Seminar Topics

www.seminarsonly.com

IEEE Seminar Topics

Published on Jun 20, 2018

500 Latest Computer Science CSE Seminar Topics List 2018



  • Google Glass
  • Google's Bigtable
  • GPS
  • 3G vs WiFi
  • Alternative Models Of Computation
  • Ambient Intelligence
  • Ambiophonics
  • Amorphous Computing and Swarm Intelligence
  • Anonymous Communication
  • Apache Cassandra
  • Apple Talk
  • Graph Separators
  • 5 Pen PC Technology
  • E-Ball Technology
  • Global Wireless E-Voting
  • Google App Engine
  • Google Chrome Laptop or Chrome Book
  • 5g Wireless System
  • 64-Bit Computing
  • A Plan For No Spam
  • HTAM
  • Human Computer Interface
  • Humanoid Robot
  • Hurd
  • HVAC
  • E-Cash Payment System
  • EDGE
  • Elastic Quotas
  • 4G Wireless Systems
  • Enhancing LAN Using Cryptography and Other Modules
  • 10 Gigabit Ethernet
  • 3D Glasses
  • 3D Human Sensing
  • 3D Internet
  • 3d Optical Data Storage
  • 4D Visualization
  • 4G Broadband
  • AC Performance Of Nanoelectronics
  • Access gateways
  • Adding Intelligence to Internet
  • Aeronautical Communication
  • Airborne Internet
  • AJAX
  • 3D password
  • Artificial Neural Network (ANN)
  • Aspect-oriented programming (Aop)
  • Asynchronous Chips
  • Autonomic Computing
  • Bacterio-Rhodopsin Memory
  • BEOWULF Cluster
  • Big Data
  • Bio-inspired Networking
  • Biological Computers
  • Biometric Voting System
  • Bio-metrics
  • 3D Searching
  • 3D Television
  • 3D-Doctor
  • Biometrics Based Authentication
  • Biometrics in SECURE e-transaction
  • Bio-Molecular Computing
  • BitTorrent
  • BlackBerry Technology
  • Blade Servers
  • Blu Ray Disc
  • Blue Brain
  • Blue Eyes
  • Blue Gene
  • Blue Tooth
  • Bluejacking
  • Bluetooth Based Smart Sensor Networks
  • Bluetooth Broadcasting
  • Bluetooth V2.1
  • Brain Chips
  • Brain Fingerprinting
  • Brain Gate
  • Brain-Computer Interface
  • Breaking the Memory Wall in MonetDB
  • Broad Band Over Power Line
  • Browser Security
  • Buffer overflow attack : A potential problem and its Implications
  • Cable Modems
  • Capacitive And Resistive Touch Systems
  • CAPTCHA
  • Case Based Reasoning System
  • Cellular Communications
  • Cellular Neural Network
  • CGI Programming
  • Chameleon Chip
  • Cisco IOS Firewall
  • Clayodor
  • Clockless Chip
  • Cloud Computing
  • CloudDrops
  • Cluster Computing
  • Code Division Duplexing
  • Combating Link Spam
  • Compact peripheral component interconnect
  • Compositional Adaptation
  • Computational Intelligence in Wireless Sensor Networks
  • Computational Visual Attention Systems
  • Compute Unified Device Architecture CUDA
  • Computer Forensics
  • Computer Intelligence Application
  • Computer Memory Based on the Protein Bacterio-rhodopsin
  • Computer Viruses
  • Computerized Paper Evaluation using Neural Network
  • Conditional Access System
  • Confidential Data Storage and Deletion
  • Cooperative Linux
  • CORBA
  • CorDECT
  • corDECT Wireless in Local Loop System
  • Crusoe
  • Crusoe Processor
  • Cyberterrorism
  • Cyborgs
  • Daknet
  • Dashboard
  • Data Security in Local Network using Distributed Firewalls
  • D-Blast
  • Delay Tolerant Networking
  • Design and Analysis of Algoritms
  • Design of 2-D Filters using a Parallel Processor Architecture
  • Development of the Intenet
  • Diamond chip
  • Digital Audio Broadcasting
  • Digital Cinema
  • Digital Jewelry
  • Digital Light Processing
  • Digital Preservation
  • Digital Rights Management
