seminar topics for final year students
Post on 27-Nov-2015
90 Views
Preview:
DESCRIPTION
TRANSCRIPT
1. Brain Gate
2. Palm Vein Technology
3. Sniffer for detecting lost mobiles
4. 5 Pen PC Technology
5. iDEN
6. Hi-Fi
7. Packet Sniffers
8. Brain Chips
9. Phishing
10. Pill Camera
11. Blue Brain
12. Mobile Phone Cloning
13. Nano Cars Into The Robotics
14. Mind-Reading Computer
15. Intelligent Speed Adaptation
16. GSM Based Vehicle Theft Control System
17. Global Wireless E-Voting
18. Green Cloud
19. Digital Jewelry
20. Biometric Voting System
21. 3D Television
22. 3D password
23. Voice Browser
24. Gi-Fi
25. Graphical Password Authentication
26. 4G Broadband
27. Finger Tracking In Real Time Human Computer Interaction
28. Eye Movement-Based Human Computer Interaction Techniques
29. Ethical Hacking
30. E-Cash Payment System
31. Cyborgs
32. Brain Fingerprinting
33. Biometrics in SECURE e-transaction
34. X- Internet
35. Surface Computer
36. Secure ATM by Image Processing
37. Mobile Ad-Hoc Networks Extensions to Zone Routing Protocol
38. Wibree
39. Telepresence
40. System in Package
41. Smart Memories
42. Slammer Worm
43. Sensitive Skin
44. Pixie Dust
45. Linux Kernel 2.6
46. Lamp Technology
47. Humanoid Robot
48. HTAM
49. Haptic Technology
50. Elastic Quotas
51. Diamond chip
52. Digital Rights Management
53. A Plan For No Spam
54. BEOWULF Cluster
55. Digital Scent Technology
56. Distributed Interactive Virtual Environment
57. Dynamic TCP Connection Elapsing
58. CAPTCHA
59. Virtual Retinal Display
60. Wireless LAN Security
61. Chameleon Chip
62. Haptics
63. Intelligent RAM
64. iSCSI
65. Linux Kernel 2.6
66. 3D Searching
67. Biological Computers
68. Rain Technology
69. Real Time Application Interface
70. GPS
71. HALO
72. BitTorrent
73. Compositional Adaptation
74. Rover Technology
75. Self Defending Networks
76. Semantic Web
77. Computer Intelligence Application
78. Cooperative Linux
79. Longhorn
80. Mesh Radio
81. Parallel Virtual Machine
82. Linux Virtual Server
83. Location Independent Naming
84. PHANToM
85. Multiprotocol Label Switching
86. Next Generation Secure Computing Base
87. NGSCB
88. Reconfigurable computing
89. Sky X Technology
90. Smart Client Application Development using .NET
91. Spawning Networks
92. SPCS
93. Speed protocol processors
94. Strata flash Memory
95. Swarm Intelligence
96. The Callpaper Concept
97. IP spoofing
98. Internet Access via Cable TV Network
99. Face Recognition Technology
100. FireWire
101. Param 10000
102. The Deep Web
103. Virtual Campus
104. VoiceXML
105. Wireless USB
106. Refactoring
107. On-line Analytical Processing (OLAP)
108. Pivot Vector Space Approach in Audio-Video Mixing
109. MPEG-7
110. Adding Intelligence to Internet
111. Silverlight
112. DNA chips
113. Remote Administration Trojan's
114. Thermography
115. AJAX
116. Alternative Models Of Computation
117. Amorphous Computing and Swarm Intelligence
118. Windows DNA
119. Laptop Computer
120. Intelligent Software Agents
121. Self-Managing Computing
122. Hurd
123. Intel Centrino Mobile Technology
124. MPEG Video Compression
125. Survivable Networks Systems
126. Self Organizing Maps
127. Mobile IP
128. Iris Scanning
129. LWIP
130. Unified Modeling Language (UML)
131. Nanorobotics
132. Dual Core Processor
133. Cisco IOS Firewall
134. Socket Programming
135. SAM
136. 10 Gigabit Ethernet
137. Tripwire
138. Ubiquitous Networking
139. Unicode And Multilingual Computing
140. XML Encryption
141. Y2K38
142. VoCable
143. Touch Screens
144. Tempest and Echelon
145. Synthetic Aperture Radar System
146. Unlicensed Mobile Access
147. IDS
148. IDC
149. SATRACK
150. Asynchronous Chips
151. Low Power UART Design for Serial Data Communication
152. SPECT
153. Satellite Radio
154. Light emitting polymers
155. Sensors on 3D Digitization
156. Robotic Surgery
157. Buffer overflow attack : A potential problem and its Implications
158. Smart card
159. Quantum Information Technology
160. Money Pad, The Future Wallet
161. HVAC
162. Terrestrial Trunked Radio
163. Swarm intelligence & traffic Safety
164. Facility Layout Design using Genetic Algorithm
165. Human Computer Interface
166. HPJava
167. Gaming Consoles
168. Fluorescent Multi-layer Disc
169. Futex
170. Extreme Programming (XP)
171. Earth Simulator
172. Compact peripheral component interconnect
173. corDECT Wireless in Local Loop System
174. Motes
175. Modular Computing
176. MiniDisc system
177. Migration From GSM Network To GPRS
178. M-Commerce
179. C#
180. IP Telephony
181. RPR
182. Broad Band Over Power Line
183. Rapid Prototyping
184. Dashboard
185. Code Division Duplexing
186. Delay Tolerant Networking
187. EDGE
