Latest Computer Science Seminar Topics-4
For JNTU B.Tec students, Paper presentations, seminar topics 8:15 PM
1. WI-FI
2. ATM NETWORKING
3. DISK BRAKES
4. GENERATION FIGHTER
5. BRAIN MACHINE INTERFACE
6. VOICE OVER IP (VOIP)
7. COMPUTER MEMORY
8. OLED
9. RADARS
10. BLUE-RAY DISKS
11. AJAX
12. BIO
13. METRICS
14. WI MAX
15. RED TACTON
16. WIRELESS
17. CDMA
18. INTERNET
19. COOKIES
20. HONEY NETS
21. PARELL EL
22. COMPUTING
23. COMPUTER
24. VIRUSES
25. MAGNETIC
26. LEVITATION
27. EMBEDDED
28. SYSTEMS
29. INTELLIGENT
30. WIRELESS
31. VIDEO
32. CAMERA
33. IMAGE COMPRESSION
34. HACKERS
35. BIOCHIPS
36. SATA
37. NETWORK SECURITY
38. BIOMETRICS
39. GRID COMPUTING
40. YIN AND YANG OF
41. NANOTECHNOLOGY
42. Y4EM222
43. BLACK BERRY
44. WI MAX
45. RED TACTON
46. WIRELESS CDMA
47. CONVERGENT
48. INTRODUCTION TO
49. SOFTWARE
50. HAPTIC TECHNOLOGY
51. SUPER CONDUCTORS
52. OPERATING SYSTEMS
53. AUGMENTED REALITY
54. AUTOMATED IRRIGATION SYSTEM
55. BLUE
56. BRAIN FINGERPRINTING TECHNOLOGY:“A RECENT ADVANCEMENT IN LIE DETECTION
57. IRIS SCANNING
58. LENS DISTORTION CORRECTION
59. NANOROBOTICS
60. ROBOTIC SURGERY
61. SMART CARD
62. Sun SPOT
63. ARTIFICIAL NEURAL NETWORK
64. AUTONOMIC COMPUTING
65. DNA COMPUTER
66. GREEN COMPUTING
67. LOAD BALANCING STRATEGY FOR GRID COMPUTING
68. PERVASIVE COMPUTING
69. HYPERTRANSPORT„¢ TECHNOLOGY Mr
70. INTELLIGENT TRANSPORTATION SYSTEM
71. DIGITAL VISUAL INTERFACE
72. FREE SPACE OPTICS COMMUNICATION
73. GEOGRAPHICAL INFORMATION SYSTEM
74. LASER TV
75. Nano tech
76. Miniature robots
77. Browser security
78. Evolution of Linux
79. Compare Vista and XP
80. Compare Windows and Mac
81. Cisco's CCNA and its advantages
82. Internet Explorer 8 and its advantages/disadvantages
83. On-demand webcast
84. Building a highly reliable SAN
85. Spyware and how to handle it
86. Viruses and ways to deal with them
87. How to make normal mp3 player as mp3 surround player
88. How to develop application for iPhone and iPod Touch
1. 3D Searching
Biological Computers
1. Rain Technology 1. Real Time Application Interface 1. GPS 1. HALO 1. BitTorrent 1. Compositional Adaptation 1. Rover Technology
Self Defending Networks
1. Semantic Web
Computer Intelligence Application
1. Cooperative Linux 1. Diamond chip 1. Digital Rights Management 1. A Plan For No Spam 1. BEOWULF Cluster 1. Digital Scent Technology
Distributed Interactive Virtual Environment
1. Dynamic TCP Connection Elapsing
CAPTCHA
1. Virtual Retinal Display 1. Wireless LAN Security 1. Chameleon Chip
Haptics
1. Intelligent RAM 1. iSCSI 1. Linux Kernel 2.6 1. Longhorn
Mesh Radio
1. Parallel Virtual Machine
1. Linux Virtual Server
Location Independent Naming
1. PHANToM 1. Multiprotocol Label Switching 1. Next Generation Secure Computing Base
NGSCB Reconfigurable computing
1. Sky X Technology
Smart Client Application Development using .NET
1. Spawning Networks 1. SPCS 1. Speed protocol processors 1. Strata flash Memory
Swarm Intelligence
1. The Callpaper Concept 1. IP spoofing 1. Internet Access via Cable TV Network 1. Face Recognition Technology
FireWire
1. Param 10000
The Deep Web
1. Virtual Campus
VoiceXML
1. Wireless USB
Refactoring
1. On-line Analytical Processing (OLAP) 1. Pivot Vector Space Approach in Audio-Video Mixing
MPEG-7
1. Adding Intelligence to Internet
Silverlight
1. DNA chips
1. Remote Administration Trojan's 1. Thermography 1. AJAX 1. Alternative Models Of Computation 1. Amorphous Computing and Swarm Intelligence 1. Windows DNA 1. Laptop Computer 1. Intelligent Software Agents 1. Self-Managing Computing 1. Hurd 1. Intel Centrino Mobile Technology 1. MPEG Video Compression 1. Survivable Networks Systems 1. Self Organizing Maps 1. Mobile IP 1. Iris Scanning 1. LWIP 1. Unified Modeling Language (UML) 1. Nanorobotics 1. Dual Core Processor 1. Cisco IOS Firewall 1. Socket Programming 1. SAM 1. 10 Gigabit Ethernet 1. Tripwire 1. Ubiquitous Networking
Unicode And Multilingual Computing XML Encryption
1. Y2K38 1. VoCable 1. Touch Screens 1. Tempest and Echelon
1. Synthetic Aperture Radar System 1. Unlicensed Mobile Access 1. IDS
IDC SATRACK
1. Asynchronous Chips 1. Low Power UART Design for Serial Data Communication 1. SPECT 1. Satellite Radio 1. Light emitting polymers 1. Sensors on 3D Digitization 1. Robotic Surgery 1. Buffer overflow attack : A potential problem and its Implications 1. Smart card
