 198. Firewalls 199. Smart Card

200. DDOS (Distributed Dental OfSyatem) 201. Database Normolization&Denormolization 202. Computerised Clothing 203. Data Compression Techniques 204. ISDN 205. Image Processing - Corena 206. Genral Packet Radio Service 207. 3G Technology 208. Apache Sever 209. AMD Athlon XP Processer 210. Hamster 211. DNA Computing 212. The Genesis Kernel 213. ISCSI 214. Concurrent Versions Systems 215. Virtual Private Networks (VPN) 216. Internet Protocol System 217. Global Position System 218. JSTL 219. Manet - Mobile Area Network 220. LDAP (Lighitweight Directory Access Protocol) 221. Skip : Simple Key Management Protocol 222. Simputer 223. Interplanetary Internet 224. Bioinformatics

225. Quantum Computing 226. PHP: Hypertext Protocol 227. Wiondows DNA 228. Jini Technology 229. Medical Iamge Processing (Artificial Intelligence in Medicine) 230. Session Imitation Protocol (SIP) 231. Thin Client/Sever Computing Model 232. Ninja 233. The QNX Real Time Operating System 234. Lossless Data Compression Technique 235. Wireless Personal Area Network (WPAN) 236. Voice Over Protocol 237. Data Mining 238. Wi - Fi (802.11B) Technology 239. Deep Blue: The First M/C That Defected Garry Kasparove 240. Secure Socate Layer 241. Recent Advances in Photonic Devices for Optical Compouting 242. Smart Dust 243. Image Guided Therapy 244. Socks - Protocol (Proxy Sever) 245. Advanced Lunix Sound Architecture 246. Optical Ethernet 247. Neural Network 248. MPLS 249. Viruses On Mobile

250. SAMBA 251. Protein Memory 252. Efficient Data Storage Techniques 253. Hyper Transport Technology 254. Ultra Wide BAnd 255. Hacking 256. Java Management Extensions (JMX) 257. Internet - 2 & ITS Application 258. SMS, EMS & MMS 259. Advanced Rise Machines (ARM) 260. Tele Immersion - The Future of Internet Telecommunication 261. Designing an EnterprisedStrorage Network (ESN) 262. Simple Object Access Protocol (SOAP) 263. Neural; Network 264. Java Server Pages (JSP) 265. C# (C Sharp) 266. Geographical Information System (GIS) 267. Palm Operating System 268. Sever Clustering 269. Global Position System (GPS) 270. Firewalls 271. Voice Over IP 272. Digital Subsciber Line (DSB) 273. Artifical Intelligence 274. Active Server Pages

275. Image Processing 276. NetWOrkAtteched Storage 277. Direct X 278. Corba 279. CGI Scripting With Perl 280. Introducation to PHP 281. Optical Processer 282. EJB 283. Mobile Computing - 3G System 284. Universal Model Language (UML) 285. .NET Framework & Platform 286. Object Oriented Database 287. Oracle 9i 288. Voice XML 289. Storage Area Network(SAN) 290. The Surat Dot: Application of WAN 291. Molecular Computing 292. Virtual Private Networks (VPN) 293. Windos XP, An Operating System 294. Mobile Commerce(M-Commerce) 295. VRML 296. Virus - Antivirus 297. Univarsal Serial BUS 298. Wireless Application Protocol 299. COM, COM+, Hidden Technologies From Ms.

300. Network Security 301. Universal Description, Discovered & Interface 302. QNX Operating System 303. Future of Java 304. JXTA 305. Wireless Markup Language(WML) 306. Genral Packet Radio Service 307. Jacking 308. Session Initiation Protocol (SIP) 309. Bluetooth Technology 310. Remote Method Invocation(RMI) 311. Radius Protocol 312. .Net 313. WIN32 API 314. Wireless Local Loop 315. Wireless Web 316. Holographic Data Storage 317. Microsoft Transaction Sever 318. Scalability of Bounded Networks 319. Open GL