188. Holographic Data Storage
189. Integer Fast Fourier Transform
190. NRAM
191. Orthogonal Frequency Division Multiplplexing
192. Ovonic Unified Memory
193. Pervasive Computing
194. RAID
195. Real Time Systems with Linux/RTAI
196. Real-Time Obstacle Avoidance
197. Symbian OS
198. Teleportation
199. Turbo Codes
200. Utility Fog
201. Cluster Computing
202. Wireless Application Protocol
203. Light Tree
204. Smart Pixel Arrays
205. Project Oxygen
206. Wearable Bio-Sensors
207. Mobile Virtual Reality Service
208. QoS in Cellular Networks Based on MPT
209. Wireless Fidelity
210. Voice morphing
211. Radio Frequency Light Sources
212. Speed Detection of moving vehicle using speed cameras
213. Optical Packet Switching Network
214. Storage Area Networks
215. Smart Note Taker
216. Crusoe Processor
217. Optical Satellite Communication
218. Optical packet switch architectures
219. Optical Switching
220. FRAM
221. Virtual Private Network
222. Clockless Chip
223. Layer 3 Switching
224. IMode
225. Blue Gene
226. Access gateways
227. Computer Forensics
228. Direct Memory Access
229. Crusoe
230. Digital Subscriber Line
231. Computer Memory Based on the Protein Bacterio-rhodopsin
232. DNA Based Computing
233. Free Space Optics
234. Freenet
235. Fiber Distributed Data Interface
236. Dynamic Virtual Private Network
237. Introduction to the Internet Protocols
238. Graphic processing Unit
239. High Altitude Aeronautical Platforms
240. Aspect-oriented programming (Aop)
241. Intel MMX Technology
242. Hyper-Threading technology
243. IMAX
244. Brain-Computer Interface
245. InfiniBand
246. Multicast
247. Inverse Multiplexing
248. Blue Tooth
249. Holographic Memory
250. Jini Technology
251. Bio-metrics
252. Magnetic Random Access Memory
253. Intrution Detection System
254. Multiterabit Networks
255. Neural Networks And Their Applications
256. Quantum Computers
257. Small Computer System Interface
258. OpenRAN
259. Quadrics Interconnection Network
260. Plan 9 Operating System
261. Structured Cabling
262. Quantum Cryptography
263. Speech Application Language Tags
264. Real- Time Systems and Real- Time Operating Systems
265. Parallel Computing In India
266. Steganography
267. Virtual LAN Technology
268. Artificial Neural Network (ANN)
269. Tele-immersion
270. VHDL
271. Blue Eyes
272. Voice Over Internet Protocol
273. The Tiger SHARC processor
274. Autonomic Computing
275. Wearable Computers
276. Voice Portals
277. Tamper Resistance
278. CGI Programming
279. DRM Software Radio
280. Firewalls
281. Handheld Computers
282. Modems and ISDN
283. Optical Free Space Communication
284. Planar Separators
285. Wireless Internet
286. DVD Technology
287. MPEG-4 Facial Animation
288. Internet Telephony Policy in INDIA
289. PON Topologies
290. Smart Cards
291. Surround Systems
292. TCPA / Palladium
293. Trustworthy Computing
294. Sense-Response Applications
295. Optical Computer
296. Graph Separators
297. Extended Mark Up Language
298. Cellular Communications
299. Virtual Instrumentation
300. Voice Quality
301. Cable Modems
302. Dynamic Memory Allocation
303. Optical Mouse
304. Generic Framing Procedure
305. Dynamic Cache Management Technique
306. Ethernet Passive Optical Network
307. Synchronous Optical Networking
308. Development of the Intenet
309. Design and Analysis of Algoritms
310. Infinite Dimensional Vector Space
311. Instant Messaging
312. Optical Fibre Cable
313. GSM
314. Ambiophonics
315. Palladium
316. Computer Viruses
317. Third Generation
318. Object Oriented Concepts
319. Night Vision Technology
320. TCP/ IP
321. Dynamic Synchronous Transfer Mode
322. Integrated Voice and Data
323. Java Servlets
324. Smart Quill
325. Spam Assassin
326. Stereoscopic Imaging
327. Zigbee
328. Ultra-Wideband
329. Home Networking
330. Internet Protocol Television
331. Bacterio-Rhodopsin Memory
332. Blade Servers
333. Digital Cinema
334. Holographic Versatile Disc
335. Itanium Processor
336. Local Multipoint Distribution Service
337. Network Attached Storage
338. Night Vision Technology
339. Opera (web browser)
340. Parasitic Computing
341. Performance Testing
342. Java Ring
343. RD RAM
344. GSM Security And Encryption
345. Fast Convergence Algorithms for Active Noise Controlin Vehicles
346. 3G vs WiFi
347. Data Security in Local Network using Distributed Firewalls
348. Computerized Paper Evaluation using Neural Network
349. Bluetooth Based Smart Sensor Networks
350. Laser Communications
351. Multiple Domain Orientation
352. Industrial Applications using Neural Networks
353. Implementation Of Zoom FFT
354. Image Processing
355. Virtual keyboard
356. Transient Stability Assessment using Neural Networks