Quantum Information Technology Money Pad, The Future Wallet HVAC
1. Terrestrial Trunked Radio 1. Swarm intelligence & traffic Safety 1. Facility Layout Design using Genetic Algorithm 1. Human Computer Interface 1. HPJava 1. HDMI 1. H.323 1. Gaming Consoles 1. Fluorescent Multi-layer Disc 1. Futex
Extreme Programming (XP)
1. Earth Simulator 1. Compact peripheral component interconnect 1. Digital Visual Interface 1. corDECT Wireless in Local Loop System
1. Motes 1. Modular Computing 1. MiniDisc system 1. Migration From GSM Network To GPRS 1. M-Commerce 1. C# 1. IP Telephony 1. RPR
Broad Band Over Power Line
1. Rapid Prototyping 1. Dashboard 1. Code Division Duplexing 1. Delay Tolerant Networking 1. EDGE 1. Holographic Data Storage 1. Integer Fast Fourier Transform 1. NRAM 1. Orthogonal Frequency Division Multiplplexing 1. Ovonic Unified Memory 1. Pervasive Computing 1. RAID 1. Real Time Systems with Linux/RTAI 1. Real-Time Obstacle Avoidance 1. Symbian OS 1. Teleportation 1. Turbo Codes 1. Utility Fog 1. Cluster Computing
Wireless Application Protocol Light Tree
1. Smart Pixel Arrays 1. Project Oxygen
1. Wearable Bio-Sensors 1. Mobile Virtual Reality Service 1. QoS in Cellular Networks Based on MPT 1. Wireless Fidelity 1. Voice morphing 1. Radio Frequency Light Sources 1. Speed Detection of moving vehicle using speed cameras 1. Optical Packet Switching Network 1. Storage Area Networks 1. Smart Note Taker
Crusoe Processor Optical Satellite Communication
1. Optical packet switch architectures 1. Optical Switching 1. FRAM
Virtual Private Network Clockless Chip Layer 3 Switching IMode Blue Gene Access gateways Computer Forensics Direct Memory Access Crusoe Digital Subscriber Line Computer Memory Based on the Protein Bacterio-rhodopsin DNA Based Computing Free Space Optics Freenet Fiber Distributed Data Interface
Dynamic Virtual Private Network Introduction to the Internet Protocols Graphic processing Unit High Altitude Aeronautical Platforms Aspect-oriented programming (Aop) Intel MMX Technology Hyper-Threading technology IMAX Brain-Computer Interface InfiniBand Multicast Inverse Multiplexing Blue Tooth Holographic Memory Jini Technology Bio-metrics Magnetic Random Access Memory Intrution Detection System Multiterabit Networks Neural Networks And Their Applications Quantum Computers Small Computer System Interface OpenRAN Quadrics Interconnection Network Plan 9 Operating System Structured Cabling Quantum Cryptography Speech Application Language Tags Real- Time Systems and Real- Time Operating Systems Parallel Computing In India
Steganography Virtual LAN Technology Artificial Neural Network (ANN) Tele-immersion VHDL Blue Eyes Voice Over Internet Protocol The Tiger SHARC processor Autonomic Computing Wearable Computers Voice Portals
¢ ¢ ¢ ¢ ¢ ¢ ¢ ¢ ¢ ¢ ¢ ¢ ¢ ¢ ¢ ¢ ¢ ¢
Tamper Resistance CGI Programming DRM Software Radio Firewalls Handheld Computers Modems and ISDN Optical Free Space Communication Planar Separators Wireless Internet DVD Technology MPEG-4 Facial Animation Internet Telephony Policy in INDIA PON Topologies Smart Cards Surround Systems TCPA / Palladium Trustworthy Computing Sense-Response Applications
1. Optical Computer 1. Graph Separators
1. Extended Mark Up Language 1. Cellular Communications 1. Virtual Instrumentation 1. Voice Quality 1. Cable Modems 1. Dynamic Memory Allocation 1. Optical Mouse 1. Generic Framing Procedure 1. Dynamic Cache Management Technique 1. Ethernet Passive Optical Network 1. Synchronous Optical Networking 1. Development of the Intenet 1. Design and Analysis of Algoritms 1. Infinite Dimensional Vector Space 1. Instant Messaging 1. Optical Fibre Cable 1. GSM 1. Ambiophonics 1. Palladium 1. Computer Viruses 1. Third Generation 1. Object Oriented Concepts 1. Night Vision Technology 1. TCP/ IP 1. Dynamic Synchronous Transfer Mode 1. Integrated Voice and Data 1. Java Servlets 1. Smart Quill 1. Spam Assassin 1. Stereoscopic Imaging 1. Zigbee 1. Ultra-Wideband 1. Home Networking
1. Internet Protocol Television 1. Bacterio-Rhodopsin Memory 1. Blade Servers 1. Digital Cinema
Holographic Versatile Disc
