1/2/12

Computer Science Seminar Topics

Computer Science Seminar Topics
a) Id-based encryption schemes
b) Computing the digits of the mathematical Pi
c) E-Commerce and Digital Signatures
d) SONET/SDH Communication
e) Particle Swarm Optimization
f) Multi Protocol Level Switching Virtual Private Network
g) Voice over IP
h) Quantum mechanical algorithms for hidden subgroups and related problems
i) Persistent Data Structures
j) Software Watermarking
k) The challenges of software reliability & modeling
l) Web Security
m) Identity-based encryption
n) Compiler Optimization:
o) Some Recent Trends
p) Web Service Standards for Data Mining
q) Natural Language Generation
r) 07CS6007 Geometry in Sensor Networks
s) Geometry in Sensor Networks
t) Trustworthy Computing
u) Software Metrics
v) Infinite Games
w) Automata over Infinite Words
x) Dual Core Processor : Architectural Features
y) Digital Video Encoding Formats
z) Delay Tolerant Routing
aa) Quorum Systems
bb) Information Extraction
cc) Named Entity Recognition
dd) XML Query Languages
ee) Geometry in Sensor Networks
ff) Linear Time encoding/decoding of ordinary tree and hypertree
gg) Semantic Web
hh) Multicore Processors and their Architectures
ii) IPv6
jj) Electronic Money:
kk) Underlying Mathematical Techniques
ll) RTOS for Mobile Devices
mm) Virtual Reality
nn) Cache Coherence Problem
oo) Parameterized Complexity
pp) Mathematical Programming
qq) Some topics in Digital Geometry
rr) Core Sets in Computational Geometry
ss) Some variants of mathematical programming
tt) Code Transformation
uu) Noisy text processing using machine learning methods
vv) Mobile electronic payments
ww) Secure data communication based on quantum effects
xx) Infinite Automata and Formal Verification
yy) Side Channel Attacks and its' counter measure for Block Cipher
zz) Primes are of two kinds: probable and provable
aaa) Are Mersenne primes only an obsession?
bbb) Time Contract Algorithms
ccc) Data communication in current and future wireless networks
ddd) Parametric searching “ what it is and how to make it practical
eee) Geometric applications in Sensor networks
fff) Packing and covering
ggg) Cache efficient algorithms
hhh) Facility location and clustering
iii) Some variants of mathematical programming
jjj) Model Checking

kkk) Decision diagrams in VLSI CAD
lll) Mobile Agents
mmm) Distributed File Systems
nnn) Emotional Agents: Computing Models of Emotions
ooo) Real Time Operating Systems Recent Trends
ppp) Information Extraction
qqq) Named Entity Recognition
rrr) XML Query Languages
sss) Stochastic Scheduling
ttt) Intrusion detection in wireless networks
uuu) Image steganography
vvv) Ultra Wideband Networking
www) Routing protocols in wireless sensor networks
xxx) Clustering techniques in complex network
yyy) Object Type System
zzz) Code Transformation
aaaa) Noisy text processing using machine learning methods
bbbb) Low Level Object Oriented Languages
cccc) Stochastic Scheduling
dddd) Intrusion detection in wireless networks
eeee) Image steganography
ffff) Ultra Wideband Networking
gggg) Routing protocols in wireless sensor networks
hhhh) Clustering techniques in complex network
iiii) Object Type System
jjjj) Grammar Induction
kkkk) Localization in Sensor Networks
llll) Reversible logic ciruits: design and test issues
mmmm) Digital Watermarking
nnnn) Program Verification
oooo) Quantum Cryptography
pppp) Quantum Cryptanalysis
qqqq) Simulation of entanglement with communication for distributed
rrrr) Problem solving.
ssss) Dual Core Processor : Architectural Features
tttt) Digital Video Encoding Formats
uuuu) Delay Tolerant Routing
vvvv) Quorum Systems
wwww) Mobile electronic payments
xxxx) Secure data communication based on quantum effects
yyyy) Algorithms for networking
zzzz) Infinite Automata and Formal Verification
aaaaa) Side Channel Attacks and its' counter measure for Block Cipher
bbbbb) Salient aspects of the architecture of the Itanium CPU
ccccc) Using the combination lemma: Proving upper bounds on the
ddddd) Combinatorial complexity of unions.
eeeee) Proving lower bounds using Holevo's result.
