Computer Science Seminar Topics for CSE with PPT

We provide a big collection of latest 2015-2016 Computer Science seminar topics and advanced research topics with PPT and abstract based on Technical IEEE Papers and journals on recent technologies for CSE, I.T, MCA, MS, B.E, B.Tech, MSc and BSc students. PPT's are provided at the end of each article for free download.

Effective and Efficient memory Protection Using Dynamic Tainting

Illegal memory access(IMA) ia an important class of memory related faults. Currently free area "m", of required size is allocated. Starting address of m can be assigned to a pointer "p". Access to m is legal only if it is referenced by p or a pointer derived from p and access occur during the interval when p is valid. All other accesses are "Illegal Memory Accesses" or IMAs.

Compressed Sensing enabled video streaming for wireless multimedia sensor networks

In this presentation on Compressed Sensing enabled video streaming for wireless multimedia sensor networks we will look at a networked system for joint compression, rate control and error correction of video over resource constrained embedded devices. This theory is based on the theory of Compressed Sensing (CS). Solution to the problems such as encoder complexity and low resiliency to channel errors need to be addressed. Compressive Distortion Minimizing Rate Control, regulates the CS sampling rate, the data rate and the rate of a simple parity based channel encoder are the methods used to address this issue. 

Reading 1D Barcodes with Mobile Phones Using Deformable Templates

1D BARCODES are Optical machine readable representation of data relating to the objects. In barcodes data are represented by varying the widths and spacings of parallel lines. They are often referred as linear or one-dimensional (1D). This presentation looks in to Reading 1D Barcodes with Mobile Phones Using Deformable Templates. In a deformable template each digit of the barcode, averaging over the set of all expected deformations. The success in reading those templates depends on an accurate description of the shape class.

Applications of Artificial Intelligence in Safe Human Robot Interactions

This presentation discuss about the Integration of both Robots and Humans workspace. A new sensory system for modelling,tracking and predicting human motions within a Robot workspace is introduced. Our objective is to obtain a super quadric based model of human using SOM. Also assess the danger of the robot operations. A new reactive control scheme is introduced.

Person De-Identification in Videos

De-identification is a process to remove all identification information of the person from an image or video, while maintaining as much information on the action and its context. Recognition and de-identification process are opposite. Identifying information captured on video can include face, silhouette, posture and gait. This presentation on De-Identification discuss about general framework which protect the privacy of the individuals while providing sufficient feel for the human activities in the space being imaged. It is easy to hide the identity of individuals by replacing a conservative area around them by say, black pixels.

Motion Detail Preserving Optical Flow Estimation

Optical flow is the apparent motion of brightness patterns in the image. Ideally, optical flow would be the same as the motion field. The motion field is the projection into the image of three dimensional motion vectors. In conventional optical flow, Dominant Scheme - Coarse to Fine Warping Framework is used. The input image is represented as a tree of regions.

Controlling The Bit Rate Of Multi-object Videos With Non Cooperative Game Theory

This paper proposes an object-level rate control algorithm to jointly controlling the bit rates of multiple video objects. Utilizing non cooperative game theory, the proposed rate control algorithm mimics the behaviours of players representing video objects. Each player competes for available bits to optimize its visual quality. The algorithm finds an "optimal solution" in that it conforms to the mixed strategy Nash equilibrium, which is the probability distribution of the actions carried by the players that maximizes their expected payoffs (the number of bits).

Intra-Socket and Inter-Socket Communication in Multi-core Systems

The increasing computational and communication demands of the scientific and industrial communities require a clear understanding of the performance trade-off involved in multi-core computing platforms. Analysis can help application and toolkit developers in designing better, topology aware, communication primitives intended to suit the needs of various high end computing applications. We take on the challenge of designing and implementing a portable intra-core communication framework for streaming computing and evaluate its performance on some popular multi-core architectures developed by Intel, AMD and Sun.

Planning to do an MBA?
A quick all-in-one MBA entry manual for MBA Aspirants. Book covers
  • Possible MBA Tests & Exam Preparation
  • Tips to choose right program
  • Essay, Resume & Letter of Recommendation
  • MBA Interview Preparation
  • MBA Financial Planning
Price - 6.99$

Popular Videos

How to speak to people

How to speak so that people want to listen.

Got a tip or Question?
Let us know