1. Itanium Processor 1. Local Multipoint Distribution Service 1. Network Attached Storage 1. Night Vision Technology 1. Opera (web browser) 1. Parasitic Computing 1. Performance Testing 1. Java Ring 1. RD RAM 1. GSM Security And Encryption 1. Fast Convergence Algorithms for Active Noise Controlin Vehicles 1. 3G vs WiFi
Data Security in Local Network using Distributed Firewalls Computerized Paper Evaluation using Neural Network
1. Bluetooth Based Smart Sensor Networks 1. Laser Communications 1. Multiple Domain Orientation 1. Industrial Applications using Neural Networks 1. Implementation Of Zoom FFT 1. Image Processing 1. Virtual keyboard 1. Transient Stability Assessment using Neural Networks
Tracking and Positioning of Mobiles in Telecommunication Timing Attacks on Implementations
1. Prototype System Design for Telemedicine
Optical Networking and Dense Wavelength Division Multiplexing
1. Optical Burst Switching
1. Image Processing & Compression 1. Cyberterrorism 1. Ipv6 - The Next Generation Protocol 1. Driving Optical Network Evolution 1. Cellular Neural Network 1. Radio Network Controller 1. Digital Audio Broadcasting 1. Significance of real-time transport Protocol in VOIP 1. Space Mouse 1. Resilient Packet Ring Technology
Wireless Networked Digital Devices
1. Design of 2-D Filters using a Parallel Processor Architecture 1. Hyper Transport Technology 1. CorDECT 1. Storage Area Network 1. High Performance DSP Architectures 1. Smart Dust 1. MANET
Biometrics Based Authentication
1. Software-Defined Radio 1. Digital Video Editing 1. D-Blast 1. Aeronautical Communication 1. Gigabit Ethernet 1. Wisenet
Digital Light Processing Free Space Laser Communications
1. Millipede 1. AC Performance Of Nanoelectronics
4G Wireless Systems
1. Blu Ray Disc 1. Smart Fabrics
1. Daknet 1. Conditional Access System 1. SyncML 1. High Performance DSP Architectures 1. Short Message Service (SMS) 1. MANET
Worldwide Inter operatibility for Microwave Access
1. 64-Bit Computing 1. Bio-Molecular Computing
1.Andriod OS
2.Xen Ware
3.Blue Gene
4.Self Defending networks
5.Cognition & Perception
6.Network Attached Storages
7.4G & 5G
1) PCI DSS security module
2) AS2 protocol for file transfers
3) PGP encryption technology
4) OpenGPG encryption
6. Spyware
7. Quantum Computing
8. Blue - Ray Disc
9. Robotics
10. RFID
11. MANET
12. WAP
13. DNA Computing in security
14. 4g Wireless Systems
15. HomeRF- localized wireless technology optimized for the home environment
16. Internet Searching
17. Zigbee
18. Java Management Extensions (JMX) - component framework for building intelligent network
19. Earth Simulator- Fastest Supercomputer
20. Home Networking
21. TouchFLO Technology <
22. Tracking and Positioning of Mobiles in Telecommunication
23. 3D Volume Storage
24. Optical Networking and Dense Wavelength Division Multiplexing
25. Software-Defined Radio <
26. Space-time adaptive processing
27. Secure File Transfer (use PGP, deflate or nay encryption method)
28. A Secure GateWay
SPINS -Security Protocol For Sensor Network
Generic visual perception processor
Nanotechnology Assembler Design And Nano-Communication
Tele-Immersion
Liquid Crystal on Silicon Display (LCOS)
Jini - advanced set of network protocols
Computer memory based on the protein bacterio-rhodopsin
CSS and DeCSS
Multimedia Broadcast Multicast Service (MBMS)
Extreme Programming (XP)
Holographic Versatile Disc
Zero Knowledge proofs
Bimolecular Computers
>Context Disambiguation On Web Search Results
Touch Screen Technology
Surface Computer
Face Recognition Technology
4G Wireless Systems
A BASIC TOUCH-SENSOR SCREEN SYSTEM
Artificial Eye
Animatronics
Automatic Teller Machine
Aircars
Adding interlligence to ineternet using satellite
ADSL
Aeronautical Communications
Agent oriented programing
Animatronics
Augmented reality
Autonomic Computing
Bicmos technology
BIOCHIPS
Biomagnetism
Biometric technology
BLUE RAY
Boiler Instrumentation
Brain-Computer Interface
Bluetooth Based Smart Sensor Networks
BIBS
CDMA Wireless Data Transmitter
Cellonics Technology
Cellular Positioning
ZIGBEE
Cruise Control Devices
Crusoe Processor
PGP encryption technology
Generic visual perception processor
Nanotechnology Assembler Design And Nano-Communication
MANETS: Mobile Adhoc Networks
Liquid Crystal on Silicon Display (LCOS)
Jini - advanced set of network protocols
Computer memory based on the protein bacterio-rhodopsin
