You are on page 1of 19

[Type a quote from the document or the summary of an interesting point.

You can position the text box anywhere in the document. Use the Text Box Tools tab to change the formatting of the pull quote text box.]

Seminar Topics
Computer Science/MCA Seminar Topics

Are you interested in the following topic, Then mail to the following email immediately to get the full report. email :- contactv2@gmail.com
JAGADEESH 1/31/2012

1. Brain Gate 2. Palm Vein Technology 3. Sniffer for detecting lost mobiles 4. 5 Pen PC Technology 5. iDEN 6. Hi-Fi 7. Packet Sniffers 8. Brain Chips 9. Phishing 10. Pill Camera 11. Blue Brain 12. Mobile Phone Cloning 13. Nano Cars Into The Robotics 14. Mind-Reading Computer 15. Intelligent Speed Adaptation 16. GSM Based Vehicle Theft Control System 17. Global Wireless E-Voting 18. Green Cloud 19. Digital Jewelry 20. Biometric Voting System 21. 3D Television 22. 3D password 23. Voice Browser

24. Gi-Fi 25. Graphical Password Authentication 26. 4G Broadband 27. Finger Tracking In Real Time Human Computer Interaction 28. Eye Movement-Based Human Computer Interaction Techniques 29. Ethical Hacking 30. E-Cash Payment System 31. Cyborgs 32. Brain Fingerprinting 33. Biometrics in SECURE e-transaction 34. X- Internet 35. Surface Computer 36. Secure ATM by Image Processing 37. Mobile Ad-Hoc Networks Extensions to Zone Routing Protocol 38. Wibree 39. Telepresence 40. System in Package 41. Smart Memories 42. Slammer Worm 43. Sensitive Skin 44. Pixie Dust 45. Linux Kernel 2.6 46. Lamp Technology 47. Humanoid Robot

48. HTAM 49. Haptic Technology 50. Elastic Quotas 51. Diamond chip 52. Digital Rights Management 53. A Plan For No Spam 54. BEOWULF Cluster 55. Digital Scent Technology 56. Distributed Interactive Virtual Environment 57. Dynamic TCP Connection Elapsing 58. CAPTCHA 59. Virtual Retinal Display 60. Wireless LAN Security 61. Chameleon Chip 62. Haptics 63. Intelligent RAM 64. iSCSI 65. Linux Kernel 2.6 66. 3D Searching 67. Biological Computers 68. Rain Technology 69. Real Time Application Interface

70. GPS 71. HALO 72. BitTorrent 73. Compositional Adaptation 74. Rover Technology 75. Self Defending Networks 76. Semantic Web 77. Computer Intelligence Application 78. Cooperative Linux 79. Longhorn 80. Mesh Radio 81. Parallel Virtual Machine 82. Linux Virtual Server 83. Location Independent Naming 84. PHANToM 85. Multiprotocol Label Switching 86. Next Generation Secure Computing Base 87. NGSCB 88. Reconfigurable computing 89. Sky X Technology 90. Smart Client Application Development using .NET 91. Spawning Networks 92. SPCS

93. Speed protocol processors 94. Strata flash Memory 95. Swarm Intelligence 96. The Callpaper Concept 97. IP spoofing 98. Internet Access via Cable TV Network 99. Face Recognition Technology 100. 101. 102. 103. 104. 105. 106. 107. 108. 109. 110. 111. 112. 113. 114. 115. 116. FireWire Param 10000 The Deep Web Virtual Campus VoiceXML Wireless USB Refactoring On-line Analytical Processing (OLAP) Pivot Vector Space Approach in Audio-Video Mixing MPEG-7 Adding Intelligence to Internet Silverlight DNA chips Remote Administration Trojan's Thermography AJAX Alternative Models Of Computation

117. 118. 119. 120. 121. 122. 123. 124. 125. 126. 127. 128. 129. 130. 131. 132. 133. 134. 135. 136. 137.

