Computer Science Seminar Topics
a)
Id-based encryption schemes
b)
Computing the digits of the mathematical Pi
c)
E-Commerce and Digital Signatures
d)
SONET/SDH Communication
e)
Particle Swarm Optimization
f)
Multi Protocol Level Switching Virtual Private Network
g)
Voice over IP
h)
Quantum mechanical algorithms for hidden subgroups and related problems
i)
Persistent Data Structures
j)
Software Watermarking
k)
The challenges of software reliability & modeling
l)
Web Security
m)
Identity-based encryption
n)
Compiler Optimization:
o)
Some Recent Trends
p)
Web Service Standards for Data Mining
q)
Natural Language Generation
r)
07CS6007 Geometry in Sensor Networks
s)
Geometry in Sensor Networks
t)
Trustworthy Computing
u)
Software Metrics
v)
Infinite Games
w)
Automata over Infinite Words
x)
Dual Core Processor : Architectural Features
y)
Digital Video Encoding Formats
z)
Delay Tolerant Routing
aa)
Quorum Systems
bb)
Information Extraction
cc)
Named Entity Recognition
dd)
XML Query Languages
ee)
Geometry in Sensor Networks
ff)
Linear Time encoding/decoding of ordinary tree and hypertree
gg)
Semantic Web
hh)
Multicore Processors and their Architectures
ii)
IPv6
jj)
Electronic Money:
kk)
Underlying Mathematical Techniques
ll)
RTOS for Mobile Devices
mm)
Virtual Reality
nn)
Cache Coherence Problem
oo)
Parameterized Complexity
pp)
Mathematical Programming
qq)
Some topics in Digital Geometry
rr)
Core Sets in Computational Geometry
ss)
Some variants of mathematical programming
tt)
Code Transformation
uu)
Noisy text processing using machine learning methods
vv)
Mobile electronic payments
ww)
Secure data communication based on quantum effects
xx)
Infinite Automata and Formal Verification
yy)
Side Channel Attacks and its' counter measure for Block Cipher
zz)
Primes are of two kinds: probable and provable
aaa)
Are Mersenne primes only an obsession?
bbb)
Time Contract Algorithms
ccc)
Data communication in current and future wireless networks
ddd)
Parametric searching “ what it is and how to make it practical
eee)
Geometric applications in Sensor networks
fff)
Packing and covering
ggg)
Cache efficient algorithms
hhh)
Facility location and clustering
iii)
Some variants of mathematical programming
jjj)
Model Checking
|
kkk)
Decision diagrams in VLSI CAD
lll)
Mobile Agents
mmm)
Distributed File Systems
nnn)
Emotional Agents: Computing Models of Emotions
ooo)
Real Time Operating Systems Recent Trends
ppp)
Information Extraction
qqq)
Named Entity Recognition
rrr)
XML Query Languages
sss)
Stochastic Scheduling
ttt)
Intrusion detection in wireless networks
uuu)
Image steganography
vvv)
Ultra Wideband Networking
www)
Routing protocols in wireless sensor networks
xxx)
Clustering techniques in complex network
yyy)
Object Type System
zzz)
Code Transformation
aaaa)
Noisy text processing using machine learning methods
bbbb)
Low Level Object Oriented Languages
cccc)
Stochastic Scheduling
dddd)
Intrusion detection in wireless networks
eeee)
Image steganography
ffff)
Ultra Wideband Networking
gggg)
Routing protocols in wireless sensor networks
hhhh)
Clustering techniques in complex network
iiii)
Object Type System
jjjj)
Grammar Induction
kkkk)
Localization in Sensor Networks
llll)
Reversible logic ciruits: design and test issues
mmmm)
Digital Watermarking
nnnn)
Program Verification
oooo)
Quantum Cryptography
pppp)
Quantum Cryptanalysis
qqqq)
Simulation of entanglement with communication for distributed
rrrr)
Problem solving.
ssss)
Dual Core Processor : Architectural Features
tttt)
Digital Video Encoding Formats
uuuu)
Delay Tolerant Routing
vvvv)
Quorum Systems
wwww)
Mobile electronic payments
xxxx)
Secure data communication based on quantum effects
yyyy)
Algorithms for networking
zzzz)
Infinite Automata and Formal Verification
aaaaa)
Side Channel Attacks and its' counter measure for Block Cipher
bbbbb)
Salient aspects of the architecture of the Itanium CPU
ccccc)
Using the combination lemma: Proving upper bounds on the
ddddd)
Combinatorial complexity of unions.
eeeee)
Proving lower bounds using Holevo's result.
