31
1. Brain Gate 2. Palm Vein Technology 3. Sniffer for detecting lost mobiles 4. 5 Pen PC Technology 5. iDEN 6. Hi-Fi 7. Packet Sniffers 8. Brain Chips 9. Phishing 10. Pill Camera 11. Blue Brain 12. Mobile Phone Cloning 13. Nano Cars Into The Robotics 14. Mind-Reading Computer 15. Intelligent Speed Adaptation 16. GSM Based Vehicle Theft Control System 17. Global Wireless E-Voting 18. Green Cloud 19. Digital Jewelry 20. Biometric Voting System 21. 3D Television 22. 3D password 23. Voice Browser 24. Gi-Fi 25. Graphical Password Authentication 26. 4G Broadband 27. Finger Tracking In Real Time Human Computer Interaction 28. Eye Movement-Based Human Computer Interaction Techniques 29. Ethical Hacking 30. E-Cash Payment System 31. Cyborgs 32. Brain Fingerprinting 33. Biometrics in SECURE e-transaction 34. X- Internet 35. Surface Computer 36. Secure ATM by Image Processing 37. Mobile Ad-Hoc Networks Extensions to Zone Routing Protocol 38. Wibree 39. Telepresence

Seminar Topics for final year students

Embed Size (px)

DESCRIPTION

Seminar Topics

Citation preview

Page 1: Seminar Topics for final year students

1. Brain Gate

2. Palm Vein Technology

3. Sniffer for detecting lost mobiles

4. 5 Pen PC Technology

5. iDEN

6. Hi-Fi

7. Packet Sniffers

8. Brain Chips

9. Phishing

10. Pill Camera

11. Blue Brain

12. Mobile Phone Cloning

13. Nano Cars Into The Robotics

14. Mind-Reading Computer

15. Intelligent Speed Adaptation

16. GSM Based Vehicle Theft Control System

17. Global Wireless E-Voting

18. Green Cloud

19. Digital Jewelry

20. Biometric Voting System

21. 3D Television

22. 3D password

23. Voice Browser

24. Gi-Fi

25. Graphical Password Authentication

26. 4G Broadband

27. Finger Tracking In Real Time Human Computer Interaction

28. Eye Movement-Based Human Computer Interaction Techniques

29. Ethical Hacking

30. E-Cash Payment System

31. Cyborgs

32. Brain Fingerprinting

33. Biometrics in SECURE e-transaction

34. X- Internet

35. Surface Computer

36. Secure ATM by Image Processing

37. Mobile Ad-Hoc Networks Extensions to Zone Routing Protocol

38. Wibree

39. Telepresence

Page 2: Seminar Topics for final year students

40. System in Package

41. Smart Memories

42. Slammer Worm

43. Sensitive Skin

44. Pixie Dust

45. Linux Kernel 2.6

46. Lamp Technology

47. Humanoid Robot

48. HTAM

49. Haptic Technology

50. Elastic Quotas

51. Diamond chip

52. Digital Rights Management

53. A Plan For No Spam

54. BEOWULF Cluster

55. Digital Scent Technology

56. Distributed Interactive Virtual Environment

57. Dynamic TCP Connection Elapsing

58. CAPTCHA

59. Virtual Retinal Display

60. Wireless LAN Security

61. Chameleon Chip

62. Haptics

63. Intelligent RAM

64. iSCSI

65. Linux Kernel 2.6

66. 3D Searching

67. Biological Computers

68. Rain Technology

69. Real Time Application Interface

70. GPS

71. HALO

72. BitTorrent

73. Compositional Adaptation

74. Rover Technology

75. Self Defending Networks

76. Semantic Web

77. Computer Intelligence Application

78. Cooperative Linux

Page 3: Seminar Topics for final year students

79. Longhorn

80. Mesh Radio

81. Parallel Virtual Machine

82. Linux Virtual Server

83. Location Independent Naming

84. PHANToM

85. Multiprotocol Label Switching

86. Next Generation Secure Computing Base

87. NGSCB

88. Reconfigurable computing

89. Sky X Technology

90. Smart Client Application Development using .NET

91. Spawning Networks

92. SPCS

93. Speed protocol processors

94. Strata flash Memory

95. Swarm Intelligence

96. The Callpaper Concept

97. IP spoofing

98. Internet Access via Cable TV Network

99. Face Recognition Technology

100. FireWire

101. Param 10000

102. The Deep Web

103. Virtual Campus

104. VoiceXML

105. Wireless USB

106. Refactoring

107. On-line Analytical Processing (OLAP)

108. Pivot Vector Space Approach in Audio-Video Mixing

109. MPEG-7

110. Adding Intelligence to Internet

111. Silverlight

112. DNA chips

113. Remote Administration Trojan's

114. Thermography

115. AJAX

116. Alternative Models Of Computation

117. Amorphous Computing and Swarm Intelligence

Page 4: Seminar Topics for final year students

118. Windows DNA

119. Laptop Computer

120. Intelligent Software Agents

121. Self-Managing Computing

122. Hurd

123. Intel Centrino Mobile Technology

124. MPEG Video Compression

125. Survivable Networks Systems

126. Self Organizing Maps

127. Mobile IP

128. Iris Scanning

129. LWIP

130. Unified Modeling Language (UML)

131. Nanorobotics

132. Dual Core Processor

133. Cisco IOS Firewall

134. Socket Programming

135. SAM

136. 10 Gigabit Ethernet

137. Tripwire

138. Ubiquitous Networking

139. Unicode And Multilingual Computing

140. XML Encryption

141. Y2K38

142. VoCable

143. Touch Screens

144. Tempest and Echelon

145. Synthetic Aperture Radar System

146. Unlicensed Mobile Access

147. IDS

148. IDC

149. SATRACK

150. Asynchronous Chips

151. Low Power UART Design for Serial Data Communication

152. SPECT

153. Satellite Radio

154. Light emitting polymers

155. Sensors on 3D Digitization

