+ All Categories
Home > Documents > Seminar Topics List

Seminar Topics List

Date post: 07-Apr-2015
Category:
Upload: naveen25417313
View: 1,362 times
Download: 5 times
Share this document with a friend
30
Driving Optical Network Evolution Fiber Distributed Data Interface Ipv6 - The Next Generation Protocol Quadrics Interconnection Network Quantum Information Technology PON Topologies Quadrics Interconnection Network Inverse Multiplexing Adding Intelligence to Internet Unicode And Multilingual Computing Resilient Packet Ring Technology Storage Area Networks Significance of real-time transport Protocol in VOIP Optical Free Space Communication Dynamic Synchronous Transfer Mode Compact peripheral component interconnect Broad Band Over Power Line Virtual LAN Technology Ethernet Passive Optical Network Dynamic Cache Management Technique IP spoofing Mobile Virtual Reality Service Orthogonal Frequency Division Multiplplexing X- Internet corDECT Wireless in Local Loop System Dynamically Reconfigurability Computing Fiber Distributed Data Interface IP Telephony Free Space Laser Communications Extreme Programming (XP) Analysis on Performance of Freeware Tools Embedded Technology Internet Access via Cable TV Network Radio Network Controller X- Internet Use of information technology for rural development DNA Based Computing Freenet Synchronous Optical Networking Optical Free Space Communication Sense-Response Applications Virtual Instrumentation Access gateways Virtual LAN Technology Generic Framing Procedure Software Testing Innovative Application Development using J2EE Architecture Dynamic Memory Allocation Cable Modems Verification & Validation Increasing productivity with IT Cisco IOS Firewall Capability Maturity Model Programming (CMM) Finite Element Interface (FEI)
Transcript
Page 1: Seminar Topics List

Driving Optical Network Evolution

Fiber Distributed Data Interface

Ipv6 - The Next Generation Protocol

Quadrics Interconnection Network

Quantum Information Technology

PON Topologies

 Quadrics Interconnection Network

Inverse Multiplexing

Adding Intelligence to Internet

Unicode And Multilingual Computing

Resilient Packet Ring Technology

Storage Area Networks

Significance of real-time transport Protocol in VOIP

Optical Free Space Communication

Dynamic Synchronous Transfer Mode

Compact peripheral component interconnect

Broad Band Over Power Line

Virtual LAN Technology

Ethernet Passive Optical Network

Dynamic Cache Management Technique

IP spoofing

Mobile Virtual Reality Service

Orthogonal Frequency Division Multiplplexing

X- Internet

corDECT Wireless in Local Loop System

Dynamically Reconfigurability Computing

Fiber Distributed Data Interface

IP Telephony

Free Space Laser Communications

Extreme Programming (XP)

Analysis on Performance of Freeware Tools

Embedded Technology

Internet Access via Cable TV Network

Radio Network Controller

X- Internet

Use of information technology for rural development

DNA Based Computing

Freenet

Synchronous Optical Networking

Optical Free Space Communication

Sense-Response Applications

Virtual Instrumentation

Access gateways

Virtual LAN Technology

Generic Framing Procedure

Software Testing

Innovative Application Development using J2EE Architecture

Dynamic Memory Allocation

Cable Modems

Verification & Validation 

Increasing productivity with IT

Cisco IOS Firewall

Capability Maturity Model Programming (CMM)

Finite Element Interface (FEI)

Page 2: Seminar Topics List

Designing a "hipper" network

Cellular Neural Network

Multimedia and Gaming

Multi-Core Architectures

Hyper-Threading technology

Wireless Application Protocol

Free Space Optics

Integrated Voice and Data

Wireless Internet

Virtual keyboard

Holographic Data Storage

Open Source Applications

Image Processing and Printing (With a focus on mobile and web based printing solutions)

Earth Simulator

Artificial Neural Network (ANN)

Securing the wireless network from unwanted exposure

Firewall Adequacy

SQE Best Practices

Software Support & Maintenance

Software Lifecycles

Improving IT security 

Introduction to the Internet Protocols

Optical Packet Switching Network

Synchronous Optical Networking

Dynamic Memory Allocation

Dynamically Reconfigurability Computing

Ethernet Passive Optical Network

Wireless Application Protocol

Handheld Computers

Orthogonal Frequency Division Multiplplexing

Unlicensed Mobile Access

Generic Framing Procedure

QoS in Cellular Networks Based on MPT

Internet Telephony Policy

Automated Software Testing of Applications

Code Division Duplexing

Optical Satellite Communication

4G Wireless Systems

Bio-Molecular Computing

Ubiquitous Networking 

oGraphical Processing Unit(22)

o The MBMS

o Integrating Structural Design and Formal Methods in RealTime System Design

o GRASSHOPPER Operating System (23)

o Firewalls

o ARM Processor

o Security Issues In GRID COMPUTING  (24)

o Aspect oriented programming

o REAL TIME OPERATING SYSTEM

o HAVi: Home Audio Video Interoperability (25)