CSS and DeCSS
Multimedia Broadcast Multicast Service (MBMS)
Extreme Programming (XP)
Holographic Versatile Disc
Zero Knowledge proofs
Bimolecular Computers
SPINS -Security Protocol For Sensor Network
Context Disambiguation On Web Search Results
Surface Computer
a) Id-based encryption schemes
b) Computing the digits of the mathematical Pi
c) E-Commerce and Digital Signatures
d) SONET/SDH Communication
e) Particle Swarm Optimization
f) Multi Protocol Level Switching Virtual Private Network
g) Voice over IP
h) Quantum mechanical algorithms for hidden subgroups and related problems
i) Persistent Data Structures
j) Software Watermarking
k) The challenges of software reliability & modeling
l) Web Security
m) Identity-based encryption
n) Compiler Optimization:
o) Some Recent Trends
p) Web Service Standards for Data Mining
q) Natural Language Generation
r) 07CS6007 Geometry in Sensor Networks
s) Geometry in Sensor Networks
t) Trustworthy Computing
u) Software Metrics
v) Infinite Games
w) Automata over Infinite Words
x) Dual Core Processor : Architectural Features
y) Digital Video Encoding Formats
z) Delay Tolerant Routing
aa) Quorum Systems
bb) Information Extraction
cc) Named Entity Recognition
dd) XML Query Languages
ee) Geometry in Sensor Networks
ff) Linear Time encoding/decoding of ordinary tree and hypertree
gg) Semantic Web
hh) Multicore Processors and their Architectures
ii) IPv6
jj) Electronic Money:
kk) Underlying Mathematical Techniques
ll) RTOS for Mobile Devices
mm) Virtual Reality
nn) Cache Coherence Problem
oo) Parameterized Complexity
pp) Mathematical Programming
qq) Some topics in Digital Geometry
rr) Core Sets in Computational Geometry
ss) Some variants of mathematical programming
tt) Code Transformation
uu) Noisy text processing using machine learning methods
vv) Mobile electronic payments
ww) Secure data communication based on quantum effects
xx) Infinite Automata and Formal Verification
yy) Side Channel Attacks and its' counter measure for Block Cipher
zz) Primes are of two kinds: probable and provable
aaa) Are Mersenne primes only an obsession?
bbb) Time Contract Algorithms
ccc) Data communication in current and future wireless networks
ddd) Parametric searching “ what it is and how to make it practical
eee) Geometric applications in Sensor networks
fff) Packing and covering
ggg) Cache efficient algorithms
hhh) Facility location and clustering
iii) Some variants of mathematical programming
jjj) Model Checking
kkk) Decision diagrams in VLSI CAD
lll) Mobile Agents
mmm) Distributed File Systems
nnn) Emotional Agents: Computing Models of Emotions
ooo) Real Time Operating Systems Recent Trends
ppp) Information Extraction
qqq) Named Entity Recognition
rrr) XML Query Languages
sss) Stochastic Scheduling
ttt) Intrusion detection in wireless networks
uuu) Image steganography
vvv) Ultra Wideband Networking
www) Routing protocols in wireless sensor networks
xxx) Clustering techniques in complex network
yyy) Object Type System
zzz) Code Transformation
aaaa) Noisy text processing using machine learning methods
bbbb) Low Level Object Oriented Languages
cccc) Stochastic Scheduling
dddd) Intrusion detection in wireless networks
eeee) Image steganography
ffff) Ultra Wideband Networking
gggg) Routing protocols in wireless sensor networks
hhhh) Clustering techniques in complex network
iiii) Object Type System
jjjj) Grammar Induction
kkkk) Localization in Sensor Networks
llll) Reversible logic ciruits: design and test issues
mmmm) Digital Watermarking
nnnn) Program Verification
oooo) Quantum Cryptography
pppp) Quantum Cryptanalysis
qqqq) Simulation of entanglement with communication for distributed
rrrr) Problem solving.
ssss) Dual Core Processor : Architectural Features
tttt) Digital Video Encoding Formats
uuuu) Delay Tolerant Routing
vvvv) Quorum Systems
wwww) Mobile electronic payments
xxxx) Secure data communication based on quantum effects
yyyy) Algorithms for networking
zzzz) Infinite Automata and Formal Verification
aaaaa) Side Channel Attacks and its' counter measure for Block Cipher
bbbbb) Salient aspects of the architecture of the Itanium CPU
ccccc) Using the combination lemma: Proving upper bounds on the
ddddd) Combinatorial complexity of unions.
eeeee) Proving lower bounds using Holevo's result.
