0% found this document useful (0 votes)
13 views

Seminar Circular

The document is a circular from the Department of Computer Science and Engineering informing 7th semester students to submit seminar synopses by December 23rd. It includes a list of 181 previous seminar topics that will not be considered.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views

Seminar Circular

The document is a circular from the Department of Computer Science and Engineering informing 7th semester students to submit seminar synopses by December 23rd. It includes a list of 181 previous seminar topics that will not be considered.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

K. L. E.

SOCIETY’S
K. L. E. INSTITUTE OF TECHNOLOGY,
Opp. Airport, Gokul, Hubballi-580 030
Department Of Computer Science and Engineering
K.L.E.S.

Circular
Date :15/12/2023

All 7th semester students are hereby informed to submit seminar


synopsis on or before 23-12-2023 for Technical Seminar (18CSS84)
duly signed by respective seminar guides (Project guides) after
discussion with guide. The seminars presented in previous year are not
considered. The previous year seminar topics list is attached with this
circular.

Dr. Vishwanath S. Kamatar


Seminar Coordinator
K. L. E. SOCIETY’S
K. L. E. INSTITUTE OF TECHNOLOGY,
Opp. Airport, Gokul, Hubballi-580 030
Department Of Computer Science and Engineering
K.L.E.S.

Sl no SEMINAR TOPIC
1 NETWORK BASED ATTACK
2 ADVANCES IN SMART FABRICS
CHALLENGES AND COUNTERMEASURES FOR
ADVERSARIAL ATTACKS ON DEEP
3 REINFORCEMENT LEARNING
4 GRAPH LEARNING
5 RULE BASED DATA MINING
6 COUNCILED WEPON DETECTION USEING DIP
7 BITBUCKET
8 QUANTUM CRYPTOGRAPHY
INTRUSION DETECTION SYSTEM BASED ON
INTEGRATED SYSTEM CALLS GRAPH AND
9 NEURAL NETWORKS
10 EXTRUSION BIOPRINTING
SINGLE PHOTON EMISSION COMPUTED
11 TOMOGRAPHY
12 DECAS
13 INVISIBLE CLOAK
14 DEEP WEB
15 EMOTION DETECTION USING SPEECH.
16 AI TRISM
ADVERSARIAL TRAINING IN MACHINE
17 LEARNING
18 PAGE RANK ALGORITHM
19 CLAYODOR
20 HAPTIC TECHNOLOGY
21 XENOBOTS 3.0
22 NVIDIA TEGRA SUPERCOMPUTER
23 EXASCALE COMPUTING
24 WEB3 GAMING
25 AUTOML
26 AUTOMATED MACHINE LEARNING(AUTOML)
27 METAVERSE
28 NO CODE LOW CODE IN MACHINE LEARNING
29 CIRQ
30 QUANTUM MACHINE LEARNING
IDMA THE FUTURE OF WIRELESS
31 TECHNOLOGY
32 MULTI FACTOR AUTHENTICATION SYSTEM
33 CAFFE: DEEP LEARNING FRAMEWORK
34 FEDERATED LEARNING
35 NO-CODE/LOW-CODE(MENDIX)
36 SPIKING NEURAL NETWORK(SNN)
37 GREEN CLOUD COMPUTING
K. L. E. SOCIETY’S
K. L. E. INSTITUTE OF TECHNOLOGY,
Opp. Airport, Gokul, Hubballi-580 030
Department Of Computer Science and Engineering
K.L.E.S.