357. Tracking and Positioning of Mobiles in Telecommunication
358. Timing Attacks on Implementations
359. Prototype System Design for Telemedicine
360. Optical Networking and Dense Wavelength Division Multiplexing
361. Optical Burst Switching
362. Image Processing & Compression
363. Cyberterrorism
364. Ipv6 - The Next Generation Protocol
365. Driving Optical Network Evolution
366. Cellular Neural Network
367. Radio Network Controller
368. Digital Audio Broadcasting
369. Significance of real-time transport Protocol in VOIP
370. Space Mouse
371. Resilient Packet Ring Technology
372. Wireless Networked Digital Devices
373. Design of 2-D Filters using a Parallel Processor Architecture
374. Hyper Transport Technology
375. CorDECT
376. Storage Area Network
377. High Performance DSP Architectures
378. Smart Dust
379. MANET
380. Biometrics Based Authentication
381. Software-Defined Radio
382. Digital Video Editing
383. D-Blast
384. Aeronautical Communication
385. Gigabit Ethernet
386. Wisenet
387. Digital Light Processing
388. Free Space Laser Communications
389. Millipede
390. AC Performance Of Nanoelectronics
391. 4G Wireless Systems
392. Blu Ray Disc
393. Smart Fabrics
394. Daknet
395. Conditional Access System
396. SyncML
397. High Performance DSP Architectures
398. Short Message Service (SMS)
399. MANET
400. Worldwide Inter operatibility for Microwave Access
401. 64-Bit Computing
402. Bio-Molecular Computing
403. Tracking and Positioning of Mobiles in Telecommunication
404. Palmprint Authentication Application3. Security in Mobile Database Systems4. Multicasting in Ad Hoc Networks5. Brain Finger Printing6. Future of the internet7. Computer vision8. Raising Technologies9. Open-Rar10. Intrusion Detection System11. Taxonomy of S/w Testing Tools12. Power of Grid Computing13. HomeRF- localized wireless technology optimized forthe home environment14. Wireless Application Protocol15. Computational Methods for Bankruptcy Prediction16. Honey Pots17. Next Generation Protocol (IPv6)18. Peer 2 Peer Web Services19. Embedded Auditors for Intrusion Detection20. Recognition of VoIP Speech21. Assisted GPS22. Multiterabit Networks23. Bio-metrics24. Radio Network Controller for 3G mobile and wireless network devices25. Software model checking26. Fiber Optic technology27. Algorithms and Computation Theories28. Graphic processing Unit29. Domotics30. Cell Phones beyond Call & Sms31. C Sharp (C#)32. Image Water Marking33. Intrution Detection System
34. Real-time Transport Protocol (RTP)35. Digital photography & music36. Fusion Memory37. M – Commerce38. Wireless Technologies (bluetooth, 802.11x, IRDA)39. Mobile Commerce40. Load Balancing in Internet41. Intel MMX Technology42. VPN Server43. Earth Simulator- Fastest Supercomputer44. DNA Based computer45. Expert Systems and decision making46. S/w Testing Tools47. Recent Trends in Cryptography48. Technologies and successful applications for direct and multihop ad hoc networks49. Zornbie Computers50. Wireless Network Devices and digital convergence51. Aspect-oriented programming (Aop)52. Real Time Speech Translation53. New Age Graphics54. New Dimension of Data Security using Neural Networks and Numerical Functions55. Diskless Network storage Controller56. 4G- Wireless57. Routing In Mobile Ad Hoc Networks58. ATM Virtual connections59. Voice Portals60. NVSRAM- Non Volatile Static RAM61. High Altitude Aeronautical Platforms62. Artificial Intelligence and Neural Networks63. Printed Memory Technology64. Advanced Mobile Presence Technology65. Future Programming Techniques and Concepts66. 3D Internet67. DART68. Magnetic Random Access Memory69. High Capacity Flash Chips70. IRIS Recognization71. Load Balancing in Parallel Computers72. Agent Based Systems and Applications73. Embedded web server for remote access74. Mobile Tele Communication75. Biometrics Authentication systems76. Embedded web server for remote access77. Adhoc Networks78. Advanced Processors79. Probabilistic I/o Automata80. Mobile ad hoc network (MANET)81. Near Filed Communication (NFC)
82. Rising Technology GIES83. VQ In Converging Telephony And Ip Networks84. Privacy Preserving Data Mining85. Pocket Doctor86. Java Card87. News Groups88. Fuzzified Computer-Automated Crane Control System89. Infini band90. UMA (Unlicensed Mobile Access)91. Mind Reading Phones92. Auto-pilot for IT systems93. Blade Servers94. Botnet Security Threats95. Proactive computing96. Information Extraction modes & techniques97. The SAT (SIM Application Toolkit)98. WBM(Web based mobile)99. Nonvolatile Flash Memory100. Self Healing Computers101. GSM Security And Encryption102. Embedded systems103. Signal Integrity Fundamentals for Digital Design104. i – Planet105. Digital Watermarking Applications and Advantages106. HCI (Human Computer Interaction ) in software applications107. Information or Data Visualizing Techniques