fffff) Recommender System
ggggg) Towards Object Oriented Design using Verilog HDL
hhhhh) Real Time Operating Systems
iiiii) Web services
jjjjj) The spyware nightmare: The problems and possible solutions 2005
kkkkk) Platform Architecture
lllll) 3G Cellular Telephone network
mmmmm) Epsilon nets and transversal of hypergraphs
nnnnn) Geometric Discrepancy
ooooo) LP-Based Approximation Algorithms
ppppp) Game theoretic issues in algorithms               


A Probabilistic Approach to Micropayment
A cognitive radio approach for using of virtual unlicensed spectrum
AMD Processors
ARGUMENTED VIRTUAL REALIT
ARM architecture
ARRAS AND SENSORS
ATM networks
AUGMNETED VIRTUAL REALIT
Acid rains
Advanced Encryption Standard
Advanced Queue Management Techniques
Agent Mediated E-commerce
Agile Software development
Analysing Software Life Cycle of Different Program Paradigm
Ant Colony optimization for routing in Mobile and Adhoc Networks
Antimeter
Application of ANN in Data Mining of Medical Images
Application of Genetic Algorithms in Network routing
Applications of Graph Theory to Metabolic Pathways
Applications of Soft Computing in Medical Image Analysis
Applications of speech recognition
Approximate string matching for Music retrieval
Archiever Analyzer
Artificial Intelligence in Machines
Artificial Neural Networks
Aspect-oriented programming (Aop
Aspects of Database Security and Program Security
Attacks on Smart Cards
Augmented Reality
Authentication
Authentication and Key Agreement (AKA
Authoring environments for open source courseware
Auto-pilots
Automatic number plate recognition
Autonomic Computing
Autonomic computing
BAR CODES
BEANS
BIO METRICS
BLOW FISH
BLU-RA DISC
BLUE RAY DISKS
BRAIN FINGER
BRAIN FINGER PRINT TECHNOLOG
BRAIN FINGER PRINT TECHNOLOGY
BRIAN GATE TECHNOLOGY
Backup and Recovery planning
Bandwidth estimation in broadband access networks
Bio Telemetry
Bio metrics IRIS technique
Bio-Medical Instrumentation and Signal analysis
BioComputers
Biometric Secuirty
Biometric Technology
Biometrics
Bionetric Authentication
Bit And Bytes
Bit and bytes
Blogs & their Creation
Blue Ray
Blue Tooth Technology
Blue-ray disk
Bluetooth technology
Botnet
Brain computer interface
CASP
COMPLIERS
CRPTOGRAPHY AND N/W SECURITY
CRYONICS
CRYPTOGRAPHY
Capacity of Ad-hoc Wireless Networks
Captchas
Cd,dvd,ird
Cell phones
Channel Allocation Algortihms for Mobile Telephony
Chess Algorithm
Choreography
Classification, Clustering and Application in Intrusuion Detection System
Classification, Clustering and their Application for Damage Detection in Mechanical Structures
Cluster computing
Clustering
Co-operative LINUX
Collaborative Mobile Environments
Comparative study on Authoring Tools
Compressed Domain Processing And Video Information System
Computational Geometry in Drug Design
Computational Intelligence and Linguistics
Computational Photography
Computational neuroscience
Computer Forensics
Computer hardware
Computer peripherals
Computer vision
Concurrent Programming and Parallel distributed O.S.
Content Management
Cooperative Adaptive Cruise Control
Cross Platform Component Object Model
Crusoe Processors
Cryogenic Processor
Cryptography
Cryptography and steganography
Curl: A Gentle Slope Language For The Web
Cyber Crime and Security
Cyborgs
DATA WARE HOSUING & MINING
DIGITAL MOVIES
DISTRUBUTED COMPUTING
DNA Based computer
DNA Computing
DRUG DISCOVERY
DYNAMIC SOURCE ROUTING PROTOCOL
Data Management in Sensor Networks
Data Mining and Data Warehousing
Data Mining concepts & Models
Data Pre Processing
Data Warehouse
Data mining through Active Learning
Data over Cable System (DOCSIS
Data warehousing
DataBase Migration
DataWareHosuing
Database Security
Dataflow machines
Datagram Congestion Control Protocol (DCCP
Dataset Query algorithms in Streaming Mining
Datbase management
Determining Global States of Distributed Systems
Digital Imaging
Digital Jewellery
Digital Media Broadcasting
Digital Rights Management
Digital Signal Processing and their applications
Digital Video Editing
Digital Visual Interface
Digital audio
Distributed Computing
Distributed Firewalls
Distributed Garbage Collection
Distributed and Parallel Computing
Distributed computing
Distributed database management system
Dna computing
Dual Energy X-ray Absorptiometry
Dynamic resource allocation in Grid Computing
Dynamic spectrum access
E-Commerce
E-MINE: A novel web mining approach
E-wallet
ELECTRONIC CARDIO GRAM
ELLICA
Earning Online Money
Earth Simulator- Fastest Supercomputer
Efficiency / Comparative study of routing schemes in event based systems
Elliptical Curve Cryptography(ECC
Embedded Configurable Operating system