Page 3: Seminar Topics List

o Voice Portals

o SALT (Speech Application Language Tags)

o HomeRF (26)

o Narrow Band and Broad Band ISDN

o Autonomic Computing

o iSCSI: The future of Network Storage (27)

o Hyper-Threading Technology

o Trusted Network Connect (TNC) Specifications

o The Mbone And Multicasting (28)

o Sand Box Technology

o Wi-Fi Hotspots

o MANETS: Mobile Adhoc Networks (29)

o Embedded Technology

o Tape Drive Technologies - LTO (linear tape open) & SDLTS (Super Digital Linear Tape)

o Agent Based Computing (30)

o Personal Satellite assistant Systems

o Data Mining & Data Warehousing

o OpenGL- application programming interface(31)

o NEW STORAGE STRATEGY = Disk -Disk -Tape Back up

o Micro Hard disk Drives

o 1. GLUCO METER

2. MOBILE COMPTING

3. WIRELESS SENSOR NETWORKS

4. NANO TECHNOLOGY

5. DYNAMIC SOURCE ROUTING PROTOCOL

6. RSVP

7. BLUE RAY DISKS

8. MIMO TECHNOLOGY

9. BRAIN FINGER

10. CRYONICS

11. DRUG DISCOVERY

12. HOLOGRAPHIC MEMORY

13. RED TACTON

14. ELECTRONIC CARDIO GRAM

15. NANO TECHONOLGY

16. BIO METRICS

17. Form Wizard

18. Cryptography

19. Memory

20. Data Pre Processing

21. Interupts

22. Servelts

23. Servelts

24. Web Technology

25. Multimedia

26. Hacking

27. Web Spam

28. Blogs & their Creation

29. Google or Yahoo Case Study

30. Blogs & their Creation

31. Google or Yahoo Case Study

32. Working of E-Mail

33. Using Regular Expressions In java

34. Earning Online Money

Page 4: Seminar Topics List

35. Archiever Analyzer

36. Task Management

37. Form Wizard

38. Franchise Mgnt System

39. Leave Mgnt System

40. Blogs & their Creation

41. Google or Yahoo Case Study

42. Working of E-Mail

43. Using Regular Expressions In java

44. Earning Online Money

45. Archiever Analyzer

46. Task Management

47. Form Wizard

48. Franchise Mgnt System

49. Leave Mgnt System

50. Earning Online Money

51. Archiever Analyzer

52. Task Management

53. Form Wizard

54. Franchise Mgnt System

55. MAGIC SQUARES

56. BANKING

57. ELLICA

58. SPYWARE

59. GLUCO METER

60. MOBILE COMPTING

61. WIRELESS SENSOR NETWORKS

62. NANO TECHNOLOGY

63. DYNAMIC SOURCE ROUTING PROTOCOL

64. RSVP

65. Interupts

66. Servelts

67. Servelts

68. Web Technology

69. Multimedia

70. Interupts

71. RSVP

72. CASP

73. WIRELESS MESH NEWORK

74. NETWORK SECURT

75. VIRTUAL REALITY

76. WI-MAX

77. WIRELESS COMMUNICATION

78. MESH NETWORKING

79. SPYWARE

80. HACKERS

81. QOS

82. WATERFALL MODEL

83. WIRELESS SECURITY

84. HIGH SPEED LANS

85. INTERFACES

86. FIBER CHANNELS

87. LAN PROTOCOL ARCHITECTURE

88. TESTING METHODS

Page 5: Seminar Topics List

89. OOPS CONCEPTS

90. WIRELESS SECURITY

91. HIGH SPEED LANS

92. INTERFACES

93. FIBER CHANNELS

94. LAN PROTOCOL ARCHITECTURE

95. TESTING METHODS

96. OOPS CONCEPTS

97. SERVELTS

98. ARRAS AND SENSORS

99. COMPLIERS

100. CRPTOGRAPHY AND N/W SECURITY

101. LAN PROTOCOL

102. BEANS

103. VIRTUAL REALITY

104. DISTRUBUTED COMPUTING

105. SPINTRONICS

106. NANO TECHNOLOGY

107. BLOW FISH

108. HTML

109. HUMAN AREA NETWORK

110. Digital Jewellery

111. Holographic Memory

112. Geographic Versatile Dist.

113. DataWareHosuing

114. Chess Algorithm

115. Smart Cards

116. Ethical Hacking

117. Network Security

118. Fuzzy Logic

119. E-Commerce

120. Biometric Secuirty

121. Artificial Neural Networks

122. Hapics

123. Linux

124. Search Engine

125. Touch Screen

126. Brain-machine interface

127. Bluetooth technology

128. Operating systems

129. Rdbms

130. Computer peripherals

131. Operating systems

132. Networking

133. Acid rains

134. Embedded systems

135. Search algorithm

136. Bluetooth technology

137. Quantum computing

138. Soft computing