405. SPINS -Security Protocol For Sensor Network (33)
406. Generic visual perception processor
407. Nanotechnology Assembler Design And Nano-Communication
408. Tele-Immersion (34)
409. Liquid Crystal on Silicon Display (LCOS)
410. Jini - advanced set of network protocols
411. Computer memory based on the protein bacterio-rhodopsin
412. CSS and DeCSS -(1)
413. Multimedia Broadcast Multicast Service (MBMS)
414. Extreme Programming (XP)
415. Holographic Versatile Disc
416. Zero Knowledge proofs -(6)
417. Bimolecular Computers
418. Context Disambiguation On Web Search Results
419. Touch Screen Technology (35)
420. Surface Computer
421. Face Recognition Technology
422. DNA Computing in security
423. 4g Wireless Systems
424. Spyware and Trojan horses -(2)
425. Zigbee
426. Java Management Extensions (JMX) - component framework for building intelligent
network
427. Quantum cryptography -(5)
428. Home Networking
429. Steganography and digital watermarking
430. TouchFLO Technology
431. NESSUS * -(4)
432. 3D Volume Storage
433. Optical Networking and Dense Wavelength Division Multiplexing
434. Software-Defined Radio
435. Space-time adaptive processing
Intelligence at voice-recognition systems
Compiler theory & Rover technology
Self defending networks
Future programming techniques and concepts
Glass computer memory for reduced cost of medical imaging
Computerized Paper Evaluation Using Neural Network
Sixthsense technology
Versatile inspection software for use on 64-bit computer systems
The Callpaper Concept
Data Security In Local Network Using Distributed Firewalls
Anonymous network access or privacy
Low-cost Industrial fanless embedded PC
spawning networks
Money pad,the future wallet
Compact USB data acquisition modules
Desktop 3D Printer
Google App engine
Advanced Micro Peripherals
Rich internet applications
3D Digital NanoCompass
Parallel processing, and need for better parallel algorithms
Compare technology 10 years back and now
iWall - an Intelligent Public Display
Context management strategies in wireless networks
Wireless Markup Language
436. multimedia-oriented web based instructional system
437. Porting Device Drivers For The Solaris ~
438. Steganography - The art of hiding information
439. VHDL (VHSIC Hardware Description Language)
440. Global Positioning System ~
441. Magnetic RAM
442. Embedded computers
443. SSL-TLS -(7)
444. Quad core Module technology
445. Micro Total analysis systems
446. Plasma Displays ~
447. Computerized Paper Evaluation Using Neural Network
448. Mesh Based Geometric data processing
449. DNA Computing ~
450. Multiple Domain Orientation
451. Digital Rights Management -(8)
452. Multimedia Broadcasting via Satellite
453. USB Tape Drives
454. UMA (Unlicensed Mobile Access)
455. Virtual Reality ~
456. Embedded Configurable Operating system
457. Cluster computing
458. Digital cash -(11)
459. PLAN 9 Operating system
460. Brain computer interface & systems
461. Digital Imaging ~
462. Wearable computers
463. Data Mining concepts & Models
464. Captchas -(9)
465. Computer forensics
466. Quantum computing
LOC technology (Lab On a Chip)
Advanced Design repository systems
Security of Open-Source Software -(10)
Wireless Markup Language
B-ISDN Reference Model
Agent OS (12)
iSCSI-Future of Network Storage
PolyBot - Modular, self-reconfigurable robots
AMD Processors (13)
Bluetooth Based Smart Sensor Networks
multimedia-oriented web based instructional
BioComputers (14)
Ubiquitous computing
Microcontroller Based Power Theft Identification
Computer Forensics (15)
Microcontroller Based Automation
Quantum teleportation
Curl: A Gentle Slope Language For The Web (16)
Grid Data Farm for Petascale
Vertical Cavity Surface Emitting Laser
Dna Computing In Security (17)
Bio Telemetry
Digital Visual Interface
Embedded Linux (18)
Management Information System
Teleportation
Ext3 Filesystem (19)
Radio Astronomy
Security threats in the World Wide Web
Facial Recognition System (20)
Visual Neuro Prosthetics
Multiple client's communication
Fluorescent Multilayer Optical Data Storage (21)
Wearable computers
DNA Based computer
Graphical Processing Unit (22)
The MBMS
Integrating Structural Design and Formal Methods in RealTime System Design
GRASSHOPPER Operating System (23)
Firewalls
ARM Processor
Security Issues In GRID COMPUTING (24)
Aspect oriented programming
REAL TIME OPERATING SYSTEM