Embedded Linux
Embedded systems
Embedded systems and vlsi an architectural approach to reduce leakage energy in memory
Embedded web server for remote access
Embeded Systems
Emergency Health Care System
Emerging trends in robotics using neural networks
Encrypted Hard disks
Encrypted Text chat Using Bluetooth
Energy Efficient query Optimization
Enery efficiency in Wireless sensor networks
Enterprise Security
Epsilon nets and transversal of hypergraphs
Ethernet
Ethical Hacking
Ethical hacking
Etl tools(informatica)
Evolution of computers
Evolutionary Programming
Ext3 Filesystem
FIBER CHANNELS
Facial Recognition System
Fault Tolerance in Virtual Machine Environments
Faultolerant Routing in Mobile Ad-Hoc Network
Fiber optic communication
Financial Forecasting
Fine Grained DataBase Security
Fine-grained Access Control in Databases
Fingerprint recognition system by neural networks
Firewalls
Flexible CRT Displays
Fluorescent Multilayer Disc (FMD
Fluorescent Multilayer Optical Data Storage
Forecasting
Forecasting using Double Exponential Smoothing Method
Form Processing
Form Wizard
Franchise Mgnt System
Frequent ItemSet Mining
Fusion Memory
Future Programming Techniques and Concepts
Future of Satellite Communication
Future of business Computing
Future of the internet
Fuzzified Computer-Automated Crane Control System
Fuzzy Logic
GABOR Wavelet
GAIT RECOGNITION
GIMP
GLUCO METER
GRASSHOPPER Operating System
GSM Security And Encryption
Generic algorithm
Genetic Algorithm
Genetic Programming
Geographic Versatile Dist
Geometric Invariants in Biological Molecules
Gesture recognition
Gigabit networking
Global Positioning System
Global System for Mobiles
Global positioning response system
Globalization
Gnu Emacs
Google or Yahoo Case Study
Graphical Processing Unit
Grid Computing
Grid Data Farm for Petascale
Grid computing
HACKERS
HAVi: Home Audio Video Interoperability
HIGH SPEED LANS
HOLOGRAPHIC MEMORY
HONE POTS
HONEY POTS
HUMAN AREA NETWORK
HYPER THREAD TECHNOLOGY
Hackers prospectivs
Hacking
Hapics
High Altitude Aeronautical Platforms
High Performance Clusters
High Performance Computing
High Performance DSP Architectures
High Speed Data In Mobile Networks
Holographic Memory
Holographic Versatile Disc
Holt-Winters technique for Financial Forecasting
HomeRF- localized wireless technology optimized for the home environment
Honeypots
How E-learning Works
Hyper-Threading Technology
IDMA The Future of Wireless Technology
INFORMATION SECURITY
INTERFACES
IP SPOOFING
IPODS
Image compression
Image processing and applications
Improving tcp performance over mobile ad hoc networks
Information Extraction from structured & Semi-structured data
Information Extraction modes & techniques
Integrating Structural Design and Formal Methods in RealTime System Design
Integration of Parallel Database in a Service Oriented Architecture
Intel MMX Technology
Intelligent Patient Monitoring System
Intelligent RAM : IRAM
Inter-Operabilty of 802
Internet Cryptopraphy
Internet Networking
Internet Searching
Internet Telephony
Internet version 2
Interupts
Introduction to LaTeX
Introduction to Speech Recognition
Ipod
Iris scanning
Issues in Middleware for Pervasive Computing
J2EE Security
JIRO Java-based technology
Java Class Loader
Java Cryptography Architecture (JCA
Java Messaging Service (JMS
Java Security
Kerberos
Kinetic data structuring
Knowledge discovery and Data Mining
LAN PROTOCOL
LAN PROTOCOL ARCHITECTURE
LOC technology (Lab On a Chip
Layered versioning for software configuration management
Leave Mgnt System
Light Pen
Light-trails
Lixto suite
Lucid Linx
eXtensible Bindings Language (XBL
iSCSI: The future of Network Storage
membrane computing
multi-wordnets
multimedia-oriented web based instructional system

MAC address
MAGIC SQUARES
MAIN FRAMES
MANET:-The Art of Networking without a Network
MPEG-7
Magnetic RAM
Mail server Management
Main memory databases
Management Information System
Managing Data with emerging technologies
Matlab (matrix lab)
Media gateways
Mesh Based Geometric data processing
Methods in virtual networking
Methods in virtual private networks
Micro Hard disk Drives
Micro Mouse
Micro Total analysis systems
Micro chip production using extreme uv lithography
Microcontroller Based Automation
Microcontroller Based Power Theft Identification
Middleware architecture for Pervasive computing
Middleware for Sensor Networks
Middleware for Wireless Sensor Networks
Middleware in Embedded Systems
Middleware in embedded systems
Mining Document Streams
Mining the Web: Searching, Integration and Discovery
Mobile Casts
Mobile Computing
Mobile Infrastructure Management
