1. Brain Gate 2. Palm Vein Technology 3. Sniffer for detecting lost mobiles 4. 5 Pen PC Technology 5. iDEN 6. Hi-Fi 7. Packet Sniffers 8. Brain Chips

quarterceladonMobile - Wireless

Dec 10, 2013 (4 years and 21 days ago)

249 views

1.

Brain Gate

2.

Palm Vein Technology

3.

Sniffer for detecting lost mobiles

4.

5 Pen PC Technology

5.

iDEN

6.

Hi
-
Fi

7.

Packet Sniffers

8.

Brain Chips

9.

Phishing

10.

Pill Camera

11.

Blue Brain

12.

Mobile Phone Cloning

13.

Nano Cars Into The Robotics

14.

Mind
-
Reading Computer

15.

Intelligent Speed Adaptatio
n

16.

GSM Based Vehicle Theft Control System

17.

Global Wireless E
-
Voting

18.

Green Cloud

19.

Digital Jewelry

20.

Biometric Voting System

21.

3D Television

22.

3D password

23.

Voice Browser

24.

Gi
-
Fi

25.

Graphical Password Authentication

26.

4G Broadband

27.

Finger Tracking In Real Time Human Computer I
nteraction

28.

Eye Movement
-
Based Human Computer Interaction Techniques

29.

Ethical Hacking

30.

E
-
Cash Payment System

31.

Cyborgs

32.

Brain Fingerprinting

33.

Biometrics in SECURE e
-
transaction

34.

X
-

Internet

35.

Surface Computer

36.

Secure ATM by Image Processing

37.

Mobile Ad
-
Hoc Networks Ext
ensions to Zone Routing Protocol

38.

Wibree

39.

Telepresence

40.

System in Package

41.

Smart Memories

42.

Slammer Worm

43.

Sensitive Skin

44.

Pixie Dust

45.

Linux Kernel 2.6

46.

Lamp Technology

47.

Humanoid Robot

48.

HTAM

49.

Haptic Technology

50.

Elastic Quotas

51.

Diamond chip

52.

Digital Rights Management

53.

A Plan

For No Spam

54.

BEOWULF Cluster

55.

Digital Scent Technology

56.

Distributed Interactive Virtual Environment

57.

Dynamic TCP Connection Elapsing

58.

CAPTCHA

59.

Virtual Retinal Display

60.

Wireless LAN Security

61.

Chameleon Chip

62.

Haptics

63.

Intelligent RAM

64.

iSCSI

65.

Linux Kernel 2.6

66.

3D Searchi
ng

67.

Biological Computers

68.

Rain Technology

69.

Real Time Application Interface

70.

GPS

71.

HALO

72.

BitTorrent

73.

Compositional Adaptation

74.

Rover Technology

75.

Self Defending Networks

76.

Semantic Web

77.

Computer Intelligence Application

78.

Cooperative Linux

79.

Longhorn

80.

Mesh Radio

81.

Parallel Virt
ual Machine

82.

Linux Virtual Server

83.

Location Independent Naming

84.

PHANToM

85.

Multiprotocol Label Switching

86.

Next Generation Secure Computing Base

87.

NGSCB

88.

Reconfigurable computing

89.

Sky X Technology

90.

Smart Client Application Development using .NET

91.

Spawning Networks

92.

SPCS

93.

Speed protocol processors

94.

Strata flash Memory

95.

Swarm Intelligence

96.

The Callpaper Concept

97.

IP spoofing

98.

Internet Access via Cable TV Network

99.

Face Recognition Technology

100.

FireWire

101.

Param 10000

102.

The Deep Web

103.

Virtual Campus

104.

VoiceXML

105.

Wireless USB

106.

Refactoring

107.

On
-
line A
nalytical Processing (OLAP)

108.

Pivot Vector Space Approach in Audio
-
Video Mixing

109.

MPEG
-
7

110.

Adding Intelligence to Internet

111.

Silverlight

112.

DNA chips

113.

Remote Administration Trojan's

114.

Thermography

115.

AJAX

116.

Alternative Models Of Computation

117.

Amorphous Computing and Swarm Inte
lligence

118.

Windows DNA

119.

Laptop Computer

120.

Intelligent Software Agents

121.

Self
-
Managing Computing

122.

Hurd

123.

Intel Centrino Mobile Technology

124.

MPEG Video Compression

125.

Survivable Networks Systems

126.

Self Organizing Maps

127.

Mobile IP

128.

Iris Scanning

129.

LWIP

130.

Unified Modeling Language (U
ML)

131.

Nanorobotics

132.

Dual Core Processor

133.

Cisco IOS Firewall

134.

Socket Programming

135.

SAM

136.

10 Gigabit Ethernet

137.

Tripwire

138.

Ubiquitous Networking

139.

Unicode And Multilingual Computing

140.

XML Encryption

141.

Y2K38

142.

VoCable

143.

Touch Screens

144.

Tempest and Echelon

145.

Synthetic Aperture Radar Sys
tem

146.

Unlicensed Mobile Access

147.

IDS

148.

IDC

149.

SATRACK

150.

Asynchronous Chips

151.

Low Power UART Design for Serial Data Communication

152.

SPECT

153.

Satellite Radio

154.

Light emitting polymers

155.

Sensors on 3D Digitization

156.

Robotic Surgery

157.

Buffer overflow attack : A potential problem and it
s Implications

158.

Smart card

159.