HAVi: Home Audio Video Interoperability (25)
Voice Portals
SALT (Speech Application Language Tags)
HomeRF (26)
Narrow Band and Broad Band ISDN
Autonomic Computing
iSCSI: The future of Network Storage (27)
Hyper-Threading Technology
Trusted Network Connect (TNC) Specifications
The Mbone And Multicasting (28)
Sand Box Technology
Wi-Fi Hotspots
MANETS: Mobile Adhoc Networks (29)
Embedded Technology
Tape Drive Technologies - LTO (linear tape open) & SDLTS (Super Digital Linear
Tape)
Agent Based Computing (30)
Personal Satellite assistant Systems
Data Mining & Data Warehousing
OpenGL- application programming interface(31)
NEW STORAGE STRATEGY = Disk -Disk -Tape Back up
Micro Hard disk Drives
o Optical Disc Data Security (32)
o NRAM
o Turbo Codes
o Pluggable Authentication Modules (Pam) (36)
o Symbian
o eXtensible Bindings Language (XBL)
o Parallel Computing In Remote Sensing Data Processing (37)
o Stealth Virus
o Clockless Chip
o Samba Fileserver (38)
o Intelligent RAM : IRAM
o Genetic Programming
o Search Images By Appearance (39)
o Fire walls
o Virtual Keyboards
o Secure Socket Layer (SSL) (40)
o Access gateways
o DNA Computing
o Symbian OS (41)
o Trends in Mobiles & PC's
o Blue Ray - Future of DVD's
o Uniprocessor Virtual Memory Without TLBS (42)
o Cross Platform Component Object Model
o SUNSPOT (wireless sensor network)
o Virtual P.C. (43)
o Wearable computers
o Cryogenic Processor
Wearable Computers (44)
SIP
DNA Based Computing
Wi-Fi (802.11b) (45)
High Performance DSP Architectures
Java Cryptography Architecture (JCA)
Future of Satellite Communication (46)
Tablet PC
Image compression
4G Wireless Technology (47)
Choreography
Mobile agent
MPEG-7 (48)
Curl: A Gentle Slope Language For The Web
Genetic programming
High Speed Data In Mobile Networks (49)
JIRO Technology
Future of business Computing
Packet Interception (50)
Internet Telephony
Agile Software development
Crusoe Processors (51)
Peer to peer Networking
Clustering
Augmented Reality (52)
Encrypted Text chat Using Bluetooth
Ovonic Unified Memory
Serial ATA (SATA) (53)
Flexible CRT Displays
Cake PHPs
Night Vision Technology (54)
Automated Vehicle Detection System
Robocode
RAID (55)
Java Messaging Service (JMS)
Mobile Library Management
MANET:-The Art of Networking without a Network (56)
Online software Distribution
Smart Office
Virtual Network Computing (57)
Emergency Health Care System
Mail server Management
Ruby on Rails RoR (58)
Storage Farms
Unified Communication
Session Initiation Protocol (SIP) (59)
Distributed database management system
Content Management
Authentication and Key Agreement (AKA) (60)
Server side Java
Clinical Data Management
IDMA - Future of Wireless Technology (61)
GABOR Wavelet
Molecular Keypad Lock
Elliptical Curve Cryptography (62)
Parallel Computations
Software Engineering Advances
Computerized Paper Evaluation using Neural Network (63)
Transient Stability Assessment using Neural Networks
Network security - Trends & Methods
Data over Cable System (DOCSIS) (64)
Internet Cryptopraphy
DataBase Migration
Co-operative LINUX (65)
Split Range Syncronisation
MIMO
Virtualization Technology (66)
The Architecture of a Moletronics Computer
Data Security in Local Network using Distributed Firewalls
3D-DOCTOR (67)
Optical networking
Micro Mouse
Fluorescent Multilayer Disc (FMD) (68)
Near Filed Communication (NFC)
Quantum Computers
Datagram Congestion Control Protocol (DCCP) (69)
Encrypted Hard disks
Power Line Networking
Watermarking Digital Audio (70)
Nano Ring Memory
Split Range Synchronisation
o Holographic Versatile Disc (71)
o Grid Computing
o Java Class Loader
o Unbiquitos Smart Homes
o ZFS File system (72)
o Form Processing
o Site Search Engine
o Struts Integration
o Orthogonal Frequency Division Multiplplexing (73)
o Search Engine Optimisation
o Stereoscopic Projection Systems
o Virtual Reality Visualisation
o Surface-conduction Electron-emitter Display (SED) (74)
o Network Accelerators
o Mobile Infrastructure Management
o Voice Roaming
o Autonomic Computing (75)
o Mobile Casts
o Dual Energy X-ray Absorptiometry
o Third Generation
o Biometric Technology (76)
o Synchronous Optical Networking
o Jiro - Java-based technology
o Elliptical curve cryptography (ECC)
o Multiple Domain Orientation
Serial Attached SCSI (77)
X-Internet
Bandwidth estimation in broadband access networks
Virtual worlds come to life
Native Command Queuing (NCQ) (78)
Evolutionary Programming
Backup and Recovery planning
Main memory databases
Light Pen (79)
HAVi: Home Audio Video Interoperability
Mining the Web: Searching, Integration and Discovery
Mobile Paradigm
MAC address (80)
Java Cryptography Architecture (JCA)