38 SATRACK
39 META LEARNING
40 MULTI VIEW CLUSTERING
41 DIGITAL ASSET MANAGEMENT
42 DIGITAL THERAPEUTICS
43 HONEY POT
AI AND THE FUTURE OF CYBER
44 COMPETITION
45 OPENAI GPT-3
46 GEOSPATIAL ARTIFICIAL INTELLIGENCE
47 EYE GAZE COMMUNICATION SYSTEM
CLOUD CLOTHING BASED ON RFID
48 TECHNOLOGY
OPTICAL CHARACTER RECOGNITION USING
49 RPA
EYE MOVEMENT BASED HUMAN COMPUTER
50 INTERACTION TECHNIQUES
51 SNOWFLAKE DATA WAREHOUSE
52 WEB DATA EXTRACTION USING RPA
53 RULE BASED CLASSIFICATION
54 ADVANCED PERSISTENT THREAT (APT)
55 CRYPTOGRAPHY IN GSM
FOG BANK OF VEHICLES FOR NEXT-
56 GENERATION CONNECTED TRAFFIC
AN INTELLIGENT COGNITIVE INSPIRED
57 COMPUTING FOR SENTIMENT ANALYSIS
58 DEEPFAKES
59 SIGN LANGUAGE RECOGNITION
3 TIERS ARCHITECTURE FOR MOBILE
60 COMMUNICATION
61 ANONYMITY TO PROVIDE SECURITY
62 AUTONOMOUS VEHICLE IN 5G AND BEYOND
63 GENOMICS TECHNOLOGY
INDUCTIVE LEARNING IN ARTIFICIAL
64 INTELLIGENCE
ROS-ETHEREUM: A CONVENIENT TOOL TO
65 BRIDGE ROS AND BLOCKCHAIN (ETHEREUM)
SELF SUPERVISED REPRESENTATION
66 LEARNING
67 DALLE-2
68 AUTONOMIC COMPUTING
69 PHOTONICS
70 IMAGE RESTORATION/REGENERATION
71 TOR BROWSER
72 GOOGLE FILE SYSTEM
CI/CD PIPELINING FOR EFFICIENT SOFTWARE
73 DEVELOPMENT AND DEPLOYMENT
74 SECURITY AS A SERVICE
75 SCREENLESS DISPLAY TECHNOLOGY
K. L. E. SOCIETY’S
K. L. E. INSTITUTE OF TECHNOLOGY,
Opp. Airport, Gokul, Hubballi-580 030
Department Of Computer Science and Engineering
K.L.E.S.

76 SCALED AGILE FRAMEWORK (SAFE)


77 THYMELEAF
78 INTELLIGENT PROCESS AUTOMATION (IPA)
WEB APPLICATION VULNERABILITIES
79 (OWASP)
80 SPLUNK
81 YOLO ALGORITHM
82 MEMBRANE COMPUTING
83 UNSUPERVISED VIDEO SUMMARIZATION
NANITE AND METAHUMAN CREATOR IN
84 UNREAL ENGINE 5
85 EXTENDED REALITY
PYMOO: MULTI-OBJECTIVE OPTIMIZATION
86 USING PYTHON
87 AFFECTIVE COMPUTING
88 MLOPS
DECENTRALIZED DEEP LEARNING FOR
89 MULTI ACCES EDGE COMPUTING
CYBER SECURITY OF INDUSTRIAL INTERNET
90 OF THINGS IN ELECTRIC POWER SYSTEMS
91 GPT 3
92 DIGITAL TWIN TECHNOLOGY
93 QUANTUM PROOF SECURITY ALGORITHM
A DEEP LEARNING BASED INTRUSION
DETECTION AND PREVENTION SYSTEM FOR
DETECTING AND AND PREVENTION DENIAL
94 OF SERVICE ATTACKS
LEARN2EVADE: LEARNING-BASED
GENERATIVE MODEL FOR EVADING PDF
95 MALWARE CLASSIFIERS
REALTIME DISTRIBUTED STREAMING
96 SYSTEM USING KAFKA
97 SEMI-AUTOMATED OFFSIDE TECHNOLOGY
98 FIREWIRE
99 NEUROMORPHIC COMPUTING
100 PREDICTIVE ANALYTICS
101 CRYPTO JACKING
TOWARDS ENABLING NEXT GENERATION
SOCIETAL VIRTUAL REALITY APPLICATIONS
102 FOR VIRTUAL HUMAN TELEPORTATIONۥ
103 PASSWORD HASHING AND SALTING
HASHGRAPH :A SUSTAINABLE ALTERNATIVE
104 TO BLOCKCHAIN
105 DEMOCRATIZATION OF AI
106 KUBERNETES
107 AI BASED DAIMOND GRADING
ITERATIVE REFINEMENT FOR ACCURATE
108 OBJECT LOCALISATION
109 HAPTIC TECHNOLOGY
110 SONICOM PROJECT
K. L. E. SOCIETY’S
K. L. E. INSTITUTE OF TECHNOLOGY,
Opp. Airport, Gokul, Hubballi-580 030
Department Of Computer Science and Engineering
K.L.E.S.

