Computer engineering seminars topics collection. Download full computer engineering seminars in doc, pdf or ppt format.
Parallel machines are becoming quite common and affordable Prices of microprocessors, memory and disks have dropped sharply Recent desktop computers feature multipl...
What is hacking? Hacking is unauthorized use of computer and network resources. (The term "hacker" originally meant a very gifted programmer. In recent years though, with easier access...
CYBORG, a compound word derived from cybernetics and organism, is a term coined by Manfred Clynes in 1960 to describe the need for mankind to artificially enhance biological functions in order to s...
Preparing a data set for analysis is generally the most time consuming task in a data mining project, requiring many complex SQL queries, joining tables and aggregating columns. Existing SQL aggreg...
A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). Some of the data is leaked and found in an unauthorized place (e.g., on the web or somebody’s la...
iCloud is the latest branding of Apple's cloud computing services. It has previously been branded as iTools in 2000, .Mac in 2002, and MobileMe in 2008.iCloud was announced on June 6, 2011, at the...
The system creates a standalone system that enables a store to schedule its items purchase operations based on the daily update of sales from its customers. Once the sales figures of items reaches...
This Document provides an overview of the multimedia broadcast/multicast service (MBMS) for universal mobile telecommunications system (UMTS) networks. We first outline the features of UMTS network...
Genetic algorithms are stochastic search algorithms, which act on a population of possible solutions. They are loosely based on the mechanics of population genetics and selection. The potential sol...
Computing is now not limited to desktops and laptops, it has found its way into mobile devices like palm tops and even cell phones. But what has not changed for the last 50 or so old years is the Q...
Data mining is defined as sifting through very large amounts of data for useful information. Some of the most important and popular data mining techniques are association rules, classification, clu...
In present digitalized world, the exploit of GSM and SMS is popular. Notice Board is primary thing in any institution / organization or public utility places like bus stations, railway stations and...
Current authentication systems suffer from many weaknesses. Textual passwords are commonly used; however, users do not follow their requirements. Users tend to choose meaningful words fro...
According to Microsoft, "ASP.NET is a technology for building powerful, dynamic Web applications and is part of the .NET Framework" .NET is language independent, which means you can use any ....
E-Banking or electronic banking is A major innovation in the field of banking E-Banking is a facility under which the customers can perform basic banking transaction electronically, round the clock...
The paper presents Global Discovery Service (GDS), configuration and deployment tools for Grid infrastructure and advanced monitoring services implemented with JMX technology. The GDS service is de...
The popularity of mobile computing and communications devices can be traced to their ability to deliver information to users when needed. Users want ubiquitous access to information and application...
Search Engine has become a major tool for searching any information from the World Wide Web (WWW). While searching the huge digital library available in the WWW, every effort is made to retrieve th...
There is no universally accepted definition of ANN. But perhaps most people in the field would agree that ANN is a network of many simple processors, each possibly having a small amount of local me...
“Steganography†is a Greek origin word which means “hidden writingâ€. Steganography word is classified into two parts: Steganos which means “secret or covered†(where you want...