Collection of technical seminar topics for computer science. Download full technical seminar topics for computer science in doc, pdf or ppt format.
To create custom dynamic web applications a programmer must utilize Ajax. Ajax is a group of technologies that provide asynchronous two-way communication between a server and the web browser.
AppleTalk is a network operating system designed to connect Apple computers. Its components are built on Macintosh operating systems.
An ocular prosthesis or artificial eye is a type of craniofacial prosthesis that replaces an absent natural eye following an enucleation, evisceration, or orbital exenteration. The prosthesis fits over an orbital implant and under the eyelids.
“Autonomic Computing” is a new vision of computing initiated by IBM. This new paradigm shifts the fundamental definition of the technology age from one of computing, to one defined by data. Access to data from multiple, distributed sources.
Asynchronous chips improve computer performance by letting each circuit run as fast as it can. Chips can run at the average speed of all its components instead of the speed of its slowest component, as was the case with a clocked design.
Big data usually includes data sets with sizes beyond the ability of commonly used software tools to capture, curate, manage, and process data within a tolerable elapsed time.
Bluetooth is a low-power wireless connectivity technology used to stream audio, transfer data and broadcast information between devices.
Ambient Intelligence (AmI) refers to electronic environments that are sensitive and responsive to the presence of people.
Blue Gene/L (BG/L) is a scientific and engineering, message-passing, supercomputer that IBM is developing with partial funding from the U.S. Department of Energy ...
Employee Management system is an application that enables users to create and store Employee Records..
For Business people they don’t have sufficient time for these then they can use these type of online Hotel Management Systems. By this project we will reduce the faults in bills of their expenditure and decrease time of delay..
Network traffic can be defined in a number of ways. But in the simplest manner we can define it as the density of data present in any Network..
In this paper, we have developed a high security,simple and reliable wireless communication system to monitor and to control devices that are far away from the user by making a call.
Cyber terrorism is the act of internet terrorism in terrorist activities, including acts of Deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses.
The objective of this seminar is to identify handwritten characters with the use of neural networks. We have to construct suitable neural network and train it properly.
The Freenet network provides an effective means of anonymous information storage and retrieval. By using cooperating nodes spread over many computers in conjunction with an efficient adaptive routi...
Cloud Computing has great potential of providing robust computational power to the society at reduced cost. It enables customers with limited computational resources to outsource their large comput...
Blackberry handhelds are integrated into an organization's e-mail system through a software package called “Blackberry Enterprise Server “(BES). Versions of BES are available for Microsoft E...
Biometrics , which is formed from the two ancient Greek words bios and metron which mean life and measure respectively, refers to two very different fields of...
The GPS ( Global Positioning System ) is a “constellation” of 24 well-spaced satellites that orbit the Earth and make it po...