Collection of latest information technology seminar topics. Download full latest information technology seminar topics in doc, pdf or ppt format.
As a parallel file system, the primary goal of PVFS is to provide high-speed access to file data for parallel applications. In addition, PVFS provides a cluster-wide consistent name space, enables user-controlled striping of data across disks on I/O nodes
A term that refers to computer-powered devices or equipment that can be worn by a user, including clothing, watches, glasses, shoes and similar items. devices can range from providing very specific, limited features like heart rate monitoring.
A Firewall is simply a program or hardware device that filters the information coming through the internet connection into your private network or computer system.
Optical camouflage is a kind of active camouflage which completely envelopes the wearer. It displays an image of the scene on the side opposite the viewer on it, so that the viewer can "see through" the wearer, rendering the wearer invisible.
Game design experience starts with an idea, often a modification of an existing concept. The game idea may fall within one or several genres. Designers often experiment with genres. game development
Air traffic control systems which is to minimize the risk of aircraft collisions while maximizing the number of aircraft that can fly safely at the same time. Aircraft pilots and their on-board flight crews work closely with controllers
The study is to point out the importance of incorporating fault tolerance measure to especially life critical system and provide proper solutions to system faults upon their occurrence and make the system more dependable by increasing its reliability.
A Digital library (also referred to as electronic library or digital repository) is a focused collection of digital objects that can include text, visual material, audio material, video material, stored as electronic media formats.
A digital library as an organized and focused collection of digital objects, including text, images, video and audio, with the methods of access and retrieval and for the selection, creation, organization, maintenance and sharing of collection.
An automatic parking system uses various methods to detect objects around the vehicle. Sensors installed on the front and rear bumpers can act as both a transmitter and a receiver. These sensors send a signal that will be reflected back
Mobile computing in means computing done by intermittently connected users who access network resources. It requires a wireless medium such as cellular radio, radio nets and low-orbit satellites. It is a major part of wireless communication technology.
Holographic memory is a three-dimensional data storage system that can stored information at high density inside the crystal or photopolymer. Hence holographic storage system has the potential to became the next storage generation.
The mind-reading computer system presents information about your mental state as easily as a keyboard and mouse present text and commands. Imagine a future where we are surrounded with mobile phones, cars and online services
Brain Computer Interface (BCI) Brain chips is a method of communication based on voluntary neural activity generated by the brain and independent of its normal output pathways of peripheral nerves and muscles.
A multibiometric system combines information from multiple biometric traits, algorithms, sensors, and other components to make a recognition decision Multimodal Biometric Authentication Using Fingerprint and Iris Recognition in Identity Management
Electronic paper, also called e-paper, is a display technology designed to mimic the appearance of ordinary ink on paper. electronic paper reflects light like ordinary paper and is capable of holding text and images indefinitely
The process of superimposing digitally rendered images onto our real-world surroundings, giving a sense of an illusion or virtual reality. Recent developments have made this technology accessible using a Smartphone.
A feasibility study evaluates the project's potential for success; therefore, perceived objectivity is an important factor in the credibility of the study for potential investors and lending institutions.
The main objective of this system is the implementation of separate monitoring system, implementation of mobile base network monitor at every client in the network. Here in this approach, user of each client machine.
MRTMS which monitored the vital signs of network infrastructure devices. Network engineers are responsible for maintaining the health of their networks. They ensure that the network’s resources hold the highest levels of Confidentiality