Category Archives: COMPUTER SCIENCE

It contains over 350 computer science technical paper topics with details and many latest technical paper topics.

Cloud Computing

Cloud computing refers to any situation in which computing is done in a remote location (out in the clouds) rather than your portable device or desktop where-in the computing power is tapped over an internet connection. At basic level cloud computing is simply a means of delivering IT resources as services. Almost all IT resources can be delivered as a cloud service: applications, compute power, storage capacity, networking, programming tools, communication services even collaboration tools.

Security analysis of Micropayment system

Micropayment system provides a means of transferring small monetary amounts and serve as a convenient alternative to traditional payment arrangements. Micropayments refer to low value electronic transactions. They provide an alternative revenue source for content providers beyond advertising and subscriptions (W3C).

Programmable Logic Devices

Programmable Logic Devices (PLDs) are ICs with a large number of gates and flip flops that can be configured with basic software to perform a specific logic function or perform the logic for a complex circuit. Unlike a logic gate, which has a fixed function, a PLD has an undefined function at the time of manufacture. Before the PLD can be used in a circuit it must be programmed, that is, reconfigured.


Semantics is the study of meaning. It’s as old as the ancient Greeks. For most of us it was a deadly dull sub-discipline of philosophy, to be avoided. But it turns out that we can’t avoid it. We are drowning in a sea of data which occasionally is generously referred to as information. But the truth is that almost all of it must be interpreted by humans to be of any use.


A honeypot is used in the area of computer and Internet security . It is a security resource, whose value lies in being probed, attacked or compromised. They are special decoy servers to catch the‚ Blackhats (people with evil and illegal intents). Honeypots attract the hackers to attack a vulnerable computer system, which is under observation, by a security team. All the information about the attackers is logged, and monitored.