Mobile Library Management
Mobile Networking
Mobile Paradigm
Mobile ad hoc network
Mobile agent
Mobile communication
Molecular Keypad Lock
Multi Protocol Label Switching
Multi-Relational Data Mining
Multi-application Framework for Smart Cards
Multicast Congestion Control
Multicast Routing
Multimedia
Multimedia Broadcasting via Satellite
Multiple Domain Orientation
Multiple client’s communication
NANO TECHONOLGY
NETWORK SECURITY
NVSRAM- Non Volatile Static RAM
Nano Ring Memory
Nano computing
Nano-technology and application
Narrow Band and Broad Band ISDN
Native Command Queuing (NCQ
Natural Language Processor
Near Filed Communication (NFC
Netowork Security
Network Accelerators
Network Anomaly
Network Management and Security
Network Modeling and Simulation
Network security with cryptography
Neural networks and applications
New Age Graphics
New Dimension of Data Security using Neural Networks and Numerical Functions
New storage strategy = Disk -Disk -Tape Back up
Night Vision Technology
Nonvolatile Flash Memory
OOPS CONCEPTS
ORACLE DATABASE 10g
Object Persistence
Object oriented technologies
Online software Distribution
Ontological Relation Discovery
Open Source Technology
Open ‘ssh’
OpenGL-application programming interface
Operating systems
Optical Disc Data Security
Optical canoflague
Optical networking
Optimization of Protocol Stack for wireless networks
Oracle RDBMS
Orthogonal Frequency Division Multiplplexing
Ovonic Unified Memory
Packet Interception
Parallel Computations
Parallel Computing In Remote Sensing Data Processing
Parallel computing
Parasitic computing
Peer to Peer and Overlay Networks
Peer to peer Networking
Pen Drive
Performance Evaluation
Performance Evaluation of IEEE 802
Personal Mass Media Blogging, Syndication, Podcasting, and Vidcasting
Personal Satellite assistant Systems
Personel Digital assistance
Pervasive computing
Plasma Displays
Plasmonics
Pluggable Authentication Modules (Pam
PolyBot Modular, self-reconfigurable robots
Polymer Memory
Porting Device Drivers For The Solaris
Power Line Networking
Proactive Anomaly Detection
Proactive Network Anomaly Detection
Proactive computing
Probabilistic I/o Automata
Public Key Encryption And Digital Signature
QOS in software server Firewalls
QoS in Networking using active Networks
QoS in VoIP
QoS in Wireless LANs
Quad core Module technology
Quality of Service Routing in computer networks
Quality of service in Differentiated Service Architecture
Quantum computing
Quantum teleportation
Query Based Fine-grained PageRank
Query Optimization
Query Processing on Data Streams
RED TACTON
RFID : Comparative study of Collision Resolution Protocols
RFID Security
Radio Astronomy
Real Time Operating Systems on Embedded ICs
Real Time Speech Translation
Real time communication in wireless sensor networks
Recognition of VoIP Speech
Reconfigurable Hardware in Wireless communication
Reconfigurable computing
Recovery in Main Memory Databases
Red Tacton
Relational Data Mining
Reliable Multicast
Reliable and Fault Tolerant Routing on Mobile Ad Hoc Network
Rendering Maths on web with Java Swing
Revolutions in the Operating System and Servers
Robocode
Root cause Localization and analysis of faults[Autonomic Computing]
Routing in Sensor Networks
Ruby on Rails RoR
S/w life cycle/affiliated programs
SALT (Speech Application Language Tags
SERVELTS
SIMPUTERS
SMART CARDS
SMART QUILL
SPINTRONICS
SPYWARE
SSL-TLS
SUNSPOT (wireless sensor network
SUPER COMPUTER
Samba Fileserver(38
Sand Box Technology
Satellite Networks
Satellite communication
Scheduling algorithm
Scheduling in Embedded Multiprocessors
Search Engine
Search Engine Optimisation
Search algorithm
Search for extra terrestrial intelligence using satellite communication
Seasonal and Adaptive Forecasting
Secure Computing
Secure Database Service
Secure Socket Layer (SSL
Security Issues In GRID COMPUTING
Security Issues in Wireless Networks
Security On Wireless LAN Adaptive cruise control
Security of Open-Source Software
Security threats in the World Wide Web
Semi Supervised Learning using Gaussian Process
Semi-supervised Learning using Graph Kernels
Sensor Networks
Sensor fusion for video surveillance
Serial ATA (SATA
Serial Attached SCSI
Servelts
Server side Java
Server virtualization
Session Initiation Protocol (SIP
Signal Integrity Fundamentals for Digital Design
Signal Processing for Networking
Site Search Engine
Smart Card Standards
Smart Dust
Sniffers
Soft computing
Software Architecture Analysis
Software Code Security
Software Testing & Quality Assurance
Software advances in wireless communication (Cognitive Radio, Dynamic spectrum Access, etc.