fffff) Recommender System
ggggg) Towards Object Oriented Design using Verilog HDL
hhhhh) Real Time Operating Systems
iiiii) Web services
jjjjj) The spyware nightmare: The problems and possible solutions 2005
kkkkk) Platform Architecture
lllll) 3G Cellular Telephone network
mmmmm) Epsilon nets and transversal of hypergraphs
nnnnn) Geometric Discrepancy
ooooo) LP-Based Approximation Algorithms
ppppp) Game theoretic issues in algorithms
2. ATM NETWORKING
3. DISK BRAKES
4. GENERATION FIGHTER
5. BRAIN MACHINE INTERFACE
6. VOICE OVER IP (VOIP)
7. COMPUTER MEMORY
8. OLED
9. RADARS
10. BLUE-RAY DISKS
11. AJAX
12. BIO
13. METRICS
14. WI MAX
15. RED TACTON
16. WIRELESS
17. CDMA
18. INTERNET
19. COOKIES
20. HONEY NETS
21. PARELL EL
22. COMPUTING
23. COMPUTER
24. VIRUSES
25. MAGNETIC
26. LEVITATION
27. EMBEDDED
28. SYSTEMS
29. INTELLIGENT
30. WIRELESS
31. VIDEO
32. CAMERA
33. IMAGE COMPRESSION
34. HACKERS
35. BIOCHIPS
36. SATA
37. NETWORK SECURITY
38. BIOMETRICS
39. GRID COMPUTING
40. YIN AND YANG OF
41. NANOTECHNOLOGY
42. Y4EM222
43. BLACK BERRY
44. WI MAX
45. RED TACTON
46. WIRELESS CDMA
47. CONVERGENT
48. INTRODUCTION TO
49. SOFTWARE
50. HAPTIC TECHNOLOGY
51. SUPER CONDUCTORS
52. OPERATING SYSTEMS
53. AUGMENTED REALITY
54. AUTOMATED IRRIGATION SYSTEM
55. BLUE
56. BRAIN FINGERPRINTING TECHNOLOGY:“A RECENT ADVANCEMENT IN LIE DETECTION
57. IRIS SCANNING
58. LENS DISTORTION CORRECTION
59. NANOROBOTICS
60. ROBOTIC SURGERY
61. SMART CARD
62. Sun SPOT
63. ARTIFICIAL NEURAL NETWORK
64. AUTONOMIC COMPUTING
65. DNA COMPUTER
66. GREEN COMPUTING
67. LOAD BALANCING STRATEGY FOR GRID COMPUTING
68. PERVASIVE COMPUTING
69. HYPERTRANSPORT„¢ TECHNOLOGY Mr
70. INTELLIGENT TRANSPORTATION SYSTEM
71. DIGITAL VISUAL INTERFACE
72. FREE SPACE OPTICS COMMUNICATION
73. GEOGRAPHICAL INFORMATION SYSTEM
74. LASER TV
75. Nano tech
76. Miniature robots
77. Browser security
78. Evolution of Linux
79. Compare Vista and XP
80. Compare Windows and Mac
81. Cisco's CCNA and its advantages
82. Internet Explorer 8 and its advantages/disadvantages
83. On-demand webcast
84. Building a highly reliable SAN
85. Spyware and how to handle it
86. Viruses and ways to deal with them
87. How to make normal mp3 player as mp3 surround player
88. How to develop application for iPhone and iPod Touch
1. 3D Searching
Biological Computers
1. Rain Technology 1. Real Time Application Interface 1. GPS 1. HALO 1. BitTorrent 1. Compositional Adaptation 1. Rover Technology
Self Defending Networks
1. Semantic Web
Computer Intelligence Application
1. Cooperative Linux 1. Diamond chip 1. Digital Rights Management 1. A Plan For No Spam 1. BEOWULF Cluster 1. Digital Scent Technology
Distributed Interactive Virtual Environment
1. Dynamic TCP Connection Elapsing
CAPTCHA
1. Virtual Retinal Display 1. Wireless LAN Security 1. Chameleon Chip
Haptics
1. Intelligent RAM 1. iSCSI 1. Linux Kernel 2.6 1. Longhorn
Mesh Radio
1. Parallel Virtual Machine
1. Linux Virtual Server
Location Independent Naming
1. PHANToM 1. Multiprotocol Label Switching 1. Next Generation Secure Computing Base
NGSCB Reconfigurable computing
1. Sky X Technology
Smart Client Application Development using .NET
1. Spawning Networks 1. SPCS 1. Speed protocol processors 1. Strata flash Memory
Swarm Intelligence
1. The Callpaper Concept 1. IP spoofing 1. Internet Access via Cable TV Network 1. Face Recognition Technology
FireWire
1. Param 10000
The Deep Web
1. Virtual Campus
VoiceXML
1. Wireless USB
Refactoring
1. On-line Analytical Processing (OLAP) 1. Pivot Vector Space Approach in Audio-Video Mixing
MPEG-7
1. Adding Intelligence to Internet
Silverlight
1. DNA chips
1. Remote Administration Trojan's 1. Thermography 1. AJAX 1. Alternative Models Of Computation 1. Amorphous Computing and Swarm Intelligence 1. Windows DNA 1. Laptop Computer 1. Intelligent Software Agents 1. Self-Managing Computing 1. Hurd 1. Intel Centrino Mobile Technology 1. MPEG Video Compression 1. Survivable Networks Systems 1. Self Organizing Maps 1. Mobile IP 1. Iris Scanning 1. LWIP 1. Unified Modeling Language (UML) 1. Nanorobotics 1. Dual Core Processor 1. Cisco IOS Firewall 1. Socket Programming 1. SAM 1. 10 Gigabit Ethernet 1. Tripwire 1. Ubiquitous Networking
Unicode And Multilingual Computing XML Encryption
1. Y2K38 1. VoCable 1. Touch Screens 1. Tempest and Echelon
1. Synthetic Aperture Radar System 1. Unlicensed Mobile Access 1. IDS
IDC SATRACK
1. Asynchronous Chips 1. Low Power UART Design for Serial Data Communication 1. SPECT 1. Satellite Radio 1. Light emitting polymers 1. Sensors on 3D Digitization 1. Robotic Surgery 1. Buffer overflow attack : A potential problem and its Implications 1. Smart card
