Paper Presentation Topics for CSE

Students of Computer Science Engineering must present papers when undertaking this discipline. Computer Science essentially deals with scientific study of computers, its uses in computation and data processing, advanced algorithmic properties, systems control, artificial intelligence etc. The students enrolled for computer science engineering learn programming, design and analysis of theories relating to computers and different application-based software.

100 Paper Presentation Topics for CSE Students | Major Walter Nowotny
  1. Artificial Intelligence in Machine refers to the intelligence of machines and the branch of computer science that aims to create it
  2. Aspect-oriented programming (AOP) is a programming paradigm in which secondary or supporting functions are isolated from the main program’s business logic
  3. ATM networks refer to a computerized telecommunications device that provides the clients of a financial institution with access to financial transactions in a public space without the need for a cashier, human clerk or bank teller.
  4. Augmented Reality: refers to a direct or indirect view of a physical real-world environment whose elements are merged with virtual computer-generated imagery – creating a mixed reality.
  5. Authentication and Key Agreement (AKA) refers to a security protocol used in 3G networks.
  6. Automatic number plate recognition
  7. Autonomic Computing
  8. Auto-pilots
  9. Backup and Recovery planning
  10. Cluster computing
  11. Clustering
  12. Computational Intelligence and Linguistics
  13. Computational neuroscience
  14. Content Management Systems
  15. Co-operative LINUX
  16. Cross Platform Component Object Model
  17. Data Mining and Data Warehousing
  18. Data Mining concepts & Models
  19. Data over Cable System (DOCSIS)
  20. Data Warehouse
  21. Embedded Configurable Operating system
  22. Embedded Linux
  23. Software model checking
  24. Software Testing & Quality Assurance
  25. Split Range Synchronization
  26. Stealth Virus
  27. Embedded systems and vlsi an architectural approach to reduce leakage energy in memory
  28. Embedded web server for remote access
  29. MANET – The Art of Networking without a Network
  30. Media gateways
  31. Detection of Reviews using Sentiment analysis: deals with finding a positive review from thousands of reviews
  32. Mesh Based Geometric data processing
  33. Micro chip production using extreme UV lithography
  34. Micro Total analysis systems
  35. Microcontroller Based Automation
  36. Microcontroller Based Power Theft Identification
  37. Digital Jewelry: Digital jewelry can best be defined as wireless, wearable computers that allow you to communicate by ways of e-mail, voicemail, and voice communication.
  38. Database Migration
  39. Earth Simulator- Fastest Supercomputer
  40. Elliptical Curve Cryptography(ECC)
  41. Multimedia Broadcasting via Satellite
  42. New Dimension of Data Security using Neural Networks
  43. Night Vision Technology
  44. Nonvolatile Flash Memory
  45. 5 Pen PC Technology is a gadget package including five functions: a pen-style cellular phone with a handwriting data input function, virtual keyboard, a very small projector, camera scanner, and personal ID key with cashless pass function.
  46. Object oriented technologies
  47. Online software Distribution
  48. Static Random Access Memory refers to a type of semiconductor memory that uses bistable latching circuitry (Flip-flop) to store each bit.
  49. Multimedia-oriented web based instructional system
  50. Multiple clients communication
  51. Multiple Domain Orientation
  52. Wireless Advanced Flight Systems Aircraft Monitoring System
  53. Vehicle Speed Sensing and Smoke Detecting System
  54. Time Complexity: In computer science, the time complexity of an algorithm quantifies the amount of time taken by an algorithm to run as a function of the size of the input to the problem.
  55. Intelligent Fire Sprinkler System
  56. Search Engine Optimization
  57. Cyber Crime refers to anything done in the cyber space with a criminal intent.
  58. Search for extra terrestrial intelligence using satellite communication
  59. Secure Computing
  60. The Generic Access Network or GAN refers to a wireless communication system were the mobile phone sets functions seamlessly between WANs or Wide Area Networks and LANs or Local Area Networks. With this technology, the cell phone subscriber is able to communicate by data, voice and multimedia.
  61. Secure Socket Layer (SSL)
  62. Web Mining: Web mining is the use of data mining techniques to automatically extract knowledge from Web content, structure and services.
  63. Optical Disc Data Security
  64. Optical networking
  65. Personal Mass Media Blogging, Syndication, Podcasting, and Vidcasting
  66. Personal Satellite assistant Systems
  67. Pervasive computing
  68. Radio-frequency identification (RFID) is a technology that uses communication via radio waves to exchange data between a reader and an electronic tag attached to an object, for the purpose of identification and tracking.
  69. Secured web portal for online shopping
  70. Wireless integrated network sensors provide a new monitoring and control capability for transportation, manufacturing, health care, environmental monitoring and safety and security.
  71. Palm Vein Technology: An individual’s palm vein image is converted by algorithms into data points, which is then compressed, encrypted, and stored by the software and registered along with the other details in his profile as a reference for future comparison.
  72. Brain chips: Brain chips are made with a view to enhance the memory of human beings, to help paralyzed patients, and are also intended to serve military purposes.
  73. VoIP in mobile phones
  74. Mobile Adhoc Network
  75. Network Security
  76. CDMA & Blue Tooth Technology
  77. Software Testing & Quality Assurance
  78. Cloud Computing: Cloud computing promises to change the way people make use of computing resources. Using the Internet as the backbone, cloud computing claims to provide computing as a “utility” to end users “as and when needed” basis.
  79. Mobile Number Portability requires that mobile telephone customers can keep their telephone number-including the prefix-when switching from one provider of mobile telecommunications services to another.
  80. 5G Wireless Systems is a name used in some research papers and projects to denote the next major phase of mobile telecommunications standards beyond the upcoming 4G standards.
  81. Airborne Internet will not be totally wireless; but will contain the ground-based components to any type of airborne Internet network. This means that consumers will have to install an antenna on their home or business in order to receive signals from the network hub overhead.
  82. Google Chrome OS is a Linux operating system designed by Google to work exclusively with web applications. It is intended to focus on Web applications while running a fast and simple interface, based off Google’s existing Chrome browser.
  83. Image processing in computer vision
  84. Pervasive computing
  85. Distributed and parallel systems
  86. Embedded Systems
  87. Software quality assurance
  88. Business Intelligence ERP
  89. Grid Computing
  90. Artificial Neural Networks
  91. Cyborgs
  92. Object oriented technologies
  93. Advanced Databases
  94. Image processing and applications
  95. Mobile Networking
  96. Natural Language Processor
  97. Grid Computing
  98. Artificial Neural Networks
  99. Business Intelligence ERP
  100. Motion Extraction Techniques Based Identifying the Level of Perception Power from Video