156. Robotic Surgery

Page 5: Seminar Topics for final year students

157. Buffer overflow attack : A potential problem and its Implications

158. Smart card

159. Quantum Information Technology

160. Money Pad, The Future Wallet

161. HVAC

162. Terrestrial Trunked Radio

163. Swarm intelligence & traffic Safety

164. Facility Layout Design using Genetic Algorithm

165. Human Computer Interface

166. HPJava

167. Gaming Consoles

168. Fluorescent Multi-layer Disc

169. Futex

170. Extreme Programming (XP)

171. Earth Simulator

172. Compact peripheral component interconnect

173. corDECT Wireless in Local Loop System

174. Motes

175. Modular Computing

176. MiniDisc system

177. Migration From GSM Network To GPRS

178. M-Commerce

179. C#

180. IP Telephony

181. RPR

182. Broad Band Over Power Line

183. Rapid Prototyping

184. Dashboard

185. Code Division Duplexing

186. Delay Tolerant Networking

187. EDGE

188. Holographic Data Storage

189. Integer Fast Fourier Transform

190. NRAM

191. Orthogonal Frequency Division Multiplplexing

192. Ovonic Unified Memory

193. Pervasive Computing

194. RAID

195. Real Time Systems with Linux/RTAI

Page 6: Seminar Topics for final year students

196. Real-Time Obstacle Avoidance

197. Symbian OS

198. Teleportation

199. Turbo Codes

200. Utility Fog

201. Cluster Computing

202. Wireless Application Protocol

203. Light Tree

204. Smart Pixel Arrays

205. Project Oxygen

206. Wearable Bio-Sensors

207. Mobile Virtual Reality Service

208. QoS in Cellular Networks Based on MPT

209. Wireless Fidelity

210. Voice morphing

211. Radio Frequency Light Sources

212. Speed Detection of moving vehicle using speed cameras

213. Optical Packet Switching Network

214. Storage Area Networks

215. Smart Note Taker

216. Crusoe Processor

217. Optical Satellite Communication

218. Optical packet switch architectures

219. Optical Switching

220. FRAM

221. Virtual Private Network

222. Clockless Chip

223. Layer 3 Switching

224. IMode

225. Blue Gene

226. Access gateways

227. Computer Forensics

228. Direct Memory Access

229. Crusoe

230. Digital Subscriber Line

231. Computer Memory Based on the Protein Bacterio-rhodopsin

232. DNA Based Computing

233. Free Space Optics

234. Freenet

Page 7: Seminar Topics for final year students

235. Fiber Distributed Data Interface

236. Dynamic Virtual Private Network

237. Introduction to the Internet Protocols

238. Graphic processing Unit

239. High Altitude Aeronautical Platforms

240. Aspect-oriented programming (Aop)

241. Intel MMX Technology

242. Hyper-Threading technology

243. IMAX

244. Brain-Computer Interface

245. InfiniBand

246. Multicast

247. Inverse Multiplexing

248. Blue Tooth

249. Holographic Memory

250. Jini Technology

251. Bio-metrics

252. Magnetic Random Access Memory

253. Intrution Detection System

254. Multiterabit Networks

255. Neural Networks And Their Applications

256. Quantum Computers

257. Small Computer System Interface

258. OpenRAN

259. Quadrics Interconnection Network

260. Plan 9 Operating System

261. Structured Cabling

262. Quantum Cryptography

263. Speech Application Language Tags

264. Real- Time Systems and Real- Time Operating Systems

265. Parallel Computing In India

266. Steganography

267. Virtual LAN Technology

268. Artificial Neural Network (ANN)

269. Tele-immersion

270. VHDL

271. Blue Eyes

272. Voice Over Internet Protocol

273. The Tiger SHARC processor

Page 8: Seminar Topics for final year students

274. Autonomic Computing

275. Wearable Computers

276. Voice Portals

277. Tamper Resistance

278. CGI Programming

279. DRM Software Radio

280. Firewalls

281. Handheld Computers

282. Modems and ISDN

283. Optical Free Space Communication

284. Planar Separators

285. Wireless Internet

286. DVD Technology

287. MPEG-4 Facial Animation

288. Internet Telephony Policy in INDIA

289. PON Topologies

290. Smart Cards

291. Surround Systems

292. TCPA / Palladium

293. Trustworthy Computing

294. Sense-Response Applications

295. Optical Computer

296. Graph Separators

297. Extended Mark Up Language

298. Cellular Communications

299. Virtual Instrumentation

300. Voice Quality

301. Cable Modems

302. Dynamic Memory Allocation

303. Optical Mouse

304. Generic Framing Procedure

305. Dynamic Cache Management Technique

306. Ethernet Passive Optical Network

307. Synchronous Optical Networking

308. Development of the Intenet

309. Design and Analysis of Algoritms

310. Infinite Dimensional Vector Space

311. Instant Messaging

312. Optical Fibre Cable

Page 9: Seminar Topics for final year students

313. GSM

314. Ambiophonics

315. Palladium

316. Computer Viruses

317. Third Generation

318. Object Oriented Concepts

319. Night Vision Technology

320. TCP/ IP

321. Dynamic Synchronous Transfer Mode

322. Integrated Voice and Data

323. Java Servlets

324. Smart Quill

325. Spam Assassin

326. Stereoscopic Imaging

327. Zigbee

328. Ultra-Wideband

329. Home Networking

330. Internet Protocol Television

331. Bacterio-Rhodopsin Memory

