Computer engineering seminars topics collection. Download full computer engineering seminars in doc, pdf or ppt format.
Wearable computer comprises of a computer built within an ordinary clothing. This transformation allows it to be worn constantly, with the goal of becoming a seamless extens...
Computers have revolutionized the field of education. The rise of internet has made computers a real knowledge bank providing distant education, corporate access etc. But the task of computers in edu...
ICT and Bridging Digital Divide Bridging the digital divide initiatives’ between urban and rural in Malaysia have been significant since rise of Information Technology revolution around the entire...
Data compression is the technique of converting an input data stream or the original data into another data stream which is shorter in length. There are many known...
Neural networks, as used in artificial intelligence, have traditionally been viewed as simplified models of neural processing in the brain, even though the relation between this model and brain bio...
Automatic number plate recognition is a mass surveillance method that uses optical character recognition on images to read the licence plates on vehicles. As of 2006, systems can scan number plates at...
Human brain, the most valuable creation of God. The man is called intelligent because of the brain .Today we are developed because we can think, that other animals can not do .But we loss the knowled...
The demand for making air traveling more 'pleasant, secure and productive for passengers is one of the winning factors for airlines and aircraft industry. Current trends are towards high data rate com...
Analog And Digital System Analog System: A string tied to a doorknob would be an analog system. They have a value that changes steadily over time and can have any one of an infinite se...
A mobile operating system, also referred to as mobile OS, is the operating system that operates a Smartphone, tablet, PDA, or other digital mobile devices. Modern mobile operating systems combine t...
Virus attacks and intrusion attempts have been causing lots of troubles and serious damages to almost all the computer users. Ever the day, one starts using a computer, virus infection becomes an issu...
Artificial intelligence (AI) is defined as intelligence exhibited by an artificial entity. Such a system is generally assumed to be a computer. Although AI has a strong science fiction connotation, it...
BARCODE is a method of automatic identification & data collection, also known as the “Universal Product Code†(UPC). BARCODE is use the Binary System for coding & decoding. It has the series of ba...
A computer program that causes it to be classified as a virus is not its ability to destroy data, but its ability to gain control of the computer and make a fully functional copy of itself. Not all co...
Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers, sending a vCard which typically contains a message in th...
The U.S. computer giant,IBM has been conducting research on the Blue Eyes technology at its Almaden Research Center (ARC) in San Jose, Calif., since 1997. The ARC is IBM's main laboratory for basic re...
The communications capability of devices and continuous transparent information routes are indispensable components of future oriented automation concepts. Communication is increasing rapidly in in...
Self-Reconfigurable modular robotics represents a new approach to robotic hardware. Instead of designing a new and different mechanical robot for each task, a generic “robot†is composed of many s...
BrainGate is a brain implant system developed by the bio-tech company Cyberkinetics in 2003 in conjunction with the Department of Neuroscience at Brown University. The device was designed to help tho...
The two most important phenomena impacting telecommunications over the past decade have been explosive parallel growth of both the internet and mobile telephone services. The internet brought the bene...