Skip to content

COMPUTER SCIENCE ENGINEERING

The Computer Science Engineering category in Krazytech.com hosts technical presentation topics for college students, technical topics for presentations for Computer Science and Engineering, technical topics for seminars, and paper presentation topics. In addition to this, you can also get the latest trends in science and technology, research topics, artificial intelligence, Internet of Things (IoT),  etc

smart dust processing method

Smart Dust

Smart dust is a tiny electronic device designed to capture mountains of information about its surroundings while literally floating on air.

Nodal distance and Traffic in wireless integrated network sensors

Wireless Integrated Network Sensors

Wireless Integrated Network Sensors provide a new monitoring and control capability for transportation, manufacturing, health care, environmental monitoring and safety and security. They combine sensing, signal processing, decision capability, and wireless networking capability in a compact, low power system.

Human computer interaction

Human Computer Interaction and Future scope

Human Computer Interaction (HCI) as the name suggests, is related to humans and computers and the way, both interact with each other.Because human-computer interaction studies a human and a machine in conjunction, it draws from supporting knowledge on both the machine and the human side. On the machine side, techniques in computer graphics, operating systems, programming languages, and development environments are relevant. On the human side, communication theory, graphic and industrial design disciplines, linguistics, social sciences, cognitive psychology, and human factors are relevant. Attention to human-machine interaction is important, because poorly designed human- machine interfaces can lead to many unexpected problems.In particular, core vision techniques (body, gesture, gaze) and affective interaction (facial expression recognition, and emotion in audio) which are needed for Multimodal Human Computer Interaction (MMHCI) research.

Mobile Ad hoc networks are a new paradigm of wireless network, offering unrestricted mobility without any underlying infrastructure.

Security Aspects in Mobile Ad Hoc Networks

Mobile Ad hoc networks are a new paradigm of wireless network, offering unrestricted mobility without any underlying infrastructure such as base station or mobile switching centers. Basically ad hoc network is a collection of nodes communicating with each other by forming a multi-hop network.

blank

Security analysis of Micropayment system

  • by

Micropayment system provides a means of transferring small monetary amounts and serve as a convenient alternative to traditional payment arrangements. Micropayments refer to low value electronic transactions. They provide an alternative revenue source for content providers beyond advertising and subscriptions (W3C).

Ajax Technology working model

Ajax Technology

AJAX stands for Asynchronous JavaScript and XML. This technology was introduced first by Microsoft back in 1999, and had been known as DHTML / JavaScript web application with remote calls. AJAX is not a new programming language, but a new technique for creating better, faster, and more interactive web applications.