  • Digital Scent Technology
  • Digital Subscriber Line
  • Digital Video Editing
  • Direct Memory Access
  • Distributed Interactive Virtual Environment
  • DNA Based Computing
  • DNA chips
  • Domain Driven Data Mining
  • DOS Attack
  • Driving Optical Network Evolution
  • DRM Software Radio
  • Dual Core Processor
  • DVD Technology
  • Dynamic Cache Management Technique
  • Dynamic Memory Allocation
  • Dynamic Synchronous Transfer Mode
  • Dynamic TCP Connection Elapsing
  • Dynamic Virtual Private Network
  • E Ball PC Technology
  • Earth Simulator
  • E-Paper Technology
  • Ethernet Passive Optical Network
  • Ethical Hacking
  • Example Based Machine Translation
  • Extended Mark Up Language
  • Exterminator
  • Extreme Programming (XP)
  • Eye Movement-Based Human Computer Interaction Techniques
  • EyePhone
  • EyeRing
  • Face Recognition Technology
  • Facebook Thrift
  • Facility Layout Design using Genetic Algorithm
  • Fast And Secure Protocol
  • Fast Convergence Algorithms for Active Noise Controlin Vehicles
  • Femtocell
  • Fiber Channel
  • Fiber Distributed Data Interface
  • Finger Reader
  • Finger Sleeve
  • Finger Tracking In Real Time Human Computer Interaction
  • Finger Vein Recognition
  • Firewalls
  • FireWire
  • Flexpad
  • Fluorescent Multi-layer Disc
  • Focused Web Crawling for E-Learning Content
  • Fog Screen
  • FRAM
  • Free Space Laser Communications
  • Free Space Optics
  • Freenet
  • Futex
  • Future of IOT
  • Gaming Consoles
  • Generic Access Network
  • Generic Framing Procedure
  • Generic Visual Perception Processor GVPP
  • Gesture Recognition Technology
  • Gi-Fi
  • Gigabit Ethernet
  • Google Chrome OS
  • Google File System
  • Graphic processing Unit
  • Graphical Password Authentication
  • Green Cloud
  • Green Computing
  • GSM
  • GSM Based Vehicle Theft Control System
  • GSM Security And Encryption
  • Hadoop
  • HALO
  • Handheld Computers
  • Haptic Technology
  • Haptics
  • Hi-Fi
  • High Altitude Aeronautical Platforms
  • High Performance Computing with Accelerators
  • High Performance DSP Architectures
  • High Performance DSP Architectures
  • Holographic Data Storage
  • Holographic Memory
  • Holographic Versatile Disc
  • Home Networking
  • HPJava
  • Hyper Transport Technology
  • Hyper-Threading technology
  • iCloud
  • IDC
  • iDEN
  • IDS
  • Image Processing
  • Image Processing & Compression
  • IMAX
  • IMode
  • Implementation Of Zoom FFT
  • Industrial Applications using Neural Networks
  • InfiniBand
  • Infinite Dimensional Vector Space
  • Instant Messaging
  • Integer Fast Fourier Transform
  • Integrated Voice and Data
  • Intel Centrino Mobile Technology
  • Intel Core I7 Processor
  • Intel MMX Technology
  • Intelligent RAM
  • Intelligent Software Agents
  • Intelligent Speed Adaptation
  • Internet Access via Cable TV Network
  • Internet Protocol Television
  • Internet Telephony Policy in INDIA
  • Introduction to the Internet Protocols
  • Intrusion Tolerance
  • Intrution Detection System
  • Inverse Multiplexing
  • Invisible Eye
  • IP spoofing
  • IP Telephony
  • iPAD
  • Ipv6 - The Next Generation Protocol
  • Iris Scanning
  • iSCSI
  • iSphere
  • Itanium Processor
  • iTwin
  • Java Database Connectivity
  • Java Ring
  • Java Servlets
  • Jini Technology
  • JOOMLA and CMS
  • Keil C
  • Lamp Technology
  • Laptop Computer
  • Laser Communications
  • Layer 3 Switching
  • Li-Fi Technology
  • Light emitting polymers
