Computer engineering seminars topics collection. Download full computer engineering seminars in doc, pdf or ppt format.
“Forensic computing is the process of identifying, preserving, analyzing and presenting digital evidence in a manner that is legally acceptable.
This technology is expected to trounce the deficiencies of 3G technology in terms of speed and quality. 4G can be best described in one word “MAGIC”, which stands for Mobile multimedia Anytime Anywhere Global mobility support.
Agent is a software process that meets the conventions of OAA (Open Agent Architecture) society. An agent is an abstraction that enables to model a system more easily.
To create custom dynamic web applications a programmer must utilize Ajax. Ajax is a group of technologies that provide asynchronous two-way communication between a server and the web browser.
AppleTalk is a network operating system designed to connect Apple computers. Its components are built on Macintosh operating systems.
An ocular prosthesis or artificial eye is a type of craniofacial prosthesis that replaces an absent natural eye following an enucleation, evisceration, or orbital exenteration. The prosthesis fits over an orbital implant and under the eyelids.
“Autonomic Computing” is a new vision of computing initiated by IBM. This new paradigm shifts the fundamental definition of the technology age from one of computing, to one defined by data. Access to data from multiple, distributed sources.
Asynchronous chips improve computer performance by letting each circuit run as fast as it can. Chips can run at the average speed of all its components instead of the speed of its slowest component, as was the case with a clocked design.
Big data usually includes data sets with sizes beyond the ability of commonly used software tools to capture, curate, manage, and process data within a tolerable elapsed time.
Bluetooth is a low-power wireless connectivity technology used to stream audio, transfer data and broadcast information between devices.
Ambient Intelligence (AmI) refers to electronic environments that are sensitive and responsive to the presence of people.
Blue Gene/L (BG/L) is a scientific and engineering, message-passing, supercomputer that IBM is developing with partial funding from the U.S. Department of Energy ...
Employee Management system is an application that enables users to create and store Employee Records..
For Business people they don’t have sufficient time for these then they can use these type of online Hotel Management Systems. By this project we will reduce the faults in bills of their expenditure and decrease time of delay..
Network traffic can be defined in a number of ways. But in the simplest manner we can define it as the density of data present in any Network..
In this paper, we have developed a high security,simple and reliable wireless communication system to monitor and to control devices that are far away from the user by making a call.
Cyber terrorism is the act of internet terrorism in terrorist activities, including acts of Deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses.
The objective of this seminar is to identify handwritten characters with the use of neural networks. We have to construct suitable neural network and train it properly.
The Freenet network provides an effective means of anonymous information storage and retrieval. By using cooperating nodes spread over many computers in conjunction with an efficient adaptive routi...
Cloud Computing has great potential of providing robust computational power to the society at reduced cost. It enables customers with limited computational resources to outsource their large comput...