fffff)
Recommender System
ggggg)
Towards Object Oriented Design using Verilog HDL
hhhhh)
Real Time Operating Systems
iiiii)
Web services
jjjjj)
The spyware nightmare: The problems and possible solutions 2005
kkkkk)
Platform Architecture
lllll)
3G Cellular Telephone network
mmmmm)
Epsilon nets and transversal of hypergraphs
nnnnn)
Geometric Discrepancy
ooooo)
LP-Based Approximation Algorithms
ppppp)
Game theoretic issues in algorithms
|
A
Probabilistic Approach to Micropayment
A
cognitive radio approach for using of virtual unlicensed spectrum
AMD
Processors
ARGUMENTED
VIRTUAL REALIT
ARM
architecture
ARRAS
AND SENSORS
ATM
networks
AUGMNETED
VIRTUAL REALIT
Acid
rains
Advanced
Encryption Standard
Advanced
Queue Management Techniques
Agent
Mediated E-commerce
Agile
Software development
Analysing
Software Life Cycle of Different Program Paradigm
Ant
Colony optimization for routing in Mobile and Adhoc Networks
Antimeter
Application
of ANN in Data Mining of Medical Images
Application
of Genetic Algorithms in Network routing
Applications
of Graph Theory to Metabolic Pathways
Applications
of Soft Computing in Medical Image Analysis
Applications
of speech recognition
Approximate
string matching for Music retrieval
Archiever
Analyzer
Artificial
Intelligence in Machines
Artificial
Neural Networks
Aspect-oriented
programming (Aop
Aspects
of Database Security and Program Security
Attacks
on Smart Cards
Augmented
Reality
Authentication
Authentication
and Key Agreement (AKA
Authoring
environments for open source courseware
Auto-pilots
Automatic
number plate recognition
Autonomic
Computing
Autonomic
computing
BAR
CODES
BEANS
BIO
METRICS
BLOW
FISH
BLU-RA
DISC
BLUE
RAY DISKS
BRAIN
FINGER
BRAIN
FINGER PRINT TECHNOLOG
BRAIN
FINGER PRINT TECHNOLOGY
BRIAN
GATE TECHNOLOGY
Backup
and Recovery planning
Bandwidth
estimation in broadband access networks
Bio
Telemetry
Bio
metrics IRIS technique
Bio-Medical
Instrumentation and Signal analysis
BioComputers
Biometric
Secuirty
Biometric
Technology
Biometrics
Bionetric
Authentication
Bit
And Bytes
Bit
and bytes
Blogs
& their Creation
Blue
Ray
Blue
Tooth Technology
Blue-ray
disk
Bluetooth
technology
Botnet
Brain
computer interface
CASP
COMPLIERS
CRPTOGRAPHY
AND N/W SECURITY
CRYONICS
CRYPTOGRAPHY
Capacity
of Ad-hoc Wireless Networks
Captchas
Cd,dvd,ird
Cell
phones
Channel
Allocation Algortihms for Mobile Telephony
Chess
Algorithm
Choreography
Classification,
Clustering and Application in Intrusuion Detection System
Classification,
Clustering and their Application for Damage Detection in Mechanical
Structures
Cluster
computing
Clustering
Co-operative
LINUX
Collaborative
Mobile Environments
Comparative
study on Authoring Tools
Compressed
Domain Processing And Video Information System
Computational
Geometry in Drug Design
Computational
Intelligence and Linguistics
Computational
Photography
Computational
neuroscience
Computer
Forensics
Computer
hardware
Computer
peripherals
Computer
vision
Concurrent
Programming and Parallel distributed O.S.
Content
Management
Cooperative
Adaptive Cruise Control
Cross
Platform Component Object Model
Crusoe
Processors
Cryogenic
Processor
Cryptography
Cryptography
and steganography
Curl:
A Gentle Slope Language For The Web
Cyber
Crime and Security
Cyborgs
DATA
WARE HOSUING & MINING
DIGITAL
MOVIES
DISTRUBUTED
COMPUTING
DNA
Based computer
DNA
Computing
DRUG
DISCOVERY
DYNAMIC
SOURCE ROUTING PROTOCOL
Data
Management in Sensor Networks
Data
Mining and Data Warehousing
Data
Mining concepts & Models
Data
Pre Processing
Data
Warehouse
Data
mining through Active Learning
Data
over Cable System (DOCSIS
Data
warehousing
DataBase
Migration
DataWareHosuing
Database
Security
Dataflow
machines
Datagram
Congestion Control Protocol (DCCP
Dataset
Query algorithms in Streaming Mining
Datbase
management
Determining
Global States of Distributed Systems
Digital
Imaging
Digital
Jewellery
Digital
Media Broadcasting
Digital
Rights Management
Digital
Signal Processing and their applications
Digital
Video Editing
Digital
Visual Interface
Digital
audio
Distributed
Computing
Distributed
Firewalls
Distributed
Garbage Collection
Distributed
and Parallel Computing
Distributed
computing
Distributed
database management system
Dna
computing
Dual
Energy X-ray Absorptiometry
Dynamic
resource allocation in Grid Computing
Dynamic
spectrum access
E-Commerce
E-MINE:
A novel web mining approach
E-wallet
ELECTRONIC
CARDIO GRAM
ELLICA
Earning
Online Money
Earth
Simulator- Fastest Supercomputer
Efficiency
/ Comparative study of routing schemes in event based systems
Elliptical
Curve Cryptography(ECC
Embedded
Configurable Operating system
