Computer engineering seminars topics collection. Download full computer engineering seminars in doc, pdf or ppt format.
Air traffic control systems which is to minimize the risk of aircraft collisions while maximizing the number of aircraft that can fly safely at the same time. Aircraft pilots and their on-board flight crews work closely with controllers
The study is to point out the importance of incorporating fault tolerance measure to especially life critical system and provide proper solutions to system faults upon their occurrence and make the system more dependable by increasing its reliability.
A Digital library (also referred to as electronic library or digital repository) is a focused collection of digital objects that can include text, visual material, audio material, video material, stored as electronic media formats.
A digital library as an organized and focused collection of digital objects, including text, images, video and audio, with the methods of access and retrieval and for the selection, creation, organization, maintenance and sharing of collection.
An automatic parking system uses various methods to detect objects around the vehicle. Sensors installed on the front and rear bumpers can act as both a transmitter and a receiver. These sensors send a signal that will be reflected back
Mobile computing in means computing done by intermittently connected users who access network resources. It requires a wireless medium such as cellular radio, radio nets and low-orbit satellites. It is a major part of wireless communication technology.
Holographic memory is a three-dimensional data storage system that can stored information at high density inside the crystal or photopolymer. Hence holographic storage system has the potential to became the next storage generation.
Digital Steganography exploits the use of a host data to hide a piece of information in such away that it is imperceptible to a human observer. Wavelet transforms that map in..
Networks must be interconnected to cater to inter-organizational relationships. An interconnection network in a parallel machine transfers information from any source node to any desired destination node
Java technology today is good for general purpose computing and GUIs, but it was not ready for use with control systems like the software on the Rover. The Golden Gate project seeks to use RTSJ Real Time Specification for JAVA
This paper evaluates the hardware based random number generator (RNG) for use in cryptography application. The paper simulates the fastest and efficient algorithm towards the random number generator and the function generating 50% time different values.
All ventures into outer space, ranging from exploratory fly-bys to managed flights, have first been tried out of the moon. Like in most other areas, space research is also moving into larger-scale simulations using powerful computers
Hamming Cut Matching Algorithm algorithm which reduces the comparison time for matching the iris code with database so that we can use iris recognition in case of huge databases like voting system
Parasitic computing is programming technique where a program in normal authorized interactions with another program manages to get the other program to perform computations of a complex nature. Parasitic computing moves computation onto what is logically
A smart card, a type of chip card is a plastic card embedded with a computer chip that stores and transacts data between users. The card data is transferred via a reader that is part of a computing system.
SmartQuill is slightly larger than an ordinary fountain pen. Users can enter information into these applications by pushing a button on the pen and writing down what they would like to enter .The SmartQuill does not need a screen to work
In a telephone network, a wireless local loop (WLL) is a generic term for an access system that uses a wireless link to connect subscribers to their local exchange in place of conventional copper cable. Using a wireless link shortens
“Virtual Reality is a way for humans to visualize, manipulate and interact with computers and extremely complex data”. Virtual Reality (VR), sometimes called Virtual Environments (VE) has drawn much attention in the last few years.
Wi-Fi short for “wireless fidelity”—is the commercial name for the 802.11 products that have flooded the corporate wireless local area network (WLAN) market and are becoming rapidly ingrained in our daily lives via public hotspots.
The mind-reading computer system presents information about your mental state as easily as a keyboard and mouse present text and commands. Imagine a future where we are surrounded with mobile phones, cars and online services