Vous êtes sur la page 1sur 19

Seminar Topic 1. 3 - Dimensional Printing 2. Case Based Reasoning 3. Storage Virtualization 4. Wingate Vpn 5. Thin Client 6.

Location Aware Computing 7. Ldap ( Lightweight Directory Access Protocol ) 8. Ubiquitous Computing 9. Gps 10. Honeypots & Honeynet 11. Data Mining 12. Virtual Linux 13. Virtual Lan 14. Rfid 15. Wireless Security 16. Virtual Private Lan Service 17. Web Intelligence

18. Jiro - The Java Based Technology 19. Nano Technology 20. Data Warehousing 21. Kerberos 22. Voip Over Wlan 23. Process Migration 24. Snake Robot 25. Wusb ( Wireless Universal Serial Bus ) 26. Speaker Recognition 27. Deep Blue 28. Intrusion Prevention System 29. Wireless Mesh Networks 30. Genetic Programming 31. Dos ( Denial Of Services ) 32. Sprite Os 33. Peer-To-Peer Architecture Using Autonomous Agent 34. Quantum Computers

35. Public Key Infrastructure 36. Mobi Desk 37. Soft Computing 38. Mobile Adhoc Network 39. Embedded Technology 40. The Network Ram Disk 41. Human Computer Interaction 42. Edge 43. Dns Security 44. 3 Gp 45. 4 G ( Forth Generation ) 46. Optical Computing 47. Cyborgs 48. Web Mining 49. Audio Fingerprinting 50. Winfs 51. Wireless Application Protocol 52. Inference Engine For Semantic Web 53. Virtual Network Computing

54. Embedded Internetworking 55. Amoeba : Distributed Operating System 56. Blackboard Technology 57. Introduction To Ajax 58. Text Mining 59. Dna Computer 60. Ss7 ( Singaling System 7 ) 61. Expansion Bus 62. Digital Object Identifier 63. Blu-Ray Disk 64. Video Fingerprinting And Encryption Principles For Drm 65. Wireless Lan 66. Mobile Agents 67. Ibutton 68. Free Space Optics 69. Ddos 70. 3d Graphics Apis

71. Embedded Systems 72. Rtos 73. Ospf 74. Tcp-Ip Puzzling 75. Smart Dust 76. Bio-Metrics 77. J2ee 78. M-Ram 79. Rfid 80. Spam 81. Java Card 82. Speech Processing 83. Cdma-2000 1x Evdo Technology 84. Distributed Operating Systems 85. Wireless Application Protocol 86. Virtual Machine 87. Software Agents 88. Java Cryptography 89. Grid Computing

90. Vpn 91. Wimax 92. Virtual Reality Paradigm 93. Quantum Computing And Its Application In Cryptography 94. Wireless Atm 95. J2me 96. Personal Digital Assistant 97. Session Identification Protocol 98. Virtual Keyboard 99. Ai And Neno Technology Solution 100. Cable Modem 101. Digital Watermarking 102. Wireless Network Security 103. Gigabit Networking 104. Intrusion Detection System 105. Data Compression 106. Data Backup And Recovery 107. Windows Dna

108. Virus And Anti-Virus 109. D-Programming Language 110. Olap 111. Secure Communication Protocol 112. Amoeba System 113. Protein Memory 114. Sysmbain Os 115. Mobile Ipv6 116. Blue-Eyes 117. Ipng 118. Cidr 119. Gsm 120. Server Clustering 121. Windows Longhon 122. Lottery Scheduling 123. Corba 124. Ejb Corba 125. Virtual Lan 126. Multi Agent Systems

127. 64 Bit Computing 128. Virus - Antivirus : Race Not COmpleted 129. Holographic Memory 130. Wireless Fidelity 131. Asynchronous Transfer Mode (ATM) 132. Flash Memory 133. Smart Dust 134. Call Center 135. Smart Networking 136. Global Access File System 137. C# (C Sharp) 138. Direct Access File System 139. Computer Busses 140. Virtual Network Computing 141. Biometric Identification & Authentication 142. Gmlts 143. Data Minning

144. Gigabit Ethernet 145. Spam 146. Syncml 147. Dsl Modem 148. Dna Computer 149. Win (Wireless Intelligence Network) 150. Steganography 151. General Packet Radio System 152. Advance Database 153. Cluster Validation For Compact Rule Extraction From Trained Neural N/W 154. Data Warehousing 155. Mpls (Multi Protocol Label Switching) 156. Mobile Ip 157. E-Learning 158. Network Address Translation 159. Project Jxta 160. Imode Wireless 161. Natural Language Processing

