Computer engineering seminars topics collection. Download full computer engineering seminars in doc, pdf or ppt format.
Brain fingerprinting is based on finding that the brain generates a unique brain wave pattern when a person encounters a familiar stimulus Use of functional magnetic resonance imaging in lie detection...
Electronic payment systems come in many forms including digital checks, debit cards, credit cards, and stored value cards. The usual security features for such systems are privacy (protection from eav...
Electronics without silicon is unbelievable, but it will come true with the evolution of Diamond or Carbon chip. Now a day we are using silicon for the manufacturing of Electronic Chip’s. It has man...
Computer Viruses are widely known as evil programs that are meant to corrupt the peaceful environment of a computer. Actually a computer virus is a piece of programming code that alters the way your c...
Cyberterrorism is any act of terrorism that uses information systems or digital technology (computers or computer networks) as either an instrument or a target. Cyberterrorism can either be "internati...
Free Space Optics (FSO) or Optical Wireless, refers to the transmission of modulated visible or infrared (IR) beams through the air to obtain optical communications. Like fiber, Free Space Optics (FSO...
Plastics have long formed the skeletons and skin of products, whereas silicon has supplied the brains. With the advent of polymer and crystalline organic electronics, plastics will make up the brains...
The goal of the Space Communications Protocol Standards (SCPS) project is to provide a suite of standard data handling protocols which (from a user viewpoint) make a remote space vehicle appear to be...
Biometrics is an automated method of capturing a person’s unique biological data that distinguishes him or her from another individual. Iris recognition has emerged as one of the most powerful and a...
The foundation for a self-defending network is integrated security - security that is native to all aspects of an organization. Every device in the network - from desktops through the LAN and across t...
The idea behind eyeOS is that the whole system lives in the web browser. The client must have only a web browser to work with eyeOS and all its applications, including Office and PIM ones. This applie...
This is an attempt to describe Freenet, an adaptive peer-to-peer network application that permits the publication, replication, and retrieval of data while protecting the anonymity of both authors and...
Intel Centrino mobile technology connects without wires. The new Intel Centrino mobile technology allows users to work, play and connect without wires and choose from a whole new generation of thin an...
Biometrics based authentication is a potential candidate toreplace password-based authentication. Among all the biometrics, fingerprint based identification is one of the most mature and proven techni...
Wouldn’t you love to replace password based access control to avoid having to reset forgotten pa...
Remote Administration Trojans, also known as RATs are the most popular type of Trojans today. This type of Trojan allows the creator or who ever is using it to gain access to victims are there and pe...
Eye is one the most important organs of the body.The human eye is an organ which reacts to light for several purposes. The visual system in the brain is too slow to process information if the images a...
The most common computer authentication method is to use alphanumerical usernames and passwords. This method has been shown to have significant drawbacks. For example, users tend to pick passwords tha...
The enormous popularity of the World Wide Web in the early 1990's demonstrated the commercial potential of offering multimedia resources through the digital networks. Since commercial interests seek t...