Quantum Information Technology

160.

Money Pad, The Future Wallet

161.

HVAC

162.

Terrestrial Trunked Radio

163.

Swarm intelligence & traffic Safety

164.

Facility Layout Design using Genetic Algorithm

165.

Human Computer Interface

166.

HPJava

167.

Gaming Consoles

168.

Fluo
rescent Multi
-
layer Disc

169.

Futex

170.

Extreme Programming (XP)

171.

Earth Simulator

172.

Compact peripheral component interconnect

173.

corDECT Wireless in Local Loop System

174.

Motes

175.

Modular Computing

176.

MiniDisc system

177.

Migration From GSM Network To GPRS

178.

M
-
Commerce

179.

C#

180.

IP Telephony

181.

RP
R

182.

Broad Band Over Power Line

183.

Rapid Prototyping

184.

Dashboard

185.

Code Division Duplexing

186.

Delay Tolerant Networking

187.

EDGE

188.

Holographic Data Storage

189.

Integer Fast Fourier Transform

190.

NRAM

191.

Orthogonal Frequency Division Multiplplexing

192.

Ovonic Unified Memory

193.

Pervasive Comput
ing

194.

RAID

195.

Real Time Systems with Linux/RTAI

196.

Real
-
Time Obstacle Avoidance

197.

Symbian OS

198.

Teleportation

199.

Turbo Codes

200.

Utility Fog

201.

Cluster Computing

202.

Wireless Application Protocol

203.

Light Tree

204.

Smart Pixel Arrays

205.

Project Oxygen

206.

Wearable Bio
-
Sensors

207.

Mobile Virtual Realit
y Service

208.

QoS in Cellular Networks Based on MPT

209.

Wireless Fidelity

210.

Voice morphing

211.

Radio Frequency Light Sources

212.

Speed Detection of moving vehicle using speed cameras

213.

Optical Packet Switching Network

214.

Storage Area Networks

215.

Smart Note Taker

216.

Crusoe Processor

217.

Op
tical Satellite Communication

218.

Optical packet switch architectures

219.

Optical Switching

220.

FRAM

221.

Virtual Private Network

222.

Clockless Chip

223.

Layer 3 Switching

224.

IMode

225.

Blue Gene

226.

Access gateways

227.

Computer Forensics

228.

Direct Memory Access

229.

Crusoe

230.

Digital Subscriber Line

231.

Compute
r Memory Based on the Protein Bacterio
-
rhodopsin

232.

DNA Based Computing

233.

Free Space Optics

234.

Freenet

235.

Fiber Distributed Data Interface

236.

Dynamic Virtual Private Network

237.

Introduction to the Internet Protocols

238.

Graphic processing Unit

239.

High Altitude Aeronautical Platfo
rms

240.

Aspect
-
oriented programming (Aop)

241.

Intel MMX Technology

242.

Hyper
-
Threading technology

243.

IMAX

244.

Brain
-
Computer Interface

245.

InfiniBand

246.

Multicast

247.

Inverse Multiplexing

248.

Blue Tooth

249.

Holographic Memory

250.

Jini Technology

251.

Bio
-
metrics

252.

Magnetic Random Access Memory

253.

Intrution
Detection System

254.

Multiterabit Networks

255.

Neural Networks And Their Applications

256.

Quantum Computers

257.

Small Computer System Interface

258.

OpenRAN

259.

Quadrics Interconnection Network

260.

Plan 9 Operating System

261.

Structured Cabling

262.

Quantum Cryptography

263.

Speech Application Lang
uage Tags

264.

Real
-

Time Systems and Real
-

Time Operating Systems

265.

Parallel Computing In India

266.

Steganography

267.

Virtual LAN Technology

268.

Artificial Neural Network (ANN)

269.

Tele
-
immersion

270.

VHDL

271.

Blue Eyes

272.

Voice Over Internet Protocol

273.

The Tiger SHARC processor

274.

Autonomic Co
mputing

275.

Wearable Computers

276.

Voice Portals

277.

Tamper Resistance

278.

CGI Programming

279.

DRM Software Radio

280.

Firewalls

281.

Handheld Computers

282.

Modems and ISDN

283.

Optical Free Space Communication

284.

Planar Separators

285.

Wireless Internet

286.

DVD Technology

287.

MPEG
-
4 Facial Animation

288.

Internet
Telephony Policy in INDIA

289.

PON Topologies

290.

Smart Cards

291.

Surround Systems

292.

TCPA / Palladium

293.

Trustworthy Computing

294.

Sense
-
Response Applications

295.

Optical Computer

296.

Graph Separators

297.

Extended Mark Up Language

298.

Cellular Communications

299.

Virtual Instrumentation

300.

Voice Quali
ty

301.

Cable Modems

302.

Dynamic Memory Allocation

303.

Optical Mouse

304.

Generic Framing Procedure

305.

Dynamic Cache Management Technique

306.

Ethernet Passive Optical Network

307.

Synchronous Optical Networking

308.

Development of the Intenet

309.

Design and Analysis of Algoritms

310.

Infinite Dimens
ional Vector Space

311.

Instant Messaging

312.

Optical Fibre Cable

313.

GSM

314.

Ambiophonics

315.

Palladium

316.

Computer Viruses

317.

Third Generation

318.

Object Oriented Concepts

319.

Night Vision Technology

320.

TCP/ IP

321.

Dynamic Synchronous Transfer Mode

322.

Integrated Voice and Data

323.

