Computer Science Seminar Topics for CSE with PPT

We provide a big collection of latest 2015-2016 Computer Science seminar topics and advanced research topics with PPT and abstract based on Technical IEEE Papers and journals on recent technologies for CSE, I.T, MCA, MS, B.E, B.Tech, MSc and BSc students. PPT's are provided at the end of each article for free download.

A Probabilistic Generative Model for Mining Cyber Criminal Networks from Online Social Media

Illegal or immoral use of the computer or its resources is cyber crime. It includes unauthorized access to private pages, stealing credit card information, piracy etc. As the cyber crimes are increasing day by day, it's affecting the industry on a large scale. Existing Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), and anti-malware system rely on low level network traffic features on program code signatures to detect cyber attacks. However, since hackers can constantly change their attack tactics by, it is extremely difficult for the existing security solutions to detect cyber attacks.

Portable Camera-Based Assistive Text and Product Label Reading From Hand-Held Objects for Blind Persons

Reading is obviously essential in today’s society. Printed text is everywhere in the form of reports, receipts, bank statements, on medicine bottles, etc. Optical aids, video magnifiers, and screen readers can help blind users and those with low vision to access documents. There are few devices that can provide good access to common hand-held objects such as product packages, and objects printed with text such as prescription medication bottle. One of the devices we are going to discuss in this computer science seminar topic is Portable Camera-Based Assistive Text and Product Label Reading From Hand-Held Objects for Blind Persons.

FOG Computing (EDGE Computing) And Its Applications In Internet Of Things

Fog computing is a paradigm which extends cloud computing paradigm to the edge of the network. Terms Edge Computing and Fog Computing are often used interchangeably. Similar to Cloud, Fog provides data, compute, storage, and application services to end-users. This enables new breed of applications and services.

NICE : Network Intrusion detection and Counter measure selection in virtual network systems

NICE (Network Intrusion detection and Counter measure) is a new multiphase distributed network intrusion detection and prevention framework in a virtual networking environment that captures and inspects suspicious cloud traffic without interrupting users applications and cloud services. Cloud security is one of most important issues that has attracted a lot of research and development effort in past few years. In traditional data centres, where system administrators have full control over the host machines, vulnerabilities can be detected and patched by the system administrator in a centralized manner. However, patching known security holes in cloud data centres, where cloud users usually have the privilege to control software installed on their managed VM's, may not work effectively and can violate the service level agreement (SLA).

Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis

Nowadays, internet miscreant and cyber criminals are increasing a lot and detecting and stopping them has become a serious issue. Malicious flux networks have recently started to thrive. Malicious flux networks are a type a illegitimate content delivery networks(CDNs).These types of networks are set up using fast flux domain names i.e, the set of resolved IP addresses associated to these networks change frequently,often after each DNS query, thereby making it difficult to detect them. To make it even more complicated, these set of resolved set of IP addresses,also known as flux agents, are spread across many different networks.

Mining Web Graphs for Recommendations

Recommendations on the Web is a general term representing a specific type of information filtering technique that attempts to present information items (queries, movies, images, books, Web pages, etc.) that are likely of interest to the users. With the diverse and explosive growth of Web information, how to organize and utilize the information effectively and efficiently has become more and more critical. This is especially important for Web 2.0 related applications since user generated information is more freestyle and less structured, which increases the difficulties in mining useful information from these data sources. In order to satisfy the information needs of Web users and improve the user experience in many Web applications, Recommender Systems.

Message Queue Telemetry Transport - MQTT

Internet of things refers to uniquely identifiable objects and the representation of these physical objects in a virtual form in an Internet like structure. The number of things that get added to the network are increasing day by day. These connected devices are bound to reach 50 billion by 2020. MQTT or Message Queue Telemetry Transport is an Internet Of Things protocol for machine to machine communication. The protocol was invented by Andy Stanford-Clark of IBM, and Arlen Nipper of Cirrus Link Solutions.

Efficient Processing of Semantic Web Queries in Hbase and MySQL Cluster

Machine interpretable semantic descriptions are enhancing various computing and data resources on the Web to make it easier to search, discover, and integrate data. This interconnected metadata constitutes the Semantic Web, whose main principles, languages, frameworks, and best practices are set by the World Wide Web Consortium.

Liquid: A Scalable Deduplication File System for Virtual Machine Images

CSE Seminar Topic on Liquid. Virtualization is becoming widely deployed in servers to efficiently provide many logically separate execution environments while reducing the need for physical servers. A virtual machine is a mechanism to run multiple operating systems on a single computer system. With its rich set of features it forms an important and crucial component in cloud computing. Virtual Machine image storage is a challenging problem and issues like performance, deduplication, resiliency. 

Zero-hop Distributed Hash Table - ZHT

DHT or distributed hash table is a powerful data structure used in distributed systems. The nodes in a distributed system form a distributed  data structure. Key-values mappings are distributed among the nodes such that a change in the set of participants causes a minimal amount of disruption. Distributed storage systems have grown several times in their capacity and bandwidth. Managing metadata in a storage system for high end computing is critical. ZHT or zero hop distributed hash table was built for high end computing systems with the goal of delivering excellent availability, fault tolerance, high throughput, and low latencies.

Popular Videos

How to Overcome Shyness in Communication

How to Overcome Shyness in Communication using 4 Simple Steps.

Got a tip or Question?
Let us know