Students of Computer Science Engineering must present papers when undertaking this discipline. Computer Science essentially deals with scientific study of computers, its uses in computation and data processing, advanced algorithmic properties, systems control, artificial intelligence etc. The students enrolled for computer science engineering learn programming, design and analysis of theories relating to computers and different application-based software.
- Artificial Intelligence in Machine refers to the intelligence of machines and the branch of computer science that aims to create it
- Aspect-oriented programming (AOP) is a programming paradigm in which secondary or supporting functions are isolated from the main program’s business logic
- ATM networks refer to a computerized telecommunications device that provides the clients of a financial institution with access to financial transactions in a public space without the need for a cashier, human clerk or bank teller.
- Augmented Reality: refers to a direct or indirect view of a physical real-world environment whose elements are merged with virtual computer-generated imagery – creating a mixed reality.
- Authentication and Key Agreement (AKA) refers to a security protocol used in 3G networks.
- Automatic number plate recognition
- Autonomic Computing
- Auto-pilots
- Backup and Recovery planning
- Cluster computing
- Clustering
- Computational Intelligence and Linguistics
- Computational neuroscience
- Content Management Systems
- Co-operative LINUX
- Cross Platform Component Object Model
- Data Mining and Data Warehousing
- Data Mining concepts & Models
- Data over Cable System (DOCSIS)
- Data Warehouse
- Embedded Configurable Operating system
- Embedded Linux
- Software model checking
- Software Testing & Quality Assurance
- Split Range Synchronization
- Stealth Virus
- Embedded systems and vlsi an architectural approach to reduce leakage energy in memory
- Embedded web server for remote access
- MANET – The Art of Networking without a Network
- Media gateways
- Detection of Reviews using Sentiment analysis: deals with finding a positive review from thousands of reviews
- Mesh Based Geometric data processing
- Micro chip production using extreme UV lithography
- Micro Total analysis systems
- Microcontroller Based Automation
- Microcontroller Based Power Theft Identification
- Digital Jewelry: Digital jewelry can best be defined as wireless, wearable computers that allow you to communicate by ways of e-mail, voicemail, and voice communication.
- Database Migration
- Earth Simulator- Fastest Supercomputer
- Elliptical Curve Cryptography(ECC)
- Multimedia Broadcasting via Satellite
- New Dimension of Data Security using Neural Networks
- Night Vision Technology
- Nonvolatile Flash Memory
- 5 Pen PC Technology is a gadget package including five functions: a pen-style cellular phone with a handwriting data input function, virtual keyboard, a very small projector, camera scanner, and personal ID key with cashless pass function.
- Object oriented technologies
- Online software Distribution
- Static Random Access Memory refers to a type of semiconductor memory that uses bistable latching circuitry (Flip-flop) to store each bit.
- Multimedia-oriented web based instructional system
- Multiple clients communication
- Multiple Domain Orientation
- Wireless Advanced Flight Systems Aircraft Monitoring System
- Vehicle Speed Sensing and Smoke Detecting System
- Time Complexity: In computer science, the time complexity of an algorithm quantifies the amount of time taken by an algorithm to run as a function of the size of the input to the problem.
- Intelligent Fire Sprinkler System
- Search Engine Optimization
- Cyber Crime refers to anything done in the cyber space with a criminal intent.
- Search for extra terrestrial intelligence using satellite communication
- Secure Computing
- The Generic Access Network or GAN refers to a wireless communication system were the mobile phone sets functions seamlessly between WANs or Wide Area Networks and LANs or Local Area Networks. With this technology, the cell phone subscriber is able to communicate by data, voice and multimedia.
- Secure Socket Layer (SSL)
- Web Mining: Web mining is the use of data mining techniques to automatically extract knowledge from Web content, structure and services.
- Optical Disc Data Security
- Optical networking
- Personal Mass Media Blogging, Syndication, Podcasting, and Vidcasting
- Personal Satellite assistant Systems
- Pervasive computing
- Radio-frequency identification (RFID) is a technology that uses communication via radio waves to exchange data between a reader and an electronic tag attached to an object, for the purpose of identification and tracking.
- Secured web portal for online shopping
- Wireless integrated network sensors provide a new monitoring and control capability for transportation, manufacturing, health care, environmental monitoring and safety and security.
- Palm Vein Technology: An individual’s palm vein image is converted by algorithms into data points, which is then compressed, encrypted, and stored by the software and registered along with the other details in his profile as a reference for future comparison.
- Brain chips: Brain chips are made with a view to enhance the memory of human beings, to help paralyzed patients, and are also intended to serve military purposes.
- VoIP in mobile phones
- Mobile Adhoc Network
- Network Security
- CDMA & Blue Tooth Technology
- Software Testing & Quality Assurance
- Cloud Computing: Cloud computing promises to change the way people make use of computing resources. Using the Internet as the backbone, cloud computing claims to provide computing as a “utility” to end users “as and when needed” basis.
- Mobile Number Portability requires that mobile telephone customers can keep their telephone number-including the prefix-when switching from one provider of mobile telecommunications services to another.
- 5G Wireless Systems is a name used in some research papers and projects to denote the next major phase of mobile telecommunications standards beyond the upcoming 4G standards.
- Airborne Internet will not be totally wireless; but will contain the ground-based components to any type of airborne Internet network. This means that consumers will have to install an antenna on their home or business in order to receive signals from the network hub overhead.
- Google Chrome OS is a Linux operating system designed by Google to work exclusively with web applications. It is intended to focus on Web applications while running a fast and simple interface, based off Google’s existing Chrome browser.
- Image processing in computer vision
- Pervasive computing
- Distributed and parallel systems
- Embedded Systems
- Software quality assurance
- Business Intelligence ERP
- Grid Computing
- Artificial Neural Networks
- Cyborgs
- Object oriented technologies
- Advanced Databases
- Image processing and applications
- Mobile Networking
- Natural Language Processor
- Grid Computing
- Artificial Neural Networks
- Business Intelligence ERP
- Motion Extraction Techniques Based Identifying the Level of Perception Power from Video