Java Servlets

324.

Smart Q
uill

325.

Spam Assassin

326.

Stereoscopic Imaging

327.

Zigbee

328.

Ultra
-
Wideband

329.

Home Networking

330.

Internet Protocol Television

331.

Bacterio
-
Rhodopsin Memory

332.

Blade Servers

333.

Digital Cinema

334.

Holographic Versatile Disc

335.

Itanium Processor

336.

Local Multipoint Distribution Service

337.

Network Att
ached Storage

338.

Night Vision Technology

339.

Opera (web browser)

340.

Parasitic Computing

341.

Performance Testing

342.

Java Ring

343.

RD RAM

344.

GSM Security And Encryption

345.

Fast Convergence Algorithms for Active Noise Controlin Vehicles

346.

3G vs WiFi

347.

Data Security in Local Network using D
istributed Firewalls

348.

Computerized Paper Evaluation using Neural Network

349.

Bluetooth Based Smart Sensor Networks

350.

Laser Communications

351.

Multiple Domain Orientation

352.

Industrial Applications using Neural Networks

353.

Implementation Of Zoom FFT

354.

Image Processing

355.

Virtual

keyboard

356.

Transient Stability Assessment using Neural Networks

357.

Tracking and Positioning of Mobiles in Telecommunication

358.

Timing Attacks on Implementations

359.

Prototype System Design for Telemedicine

360.

Optical Networking and Dense Wavelength Division Multiplexing

361.

Optical Burst Switching

362.

Image Processing & Compression

363.

Cyberterrorism

364.

Ipv6
-

The Next Generation Protocol

365.

Driving Optical Network Evolution

366.

Cellular Neural Network

367.

Radio Network Controller

368.

Digital Audio Broadcasting

369.

Significance of real
-
time transport

Protocol in VOIP

370.

Space Mouse

371.

Resilient Packet Ring Technology

372.

Wireless Networked Digital Devices

373.

Design of 2
-
D Filters using a Parallel Processor Architecture

374.

Hyper Transport Technology

375.

CorDECT

376.

Storage Area Network

377.

High Performance DSP Architectures

378.

Smart

Dust

379.

MANET

380.

Biometrics Based Authentication

381.

Software
-
Defined Radio

382.

Digital Video Editing

383.

D
-
Blast

384.

Aeronautical Communication

385.

Gigabit Ethernet

386.

Wisenet

387.

Digital Light Processing

388.

Free Space Laser Communications

389.

Millipede

390.

AC Performance Of Nanoelectronics

391.

4G Wir
eless Systems

392.

Blu Ray Disc

393.

Smart Fabrics

394.

Daknet

395.

Conditional Access System

396.

SyncML

397.

High Performance DSP Architectures

398.

Short Message Service (SMS)

399.

MANET

400.

Worldwide Inter operatibility for Microwave Access

401.

64
-
Bit Computing

402.

Bio
-
Molecular Computing

403.

Tracking and P
ositioning of Mobiles in Telecommunication

404.

Palmprint Authentication

Application

3. Security in Mobile Database Systems

4. Multicasting in Ad Hoc Networks

5. Brain

Finger Printing

6. Future of the internet

7. Computer vision

8. Raising Technologies

9. Open
-
Rar

10. Intrusion Detection System

11. Taxonomy of S/w Testing Tools

12. Power of Grid Computing

13. HomeRF
-

localized wireless technology optimized forthe home environment

14. Wireless

Application

Protocol

15. Computational Methods for Bankruptcy Predicti
on

16. Honey Pots

17. Next Generation Protocol (IPv6)

18. Peer 2 Peer Web Services

19. Embedded Auditors for Intrusion Detection

20. Recognition of VoIP Speech

21. Assisted GPS

22. Multiterabit Networks

23. Bio
-
metrics

24. Radio Network Controller for 3G

m
obile and wireless

network devices

25. Software model checking

26. Fiber Optic technology

27. Algorithms and Computation Theories

28. Graphic processing Unit

29. Domotics

30. Cell Phones beyond Call & Sms

31. C Sharp (C#)

32. Image Water Marking

33. Intrut
ion Detection System

34. Real
-
time Transport Protocol (RTP)

35. Digital photography & music

36. Fusion Memory

37. M


Commerce

38. Wireless Technologies (bluetooth, 802.11x, IRDA)

39. Mobile Commerce

40. Load Balancing in Internet

41. Intel MMX Technology

42. VPN Server

43. Earth Simulator
-

Fastest Supercomputer

44. DNA Based computer

45. Expert Systems and decision making

46. S/w Testing Tools

47. Recent Trends in Cryptography

48. Technologies and successful applications for direct and multihop ad hoc netw
orks

49. Zornbie Computers

50. Wireless Network Devices and digital convergence

51. Aspect
-
oriented programming (Aop)

52. Real Time Speech Translation

53. New Age Graphics

54. New Dimension of Data Security using Neural Networks and Numerical Functions

55.