Amorphous Computing and Swarm Intelligence Windows DNA Laptop Computer Intelligent Software Agents Self-Managing Computing Hurd Intel Centrino Mobile Technology MPEG Video Compression Survivable Networks Systems Self Organizing Maps Mobile IP Iris Scanning LWIP Unified Modeling Language (UML) Nanorobotics Dual Core Processor Cisco IOS Firewall Socket Programming SAM 10 Gigabit Ethernet Tripwire

138. 139. 140. 141. 142. 143. 144. 145. 146. 147. 148. 149. 150. 151. 152. 153. 154. 155. 156.

Ubiquitous Networking Unicode And Multilingual Computing XML Encryption Y2K38 VoCable Touch Screens Tempest and Echelon Synthetic Aperture Radar System Unlicensed Mobile Access IDS IDC SATRACK Asynchronous Chips Low Power UART Design for Serial Data Communication SPECT Satellite Radio Light emitting polymers Sensors on 3D Digitization Robotic Surgery

157. Buffer overflow attack : A potential problem and its Implications 158. 159. 160. Smart card Quantum Information Technology Money Pad, The Future Wallet

161. 162. 163. 164. 165. 166. 167. 168. 169. 170. 171. 172. 173. 174. 175. 176. 177. 178. 179. 180. 181. 182.

HVAC Terrestrial Trunked Radio Swarm intelligence & traffic Safety Facility Layout Design using Genetic Algorithm Human Computer Interface HPJava Gaming Consoles Fluorescent Multi-layer Disc Futex Extreme Programming (XP) Earth Simulator Compact peripheral component interconnect corDECT Wireless in Local Loop System Motes Modular Computing MiniDisc system Migration From GSM Network To GPRS M-Commerce C# IP Telephony RPR Broad Band Over Power Line

183. 184. 185. 186. 187. 188. 189. 190. 191. 192. 193. 194. 195. 196. 197. 198. 199. 200. 201. 202. 203. 204.

Rapid Prototyping Dashboard Code Division Duplexing Delay Tolerant Networking EDGE Holographic Data Storage Integer Fast Fourier Transform NRAM Orthogonal Frequency Division Multiplplexing Ovonic Unified Memory Pervasive Computing RAID Real Time Systems with Linux/RTAI Real-Time Obstacle Avoidance Symbian OS Teleportation Turbo Codes Utility Fog Cluster Computing Wireless Application Protocol Light Tree Smart Pixel Arrays

205. 206. 207. 208. 209. 210. 211. 212. 213. 214. 215. 216. 217. 218. 219. 220. 221. 222. 223. 224. 225. 226. 227. 228.

Project Oxygen Wearable Bio-Sensors Mobile Virtual Reality Service QoS in Cellular Networks Based on MPT Wireless Fidelity Voice morphing Radio Frequency Light Sources Speed Detection of moving vehicle using speed cameras Optical Packet Switching Network Storage Area Networks Smart Note Taker Crusoe Processor Optical Satellite Communication Optical packet switch architectures Optical Switching FRAM Virtual Private Network Clockless Chip Layer 3 Switching IMode Blue Gene Access gateways Computer Forensics Direct Memory Access

229. 230. 231. 232. 233. 234. 235. 236. 237. 238. 239. 240. 241. 242. 243. 244. 245. 246. 247. 248. 249. 250. 251. 252. 253. 254. 255. 256. 257. 258. 259.

Crusoe Digital Subscriber Line Computer Memory Based on the Protein Bacterio-rhodopsin DNA Based Computing Free Space Optics Freenet Fiber Distributed Data Interface Dynamic Virtual Private Network Introduction to the Internet Protocols Graphic processing Unit High Altitude Aeronautical Platforms Aspect-oriented programming (Aop) Intel MMX Technology Hyper-Threading technology IMAX Brain-Computer Interface InfiniBand Multicast Inverse Multiplexing Blue Tooth Holographic Memory Jini Technology Bio-metrics Magnetic Random Access Memory Intrution Detection System Multiterabit Networks Neural Networks And Their Applications Quantum Computers Small Computer System Interface OpenRAN Quadrics Interconnection Network

260. 261. 262. 263. 264. 265. 266. 267. 268. 269. 270. 271. 272. 273. 274. 275. 276. 277. 278. 279. 280. 281. 282. 283. 284. 285.