Embedded
Linux
Embedded
systems
Embedded
systems and vlsi an architectural approach to reduce leakage energy in memory
Embedded
web server for remote access
Embeded
Systems
Emergency
Health Care System
Emerging
trends in robotics using neural networks
Encrypted
Hard disks
Encrypted
Text chat Using Bluetooth
Energy
Efficient query Optimization
Enery
efficiency in Wireless sensor networks
Enterprise
Security
Epsilon
nets and transversal of hypergraphs
Ethernet
Ethical
Hacking
Ethical
hacking
Etl
tools(informatica)
Evolution
of computers
Evolutionary
Programming
Ext3
Filesystem
FIBER
CHANNELS
Facial
Recognition System
Fault
Tolerance in Virtual Machine Environments
Faultolerant
Routing in Mobile Ad-Hoc Network
Fiber
optic communication
Financial
Forecasting
Fine
Grained DataBase Security
Fine-grained
Access Control in Databases
Fingerprint
recognition system by neural networks
Firewalls
Flexible
CRT Displays
Fluorescent
Multilayer Disc (FMD
Fluorescent
Multilayer Optical Data Storage
Forecasting
Forecasting
using Double Exponential Smoothing Method
Form
Processing
Form
Wizard
Franchise
Mgnt System
Frequent
ItemSet Mining
Fusion
Memory
Future
Programming Techniques and Concepts
Future
of Satellite Communication
Future
of business Computing
Future
of the internet
Fuzzified
Computer-Automated Crane Control System
Fuzzy
Logic
GABOR
Wavelet
GAIT
RECOGNITION
GIMP
GLUCO
METER
GRASSHOPPER
Operating System
GSM
Security And Encryption
Generic
algorithm
Genetic
Algorithm
Genetic
Programming
Geographic
Versatile Dist
Geometric
Invariants in Biological Molecules
Gesture
recognition
Gigabit
networking
Global
Positioning System
Global
System for Mobiles
Global
positioning response system
Globalization
Gnu
Emacs
Google
or Yahoo Case Study
Graphical
Processing Unit
Grid
Computing
Grid
Data Farm for Petascale
Grid
computing
HACKERS
HAVi:
Home Audio Video Interoperability
HIGH
SPEED LANS
HOLOGRAPHIC
MEMORY
HONE
POTS
HONEY
POTS
HUMAN
AREA NETWORK
HYPER
THREAD TECHNOLOGY
Hackers
prospectivs
Hacking
Hapics
High
Altitude Aeronautical Platforms
High
Performance Clusters
High
Performance Computing
High
Performance DSP Architectures
High
Speed Data In Mobile Networks
Holographic
Memory
Holographic
Versatile Disc
Holt-Winters
technique for Financial Forecasting
HomeRF-
localized wireless technology optimized for the home environment
Honeypots
How
E-learning Works
Hyper-Threading
Technology
IDMA
The Future of Wireless Technology
INFORMATION
SECURITY
INTERFACES
IP
SPOOFING
IPODS
Image
compression
Image
processing and applications
Improving
tcp performance over mobile ad hoc networks
Information
Extraction from structured & Semi-structured data
Information
Extraction modes & techniques
Integrating
Structural Design and Formal Methods in RealTime System Design
Integration
of Parallel Database in a Service Oriented Architecture
Intel
MMX Technology
Intelligent
Patient Monitoring System
Intelligent
RAM : IRAM
Inter-Operabilty
of 802
Internet
Cryptopraphy
Internet
Networking
Internet
Searching
Internet
Telephony
Internet
version 2
Interupts
Introduction
to LaTeX
Introduction
to Speech Recognition
Ipod
Iris
scanning
Issues
in Middleware for Pervasive Computing
J2EE
Security
JIRO
Java-based technology
Java
Class Loader
Java
Cryptography Architecture (JCA
Java
Messaging Service (JMS
Java
Security
Kerberos
Kinetic
data structuring
Knowledge
discovery and Data Mining
LAN
PROTOCOL
LAN
PROTOCOL ARCHITECTURE
LOC
technology (Lab On a Chip
Layered
versioning for software configuration management
Leave
Mgnt System
Light
Pen
Light-trails
Lixto
suite
Lucid
Linx
eXtensible
Bindings Language (XBL
iSCSI:
The future of Network Storage
membrane
computing
multi-wordnets
multimedia-oriented
web based instructional system
|
MAC
address
MAGIC
SQUARES
MAIN
FRAMES
MANET:-The
Art of Networking without a Network
MPEG-7
Magnetic
RAM
Mail
server Management
Main
memory databases
Management
Information System
Managing
Data with emerging technologies
Matlab
(matrix lab)
Media
gateways
Mesh
Based Geometric data processing
Methods
in virtual networking
Methods
in virtual private networks
Micro
Hard disk Drives
Micro
Mouse
Micro
Total analysis systems
Micro
chip production using extreme uv lithography
Microcontroller
Based Automation
Microcontroller
Based Power Theft Identification
Middleware
architecture for Pervasive computing
Middleware
for Sensor Networks
Middleware
for Wireless Sensor Networks
Middleware
in Embedded Systems
Middleware
in embedded systems
Mining
Document Streams
Mining
the Web: Searching, Integration and Discovery
Mobile
Casts
Mobile
Computing
Mobile
Infrastructure Management
Mobile
