General Seminar Topics

This post lists latest general seminar topics. General seminar topics cover the topics from Computer science and engineering, IT, Electronics and Communication Engineering, Electrical engineering, Mechanical engineering and other streams. You can pick a topic and search by the name in the search box to find details of topic or at least similar such topics. 

  • 3D searching
  • 5G technology
  • Ac performance of nanoelectronics
  • Artificial heart transplantation
  • Ambiophonics
  • Android 7.0 Nougat features
  • Application lifecycle management
  • Applications of sensor networks
  • Artificial neural network (ANN)
  • Automated piezoelectric nano positioning systems
  • Autonomic computing
  • Bioinformatics and drug discovery
  • Biological computers
  • Biometrics based authentication
  • Bio-molecular computing
  • Biosensor imaging
  • Bluetooth based smart sensor networks
  • Brain-computer interface
  • Cellular neural network
  • Clockless chip
  • Clustering techniques in complex network
  • Cyber crime and preventive measures
  • Cloud Computing
  • Computerized paper evaluation using neural network
  • Cyberknife
  • Data communication in wireless networks
  • Data security in local network using firewalls
  • Delay tolerant routing
  • GSM security and encryption
  • Action Camera vs DSLR
  • Green building
  • Apache Hadoop
  • Graphics support for computers

Suggested read:

  • Free space laser communications
  • Fluorescent multi-layer disc
  • oAuth Authentication
  • Face recognition technology
  • E-nose
  • Emulation of peer to peer botnets
  • Earth Simulator
  • E-waste
  • Data Mining and Predictive Analytics
  • DNA computing in security
  • DNA chips
  • Distributed interactive virtual environment
  • Electronic Document Management System
  • HDMI ( high-definition multimedia interface )
  • high altitude aeronautical platforms
  • Holographic data storage
  • Holographic memory
  • Holographic versatile disc
  • Human computer interface
  • Hyper-threading technology
  • Identity-based encryption
  • Industrial applications using neural networks
  • Intel Centrino mobile technology
  • Intrusion detection system
  • Digital Watermarking Applications and Advantages
  • Computational Methods for Bankruptcy Prediction
  • Privacy Preserving Data Mining
  • Biometrics Authentication systems
  • Prevention measures for Intrusion Detection
  • Space-time adaptive processing
  • Humanoid Robots

  • Embedded Bluetooth based Smart Sensor Networks
  • Cellular digital data packet
  • Reactive Power Consumption in Transmission Line
  • Cordless power controller
  • Advancement in inverter technology for industrial application
  • SPINS – Security Protocol For Sensor Network
  • Stepper Motor and its Application
  • Electric Locomotive
  • Phase Locked Loop
  • Quality of electrical power
  • Architecture of an Electric Vehicle
  • Reactive Power Consumption in Transmission Line
  • Broadband over power line
  • Railway switch and signals
  • Cordless power controller
  • Space-time adaptive processing
  • Inverse multiplexing
  • IP spoofing
  • IP telephony
  • IRIS biometrics
  • Itanium processor
  • Laser communications
  • Light emitting polymers
  • Liquid crystal on silicon display (LCOS)
  • Local multipoint distribution service
  • Low price nano cars
  • Millipede
  • Microsoft Azure vs AWS
  • Mobile agents
  • Modular computing
  • MRAM – the birth of super memory
  • Multimedia broadcast multicast service (MBMS)
  • Nano bio-sensors
  • Nanotechnology assembler design and nano-communication
  • Network security using mutated string algorithm
  • Night vision technology
  • Optical satellite communication
  • Open Source Technology
  • Pagerank algorithm
  • Palm vein authentication technology
  • Parallel virtual machines
  • Pervasive computing
  • Programmable logic controllers (PLCS)
  • Quadrics interconnection network
  • Quantum computers
  • Quantum cryptanalysis
  • Quantum cryptography
  • Radio frequency light sources
  • Radio network controller
  • Rapid prototyping
  • Robotic surgery
  • Routing protocols in wireless sensor networks
  • Rover technology
  • RSS – really simple syndication fields
  • Satellite radio
  • Secure data communication based on quantum effects
  • Significance of real-time transport protocol in VoIP
  • Sixth sense technology
  • Small computer system interface
  • Smart fabrics
  • Socket programming
  • Software metrics
  • Software-defined radio
  • Spawning networks
  • Speed control of vehicle in the accidental zone
  • Storage area networks
  • supervision control and data acquisition (SCADA) system
  • Survivable networks systems
  • Swarm intelligence
  • Swarm intelligence & traffic safety
  • Synchronous optical networking
  • Tele-immersion
  • Telemedicine
  • The challenges of software reliability & modeling
  • The mysterious memristor
  • Touch screen technology
  • Tracking and positioning of mobiles in telecommunication
  • Transient stability assessment using neural networks
  • Trust in mobile and wireless networks
  • Ubiquitous networking
  • Ultra wideband networking
  • Ultrasonic motor
  • Unified modeling language (UML)
  • Unlicensed mobile access
  • Using plastic as high capacity memory
  • Virtual LAN technology
  • Voice over internet protocol
  • Wearable biosensors
  • Web security
  • Web service standards for data mining
  • WETPC – the underwater wearable computer
  • Wireless battery charging system using radio frequency energy harvesting
  • Wireless body area network
  • Wireless USB
  • XML encryption

Need more topics? follow the below link

Latest Technical Paper Presentation Topics

Ravi Bandakkanavar

A Techie, Blogger, Web Designer, Programmer by passion who aspires to learn new Technologies every day. A founder of Krazytech. It's been 10+ years since I am publishing articles and enjoying every bit of it. I want to share the knowledge and build a great community with people like you.

Leave a Comment

View Comments

Published by
Ravi Bandakkanavar

Recent Posts

How Cyber Security is Changing in the World of Digital Technology

Cyber security is becoming increasingly critical as we move into the digital age. As the…

7 days ago

Everything You Need To Know About Create React App

The configuration of resources can be a time-consuming and difficult operation while creating a React…

1 month ago

Causes of CyberCrime and Preventive Measures

          Rapid technological growth and developments have provided vast areas of…

1 month ago

How Data Lineage will Improve Business Practices

How often have you thought about changing the way that you store and use data?…

1 month ago

10 Dominating Programming Language for Mobile App In 2022

Programming Languages are a set of rules that aid in transforming a concept into a…

2 months ago

What is Serverless Edge Computing? Features | Benefits

Serverless edge computing is a new technology with a lot of promise, but it can…

2 months ago