Computer Science Seminar Topics for CSE with PPT


We provide a big collection of latest 2015-2016 Computer Science seminar topics and advanced research topics with PPT and abstract based on Technical IEEE Papers and journals on recent technologies for CSE, I.T, MCA, MS, B.E, B.Tech, MSc and BSc students. PPT's are provided at the end of each article for free download.

Video Based Human Interaction 4d Touchpad (4DT)

Computing is an integral part of our daily routines. However, despite numerous technological advances, how we interact with computers has changed little in the past few decades.Current systems use conventional input devices, such as a mouse, that require applications to define a complex, non- intuitive interaction language. This seminar present a video based platform for human-machine interfaces that provides functionality for robust, unencumbered interaction: ”The 4D Touchpad (4DT)”. The goal is direct interaction with interface components through intuitive actions and gestures based on visual interaction cue (VIC) paradigm.

Traffic Control In Linux Kernel

The aim of Traffic control in linux kernel includes Diffserv implementation for the Linux kernel.It is necessary to map the various management functions offered by the MIB to functions provided by the DiffServ implementation.This leads to the conclusion that conversion needs to be done before the MIB can be filled with values from the kernel (like counters), and that configuration information that is written into the MIB by a manager application need to be translated to the correct rtnetlink messages.

Quantum cryptography

Quantum cryptography is an emerging technology in which two parties can secure network communications by applying the phenomena of quantum physics. The security of these transmissions is based on the inviolability of the laws of quantum mechanics. The quantum cryptography relies on two important elements of quantum mechanics the Heisenberg Uncertainty principle and the principle of photon polarization. This report summarizes the current state of quantum cryptography, and the real world application environment and the future direction in which the technology is headed forwards. Go through the attached report for design and implementation. 

Face recognition

Face recognition with unknown, partial distortion and occlusion is a practical problem, and has a wide range of applications, including security and multimedia information retrieval. The authors present a new approach to face recognition subject to unknown, partial distortion and occlusion. The new approach is based on a probabilistic decision-based neural network, enhanced by a statistical method called the posterior union model (PUM).

EXT4 File System

Ext3 has been the most widely used general Linux file system for many years. In keeping with increasing disk capacities and state-of-the art feature requirements, the next generation of the ext3 filesystem, ext4, was created last year. This new filesystem incorporates scalability and performance enhancements for supporting large filesystems, while maintaining reliability and stability. Ext4 will suitable for a large variety of workloads and is expected to replace ext3 as the ”Linux filesystem”.

Cloud Computing

Cloud Computing is evolving as a key computing platform for sharing resources that include infrastructures, software, applications, and business processes. Virtualization is a core technology for enabling cloud resource sharing. However, most existing Cloud Computing platforms have not formally adopted the service-oriented architecture (SOA) that would make them more flexible, extensible, and reusable. By bridging the power of SOA and virtualization in the context of Cloud Computing ecosystem, this paper presents seven architectural principles and derives ten interconnected architectural modules to form a reusable and customizable Cloud Computing Open Architecture (CCOA).

Advanced Data Recovery

Data recovery refers to accessing logically or physically damaged data or over written data without the use any functioning backup. The advanced data recovery has two different methods where the first method - Part replacement deals with the recovery from physically and or logically damaged data. In case of physical and/or logical damage usually the drive electronics or the system information gets altered from the normal values setting these to the previous sates or replacing the electronics or system information with certain values that can be matched with almost all such values of any specific dive is enough to recover the data.

Novel 3D Graphical Password Schema

The aim of 3D password scheme is to propose and evaluate a new scheme of authentication. This scheme is based on a virtual three dimensional environment. Users navigate through the virtual environment and interact with items inside the virtual three dimensional environment. The combination of all interactions, actions and inputs towards the items and towards the virtual three dimensional environment constructs the user’s 3D password. The 3D password combines most existing authentication schemes such as textual passwords, graphical passwords, and biometrics into one virtual three dimensional environment. The 3D password’s main application is the protection of critical resources and systems.

GFARM Grid File System

GFARM (Global dependable virtual file system) file system is a next generation network shared file system, which will be an alternative solution of NFS, and will meet a demand for much larger, much reliable, and much faster file system. It is an Open Source distributed file system, generally used for large scale cluster.

B-Tree File System ( BTRFS )

The current file systems for Linux are facing a number of challenges with scaling to the large storage subsystems. File systems need to scale in their ability to address and manage large storage, and also in their ability to detect, repair and tolerate errors in the data stored on disk. BTRFS is a new copy on write file system for Linux aimed at implementing advanced features while focusing on fault tolerance, repair and easy administration. It is expected to be free of many of the limitations that other Linux file systems currently have. The extents approach used in BTRFS is more scalable and efficient than the 4k block approach of Ext3.

Popular Videos

How to speak to people

How to speak so that people want to listen.

Got a tip or Question?
Let us know