Latest top 378 Computer Engineering Seminars

Computer engineering seminars topics collection. Download full computer engineering seminars in doc, pdf or ppt format.

Finger Print Authentication

Fingerprints have been accepted as the most common form of biometrics authentication today. Each fingerprint has a unique characteristic and pattern that is made up of lines and spaces.

HTML Hyper Text Markup Language

HTML stands for Hyper Text Markup Language. It is used to design web pages using markup language. HTML is the combination of Hypertext and Markup language. Hypertext defines the link between the web pages.

Pixeom

Pixeom uses containers to ship and manage its software on the edge. On the software side, Pixeom is relatively cloud agnostic. Pixeom is not only the first to put multiple cloud services in a box, but also the first to connect them together globally, forming a growing network of users and content

Perspnal Computer and AutoCAD

AutoCAD is a computer-aided tool that allows many different types of designers to create diverse kinds of drawings and designs. CAD stands for "Computer Aided Design." AutoCAD is a line of two dimensional and three-dimensional design software.

Big Data Analysis for Customer Behaviour

Big data is a field that treats ways to analyse, systematically extract information from, or otherwise deal with data sets that are too large or complex to be dealt with by traditional data- processing application software.

FreeNet

The Freenet network provides an effective means of anonymous information storage and retrieval. By using cooperating nodes spread over many computers in conjunction with an efficient adaptive routing algorithm, it keeps information anonymous and available while remaining highly scalable.

A Secure Dynamic Multi-keyword Ranked Search Scheme Over Encrypted Cloud Data

In this paper, a secure, efficient and dynamic search scheme is proposed, which supports not only the accurate multi-keyword ranked search but also the dynamic deletion and insertion of documents.

Implementation of CP

This system can be used to store the details of the inventory, update the inventory based on the sale details, produce receipts for sales, generate sales and inventory reports periodically etc.

Silent Sound Technology

‘Silent Sound’ technology aims to notice every movements of the lips and transform them into sounds, which could help people who lose voices to speak, and allow people to make silent calls without bothering others.

Wavelet Transforms In Colored Image Steganography

Digital Steganography exploits the use of a host data to hide a piece of information in such away that it is imperceptible to a human observer. Wavelet transforms that map in..

Interconnection of Computer Networks

Networks must be interconnected to cater to inter-organizational relationships. An interconnection network in a parallel machine transfers information from any source node to any desired destination node

Rover Mission Using JAVA Technology

Java technology today is good for general purpose computing and GUIs, but it was not ready for use with control systems like the software on the Rover. The Golden Gate project seeks to use RTSJ Real Time Specification for JAVA

Random Number Generators

This paper evaluates the hardware based random number generator (RNG) for use in cryptography application. The paper simulates the fastest and efficient algorithm towards the random number generator and the function generating 50% time different values.

IT In Space

All ventures into outer space, ranging from exploratory fly-bys to managed flights, have first been tried out of the moon. Like in most other areas, space research is also moving into larger-scale simulations using powerful computers

Hamming Cut Matching Algorithm

Hamming Cut Matching Algorithm algorithm which reduces the comparison time for matching the iris code with database so that we can use iris recognition in case of huge databases like voting system

Parasitic Computing

Parasitic computing is programming technique where a program in normal authorized interactions with another program manages to get the other program to perform computations of a complex nature. Parasitic computing moves computation onto what is logically

Smart Card

A smart card, a type of chip card is a plastic card embedded with a computer chip that stores and transacts data between users. The card data is transferred via a reader that is part of a computing system.

Smart Quill

SmartQuill is slightly larger than an ordinary fountain pen. Users can enter information into these applications by pushing a button on the pen and writing down what they would like to enter .The SmartQuill does not need a screen to work

Wireless Local Loop

In a telephone network, a wireless local loop (WLL) is a generic term for an access system that uses a wireless link to connect subscribers to their local exchange in place of conventional copper cable. Using a wireless link shortens

Virtual Reality

“Virtual Reality is a way for humans to visualize, manipulate and interact with computers and extremely complex data”. Virtual Reality (VR), sometimes called Virtual Environments (VE) has drawn much attention in the last few years.

    7 reviews
  • Sa Nj

    I need seminar on relational database management system

    1 week ago
  • Tessy Antony

    I need seminar topics on biomolecular computing

    1 month ago
  • Osoka Victor

    i need a seminar work on ONLINE STUDENT CLEARANCE SYSTEM

    6 months ago
  • Priya D

    artificial intelligence with bigdata

    6 months ago
  • Jemal Mengistu

    about graph based search engine

    9 months ago
  • Tadele Mersha

    Edge Computing

    1 year ago
  • Raj Janorkar

    Huge list of latest Computer Engineering (CE), Information Technology (IT), Computer Science (CSE), BCA and MCA seminar topics. Students can download abstract full report in pdf, ppt, doc etc. These seminars also include research papers on many advanced topics. Thank you.

    2 years ago