Computer Science Seminar Topics for CSE, I.T

We provide a big list of latest 2013-2014 Computer Science Seminar Topics, Essay Topics, Presentation Topics, Speech Ideas and Advanced Research Topics with PPT and abstract based on Technical IEEE Papers and latest technologies for Computer Science (CSE), MCA, Information Technology (I.T) and BSc students with free download. Presentations are provided at the end of each article.

FOG Computing (EDGE Computing) And Its Applications In Internet Of Things

   


Fog computing is a paradigm which extends cloud computing paradigm to the edge of the network. Terms Edge Computing and Fog Computing are often used interchangeably. Similar to Cloud, Fog provides data, compute, storage, and application services to end-users. This enables new breed of applications and services.

NICE : Network Intrusion detection and Counter measure selection in virtual network systems

   


NICE (Network Intrusion detection and Counter measure) is a new multiphase distributed network intrusion detection and prevention framework in a virtual networking environment that captures and inspects suspicious cloud traffic without interrupting users applications and cloud services. Cloud security is one of most important issues that has attracted a lot of research and development effort in past few years. In traditional data centres, where system administrators have full control over the host machines, vulnerabilities can be detected and patched by the system administrator in a centralized manner. However, patching known security holes in cloud data centres, where cloud users usually have the privilege to control software installed on their managed VM's, may not work effectively and can violate the service level agreement (SLA).

Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis

   


Nowadays, internet miscreant and cyber criminals are increasing a lot and detecting and stopping them has become a serious issue. Malicious flux networks have recently started to thrive. Malicious flux networks are a type a illegitimate content delivery networks(CDNs).These types of networks are set up using fast flux domain names i.e, the set of resolved IP addresses associated to these networks change frequently,often after each DNS query, thereby making it difficult to detect them. To make it even more complicated, these set of resolved set of IP addresses,also known as flux agents, are spread across many different networks.

Mining Web Graphs for Recommendations

   


Recommendations on the Web is a general term representing a specific type of information filtering technique that attempts to present information items (queries, movies, images, books, Web pages, etc.) that are likely of interest to the users. With the diverse and explosive growth of Web information, how to organize and utilize the information effectively and efficiently has become more and more critical. This is especially important for Web 2.0 related applications since user generated information is more freestyle and less structured, which increases the difficulties in mining useful information from these data sources. In order to satisfy the information needs of Web users and improve the user experience in many Web applications, Recommender Systems.

Message Queue Telemetry Transport - MQTT

   


Internet of things refers to uniquely identifiable objects and the representation of these physical objects in a virtual form in an Internet like structure. The number of things that get added to the network are increasing day by day. These connected devices are bound to reach 50 billion by 2020. MQTT or Message Queue Telemetry Transport is an Internet Of Things protocol for machine to machine communication. The protocol was invented by Andy Stanford-Clark of IBM, and Arlen Nipper of Cirrus Link Solutions.

Efficient Processing of Semantic Web Queries in Hbase and MySQL Cluster

   


Machine interpretable semantic descriptions are enhancing various computing and data resources on the Web to make it easier to search, discover, and integrate data. This interconnected metadata constitutes the Semantic Web, whose main principles, languages, frameworks, and best practices are set by the World Wide Web Consortium. The W3Cs metadata acquisition languages include the Resource Description Framework (RDF), RDF in attributes, the RDF Schema, and the Web Ontology Language (OWL), which government, academia, and industry have embraced for capturing and sharing metadata. As a result, new data-intensive, semantics-enabled applications require the efficient management of RDF data. Many researchers have proposed using relational databases to store and query large RDF datasets. Such systems, called relational RDF stores are now in production.

Liquid: A Scalable Deduplication File System for Virtual Machine Images

   


CSE Seminar Topic on Liquid. Virtualization is becoming widely deployed in servers to efficiently provide many logically separate execution environments while reducing the need for physical servers. A virtual machine is a mechanism to run multiple operating systems on a single computer system. With its rich set of features it forms an important and crucial component in cloud computing. Virtual Machine image storage is a challenging problem and issues like performance, deduplication, resiliency. 

Zero-hop Distributed Hash Table - ZHT

   


DHT or distributed hash table is a powerful data structure used in distributed systems. The nodes in a distributed system form a distributed  data structure. Key-values mappings are distributed among the nodes such that a change in the set of participants causes a minimal amount of disruption. Distributed storage systems have grown several times in their capacity and bandwidth. Managing metadata in a storage system for high end computing is critical. ZHT or zero hop distributed hash table was built for high end computing systems with the goal of delivering excellent availability, fault tolerance, high throughput, and low latencies.

NETCONF AND YANG - Seminar on network configuration

   


Network element configuration, information retrieval and event notification are the major tasks in network management. Network configurations were till now done using either the command line interface or SNMP or CORBA. NETCONF or network configuration protocol (RFC 6241) came as an alternative and more preferred mechanism for network configuration. It provides a document oriented (XML/YANG) approach to configure and retrieve network element configuration. It also provides locking mechanism.

Blind Authentication: A Secure Crypto-biometric verification Protocol

   


A biometric is a physiological or behavioural characteristic of a human being that can distinguish one person from another and that theoretically can be used for identification or verification of identity. Different biometrics systems are Physiological Biometrics and Behavioural Biometrics.