Computer engineering seminars topics collection. Download full computer engineering seminars in doc, pdf or ppt format.

Computer Engineering Seminars

Ambient Intelligence

Ambient Intelligence (AmI) refers to electronic environments that are sensitive and responsive to the presence of people..

Blue Gene

Blue Gene/L (BG/L) is a scientific and engineering, message-passing, supercomputer that IBM is developing with partial funding from the U.S. Department of Energy ...

Employee Management System

Employee Management system is an application that enables users to create and store Employee Records..

Hotel Management System

For Business people they don’t have sufficient time for these then they can use these type of online Hotel Management Systems. By this project we will reduce the faults in bills of their expenditure and decrease time of delay..

Network Traffic Management

Network traffic can be defined in a number of ways. But in the simplest manner we can define it as the density of data present in any Network..

GSM Based Remote Switching System

In this paper, we have developed a high security,simple and reliable wireless communication system to monitor and to control devices that are far away from the user by making a call.

Cyber and Social Terrorism

Cyber terrorism is the act of internet terrorism in terrorist activities, including acts of Deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses.

Handwritten Character Recognition: Training a simple NN for classification with MATLAB

The objective of this seminar is to identify handwritten characters with the use of neural networks. We have to construct suitable neural network and train it properly.


The Freenet network provides an effective means of anonymous information storage and retrieval. By using cooperating nodes spread over many computers in conjunction with an efficient adaptive routi...

Linear Programming in Cloud

Cloud Computing has great potential of providing robust computational power to the society at reduced cost. It enables customers with limited computational resources to outsource their large comput...

Blackberry Technology

Blackberry handhelds are integrated into an organization's e-mail system through a software package called “Blackberry Enterprise Server “(BES). Versions of BES are available for Microsoft E...

Biometric Security Systems

Biometrics , which is formed from the two ancient Greek words bios and metron which mean life and measure respectively, refers to two very different fields of...

Global Positioning System

The GPS ( Global Positioning System ) is a “constellation” of 24 well-spaced satellites that orbit the Earth and make it po...

Credit Card Fraud Detection

Credit Card Fraud Detection Project Report : Now a day the usage of credit cards has dramatically increased. As credit card becomes the most popular mode of payment for both online as well as regul...

Vehicle Management System

Vehicle Management System is software which is helpful for bus operators, who wants to operate many bus trips in a day. Vehicle Management System is a window...


Biometric technologies are defined as automated methods of identifying or authenticating the identity of a living person based on unique physiological or beh...

Artificial Neural Network

The simplest definition of a neural network, more properly referred to as an 'artificial' neural network (ANN), is provided by the inventor of one of the first neurocomputers, Dr. Robert Hecht-Niel...

Anonymizing Networks of Blocking Misbehaving Users

Anonymizing networks such as Tor allow users to access internet services privately by using a series of routers to hide the client’s IP address from the serv...

Computer Crimes in Nigeria

The understanding of crime is very paramount in the understanding of computer crime. Crime is a component of deviance, the other component being delinquency. Har...