Thread Rating:
  • 0 Votes - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Latest Seminar Computer Engineering Seminar 2014
01-31-2014, 08:19 PM
#
Latest Seminar Computer Engineering Seminar 2014
Computer Engineering and information technology students can find list of cse technical seminar presentations and reports for free download. Paper presentations listed here of latest technology topics 2014.

3D Imaging Techniques and Multimedia Applications
5 Pen PC Technology
3D Printing Technology
64-Bit Computing
AC Performance Of Nano Electronics
Access gateways
Adding Intelligence to Internet
Aeronautical Communication
Airborne Internet
AJAX
Alternative Models Of Computation
Ambient Intelligence
Ambiophonics
Amorphous Computing and Swarm Intelligence
Anonymous Communication
Artificial Neural Network (ANN)
Aspect-oriented programming (Aop)
Asynchronous Chips
Autonomic Computing

Bacterio-Rhodopsin Memory
Big Data Visualization
Bio-inspired Networking
Biological Computers
Biometric Voting System
Bio-metrics
Biometrics Based Authentication
Biometrics in SECURE e-transaction
Bio-Molecular Computing
Biocomputers
BitTorrent
BlackBerry Technology
Blade Servers
Blu Ray Disc
Blue Brain
Blue Eyes
Blue Gene
Blue Tooth
Bluetooth Based Smart Sensor Networks
Bluetooth Broadcasting
Brain Chips
Brain Fingerprinting
Brain Gate Technology
Brain-Computer Interface
Breaking the Memory Wall in MonetDB
Broad Band Over Power Line
Buffer overflow attack : A potential problem and its Implications
Cable Modems
CAPTCHA
Cellular Communications
Cellular Neural Network
CGI Programming
Chameleon Chip
Cisco IOS Firewall
Clockless Chip
Cloud Computing in Science and Engineering
Cluster Computing

Cloud computing - Securing the Cloud
Code Division Duplexing
Combating Link Spam
Compact peripheral component interconnect
Compositional Adaptation
Computational Visual Attention Systems
Compute Unified Device Architecture CUDA
Computer Forensics
Computer Intelligence Application
Computer Memory Based on the Protein Bacterio-rhodopsin
Computer Viruses
Computerized Paper Evaluation using Neural Network
Conditional Access System
Cooperative Linux
CorDECT
corDECT Wireless in Local Loop System
Credit Card Fraud Detection Techniques
Crusoe
Crusoe Processor
Cyber security
Cyber terrorism
Cyborg Technology
Daknet
Dashboard
Data Security in Local Network using Distributed Firewalls
Database security issues and challenges
D-Blast
Delay Tolerant Networking
Design and Analysis of Algorithms
Design of 2-D Filters using a Parallel Processor Architecture
Development of the Internet
Diamond chip
Digital Audio Broadcasting
Digital Cinema
Digital Jewelry
Digital Light Processing
Digital Rights Management
Digital Scent Technology
Digital Subscriber Line
Digital Video Editing
Direct Memory Access
Distributed Interactive Virtual Environment
DNA Based Computing
DNA chips

Driving Optical Network Evolution
DRM Software Radio
Dual Core Processor
DVD Technology
Dynamic Cache Management Technique
Dynamic Domain Name Service
Dynamic Memory Allocation
Dynamic Synchronous Transfer Mode
Dynamic TCP Connection Elapsing
Dynamic Virtual Private Network
E Paper technology
Earth Simulator
E-Ball Technology
E-Cash Payment System
EDGE
Elastic Quotas
Embedded Linux
Ethernet Passive Optical Network
Ethical Hacking

Extended Mark Up Language
Extreme Programming (XP)
Eye Movement-Based Human Computer Interaction Techniques
Eye Tribe
Face Recognition Technology
Facebook Thrift
Facility Layout Design using Genetic Algorithm
Fast Convergence Algorithms for Active Noise Control in Vehicles
Fiber Channel
Fiber Distributed Data Interface
Finger Tracking In Real Time Human Computer Interaction
Firewalls
FireWire
Fluorescent Multi-layer Disc
Foundation DB
FRAM
Free Space Laser Communications
Free Space Optics
Freenet
Futex
Gaming Consoles
Generic Framing Procedure
Generic Visual Perception Processor GVPP
Gesture Recognition Technology (Gaze data visualization)

