- Dynamic Source Routing Protocol
- Application of ANNA in DATA Mining of Medical Images
- Developing Your First Enterprise Beans
- Confidential Data Storage and Deletion
- Prepaid Electricity Billing System Using GSM Technique
- Face Recognition Technology
- Computer Memory Based On The Protein Bacterio-rhodopsin
- JMX – Component Framework For Building Intelligent Network
- RFID : Comparative study of Collision Resolution Protocols
- Dynamic Cache Management Technique
- Context Disambiguation On Web Search Results
- Long Term Evolution
- Remote Frame Buffer (RFB) Protocol
- Coffee Analysis with Electronic Nose
- Bluetooth Based Smart Sensor Networks
- An Off-Line Unconstrained Handwriting Reorganization System
- Night Vision Technology
- PLATONIS – A Validation Platform For Protocols And Service
- Trends in Information Technology
- Security Threats In The World Wide Web
- Real Time Operating System – VxWorks
- Routing In Mobile Ad Hoc Networks
- CAPTCHA Security for Phishing – Secure or Not?
- Quadrics Interconnection Network
- Cloud Computing
- Adaptive Partition Scheduler
- Java Cryptography Architecture
- Acoustic Cryptanalysis
- Dynamic Speaking Characters On Website
- Dynamic Cache Management Technique
- Underwater Wireless Sensor Networks
- Electronic Road Processing System
- Protein Memory
- A Transport Protocol for Inter-Planet Network
- Embedded Auditors for Intrusion Detection
- Free Space Optics
- Honeypots
- Plastic Memory
- Audio Finger Prints
- Computational Methods for Bankruptcy Prediction
- Artificial Neural Network (ANN)
- GigaByte System Network
- Next Generation Protocol (IPv6)
- Conditional Access System
- Ambient Intelligence
- Expert Systems and Decision Making
- Free Space Laser Communications
- Artificial Neural Network
- Load Balancing in Internet
- High Performance DSP Architectures
- QNX Real-Time Operating System
- Load Balancing in Parallel Computers
- AC Performance of Nanoelectronics
- Kerberos Authentication Protocol
- Solving System of Linear Equations Using Parallel Processing
- Ovonic Unified Memory
- Optical Burst Switching
- Development of a Web Based Mail Client
- Integer Fast Fourier Transform
- Attacking and Defending MS-SQL Server
- Design and Development of Point Of Sale (POS)
- Holographic Data Storage
- Gene Expression Analysis
- Development of a Network Print Spooler
- Inverse Multiplexing
- Simple Network Management Protocol (SNMP)
- To use the Reflection API of JAVA to Create a Comprehensive Reverse Engineering Tool
- Dynamically Re-configurability Computing
- Security Challenge and Defense in VoIP Infrastructures
- Cache Affinity Scheduling
- Intelligent Software Agents
- Unified Modeling Language (UML)
- Digital Watermarking Applications and Advantages
- Windows DNA
- Multiterabit Networks
- Self-Managing Computing
- Zero Knowledge Protocols and Proof Systems
- Cyber Terrorism
- Development of a Network Packet Sniffer
- Setting up a LAN Using LINUX
- Fiber Distributed Data Interface
- Development of a Feature-Rich Practical “Web Enabled Estate Agent” (WEFA)
- High Altitude Auronautical Platforms
- Universal Mobile Telecommunications System
- Development of Effort Tracker System
- Fuzzy Logic and Its Implementation
- On-line Analytical Process (OLAP)
- Unicode and Multilingual Computing
- Intrusion Detection and Prevention Systems
- corDECT Wireless in Local Loop System
- Broadband Over Power Line
- Session Initiation Protocol (SIP)
- Mobile Virtual Reality Service
- In-Vehicle Networking
- Money Pad – The Future Wallet
- Mobile IP
This blog is fully dedicated to all students,who are eager to achieve something higher in life ..
Tuesday, November 22, 2011
Computer science Seminar topics 2013
Subscribe to:
Post Comments (Atom)
put your email id and the selected topic...i will sent the material to your mail.....:)
ReplyDeletePlase can you send me materials for Prepaid Electricity Billing System Using GSM Technique, and if you have anything about e-commerce and security. My email id is nw4tony.1@msn.com Thank you
ReplyDeletesent to your mail
Deletecan u sent me maerials of following?? Dynamic Source Routing Protocol,Confidential Data Storage and Deletion,Face Recognition Technology,Honeypots,Security Threats In The World Wide Web,Intrusion Detection and Prevention Systems
ReplyDelete