Library Management
Mobile
Networking
Mobile
Paradigm
Mobile
ad hoc network
Mobile
agent
Mobile
communication
Molecular
Keypad Lock
Multi
Protocol Label Switching
Multi-Relational
Data Mining
Multi-application
Framework for Smart Cards
Multicast
Congestion Control
Multicast
Routing
Multimedia
Multimedia
Broadcasting via Satellite
Multiple
Domain Orientation
Multiple
client’s communication
NANO
TECHONOLGY
NETWORK
SECURITY
NVSRAM-
Non Volatile Static RAM
Nano
Ring Memory
Nano
computing
Nano-technology
and application
Narrow
Band and Broad Band ISDN
Native
Command Queuing (NCQ
Natural
Language Processor
Near
Filed Communication (NFC
Netowork
Security
Network
Accelerators
Network
Anomaly
Network
Management and Security
Network
Modeling and Simulation
Network
security with cryptography
Neural
networks and applications
New
Age Graphics
New
Dimension of Data Security using Neural Networks and Numerical Functions
New
storage strategy = Disk -Disk -Tape Back up
Night
Vision Technology
Nonvolatile
Flash Memory
OOPS
CONCEPTS
ORACLE
DATABASE 10g
Object
Persistence
Object
oriented technologies
Online
software Distribution
Ontological
Relation Discovery
Open
Source Technology
Open
‘ssh’
OpenGL-application
programming interface
Operating
systems
Optical
Disc Data Security
Optical
canoflague
Optical
networking
Optimization
of Protocol Stack for wireless networks
Oracle
RDBMS
Orthogonal
Frequency Division Multiplplexing
Ovonic
Unified Memory
Packet
Interception
Parallel
Computations
Parallel
Computing In Remote Sensing Data Processing
Parallel
computing
Parasitic
computing
Peer
to Peer and Overlay Networks
Peer
to peer Networking
Pen
Drive
Performance
Evaluation
Performance
Evaluation of IEEE 802
Personal
Mass Media Blogging, Syndication, Podcasting, and Vidcasting
Personal
Satellite assistant Systems
Personel
Digital assistance
Pervasive
computing
Plasma
Displays
Plasmonics
Pluggable
Authentication Modules (Pam
PolyBot
Modular, self-reconfigurable robots
Polymer
Memory
Porting
Device Drivers For The Solaris
Power
Line Networking
Proactive
Anomaly Detection
Proactive
Network Anomaly Detection
Proactive
computing
Probabilistic
I/o Automata
Public
Key Encryption And Digital Signature
QOS
in software server Firewalls
QoS
in Networking using active Networks
QoS
in VoIP
QoS
in Wireless LANs
Quad
core Module technology
Quality
of Service Routing in computer networks
Quality
of service in Differentiated Service Architecture
Quantum
computing
Quantum
teleportation
Query
Based Fine-grained PageRank
Query
Optimization
Query
Processing on Data Streams
RED
TACTON
RFID
: Comparative study of Collision Resolution Protocols
RFID
Security
Radio
Astronomy
Real
Time Operating Systems on Embedded ICs
Real
Time Speech Translation
Real
time communication in wireless sensor networks
Recognition
of VoIP Speech
Reconfigurable
Hardware in Wireless communication
Reconfigurable
computing
Recovery
in Main Memory Databases
Red
Tacton
Relational
Data Mining
Reliable
Multicast
Reliable
and Fault Tolerant Routing on Mobile Ad Hoc Network
Rendering
Maths on web with Java Swing
Revolutions
in the Operating System and Servers
Robocode
Root
cause Localization and analysis of faults[Autonomic Computing]
Routing
in Sensor Networks
Ruby
on Rails RoR
S/w
life cycle/affiliated programs
SALT
(Speech Application Language Tags
SERVELTS
SIMPUTERS
SMART
CARDS
SMART
QUILL
SPINTRONICS
SPYWARE
SSL-TLS
SUNSPOT
(wireless sensor network
SUPER
COMPUTER
Samba
Fileserver(38
Sand
Box Technology
Satellite
Networks
Satellite
communication
Scheduling
algorithm
Scheduling
in Embedded Multiprocessors
Search
Engine
Search
Engine Optimisation
Search
algorithm
Search
for extra terrestrial intelligence using satellite communication
Seasonal
and Adaptive Forecasting
Secure
Computing
Secure
Database Service
Secure
Socket Layer (SSL
Security
Issues In GRID COMPUTING
Security
Issues in Wireless Networks
Security
On Wireless LAN Adaptive cruise control
Security
of Open-Source Software
Security
threats in the World Wide Web
Semi
Supervised Learning using Gaussian Process
Semi-supervised
Learning using Graph Kernels
Sensor
Networks
Sensor
fusion for video surveillance
Serial
ATA (SATA
Serial
Attached SCSI
Servelts
Server
side Java
Server
virtualization
Session
Initiation Protocol (SIP
Signal
Integrity Fundamentals for Digital Design
Signal
Processing for Networking
Site
Search Engine
Smart
Card Standards
Smart
Dust
Sniffers
Soft
computing
Software
Architecture Analysis
Software
Code Security
Software
Testing & Quality Assurance
Software
advances in wireless communication (Cognitive Radio, Dynamic spectrum Access,
etc.