  • Light Tree
  • Linux Kernel 2.6
  • Linux Kernel 2.6
  • Linux Virtual Server
  • Local Multipoint Distribution Service
  • Location Dependent Query Processing
  • Location Independent Naming
  • Longhorn
  • Low Power UART Design for Serial Data Communication
  • LWIP
  • Magnetic Random Access Memory
  • MANET
  • MANET
  • M-Commerce
  • Measuring Universal Intelligence
  • MemTable
  • Mesh Radio
  • Microsoft HoloLens
  • Microsoft Palladium
  • Middleware
  • Migration From GSM Network To GPRS
  • Millipede
  • Mind-Reading Computer
  • MiniDisc system
  • Mobile Ad-Hoc Networks Extensions to Zone Routing Protocol
  • Mobile IP
  • Mobile Jammer
  • Mobile Number Portability
  • Mobile Phone Cloning
  • Mobile TV
  • Mobile Virtual Reality Service
  • Mobile WiMax
  • Modems and ISDN
  • Modular Computing
  • Money Pad, The Future Wallet
  • Motes
  • Motion Capture
  • MPEG Video Compression
  • MPEG-4 Facial Animation
  • MPEG-7
  • Multicast
  • Multiparty Nonrepudiation
  • Multiple Access Control Protocol
  • Multiple Domain Orientation
  • Multiprotocol Label Switching
  • Multiterabit Networks
  • Multi-Touch Interaction
  • Nano Cars Into The Robotics
  • Nanorobotics
  • Network Attached Storage
  • Neural Interfacing
  • Neural Networks And Their Applications
  • Next Generation Secure Computing Base
  • NGSCB
  • Night Vision Technology
  • Night Vision Technology
  • NRAM
  • Nvidia Tegra 250 Developer Kit Hardware
  • NVIDIA Tesla Personal Supercomputer
  • Object Oriented Concepts
  • On-line Analytical Processing (OLAP)
  • OpenRAN
  • Opera (web browser)
  • Optical Burst Switching
  • Optical Computer
  • Optical Fibre Cable
  • Optical Free Space Communication
  • Optical Mouse
  • Optical Networking and Dense Wavelength Division Multiplexing
  • Optical packet switch architectures
  • Optical Packet Switching Network
  • Optical Satellite Communication
  • Optical Switching
  • Orthogonal Frequency Division Multiplplexing
  • Ovonic Unified Memory
  • Packet Sniffers
  • Palladium
  • Palm Vein Technology
  • Parallel Computing In India
  • Parallel Virtual Machine
  • Param 10000
  • Parasitic Computing
  • Performance Testing
  • Pervasive Computing
  • PHANToM
  • Phishing
  • Pill Camera
  • Pivot Vector Space Approach in Audio-Video Mixing
  • Pixie Dust
  • Place Reminder
  • Plagiarism Detection Techniques
  • Plan 9 Operating System
  • Planar Separators
  • PoCoMo
  • PON Topologies
  • Prescription Eyeglasses
  • Privacy Preserving Data Publishing
  • Project Loon
  • Project Oxygen
  • Prototype System Design for Telemedicine
  • Public Key Infrastructure
  • QoS in Cellular Networks Based on MPT
  • Quadrics Interconnection Network
  • Quantum Computers
  • Quantum Cryptography
  • Quantum Information Technology
  • Radio Frequency Light Sources
  • Radio Network Controller
  • RAID
  • Rain Technology
  • Rapid Prototyping
  • Raspberry Pi
  • RD RAM
  • Real Time Application Interface
  • Real- Time Systems and Real- Time Operating Systems
  • Real Time Systems with Linux/RTAI
  • Real-Time Obstacle Avoidance
  • Reconfigurable computing
  • Refactoring
  • Remote Administration Trojan's
  • Resilient Packet Ring Technology
  • RESTful Web Services
  • Robotic Surgery
  • Rover Technology
  • RPR
  • SAM
  • Satellite Radio
  • SATRACK
  • Screenless Display
  • Scrum Methodology
  • Seam Carving for Media Retargeting
  • Secure ATM by Image Processing
  • Secure Shell
  • Security Features of ATM
