Department of Computer Applications
College of Engineering Trivandrum
Seminar Topic List- 2023
Roll No Name Seminar Topic
1 Aashalatha P A PaLM: Scaling Language Modeling with Pathways
Leveraging brain–computer interface for implementation of a
2 Abhijith B bio-sensor controlled game for attention deficit people
3 Abhijith K S E-Rupee - Digital Currency
Image Processing and Artificial Intelligence for Precision
4 ABHINAND NARAYANAN Agriculture
6 Achuttan Jiju Analog Matrix Processor - Mythic AI
Phishing URL Detection:A real case scenario through login
7 Adithya AV URLs
Goal Line Technology Using Line axis
8 Adwaith K detection
9 Aiswaria A VISUAL SPEECH RECOGNITION
10 Ajsar Hisan Cosmic Bit Flip
Microservices: architecture, container, and
11 Akhil S S challenges
PPMCK: Privacy-preserving multi-party computing for K-
12 Aksa Babu means clustering
Ransomware as a Service (RaaS) and Methods to Mitigate the
13 Akshay B Attack
14 Amal P Brain-to-text Communication via Attempted Handwriting
Face Generation using DCGAN for Low Computing
15 Amith S Resources
16 Anchu jayaraj Blockchain as a cyber defense
17 Anju Varghese Digital Twin
Blockchain-Based Agri-Food Supply Chain:
18 Anushaj jk A Complete Solution
19 Anushka Data Fabric
MedShare: A Privacy-Preserving Medical Data
20 Aravind Krishna A V Sharing System by Using Blockchain
CNN-Based Classification for Point Cloud Object With
21 ARJUN K Bearing Angle Image
22 ARUN KUMAR K Neuromorphic computing
Hierarchical text- conditional image generation with CLIP
23 Aryasree C latents
A Comparative Study on the State of the Art Object Detection
24 Aseel Abdulla Models
25 ASHHAD MUHAMMED KADER ML FLOW
Anomaly Detection With Convolutional Autoencoders for
26 Athmajan A S finger print presentation atack detectors
Implementation of socket programming simulation using
27 Avani S Girish Quantum communication technologies
28 Basil Narakodan Role of 5G in Metaverse
29 Bharath Vikraman Nair DEVSECOPS
Robust Speech Recognition via Large-Scale Weak
30 Bhavya S Nair Supervision
31 Denny Thomas Post Quantum Cryptography
32 Elton D Aruja Music LM
33 GOKUL N KUMAR Green Cloud Computing
34 Gouri.S IOT based smart wheelchair
A Systematic Review Towards Big Data Analytics in social
35 Goutham S Kunnel media
36 Hamras Muhammad Cyber Bullying detection using Natural Language Processing
37 Harish shaji Survey and Tutorial on Hybrid Human-Artificial Intelligence
38 Hisham P Proof-of-Stake Consensus Mechanism
39 Jisha Jose Hyperledger fabric
NFTs for Open-Source and Commercial Software Licensing
40 M MIDHUN and Royalties
41 Mruthul M Cloud Computing Security: Threats and Mitigation Strategies
42 MUHAMMED SUHAIL M K GraphQL
43 Navaneeth G S Wild Life Intrusion Detection
DeepKeyGen: A Deep Learning-Based Stream Cipher
Generator for Medical Image Encryption and Decryption
44 Nehma Mohammed
45 Nelwin George Docker
46 Raees km Text to image conversion using stable diffusion
47 Rejith R S Online Voting System Using Blockchain
48 SACHIN M
Off-Path TCP Hijacking Attacks via the Side Channel of
49 Sarath S Downgraded IPID
50 Shahban ps MLOps
Design Thinking and Agility in Digital Production: The Key
51 Shifan Sadique Role of User Experience Design
Keystroke and swipe biometrics fusion to enhance
52 Shigin s smartphones authentication
53 Sreeraj V Explainable AI
A Study on Advancement in Honeypot based
54 USMAN Network Security Model
55 Varna MV An Overview on Chat gpt
Alternative Approaches to Data Storing and
56 Vishnu A Processing
57 Vishnu shaji SECURING VEHICLES OF TOMORROW
58 Fathima Thanziya VS USING BLOCKCHAIN TECHNOLOGY
A Two-Fold Machine Learning Approach to Prevent and
59 Aparna U Suresh Detect IoT Botnet Attack