111 10 GIGABIT ETHERNET


112 DOCKER
IMAGE PROCESSING FOR DEEP SPACE
113 OPTICAL NAVIGATION
114 MERKLE TREE
115 RADIO MAP ESTIMATION
116 E-MAIL SPAM DETECTION USING ML
117 CARBON PROGRAMMING LANGUAGE
118 WARDRIVING
ROAD CHARACTERIZATION AND ROAD
119 SAFETY
120 PEGASUS SPYWARE
121 HYPERAUTOMATION
122 PHYSICAL SECURITY LAYER IN 6G NETWORK
123 TRANSFER LEARNING
124 OPTICAL CAMOUFLAGE TECHNOLOGY
125 RAIN TECHNOLOGY
126 C RAN
127 ZFORCE TOUCH SCREEN TECHNOLOGY
128 ACTIVE MEMORY VERSUS ATTENTION
129 FUTEX TECHNOLOGY
130 GRAPHICAL PASSWORD AUTHENTICATION
131 SIMPLE STORAGE SERVICE
132 SOFTWARE DEFINED NETWORK FOR 5G
TOOLS FOR ROBOTIC PROCESS
133 AUTOMATION
134 ELASTIC COMPUTE CLOUD
135 PALM VEIN RECOGNISATION SYSTEM
136 TINY MACHINE LEARNING
INFRARED PLASTIC SOLAR CELL
137 TECHNOLOGY
K. L. E. SOCIETY’S
K. L. E. INSTITUTE OF TECHNOLOGY,
Opp. Airport, Gokul, Hubballi-580 030
Department Of Computer Science and Engineering
K.L.E.S.

Sl No SEMINAR TOPIC
138 BLUE BRAIN
139 BLUEJACKING
140 SENSORS IN MACHINE LEARNING
141 METAVERSE
142 MICROSOFT AZURE
143 IMAGE DATA AUGMENTATION
144 CELLULAR DIGITAL PACKET DATA
145 WIRESHARK
146 COMPUTER FORENSICS
147 MIND READING TECHNIQUE
WILD ANIMALS INTRUSION DETECTION
148 USING DEEP LEARNING
149 SECURITY OF AMAZON WEB SERVICES
GENERATIVE ADVERSARIAL NETWORKS
150 (GANS)
151 INTELLIGENT SOFTWARE AGENT
152 BRAIN COMPUTER INTERFACE
HOST BASED INTRUSION DETECTION
153 SYSTEM USING OSSEC
154 APACHE KAFKA BIG DATA
155 NIGHT VISION
156 COGNITIVE COMPUTING
CHALLENGES OF CYBERSECURITY AND
157 ITS EMERGING TRENDS
158 KALI LINUX FOR CYBER SECURITY
159 EFFECT OF ACTIVATION FUNCTION IN DNN
160 APACHE SPARK
APPLICATION OF BLOCKCHAIN AND IOT IN
161 HEALTHCARE AND MEDICAL SECTOR
WHAT ARE NFTS AND HOW CAN YOU
162 CREATE THEM
163 FACE RECOGNITION USING CNN
CONVOLUTIONAL NEURAL NETWORK
164 PROS AND CONS
165 STRATELLITE
BIG DATA ANALYTICS AND ITS IMPACT ON
166 MARKETING STRATEGIES
167 HUMAN AUGMENTATION
168 HYPERAUTOMATION
169 VIRTUAL TEXT MINING
170 SMART CARD
171 OVERVIEW ON COMPUTER VISION
172 CHATBOT USING NLP
173 SENTIMENT ANALYSIS
K. L. E. SOCIETY’S
K. L. E. INSTITUTE OF TECHNOLOGY,
Opp. Airport, Gokul, Hubballi-580 030
Department Of Computer Science and Engineering
K.L.E.S.