Gi-Fi
Gigabit Ethernet
Global Wireless E-Voting
Google App Engine
Google Glass
Google Loon (Google Baloon)
Google Chrome OS
Google Glass
GPS
Graph Separators
Graphic processing Unit
Graphical Password Authentication
Greendroid
Green Cloud
Green Computing
GSM
GSM Based Vehicle Theft Control System
GSM Security And Encryption
Hadoop
HALO
Handheld Computers
Haptic Technology
Haptics
Haptics in Rehabilitation
Hi-Fi
High Altitude Aeronautical Platforms
High Performance DSP Architectures
High Performance DSP Architectures
Holographic Data Storage
Holographic Memory
Holographic Versatile Disc
Home Networking
HPJava
Human Computer Interface
Humanoid Robot (1)
Humanoid Robot (2)
Hurd
HVAC
Hyper Transport Technology
iCloud
IDC
iDEN
IDS

Image Processing
Image Processing & Compression
IMAX
IMode
Implementation Of Zoom FFT
Industrial Applications using Neural Networks
InfiniBand
Infinite Dimensional Vector Space
Instant Messaging
Integer Fast Fourier Transform
Integrated Voice and Data
Intel Centrino Mobile Technology
Intel Core I7 Processor
Intel MMX Technology
Intelligent RAM
Intelligent Software Agents
Intelligent Speed Adaptation
Interactive Public Displays
Internet Access via Cable TV Network
Internet Censorship and Control
Internet Protocol Television
Internet Telephony Policy in INDIA
Introduction to the Internet Protocols
Intrusion Detection System
Inverse Multiplexing
IP spoofing
IP Telephony
Ipv6 - The Next Generation Protocol
Iris Scanning
ISP Peering
iSCSI
Itanium Processor
Java Database Connectivity
Java Ring
Java Servlets
Jini Technology
Lamp Technology
Laptop Computer
Laser Communications
Layer 3 Switching
Li-Fi Technology
Light emitting polymers
Light Tree
Linux Kernel 2.6
Linux Virtual Server

Local Multipoint Distribution Service
Location Dependent Query Processing
Location Independent Naming
Longhorn
Low Power UART Design for Serial Data Communication
LWIP
Magic Square Algorithm
Magnetic Random Access Memory
MANET
MariaDB
MariaDB and MySQL
M-Commerce
Mesh Radio
Microsoft Palladium
Middleware
Migration From GSM Network To GPRS
Millipede
Mind-Reading Computers
MiniDisc system
Mobile Ad-Hoc Networks Extensions to Zone Routing Protocol
Mobile Computing Meets the Cloud
Mobile IP
Mobile Jammer
Mobile Phone Cloning
Mobile TV
Mobile Virtual Reality Service
Mobile WiMax
Modems and ISDN
Modular Computing
Money Pad, The Future Wallet
Motes
MPEG Video Compression
MPEG-4 Facial Animation
MPEG-7
Multicast
Multicore Memory Coherence
Multiple Domain Orientation
Multiprotocol Label Switching
Multiterabit Networks
Multi-Touch Interaction
Nano Cars Into The Robotics
Nanorobotics
Network Attached Storage
Neural Interfacing
Neural Networks And Their Applications
Next Generation Secure Computing Base
Next-Generation Mobile Computing

NGSCB
Night Vision Technology
Nokia Morph Technology
NRAM
NVIDIA Tesla Personal Supercomputer
Neuro Sky Technology
Object Oriented Concepts
On-line Analytical Processing (OLAP)
OpenRAN
Opera (web browser)
Optical Burst Switching
Optical Computer
Optical Fibre Cable
Optical Free Space Communication
Optical Mouse
Optical Networking and Dense Wavelength Division Multiplexing
Optical packet switch architectures
Optical Packet Switching Network
Optical Satellite Communication
Optical Switching
Orthogonal Frequency Division Multiplexing
Ovonic Unified Memory
Packet Sniffers
Palladium
Palm Vein Technology
Parallel Computing In India
Parallel Virtual Machine
Param 10000
Parasitic Computing
Performance Testing
Pervasive Computing
PHANToM
Phishing
Pill Camera
Pivot Vector Space Approach in Audio-Video Mixing
Pixie Dust
Plagiarism Detection Techniques
Plan 9 Operating System
Planar Separators
PON Topologies
Project Oxygen
Pruning the power grid
Prototype System Design for Tele medicine
Public Key Infrastructure

