Seminars topics for computer science

Seminars topics for computer science


Were you looking for seminar themes on Computer Science Engineering (CSE)? However, this article will help you identify the most trending and latest seminars topics for Computer Science Engineering.

Computer Science Engineering, among all other engineering ways, is the recent trend among students passing 12th board exams. Moreover, it is an academic program that surrounds broad topics related to computer application and computer science. Furthermore,  A CSE syllabus comprises many computational subjects, including various programming languages, algorithms, macrography, computer applications, software designing, etc.


First of all, n the rising technological era, the trend for computer-related ways is in high demand. Moreover, various online Bachelors of Computer Application), MCA (Masters of Computer Application), and seminars to help students achieve their goals. Finally, here, you’ll find the list of seminars topics for Computer Science Engineering (CSE) that will help you to be dedicated and engaged with your computer world.

What are a Seminars topics for Computer Science?

First of all, a forum is a form of academic/technical education where members focus on a specific topic or subject in returning meetings or single meetings. However, it helps in achieving important academic skills and develop complex thinking among the participants.


Moreover, find out the latest collection of seminar topics for Computer Science Engineering (CSE), the latest technical CSE MCA IT seminar topics, recent essay topics, speech ideas, dissertation, thesis, IEEE, and MCA seminar topics BTech, MTech, BCA, and MCA Students.


NETCONF AND YANG – Seminar on network configuration:

However, network configuration, information recapture, and event notification are the significant tasks in network management. NETCONF or network configuration protocol (RFC 6241) came as an alternative and more preferred Mechanism for network configuration. It also provides a document-oriented (XML/YANG) approach to configure and retrieve network element configuration. Finally, it also provides a locking mechanism.

Blind Authentication: A Secure Crypto-biometric verification Protocol:

First of all, a biometric is a physiological or detectable characteristic of a human being that can differentiate one person. Moreover, different biometrics systems are Physiological Biometrics and Behavioural Biometrics.

Restriction Aware I/O Management For Solid State Disks:

First of all, a Solid- condition Disk (SSD) is a data storage tool that copies a hard disk drive (HDD). There are no moving tasks to an SSD SSD that are completely different from hard disk drives(HDD). Moreover, the read/write bandwidth of SSDs is higher than that of HDD. SSD has no sought time since they have no moving parts such as arms and spinning platters. As well as provide higher durability against shock, vibration, and operating temperature. SSD consumes less power than HDD. Finally, faster start-up—extremely low read latency. The performance does not depends on the location of data.

Exploiting Friendship Relations for Efficient Routing in Mobile Social Networks:

Delay Tolerant Networks (DTN) is a class of wireless networks. Moreover, these networks are usually sparse, and the connection between their nodes frequently changes—real-life examples of DTNs and mobile social networks (MSN). Due to the challenging network environment in these networks, efficient routing of messages is not easy. However, the relationship defining the frequency and duration of the connectivity between nodes has to be analyzed to route messages efficiently. Exploiting friendship-based social network features of an MSN, we present a new routing algorithm: Friendship Based Routing. However, to explore social relations between nodes (i.e., people), we need to define their friendships in terms of their behaviors.

Two Factor Authentication:

First of all, many fields in the world need authentication of the users. We use authentication in day-to-day life. Most authentications are protected only by Password. Moreover, passwords are known to be one of the easiest targets of hackers. So the authentication is easily broken. The solution to this problem is Two Factor Authentication. However, different password problems are Finding written passwords, Post-It Notes, Guessing password/pin, Shoulder surfing, Keystroke logging, Screen scraping (with Keystroke logging), and Brute force password crackers.

Ensuring distributed responsibility for data sharing in the cloud:

First of all, to achieve security, it uses Cloud Information Accountability(CIA) framework. It is highly decentralized, which leverages JAR programmable capabilities. So, it also uses distributed auditing mechanisms.

Revisiting protection Against Large Scale Online Password Guessing Attacks:

Automated Turing Tests-Limits the number of the estimate from a single machine. Focus on reducing user irritation by challenging users with fewer Automated Turing Tests(ATT) and subjecting computer logins to more ATTs. However, it introduces a new protocol called a password-guessing waterproof protocol. PGRP make use of both cookies and IP address. Finally, in this presentation, we will discuss protection Against Large Scale Online Password Guessing Attacks.

Investigation And Research Of System Security Based On ANDROID:

Android is a software store for mobile devices that includes an operating system, web services, and key applications. Moreover, its apportionment breaks the syndicate status of Microsoft windows mobile OS and Nokia’s Symbian OS. It permits anyone to develop their applications. So there is a chance that a user is likely to download and install malicious software written by software hackers.

Real-World Distributed Computing with IBIS Seminars topics for computer science

In recent years there is a significant advancement in high-performance distributed computer systems in science and industry. However, these systems can provide transparent and efficient computing. For more complex applications existing scheduling system is limited. Moreover, IBIS allows easy programming and development of distributed applications, even for dynamic, faulty, and heterogeneous environments.

Supporting of search-as-you-type using SQL in databases:

A search as you type function computes the fly as user types in keyword question character by character. As well, It finds the solution for both multi-keyword queries and single keyword queries. It also Finds how to help search as you type in a relational database using SQL. During the Exact search, a user types a single incomplete keyword W character by character. Search as you type system finds the record containing keyword with a prefix W.