Reference: http://www.seminarprojects.com/Thread-seminar-topics-for-computer-science-4663#ixzz1QyQBIl96

a) Controlling a Wheelchair Indoors Using Thought b) Minimum cost data delivery in Heterogeneous wireless networks c) Face Recognition by ANN using Wavelength Transform coefficients d) Power 6 Microarchitecture e) Network attached storage and FreeNas f) Computerised paper evaluation using Neural Networks g) Cyberterrorism h) Real Time streaming protocol i) Intel's Terasclae Technology j) Use of Nanorobotics in various fields. k) Surface Computing l) Network centric technology in a battle field m) Seperating human and non human web queries n) Tablet PC o) Prrain Gate p) DIRAC q) Neuroimaging for the diagnosisandstudey of Psychatric disorders r) Magnetostatic RAM. s) A survey of real time shading t) E-passport u) GPSR v) Artificial Intelligence-Embedding spiking neural network w) Linear time compression of Token streams. x) UMA (Unlicensed Mobile Access) y) TigerSHARC z) Computer based voice stress analyzer aa) Ultra 320 SCSI:new technology still SCSI bb) Schedular design in wireless network. cc) 4 G Wireless dd) Future Use of Biometric Technology for security & authentication ee) Human area Networking Technology tedtacton ff) Gigtal Cinema gg) IRIS scanning hh) IP Spoofing:Remore Administrative Trojan ii) DNA computing in security jj) Head size equalization for improved visual perception in video conferencing. kk) 4G wireless System ll) WANJET in data Replication Environments mm) Motes nn) Bio Molecualr Computing oo) Active rearranged capturing of image based rendering scnes. pp) Wardriving

qq) Elastic Quotas rr) Applications of Evloving Neural Network to Unit commitment ss) An ANN approach for flood forecasting tt) Voice morphing uu) Cyborgs vv) Ambhibot ww) IPTV: The killer application for the next-geneation internet. xx) Security Evaluation of Apples iPhone yy) Graph based analysis of human transfer learning using a game testbed. zz) Zombie Computer The Bot net aaa) Beyond the internet : Building location based services for multi plat for device communities. bbb) Blue Prrain Project ccc) ZEN Research Technology ddd) Chord: For Internet Applaications eee) Algorithms for Intermediate Waveband switching in optical WDM Mesh Networks fff) Protein: Based optical memory storage ggg) Forensic animation hhh) NAT iii) NRAM jjj) Fluorescent Multilayer optical data storage kkk) Millipedes lll) Stegnalysis for Markov Cover Data With Applications to Images mmm) A framework for USM in heterogeneous wireless networks nnn) Wavelength Routing in optical networks.

a) Watson Model: Foundations for Intelligent Decision Support b) Using K-nearest neighbor method to identify poison message c) An efficient information retrival method in WWW failure. d) Word indexing of ancient documents using fuzzy classification e) Smute. f) S/w engg. And cost estimation techniques g) AJAX-A web application. h) Brain finger printing Technology i) Location magt.in cellular wireless networks issues and directions. j) Emacspeak k) Secure Framework for Mobile Agents l) Invisible on the Web m) Delay Tolarant Network Architecture n) Neural Network Based Face Recognition

o) Web Crawlar Application p) Superchanging Planet Lab q) Smart Quill r) Server-less video straming system

Reference: http://www.seminarprojects.com/Thread-seminar-topics-for-computer-science-4663#ixzz1QyRpx67v

1. Web searching 2. Web Crawling 3. Real Time Systems 4.Network Computing Systems 5.Distributed Hash Tables. 6. Re-architecting & Internet Protocols. 7. Bluetooth 8. Storage Area Network 9.Distributed database. 10. Neural Computations. 11. Artificial Neural Network 12. Bioinformatics 13. Cluster Computing 14. DNA Computing in Security 15. Face Recognition 16. 4g Wireless Systems 17.Home Networking. 18. Zigbee 19. Stenography and Digital Watermarking. 20. Multimedia Broadcasting via satellite. 21. Surface Computer 22. Data Mining 23. Data Ware housing 24. Parallel Computing. 25. Multimedia Broadcast Multicast Services 26. Holographic versatile disc. 27. Wireless Technology. 28. Bio-molecular Computers 29. Fuzzy Logic. 30. Genetic Algorithm. 31. Elliptical Curve Cryptography(ECC) 32. Blade Servers. 33. NAS 34. DELAY tolerant networks. 35. Java Ring 36. Tripwire 37.Virtual Surgery. 38. Wireless Application Protocol. 39. Internet Telephony. 40. Home Automation. 41. Printable Computers. 42. I mode