Diskless Network storage Controller

56. 4G
-

Wireless

57. Routing In Mobile Ad Hoc Networks

58. ATM Virtual connections

59. Voice Portals

60. NVSRAM
-

Non Volatile Static RAM

61. High Altitude Aeronautical Platforms

62. Artificial Intelligence and Neural Ne
tworks

63. Printed Memory Technology

64. Advanced Mobile Presence Technology

65. Future Programming Techniques and Concepts

66. 3D Internet

67. DART

68. Magnetic

Random Access Memory

69. High Capacity Flash Chips

70. IRIS Recognization

71. Load Balancing i
n Parallel Computers

72. Agent Based Systems and Applications

73. Embedded web server for remote access

74. Mobile Tele Communication

75. Biometrics Authentication systems

76. Embedded web server for remote access

77. Adhoc Networks

78. Advanced Processors

79. Probabilistic I/o Automata

80. Mobile ad hoc network (MANET)

81. Near Filed Communication (NFC)

82. Rising Technology GIES

83. VQ In Converging Telephony And Ip Networks

84. Privacy Preserving Data Mining

85. Pocket Doctor

86. Java Card

87.
News Group
s

88. Fuzzified Computer
-
Automated Crane Control System

89. Infini band

90. UMA (Unlicensed Mobile Access)

91. Mind Reading Phones

92. Auto
-
pilot for IT systems

93. Blade Servers

94. Botnet Security Threats

95. Proactive computing

96. Information Extractio
n modes & techniques

97. The SAT (SIM

Application

Toolkit)

98. WBM(Web based mobile)

99. Nonvolatile Flash Memory

100.
Self Healing

Computers

101. GSM Security And Encryption

102. Embedded systems

103. Signal Integrity Fundamentals for Digital Design

104.
i


Planet

105. Digital Watermarking Applications and Advantages

106. HCI (Human Computer Interaction ) in software applications

107. Information or Data Visualizing Techniques

405.

SPINS
-
Secur
ity Protocol For Sensor Network
(33)

406.

Generic visual perception processor

407.

Nanotechnology Assembler Design And Nano
-
Communication

408.

Tele
-
Immersion
(34)

409.

Liquid Crystal on Silicon Display (LCOS)

410.

Jini
-

advanced set of network protocols

411.

Computer memory based on the protein bacterio
-
rhodopsin

412.

CSS and DeCSS

-
(1)

413.

Multimedia Broadcast Multicast Service (MBMS)

414.

Extreme Programming (XP)

415.

Ho
lographic Versatile Disc

416.

Zero Knowledge proofs

-
(6)

417.

Bimolecular Computers

418.

Context Disambiguation On Web Search Results

419.

Tou
ch Screen Technology
(35)

420.

Surface Computer

421.

Face Recognition Technology

422.

DNA Computing in security

423.

4g Wireless Systems

424.

Spyware and Trojan horses
-
(2)

425.

Zigbee

426.

Java Management Extensions (JMX)
-

component framework for building intelligent
network

427.

Quantum cryptography

-
(5)

428.

Home Networking

429.

Steganography and digital watermarking

430.

TouchFLO Technology

431.

NESSUS

*
-
(4)

432.

3D Volume Storage

433.

Optical Networking and Dense Wavelength Division Multiplexing

434.

Software
-
Defined Radio

435.

Space
-
time adaptive processing



Intelligence at voice
-
recognition systems



Compiler theory


& Rover technolog
y



Self defending networks



Future programming techniques and concepts



Glass computer memory for reduced cost of medical imaging



Computerized Paper Evaluation Using Neural Network



Sixthsense technology



Versatile inspection software for use on 64
-
bit computer

systems



The Callpaper Concept



Data Security In Local Network Using Distributed Firewalls



Anonymous network access or privacy



Low
-
cost Industrial fanless embedded PC


spawning networks



Money pad,the future wallet



Compact USB data acquisition modules



Deskto
p 3D Printer



Google App engine



Advanced Micro Peripherals



Rich internet applications



3D Digital NanoCompass



Parallel processing, and need for better parallel algorithms



Compare technology 10 years back and now



iWall
-

an Intelligent Public Display



Context
management strategies in wireless networks



Wireless Markup Language

436.

multimedia
-
oriented web based instructional system

437.

Porting Device Drivers For The Solaris

~

438.

Steganography
-

The art of hiding

information

439.

VHDL (VHSIC Hardware Description Language)

440.

Global Positioning System
~

441.

Magnetic RAM

442.

Embedded computers

443.

SSL
-
TLS

-
(7
)


444.

Quad core Module technology

445.

Micro Total analysis systems

446.

Plasma Displays
~

447.

Computerized Paper Evaluation Using Neural Network

448.

Mesh Based Geometric data processing

449.

DNA Computing
~

450.

Multiple Domain Orientation

451.

Digital Rights Management


-
(8)

452.

Multimedia Broadcasting via Satellite

453.

USB Tape Drives

454.

UMA (Unlicensed Mobile Ac
cess)

455.

Virtual Reality
~

456.

Embedded Configurable Operating system


457.

Cluster computing

458.

Digital cash

-
(11)

459.

PLAN 9 Operating system

460.

B
rain computer interface & systems

461.

Digital Imaging
~

462.

Wearable computers

463.

Data Mining concepts & Models

464.

Captchas

-
(9)

465.

Computer for
ensics

466.