Software
model checking
Spatial
DataMining
Spectral
Methods for Graph Partitioning
Spin
monics
Split
Range Synchronization
Statistical
Forecasting
Stealth
Virus
Steganography.
The art of hiding information
Stereoscopic
Projection Systems
Storage
Farms
Storm
botnet
Struts
Integration
Study
of TGREP
Super
computer
Surface-conduction
Electron-emitter Display (SED
Symbian
OS
Synchronous
Optical Networking
TDMA
implementation for QoS routing in Ad Hoc Networks
TESTING
METHODS
TETRA-Terrestrial
Enhanced Trunked Radio
TOUCH
SCREEN SSTEM
Tablet
PC
Tablet-pc
Tape
Drive Technologies LTO
Task
Management
Techniques
for analysis, verification, validation of digital systems
Techniques
to aid property specification in Model Checking
Technotask
management
Telephony
Routing over IP
Teleportation
Text
Classification
Text
Classification Using Semi-supervised and Active Learning
The
Architecture of a Moletronics Computer
The
MBMS
The
Mbone And Multicasting
Third
Generation
Time
Complexity
Torents
Touch
Screen
Touch
screen technology
Tracking
and Positioning of Mobiles in Telecommunication
Transient
Stability Assessment using Neural Networks
Trends
in Compiler Construction
Trends
in Mobiles & PC’s
Trusted
Network Connect (TNC
Turbo
Codes
Twd
radar satellite communications
UMA
(Unlicensed Mobile Access
USB
Tape Drives
Ubiquitous
computing
Unbiquitos
Smart Homes
Unified
Communication
Uniprocessor
Virtual Memory Without TLBS
Using
Regular Expressions In java
VHDL
(VHSIC Hardware Description Language
VIRTUAL
REALITY
VOIP
Over Wireless LAN
VOIP
Security
VQ
In Converging Telephony And Ip Networks
Vertical
Cavity Surface Emitting Laser
Video
conference
Virtual
Keyboards
Virtual
Network Computing
Virtual
P.C.
Virtual
Private Networks(VPNs)
Virtual
Reality
Virtual
memory
Virtual
networking
Virtualization
Technology
Viruses
and Worms
Visual
Neuro Prosthetics
Visualization
and Computer Graphics
VoIP
in mobile phones
Voice
Over Internet Protocol
Voice
Portals
Voice
Roaming
Voice
Routing over IP Telephony
WATERFALL
MODEL
Watermarking
Digital Audio
Wearable
Computers
Web
Data Management
Web
Designing with HTML
Web
Search Results' Ranking: PageRank, HITS and Related Work
Web
Spam
Web
Technology
Web
browsers
Web
servers
Wi-
Fi Technology
Wi-Fi
(802.11b
Wimax
Windows
Vista
Wireless
Application Protocol
Wireless
Applications
Wireless
Connectivity for Rural Areas
Wireless
MAN
Wireless
Markup Language(WML
Wireless
Security
Wireless
Technologies (bluetooth, 802.11x, IRDA
Wireless
communication system
Wireless
sensor network
Wireless
technology
Working
of E-Mail
X-Internet
X-By-Wire
System , Communication Bus perspective
ZFS
File system
|
1.GLUCO
METER
2. MOBILE
COMPTING
3.
WIRELESS SENSOR NETWORKS
4. NANO
TECHNOLOGY
5. DYNAMIC
SOURCE ROUTING PROTOCOL
6. RSVP
7. BLUE
RAY DISKS
8. MIMO
TECHNOLOGY
9. BRAIN
FINGER
10.
CRYONICS
11. DRUG
DISCOVERY
12.
HOLOGRAPHIC MEMORY
13. RED
TACTON
14.
ELECTRONIC CARDIO GRAM
15. NANO
TECHONOLGY
16. BIO
METRICS
17. Form
Wizard
18.
Cryptography
19. Memory
20. Data
Pre Processing
21.
Interupts
22.
Servelts
23.
Servelts
24. Web
Technology
25.
Multimedia
26.
Hacking
27. Web
Spam
28. Blogs
& their Creation
29. Google
or Yahoo Case Study
30. Blogs &
their Creation
31. Google
or Yahoo Case Study
32.
Working of E-Mail
33. Using
Regular Expressions In java
34.
Earning Online Money
35.
Archiever Analyzer
36. Task
Management
37. Form
Wizard
38.
Franchise Mgnt System
39. Leave
Mgnt System
40. Blogs
& their Creation
41. Google
or Yahoo Case Study
42.
Working of E-Mail
43. Using
Regular Expressions In java
44.
Earning Online Money
45.
Archiever Analyzer
46. Task
Management
47. Form
Wizard
48.
Franchise Mgnt System
49. Leave
Mgnt System
50.
Earning Online Money
51.
Archiever Analyzer
52. Task
Management
53. Form
Wizard
54.
Franchise Mgnt System
55. MAGIC
SQUARES
56.
BANKING
57. ELLICA
58.
SPYWARE
59. GLUCO
METER
60. MOBILE
COMPTING
61.
WIRELESS SENSOR NETWORKS
62. NANO
TECHNOLOGY
63.
