Vous êtes sur la page 1sur 10

SEMINAR TOPICS

1. Dynamic Languages 2. In-Vehicle Networking 3. Plastic Memory 4. Protein Memory 5. Setting up a LAN using Linux 6. UMTS 7. Wireless USB 8. Zero Knowledge Protocols and Proof Systems 9. Tempest and Echelon 10. Synthetic Aperture Radar System 11. Unlicensed Mobile Access 12. Windows DNA 13. Laptop Computer 14. Intelligent Software Agents 15. IP spoofing 16. Internet Access via Cable TV Network 17. IDS 18. 10 Gigabit Ethernet 19. Tripwire 20. Ubiquitous Networking 21. Unicode And Multilingual Computing 22. XML Encryption 23. Y2K38 24. Satellite Radio 25. Light emitting polymers 26. Sensors on 3D Digitization 27. Robotic Surgery 28. Ipv6 - The Next Generation Protocol 29. Nanorobotics 30. Dual Core Processor 31. Cisco IOS Firewall 32. Money Pad, The Future Wallet 33. Low Power UART Design for Serial Data Communication 34. SPECT 35. Buffer overflow attack : A potential problem and its Implications 36. Hurd 37. Intel Centrino Mobile Technology 38. MPEG Video Compression 39. Survivable Networks Systems 40. Self Organizing Maps

41. Mobile IP 42. Iris Scanning 43. LWIP 44. Smart card 45. Quantum Information Technology 46. Asynchronous Chips 47. Cellular Through Remote Control Switch 48. HVAC 49. Terrestrial Trunked Radio 50. Swarm intelligence & traffic Safety 51. Optical Switching 52. FRAM 53. IDC 54. Driving Optical Network Evolution 55. Cellular Neural Network 56. Radio Network Controller 57. Digital Audio Broadcasting 58. Significance of real-time transport Protocol in VOIP 59. Space Mouse 60. Resilient Packet Ring Technology 61. Wireless Networked Digital Devices 62. SATRACK 63. Smart Pixel Arrays 64. Project Oxygen 65. Wearable Bio-Sensors 66. Mobile Virtual Reality Service 67. Crusoe Processor 68. Human Computer Interface 69. HPJava 70. Gaming Consoles 71. Fluorescent Multi-layer Disc 72. Futex 73. Extreme Programming (XP) 74. Earth Simulator 75. Compact peripheral component interconnect 76. corDECT Wireless in Local Loop System 77. Param 10000 78. Elastic Quotas 79. Refactoring 80. On-line Analytical Processing (OLAP) 81. Pivot Vector Space Approach in Audio-Video Mixing 82. QoS in Cellular Networks Based on MPT 83. Wireless Fidelity 84. Voice morphing

85. 86. 87. 88. 89. 90. 91. 92. 93. 94. 95. 96. 97. 98. 99. 100. 101. 102. 103. 104. 105. 106. 107. 108. 109. 110. 111. 112. 113. 114. 115. 116. 117. 118. 119. 120. 121. 122. 123. 124. 125. 126. 127. 128.

Radio Frequency Light Sources Speed Detection of moving vehicle using speed cameras Optical Packet Switching Network Storage Area Networks Smart Note Taker MPEG-7 Motes Modular Computing MiniDisc system Migration From GSM Network To GPRS M-Commerce C# IP Telephony RPR Broad Band Over Power Line Rapid Prototyping Dashboard Optical Satellite Communication Optical packet switch architectures Layer 3 Switching Intrution Detection System Multiterabit Networks InfiniBand Light Tree Multicast Inverse Multiplexing Neural Networks And Their Applications Parallel Computing In India Quadrics Interconnection Network Structured Cabling Virtual LAN Technology Real- Time Systems and Real- Time Operating Systems Quantum Cryptography Speech Application Language Tags VHDL Tele-immersion Voice Portals Cluster Computing Virtual Private Network Optical Computer Cellular Communications Graph Separators Extended Mark Up Language TCP/ IP

129. 130. 131. 132. 133. 134. 135. 136. 137. 138. 139. 140. 141. 142. 143. 144. 145. 146. 147. 148. 149. 150. 151. 152. 153. 154. 155. 156. 157. 158. 159. 160. 161. 162. 163. 164. 165. 166. 167. 168. 169. 170. 171. 172.