Quantum computing



LOC technology (Lab On a Chip)



Advanced Design repository systems



Security of Open
-
Source Software

-
(10)



Wireless Markup Language



B
-
ISDN Reference Model



Agent OS
(12)



iSCSI
-
Future of Network Storage



PolyBot
-

Modular, self
-
reconfigurable robots



AMD Processors
(13)



Bluetooth Based Smar
t Sensor Networks



multimedia
-
oriented web based instructional



BioComputers
(14)



Ubiquitous computing



Microcontroller Based Power Theft Identification



Computer Forensics
(15)



Microcontroller Based Automation



Quantum teleportation



Curl: A Gentle Slope Language For The Web
(16)



Grid Data Farm for Petascale



Vertic
al Cavity Surface Emitting Laser



Dna Computing In Security
(17)



Bio Telemetry



Digital Visual Interface



Embedded Linux
(18)



Management Information System



Teleportation



Ext3 Filesystem
(19)



Radio Astronomy



Security threats in the World Wide Web



F
acial Recognition System
(20)



Visual Neuro Prosthetics



Multiple client's communication



Fluorescent Multilayer Optical Data Storage
(21)



Wearable computers



DNA Based computer



Graphical Processing Unit
(22)



The MBMS



Integrating Structural Design and Formal Methods in RealTime System Design



GRASSHOPPER Operating
System
(23)



Firewalls



ARM Processor



Security Issues In GRID COMPUTING

(24)



Aspect oriented programming



REAL TIME OPERATING SYSTEM



HAVi: Home Audio Video Interoperability
(25)



Voice Portals



SALT (Speech Application Language Tags)



HomeRF
(26)



Narrow Band and Broad Band ISDN



Autonomic Computing



iSCSI: The future of Network Storage
(27)



Hyper
-
Threading Technology



Trusted Network Connect (TNC) Specifications



The Mbone And Multicastin
g
(28)



Sand Box Technology



Wi
-
Fi Hotspots



MANETS: Mobile Adhoc Networks
(29)



Embedded Technology



Tape Drive Technologies
-

LTO (linear tape open) & SDLTS (Super Digital
Linear Tape)



Agent Based Computing
(30)



Personal Satellite assistant Systems



Data Mining & Data Warehousing



OpenGL
-
application programming in
terface(31)



NEW STORAGE STRATEGY = Disk
-
Disk
-
Tape Back up



Micro Hard disk Drives

o

Optical Disc Data Security
(32)

o

NRAM

o

Turbo Codes

o

Pluggable Authentication Modules (Pam)
(36)

o

Symbian

o

eXtensible Bindings Language (XBL)

o

Parallel Computing In Remote Sensing Data Processing
(37)

o

Stealth Virus

o

Clockless Chip

o

Samba Fileserver
(38)

o

Intelligent RAM : IRAM

o

Genetic Programming

o

Search Images By Appearance
(39)

o

Fire walls

o

Virtual Keyboards

o

Secure Socket Layer (SSL)
(40)

o

Access gateways

o

DNA Computing

o

Symbian OS
(41)

o

Trends in Mobiles & PC's

o

Blue Ray
-

Future of

DVD's

o

Uniprocessor Virtual Memory Without TLBS
(42)

o

Cross Platform Component Object Model

o

SUNSPOT (wireless sensor network)

o

Virtual P.C.
(43)

o

Wearable computers

o

Cryogenic Processor





Wearable Computers
(44)



SIP



DNA Based Computing



Wi
-
Fi (802.1
1b)

(45)



High Performance DSP Architectures




Java Cryptography Architecture (JCA)



Future of Satellite Communication
(46)



Tablet PC



Image compression



4G Wireless Technology
(47)



Choreography



Mobile agent



MPEG
-
7


(48)



Curl: A Gentle Slope Language For The Web



Genetic programming



High Speed Data In Mobile Networks
(49)



JIRO Technology



Future of business Computing



Packet Interception
(50)



Internet Telephony



Agile Software developm
ent



Crusoe Processors
(51)



Peer to peer Networking



Clustering



Augmented Reality
(52)



Encrypted Text chat Using Bluetooth



O
vonic Unified Memory



Serial ATA (SATA)
(53)



Flexible CRT Displays



Cake PHPs



Night Vision Technology
(54)



Automated Vehicle

Detection System



Robocode



RAID
(55)



Java Messaging Service (JMS)



Mobile Library Management



MANET:
-
The Art of Networking w
ithout a Network
(56)



Online software Distribution



Smart Office



Virtual Network Computing
(57)



Emergency Health Care System



Mail server Management



Ruby on Rails

RoR
(58)



Storage Farms



Unified Communication



Session Initiation Protocol (SIP)
(59)



Distributed database management system



Content Management



Authentication and Key Agreement (AKA)
(60)



Server side Java



Clinical Data Management



IDMA
-

Future of Wireless Technology
(61)



GA
BOR Wavelet



Molecular Keypad Lock



Elliptical Curve Cryptography
(62)



Parallel Computations



Software Engineering


Advances



Computerized Paper Evaluation using Neural Network
(63)



Transient Stability Assessment using Neural Networks



Network security
-

Trends & Methods



Data over Cable System (DOCSIS)
(64)



Interne
t Cryptopraphy



DataBase Migration



Co
-
operative LINUX
(65)



Split Range Syncronisation



MIMO



Virtualization Technology
(66)



T
he Architecture of a Moletronics Computer



Data Security in Local Network using Distributed Firewalls



3D
-
DOCTOR

(67)



Optical networking



Micro Mouse



Fluorescent Multilayer Disc (FMD)
(68)



Near Filed Communication (NFC)



Quantum Computers



Datagram Congestion Control Protocol (DCCP)
(69)



Encrypted Hard disks



Power

Line Networking



Watermarking Digital Audio
(70)



