Latest top 371 Computer Engineering Seminars

Computer engineering seminars topics collection. Download full computer engineering seminars in doc, pdf or ppt format.

Mobile Based Network Monitoring System

The main objective of this system is the implementation of separate monitoring system, implementation of mobile base network monitor at every client in the network. Here in this approach, user of each client machine.

Multi Router Traffic Monitoring System

MRTMS which monitored the vital signs of network infrastructure devices. Network engineers are responsible for maintaining the health of their networks. They ensure that the network’s resources hold the highest levels of Confidentiality

Facebook Cassandra

At Facebook, the inbox search system needed to handle a very high write throughput, billions of writes per day and was also required to scale to a very large amount of users.

Multi Level Intrusion Detection and Log Management System In Cloud Computing

Log management in cloud computing is an embracing topic in the determinant of how applications are developed and installed on a server, intrusion detection systems which acts as an antivirus is also installed to fight against cyber-attack.

Air Cargo Tracking System

They study helps one to understand the origin of goods and shipments tracking and transport and of the same time loopholes that occurs in the management of goods or shipments and the solution to the present or existing system.

Semantic Web

Semantics of information and services on the web is defined, making it possible for the web to "understand" and satisfy the requests of people and machines to use the web content.

Animal Tracking and Gps System

Human cannot able to identify the actual health problem related to Animals, so this project will helps to diagnosis the Health Problem of Animals. Tracking provision of Animals is involved in this system.

Child Safety Wearable Device

It provides parents with the real-time location, surrounding temperature, UV radiation index and SOS light along with Distress alarm buzzer for their child's surroundings and the ability to locate their child .

Automated Electronic Mock Examination

A mock examination is an exam that does not count for credit. It is taken before an official examination and gives students the opportunity to practice for the later.

BIOMETRIC ATM Iris Recognition

Iris scanning technology into the identity verification process used in ATMs. The development of such a system would serve to protect customers and financial institutions alike from fraud and other breaches of security.

Computerized Crime Tracking System

This project work identifies the challenges facing police departments that seek to implement computerized crime tracking information systems. The project highlights the importance of police departments identifying crime records.

CAD-CAM Technology

Computer Aided Design and Computer Aided Manufacture is the way things are made these days. Without this technology we wouldn’t have the range and quality of products available or, at least, they wouldn’t be available at a price most of us can afford.

Software Development Life Cycle

SDLC is a process followed for a software project, within a software organization. It consists of a detailed plan describing how to develop, maintain, replace and alter or enhance specific software.

Search Engine Optimization(SEO)

SEO is a methodology of strategies, techniques and tactics used to increase the amount of visitors to a website by obtaining a high-ranking placement in the search results page of a search engine including Google, Bing, Yahoo and other search engines.

Embedded Systems

System is a computer system with a dedicated function within a larger mechanical or electrical system, often with real-time computing constraints. It is embedded as part of a complete device often including hardware and mechanical parts.

5 Pen PC Technology

5 Pen PC Technology is a gadget package including five functions: a pen-style cellular phone with a handwriting data input function, virtual keyboard, a very small projector, camera scanner, and personal ID key with cashless pass function.

Invisibility Cloaks

A cloak of invisibility is a method of rendering physical objects undetectable or invisible. Researchers from the United States and England have developed.

Distributed Denial of Service Attack

A distributed denial-of-service (DDoS) attack is one in which a multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted system.

Smart Fabrics

Smart clothing, made from sensor-based smart fabric, could redefine the connected fitness and health industries and beyond.

Google Chrome OS

Google Chrome is a free, open-source web browser developed by Google. It was released in 2008, and has grown to be one of the most popular browsers today.

    5 reviews
  • Osoka Victor

    i need a seminar work on ONLINE STUDENT CLEARANCE SYSTEM 4 months ago

  • Priya D

    artificial intelligence with bigdata 4 months ago

  • Jemal Mengistu

    about graph based search engine 7 months ago

  • Tadele Mersha

    Edge Computing 11 months ago

  • Raj Admin
    Raj

    Huge list of latest Computer Engineering (CE), Information Technology (IT), Computer Science (CSE), BCA and MCA seminar topics. Students can download abstract full report in pdf, ppt, doc etc. These seminars also include research papers on many advanced topics. Thank you. 1 year ago