332. Blade Servers

333. Digital Cinema

334. Holographic Versatile Disc

335. Itanium Processor

336. Local Multipoint Distribution Service

337. Network Attached Storage

338. Night Vision Technology

339. Opera (web browser)

340. Parasitic Computing

341. Performance Testing

342. Java Ring

343. RD RAM

344. GSM Security And Encryption

345. Fast Convergence Algorithms for Active Noise Controlin Vehicles

346. 3G vs WiFi

347. Data Security in Local Network using Distributed Firewalls

348. Computerized Paper Evaluation using Neural Network

349. Bluetooth Based Smart Sensor Networks

350. Laser Communications

351. Multiple Domain Orientation

Page 10: Seminar Topics for final year students

352. Industrial Applications using Neural Networks

353. Implementation Of Zoom FFT

354. Image Processing

355. Virtual keyboard

356. Transient Stability Assessment using Neural Networks

357. Tracking and Positioning of Mobiles in Telecommunication

358. Timing Attacks on Implementations

359. Prototype System Design for Telemedicine

360. Optical Networking and Dense Wavelength Division Multiplexing

361. Optical Burst Switching

362. Image Processing & Compression

363. Cyberterrorism

364. Ipv6 - The Next Generation Protocol

365. Driving Optical Network Evolution

366. Cellular Neural Network

367. Radio Network Controller

368. Digital Audio Broadcasting

369. Significance of real-time transport Protocol in VOIP

370. Space Mouse

371. Resilient Packet Ring Technology

372. Wireless Networked Digital Devices

373. Design of 2-D Filters using a Parallel Processor Architecture

374. Hyper Transport Technology

375. CorDECT

376. Storage Area Network

377. High Performance DSP Architectures

378. Smart Dust

379. MANET

380. Biometrics Based Authentication

381. Software-Defined Radio

382. Digital Video Editing

383. D-Blast

384. Aeronautical Communication

385. Gigabit Ethernet

386. Wisenet

387. Digital Light Processing

388. Free Space Laser Communications

389. Millipede

390. AC Performance Of Nanoelectronics

Page 11: Seminar Topics for final year students

391. 4G Wireless Systems

392. Blu Ray Disc

393. Smart Fabrics

394. Daknet

395. Conditional Access System

396. SyncML

397. High Performance DSP Architectures

398. Short Message Service (SMS)

399. MANET

400. Worldwide Inter operatibility for Microwave Access

401. 64-Bit Computing

402. Bio-Molecular Computing

403. Tracking and Positioning of Mobiles in Telecommunication

404. Palmprint Authentication Application3. Security in Mobile Database Systems4. Multicasting in Ad Hoc Networks5. Brain Finger Printing6. Future of the internet7. Computer vision8. Raising Technologies9. Open-Rar10. Intrusion Detection System11. Taxonomy of S/w Testing Tools12. Power of Grid Computing13. HomeRF- localized wireless technology optimized forthe home environment14. Wireless Application Protocol15. Computational Methods for Bankruptcy Prediction16. Honey Pots17. Next Generation Protocol (IPv6)18. Peer 2 Peer Web Services19. Embedded Auditors for Intrusion Detection20. Recognition of VoIP Speech21. Assisted GPS22. Multiterabit Networks23. Bio-metrics24. Radio Network Controller for 3G mobile and wireless network devices25. Software model checking26. Fiber Optic technology27. Algorithms and Computation Theories28. Graphic processing Unit29. Domotics30. Cell Phones beyond Call & Sms31. C Sharp (C#)32. Image Water Marking33. Intrution Detection System

Page 12: Seminar Topics for final year students

34. Real-time Transport Protocol (RTP)35. Digital photography & music36. Fusion Memory37. M – Commerce38. Wireless Technologies (bluetooth, 802.11x, IRDA)39. Mobile Commerce40. Load Balancing in Internet41. Intel MMX Technology42. VPN Server43. Earth Simulator- Fastest Supercomputer44. DNA Based computer45. Expert Systems and decision making46. S/w Testing Tools47. Recent Trends in Cryptography48. Technologies and successful applications for direct and multihop ad hoc networks49. Zornbie Computers50. Wireless Network Devices and digital convergence51. Aspect-oriented programming (Aop)52. Real Time Speech Translation53. New Age Graphics54. New Dimension of Data Security using Neural Networks and Numerical Functions55. Diskless Network storage Controller56. 4G- Wireless57. Routing In Mobile Ad Hoc Networks58. ATM Virtual connections59. Voice Portals60. NVSRAM- Non Volatile Static RAM61. High Altitude Aeronautical Platforms62. Artificial Intelligence and Neural Networks63. Printed Memory Technology64. Advanced Mobile Presence Technology65. Future Programming Techniques and Concepts66. 3D Internet67. DART68. Magnetic Random Access Memory69. High Capacity Flash Chips70. IRIS Recognization71. Load Balancing in Parallel Computers72. Agent Based Systems and Applications73. Embedded web server for remote access74. Mobile Tele Communication75. Biometrics Authentication systems76. Embedded web server for remote access77. Adhoc Networks78. Advanced Processors79. Probabilistic I/o Automata80. Mobile ad hoc network (MANET)81. Near Filed Communication (NFC)

