17-11-2012, 11:33 AM
COMPUTER SCIENCE NEW SEMINAR TOPICS LIST
COMPUTER SCIENCE.doc (Size: 97.5 KB / Downloads: 35)
1. Advanced Encryption Standard
2. Advanced Queue Management Techniques
3. Agent Mediated E-commerce
4. Agile Software development
5. AMD Processors
6. Android APPS
7. Artificial Intelligence in Machines
8. Artificial Neural Networks
9. Aspect-oriented programming (Aop
10. Aspects of Database Security and Program Security
11. ATM networks
12. Attacks on Smart Cards
13. Augmented Reality
14. AUGMNETED VIRTUAL REALIT
15. Authentication
16. Authentication and Key Agreement (AKA
17. Authoring environments for open source courseware
18. Automatic number plate recognition
19. Autonomic Computing
20. Auto-pilots
21. Backup and Recovery planning
22. Bandwidth estimation in broadband access networks
23. BEANS
24. BioComputers
25. Bio-Medical Instrumentation and Signal analysis
26. Bio metrics IRIS technique
27. Biometric Technology
28. Bionetric Authentication
29. Bio Telemetry
30. Bit And Bytes
31. Blogs & their Creation
32. BLOW FISH
33. Blue ray disk
34. Bluetooth
35. Botnet
36. Brain computer interface
37. BRAIN FINGER
38. BRIAN GATE TECHNOLOGY
39. Capacity of Ad-hoc Wireless Networks
40. Captchas
41. CASP
42. Cd,dvd,ird
43. Cell phones
44. Channel Allocation Algortihms for Mobile Telephony
45. Chess Algorithm
46. Choreography
47. Cluster computing
48. Clustering
49. Collaborative Mobile Environments
50. Comparative study on Authoring Tools
51. COMPLIERS
52. Compressed Domain Processing And Video Information System
53. Computational Geometry in Drug Design
54. Computational Intelligence and Linguistics
55. Computational neuroscience
56. Computational Photography
57. Computer Forensics
58. Computer hardware
59. Computer peripherals
60. Computer vision
61. Concurrent Programming and Parallel distributed OS
62. Content Management
63. Cooperative Adaptive Cruise Control
64. Co-operative LINUX
65. Cross Platform Component Object Model
66. CRPTOGRAPHY AND N/W SECURITY
67. Crusoe Processors
68. Cryogenic Processor
69. CRYONICS
70. CRYPTOGRAPHY
71. Cryptography and steganography
72. Curl: A Gentle Slope Language For The Web
73. Cyber Crime and Security
74. Cyborgs
75. DataBase Migration
76. Database Security
77. Dataflow machines
78. Datagram Congestion Control Protocol (DCCP
79. Data Management in Sensor Networks
80. Data Mining and Data Warehousing
81. Data Mining concepts & Models
82. Data mining through Active Learning
83. Data over Cable System (DOCSIS
84. Data Pre Processing
85. Dataset Query algorithms in Streaming Mining
86. DataWareHosuing
87. DATA WARE HOSUING & MINING
88. Data Warehouse
89. Data warehousing
90. Datbase management
91. Determining Global States of Distributed Systems
92. Digital audio
93. Digital Imaging
94. Digital Jewellery
95. Digital Media Broadcasting
96. DIGITAL MOVIES
97. Digital Rights Management
98. Digital Signal Processing and their applications
99. Digital Video Editing
100. Digital Visual Interface
101. Distributed and Parallel Computing
102. Distributed Computing
103. Distributed database management system
104. Distributed Firewalls
105. Distributed Garbage Collection
106. DISTRUBUTED COMPUTING
107. DNA Based computer
108. DNA Computing
109. DRUG DISCOVERY
110. Dual Energy X-ray Absorptiometry
111. Dynamic resource allocation in Grid Computing
112. DYNAMIC SOURCE ROUTING PROTOCOL
113. Dynamic spectrum access
114. Earning Online Money
115. Earth Simulator- Fastest Supercomputer
116. E-Commerce
117. Efficiency / Comparative study of routing schemes in event based systems
118. ELLICA
119. Elliptical Curve Cryptography(ECC
120. Embedded Configurable Operating system
121. Embedded Linux
122. Embedded systems
123. Embedded web server for remote access
124. Embeded Systems
125. Emergency Health Care System
126. Emerging trends in robotics using neural networks
127. E-MINE: A novel web mining approach
128. Encrypted Hard disks
129. Encrypted Text chat Using Bluetooth
130. Energy Efficient query Optimization
131. Enery efficiency in Wireless sensor networks
132. Enterprise Security
133. Epsilon nets and transversal of hypergraphs
134. Ethernet
135. Ethical Hacking
136. Etl tools(informatica)
137. Evolutionary Programming
138. Evolution of computers
139. E-wallet
140. Ext3 Filesystem
141. eXtensible Bindings Language (XBL
142. Facial Recognition System
143. Faultolerant Routing in Mobile Ad-Hoc Network
144. Fault Tolerance in Virtual Machine Environments
145. FIBER CHANNELS
146. Fiber optic communication
147. Financial Forecasting
148. Fine-grained Access Control in Databases
149. Fine Grained DataBase Security
150. Fingerprint recognition system by neural networks
151. Firewalls
152. Flexible CRT Displays
153. Fluorescent Multilayer Disc (FMD
154. Fluorescent Multilayer Optical Data Storage
155. Forecasting
156. Forecasting using Double Exponential Smoothing Method
157. Form Processing
158. Form Wizard
159. Franchise Mgnt System
160. Frequent ItemSet Mining
161. Fusion Memory
162. Future of business Computing
163. Future of Satellite Communication
164. Future of the internet
165. Future Programming Techniques and Concepts
166. Fuzzified Computer-Automated Crane Control System
167. Fuzzy Logic
168. GABOR Wavelet
169. GAIT RECOGNITION
170. Generic algorithm
171. Genetic Programming
172. Geographic Versatile Dist
173. Geometric Invariants in Biological Molecules
174. Gesture recognition
175. Gigabit networking
176. GIMP
177. Globalization
178. Global positioning response system
179. Global Positioning System
180. Global System for Mobiles
181. GLUCO METER