Plan 9 Operating System Structured Cabling Quantum Cryptography Speech Application Language Tags Real- Time Systems and Real- Time Operating Systems Parallel Computing In India Steganography Virtual LAN Technology Artificial Neural Network (ANN) Tele-immersion VHDL Blue Eyes Voice Over Internet Protocol The Tiger SHARC processor Autonomic Computing Wearable Computers Voice Portals Tamper Resistance CGI Programming DRM Software Radio Firewalls Handheld Computers Modems and ISDN Optical Free Space Communication Planar Separators Wireless Internet

286. 287. 288. 289. 290. 291. 292. 293. 294. 295. 296. 297. 298. 299. 300. 301. 302. 303. 304. 305. 306.

DVD Technology MPEG-4 Facial Animation Internet Telephony Policy in INDIA PON Topologies Smart Cards Surround Systems TCPA / Palladium Trustworthy Computing Sense-Response Applications Optical Computer Graph Separators Extended Mark Up Language Cellular Communications Virtual Instrumentation Voice Quality Cable Modems Dynamic Memory Allocation Optical Mouse Generic Framing Procedure Dynamic Cache Management Technique Ethernet Passive Optical Network

307. 308. 309. 310. 311. 312. 313. 314. 315. 316. 317. 318. 319. 320. 321. 322. 323. 324. 325. 326. 327.

Synchronous Optical Networking Development of the Intenet Design and Analysis of Algoritms Infinite Dimensional Vector Space Instant Messaging Optical Fibre Cable GSM Ambiophonics Palladium Computer Viruses Third Generation Object Oriented Concepts Night Vision Technology TCP/ IP Dynamic Synchronous Transfer Mode Integrated Voice and Data Java Servlets Smart Quill Spam Assassin Stereoscopic Imaging Zigbee

328. 329. 330. 331. 332. 333. 334. 335. 336. 337. 338. 339. 340. 341. 342. 343. 344.

Ultra-Wideband Home Networking Internet Protocol Television Bacterio-Rhodopsin Memory Blade Servers Digital Cinema Holographic Versatile Disc Itanium Processor Local Multipoint Distribution Service Network Attached Storage Night Vision Technology Opera (web browser) Parasitic Computing Performance Testing Java Ring RD RAM GSM Security And Encryption

345. Fast Convergence Algorithms for Active Noise Controlin Vehicles 346. 347. 348. 349. 3G vs WiFi Data Security in Local Network using Distributed Firewalls Computerized Paper Evaluation using Neural Network Bluetooth Based Smart Sensor Networks

350. 351. 352. 353. 354. 355. 356. 357. 358. 359.

Laser Communications Multiple Domain Orientation Industrial Applications using Neural Networks Implementation Of Zoom FFT Image Processing Virtual keyboard Transient Stability Assessment using Neural Networks Tracking and Positioning of Mobiles in Telecommunication Timing Attacks on Implementations Prototype System Design for Telemedicine

360. Optical Networking and Dense Wavelength Division Multiplexing 361. 362. 363. 364. 365. 366. 367. 368. 369. 370. 371. Optical Burst Switching Image Processing & Compression Cyberterrorism Ipv6 - The Next Generation Protocol Driving Optical Network Evolution Cellular Neural Network Radio Network Controller Digital Audio Broadcasting Significance of real-time transport Protocol in VOIP Space Mouse Resilient Packet Ring Technology

372. 373. 374. 375. 376. 377. 378. 379. 380. 381. 382. 383. 384. 385. 386. 387. 388. 389. 390. 391. 392. 393. 394.

Wireless Networked Digital Devices Design of 2-D Filters using a Parallel Processor Architecture Hyper Transport Technology CorDECT Storage Area Network High Performance DSP Architectures Smart Dust MANET Biometrics Based Authentication Software-Defined Radio Digital Video Editing D-Blast Aeronautical Communication Gigabit Ethernet Wisenet Digital Light Processing Free Space Laser Communications Millipede AC Performance Of Nanoelectronics 4G Wireless Systems Blu Ray Disc Smart Fabrics Daknet

395. 396. 397. 398. 399. 400. 401. 402.

Conditional Access System SyncML High Performance DSP Architectures Short Message Service (SMS) MANET Worldwide Inter operatibility for Microwave Access 64-Bit Computing Bio-Molecular Computing

You might also like