Page 13: Seminar Topics for final year students

82. Rising Technology GIES83. VQ In Converging Telephony And Ip Networks84. Privacy Preserving Data Mining85. Pocket Doctor86. Java Card87. News Groups88. Fuzzified Computer-Automated Crane Control System89. Infini band90. UMA (Unlicensed Mobile Access)91. Mind Reading Phones92. Auto-pilot for IT systems93. Blade Servers94. Botnet Security Threats95. Proactive computing96. Information Extraction modes & techniques97. The SAT (SIM Application Toolkit)98. WBM(Web based mobile)99. Nonvolatile Flash Memory100. Self Healing Computers101. GSM Security And Encryption102. Embedded systems103. Signal Integrity Fundamentals for Digital Design104. i – Planet105. Digital Watermarking Applications and Advantages106. HCI (Human Computer Interaction ) in software applications107. Information or Data Visualizing Techniques

405. SPINS -Security Protocol For Sensor Network (33)

406. Generic visual perception processor

407. Nanotechnology Assembler Design And Nano-Communication

408. Tele-Immersion (34)

409. Liquid Crystal on Silicon Display (LCOS)

410. Jini - advanced set of network protocols

411. Computer memory based on the protein bacterio-rhodopsin

412. CSS and DeCSS  -(1)

413. Multimedia Broadcast Multicast Service (MBMS)

414. Extreme Programming (XP)

415. Holographic Versatile Disc

416. Zero Knowledge proofs  -(6)

417. Bimolecular Computers

418. Context Disambiguation On Web Search Results

419. Touch Screen Technology (35)

420. Surface Computer

421. Face Recognition Technology

422. DNA Computing in security

423. 4g Wireless Systems

Page 14: Seminar Topics for final year students

424. Spyware and Trojan horses -(2)

425. Zigbee

426. Java Management Extensions (JMX) - component framework for building intelligent

network

427. Quantum cryptography  -(5)

428. Home Networking

429. Steganography and digital watermarking

430. TouchFLO Technology

431. NESSUS  * -(4)

432. 3D Volume Storage

433. Optical Networking and Dense Wavelength Division Multiplexing

434. Software-Defined Radio

435. Space-time adaptive processing

Intelligence at voice-recognition systems

Compiler theory  & Rover technology

Self defending networks

Future programming techniques and concepts

Glass computer memory for reduced cost of medical imaging

Computerized Paper Evaluation Using Neural Network

Sixthsense technology

Versatile inspection software for use on 64-bit computer systems

The Callpaper Concept

Data Security In Local Network Using Distributed Firewalls

Anonymous network access or privacy

Low-cost Industrial fanless embedded PC 

spawning networks

Money pad,the future wallet

Compact USB data acquisition modules

Desktop 3D Printer

Google App engine

Advanced Micro Peripherals

Rich internet applications

3D Digital NanoCompass

Parallel processing, and need for better parallel algorithms

Compare technology 10 years back and now

iWall - an Intelligent Public Display

Context management strategies in wireless networks

Wireless Markup Language

436. multimedia-oriented web based instructional system

437. Porting Device Drivers For The Solaris  ~

438. Steganography - The art of hiding information

439. VHDL (VHSIC Hardware Description Language)

440. Global Positioning System ~

Page 15: Seminar Topics for final year students

441. Magnetic RAM

442. Embedded computers

443. SSL-TLS  -(7) 

444. Quad core Module technology

445. Micro Total analysis systems

446. Plasma Displays ~

447. Computerized Paper Evaluation Using Neural Network

448. Mesh Based Geometric data processing

449. DNA Computing ~

450. Multiple Domain Orientation

451. Digital Rights Management   -(8)

452. Multimedia Broadcasting via Satellite

453. USB Tape Drives

454. UMA (Unlicensed Mobile Access)

455. Virtual Reality ~

456. Embedded Configurable Operating system 

457. Cluster computing

458. Digital cash  -(11)

459. PLAN 9 Operating system

460. Brain computer interface & systems

461. Digital Imaging ~

462. Wearable computers

463. Data Mining concepts & Models

464. Captchas  -(9)

465. Computer forensics

466. Quantum computing

LOC technology (Lab On a Chip)

Advanced Design repository systems

Security of Open-Source Software  -(10)

Wireless Markup Language

B-ISDN Reference Model

Agent OS (12)

iSCSI-Future of Network Storage

PolyBot - Modular, self-reconfigurable robots

AMD Processors (13)

Bluetooth Based Smart Sensor Networks

multimedia-oriented web based instructional

BioComputers (14)

