[go: up one dir, main page]

0% found this document useful (0 votes)
27 views3 pages

Topic

Uploaded by

Kiran
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views3 pages

Topic

Uploaded by

Kiran
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Department of Computer Applications

College of Engineering Trivandrum


Seminar Topic List- 2023

Roll No Name Seminar Topic

1 Aashalatha P A PaLM: Scaling Language Modeling with Pathways

Leveraging brain–computer interface for implementation of a


2 Abhijith B bio-sensor controlled game for attention deficit people

3 Abhijith K S E-Rupee - Digital Currency

Image Processing and Artificial Intelligence for Precision


4 ABHINAND NARAYANAN Agriculture

6 Achuttan Jiju Analog Matrix Processor - Mythic AI

Phishing URL Detection:A real case scenario through login


7 Adithya AV URLs

Goal Line Technology Using Line axis


8 Adwaith K detection

9 Aiswaria A VISUAL SPEECH RECOGNITION

10 Ajsar Hisan Cosmic Bit Flip

Microservices: architecture, container, and


11 Akhil S S challenges

PPMCK: Privacy-preserving multi-party computing for K-


12 Aksa Babu means clustering

Ransomware as a Service (RaaS) and Methods to Mitigate the


13 Akshay B Attack

14 Amal P Brain-to-text Communication via Attempted Handwriting

Face Generation using DCGAN for Low Computing


15 Amith S Resources

16 Anchu jayaraj Blockchain as a cyber defense

17 Anju Varghese Digital Twin

Blockchain-Based Agri-Food Supply Chain:


18 Anushaj jk A Complete Solution

19 Anushka Data Fabric

MedShare: A Privacy-Preserving Medical Data


20 Aravind Krishna A V Sharing System by Using Blockchain

CNN-Based Classification for Point Cloud Object With


21 ARJUN K Bearing Angle Image

22 ARUN KUMAR K Neuromorphic computing


Hierarchical text- conditional image generation with CLIP
23 Aryasree C latents

A Comparative Study on the State of the Art Object Detection


24 Aseel Abdulla Models

25 ASHHAD MUHAMMED KADER ML FLOW

Anomaly Detection With Convolutional Autoencoders for


26 Athmajan A S finger print presentation atack detectors

Implementation of socket programming simulation using


27 Avani S Girish Quantum communication technologies

28 Basil Narakodan Role of 5G in Metaverse

29 Bharath Vikraman Nair DEVSECOPS

Robust Speech Recognition via Large-Scale Weak


30 Bhavya S Nair Supervision

31 Denny Thomas Post Quantum Cryptography

32 Elton D Aruja Music LM

33 GOKUL N KUMAR Green Cloud Computing

34 Gouri.S IOT based smart wheelchair

A Systematic Review Towards Big Data Analytics in social


35 Goutham S Kunnel media

36 Hamras Muhammad Cyber Bullying detection using Natural Language Processing

37 Harish shaji Survey and Tutorial on Hybrid Human-Artificial Intelligence


38 Hisham P Proof-of-Stake Consensus Mechanism

39 Jisha Jose Hyperledger fabric

NFTs for Open-Source and Commercial Software Licensing


40 M MIDHUN and Royalties

41 Mruthul M Cloud Computing Security: Threats and Mitigation Strategies

42 MUHAMMED SUHAIL M K GraphQL

43 Navaneeth G S Wild Life Intrusion Detection

DeepKeyGen: A Deep Learning-Based Stream Cipher


Generator for Medical Image Encryption and Decryption
44 Nehma Mohammed

45 Nelwin George Docker

46 Raees km Text to image conversion using stable diffusion

47 Rejith R S Online Voting System Using Blockchain

48 SACHIN M

Off-Path TCP Hijacking Attacks via the Side Channel of


49 Sarath S Downgraded IPID

50 Shahban ps MLOps

Design Thinking and Agility in Digital Production: The Key


51 Shifan Sadique Role of User Experience Design

Keystroke and swipe biometrics fusion to enhance


52 Shigin s smartphones authentication

53 Sreeraj V Explainable AI

A Study on Advancement in Honeypot based


54 USMAN Network Security Model

55 Varna MV An Overview on Chat gpt

Alternative Approaches to Data Storing and


56 Vishnu A Processing

57 Vishnu shaji SECURING VEHICLES OF TOMORROW

58 Fathima Thanziya VS USING BLOCKCHAIN TECHNOLOGY

A Two-Fold Machine Learning Approach to Prevent and


59 Aparna U Suresh Detect IoT Botnet Attack

You might also like