Nano Ring Memory



Split Range Synchronisation

o

Holographic Versatile Disc
(
71)

o

Grid Computing

o

Java Class Loader

o

Unbiquitos Smart Homes

o

ZFS File system
(72)

o

Form Processing

o

Site Search Engine

o

Struts Integration

o

Orthogonal Frequency Division Multiplplexing
(73)

o

Search Engine Optimisation

o

Stereoscopic Projection Systems

o

Virtual Reality Visualisation

o

Surface
-
conduction Electron
-
emitter D
isplay (SED)
(74)

o

Network Accelerators

o

Mobile Infrastructure Management

o

Voice Roaming

o

Autonomic Computing
(75)

o

Mobile Casts

o

Dual Energy X
-
ray Absorptiometry

o

Third Generation

o

Biometric Technology
(76)

o

Synchronous Optical Networking

o

Jiro
-

Java
-
based technology

o

Elliptical curve cryptography (ECC)

o

Multiple Domain Orientation





Serial Attached SCSI

(77)



X
-
Internet



Bandwidth estimation in broadband access networks



Virtual worlds come to life



Native Command Queuing (NCQ)

(78)



Evolutionary Programmin
g



Backup and Recovery planning



Main memory databases



Light Pen
(79)



HAVi: Home Audio Video Interoperability



Mining the Web: Searching, Integration and Discovery



Mobile Paradigm



MAC address
(80)



Java Cryptography Architecture (JCA)



Techniques for analysis, verification, validation of digital systems



Computational Photography



TETRA
-
Terrestrial Enhanced Trunked Radio
(81)



Trends in Compiler Construction



Public Key Encryption And Digital Signature




Data Management in Sensor Networks



Global System fo
r Mobiles
(82)



Epsilon nets and transversal of hypergraphs




Basic Gnu Emacs



Computational neuroscience






Internet Networking



Personal Mass Media
-

Blogging, Syndication, Podcasting, and Vidcasting



Real Time Operating Systems






OpenTV (OPTV)



Introduction to L
aTeX



Algorithms for networking



Recognition of VoIP Speech



Nonvolatile Flash Memory



Algorithms and Computation Theories



Probabilistic I/o Automata



Future Programming Techniques and Concepts



Advanced Processors



Peer 2 Peer Web Services



Information Extraction

modes & techniques



Signal Integrity Fundamentals for Digital Design



Computer vision



Software model checking



WBM(Web based mobile)



Future of the internet



Technologies and successful applications for direct and multihop ad hoc networks



Digital photography &

music



Embedded web server for remote access



VQ In Converging Telephony And Ip Networks



Proactive computing



Voice Portals



Auto
-
pilot for IT systems



Fuzzified Computer
-
Automated Crane Control System



GSM Security And Encryption



Wireless Application Protocol



New Age Graphics



Real Time Speech Translation



3D Internet



New Dimension of Data Security using Neural Networks


and Numerical
Functions



HomeRF
-

localized wireless technology optimized for



the home
environment



NVSRAM
-

Non Volatile Static RAM



Fusion Memory



Earth Simulator
-

Fastest Supercomputer



Graphic processing Unit



Open
-
Rar



High Altitude Aeronautical Platforms



Aspect
-
oriented programming (Aop)



Intel MMX Technology



Voice Over Internet
Protocol



Internet Searching



Wireless Technologies (bluetooth, 802.11x, IRDA)



Tracking and Positioning of Mobiles in Telecommunication



DNA Based computer



ATM Virtual connections



Botnet Security Threats



VPN Server



Advanced Mobile Presence Technology



Power of

Grid Computing



Embedded web server for remote access



Bio
-
metrics



Magnetic Random Access Memory



Intrution Detection System



Multiterabit Networks



Printed Memory Technology



High Capacity Flash Chips



Self Healing Computers



Mind Reading Phones



Blade Servers



Ne
ar Filed Communication (NFC)



UMA (Unlicensed Mobile Access)



Assisted GPS



Diskless Network storage Controller



DIGITAL HUBBUB



Agile Software development



HCI (Human Computer Interaction ) in software applications



Embedded systems



Infini band



The SAT (SIM Appl
ication Toolkit)



Computer forensics



Multiterabit networks



Virtual Key boards



Micro trends in Server Technology



FLEX 2



AJAX



DAta Mining



Extreme programming



Software synthesis for embedded systems



Small Computer System Interface



Advanced Airlines baggage man
agement systems



The TIGER SHARC Processor



Laptop security using biometric sensors



Multicasing



REINS (Real Estate Information Network Systems)



Integrated Digital Enhanced Network(i
-
DEN)



Symfony (web application framework)