Quantum Information Technology Money Pad, The Future Wallet HVAC
1. Terrestrial Trunked Radio 1. Swarm intelligence & traffic Safety 1. Facility Layout Design using Genetic Algorithm 1. Human Computer Interface 1. HPJava 1. HDMI 1. H.323 1. Gaming Consoles 1. Fluorescent Multi-layer Disc 1. Futex
Extreme Programming (XP)
1. Earth Simulator 1. Compact peripheral component interconnect 1. Digital Visual Interface 1. corDECT Wireless in Local Loop System
1. Motes 1. Modular Computing 1. MiniDisc system 1. Migration From GSM Network To GPRS 1. M-Commerce 1. C# 1. IP Telephony 1. RPR
Broad Band Over Power Line
1. Rapid Prototyping 1. Dashboard 1. Code Division Duplexing 1. Delay Tolerant Networking 1. EDGE 1. Holographic Data Storage 1. Integer Fast Fourier Transform 1. NRAM 1. Orthogonal Frequency Division Multiplplexing 1. Ovonic Unified Memory 1. Pervasive Computing 1. RAID 1. Real Time Systems with Linux/RTAI 1. Real-Time Obstacle Avoidance 1. Symbian OS 1. Teleportation 1. Turbo Codes 1. Utility Fog 1. Cluster Computing
Wireless Application Protocol Light Tree
1. Smart Pixel Arrays 1. Project Oxygen
1. Wearable Bio-Sensors 1. Mobile Virtual Reality Service 1. QoS in Cellular Networks Based on MPT 1. Wireless Fidelity 1. Voice morphing 1. Radio Frequency Light Sources 1. Speed Detection of moving vehicle using speed cameras 1. Optical Packet Switching Network 1. Storage Area Networks 1. Smart Note Taker
Crusoe Processor Optical Satellite Communication
1. Optical packet switch architectures 1. Optical Switching 1. FRAM
Virtual Private Network Clockless Chip Layer 3 Switching IMode Blue Gene Access gateways Computer Forensics Direct Memory Access Crusoe Digital Subscriber Line Computer Memory Based on the Protein Bacterio-rhodopsin DNA Based Computing Free Space Optics Freenet Fiber Distributed Data Interface
Dynamic Virtual Private Network Introduction to the Internet Protocols Graphic processing Unit High Altitude Aeronautical Platforms Aspect-oriented programming (Aop) Intel MMX Technology Hyper-Threading technology IMAX Brain-Computer Interface InfiniBand Multicast Inverse Multiplexing Blue Tooth Holographic Memory Jini Technology Bio-metrics Magnetic Random Access Memory Intrution Detection System Multiterabit Networks Neural Networks And Their Applications Quantum Computers Small Computer System Interface OpenRAN Quadrics Interconnection Network Plan 9 Operating System Structured Cabling Quantum Cryptography Speech Application Language Tags Real- Time Systems and Real- Time Operating Systems Parallel Computing In India
Steganography Virtual LAN Technology Artificial Neural Network (ANN) Tele-immersion VHDL Blue Eyes Voice Over Internet Protocol The Tiger SHARC processor Autonomic Computing Wearable Computers Voice Portals
¢ ¢ ¢ ¢ ¢ ¢ ¢ ¢ ¢ ¢ ¢ ¢ ¢ ¢ ¢ ¢ ¢ ¢
Tamper Resistance CGI Programming DRM Software Radio Firewalls Handheld Computers Modems and ISDN Optical Free Space Communication Planar Separators Wireless Internet DVD Technology MPEG-4 Facial Animation Internet Telephony Policy in INDIA PON Topologies Smart Cards Surround Systems TCPA / Palladium Trustworthy Computing Sense-Response Applications
1. Optical Computer 1. Graph Separators
1. Extended Mark Up Language 1. Cellular Communications 1. Virtual Instrumentation 1. Voice Quality 1. Cable Modems 1. Dynamic Memory Allocation 1. Optical Mouse 1. Generic Framing Procedure 1. Dynamic Cache Management Technique 1. Ethernet Passive Optical Network 1. Synchronous Optical Networking 1. Development of the Intenet 1. Design and Analysis of Algoritms 1. Infinite Dimensional Vector Space 1. Instant Messaging 1. Optical Fibre Cable 1. GSM 1. Ambiophonics 1. Palladium 1. Computer Viruses 1. Third Generation 1. Object Oriented Concepts 1. Night Vision Technology 1. TCP/ IP 1. Dynamic Synchronous Transfer Mode 1. Integrated Voice and Data 1. Java Servlets 1. Smart Quill 1. Spam Assassin 1. Stereoscopic Imaging 1. Zigbee 1. Ultra-Wideband 1. Home Networking
1. Internet Protocol Television 1. Bacterio-Rhodopsin Memory 1. Blade Servers 1. Digital Cinema
Holographic Versatile Disc
1. Itanium Processor 1. Local Multipoint Distribution Service 1. Network Attached Storage 1. Night Vision Technology 1. Opera (web browser) 1. Parasitic Computing 1. Performance Testing 1. Java Ring 1. RD RAM 1. GSM Security And Encryption 1. Fast Convergence Algorithms for Active Noise Controlin Vehicles 1. 3G vs WiFi