DYNAMIC SOURCE ROUTING PROTOCOL
64. RSVP
65.
Interupts
66.
Servelts
67.
Servelts
68. Web
Technology
69.
Multimedia
70.
Interupts
71. RSVP
72. CASP
73.
WIRELESS MESH NEWORK
74.
NETWORK SECURT
75.
VIRTUAL REALITY
76. WI-MAX
77.
WIRELESS COMMUNICATION
78. MESH
NETWORKING
79.
SPYWARE
80.
HACKERS
81. QOS
82.
WATERFALL MODEL
83.
WIRELESS SECURITY
84. HIGH
SPEED LANS
85.
INTERFACES
86. FIBER
CHANNELS
87. LAN
PROTOCOL ARCHITECTURE
88.
TESTING METHODS
89. OOPS
CONCEPTS
90.
WIRELESS SECURITY
91. HIGH
SPEED LANS
92.
INTERFACES
93. FIBER
CHANNELS
94. LAN
PROTOCOL ARCHITECTURE
95.
TESTING METHODS
96. OOPS
CONCEPTS
97.
SERVELTS
98. ARRAS
AND SENSORS
99.
COMPLIERS
100.
CRPTOGRAPHY AND N/W SECURITY
101. LAN
PROTOCOL
102. BEANS
1.Andriod
OS
2.Xen
Ware
3.Blue
Gene
4.Self
Defending networks
5.Cognition
& Perception
6.Network
Attached Storages
7.4G
& 5G
1)
PCI DSS security module
2)
AS2 protocol for file transfers
3)
PGP encryption technology
4)
OpenGPG encryption
6.
Spyware
7.
Quantum Computing
8.
Blue - Ray Disc
9.
Robotics
10.
RFID
11.
MANET
12.
WAP
13.
DNA Computing in security
14.
4g Wireless Systems
15.
HomeRF- localized wireless technology optimized for the home environment
16.
Internet Searching
17.
Zigbee
18.
Java Management Extensions (JMX) - component framework for building
intelligent network
19.
Earth Simulator- Fastest Supercomputer
20.
Home Networking
21.
TouchFLO Technology <
22.
Tracking and Positioning of Mobiles in Telecommunication
23.
3D Volume Storage
24.
Optical Networking and Dense Wavelength Division Multiplexing
25.
Software-Defined Radio <
26.
Space-time adaptive processing
27.
Secure File Transfer (use PGP, deflate or nay encryption method)
28.
A Secure GateWay
1Computational
Journalism
2Machine
Transliteration
3Monolingual
and Cross language information retrieval
4Intelligent
Tutoring Systems
5Intelligent
information Fusion
6Statistical
Machine Translation
7Median
Graphs and its Applications (in Computer Science)
8Logarithmic
Keying
9Metabolic
Networks
10Trust
in Mobile and Wireless Networks
11Wavelets
and its applications (in Computer Science)
12Web
Query Log Analysis
13Ontology
Servers
14New
Trends in Visual Cryptography
15Dynamic
Software Management in Mobile Computing Systems
16Brain
Computer Interfaces
17Incremental
Tensor Analysis: Applications
18Semantic
Text Similarity
2.
Platform Independent Enhanced Media Player
3.
Neural networks and fuzzy logic in unmanned aircraft
4.
ANN based character recognizer for mobile devices to help visually
challenged"
5.
Internet In Space
6.
Image Augmented Inertial Navigation System
7.
Efficient Resource Scheduling In Data Grid
8.
Imouse
9.
Intelligent transportation system using genetic algorithm for shortest
driving time
10.
Hiding sensative rule using distortion technique
11.
The Friend Locator
12.
Adaptive steganograp
|
1. Real
Time Operating Systems on Embedded ICs
2. Real
time communication in wireless sensor networks
3. Semi -
Supervised Learning using Graph Kernels
4.
Collaborative Mobile Environments
5. High
Performance Clusters
6.
Distributed Computing
7.
membrane computing
8.
Forecasting
9.
Forecasting
10.
Middleware architecture for Pervasive computing
11. Query
Optimization
12.
Software Code Security
13. Query
Optimization
14.
Network Anomaly
15. Study
of TGREP
16.
Forecasting
17.
Viruses and Worms
18.
Netowork Security
19.
Inter-Operabilty of 802.11e and 802.11
20. RFID
Security
21. Semi
Supervised Learning using Gaussian Process
22.
Quality of Service Routing in computer networks
23. Wireless
Security
24.
Wireless MAN
25.
multi-wordnets
26.
Light-trails
27. Fault
Tolerance in Virtual Machine Environments
28.
Wireless Connectivity for Rural Areas
29. VOIP
Security
30. Semi
Supervised Learning using Gaussian Process
31.
Efficiency / Comparative study of routing schemes in event based systems
32.
Rendering Maths on web with Java Swing
33.
Analysing Software Life Cycle of Different Program Paradigm.
34.
Authoring environments for open source courseware
35.
Integration of Parallel Database in a Service Oriented Architecture
36.
Ontological Relation Discovery
37. Issues
in Middleware for Pervasive Computing
38.
Wireless Connectivity for Rural Areas
39. Energy
Efficient query Optimization
40.