Ubiquitous computing

Microcontroller Based Power Theft Identification

Computer Forensics (15)

Microcontroller Based Automation

Quantum teleportation

Page 16: Seminar Topics for final year students

Curl: A Gentle Slope Language For The Web (16)

Grid Data Farm for Petascale

Vertical Cavity Surface Emitting Laser

Dna Computing In Security (17)

Bio Telemetry

Digital Visual Interface

Embedded Linux (18)

Management Information System

Teleportation

Ext3 Filesystem (19)

Radio Astronomy

Security threats in the World Wide Web

Facial Recognition System (20)

Visual Neuro Prosthetics

Multiple client's communication

Fluorescent Multilayer Optical Data Storage (21)

Wearable computers

DNA Based computer

Graphical Processing Unit (22)

The MBMS

Integrating Structural Design and Formal Methods in RealTime System Design

GRASSHOPPER Operating System (23)

Firewalls

ARM Processor

Security Issues In GRID COMPUTING  (24)

Aspect oriented programming

REAL TIME OPERATING SYSTEM

HAVi: Home Audio Video Interoperability (25)

Voice Portals

SALT (Speech Application Language Tags)

HomeRF (26)

Narrow Band and Broad Band ISDN

Autonomic Computing

iSCSI: The future of Network Storage (27)

Hyper-Threading Technology

Trusted Network Connect (TNC) Specifications

The Mbone And Multicasting (28)

Sand Box Technology

Wi-Fi Hotspots

MANETS: Mobile Adhoc Networks (29)

Embedded Technology

Tape Drive Technologies - LTO (linear tape open) & SDLTS (Super Digital Linear

Tape)

Page 17: Seminar Topics for final year students

Agent Based Computing (30)

Personal Satellite assistant Systems

Data Mining & Data Warehousing

OpenGL- application programming interface(31)

NEW STORAGE STRATEGY = Disk -Disk -Tape Back up

Micro Hard disk Drives

o Optical Disc Data Security (32)

o NRAM

o Turbo Codes

o Pluggable Authentication Modules (Pam) (36)

o Symbian

o eXtensible Bindings Language (XBL)

o Parallel Computing In Remote Sensing Data Processing (37)

o Stealth Virus

o Clockless Chip

o Samba Fileserver (38)

o Intelligent RAM : IRAM

o Genetic Programming

o Search Images By Appearance (39)

o Fire walls

o Virtual Keyboards

o Secure Socket Layer (SSL) (40)

o Access gateways

o DNA Computing

o Symbian OS (41)

o Trends in Mobiles & PC's

o Blue Ray - Future of DVD's

o Uniprocessor Virtual Memory Without TLBS (42)

o Cross Platform Component Object Model

o SUNSPOT (wireless sensor network)

o Virtual P.C. (43)

o Wearable computers

o Cryogenic Processor

 

Wearable Computers (44)

SIP

DNA Based Computing

Wi-Fi (802.11b)  (45)

High Performance DSP Architectures 

Java Cryptography Architecture (JCA)

Future of Satellite Communication (46)

Page 18: Seminar Topics for final year students

Tablet PC

Image compression

4G Wireless Technology (47)

Choreography

Mobile agent

MPEG-7    (48)

Curl: A Gentle Slope Language For The Web

Genetic programming

High Speed Data In Mobile Networks (49)

JIRO Technology

Future of business Computing

Packet Interception (50)

Internet Telephony

Agile Software development

Crusoe Processors (51)

Peer to peer Networking

Clustering

Augmented Reality (52)

Encrypted Text chat Using Bluetooth

Ovonic Unified Memory

Serial ATA (SATA) (53)

Flexible CRT Displays

Cake PHPs

Night Vision Technology (54)

Automated Vehicle Detection System

Robocode

RAID (55)

Java Messaging Service (JMS)

Mobile Library Management

MANET:-The Art of Networking without a Network (56)

Online software Distribution

Smart Office

Virtual Network Computing (57)

Emergency Health Care System

Mail server Management

Ruby on Rails   RoR (58)

Storage Farms

Unified Communication

Session Initiation Protocol (SIP) (59)

Distributed database management system

Content Management

Authentication and Key Agreement (AKA) (60)

Server side Java

Page 19: Seminar Topics for final year students

Clinical Data Management

IDMA - Future of Wireless Technology (61)

GABOR Wavelet

Molecular Keypad Lock

Elliptical Curve Cryptography (62)

Parallel Computations

Software Engineering  Advances

Computerized Paper Evaluation using Neural Network (63)

Transient Stability Assessment using Neural Networks

Network security - Trends & Methods

Data over Cable System (DOCSIS) (64)

Internet Cryptopraphy

DataBase Migration

Co-operative LINUX (65)

Split Range Syncronisation

MIMO

Virtualization Technology (66)

The Architecture of a Moletronics Computer

Data Security in Local Network using Distributed Firewalls

3D-DOCTOR  (67)

Optical networking

Micro Mouse

Fluorescent Multilayer Disc (FMD) (68)

Near Filed Communication (NFC)

Quantum Computers

Datagram Congestion Control Protocol (DCCP) (69)

Encrypted Hard disks

Power Line Networking

Watermarking Digital Audio (70)