Compressed Sensing enabled video streaming for wireless multimedia sensor networks:

In this presentation on Compressed Sensing enabled video streaming for wireless multimedia sensor networks, we will look at a networked system for joint compression, rate control, and error correction of video over resource-constrained embedded devices. Compressive Distortion Minimizing Rate Control regulates the CS sampling rate, the data rate, and the rate of a simple parity-based channel encoder are the methods used to address this issue.

Reading 1D Barcodes with Mobile Phones Using planar  Templates:

1D BARCODES are Optical machine-readable presentations of data relating to the objects. In codes, data are represented by varying the widths and spacings of parallel lines. This presentation looks into Reading 1D Barcodes with Mobile Phones Using Deformable Templates. In a deformable template, each digit of the barcode, averaging over the set of all expected deformations. The success in reading those templates depends on an accurate description of the shape class.

Applications of Artificial intellect in Safe Human-Robot interchanges:

This presentation discusses the combination of both Robots and Humans’ workspace. It introduces a new sensory system for modeling, tracking, and predicting human motions within a Robot workspace. Our objective is to obtain a super equilateral based model of humans using SOM. Also, assess the danger of the robot operations.

Person De-Identification in Videos Seminars topics for computer science

Recognition and de-identification process are opposite. Identifying information captured on video can include face, outline, posture, and gait. This presentation on De-Identification discusses the general framework, which protects the individuals’ privacy while providing enough feel for space’s human activities. It is easy to hide individuals’ identities by replacing a stable area around them with black pixels.


Motion Detail Preserving Optical Flow Estimation:

The optical stream is the apparent motion of brightness designs in the image. Ideally, the observable flow would be the same as the motion field. The motion field is the projection into the idea of three-dimensional motion vectors.

Design and execution of Optical Wireless Communications with Optically Powered Smart Dust Motes:

Providing relation with micro machines and smart dust is challenging. Integrated circuits with wireless connections are favored. Optical wireless communications is an attractive choice. For low data rate communications, regulated retro-reflectors are used—low-speed communication for smart dirt without tracking.

Controlling The Bit charge Of Multi-object Videos With Non-Cooperative Game Theory:

The algorithm finds an “optimal emulsion ” in that it observes the mixed strategy Nash equilibrium, which is the probability distribution of the actions carried by the players that maximize their expected payoffs (the number of bits).

Intra-Socket and Inter-Socket Communication in Multi-core Systems:

The increasing calculation and communication demands of the scientific and industrial communities need a clear understanding of the performance trade-off involved in multi-core computing platforms. Analysis can help application and toolkit developers design better, topology-aware, communication primitives intended to suit the needs of various high-end computing applications. We take on the opposition to designing and executing a portable intra-core communication framework for streaming computing and evaluating its performance on some popular multi-core architectures developed by Intel, AMD, and Sun.

Extending MapReduce architecture for Efficient base -Based Sampling in Facebook over Hadoop:

They were extending Map-Reduce for well-organized Predicate Based Sampling in Facebook. This presentation focus on Mechanism for phased Processing, Policies for Incremental Processing, execution over Hadoop / Hive, Efficient Predicate-Based Sampling, and Experimental assessment of Policies. Map-Reduce treats the input as a list of (key, value) pairs that express a computation in terms of two functions: map and reduce


Improving QoS in High-Speed strength Using Bandwidth Maps:

High-speed mobile input services have become more accessible and cheap to mobile users. Mobile users in buses and trains can enjoy the entire range of online network services. Wireless Wide Area Network (WWAN) data rates and network coverage increase in mobile data services. Advance in WWAN technologies and popularity of personal mobile devices vehicular internet access possible.

Data Mining – Automated Pattern Discovery:

In this paper, we propose to talk about Data Mining the methods in use, how it links with Data Warehouse activity to ferret out hitherto unknown patterns in statistical data, its objectives, benefits, and distinction interdependency OLAP and query/reporting.

Global Wireless E-Voting Seminars topics for computer science

Being in Computers’ lifetime, we are giving and taking the safety by opting for Electronic voting machine cause in the present electronic voting machine is not intelligent. One more risk with the available voting machine is that any body can increase the vote count since it is present in the device itself.

Artificial Intelligence And Expert Systems:

Humankind has provided itself with the scientific name Homo sapiens–man the wise, reason our mental capacities are so essential to our everyday lives and our sense of self. As long as thinking and intelligence are merely a matter of symbolic processing information, computers should demonstrate such intelligence. One of the big inquiry of science is “What is intelligence?”

Internet Firewalls Seminars topics for computer science

The Internet has made large amounts of details handy to the standard computer user at home, business, and education. For many people, having entry to this information is no longer just an advantage; it is essential. Connecting a personal network to the Internet can reveal critical or private data to deadly attacks from anywhere in the world. The invader could gain access to your website’s confidential information or interfere with your use of your systems. Users who connect their computers to the Internet must be aware of these dangers, their implications, and how to protect their data and critical systems.



The Final Takeaway! on Seminars topics for computer science

In this article, we’ve listed the best swing and latest seminars topics for Computer Science Engineering (CSE). These do not the only limited topics accessible; however, the list has been curated based on the computer world’s newest trend.


As long as you feel like adding everything here or ask any related queries, please let us know in the comment box below.

Cheers to Computer Engineering!

Leave a Reply

Your email address will not be published. Required fields are marked *