Semi-supervised Learning using Graph Kernels
41. Comparative
study on Authoring Tools
42.
network security
43.
Security Issues in Wireless Networks
44.
Layered versioning for software configuration management
45.
Cooperative Adaptive Cruise Control
46.
Telephony Routing over IP
47.
Virtual Private Networks(VPNs)
48.
Holt-Winters technique for Financial Forecasting
49.
Fine-grained Access Control in Databases
50. Secure
Database Service
51. QoS in
Wireless Lans
52.
Classification, Clustering and their Application for Damage Detection in
Mechanical Structures
53.
Middleware in embedded systems
54. Web
Search Results' Ranking: PageRank, HITS and Related Work
55.
Proactive Anomaly Detection
56.
Forecasting using Double Exponential Smoothing Method
57. Enery
efficiency in Wireless sensor networks
58.
Enterprise Security
59.
Seasonal and Adaptive Forecasting
60. Root
cause Localization and analysis of faults[Autonomic Computing]
61. RFID :
Comparative study of Collision Resolution Protocols
62.
Classification clustering and Applications to Intrusion Detection Systems.
63.
Faultolerant Routing in Mobile Ad-Hoc Network
64.
Channel Allocation Algortihms for Mobile Telephony
65.
Middleware for Wireless Sensor Networks
66.
Security On Wireless LAN Adaptive cruise control
67.
Middleware for Sensor Networks
68. Query
Based Fine-grained PageRank
69.
Classification, Clustering and Application in Intrusuion Detection System
70.
Financial Forecasting
71.
Wireless Security
72.
Autonomic computing
73. Sensor
Networks
74. QoS in
VoIP
75.
Proactive Network Anomaly Detection
76. RFID
77.
Middleware in Embedded Systems
78.
Wireless Security
79. Voice
Routing over IP Telephony
80.
Statistical Forecasting
81. QOS in
software server Firewalls
82.
Classification, Clustering and their Application for Damage Detection in
Mechanical Structures.
83. Fine
Grained DataBase Security
84. J2EE
Security
85.
Reliable and Fault Tolerant Routing on Mobile Ad Hoc Network.
86. VOIP
Over Wireless LAN
87.
Database Security
88.
Reliable Multicast
89.
Multicast Congestion Control
90.
Capacity of Ad-hoc Wireless Networks
91.
Performance Evaluation of IEEE 802.11
92.
Quality of service in Differentiated Service Architecture
93.
Routing in Sensor Networks
94. TDMA
implementation for QoS routing in Ad Hoc Networks
95. case
Study : A X-By-Wire System , Communication Bus perspective
96.
Approximate string matching for Music retrieval
97.
Spectral Methods for Graph Partitioning
98. Signal
Processing for Networking
99.
Spatial DataMining
100.
Bionetric Authentication
101.
Aspects of Database Security and Program Security
102.
Attacks on Smart Cards
103. Smart
Card Standards
104. A
Probabilistic Approach to Micropayment
105. Java
Security
106.
Information Extraction
107.
Clustering (Data Mining)
108.
Frequent ItemSet Mining
109.
Classification Techniques in Data Mining
110.
Multi-Relational Data Mining
111.
Object Persistence
112.
Distributed Garbage Collection
113. Agent
Mediated E-commerce
114.
Recovery in Main Memory Databases
115.
Optimization of Protocol Stack for wireless networks
116.
Compressed Domain Processing And Video Information System
117.
Introduction to Speech Recognition
118.
Reconfigurable Hardware in Wireless communication
119.
Applications of speech recognition
120.
Geometric Invariants in Biological Molecules
121.
Applications of Graph Theory to Metabolic Pathways
122.
Computational Geometry in Drug Design
123. Query
Processing on Data Streams
124.
Multi-application Framework for Smart Cards
125.
Semi-supervised Learning
126. Data
mining through Active Learning
127. Text
Classification Using Semi-supervised and Active Learning
128.
Relational Data Mining
129.
Dataset Query algorithms in Streaming Mining
130.
Mining Document Streams
131.
Information Extraction from structured & Semi-structured data
132.
Digital Video Editing
133.
Determining Global States of Distributed Systems
134. Multi
Protocol Label Switching
135. QoS
in Wireless LANs
136.
Advanced Queue Management Techniques
137.
Techniques to aid property specification in Model Checking
13.
A wireless technology for Young generation
14.
Facial Analysis Between Age Groups Using Distance Matrices
15.
Double talk detector using echo path estimate
16.
Inconspicuous threats to Mobile Computing security
17.
Establishment of emergency, portable, bidirectional
18.
Gait as a biometric for human recognition
19.