Software model checking
Spatial DataMining
Spectral Methods for Graph Partitioning
Spin monics
Split Range Synchronization
Statistical Forecasting
Stealth Virus
Steganography. The art of hiding information
Stereoscopic Projection Systems
Storage Farms
Storm botnet
Struts Integration
Study of TGREP
Super computer
Surface-conduction Electron-emitter Display (SED
Symbian OS
Synchronous Optical Networking
TDMA implementation for QoS routing in Ad Hoc Networks
TESTING METHODS
TETRA-Terrestrial Enhanced Trunked Radio
TOUCH SCREEN SSTEM
Tablet PC
Tablet-pc
Tape Drive Technologies LTO
Task Management
Techniques for analysis, verification, validation of digital systems
Techniques to aid property specification in Model Checking
Technotask management
Telephony Routing over IP
Teleportation
Text Classification
Text Classification Using Semi-supervised and Active Learning
The Architecture of a Moletronics Computer
The MBMS
The Mbone And Multicasting
Third Generation
Time Complexity
Torents
Touch Screen
Touch screen technology
Tracking and Positioning of Mobiles in Telecommunication
Transient Stability Assessment using Neural Networks
Trends in Compiler Construction
Trends in Mobiles & PC’s
Trusted Network Connect (TNC
Turbo Codes
Twd radar satellite communications
UMA (Unlicensed Mobile Access
USB Tape Drives
Ubiquitous computing
Unbiquitos Smart Homes
Unified Communication
Uniprocessor Virtual Memory Without TLBS
Using Regular Expressions In java
VHDL (VHSIC Hardware Description Language
VIRTUAL REALITY
VOIP Over Wireless LAN
VOIP Security
VQ In Converging Telephony And Ip Networks
Vertical Cavity Surface Emitting Laser
Video conference
Virtual Keyboards
Virtual Network Computing
Virtual P.C.
Virtual Private Networks(VPNs)
Virtual Reality
Virtual memory
Virtual networking
Virtualization Technology
Viruses and Worms
Visual Neuro Prosthetics
Visualization and Computer Graphics
VoIP in mobile phones
Voice Over Internet Protocol
Voice Portals
Voice Roaming
Voice Routing over IP Telephony
WATERFALL MODEL
Watermarking Digital Audio
Wearable Computers
Web Data Management
Web Designing with HTML
Web Search Results' Ranking: PageRank, HITS and Related Work
Web Spam
Web Technology
Web browsers
Web servers
Wi- Fi Technology
Wi-Fi (802.11b
Wimax
Windows Vista
Wireless Application Protocol
Wireless Applications
Wireless Connectivity for Rural Areas
Wireless MAN
Wireless Markup Language(WML
Wireless Security
Wireless Technologies (bluetooth, 802.11x, IRDA
Wireless communication system
Wireless sensor network
Wireless technology
Working of E-Mail
X-Internet
X-By-Wire System , Communication Bus perspective
ZFS File system


1.GLUCO METER
2. MOBILE COMPTING
3. WIRELESS SENSOR NETWORKS
4. NANO TECHNOLOGY
5. DYNAMIC SOURCE ROUTING PROTOCOL
6. RSVP
7. BLUE RAY DISKS
8. MIMO TECHNOLOGY
9. BRAIN FINGER
10. CRYONICS
11. DRUG DISCOVERY
12. HOLOGRAPHIC MEMORY
13. RED TACTON
14. ELECTRONIC CARDIO GRAM
15. NANO TECHONOLGY
16. BIO METRICS
17. Form Wizard
18. Cryptography
19. Memory
20. Data Pre Processing
