Latest top 365 Computer Engineering Seminars

Computer engineering seminars topics collection. Download full computer engineering seminars in doc, pdf or ppt format.

Hadoop

Hadoop is an open source, Java-based programming framework that supports the processing and storage of extremely large data sets in a distributed computing environment. It is part of the Apache project sponsored by the Apache Software Foundation.

Software Testing

This is a process of executing a program or application with the intent of finding the software bugs. It can also be stated as the process of validating and verifying that a software program or application or product:

IP Spoofing

IP Spoofing is a technique used to gain unauthorized access to machines, whereby an attacker illicitly impersonate another machine by manipulating IP packets.

LAMP Technology

LAMP is an open source Web development platform that uses Linux as the operating system, Apache as the Web server, MySQL as the relational database management system and PHP as the object-oriented scripting language.

Mobile Phone Cloning

Cell phone cloning refers to the act of copying the identity of one mobile telephone to another. This is usually done to make fraudulent telephone calls. The bill for the calls go to the legitimate subscriber

Middleware Technologies

Middleware is essential to migrating mainframe applications to client/server applications, or to Java or internet-protocol based applications, and to providing for communication across heterogeneous platforms.

Polymer Memory

Polymer memory refers to a new memory technology that uses conductive polymers instead of silicon-based constructions to store information.

Service Oriented Architecture

SOA is essentially a collection of services. These services communicate with each other. The communication can involve either simple data passing or it could involve two or more services coordinating some activity.

UNIX Operating System

The Unix operating system is a set of programs that act as a link between the computer and the user. It is a stable, multi-user, multi-tasking system for servers, desktops and laptops. systems also have a(GUI) similar to Microsoft Windows.

Voice over Internet Protocol

Refers to sending voice and fax phone calls over data networks, particularly the Internet. This technology offers cost savings by making more efficient use of the existing network.

Web Services on Mobile Platform

In practice, the web service typically provides an object-oriented web-based interface to a database server, utilized for example by another web server, or by a mobile application, that provides a user interface to the end user.

Wireless Fidelity

Wi-Fi is the name of a popular wireless networking technology that uses radio waves to provide wireless high-speed Internet and network connections.

Interferometric Modulator

The color is selected with an electrically switched light modulator comprising a microscopic cavity that is switched on and off using driver integrated circuits similar to those used to address liquid crystal displays (LCD).

Google Wave

Google Wave is an internet application made by Google. Google describes Wave as an application which "lets you communicate and collaborate in real time". This means that Wave can be used for several people to edit a document at the same time.

Google App Engine

Google App Engine (often referred to as GAE or simply App Engine) is a web framework and cloud computing platform for developing and hosting web applications in Google-managed data centers. Applications are sandboxed and run across multiple servers.

Enterprise Resource Planning (ERP)

ERP is business process management software that allows an organization to use a system of integrated applications to manage the business and automate many back office functions related to technology, services and human resources.

Online Voting System

In “ONLINE VOTING SYSTEM” a voter can use his\her voting right online without any difficulty. He\She has to be registered first for him/her to vote. Registration is mainly done by the system administrator for security reasons.

Phishing Technology

In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details.

Data Warehousing

Data warehousing is the process of constructing and using a data warehouse. A data warehouse is constructed by integrating data from multiple heterogeneous sources that support analytical reporting, structured and/or ad hoc queries, and decision making.

Asynchronous Transfer Mode

ATM is a switching technique used by telecommunication networks that uses asynchronous time-division multiplexing to encode data into small, fixed-sized cells.

    1 reviews
  • Rajdeep Janorkar

    Huge list of latest Computer Engineering (CE), Information Technology (IT), Computer Science (CSE), BCA and MCA seminar topics. Students can download abstract full report in pdf, ppt, doc etc. These seminars also include research papers on many advanced topics. Thank you. 4 months ago