Computer engineering seminars topics collection. Download full computer engineering seminars in doc, pdf or ppt format.
Biometrics , which is formed from the two ancient Greek words bios and metron which mean life and measure respectively, refers to two very different fields of...
The GPS ( Global Positioning System ) is a “constellation” of 24 well-spaced satellites that orbit the Earth and make it po...
Credit Card Fraud Detection Project Report : Now a day the usage of credit cards has dramatically increased. As credit card becomes the most popular mode of payment for both online as well as regul...
Vehicle Management System is software which is helpful for bus operators, who wants to operate many bus trips in a day. Vehicle Management System is a window...
Biometric technologies are defined as automated methods of identifying or authenticating the identity of a living person based on unique physiological or beh...
The simplest definition of a neural network, more properly referred to as an 'artificial' neural network (ANN), is provided by the inventor of one of the first neurocomputers, Dr. Robert Hecht-Niel...
Anonymizing networks such as Tor allow users to access internet services privately by using a series of routers to hide the client’s IP address from the serv...
The understanding of crime is very paramount in the understanding of computer crime. Crime is a component of deviance, the other component being delinquency. Har...
A bank is a financial institution and a financial intermediary that accepts deposits and channels those deposits into lending activities, either directly by loaning or indirectly through capital ma...
Information technology has advanced greatly with the use of computers to perform different task, including Digital piracy which is an illegal duplication and distribution of copyrights of content t...
We’ve evolved over millions of years to sense the world around us. When we encounter something, someone or some place, we use our five natural senses which includes eye, ear, nose, tongue mind and...
Web design has moved to the next level with the introduction of java technology in the computing and programming industry. This introduction has made a tremendous impact in the capabilities and fun...
SMARTSHADER™ technology brings a new level of graphical effects to personal computers. It allows software developers to use techniques that, until recently, were only available to the creators of n...
Computer affects our life in a much bigger way then most of us might have thought. It has become a compulsory requirement in most professions to be able to use computer software. The first computer...
In most sensor networks the nodes are static. Nevertheless, node connectivity is subject to changes because of disruptions in wireless communication, transmission power changes, or loss of synchron...
Data recovery is the process of salvaging data from damaged, failed, corrupted, or inacce...
A Java Ring is a finger ring that contains a small microprocessor with built-in capabilities for the user. It contains an inexpensive microprocessor in a stainless steel i-button running a JVM and it...
A botnet is a network of compromised hosts that is under the control of a single, malicious entity, often called the botmaster. We present a system that aims to detect bot-infected machines, indepe...
Pervasive computing refers to embedding computers and communication in our environment. Pervasive computing provides an attractive vision for the future of computing. The idea behind ...
One of the hottest topics that emerged these days between the area of Internet and distributed computing and the area of operating system is Web Operating System (WOS). The objective of WOS is to d...