Data Security in Local Network using Distributed Firewalls Computerized Paper Evaluation using Neural Network
1. Bluetooth Based Smart Sensor Networks 1. Laser Communications 1. Multiple Domain Orientation 1. Industrial Applications using Neural Networks 1. Implementation Of Zoom FFT 1. Image Processing 1. Virtual keyboard 1. Transient Stability Assessment using Neural Networks
Tracking and Positioning of Mobiles in Telecommunication Timing Attacks on Implementations
1. Prototype System Design for Telemedicine
Optical Networking and Dense Wavelength Division Multiplexing
1. Optical Burst Switching
1. Image Processing & Compression 1. Cyberterrorism 1. Ipv6 - The Next Generation Protocol 1. Driving Optical Network Evolution 1. Cellular Neural Network 1. Radio Network Controller 1. Digital Audio Broadcasting 1. Significance of real-time transport Protocol in VOIP 1. Space Mouse 1. Resilient Packet Ring Technology
Wireless Networked Digital Devices
1. Design of 2-D Filters using a Parallel Processor Architecture 1. Hyper Transport Technology 1. CorDECT 1. Storage Area Network 1. High Performance DSP Architectures 1. Smart Dust 1. MANET
Biometrics Based Authentication
1. Software-Defined Radio 1. Digital Video Editing 1. D-Blast 1. Aeronautical Communication 1. Gigabit Ethernet 1. Wisenet
Digital Light Processing Free Space Laser Communications
1. Millipede 1. AC Performance Of Nanoelectronics
4G Wireless Systems
1. Blu Ray Disc 1. Smart Fabrics
1. Daknet 1. Conditional Access System 1. SyncML 1. High Performance DSP Architectures 1. Short Message Service (SMS) 1. MANET
Worldwide Inter operatibility for Microwave Access
1. 64-Bit Computing 1. Bio-Molecular Computing
1.Andriod OS
2.Xen Ware
3.Blue Gene
4.Self Defending networks
5.Cognition & Perception
6.Network Attached Storages
7.4G & 5G
1) PCI DSS security module
2) AS2 protocol for file transfers
3) PGP encryption technology
4) OpenGPG encryption
6. Spyware
7. Quantum Computing
8. Blue - Ray Disc
9. Robotics
10. RFID
11. MANET
12. WAP
13. DNA Computing in security
14. 4g Wireless Systems
15. HomeRF- localized wireless technology optimized for the home environment
16. Internet Searching
17. Zigbee
18. Java Management Extensions (JMX) - component framework for building intelligent network
19. Earth Simulator- Fastest Supercomputer
20. Home Networking
21. TouchFLO Technology <
22. Tracking and Positioning of Mobiles in Telecommunication
23. 3D Volume Storage
24. Optical Networking and Dense Wavelength Division Multiplexing
25. Software-Defined Radio <
26. Space-time adaptive processing
27. Secure File Transfer (use PGP, deflate or nay encryption method)
28. A Secure GateWay
SPINS -Security Protocol For Sensor Network
Generic visual perception processor
Nanotechnology Assembler Design And Nano-Communication
Tele-Immersion
Liquid Crystal on Silicon Display (LCOS)
Jini - advanced set of network protocols
Computer memory based on the protein bacterio-rhodopsin
CSS and DeCSS
Multimedia Broadcast Multicast Service (MBMS)
Extreme Programming (XP)
Holographic Versatile Disc
Zero Knowledge proofs
Bimolecular Computers
>Context Disambiguation On Web Search Results
Touch Screen Technology
Surface Computer
Face Recognition Technology
4G Wireless Systems
A BASIC TOUCH-SENSOR SCREEN SYSTEM
Artificial Eye
Animatronics
Automatic Teller Machine
Aircars
Adding interlligence to ineternet using satellite
ADSL
Aeronautical Communications
Agent oriented programing
Animatronics
Augmented reality
Autonomic Computing
Bicmos technology
BIOCHIPS
Biomagnetism
Biometric technology
BLUE RAY
Boiler Instrumentation
Brain-Computer Interface
Bluetooth Based Smart Sensor Networks
BIBS
CDMA Wireless Data Transmitter
Cellonics Technology
Cellular Positioning
ZIGBEE
Cruise Control Devices
Crusoe Processor
PGP encryption technology
Generic visual perception processor
Nanotechnology Assembler Design And Nano-Communication
MANETS: Mobile Adhoc Networks
Liquid Crystal on Silicon Display (LCOS)
Jini - advanced set of network protocols
Computer memory based on the protein bacterio-rhodopsin
CSS and DeCSS
Multimedia Broadcast Multicast Service (MBMS)
Extreme Programming (XP)
Holographic Versatile Disc
Zero Knowledge proofs
Bimolecular Computers
SPINS -Security Protocol For Sensor Network
Context Disambiguation On Web Search Results
Surface Computer
a) Id-based encryption schemes
b) Computing the digits of the mathematical Pi
c) E-Commerce and Digital Signatures
d) SONET/SDH Communication
e) Particle Swarm Optimization
f) Multi Protocol Level Switching Virtual Private Network
g) Voice over IP
h) Quantum mechanical algorithms for hidden subgroups and related problems