Techniques for analysis, verification, validation of digital systems
Computational Photography
TETRA-Terrestrial Enhanced Trunked Radio (81)
Trends in Compiler Construction
Public Key Encryption And Digital Signature
Data Management in Sensor Networks
Global System for Mobiles (82)
Epsilon nets and transversal of hypergraphs
Basic Gnu Emacs
Computational neuroscience
Internet Networking
Personal Mass Media - Blogging, Syndication, Podcasting, and Vidcasting
Real Time Operating Systems
OpenTV (OPTV)
Introduction to LaTeX
Algorithms for networking
Recognition of VoIP Speech
Nonvolatile Flash Memory
Algorithms and Computation Theories
Probabilistic I/o Automata
Future Programming Techniques and Concepts
Advanced Processors
Peer 2 Peer Web Services
Information Extraction modes & techniques
Signal Integrity Fundamentals for Digital Design
Computer vision
Software model checking
WBM(Web based mobile)
Future of the internet
Technologies and successful applications for direct and multihop ad hoc networks
Digital photography & music
Embedded web server for remote access
VQ In Converging Telephony And Ip Networks
Proactive computing
Voice Portals
Auto-pilot for IT systems
Fuzzified Computer-Automated Crane Control System
GSM Security And Encryption
Wireless Application Protocol
New Age Graphics
Real Time Speech Translation
3D Internet
New Dimension of Data Security using Neural Networks and Numerical
Functions
HomeRF- localized wireless technology optimized for the home
environment
NVSRAM- Non Volatile Static RAM
Fusion Memory
Earth Simulator- Fastest Supercomputer
Graphic processing Unit
Open-Rar
High Altitude Aeronautical Platforms
Aspect-oriented programming (Aop)
Intel MMX Technology
Voice Over Internet Protocol
Internet Searching
Wireless Technologies (bluetooth, 802.11x, IRDA)
Tracking and Positioning of Mobiles in Telecommunication
DNA Based computer
ATM Virtual connections
Botnet Security Threats
VPN Server
Advanced Mobile Presence Technology
Power of Grid Computing
Embedded web server for remote access
Bio-metrics
Magnetic Random Access Memory
Intrution Detection System
Multiterabit Networks
Printed Memory Technology
High Capacity Flash Chips
Self Healing Computers
Mind Reading Phones
Blade Servers
Near Filed Communication (NFC)
UMA (Unlicensed Mobile Access)
Assisted GPS
Diskless Network storage Controller
DIGITAL HUBBUB
Agile Software development
HCI (Human Computer Interaction ) in software applications
Embedded systems
Infini band
The SAT (SIM Application Toolkit)
Computer forensics
Multiterabit networks
Virtual Key boards
Micro trends in Server Technology
FLEX 2
AJAX
DAta Mining
Extreme programming
Software synthesis for embedded systems
Small Computer System Interface
Advanced Airlines baggage management systems
The TIGER SHARC Processor
Laptop security using biometric sensors
Multicasing
REINS (Real Estate Information Network Systems)
Integrated Digital Enhanced Network(i-DEN)
Symfony (web application framework)
WiFiber
Direct Memory Access
Infini bridge
Cyberware
3D Object Extraction Using GIS Database
Page Stealer Process
3D Printers
Web Services in Gridcomputing
Qubit PC
CD Based Firewall
Decision diagrams in VLSI CAD
Bandwidth Aggregator
Atomic CPU
Fluorescent Multilayer Optical Data Storage
Email-Service & Webhosting
Virtual Integration
SMART Programming
Object Relational Mapping
ASpect Oriented Programmin
Steganography and digital watermarking
Verifying Infinite State Systems
New Generation Of Chips
Precision Image Search
Evolotion of bluetooth
Nanocrystal Memory Devices
Ultra Wideband Networking
Studying in a "Virtual University
AppleTalk
Combinatorial Optimization
Quantum Software And Quantum Computer Development
Metadata application profile
XML Query Languages
AMD Processors
Digital Video Encoding Formats
3-D Assembly Of Magnetic And Semiconducting Nanoparticles
Service oriented Architectures
Enterprise Service Bus
Phase Change Memory Technology
Object Oriented Design using Verilog HDL
WiBro
Zero Knowledge proofs
3-D Chip Stacking Technique
Integrating Structural Design and Formal Methods in RealTime System Design
Glass Glue
The Interactive Classroom
Embedded Computing
Wireless Internet
Quadrics Interconnection Networks
Home Automation using Handspring PDA
o Extreme Programming
o The TIGER SHARC Processor
o CoCoon
o Quantum dot lasers
o Firewalls
o Steganography - The art of hiding information
o Infini Bridge
o Symfony- web application framework for PHP5 projects
o Hybrid ARQ
o Genetic programming
o Intrusion Detection System
o Multiterabit networks
o WiFiber
o Planning And Synthesis Based On Workflows