21. Interupts
22. Servelts
23. Servelts
24. Web Technology
25. Multimedia
26. Hacking
27. Web Spam
28. Blogs & their Creation
29. Google or Yahoo Case Study
30. Blogs & their Creation
31. Google or Yahoo Case Study
32. Working of E-Mail
33. Using Regular Expressions In java
34. Earning Online Money
35. Archiever Analyzer
36. Task Management
37. Form Wizard
38. Franchise Mgnt System
39. Leave Mgnt System
40. Blogs & their Creation
41. Google or Yahoo Case Study
42. Working of E-Mail
43. Using Regular Expressions In java
44. Earning Online Money
45. Archiever Analyzer
46. Task Management
47. Form Wizard
48. Franchise Mgnt System
49. Leave Mgnt System
50. Earning Online Money
51. Archiever Analyzer
52. Task Management
53. Form Wizard
54. Franchise Mgnt System
55. MAGIC SQUARES
56. BANKING
57. ELLICA
58. SPYWARE
59. GLUCO METER
60. MOBILE COMPTING
61. WIRELESS SENSOR NETWORKS
62. NANO TECHNOLOGY
63. DYNAMIC SOURCE ROUTING PROTOCOL
64. RSVP
65. Interupts
66. Servelts
67. Servelts
68. Web Technology
69. Multimedia
70. Interupts
71. RSVP
72. CASP
73. WIRELESS MESH NEWORK
74. NETWORK SECURT
75. VIRTUAL REALITY
76. WI-MAX
77. WIRELESS COMMUNICATION
78. MESH NETWORKING
79. SPYWARE
80. HACKERS
81. QOS
82. WATERFALL MODEL
83. WIRELESS SECURITY
84. HIGH SPEED LANS
85. INTERFACES
86. FIBER CHANNELS
87. LAN PROTOCOL ARCHITECTURE
88. TESTING METHODS
89. OOPS CONCEPTS
90. WIRELESS SECURITY
91. HIGH SPEED LANS
92. INTERFACES
93. FIBER CHANNELS
94. LAN PROTOCOL ARCHITECTURE
95. TESTING METHODS
96. OOPS CONCEPTS
97. SERVELTS
98. ARRAS AND SENSORS
99. COMPLIERS
100. CRPTOGRAPHY AND N/W SECURITY
101. LAN PROTOCOL
102. BEANS
1.Andriod OS
2.Xen Ware
3.Blue Gene
4.Self Defending networks
5.Cognition & Perception
6.Network Attached Storages
7.4G & 5G
1) PCI DSS security module
2) AS2 protocol for file transfers
3) PGP encryption technology
4) OpenGPG encryption
6. Spyware
7. Quantum Computing
8. Blue - Ray Disc
9. Robotics
10. RFID
11. MANET
12. WAP
13. DNA Computing in security
14. 4g Wireless Systems
15. HomeRF- localized wireless technology optimized for the home environment
16. Internet Searching
17. Zigbee
18. Java Management Extensions (JMX) - component framework for building intelligent network
19. Earth Simulator- Fastest Supercomputer
20. Home Networking
21. TouchFLO Technology <
22. Tracking and Positioning of Mobiles in Telecommunication
23. 3D Volume Storage
24. Optical Networking and Dense Wavelength Division Multiplexing
25. Software-Defined Radio <
26. Space-time adaptive processing
27. Secure File Transfer (use PGP, deflate or nay encryption method)
28. A Secure GateWay
1Computational Journalism
2Machine Transliteration
3Monolingual and Cross language information retrieval
4Intelligent Tutoring Systems
5Intelligent information Fusion
6Statistical Machine Translation
7Median Graphs and its Applications (in Computer Science)
8Logarithmic Keying
9Metabolic Networks
10Trust in Mobile and Wireless Networks
11Wavelets and its applications (in Computer Science)