i) Persistent Data Structures
j) Software Watermarking
k) The challenges of software reliability & modeling
l) Web Security
m) Identity-based encryption
n) Compiler Optimization:
o) Some Recent Trends
p) Web Service Standards for Data Mining
q) Natural Language Generation
r) 07CS6007 Geometry in Sensor Networks
s) Geometry in Sensor Networks
t) Trustworthy Computing
u) Software Metrics
v) Infinite Games
w) Automata over Infinite Words
x) Dual Core Processor : Architectural Features
y) Digital Video Encoding Formats
z) Delay Tolerant Routing
aa) Quorum Systems
bb) Information Extraction
cc) Named Entity Recognition
dd) XML Query Languages
ee) Geometry in Sensor Networks
ff) Linear Time encoding/decoding of ordinary tree and hypertree
gg) Semantic Web
hh) Multicore Processors and their Architectures
ii) IPv6
jj) Electronic Money:
kk) Underlying Mathematical Techniques
ll) RTOS for Mobile Devices
mm) Virtual Reality
nn) Cache Coherence Problem
oo) Parameterized Complexity
pp) Mathematical Programming
qq) Some topics in Digital Geometry
rr) Core Sets in Computational Geometry
ss) Some variants of mathematical programming
tt) Code Transformation
uu) Noisy text processing using machine learning methods
vv) Mobile electronic payments
ww) Secure data communication based on quantum effects
xx) Infinite Automata and Formal Verification
yy) Side Channel Attacks and its' counter measure for Block Cipher
zz) Primes are of two kinds: probable and provable
aaa) Are Mersenne primes only an obsession?
bbb) Time Contract Algorithms
ccc) Data communication in current and future wireless networks
ddd) Parametric searching “ what it is and how to make it practical
eee) Geometric applications in Sensor networks
fff) Packing and covering
ggg) Cache efficient algorithms
hhh) Facility location and clustering
iii) Some variants of mathematical programming
jjj) Model Checking
kkk) Decision diagrams in VLSI CAD
lll) Mobile Agents
mmm) Distributed File Systems
nnn) Emotional Agents: Computing Models of Emotions
ooo) Real Time Operating Systems Recent Trends
ppp) Information Extraction
qqq) Named Entity Recognition
rrr) XML Query Languages
sss) Stochastic Scheduling
ttt) Intrusion detection in wireless networks
uuu) Image steganography
vvv) Ultra Wideband Networking
www) Routing protocols in wireless sensor networks
xxx) Clustering techniques in complex network
yyy) Object Type System
zzz) Code Transformation
aaaa) Noisy text processing using machine learning methods
bbbb) Low Level Object Oriented Languages
cccc) Stochastic Scheduling
dddd) Intrusion detection in wireless networks
eeee) Image steganography
ffff) Ultra Wideband Networking
gggg) Routing protocols in wireless sensor networks
hhhh) Clustering techniques in complex network
iiii) Object Type System
jjjj) Grammar Induction
kkkk) Localization in Sensor Networks
llll) Reversible logic ciruits: design and test issues
mmmm) Digital Watermarking
nnnn) Program Verification
oooo) Quantum Cryptography
pppp) Quantum Cryptanalysis
qqqq) Simulation of entanglement with communication for distributed
rrrr) Problem solving.
ssss) Dual Core Processor : Architectural Features
tttt) Digital Video Encoding Formats
uuuu) Delay Tolerant Routing
vvvv) Quorum Systems
wwww) Mobile electronic payments
xxxx) Secure data communication based on quantum effects
yyyy) Algorithms for networking
zzzz) Infinite Automata and Formal Verification
aaaaa) Side Channel Attacks and its' counter measure for Block Cipher
bbbbb) Salient aspects of the architecture of the Itanium CPU
ccccc) Using the combination lemma: Proving upper bounds on the
ddddd) Combinatorial complexity of unions.
eeeee) Proving lower bounds using Holevo's result.
fffff) Recommender System
ggggg) Towards Object Oriented Design using Verilog HDL
hhhhh) Real Time Operating Systems
iiiii) Web services
jjjjj) The spyware nightmare: The problems and possible solutions 2005
kkkkk) Platform Architecture
lllll) 3G Cellular Telephone network
mmmmm) Epsilon nets and transversal of hypergraphs
nnnnn) Geometric Discrepancy
ooooo) LP-Based Approximation Algorithms
ppppp) Game theoretic issues in algorithms
If you like this post or this post has helped you in anyway, please click the +1 button below to recommend this page and support our website.
You can follow us on Twitter or join our Facebook Fan Page for more updates like this .
Posted by Chaitu
on 8:15 PM.
Filed under
For JNTU B.Tec students,
Paper presentations,
seminar topics
.
You can follow any responses to this entry through the RSS 2.0