Emulation of peer to peer botnets
|
A
BASIC TOUCH-SENSOR SCREEN SYSTEM
Artificial
Eye
Animatronics
Automatic
Teller Machine
Aircars
Adding
interlligence to ineternet using satellite
ADSL
Aeronautical
Communications
Agent
oriented programing
Animatronics
Augmented
reality
Autonomic
Computing
Bicmos
technology
BIOCHIPS
Biomagnetism
Biometric
technology
BLUE
RAY
Boiler
Instrumentation
Brain-Computer
Interface
Bluetooth
Based Smart Sensor Networks
BIBS
CDMA
Wireless Data Transmitter
Cellonics
Technology
Cellular
Positioning
ZIGBEE
Cruise
Control Devices
Crusoe
Processor
PGP
encryption technology
Generic
visual perception processor
Nanotechnology
Assembler Design And Nano-Communication
MANETS:
Mobile Adhoc Networks
Liquid
Crystal on Silicon Display (LCOS)
Jini
- advanced set of network protocols
Computer
memory based on the protein bacterio-rhodopsin
CSS
and DeCSS
Multimedia
Broadcast Multicast Service (MBMS)
Extreme
Programming (XP)
Holographic
Versatile Disc
Zero
Knowledge proofs
Bimolecular
Computers
SPINS
-Security Protocol For Sensor Network
Context
Disambiguation On Web Search Results
Surface
Computer
Project
Oxygen
Survivable
Networks Systems
Self
Organizing Maps
Symbian OS
Ubiquitous
Networking
Ultra Wide
Band
Virtual
Keyboard
Virus and
Anti Viruses
Virtual
network computing
Wearable
Computers
Wireless
intelligent network
Adding
Intelligence to Internet
Extreme
Programming
FRAM
IEEE
802.11n –New Generation Wireless Standard
Free Space
Optics
GMPLS
Grid
Computing
HIGH SPEED
DATA IN MOBILE NETWORKS
Human
Computer Interface
INTERNET
DISTRIBUTED COMPUTING
Intel
Centrino Mobile Technology
Computer
Human Interface
Java Card
FACE
RECOGNITION USING Neural Network
iSCSI
RFID
Agent
oriented Programming
Animatronics
Augmented
Reality
Autonomic
Computing
Bio chips
Reconstruction
of Recorded Sound
BIOMETRICS
Blu-ray
Disc
Cellular
Digital Packet Data
Crusoe
processor
DiffServ
Digital
Theater System
Extreme
Ultraviolet Lithography
HPJava
Hurd
Hyper
Threading
Imode
IP
spoofing
|
Light tree
Itanium
Processor
Local
Multipoint Distribution Service
M-COMMERCE
Windows
DNA
Halo
Networks
MiniDisc
Modular
Computing
Parasitic
Computing
Resilient
Packet Ring Technology
Shallow
Water Acoustic Networks
Tempest
and Echelon
10 GB
ETHERNET
Multimedia
Conferencing
MPEG-7
Parasitic
Computing
Resilient
Packet Ring Technology
Space
Mouse
Smart
Sensors
Linux
Kernel Release 2.6
SPINS
-Security Protocol For Sensor Network
Generic
visual perception processor
Nanotechnology
Assembler Design And Nano-Communication
Tele-Immersion
Liquid
Crystal on Silicon Display (LCOS)
Jini
- advanced set of network protocols
Computer
memory based on the protein bacterio-rhodopsin
CSS
and DeCSS
Multimedia
Broadcast Multicast Service (MBMS)
Extreme
Programming (XP)
Holographic
Versatile Disc
Zero
Knowledge proofs
Bimolecular
Computers
Context
Disambiguation On Web Search Results
Touch
Screen Technology
Surface
Computer
Face
Recognition Technology
4G
Wireless Systems
Zone Based
Ant Colony Routing In MANET
Confidential
Data Storage and Deletion
Emotional
Annotation of Text
Audio
CAPTCHA: Existing solutions assessment and a new implementation for VoIP
telephony
Co-operative
Linux
Security
Challenge and Defense in VoIP Infrastructures
CAPTCHA
security for Phishing: Secure or not?
An Energy
Aware Framework for Dynamic Software Management in Mobile Computing Systems
Artificial
passenger
Fluorescent
Multilayer Disc (FMD
LOGARITHMIC
KEYING
Model
checking for Securing E-commerce transaction
DNSSEC: A
Protocol towards securing the Internet Infrastructure
Brain
Machine Interface
Self
Healing Robots
Multi
Touch
Bio
Inspired Computing
Image
Compression Using Wedgelets
PILL
CAMERA
Java Ring
Robotic
Surgery
The
Artificial Brain
OpenSocial
Cell Phone
Virus and Security
Advancements
Towards 4G
Service
Oriented Architecture (SOA)
Bubble
sensing
A Search
Engine for 3D Models
Artificial
Neural Network (ANN)
CONTEXT
ORIENTED PROGRAMMING
SMART CARD
INTERNET
PROTOCOL TELEVISION (IPTV)
WiMAX
Inferno OS
Session
Initiation Protocol (SIP)
Intelligent
Network (IN)
SMARTSHADER
Dynamic 3D
Scene Analysis from a Moving Vehicle
E-Intelligence
Grid
Network
TRACKING
AND POSITIONING OF MOBILE PHONES
Simple SAN
& Storage Resource Management in Microsoft® Windows Server™ 2003 R2
Cloud
computing
Blue eyes
Smart Note
Taker
FireWire
Iris
Scanning
Swarm
intelligence
Biomagnetism
LwIP
Mobile IP
NRAM
Power Line
Communications
|
No comments:
Post a Comment