Nano Ring Memory

Split Range Synchronisation

o Holographic Versatile Disc (71)

o Grid Computing

o Java Class Loader

o Unbiquitos Smart Homes

o ZFS File system (72)

o Form Processing

o Site Search Engine

o Struts Integration

o Orthogonal Frequency Division Multiplplexing (73)

o Search Engine Optimisation

o Stereoscopic Projection Systems

o Virtual Reality Visualisation

Page 20: Seminar Topics for final year students

o Surface-conduction Electron-emitter Display (SED) (74)

o Network Accelerators

o Mobile Infrastructure Management

o Voice Roaming

o Autonomic Computing (75)

o Mobile Casts

o Dual Energy X-ray Absorptiometry

o Third Generation

o Biometric Technology (76)

o Synchronous Optical Networking

o Jiro - Java-based technology

o Elliptical curve cryptography (ECC)

o Multiple Domain Orientation

 

Serial Attached SCSI  (77)

X-Internet

Bandwidth estimation in broadband access networks

Virtual worlds come to life

Native Command Queuing (NCQ)  (78)

Evolutionary Programming

Backup and Recovery planning

Main memory databases

Light Pen (79)

HAVi: Home Audio Video Interoperability

Mining the Web: Searching, Integration and Discovery

Mobile Paradigm

MAC address (80)

Java Cryptography Architecture (JCA)

Techniques for analysis, verification, validation of digital systems

Computational Photography

TETRA-Terrestrial Enhanced Trunked Radio (81)

Trends in Compiler Construction

Public Key Encryption And Digital Signature

 Data Management in Sensor Networks

Global System for Mobiles (82)

Epsilon nets and transversal of hypergraphs

 Basic Gnu Emacs

Computational neuroscience

Internet Networking

Personal Mass Media - Blogging, Syndication, Podcasting, and Vidcasting

Page 21: Seminar Topics for final year students

Real Time Operating Systems

OpenTV (OPTV)

Introduction to LaTeX

Algorithms for networking

Recognition of VoIP Speech

Nonvolatile Flash Memory

Algorithms and Computation Theories

Probabilistic I/o Automata

Future Programming Techniques and Concepts

Advanced Processors

Peer 2 Peer Web Services

Information Extraction modes & techniques

Signal Integrity Fundamentals for Digital Design

Computer vision

Software model checking

WBM(Web based mobile)

Future of the internet

Technologies and successful applications for direct and multihop ad hoc networks

Digital photography & music

Embedded web server for remote access

VQ In Converging Telephony And Ip Networks

Proactive computing

Voice Portals

Auto-pilot for IT systems

Fuzzified Computer-Automated Crane Control System

GSM Security And Encryption

Wireless Application Protocol

New Age Graphics

Real Time Speech Translation

3D Internet

New Dimension of Data Security using Neural Networks                                    and Numerical

Functions

HomeRF- localized wireless technology optimized for                                        the home

environment

NVSRAM- Non Volatile Static RAM

Fusion Memory

Earth Simulator- Fastest Supercomputer

Graphic processing Unit

Open-Rar

High Altitude Aeronautical Platforms

Aspect-oriented programming (Aop)

Page 22: Seminar Topics for final year students

Intel MMX Technology

Voice Over Internet Protocol

Internet Searching

Wireless Technologies (bluetooth, 802.11x, IRDA)

Tracking and Positioning of Mobiles in Telecommunication

DNA Based computer

ATM Virtual connections

Botnet Security Threats

VPN Server

Advanced Mobile Presence Technology

Power of Grid Computing

Embedded web server for remote access

Bio-metrics

Magnetic Random Access Memory

Intrution Detection System

Multiterabit Networks

Printed Memory Technology

High Capacity Flash Chips

Self Healing Computers

Mind Reading Phones

Blade Servers

Near Filed Communication (NFC)

UMA (Unlicensed Mobile Access)

Assisted GPS

Diskless Network storage Controller

DIGITAL HUBBUB

Agile Software development

HCI (Human Computer Interaction ) in software applications

Embedded systems

Infini band

The SAT (SIM Application Toolkit)

Computer forensics

Multiterabit networks

Virtual Key boards

Micro trends in Server Technology

FLEX 2

AJAX

DAta Mining

Extreme programming

Software synthesis for embedded systems

Small Computer System Interface

Advanced Airlines baggage management systems

The TIGER SHARC Processor

Page 23: Seminar Topics for final year students

Laptop security using biometric sensors

Multicasing

REINS (Real Estate Information Network Systems)

Integrated Digital Enhanced Network(i-DEN)

Symfony (web application framework)

