Computer Science Seminar Topics List (a big bundle)

Final year,,mca and bca students can find latest collection of computer science seminar topics list with ppt,pdf, and reference material for free download. Computer science students can also download latest final year projects with source code and project report.

Links to download Computer Science Seminar Topics List (a big bundle):

  1. PGP encryption technology
  2. Generic visual perception processor
  3. Nanotechnology Assembler Design And Nano-Communication
  4. MANETS: Mobile Adhoc Networks
  5. Liquid Crystal on Silicon Display (LCOS)
  6. Jini – advanced set of network protocols
  7. Computer memory based on the protein bacterio-rhodopsin
  8. CSS and DeCSS
  9. Multimedia Broadcast Multicast Service (MBMS)
  10. Extreme Programming (XP)
  11. Holographic Versatile Disc
  12. Zero Knowledge proofs
  13. Bi molecular Computers
  14. SPINS -Security Protocol For Sensor Network
  15. Context Disambiguation On Web Search Results
  16. Surface Computer
  17.                 Particle Swarm Optimization
  18.                 Multi Protocol Level Switching Virtual Private Network
  19.                 Voice over IP
  20.                 Quantum mechanical algorithms for hidden subgroups and related problems
  21.                 Persistent Data Structures
  22.                 Software Watermarking
  23.                 The challenges of software reliability & modeling
  24.                 Identity-based encryption
  25.                 Compiler Optimization:
  26.                 Some Recent Trends
  27.         Simulation of entanglement with communication for distributed
  28.                 Problem solving.
  29.                 Dual Core Processor : Architectural Features
  30.                 Digital Video Encoding Formats
  31.                 Delay Tolerant Routing
  32.                 Quorum Systems
  33.                 Mobile electronic payments
  34.         Secure data communication based on quantum effects
  35.                 Algorithms for networking
  36.                 Infinite Automate and Formal Verification
  37.                 Side Channel Attacks and its’ counter measure for Block Cipher
  38.                 Salient aspects of the architecture of the Itanium CPU
  39.                 Using the combination lemma: Proving upper bounds on the
  40.                 Combinatorial complexity of unions.
  41.                 Proving lower bounds using Holevo’s result.
  42.                 Web Service Standards for Data Mining
  43.                 Natural Language Generation
  44.                 Geometry in Sensor Networks
  45.                 Geometry in Sensor Networks
  46.                 Trustworthy Computing
  47.                 Software Metrics
  48.                 Infinite Games
  49.                 Automate over Infinite Words
  50.                 Dual Core Processor : Architectural Features
  51.                 Digital Video Encoding Formats
  52.                 Delay Tolerant Routing
  53.                 Quorum Systems
  54.                 Information Extraction
  55.                 Named Entity Recognition
  56.                 XML Query Languages
  57.                 Geometry in Sensor Networks
  58.                 Linear Time encoding/decoding of ordinary tree and hypertree
  59.                 Semantic Web
  60.                 Multicore Processors and their Architectures
  61.                 IPv6
  62.                 Electronic Money:
  63.                 Underlying Mathematical Techniques
  64.                 RTOS for Mobile Devices
  65.                 Virtual Reality
  66.                 Cache Coherence Problem
  67.                lat form Independent Enhanced Media Player
  68.                 Neural networks and fuzzy logic in unmanned aircraft
  69.                 ANN based character recognizer for mobile devices to help visually challenged”
  70.                 Internet In Space
  71.                 Image Augmented Inertial Navigation System
  72.                 Efficient Resource Scheduling In Data Grid
  73.                 Imouse
  74.                 Intelligent transportation system using genetic algorithm for shortest driving time
  75.                 Hiding sensative rule using distortion technique
  76.                 The Friend Locator
  77.                 Adaptive steganograp
  78.                 A wireless technology for Young generation
  79.                 Facial Analysis Between Age Groups Using Distance Matrices
  80.                 Double talk detector using echo path estimate
  81.                 Inconspicuous threats to Mobile Computing security
  82.                 Establishment of emergency, portable, bidirectional
  83.                 Gait as a bio metric for human recognition
  84.                 Emulation of peer to peer botnets
  85.                 Id-based encryption schemes
  86.                 Computing the digits of the mathematical Pi
  87.                 E-Commerce and Digital Signatures
  88.                 SONET/SDH Communication
  89.                 Parametric Complexity
  90.                 Mathematical Programming
  91.                 Some topics in Digital Geometry
  92.                 Core Sets in Computational Geometry
  93.                 Some variants of mathematical programming
  94.                 Code Transformation
  95.                 Noisy text processing using machine learning methods
  96.                 Mobile electronic payments
  97.                 Secure data communication based on quantum effects
  98.                 Model Checking
  99.                 Decision diagrams in VLSI CAD
  100.                 Mobile Agents
  101.                 Distributed File Systems
  102.                 Emotional Agents: Computing Models of Emotions
  103.                 Real Time Operating Systems Recent Trends
  104.                 Information Extraction
  105.                 Named Entity Recognition
  106.                 XML Query Languages
  107.                 Stochastic Scheduling
  108.                 Intrusion detection in wireless networks
  109.                 Image steganography
  110.                 Ultra Wideband Networking
  111.                 Routing protocols in wireless sensor networks
  112.                 Clustering techniques in complex network
  113.                 Object Type System
  114.                 Code Transformation
  115.                 Infinite Automate and Formal Verification
  116.                 Side Channel Attacks and its’ counter measure for Block Cipher
  117.                 Primes are of two kinds: probable and provable
  118.                 Are Mersenne primes only an obsession?
  119.                 Time Contract Algorithms
  120.                 Data communication in current and future wireless networks
  121.                 Parametric searching “ what it is and how to make it practical
  122.                 Geometric applications in Sensor networks
  123.                 Packing and covering
  124.                 Cache efficient algorithms
  125.                 Facility location and clustering
  126.                 Some variants of mathematical programming
  127.                 Noisy text processing using machine learning methods
  128.                 Low Level Object Oriented Languages
  129.                 Stochastic Scheduling
  130.                 Intrusion detection in wireless networks
  131.                 Image stenography
  132.                 Ultra Wide band Networking
  133.                 Routing protocols in wireless sensor networks
  134.                 Clustering techniques in complex network
  135.                 Object Type System
  136.                 Grammar Induction
  137.                 Localization in Sensor Networks
  138.                 Reversible logic ciruits: design and test issues
  139.                 Digital Watermarking
  140.                 Program Verification
  141.                 Quantum Cryptography
  142.                 Quantum Cryptanalysis
  143.                 Recommended System
  144.                 Towards Object Oriented Design using Verilog HDL
  145.                 Real Time Operating Systems
  146.                 Web services
  147.                 The spyware nightmare: The problems and possible solutions 2005
  148.                 Platform Architecture
  149.                 3G Cellular Telephone network
  150.                 Epsilon nets and transvestism of hypergraphs
  151.                 Geometric Discrepancy
  152.                 LP-Based Approximation Algorithms
  153.                 Game theoretic issues in algorithms

Leave a Reply

Your email address will not be published. Required fields are marked *