174 APACHE FLUME


175 AMAZON SAGEMAKER DEBUGGER
176 LI-FI TECHNOLOGY
177 DIGITAL SIGNATURE USING BLOCK CHAIN
178 ML BASED AUTONAV IN MARS ROVERS
179 BLOCKCHAIN FOR 5G AND BEYOND
180 DIGITAL SIGNATURE
NETWORK INTRUSION DETECTION
181 SYSTEM USING SNORT
182 5G TECHNOLOGY USING CRAN
183 MEDICAL DIAGNOSIS USING AI AND ML
184 SILENT SOUND TECHNOLOGY
185 RNN MODEL FOR REMOTE SENSING DATA
186 VIRTUAL REALITY
FAILURE PREDICTION OF AIRCRAFT
187 EQUIPMENTS USING MACHINE LEARNING
PREDICTION OF DEMENTIA USING DEEP
188 LEARNING
AUTOENCODERS AND THEIR
189 APPLICATIONS IN REMOTE SENSING
IDENTIFICATION OF PLANT DISEASES
190 USING IMAGE PROCESSING
WHY SOCIAL MEDIA CHAT BOX ARE THE
191 FUTURE OF COMMUNICATION
FACE DETECTION USING NEURAL
192 NETWORK
193 ANOMALY DETECTION USING ML
194 COMPILER DESIGN
AGRIBOT:AUTONOMOUS MULTIPLE
195 PURPOSE FARM MACHINERY ROBOT
196 GENETIC PROGRAMMING
COMPARISON OF STORAGE SERVICES IN
197 CLOUD
198 AUGMENTED REALITY
199 DEVOPS, A NEW PARADIGM TO CLOUD
200 QUANTUM COMPUTING
201 BLUE BRAIN
202 BLUEJACKING
203 SENSORS IN MACHINE LEARNING
204 METAVERSE
205 MICROSOFT AZURE
206 IMAGE DATA AUGMENTATION
207 CELLULAR DIGITAL PACKET DATA
208 WIRESHARK
209 COMPUTER FORENSICS
210 MIND READING TECHNIQUE
WILD ANIMALS INTRUSION DETECTION
211 USING DEEP LEARNING
212 SECURITY OF AMAZON WEB SERVICES
K. L. E. SOCIETY’S
K. L. E. INSTITUTE OF TECHNOLOGY,
Opp. Airport, Gokul, Hubballi-580 030
Department Of Computer Science and Engineering
K.L.E.S.

GENERATIVE ADVERSARIAL NETWORKS


213 (GANS)
214 INTELLIGENT SOFTWARE AGENT
215 BRAIN COMPUTER INTERFACE
HOST BASED INTRUSION DETECTION
216 SYSTEM USING OSSEC
217 APACHE KAFKA BIG DATA
218 NIGHT VISION
219 COGNITIVE COMPUTING
CHALLENGES OF CYBERSECURITY AND
220 ITS EMERGING TRENDS
221 KALI LINUX FOR CYBER SECURITY
222 EFFECT OF ACTIVATION FUNCTION IN DNN
223 APACHE SPARK
APPLICATION OF BLOCKCHAIN AND IOT IN
224 HEALTHCARE AND MEDICAL SECTOR
WHAT ARE NFTS AND HOW CAN YOU
225 CREATE THEM
226 FACE RECOGNITION USING CNN
CONVOLUTIONAL NEURAL NETWORK
227 PROS AND CONS
228 STRATELLITE
BIG DATA ANALYTICS AND ITS IMPACT ON
229 MARKETING STRATEGIES
230 HUMAN AUGMENTATION
231 HYPERAUTOMATION
232 VIRTUAL TEXT MINING
233 SMART CARD
234 OVERVIEW ON COMPUTER VISION
235 CHATBOT USING NLP
236 SENTIMENT ANALYSIS
237 APACHE FLUME
238 AMAZON SAGEMAKER DEBUGGER
239 LI-FI TECHNOLOGY
240 DIGITAL SIGNATURE USING BLOCK CHAIN
241 ML BASED AUTONAV IN MARS ROVERS
242 BLOCKCHAIN FOR 5G AND BEYOND
243 DIGITAL SIGNATURE
NETWORK INTRUSION DETECTION
244 SYSTEM USING SNORT
245 5G TECHNOLOGY USING CRAN
246 MEDICAL DIAGNOSIS USING AI AND ML
247 SILENT SOUND TECHNOLOGY
248 RNN MODEL FOR REMOTE SENSING DATA
249 VIRTUAL REALITY
FAILURE PREDICTION OF AIRCRAFT
250 EQUIPMENTS USING MACHINE LEARNING
PREDICTION OF DEMENTIA USING DEEP
251 LEARNING
K. L. E. SOCIETY’S
K. L. E. INSTITUTE OF TECHNOLOGY,
Opp. Airport, Gokul, Hubballi-580 030
Department Of Computer Science and Engineering
K.L.E.S.

AUTOENCODERS AND THEIR


252 APPLICATIONS IN REMOTE SENSING
IDENTIFICATION OF PLANT DISEASES
253 USING IMAGE PROCESSING
WHY SOCIAL MEDIA CHAT BOX ARE THE
254 FUTURE OF COMMUNICATION
FACE DETECTION USING NEURAL
255 NETWORK
256 ANOMALY DETECTION USING ML
257 COMPILER DESIGN
AGRIBOT:AUTONOMOUS MULTIPLE
258 PURPOSE FARM MACHINERY ROBOT
259 GENETIC PROGRAMMING
COMPARISON OF STORAGE SERVICES IN
260 CLOUD
261 AUGMENTED REALITY
262 DEVOPS, A NEW PARADIGM TO CLOUD
263 QUANTUM COMPUTING

You might also like