o Orthogonal Frequency Division Multiple Access (OFDMA)
o Small Computer System Interface
o MiWi Wireless Protocol
o Fixed Mobile Convergence
o Waterproof Wireless Mouse
o Phase Change memory
o Kerberos
o Wireless Payment System
o Spam Assassin
o MST in telecommunication networks
o Embedded Viavoice(R) Technology
o Object Oriented Type Systems
Scalable streaming media system
Navigating the Internet
Cryptography and complexity
dns
Software defenses against malicious code
Admission/Overload Control of Web Servers
Structured peer-to-peer overlay networks
Wireless Metal Detection System
Magnetic Resonance Imaging
Worldwide Interoperatibility for Microwave Access (WiMAX)
Parallel Computing In India
64 BIT Computing
Data Security in Local Network using Distributed Firewalls
Resilient Packet Ring Technology
Membrane computing
Probabilistic data set generation
Scalable streaming media system
Atomic Scale Memory At A Silicon Surface
Perpendicular Recording
Next Generation Internet (NGI)
Further advanced network initiatives
Program Transformations For Verifying Protocols
OS Virtualisation
Dermal nanotech Display Architectures for media processing Data Integrity in SANS Frameworks for web Applications Chat Server SQL Server Integration HD Graphics Biologically Inspired Intelligent Computer Leased like mail Back Up Augmented Reality Storage Networking Digital Subscriber Line Web Server Zetaflops Computing Antivirus Protection Towards Photorealism Mobile Data Protection System Orthogonal frequency Division Multiplexing (OFDM) Fire Wall Bluetooth Based Smart Sensor Networks Novel routing protocols for wireless sensor networks
Cluster computing Stereoscopic Imaging
Free Space OpticsProbabilistic Process Algebra
Managing Data with emerging technologies
Tabling And Lazy Evaluation For Efficient Evaluation
Flash-OFDM: An Approach for All-IP Wireless Networking
Real-Time Computing and Communication
SPICE Simulation and Signal Integrity Principles for High Performance Digital Designs
Microsoft passport
Internet2
Security considerations in deploying wireless LANs (W-LANS) and GSM/UMTS
RESTful Web Services
Natural language processing
Web Services in Office Environment
QoS for Multimedia in Wireless Networks
Introspective networks
METS - Metadata Encoding and Transmission Standard
Pivot Vector Space Approach in Audio-Video Mixing
Performance analysis of multi-tiered software and hardware servers
A Radio Controlled Video Vehicle design
Proactive computing
RSS Feeds
Brainwave Technology
High Link Capacities for 4G: Aspects of MIMO Signal Processing
Wireless Network Planning Models: a comparative study for 2G, 3G, and beyond
Affective Computing
Chip design for tolerance of process variation
Scale-free topology in information networks
Visual Information Technology
Model Checking Multi-Threaded Java Programs
Weblogging
Cyberspace Classroom
Design And Optimization By Incremental Computation
web knowledge processing
data center planning and design
Impacts of contention on locking
Generic Framing Procedure
Trustworthy Computing
Automated Remote Data Logger
Small Computer System Interface
Computerized Paper Evaluation using Neural Network
iSCSI-Future of Network Storage
10 GIGABIT ETHERNET
IP Telephony
Adding Intelligence to Internet
Digital Multimedia Broadcasting (DMB)
Ext3 Filesystem
Interactive television
Architectural or compiler-level low-power techniques
Java Servlets
Internet Distributed Computing (Idc)
SALT- Speech Application Language Tags
Boot Sector Programming
Timing Attacks on Implementations
Prototype System Design for Telemedicine
Natural Language Processing
Parallel and Distributed Computation
Optical Burst Switching
Border Security Using Wireless Integrated Network Sensors (WINS)
GSM Security and Encryption
Quantum cryptography
Image Processing & Compression
DELAY tolerant networks
Membrane Keyboard
Cybernetics
Facility Layout Design using Genetic Algorithm
Design of 2-D Filters using a Parallel Processor Architecture
o Dynamically Reconfigurable Computing
o Industrial Applications using Neural Networks
o Optical Camoflague
o Causes of Failure in Web Applications
o Wireless Networked Digital Devices
o Software Agents
o OmniPeek Overview
o Cognitive Machines
o Machine Descriptions for Retargetable Compilation
o Methods of Machine Translation (MT)
o Computational Biology
o In-lining and Identification of duplicate code
o Thermomechanical Data Storage
o Programming Languages, Compilers, Data Flow Analysis
o Tracking Dynamic Data
o Verfication of Asynchronously communicating web services
o Admission/Overload Control of Web Servers
o Socket Programming
