Sie sind auf Seite 1von 4

BE COMPUTER/INFORMATION TECHNOLOGY SEMINAR TOPICS-2007-08

Seminar Topic
MPEG-7
4G Mobile Communication Network
Lucent Vision
Physics Processing Unit
Millipedes and MEMS
Blu Ray Disc
Rapid Prototyping
Digital Watermarking
Image Steganography
Lossless data compression
Honeypots
Image Registration
Brain to computer interface
Oral cancer detection by image processing
Animation
Architecture of mobile CPU
High speed down link packet access( HSDPA )
VXML
Surface Computing
Short Message Service
Understanding and preventing Phishing Attacks
Wibro-Wireless Broadband Internal Technology
Quantum Computing
Steganography in Wireless Application Protocol
Cyber Law
Steg- analysis
Linux Kernel Development
Use of RFID in transpotation
Halftone Visual Cryptography
Wireless network security
Software quality standards
Software depedability and portable software
Agile process development
Motion capturing in 3D animation
Software architecture and quality
Human factors engineering and task modelling
Speech Synthesis
3D animation
Cyber glove
Formula one technology
Application of NN in trajectory control of robots
Template based database software designing without programming
Artificial intelligence-pattern recognition
Quantum Cryptography
Smart Quill
Image guided robotic radio surgery
ANDROID (Mobile OS)
Text summarizes using graph thoery
Scanline Interleave Technology
Human Gesture
Art of Invisibility
Seminar Topic
Fingerprints and biometrics
Eyegaze communication technology
Smart cards
CAPTCHA
i-mode Technology
Earthquake Detection
Geographical Information system
Mobile Phone Jammers
Grid Computing
Fuzzy Image Processing
JXTA
Strategies of channel distribution in mobile telephone systems
Elliptic Curve Cryptography
Stream Computing
Distributed Denial of Service Attack
File Virus Programming
Android
Decision Tree Algorithm
WLAN security
Digital data preservation algorithm
Cloth Simulation
Surface computing
Graphical password authntication
Turing Machines
Java Ring
Adaptive brain interface
Acoustic Cryptanalysis
Mobile Agents
Digital multimedia broadcasting
Holographic Versatile Disc
Biometric security system
Quantam in cryptography
Data mining with neural networks
Bioinspired computing
SCSI
Cybernetics and brain simulation
Spyware and trojanhorses
Video streaming
Intelligent vehicle technology
Cluster computing for financial engineering
Tiny OS and java
Ruby on rails
Red Tacton
Analysis of data compression algorithms
Search Engine
Seminar Topic
Reverse Engineering
AJAX
I-mode wireless technology
Smart personal object Technology
E-Waste
Holographic Memory
Optical Camouflage and tele-existence
Latest Web Development
Cryptovirology
IP Spoofing
Artificial Passenger
Blue Tooth
Bit Torrent
SMS House Appliance Control
Energy Saving in Mobile Application
BREV
IPNET
Identity Theft, Data Privacy
.NET framework
General Packet Radio Service
Firewall
Liquid cooled PC
Space mouse
Espionage
Jcilk runtime system
Data tranfer and red tacton
Android and G-Phone
Mobile Usability
Augmented Reality
Geospatial Data Integration
Terahertz Rays
Hyperthreading Technology
Techniques of Animation
Raid Tacton
Voice Over Internet Protocol
Optical camouflage
Graphics Processing Unit
Morphware
Z-RAM
Genetic Programming
E-Governance
MRAM
Protein based memory
Seminar Topic
AGILE PROJMGT
Public Key Cryptography
Tera Scale Computing
Digital Watermark
Braingate
BIT Torrent
3D Graphics Acceleration
Adaptive Brain Interface
Masseging Application Programming Interface
clockless chips
Europian rail trffic management system (ERTMS)
ARTIFICIAL INTELLGENCE IN INTERACTIVE GAMES
Recent trends and developments in army wearable computing
CNNUM
MOBILE VIRUSES
SPARQL
Navigation description and operation
Wearable Computers
Millipede
Real Time Streaming Protocol
Biometric; Identification and Verification Technique
Speech Application Language Tag
Trojan Horse
Live Rail Networking
Cyborgs

Das könnte Ihnen auch gefallen