WiFiber

Direct Memory Access

Infini bridge

Cyberware

3D Object Extraction Using GIS Database

Page Stealer Process

3D Printers

Web Services in Gridcomputing

Qubit PC

CD Based Firewall

Decision diagrams in VLSI CAD

Bandwidth Aggregator

Atomic CPU

Fluorescent Multilayer Optical Data Storage

Email-Service & Webhosting

Virtual Integration

SMART Programming

Object Relational Mapping

ASpect Oriented Programmin

Steganography and digital watermarking

Verifying Infinite State Systems

New Generation Of Chips

Precision Image Search

Evolotion of bluetooth

Nanocrystal Memory Devices

Ultra Wideband Networking

Studying in a "Virtual University

AppleTalk

Combinatorial Optimization 

Quantum Software And Quantum Computer Development 

Metadata application profile

XML Query Languages

AMD Processors

Digital Video Encoding Formats

3-D Assembly Of Magnetic And Semiconducting Nanoparticles

Service oriented Architectures 

Enterprise Service Bus 

Phase Change Memory Technology

Page 24: Seminar Topics for final year students

Object Oriented Design using Verilog HDL

WiBro

Zero Knowledge proofs

3-D Chip Stacking Technique

Integrating Structural Design and Formal Methods in RealTime System Design

Glass Glue

The Interactive Classroom

Embedded Computing

Wireless Internet

Quadrics Interconnection Networks

Home Automation using Handspring PDA

o Extreme Programming

o The TIGER SHARC Processor

o CoCoon

o Quantum dot lasers

o Firewalls

o Steganography - The art of hiding information

o Infini Bridge

o Symfony- web application framework for PHP5 projects

o Hybrid ARQ

o Genetic programming

o Intrusion Detection System

o Multiterabit networks

o WiFiber

o Planning And Synthesis Based On Workflows

o Orthogonal Frequency Division Multiple Access (OFDMA)

o Small Computer System Interface

o MiWi Wireless Protocol

o Fixed Mobile Convergence

o Waterproof Wireless Mouse

o Phase Change memory

o Kerberos

o Wireless Payment System

o Spam Assassin

o MST in telecommunication networks

o Embedded Viavoice(R) Technology

o Object Oriented Type Systems

Scalable streaming media system

Navigating the Internet

Cryptography and complexity

dns

Software defenses against malicious code

Admission/Overload Control of Web Servers

Page 25: Seminar Topics for final year students

Structured peer-to-peer overlay networks

Wireless Metal Detection System

Magnetic Resonance Imaging

Worldwide Interoperatibility for Microwave Access (WiMAX)

Parallel Computing In India

64 BIT Computing

Data Security in Local Network using Distributed Firewalls

Resilient Packet Ring Technology

Membrane computing

Probabilistic data set generation

Scalable streaming media system

Atomic Scale Memory At A Silicon Surface

Perpendicular Recording

Next Generation Internet (NGI)

Further advanced network initiatives

Program Transformations For Verifying Protocols

OS Virtualisation

Dermal nanotech Display Architectures for media processing Data Integrity in SANS Frameworks for web Applications Chat Server SQL Server Integration HD Graphics Biologically Inspired Intelligent Computer Leased like mail Back Up Augmented Reality Storage Networking Digital Subscriber Line Web Server Zetaflops Computing Antivirus Protection Towards Photorealism Mobile Data Protection System Orthogonal frequency Division Multiplexing (OFDM) Fire Wall Bluetooth Based Smart Sensor Networks Novel routing protocols for wireless sensor networks

Cluster computing Stereoscopic Imaging

Free Space OpticsProbabilistic Process Algebra

Managing Data with emerging technologies

Page 26: Seminar Topics for final year students

Tabling And Lazy Evaluation For Efficient Evaluation

Flash-OFDM: An Approach for All-IP Wireless Networking

Real-Time Computing and Communication

SPICE Simulation and Signal Integrity Principles for High Performance Digital Designs

Microsoft passport

Internet2

Security considerations in deploying wireless LANs (W-LANS) and GSM/UMTS

RESTful Web Services

Natural language processing

Web Services in Office Environment

QoS for Multimedia in Wireless Networks

Introspective networks

METS - Metadata Encoding and Transmission Standard

Pivot Vector Space Approach in Audio-Video Mixing

Performance analysis of multi-tiered software and hardware servers

A Radio Controlled Video Vehicle design

Proactive computing

RSS Feeds

Brainwave Technology

High Link Capacities for 4G: Aspects of MIMO Signal Processing

Wireless Network Planning Models: a comparative study for 2G, 3G, and beyond

Affective Computing

Chip design for tolerance of process variation

Scale-free topology in information networks

Visual Information Technology

Model Checking Multi-Threaded Java Programs

Weblogging

Cyberspace Classroom

Design And Optimization By Incremental Computation

web knowledge processing

data center planning and design

Impacts of contention on locking

Generic Framing Procedure

Trustworthy Computing

Automated Remote Data Logger

Small Computer System Interface

Computerized Paper Evaluation using Neural Network

iSCSI-Future of Network Storage

10 GIGABIT ETHERNET

IP Telephony

Adding Intelligence to Internet

Digital Multimedia Broadcasting (DMB)

Ext3 Filesystem

Page 27: Seminar Topics for final year students

Interactive television

Architectural or compiler-level low-power techniques

Java Servlets

Internet Distributed Computing (Idc)

SALT- Speech Application Language Tags

Boot Sector Programming

Timing Attacks on Implementations

Prototype System Design for Telemedicine

Natural Language Processing

Parallel and Distributed Computation

Optical Burst Switching

Border Security Using Wireless Integrated Network Sensors (WINS)