Third Generation Palladium Dynamic Synchronous Transfer Mode Ambiophonics GSM Optical Fibre Cable Integrated Voice and Data Instant Messaging Synchronous Optical Networking Development of the Intenet Design and Analysis of Algoritms Infinite Dimensional Vector Space Ethernet Passive Optical Network Dynamic Cache Management Technique Generic Framing Procedure Dynamic Memory Allocation Firewalls Handheld Computers Modems and ISDN Internet Telephony Policy in INDIA Optical Free Space Communication Planar Separators Wireless Internet PON Topologies Smart Cards TCPA / Palladium Sense-Response Applications Cable Modems Voice Quality Wireless Application Protocoll Virtual Instrumentation Bio-Molecular Computing Blu Ray Disc 64-Bit Computing Code Division Duplexing Delay Tolerant Networking Dynamically Reconfigurability Computing Inverse Multiplexing EDGE Holographic Data Storage Integer Fast Fourier Transform NRAM Orthogonal Frequency Division Multiplplexing Ovonic Unified Memory

173. 174. 175. 176. 177. 178. 179. 180. 181. 182. 183. 184. 185. 186. 187. 188. 189. 190. 191. 192. 193. 194. 195. 196. 197. 198. 199. 200. 201. 202. 203. 204. 205. 206. 207. 208. 209. 210. 211. 212. 213. 214. 215. 216.

4G Wireless Systems Daknet AC Performance Of Nanoelectronics High Performance DSP Architectures Millipede Free Space Laser Communications Short Message Service (SMS) Conditional Access System SyncML Virtual keyboard High Altitude Aeronautical Platforms MANET Smart Fabrics Dynamic Virtual Private Network Blue Tooth Autonomic Computing Voice Over Internet Protocol Artificial Neural Network (ANN) DNA Based Computing Digital Subscriber Line Freenet Access gateways Free Space Optics Introduction to the Internet Protocols High Altitude Aeronautical Platforms Fiber Distributed Data Interface Hyper-Threading technology IMode Cyberterrorism Adding Intelligence to Internet Self-Managing Computing Unified Modeling Language (UML) Socket Programming SAM VoCable Touch Screens Domotics Artificial Intelligence and Neural Networks Recent Trends in Cryptography Radio Network Controller for 3G mobile and wireless network devices Mobile Tele Communication Cell Phones beyond Call & Sms Raising Technologies IRIS Recognization

217. 218. 219. 220. 221. 222. 223. 224. 225. 226. 227. 228. 229. 230. 231. 232. 233. 234. 235. 236. 237. 238. 239. 240. 241. 242. 243. 244. 245. 246. 247. Space 248. 249. 250. 251. 252. 253. 254. 255. 256. 257. 258. 259. 260. 261.

Adhoc Networks Pocket Doctor S/w Testing Tools Fiber Optic technology 4G- Wireless Image Water Marking DART Brain Finger Printing Taxonomy of S/w Testing Tools Java Card Wireless Technologies (bluetooth, 802.11x, IRDA) News Groups i Planet M Commerce Mobile Commerce Multiterabit Networks Rising Technology GIES Intrusion Detection System Palmprint Authentication Application Honey Pots i Planet M Commerce Mobil e Commerce Rising Technology GIES C Sharp (C#) Zornbie Computers 4G Technology Wearable Computer Authentication and Key Agreement (AKA) Session Initiated Protocol (SIP Tele Immersion New Medium That Enables Users to Share a Virtual Mobile Processor Crusoe Processor Agent Oriented Programming Information or Data Visualizing Techniques Human Computer Interface (HCI) in Software Applications Signal Integrity Fundamentals for Digital Design Nonvolatile Flash Memory WBM (Web Based Mobile) Information Extraction Modes & Techniques Botnet Security Threats Blade Servers Mind Reading Phones Infini Band Fuzzified Computer Automated Crane Control System

262. News Groups 263. Java Cards 264. Pocket Doctor 265. Privacy Preserving Data Mining 266. VQ in Conserving Telephony and IP Networks 267. New Age Graphics 268. Real-Time Speech Translation 269. Software Testing Tools 270. Earth Simulator Fastest Supercomputer 271. Digital Photography and Music 272. Assisted GPS 273. Recognition of VoIP Speech 274. HomeRF Localised Wireless Technology Optimized for the Home Environment 275. Taxonomy of Software Testing Tools 276. Computer Vision 277. Raising Technologies 278. Open RAR 279. Algorithms for networking 280. Introduction to LaTeX 281. OpenTV (OPTV) 282. Real Time Operating Systems 283. Personal Mass Media Blogging, Syndication, Podcasting, and Vidcasting 284. Internet Networking 285. Computational neuroscience 286. Basic Gnu Emacs 287. Epsilon nets and transversal of hypergraphs 288. Global System for Mobiles 289. Data Management in Sensor Networks 290. Public Key Encryption And Digital Signature 291. Trends in Compiler Construction 292. TETRA-Terrestrial Enhanced Trunked Radio 293. Computational Photography 294. Techniques for analysis, verification, validation of digital systems 295. Java Cryptography Architecture (JCA) 296. MAC address 297. Mobile Paradigm 298. Mining the Web: Searching, Integration and Discovery 299. HAVi: Home Audio Video Interoperability 300. Light Pen 301. Main memory databases 302. Backup and Recovery planning 303. Evolutionary Programming 304. Native Command Queuing (NCQ) 305. Virtual worlds come to life