43. Hyper Transport Technology. 44. Rapid prototyping. 45. Management Information System. 46. Digital Visual Interface. 47. iSCSI-Future of network Storage. 48. Genetic Engineering. 49. Wireless markup Language. 50. ATM Virtual Connections. 51. Biometrics. 52. Voice over Internet Protocol. 53. MEMs in space. 54. SALT ( Speech Application Language Tags) 55. Voice Portals. 56. Real Time Operating System. 57. FREENET 58. Benefits of Parallel and Distributed Computing 59.Soft Computing. 60. Data Compression with Huffman Algorithms. 61. Human Verses Neural Network. 62. E-Commerce. 63. E-Governance. 64. Sensor Network 65. Enterprise Resource Planning. 66. Network Security and its Principles. 67. Cryptography Application. 68. Impact of Information Technology on India 69. Importance of e-commerce. 70. Impact of Computers on Business 71. Embedded System 72.GIS 73.GPRS. 74. Adhoc Network 75. VOWIFI: vowifi is used to reference a Wi-Fi-based VoIP service 76. VOICE MORPHING : The method of transforming the source speaker s speech to that of the target speaker is usually referred as voice morphing or voice transformation or voice conversion 77. ROBOCODE: Robocode is an open source educational game by Mathew nelson (originally r was provided by IBM). it is designed to help people learn to program in java and enjoy the experience 78. JAVA CRYPTOGRAPHY ARCHITECTURE (JCA) : The java cryptography architecture (JCA) is a framework for working with cryptography using the java programming language 79. ZOMBIE: In the world of UNIX, a zombie refers to a 'child' program that was started by a 'parent' program but then abandoned by the parent. Zombie is also used to describe a computer that has been implanted with a daemon that puts it under the control of a malicious hacker without the knowledge of

the computer owner. 80. WISENET: It is a wireless sensor network that monitors the environmental conditions such as light, temperature, and humidity. This network is comprised of nodes called motes that form an ad-hoc network to transmit this data to a computer that function as a server. 81. WOLFPACK: Officially known as Microsoft cluster server (MSCS), it was released in September, 1997 as part of Windows NT 4.0, enterprise edition. wolf pack is the codename used for Microsoft s clustering solution 82. COOPERATIVE LINUX : Employing the novel idea of a co-operative virtual machine(CVM) co-operative Linux or colinx can support the kernel of both the Microsoft windows and the Linux, to run parallel on the same machine 83. TRANS EUROPEAN SERVICES FOR TELEMATICS BETWEEN ADMINISTRATIONS (TESTA) : The trans European services for telematics between administrations (TESTA) system is the private ip-based network of the European community. TESTA is a telecommunications interconnection platform for secure information exchange between the European public administrations 84. MOIP : Mobile communications over internet protocol is designed to be totally mobile-centric, and is optimized specifically for mobile-handsets environment rather than the pc 85. HOLOGRAPHIC VERSATILE DISC (HVD) : It's an optical disc technology still in the childhood stages of research called as the collinear holography, would soon gain upper hand over the existing technologies like the blue-ray and hd DVD optical disc systems with respect to its storage capacity 86. CYBORGS: Topic regarding the artificial living parts. 87. AKA: AKA stands for the authentication and key agreement security protocol. it is a mechanism which performs authentication and session key distribution in universal mobile telecommunications system (umts) networks 88. EXPONENTIAL KEY EXCHANGE : 89. CRYPTOGRAPHIC AUTHENTICATION: Cryptographic authentication schemes and protocols have been developed to provide authenticated key agreement to prevent man-in-the-middle and related attacks. 90. DATA GRAM CONGESTION CONTROL PROTOCOL (DCCP) 91. PERVASIVE COMPUTING: Ubiquitous computing or pervasive computing is the result of computer technology advancing at exponential speeds -- a trend toward all man-made and some natural products having hardware and software. The main aim of pervasive computing, which combines current network technologies with wireless computing, voice recognition, internet capability and artificial intelligence, is to create an environment where the connectivity of devices is embedded in such a way that the connectivity is unobtrusive and always available. 92. STREAM COMPUTING: The main task is to pull in streams of data, process the data and stream it back out as a single flow and thereby analyzes multiple data streams from many sources live. 94. PIXIE DUST : pixie dust is the informal name that ibm is using for its antiferromagnetically-coupled (AFC) media technology, which can increase the data capacity of hard drives to up to four times the density possible with current drives 95. CUCKOO EGG: The term and the concept of cuckoo egg is quiet strange. When you download copy protected songs, you may come across cuckoo egg yourself. In the first 30 seconds of the downloaded song you may hear something other than the initial song which could be the cuckoo clock sound effects or a series of random sounds and noises that are free of any copyright ownership. this happens for not