162. Kerberos 163. Mobile Computing 164. Erp (Enterprise Resource Planning) 165. Speech Application Language Technology 166. Active Server Pages 167. Jini 168. Fram 169. Java 2 Micro Edition 170. Network Ram 171. Morphine 172. Network Intrusion Detection System 173. Quantum Cryptography 174. Wml (Wireless Markup Language) 175. Virus On Mobile 176. Advance Peer To Peer Network 177. Ospf (Open Shortest Path First Protocol) 178. Ipv6

179. Human Computer Interfacing (Hci) 180. Com And Com+ 181. Home - Plug 182. Pda 183. Grid Computing 184. Digital Water Marking 185. Linux Device Driver 186. Hyper Threading 187. Iscsi 188. Road Signal Reorganization By Color Imaginary 189. Meteor Burst Communication 190. Augmented Reality 191. Geographical Information System (Gis) 192. Voip (Voice Over Ip) 193. Distributed Database Management System 194. I Button

195. ICEBERG 196. J2ME 197. RMI 198. Firewalls 199. Smart Card 200. DDOS (Distributed Dental Of Syatem) 201. Database Normolization & Denormolization 202. Computerised Clothing 203. Data Compression Techniques 204. ISDN 205. Image Processing - Corena 206. Genral Packet Radio Service 207. 3G Technology 208. Apache Sever 209. AMD Athlon XP Processer 210. Hamster 211. DNA Computing

212. The Genesis Kernel 213. ISCSI 214. Concurrent Versions Systems 215. Virtual Private Networks (VPN) 216. Internet Protocol System 217. Global Position System 218. JSTL 219. Manet - Mobile Area Network 220. LDAP (Lighitweight Directory Access Protocol) 221. Skip : Simple Key Management Protocol 222. Simputer 223. Interplanetary Internet 224. Bioinformatics 225. Quantum Computing 226. PHP: Hypertext Protocol 227. Wiondows DNA 228. Jini Technology

229. Medical Iamge Processing (Artificial Intelligence in Medicine) 230. Session Imitation Protocol (SIP) 231. Thin Client/Sever Computing Model 232. Ninja 233. The QNX Real Time Operating System 234. Lossless Data Compression Technique 235. Wireless Personal Area Network (WPAN) 236. Voice Over Protocol 237. Data Mining 238. Wi - Fi (802.11B) Technology 239. Deep Blue: The First M/C That Defected Garry Kasparove 240. Secure Socate Layer 241. Recent Advances in Photonic Devices for Optical Compouting

242. Smart Dust 243. Image Guided Therapy 244. Socks - Protocol (Proxy Sever) 245. Advanced Lunix Sound Architecture 246. Optical Ethernet 247. Neural Network 248. MPLS 249. Viruses On Mobile 250. SAMBA 251. Protein Memory 252. Efficient Data Storage Techniques 253. Hyper Transport Technology 254. Ultra Wide BAnd 255. Hacking 256. Java Management Extensions (JMX) 257. Internet - 2 & ITS Application 258. SMS, EMS & MMS 259. Advanced Rise Machines (ARM) 260. Tele Immersion - The Future of

Internet Telecommunication 261. Designing an Enterprised Strorage Network (ESN) 262. Simple Object Access Protocol (SOAP) 263. Neural; Network 264. Java Server Pages (JSP) 265. C# (C Sharp) 266. Geographical Information System (GIS) 267. Palm Operating System 268. Sever Clustering 269. Global Position System (GPS) 270. Firewalls 271. Voice Over IP 272. Digital Subsciber Line (DSB) 273. Artifical Intelligence 274. Active Server Pages 275. Image Processing

276. NetWOrk Atteched Storage 277. Direct X 278. Corba 279. CGI Scripting With Perl 280. Introducation to PHP 281. Optical Processer 282. EJB 283. Mobile Computing - 3G System 284. Universal Model Language (UML) 285. .NET Framework & Platform 286. Object Oriented Database 287. Oracle 9i 288. Voice XML 289. Storage Area Network(SAN) 290. The Surat Dot: Application of WAN 291. Molecular Computing 292. Virtual Private Networks (VPN) 293. Windos XP, An Operating System 294. Mobile Commerce(M-Commerce)

295. VRML 296. Virus - Antivirus 297. Univarsal Serial BUS 298. Wireless Application Protocol 299. COM, COM+, Hidden Technologies From Ms. 300. Network Security 301. Universal Description, Discovered & Interface 302. QNX Operating System 303. Future of Java 304. JXTA 305. Wireless Markup Language(WML) 306. Genral Packet Radio Service 307. Jacking 308. Session Initiation Protocol (SIP) 309. Bluetooth Technology 310. Remote Method Invocation(RMI) 311. Radius Protocol

312. .Net 313. WIN32 API 314. Wireless Local Loop 315. Wireless Web 316. Holographic Data Storage 317. Microsoft Transaction Sever 318. Scalability of Bounded Networks 319. Open GL

Vous aimerez peut-être aussi