12Web Query Log Analysis
13Ontology Servers
14New Trends in Visual Cryptography
15Dynamic Software Management in Mobile Computing Systems
16Brain Computer Interfaces
17Incremental Tensor Analysis: Applications
18Semantic Text Similarity
2. Platform Independent Enhanced Media Player
3. Neural networks and fuzzy logic in unmanned aircraft
4. ANN based character recognizer for mobile devices to help visually challenged"
5. Internet In Space
6. Image Augmented Inertial Navigation System
7. Efficient Resource Scheduling In Data Grid
8. Imouse
9. Intelligent transportation system using genetic algorithm for shortest driving time
10. Hiding sensative rule using distortion technique
11. The Friend Locator
12. Adaptive steganograp
1. Real Time Operating Systems on Embedded ICs
2. Real time communication in wireless sensor networks
3. Semi - Supervised Learning using Graph Kernels
4. Collaborative Mobile Environments
5. High Performance Clusters
6. Distributed Computing
7. membrane computing
8. Forecasting
9. Forecasting
10. Middleware architecture for Pervasive computing
11. Query Optimization
12. Software Code Security
13. Query Optimization
14. Network Anomaly
15. Study of TGREP
16. Forecasting
17. Viruses and Worms
18. Netowork Security
19. Inter-Operabilty of 802.11e and 802.11
20. RFID Security
21. Semi Supervised Learning using Gaussian Process
22. Quality of Service Routing in computer networks
23. Wireless Security
24. Wireless MAN
25. multi-wordnets
26. Light-trails
27. Fault Tolerance in Virtual Machine Environments
28. Wireless Connectivity for Rural Areas
29. VOIP Security
30. Semi Supervised Learning using Gaussian Process
31. Efficiency / Comparative study of routing schemes in event based systems
32. Rendering Maths on web with Java Swing
33. Analysing Software Life Cycle of Different Program Paradigm.
34. Authoring environments for open source courseware
35. Integration of Parallel Database in a Service Oriented Architecture
36. Ontological Relation Discovery
37. Issues in Middleware for Pervasive Computing
38. Wireless Connectivity for Rural Areas
39. Energy Efficient query Optimization
40. Semi-supervised Learning using Graph Kernels
41. Comparative study on Authoring Tools
42. network security
43. Security Issues in Wireless Networks
44. Layered versioning for software configuration management
45. Cooperative Adaptive Cruise Control
46. Telephony Routing over IP
47. Virtual Private Networks(VPNs)
48. Holt-Winters technique for Financial Forecasting
49. Fine-grained Access Control in Databases
50. Secure Database Service
51. QoS in Wireless Lans
52. Classification, Clustering and their Application for Damage Detection in Mechanical Structures
53. Middleware in embedded systems
54. Web Search Results' Ranking: PageRank, HITS and Related Work
55. Proactive Anomaly Detection
56. Forecasting using Double Exponential Smoothing Method
57. Enery efficiency in Wireless sensor networks
58. Enterprise Security
59. Seasonal and Adaptive Forecasting
60. Root cause Localization and analysis of faults[Autonomic Computing]
61. RFID : Comparative study of Collision Resolution Protocols
62. Classification clustering and Applications to Intrusion Detection Systems.
63. Faultolerant Routing in Mobile Ad-Hoc Network
64. Channel Allocation Algortihms for Mobile Telephony
65. Middleware for Wireless Sensor Networks
66. Security On Wireless LAN Adaptive cruise control
67. Middleware for Sensor Networks
68. Query Based Fine-grained PageRank
69. Classification, Clustering and Application in Intrusuion Detection System
70. Financial Forecasting
71. Wireless Security
72. Autonomic computing
73. Sensor Networks
74. QoS in VoIP
75. Proactive Network Anomaly Detection
76. RFID
77. Middleware in Embedded Systems
78. Wireless Security
79. Voice Routing over IP Telephony
80. Statistical Forecasting
81. QOS in software server Firewalls
82. Classification, Clustering and their Application for Damage Detection in Mechanical Structures.
83. Fine Grained DataBase Security
84. J2EE Security
85. Reliable and Fault Tolerant Routing on Mobile Ad Hoc Network.
86. VOIP Over Wireless LAN
87. Database Security
88. Reliable Multicast
89. Multicast Congestion Control
90. Capacity of Ad-hoc Wireless Networks
91. Performance Evaluation of IEEE 802.11
92. Quality of service in Differentiated Service Architecture
93. Routing in Sensor Networks
94. TDMA implementation for QoS routing in Ad Hoc Networks
95. case Study : A X-By-Wire System , Communication Bus perspective
96. Approximate string matching for Music retrieval
97. Spectral Methods for Graph Partitioning
98. Signal Processing for Networking
99. Spatial DataMining
100. Bionetric Authentication
101. Aspects of Database Security and Program Security
102. Attacks on Smart Cards
103. Smart Card Standards
104. A Probabilistic Approach to Micropayment
105. Java Security
106. Information Extraction
107. Clustering (Data Mining)
108. Frequent ItemSet Mining
109. Classification Techniques in Data Mining
110. Multi-Relational Data Mining
111. Object Persistence
112. Distributed Garbage Collection
113. Agent Mediated E-commerce
114. Recovery in Main Memory Databases
115. Optimization of Protocol Stack for wireless networks
116. Compressed Domain Processing And Video Information System
117. Introduction to Speech Recognition
118. Reconfigurable Hardware in Wireless communication
119. Applications of speech recognition
120. Geometric Invariants in Biological Molecules