WiFiber



Direct Memory Access



Infini

bridge



Cyberware



3D Object Extraction Using GIS Database



Page Stealer Process



3D Printers



Web Services in Gridcomputing



Qubit PC



CD Based Firewall



Decision diagrams in VLSI CAD



Bandwidth Aggregator



Atomic CPU



Fluorescent Multilayer Optical Data Storage



Em
ail
-
Service & Webhosting



Virtual Integration



SMART Programming



Object Relational Mapping



ASpect Oriented Programmin



Steganography and digital watermarking



Verifying Infinite State Systems



New Generation Of Chips



Precision Image Search



Evolotion of bluetoot
h



Nanocrystal Memory Devices



Ultra Wideband Networking



Studying in a "Virtual University



AppleTalk



Combinatorial Optimization




Quantum Software And Quantum Computer Development




Metadata application profile



XML Query Languages



AMD Processors



Digital Video
Encoding Formats



3
-
D Assembly Of Magnetic And Semiconducting Nanoparticles



Service oriented Architectures




Enterprise Service Bus




Phase Change Memory Technology



Object Oriented Design using Verilog HDL



WiBro



Zero Knowledge proofs



3
-
D Chip Stacking Techniq
ue



Integrating Structural Design and Formal Methods in RealTime System Design



Glass Glue



The Interactive Classroom



Embedded Computing



Wireless Internet



Quadrics Interconnection Networks



Home Automation using Handspring PDA

o

Extreme Programming

o

The TIGER SHA
RC Processor

o

CoCoon

o

Quantum dot lasers

o

Firewalls

o

Steganography
-

The art of hiding information

o

Infini Bridge

o

Symfony
-

web application framework for PHP5 projects

o

Hybrid ARQ

o

Genetic programming

o

Intrusion Detection System

o

Multiterabit networks

o

WiFiber

o

Planni
ng And Synthesis Based On Workflows

o

Orthogonal Frequency Division Multiple Access (OFDMA)

o

Small Computer System Interface

o

MiWi Wireless Protocol

o

Fixed Mobile Convergence

o

Waterproof Wireless Mouse

o

Phase Change memory

o

Kerberos

o

Wireless Payment System

o

Spam As
sassin

o

MST in telecommunication networks

o

Embedded Viavoice(R) Technology

o

Object Oriented Type Systems



Scalable streaming media system



Navigating the Internet



Cryptography and complexity



dns



Software defenses against malicious code



Admission/Overload Contro
l of Web Servers



Structured peer
-
to
-
peer overlay networks



Wireless Metal Detection System



Magnetic Resonance Imaging



Worldwide Interoperatibility for Microwave Access (WiMAX)



Parallel Computing In India



64 BIT Computing



Data Security in Local Network using

Distributed Firewalls



Resilient Packet Ring Technology



Membrane computing



Probabilistic data set generation



Scalable streaming media system



Atomic Scale Memory At A Silicon Surface



Perpendicular Recording



Next Generation Internet (NGI)



Further advanced ne
twork initiatives



Program Transformations For Verifying Protocols






OS Virtualisation





Dermal nanotech Display





Architectures for media processing





Data Integrity in SANS





Frameworks for web Applications





Chat Server





SQL Server Integration





HD Graphics





Biologically Inspired Intelligent Computer





Leased like mail Back Up





Augmented Reality





Storage Networking





Digital Subscriber Line





Web Server





Zetaflops Computing





Antivirus Protection





Towards Photorealism





Mobile Dat
a Protection System





Orthogonal frequency Division Multiplexing (OFDM)





Fire Wall





Bluetooth Based Smart Sensor Networks





Novel routing protocols for wireless sensor networks






Cluster computing





Stereoscopic Imaging





Free Space Optics
Probabi
listic Process Algebra



Managing Data with emerging technologies



Tabling And Lazy Evaluation For Efficient Evaluation



Flash
-
OFDM: An Approach for All
-
IP Wireless Networking



Real
-
Time Computing and Communication



SPICE Simulation and Signal Integrity Principl
es for High Performance Digital Designs



Microsoft passport



Internet2



Security considerations in deploying wireless LANs (W
-
LANS) and GSM/UMTS



RESTful Web Services



Natural language processing



Web Services in Office Environment



QoS for Multimedia in Wireless

Networks



Introspective networks



METS
-

Metadata Encoding and Transmission Standard



Pivot Vector Space Approach in Audio
-
Video Mixing



Performance analysis of multi
-
tiered software and hardware servers



A Radio Controlled Video Vehicle design



Proactive compu
ting



RSS Feeds



Brainwave Technology



High Link Capacities for 4G: Aspects of MIMO Signal Processing



Wireless Network Planning Models: a comparative study for 2G, 3G, and beyond



Affective Computing



Chip design for tolerance of process variation



Scale
-
free to
pology in information networks



Visual Information Technology



Model Checking Multi
-
Threaded Java Programs



Weblogging



Cyberspace Classroom



Design And Optimization By Incremental Computation



web knowledge processing



data center planning and design



Impacts of
contention on locking



Generic Framing Procedure



Trustworthy Computing



Automated Remote Data Logger



Small Computer System Interface



Computerized Paper Evaluation using Neural Network



iSCSI
-
Future of Network Storage



10 GIGABIT ETHERNET



IP Telephony



Adding In
telligence to Internet



Digital Multimedia Broadcasting (DMB)



Ext3 Filesystem



Interactive television



Architectural or compiler
-
level low
-
power techniques



Java Servlets



Internet Distributed Computing (Idc)



SALT
-

Speech Application Language Tags



Boot Sector P
rogramming



Timing Attacks on Implementations



Prototype System Design for Telemedicine



Natural Language Processing



Parallel and Distributed Computation



Optical Burst Switching



Border Security Using Wireless Integrated Network Sensors (WINS)