QoS in Cellular Networks Based on MPT
Quadrics Interconnection Network
Quantum Computers
Quantum Cryptography
Quantum Information Technology
Radio Frequency Light Sources
Radio Network Controller
RAID
Rain Technology
Rapid Prototyping
RD RAM
Real Time Application Interface
Real time image processing applied to traffic queue detection algorithm
Real- Time Systems and Real- Time Operating Systems
Real Time Systems with Linux/RTAI
Real-Time Obstacle Avoidance
Reconfigurable computing
Refactoring
Remote Administration Trojan's
Resilient Packet Ring Technology
Robotic Surgery
Rover Technology
RPR
Safety Critical Systems
SAM
Satellite Radio
SATRACK
Seam Carving for Media Retargeting
Secure ATM by Image Processing
Security Features of ATM
Self Defending Networks
Self Organizing Maps
Self-Managing Computing
Semantic Digital Library
Semantic Web
Satellite networks
Sense-Response Applications
Sensitive Skin
Sensors on 3D Digitization
Short Message Service (SMS)
Significance of real-time transport Protocol in VOIP
Silverlight
Sixth Sense Technology

Skinput Technology
Sky X Technology
Slammer Worm
Small Computer System Interface
Smart Cards
Smart Client Application Development using .NET
Smart Dust
Smart Fabrics
Smart Memories
Smart Note Taker
Smart Pixel Arrays
Smart Quill
Sniffer for detecting lost mobiles
Socket Programming
Soft Computing
Software Frameworks
Software Reuse
Software-Defined Radio
Space Mouse
Spam Assassin
Spawning Networks
SPCS
SPECT
Speech Application Language Tags
Speed Detection of moving vehicle using speed cameras
Speed protocol processors
Steganography
Steganography - the art of hiding information
Stereoscopic Imaging
Storage Area Network
Storage Area Networks
Strata flash Memory
Structured Cabling
Surface Computer
Surround Systems
Survivable Networks Systems
Swarm Intelligence
Swarm intelligence & traffic Safety
Symbian OS
Synchronous Optical Networking

SyncML
Syntax Highlighting in IDE
Synthetic Aperture Radar System
System in Package
Tamper Resistance
TCP/ IP
TCPA / Palladium
Tele-immersion
Teleportation
Telepresence
Tempest and Echelon
Terrestrial Trunked Radio
Text Mining
The Callpaper Concept
The Deep Web
The Tiger SHARC processor
Thermography
Third Generation
Timing Attacks on Implementations
Tool Command Language
Touch Screens
Tracking and Positioning of Mobiles in Telecommunication
Transient Stability Assessment using Neural Networks
Tripwire
Trustworthy Computing
Tsunami Warning System
Turbo Codes
Ubiquitous Networking
Ultra-Wideband
Unicode And Multilingual Computing
Unified Modeling Language (UML)
Unlicensed Mobile Access
Utility Fog
VHDL
Virtual Campus
Virtual Instrumentation
Virtual keyboard
Virtual LAN Technology
Virtual Private Network
Virtual Retinal Display
Visible Light Communication
VoCable
Voice Browser
Voice morphing
Voice Over Internet Protocol
Voice Portals
Voice Quality
Voice XML, VoiceXML

Wardriving
Wearable Bio-Sensors
Wearable Computers
Web 2.0
Web Services
Wibree
Windows DNA
Wireless Application Protocol
Wireless Fidelity
Wireless Internet
Wireless LAN Security
Wireless Networked Digital Devices
Wireless USB
Wisenet
Wolfram Alpha
Word Sense Disambiguation
X- Internet
XML Encryption
Y2K38
Yii Framework
Zenoss Core
Zettabyte File System
zForce (neonode) touch screen
 


Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  Cyber Security Seminar Chandresh D Patel 1 759 08-26-2014
Last Post: Shenaya Datta
  3g vs 4g technology ppt Seminar Chandresh D Patel 0 1,109 03-13-2014
Last Post: Chandresh D Patel
Rainbow Latest Computer Engineering Seminar Topics enggroom 1 1,698 12-24-2013
Last Post: TyroneMThomas
  Behavioral network engineering: making intrusion detection become autonomic Ghanshyam 0 946 12-12-2013
Last Post: Ghanshyam
  Upgrading Shortest Path Problem for Computer Network Routing Ghanshyam 0 925 12-12-2013
Last Post: Ghanshyam

Forum Jump:


User(s) browsing this thread:
1 Guest(s)

Return to TopReturn to Content