  • Self Defending Networks
  • Self Organizing Maps
  • Self-Managing Computing
  • Semantic Digital Library
  • Semantic Web
  • Sense-Response Applications
  • Sensitive Skin
  • Sensors on 3D Digitization
  • Short Message Service (SMS)
  • Significance of real-time transport Protocol in VOIP
  • Silverlight
  • Sixth Sense Technology
  • Skinput Technology
  • Sky X Technology
  • Slammer Worm
  • Small Computer System Interface
  • Smart card
  • Smart Cards
  • Smart Dust
  • Smart Dustbins for Smart Cities
  • Smart Fabrics
  • Smart Glasses
  • Smart Memories
  • Smart Note Taker
  • Smart Pixel Arrays
  • Smart Quill
  • Smart Skin for Machine Handling
  • Sniffer for detecting lost mobiles
  • Socket Programming
  • Soft Computing
  • Software Reuse
  • Software-Defined Radio
  • Space Mouse
  • Spam Assassin
  • Spawning Networks
  • SPCS
  • SPECT
  • Speech Application Language Tags
  • Speed Detection of moving vehicle using speed cameras
  • Speed protocol processors
  • Steganography
  • Stereoscopic Imaging
  • Storage Area Network
  • Storage Area Networks
  • Strata flash Memory
  • Structured Cabling
  • Surface Computer
  • Surround Systems
  • Survivable Networks Systems
  • Swarm Intelligence
  • Swarm intelligence & traffic Safety
  • Symbian Mobile Operating System
  • Symbian OS
  • Synchronous Optical Networking
  • SyncML
  • Synthetic Aperture Radar System
  • System in Package
  • Tamper Resistance
  • TCP/ IP
  • TCPA / Palladium
  • Tele-immersion
  • TeleKinect
  • Teleportation
  • Telepresence
  • Tempest and Echelon
  • Teradata
  • Terrestrial Trunked Radio
  • Text Mining
  • The Callpaper Concept
  • The Deep Web
  • The Tiger SHARC processor
  • Thermography
  • Third Generation
  • Timing Attacks on Implementations
  • Tool Command Language
  • Touchless Touchscreen
  • Tracking and Positioning of Mobiles in Telecommunication
  • Transactional Memory
  • Transient Stability Assessment using Neural Networks
  • Tripwire
  • Trustworthy Computing
  • Tsunami Warning System
  • Turbo Codes
  • Ubiquitous Networking
  • Ultra-Wideband
  • Unicode And Multilingual Computing
  • Unified Modeling Language (UML)
  • Unlicensed Mobile Access
  • Utility Fog
  • VESIT Library - An Android Based Application
  • VHDL
  • Virtual Campus
  • Virtual Instrumentation
  • Virtual keyboard
  • Virtual LAN Technology
  • Virtual Private Network
  • Virtual Retinal Display
  • Virtual Smart Phone
  • Visible Light Communication
  • VoCable
  • Voice Browser
  • Voice morphing
  • Voice Over Internet Protocol
  • Voice Portals
  • Voice Quality
  • VoiceXML
  • Wardriving
  • Wearable Bio-Sensors
  • Wearable Computers
  • Web 2.0
  • Web Clustering Engines
  • WhatsApp
  • Wibree
  • Windows DNA
  • Wine
  • Wireless Application Protocol
  • Wireless Body Area Network
  • Wireless Fidelity
  • Wireless Internet
  • Wireless LAN Security
  • Wireless Networked Digital Devices
  • Wireless USB
  • Wireless Video Service in CDMA Systems
  • Wisenet
  • Wi-Vi
  • Wolfram Alpha
  • Word Sense Disambiguation
  • Worldwide Inter operatibility for Microwave Access
  • X- Internet
  • XBOX 360 System
  • xMax Technology
  • XML Encryption
  • Y2K38
  • Yii Framework
  • Zenoss Core
  • Zettabyte FileSystem
  • zForce Touch Screen
  • Zigbee






Are you interested in any of these topics.Then mail to us immediately to get the full Report and PPT.

email :- contactv2@gmail.com





Find us on Google+


Related Pages