GSM Security and

Encryption



Quantum cryptography



Image Processing & Compression



DELAY tolerant networks



Membrane Keyboard



Cybernetics



Facility Layout Design using Genetic Algorithm



Design of 2
-
D Filters using a Parallel Processor Architecture

o

Dynamically Reconfigurable Co
mputing

o

Industrial Applications using Neural Networks

o

Optical Camoflague

o

Causes of Failure in Web Applications

o

Wireless Networked Digital Devices

o

Software Agents

o

OmniPeek Overview

o

Cognitive Machines

o

Machine Descriptions for Retargetable Compilation

o

Methods

of Machine Translation (MT)

o

Computational Biology

o

In
-
lining and Identification of duplicate code

o

Thermomechanical Data Storage

o

Programming Languages, Compilers, Data Flow Analysis

o

Tracking Dynamic Data

o

Verfication of Asynchronously communicating web servi
ces

o

Admission/Overload Control of Web Servers

o

Socket Programming

o

Adding Intelligence to Internet

o

Low Power UART Design for Serial Data Communication

o

Compact peripheral component interconnect

o

Light Tree

o

Terrestrial Trunked Radio

o

Smart Note Taker

o

Networking
via Message
-
Passing

o

Data Security in Local Network using Distributed Firewalls

o

Significance of real
-
time transport Protocol in VOIP

o

New generations of mobile networks



Asynchronous timing analysis



Performance analysis of multi
-
tiered software and hardware s
ervers



Array Liveness Analysis



Forensic Analysis for Network Security



Reconfigurable computing



Distributed Denial of Service Attacks



Cryptographic protocols



SALT ( Speech Application Language Tags)



Computer
-
supported Modeling and Reasoning



Security Enginee
ring



Web Crawling



Automated Generation of Attack Signatures



control monitoring on difrent muchine with the help of computer



Speech Technology



Ubuntu
-
Linux for Human Beings



Google Earth



Daknet




Radio propagation modeling



The Mbone And Multicasting



Record pa
ir classification techniques



Dynamic Cache Management Technique



PON Topologies



Implementation Of Zoom FFT



Adding Intelligence to Internet



Compiler techniques for multimedia codes on general
-
purpose architectures



Pluggable Authentication Modules (Pam)



Conte
nt Scrambling System



Pine and IMP
-

a New Web
-
Based Email Program



Intrution Detection System




3D optical Data Storage Technology



Modern Brain
-
Computer Interface



Remote OS Deployment



Multi Energy Based X
-
Ray Baggage Inspection System



Aspect
-
oriented program
ming (Aop)



Magneto resistive Random Access Memory (MRAM)



CAS (Conditional Access System)



Orthogonal Frequency Division Multiplplexing



Voice over Internet Protocol (VoIP)



Self Protecting Servers



The IKE protocol



Privacy and security of low
-
powered devices (
rfid)



Distributed Hash Tables



Cryptography: Human
-
Centric Protocols



Re
-
architecting & Internet Protocols



Network Security and its Principles



Cryptography Application



"Arms race" in malware



Popular Security Protocols



Future use of biometric technology for s
ecurity and authentication



Homeland security application



Natural Language Resources for Information Extraction



Meaning Based Multilingual Search Engine



Embedded Visual C++



Synchronization Problems and their classification



Aspect mining from Object Oriented

Code



Limits of silicon technology



Symbolic vs. Computational view of security protocols




Benefits of Parallel and Distributed Computing



4g Wireless Systems



Peer
-
to
-
Peer Wireless Networks



AS2 protocol for file transfers



Client/server
-
based programming for
Pocket PCs



Detecting Jamming attacks in Wireless Networks



High Speed Uplink Packet Access (HSUPA)



Re
-
coding of the system for Mobile Devices and Internet



Wireless Application Protocol



ATM Virtual Connections



DNA Computing in Security



Data Compression with
Huffman Algorithms



0wn the Internet



OpenGPG encryption



Randomized Algorithms and Networking Hardware



Plastic Displays



Proxy
-
Based Internet Services



Trends in SiGE BiCMOS Technology



Low Power, Low Noise and High
-
Speed VLSI Circuits Using Quantum MOS Technol
ogy



SRAM Sense Amplifiers



Web addresses in non
-
Latin scripts



Network Security, The Hirschmann Way



Java rings



Style Translation for Human Motion



Internet access 'a human right' ?



Energy Recovery VLSI Design



Compilation issues in Object Oriented Programming
Languages



'Next generation' wi
-
fi



Pattern
-
based intrusion detection



CMOS Analog Circuits for Wireless Communications



Programmable Interconnect Fabrics



Verifying infinite state systems



Video screens hit paper magazines



Web Browser Security



Digital Preservat
ion



Cellonics Technology



TETRA
-
TErrestrial Trunked Radio



Virtual Network Computing



Adaptive query processing/optimization



Video game: Call of Duty: Modern Warfare 2



Migrating legacy devices to Ethernet



Dynamic spectrum management (DSM)



Industrial Connectiv
ity: Passive Product Technology



Reconstruction of Solid Models from Oriented Point Sets



Holographic Storage Technologies



Glassfish



Wireless Printing



Apple iPad



What makes CSS so powerful?



Multi
-
Wafer Virtual Probe



Android mobiles



Program transformations fo
r verifying protocols



Microarchitecture Level Power Management



Cloud Computing



GSM Security And Encryption



Metering net traffic



BT's super
-
fast broadband network



Cross Lingual Meaning Based Search



Distributed Visualization of Geometric Algorithms



Windows 7
-

The new OPerating System



Semantic Web



Google Android
-

Mobile OS from Google



Fourth
-
Generation Broadband



Rise of internet social networking



Ubuntu
-
Linux for Human Beings



Vorbis



Data over Cable System (DOCSIS)



Secure multiparty computations witho
ut computers



Simultaneous Multithreading



Digital Visual Interface