o Adding Intelligence to Internet
o Low Power UART Design for Serial Data Communication
o Compact peripheral component interconnect
o Light Tree
o Terrestrial Trunked Radio
o Smart Note Taker
o Networking via Message-Passing
o Data Security in Local Network using Distributed Firewalls
o Significance of real-time transport Protocol in VOIP
o New generations of mobile networks
Asynchronous timing analysis
Performance analysis of multi-tiered software and hardware servers
Array Liveness Analysis
Forensic Analysis for Network Security
Reconfigurable computing
Distributed Denial of Service Attacks
Cryptographic protocols
SALT ( Speech Application Language Tags)
Computer-supported Modeling and Reasoning
Security Engineering
Web Crawling
Automated Generation of Attack Signatures
control monitoring on difrent muchine with the help of computer
Speech Technology
Ubuntu-Linux for Human Beings
Google Earth
Daknet
Radio propagation modeling
The Mbone And Multicasting
Record pair classification techniques
Dynamic Cache Management Technique
PON Topologies
Implementation Of Zoom FFT
Adding Intelligence to Internet
Compiler techniques for multimedia codes on general-purpose architectures
Pluggable Authentication Modules (Pam)
Content Scrambling System
Pine and IMP - a New Web-Based Email Program
Intrution Detection System
3D optical Data Storage Technology
Modern Brain-Computer Interface
Remote OS Deployment
Multi Energy Based X-Ray Baggage Inspection System
Aspect-oriented programming (Aop)
Magneto resistive Random Access Memory (MRAM)
CAS (Conditional Access System)
Orthogonal Frequency Division Multiplplexing
Voice over Internet Protocol (VoIP)
Self Protecting Servers
The IKE protocol
Privacy and security of low-powered devices (rfid)
Distributed Hash Tables
Cryptography: Human-Centric Protocols
Re-architecting & Internet Protocols
Network Security and its Principles
Cryptography Application
"Arms race" in malware
Popular Security Protocols
Future use of biometric technology for security and authentication
Homeland security application
Natural Language Resources for Information Extraction
Meaning Based Multilingual Search Engine
Embedded Visual C++
Synchronization Problems and their classification
Aspect mining from Object Oriented Code
Limits of silicon technology
Symbolic vs. Computational view of security protocols
Benefits of Parallel and Distributed Computing
4g Wireless Systems
Peer-to-Peer Wireless Networks
AS2 protocol for file transfers
Client/server-based programming for Pocket PCs
Detecting Jamming attacks in Wireless Networks
High Speed Uplink Packet Access (HSUPA)
Re-coding of the system for Mobile Devices and Internet
Wireless Application Protocol
ATM Virtual Connections
DNA Computing in Security
Data Compression with Huffman Algorithms
0wn the Internet
OpenGPG encryption
Randomized Algorithms and Networking Hardware
Plastic Displays
Proxy-Based Internet Services
Trends in SiGE BiCMOS Technology
Low Power, Low Noise and High-Speed VLSI Circuits Using Quantum MOS Technology
SRAM Sense Amplifiers
Web addresses in non-Latin scripts
Network Security, The Hirschmann Way
Java rings
Style Translation for Human Motion
Internet access 'a human right' ?
Energy Recovery VLSI Design
Compilation issues in Object Oriented Programming Languages
'Next generation' wi-fi
Pattern-based intrusion detection
CMOS Analog Circuits for Wireless Communications
Programmable Interconnect Fabrics
Verifying infinite state systems
Video screens hit paper magazines
Web Browser Security
Digital Preservation
Cellonics Technology
TETRA-TErrestrial Trunked Radio
Virtual Network Computing
Adaptive query processing/optimization
Video game: Call of Duty: Modern Warfare 2
Migrating legacy devices to Ethernet
Dynamic spectrum management (DSM)
Industrial Connectivity: Passive Product Technology
Reconstruction of Solid Models from Oriented Point Sets
Holographic Storage Technologies
Glassfish
Wireless Printing
Apple iPad
What makes CSS so powerful?
Multi-Wafer Virtual Probe
Android mobiles
Program transformations for verifying protocols
Microarchitecture Level Power Management
Cloud Computing
GSM Security And Encryption
Metering net traffic
BT's super-fast broadband network
Cross Lingual Meaning Based Search
Distributed Visualization of Geometric Algorithms
Windows 7 - The new OPerating System
Semantic Web
Google Android- Mobile OS from Google
Fourth-Generation Broadband
Rise of internet social networking
Ubuntu-Linux for Human Beings
Vorbis
Data over Cable System (DOCSIS)
Secure multiparty computations without computers
Simultaneous Multithreading
Digital Visual Interface
top related