buying the cd in the first place 96. OFDMA: orthogonal frequency division multiple access (ofdma) is a multiple access scheme for ofdm systems. it works by assigning a subset of subcarriers to individual users. 97. ROUTING : 98. FULLSTREAM TECHNOLOGY: when transmitting video data some users on a slower internet connect may experience blocky views, artifacts and pixilation effects during playback. ati full stream technology detects the edges of these visible blocks and smoothes them over using a sophisticated hardware accelerated filtering method to improve the performance and visual quality of streaming video playback. 99. THE "JITTERS": jitter buffers (and jitter filters) in tech terminology refers to a hardware device or software process that eliminates jitter caused by transmission delays in an internet telephony (VoIP) network. 100. THIN PROVISIONING: thin provisioning is most commonly used in centralized large storage systems such as sans and in storage virtualization environments where administrators plan for both current and future storage requirements and often over-purchase capacity, which can result in wasted storage, so in short it is used to describe the consolidation and automated process of allocating just 'the exact required amount' of server space at the time it is required. 101. CHOKE PACKET : It is used to describe a specialized packet that is used for flow control along a network 102. SIGNCRYPTION :Signcryption is a new paradigm in public key cryptography that simultaneously fulfils both the functions of digital signature and public key encryption in a logically single step, and with a cost significantly lower than that required by the traditional signature and encryption approach 103. BEWIP : The Microsoft active sync based address book present in bewip is based on the pocket outlook address book which makes the synchronization easier 104. THE DATAGRAM DELIVERY PROTOCOL (DDP) : Datagram delivery and routing service to higher layer protocols are the functions of ddp. ddp frame headers can use short format headers which carry only the source and destination service socket numbers, or the long format ddp headers also carry the source and destination network and node addresses needed for routing capability 105. LIN (LOCAL INTERCONNECT NETWORK): LIN is low cost serial holistic communication system concepts for local interconnect networks in vehicles which complements the existing portfolio of automotive multiplex networks 108. BLOB. : Blob is the abbreviation for binary large object, a collection of binary data stored as a single entity in a database management system. 109. WI-FI5 : wireless lan products based on the ieee 802.11a specification that operates in the 5ghz radio frequency band were referred to as wi-fi5, a term created by the wi-fi alliance 110. ANISOTROPIC FILTERING: AF, is a technique in 3d graphics to improve image quality in computer video games 111. GOOGLEWHACK : The goal of a googlewhack is to perform search queries that will produce only one single search result in the Google search engine 112. JAVA MANAGEMENT EXTENSIONS (JMX) 113. LUCENT VISION: lucent vision is a real-time networked visual information system that archives sports action using visual processing. 114. AUTHENTICATION BASED ON IRIS RECOGNITION: iris recognition is related to scanning eyes and

authenticating similar to finger print authentication. We scan the top layer of the eye that is iris and authenticate the person. 115. IMAGE PROCESSING UNDER EDGE DETECTION AND CORRECTION ALGORITHM FOR 3D CT IMAGES 116. AUTOMATED THEOREM PROVING (ATP) : 117. ELLIPTICAL CURVE CRYPTOGRAPHY (ECC) : this innovative technology can produce smaller, faster and efficient cryptographic keys using the break through technique of elliptic curve equation rather than employing the traditional method of producing the key as the product of very large prime numbers 118. 3D PC GLASSES: they do the job of influencing the brain to think that the monitor is showing a real three dimensional object. 119. NCURSES: Ncurses is a programming library providing an API, allowing the programmer to write text user interfaces in a terminal-independent manner. It also optimizes screen changes, in order to reduce the latency experienced when using remote shells 120. VIRTUAL KEYBOARD 121.NANOROBOTICS 122.BLUE- RAY DISC 123.D PROGRAMMING LANGUAGE 124.DUAL CORE PROCESSOR 125.THE DESIGN AND IMPLEMENTATION OF A VIRTUAL MACHINE OPERATING SYSTEM USING A VIRTUAL ACCESS METHOD 126.DIGITAL SIGNATURE : 127. FUTURE USE OF BIOMETRIC TECHNOLOGY FOR SECURITY AND AUTHONTICATION

Reference: http://www.seminarprojects.com/Thread-computer-science-seminar-report-downloads-abig-bundle--3762#ixzz1QyaBGaPO

You might also like