121. Applications of Graph Theory to Metabolic Pathways
122. Computational Geometry in Drug Design
123. Query Processing on Data Streams
124. Multi-application Framework for Smart Cards
125. Semi-supervised Learning
126. Data mining through Active Learning
127. Text Classification Using Semi-supervised and Active Learning
128. Relational Data Mining
129. Dataset Query algorithms in Streaming Mining
130. Mining Document Streams
131. Information Extraction from structured & Semi-structured data
132. Digital Video Editing
133. Determining Global States of Distributed Systems
134. Multi Protocol Label Switching
135. QoS in Wireless LANs
136. Advanced Queue Management Techniques
137. Techniques to aid property specification in Model Checking

13. A wireless technology for Young generation
14. Facial Analysis Between Age Groups Using Distance Matrices
15. Double talk detector using echo path estimate
16. Inconspicuous threats to Mobile Computing security
17. Establishment of emergency, portable, bidirectional
18. Gait as a biometric for human recognition
19. Emulation of peer to peer botnets


A BASIC TOUCH-SENSOR SCREEN SYSTEM
Artificial Eye
Animatronics
Automatic Teller Machine
Aircars
Adding interlligence to ineternet using satellite
ADSL
Aeronautical Communications
Agent oriented programing
Animatronics
Augmented reality
Autonomic Computing
Bicmos technology
BIOCHIPS
Biomagnetism
Biometric technology
BLUE RAY
Boiler Instrumentation
Brain-Computer Interface
Bluetooth Based Smart Sensor Networks
BIBS
CDMA Wireless Data Transmitter
Cellonics Technology
Cellular Positioning
ZIGBEE
Cruise Control Devices
Crusoe Processor
PGP encryption technology
Generic visual perception processor
Nanotechnology Assembler Design And Nano-Communication
MANETS: Mobile Adhoc Networks
Liquid Crystal on Silicon Display (LCOS)
Jini - advanced set of network protocols
Computer memory based on the protein bacterio-rhodopsin
CSS and DeCSS
Multimedia Broadcast Multicast Service (MBMS)
Extreme Programming (XP)
Holographic Versatile Disc
Zero Knowledge proofs
Bimolecular Computers
SPINS -Security Protocol For Sensor Network
Context Disambiguation On Web Search Results
Surface Computer 





Project Oxygen
Survivable Networks Systems
Self Organizing Maps
Symbian OS
Ubiquitous Networking
Ultra Wide Band
Virtual Keyboard
Virus and Anti Viruses
Virtual network computing
Wearable Computers
Wireless intelligent network
Adding Intelligence to Internet
Extreme Programming
FRAM
IEEE 802.11n –New Generation Wireless Standard
Free Space Optics
GMPLS
Grid Computing
HIGH SPEED DATA IN MOBILE NETWORKS
Human Computer Interface
INTERNET DISTRIBUTED COMPUTING
Intel Centrino Mobile Technology
Computer Human Interface
Java Card
FACE RECOGNITION USING Neural Network
iSCSI
RFID
Agent oriented Programming
Animatronics
Augmented Reality
Autonomic Computing
Bio chips
Reconstruction of Recorded Sound
BIOMETRICS
Blu-ray Disc
Cellular Digital Packet Data
Crusoe processor
DiffServ
Digital Theater System
Extreme Ultraviolet Lithography
HPJava
Hurd
Hyper Threading
Imode
IP spoofing

Light tree
Itanium Processor
Local Multipoint Distribution Service
M-COMMERCE
Windows DNA
Halo Networks
MiniDisc
Modular Computing
Parasitic Computing
Resilient Packet Ring Technology
Shallow Water Acoustic Networks
Tempest and Echelon
10 GB ETHERNET
Multimedia Conferencing
MPEG-7
Parasitic Computing
Resilient Packet Ring Technology
Space Mouse
Smart Sensors
Linux Kernel Release 2.6
SPINS -Security Protocol For Sensor Network
Generic visual perception processor
Nanotechnology Assembler Design And Nano-Communication
Tele-Immersion
Liquid Crystal on Silicon Display (LCOS)
Jini - advanced set of network protocols
Computer memory based on the protein bacterio-rhodopsin
CSS and DeCSS
Multimedia Broadcast Multicast Service (MBMS)
Extreme Programming (XP)
Holographic Versatile Disc
Zero Knowledge proofs
Bimolecular Computers
Context Disambiguation On Web Search Results
Touch Screen Technology
Surface Computer
Face Recognition Technology
4G Wireless Systems
Zone Based Ant Colony Routing In MANET 
Confidential Data Storage and Deletion 
Emotional Annotation of Text
Audio CAPTCHA: Existing solutions assessment and a new implementation for VoIP telephony 
Co-operative Linux
Security Challenge and Defense in VoIP Infrastructures
CAPTCHA security for Phishing: Secure or not?
An Energy Aware Framework for Dynamic Software Management in Mobile Computing Systems
Artificial passenger
Fluorescent Multilayer Disc (FMD
LOGARITHMIC KEYING
Model checking for Securing E-commerce transaction
DNSSEC: A Protocol towards securing the Internet Infrastructure
Brain Machine Interface
Self Healing Robots
Multi Touch
Bio Inspired Computing
Image Compression Using Wedgelets
PILL CAMERA
Java Ring
Robotic Surgery
The Artificial Brain
OpenSocial
Cell Phone Virus and Security
Advancements Towards 4G
Service Oriented Architecture (SOA)
Bubble sensing 
A Search Engine for 3D Models
Artificial Neural Network (ANN)
CONTEXT ORIENTED PROGRAMMING
SMART CARD
INTERNET PROTOCOL TELEVISION (IPTV)
WiMAX
Inferno OS
Session Initiation Protocol (SIP)
Intelligent Network (IN)
SMARTSHADER
Dynamic 3D Scene Analysis from a Moving Vehicle
E-Intelligence
Grid Network
TRACKING AND POSITIONING OF MOBILE PHONES
Simple SAN & Storage Resource Management in Microsoft® Windows Server™ 2003 R2
Cloud computing
Blue eyes
Smart Note Taker
FireWire
Iris Scanning
Swarm intelligence
Biomagnetism
LwIP
Mobile IP
NRAM
Power Line Communications



No comments:

Post a Comment