Menu
This post contains a wide variety of technical papers chosen from various Engineering streams. If you need more explanations on any topic you can search by the topic name in the search box, if you do not get please do ask me. ↓.
Post authorHi Geetu,First you have to choose a topic of your interest like any kind of technology or network related.Secondly start collecting material for it. I personally recommend you to refer to 3-5 websites and collect best possible and easily understandable content.Third, organize the content in standard format like Abstract, introduction, setup methods, applications, advantages/disadvantages and conclustion.Refer this post for formatYou can choose topics like Android apps, Use of Ajax technology in today’s world, Hadoop technology etc. ↓. Post authorHi Nandy,Please refer to my previous comment,Hi Saidaran,You should follow some format for good paper submission. It should be organized like1.Abstract2.Introduction3.History depends on topic4.Types/categories (Optional)5.Construction/Preparation methods (Optional)6.Properties (Optional)7.Applications Explain few in detail8.Advantages9.Disadvantages10.Conclusion in brief. Tell about its feature scope also11.ReferencesAll the very best.:)Write back to me for further queriesChoose any topic based on your interest.Refer this one for format. ↓.
Post authorHi Saidaran,You should follow some format for good paper submission. It should be organized like1.Abstract2.Introduction3.History – depends on topic4.Types/categories (Optional)5.Construction/Preparation methods (Optional)6.Properties (Optional)7.Applications – Explain few in detail8.Advantages9.Disadvantages10.Conclusion – In brief. Tell about its feature scope also11.ReferencesAll the very best.:)Write back to me for further queriesChoose any topic based on your interest.Refer this one for format.
Seminar Topics of Computer Science Engineering (CSE/IT/MCA) 2015 - 2016 This is an active list of latest Computer Science and Information Technology Seminar Topics06, when ever we add new topics (2015-2016) this list will get updated automatically. Apr 25, 2019 Huge List of Computer Science (CSE) Engineering and Technology Seminar Topics 2017 2018, Latest Tehnical CSE MCA IT Seminar Papers 2015 2016, Recent Essay Topics, Speech Ideas, Dissertation, Thesis, IEEE And MCA Seminar Topics, Reports, Synopsis, Advantanges, Disadvantages, Abstracts, Presentation PDF, DOC and PPT for Final Year BE, BTech, MTech, MSc, BSc, MCA.
DetailsIllegal or immoral use of the computer or its resources is cyber crime. It includes unauthorized access to private pages, stealing credit card information, piracy etc.
As the cyber crimes are increasing day by day, it's affecting the industry on a large scale. Existing Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), and anti-malware system rely on low level network traffic features on program code signatures to detect cyber attacks. However, since hackers can constantly change their attack tactics by, it is extremely difficult for the existing security solutions to detect cyber attacks. DetailsReading is obviously essential in today’s society.
Printed text is everywhere in the form of reports, receipts, bank statements, on medicine bottles, etc. Optical aids, video magnifiers, and screen readers can help blind users and those with low vision to access documents.
There are few devices that can provide good access to common hand-held objects such as product packages, and objects printed with text such as prescription medication bottle. One of the devices we are going to discuss in this computer science seminar topic is Portable Camera-Based Assistive Text and Product Label Reading From Hand-Held Objects for Blind Persons. DetailsNICE (Network Intrusion detection and Counter measure) is a new multiphase distributed network intrusion detection and prevention framework in a virtual networking environment that captures and inspects suspicious cloud traffic without in terrupting users applications and cloud services. Cloud security is one of most important issues that has attracted a lot of research and development effort in past few years. In traditional data centres, where system administrators have full control over the host machines, vulnerabilities can be detected and patched by the system administrator in a centralized manner. However, patching known security holes in cloud data centres, where cloud users usually have the privilege to control software installed on their managed VM's, may not work effectively and can violate the service level agreement (SLA). Nowadays, internet miscreant and cyber criminals are increasing a lot and detecting and stopping them has become a serious issue.
Malicious flux networks have recently started to thrive. Malicious flux networks are a type a illegitimate content delivery networks(CDNs).These types of networks are set up using fast flux domain names i.e, the set of resolved IP addresses associated to these networks change frequently,often after each DNS query, thereby making it difficult to detect them. To make it even more complicated, these set of resolved set of IP addresses,also known as flux agents, are spread across many different networks. Recommendations on the Web is a general term representing a specific type of information filtering technique that attempts to present information items (queries, movies, images, books, Web pages, etc.) that are likely of interest to the users. With the diverse and explosive growth of Web information, how to organize and utilize the information effectively and efficiently has become more and more critical. This is especially important for Web 2.0 related applications since user generated information is more freestyle and less structured, which increases the difficulties in mining useful information from these data sources. In order to satisfy the information needs of Web users and improve the user experience in many Web applications, Recommender Systems.
DetailsInternet of things refers to uniquely identifiable objects and the representation of these physical objects in a virtual form in an Internet like structure. The number of things that get added to the network are increasing day by day. These connected devices are bound to reach 50 billion by 2020. MQTT or Message Queue Telemetry Transport is an Internet Of Things protocol for machine to machine communication.
The protocol was invented by Andy Stanford-Clark of IBM, and Arlen Nipper of Cirrus Link Solutions. DetailsCSE Seminar Topic on Liquid. Virtualization is becoming widely deployed in servers to efficiently provide many logically separate execution environments while reducing the need for physical servers. A virtual machine is a mechanism to run multiple operating systems on a single computer system.
With its rich set of features it forms an important and crucial component in cloud computing. Virtual Machine image storage is a challenging problem and issues like performance, deduplication, resiliency. DetailsDHT or distributed hash table is a powerful data structure used in distributed systems. The nodes in a distributed system form a distributed data structure. Key-values mappings are distributed among the nodes such that a change in the set of participants causes a minimal amount of disruption. Distributed storage systems have grown several times in their capacity and bandwidth.
Managing metadata in a storage system for high end computing is critical. ZHT or zero hop distributed hash table was built for high end computing systems with the goal of delivering excellent availability, fault tolerance, high throughput, and low latencies.