Collection of computer science seminar topics with reports. Download full computer science seminar topics with reports in doc, pdf or ppt format.

Computer Science Seminar Topics With Reports

Anonymizing Networks of Blocking Misbehaving Users

Anonymizing networks such as Tor allow users to access internet services privately by using a series of routers to hide the client’s IP address from the serv...

Computer Crimes in Nigeria

The understanding of crime is very paramount in the understanding of computer crime. Crime is a component of deviance, the other component being delinquency. Har...

Bank Account Management System Project

A bank is a financial institution and a financial intermediary that accepts deposits and channels those deposits into lending activities, either directly by loaning or indirectly through capital ma...

Digital Piracy

Information technology has advanced greatly with the use of computers to perform different task, including Digital piracy which is an illegal duplication and distribution of copyrights of content t...

Sixth Sense Technology

We’ve evolved over millions of years to sense the world around us. When we encounter something, someone or some place, we use our five natural senses which includes eye, ear, nose, tongue mind and...

Java Applet Technology

Web design has moved to the next level with the introduction of java technology in the computing and programming industry. This introduction has made a tremendous impact in the capabilities and fun...

Smartshader Technology

SMARTSHADER™ technology brings a new level of graphical effects to personal computers. It allows software developers to use techniques that, until recently, were only available to the creators of n...

5 Pen Technology

Computer affects our life in a much bigger way then most of us might have thought. It has become a compulsory requirement in most professions to be able to use computer software. The first computer...

Continuous Neighbour Discovery in Asynchronous Sensor Network.

In most sensor networks the nodes are static. Nevertheless, node connectivity is subject to changes because of disruptions in wireless communication, transmission power changes, or loss of synchron...

Data Recovery

Data recovery is the process of salvaging data from damaged, failed, corrupted, or inacce...

Java Ring

A Java Ring is a finger ring that contains a small microprocessor with built-in capabilities for the user. It contains an inexpensive microprocessor in a stainless steel i-button running a JVM and it...

Virtual Reality

Virtual Reality (VR), sometimes called Virtual Environments (VE) has drawn much attention in the last few years. The Virtual Reality uses a huge number of technologies to produce a Virtual world so...

Automatically Generating Models for Botnet Detection

A botnet is a network of compromised hosts that is under the control of a single, malicious entity, often called the botmaster. We present a system that aims to detect bot-infected machines, indepe...

WEB Operating System

One of the hottest topics that emerged these days between the area of Internet and distributed computing and the area of operating system is Web Operating System (WOS). The objective of WOS is to d...

Pervasive Computing

Pervasive computing refers to embedding computers and communication in our environment. Pervasive computing provides an attractive vision for the future of computing. The idea behind&nbsp...

Parallel Databases

Parallel machines are becoming quite common and affordable Prices of microprocessors, memory and disks have dropped sharply Recent desktop computers feature multipl...

Ethical Hacking

What is hacking? Hacking is unauthorized use of computer and network resources. (The term "hacker" originally meant a very gifted programmer. In recent years though, with easier access...

Cybernetic Organism

CYBORG, a compound word derived from cybernetics and organism, is a term coined by Manfred Clynes in 1960 to describe the need for mankind to artificially enhance biological functions in order to s...

Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis

Preparing a data set for analysis is generally the most time consuming task in a data mining project, requiring many complex SQL queries, joining tables and aggregating columns. Existing SQL aggreg...

Data Leakage Detection

A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). Some of the data is leaked and found in an unauthorized place (e.g., on the web or somebody’s la...