306. 307. 308. 309. 310. 311. 312. 313. 314. 315. 316. 317. 318. 319. 320. 321. 322. 323. 324. 325. 326. 327. 328. 329. 330. 331. 332. 333. 334. 335. 336. 337. 338. 339. 340. 341. 342. 343. 344. 345. 346. 347. 348. 349. 350. 351.

Bandwidth estimation in broadband access networks X-Internet Serial Attached SCSI Multiple Domain Orientation Elliptical curve cryptography (ECC) Jiro Java-based technology Synchronous Optical Networking Biometric Technology Third Generation Dual Energy X-ray Absorptiometry Mobile Casts Autonomic Computing Voice Roaming Mobile Infrastructure Management Network Accelerators Surface-conduction Electron-emitter Display (SED) Virtual Reality Visualisation Stereoscopic Projection Systems Search Engine Optimisation Struts Integration Site Search Engine Form Processing ZFS File system Unbiquitos Smart Homes Java Class Loader Split Range Synchronisation Nano Ring Memory Watermarking Digital Audio Power Line Networking Encrypted Hard disks Datagram Congestion Control Protocol (DCCP) Quantum Computers Near Filed Communication (NFC) Fluorescent Multilayer Disc (FMD) Micro Mouse Optical networking 3D-DOCTOR Data Security in Local Network using Distributed Firewalls The Architecture of a Moletronics Computer Virtualization Technology MIMO Split Range Syncronisation Co-operative LINUX DataBase Migration Internet Cryptopraphy Data over Cable System (DOCSIS)

352. 353. 354. 355. 356. 357. 358. 359. 360. 361. 362. 363. 364. 365. 366. 367. 368. 369. 370. 371. 372. 373. 374. 375. 376. 377. 378. 379. 380. 381. 382. 383. 384. 385. 386. 387. 388. 389. 390. 391. 392. 393. 394. 395. 396. 397.

Network security Trends & Methods Transient Stability Assessment using Neural Networks Computerized Paper Evaluation using Neural Network Software Engineering Advances Parallel Computations Elliptical Curve Cryptography Molecular Keypad Lock GABOR Wavelet IDMA Future of Wireless Technology Simultaneous Multithreading Secure multiparty computations without computers Data over Cable System (DOCSIS) Vorbis Ubuntu-Linux for Human Beings Rise of internet social networking Fourth-Generation Broadband Google Android- Mobile OS from Google Semantic Web Windows 7 The new OPerating System Distributed Visualization of Geometric Algorithms Cross Lingual Meaning Based Search BTs super-fast broadband network Metering net traffic GSM Security And Encryption Microarchitecture Level Power Management Program transformations for verifying protocols Android mobiles Multi-Wafer Virtual Probe What makes CSS so powerful? Apple iPad Wireless Printing Glassfish Holographic Storage Technologies Reconstruction of Solid Models from Oriented Point Sets Industrial Connectivity: Passive Product Technology Zornbie Computers C Sharp (C#) Tracking and Positioning of Mobiles in Telecommunication Honey Pots Palmprint Authentication Application Intrusion Detection System Rising Technology GIES Multiterabit Networks Mobile Commerce M Commerce i Planet

398. 399. 400. 401. 402. 403. 404. 405. 406. 407. 408. 409. 410. 411. 412. 413. 414. 415. 416. 417.

News Groups Wireless Technologies (bluetooth, 802.11x, IRDA) Java Card Taxonomy of S/w Testing Tools Brain Finger Printing DART Image Water Marking 4G- Wireless Fiber Optic technology S/w Testing Tools Pocket Doctor Adhoc Networks IRIS Recognization Raising Technologies Cell Phones beyond Call & Sms Mobile Tele Communication Radio Network Controller for 3G mobile and wireless network devices Recent Trends in Cryptography Artificial Intelligence and Neural Networks Domotics

Vous aimerez peut-être aussi