GSM Security and Encryption

Quantum cryptography

Image Processing & Compression

DELAY tolerant networks

Membrane Keyboard

Cybernetics

Facility Layout Design using Genetic Algorithm

Design of 2-D Filters using a Parallel Processor Architecture

o Dynamically Reconfigurable Computing

o Industrial Applications using Neural Networks

o Optical Camoflague

o Causes of Failure in Web Applications

o Wireless Networked Digital Devices

o Software Agents

o OmniPeek Overview

o Cognitive Machines

o Machine Descriptions for Retargetable Compilation

o Methods of Machine Translation (MT)

o Computational Biology

o In-lining and Identification of duplicate code

o Thermomechanical Data Storage

o Programming Languages, Compilers, Data Flow Analysis

o Tracking Dynamic Data

o Verfication of Asynchronously communicating web services

o Admission/Overload Control of Web Servers

o Socket Programming

o Adding Intelligence to Internet

o Low Power UART Design for Serial Data Communication

o Compact peripheral component interconnect

o Light Tree

o Terrestrial Trunked Radio

Page 28: Seminar Topics for final year students

o Smart Note Taker

o Networking via Message-Passing

o Data Security in Local Network using Distributed Firewalls

o Significance of real-time transport Protocol in VOIP

o New generations of mobile networks

Asynchronous timing analysis

Performance analysis of multi-tiered software and hardware servers

Array Liveness Analysis

Forensic Analysis for Network Security

Reconfigurable computing

Distributed Denial of Service Attacks

Cryptographic protocols

SALT ( Speech Application Language Tags)

Computer-supported Modeling and Reasoning

Security Engineering

Web Crawling

Automated Generation of Attack Signatures

control monitoring on difrent muchine with the help of computer

Speech Technology

Ubuntu-Linux for Human Beings

Google Earth

Daknet 

Radio propagation modeling

The Mbone And Multicasting

Record pair classification techniques

Dynamic Cache Management Technique

PON Topologies

Implementation Of Zoom FFT

Adding Intelligence to Internet

Compiler techniques for multimedia codes on general-purpose architectures

Pluggable Authentication Modules (Pam)

Content Scrambling System

Pine and IMP - a New Web-Based Email Program

Intrution Detection System 

3D optical Data Storage Technology

Modern Brain-Computer Interface

Remote OS Deployment

Multi Energy Based X-Ray Baggage Inspection System

Aspect-oriented programming (Aop)

Magneto resistive Random Access Memory (MRAM)

CAS (Conditional Access System)

Orthogonal Frequency Division Multiplplexing

Voice over Internet Protocol (VoIP)

Page 29: Seminar Topics for final year students

Self Protecting Servers

The IKE protocol

Privacy and security of low-powered devices (rfid)

Distributed Hash Tables

Cryptography: Human-Centric Protocols

Re-architecting & Internet Protocols

Network Security and its Principles

Cryptography Application

"Arms race" in malware

Popular Security Protocols

Future use of biometric technology for security and authentication

Homeland security application

Natural Language Resources for Information Extraction

Meaning Based Multilingual Search Engine

Embedded Visual C++

Synchronization Problems and their classification

Aspect mining from Object Oriented Code

Limits of silicon technology

Symbolic vs. Computational view of security protocols 

Benefits of Parallel and Distributed Computing

4g Wireless Systems

Peer-to-Peer Wireless Networks

AS2 protocol for file transfers

Client/server-based programming for Pocket PCs

Detecting Jamming attacks in Wireless Networks

High Speed Uplink Packet Access (HSUPA)

Re-coding of the system for Mobile Devices and Internet

Wireless Application Protocol

ATM Virtual Connections

DNA Computing in Security

Data Compression with Huffman Algorithms

0wn the Internet

OpenGPG encryption

Randomized Algorithms and Networking Hardware

Plastic Displays

Proxy-Based Internet Services

Trends in SiGE BiCMOS Technology

Low Power, Low Noise and High-Speed VLSI Circuits Using Quantum MOS Technology

SRAM Sense Amplifiers

Web addresses in non-Latin scripts

Network Security, The Hirschmann Way

Java rings

Style Translation for Human Motion

Page 30: Seminar Topics for final year students

Internet access 'a human right' ?

Energy Recovery VLSI Design

Compilation issues in Object Oriented Programming Languages

'Next generation' wi-fi

Pattern-based intrusion detection

CMOS Analog Circuits for Wireless Communications

Programmable Interconnect Fabrics

Verifying infinite state systems

Video screens hit paper magazines

Web Browser Security

Digital Preservation

Cellonics Technology

TETRA-TErrestrial Trunked Radio

Virtual Network Computing

Adaptive query processing/optimization

Video game: Call of Duty: Modern Warfare 2

Migrating legacy devices to Ethernet

Dynamic spectrum management (DSM)

Industrial Connectivity: Passive Product Technology

Reconstruction of Solid Models from Oriented Point Sets

Holographic Storage Technologies

Glassfish

Wireless Printing

Apple iPad

What makes CSS so powerful?

Multi-Wafer Virtual Probe

Android mobiles

Program transformations for verifying protocols

Microarchitecture Level Power Management

Cloud Computing

GSM Security And Encryption

Metering net traffic

BT's super-fast broadband network

Cross Lingual Meaning Based Search

Distributed Visualization of Geometric Algorithms

Windows 7 - The new OPerating System

Semantic Web

Google Android- Mobile OS from Google

Fourth-Generation Broadband

Rise of internet social networking

Ubuntu-Linux for Human Beings

Vorbis

Data over Cable System (DOCSIS)

Page 31: Seminar Topics for final year students

Secure multiparty computations without computers

Simultaneous Multithreading

Digital Visual Interface