139. Parallel computing

140. Grid computing

141. Nano technology

142. Robotics

Page 6: Seminar Topics List

143. Dataflow machines

144. Touch screen technology

145. Data warehousing

146. Wireless technology

147. Quantum computing

148. Forms

149. Ajax 

150. Html

151. Nano technology

152. Ethical hacking

153. S/w life cycle/affiliated programs

154. Network security with cryptography

155. Kinetic data structuring

156. Technotask management

157. Anti matter

158. Methods in virtual networking

159. Cryptography

160. Authentication

161. Global positioning response system

162. Data warehousing

163. Wireless technology

164. Quantum computing

165. HACKERS

166. IP SPOOFING

167. SIMPUTERS

168. CRYPTOGRAPHY

169. HYPER THREAD TECHNOLOGY

170. INFORMATION SECURITY

171. BRIAN GATE TECHNOLOGY

172. WIRELESS COMMUNICATION

173. NETWORK SECURITY

174. WINDOWS VISTA

175. DATA WARE HOSUING & MINING

176. BIO METRICS

177. GAIT RECOGNITION

178. M.COMMERCE

179. MAIN FRAMES

180. BLU-RA DISC

181. SUPER COMPUTER

182. HONEY POTS

183. BRAIN FINGER PRINT TECHNOLOGY

184. AUGMNETED VIRTUAL REALIT

185. BAR CODES

186. GIMP

187. SMART QUILL

188. SMART CARDS

189. HONE POTS

190. BRAIN FINGER PRINT TECHNOLOG

191. ARGUMENTED VIRTUAL REALIT

192. BARCODES

193. GIMP

194. SMART QUILL

195. SMART CARDS

196. IPODS

Page 7: Seminar Topics List

197. DIGITAL MOVIES

198. TOUCH SCREEN SSTEM

199. Hackers prospectivs

200. Ajax

201. Network security with cryptography

202. Kinetic data structuring

203. Cav

204. Dna computiing

205. Technotask management

206. Anti matter

207. Methods in virtual private networks

208. ORACLE DATABASE 10g

209. Biometrics

210. C.d.c & m.i.f.p.

211. Cryptography

212. Iris scanning

213. Botnet

214. Firewalls

215. Global positioning response system

216. Etl tools(informatica)

217. Biometrics

218. Open ‘ssh’

219. Cryptography and steganography

220. Dna computing

221. Kerberos

222. Satellite communication

223. Grid computing

224. Cryptography

225. Internet version 2

226. Matlab (matrix lab)

227. Mobile communication

228. Optical canoflague

229. Virtual networking

230. Touch screen technology

231. Neural networks

232. Lixto suite

233. Globalization

234. Video conference

235. Real Time Operating Systems

236. Bio metrics –IRIS technique

237. BIOS

238. Pen Drive

239. Virtual Reality

240. Wi- Fi Technology

241. Ethernet

242. Wireless Applications

243. Spin monics

244. Windows Vista

245. Torents

246. Bit And Bytes

247. Cell phones

248. Tablet-pc

249. Voip

250. Web servers

Page 8: Seminar Topics List

251. Datbase management

252. Sniffers

253. Embedded systems

254. Cryptography

255. Wimax

256. Web browsers

257. Cd,dvd,ird

258. Atm

259. Virtual memory

260. Super computer

261. Computer hardware

262. Nano technology

263. Evolution of computers

264. Video conference

265. Blue-ray disk

266. Real Time Operating Systems

267. Bio metrics –IRIS technique

268. BIOS

269. Pen Drive

270. Virtual Reality

271. Ipod

272. Ethernet

273. Wireless Applications

274. Spin monics

275. Windows Vista

276. Torents

277. WI-Max

278. Antimeter

279. Personel Digital assistance

280. Smart Dust

281. Gigabit networking

282. How E-learning Works

283. Web Designing with HTML

284. 8085-mp

285. Bit and bytes

286. Cell phones

287. Cell phones

288. Tablet-pc

289. Voip

290. Web servers

291. Datbase management

292. Sniffers

293. Embedded systems

294. Cryptography

295. Wimax

296. Tablet-pc

297. Voip

298. Web servers

299. Datbase management

300. Sniffers

301. Embedded systems

302. Cryptography

303. Wimax

304. Web browsers

Page 9: Seminar Topics List

305. Cd,dvd,ird

306. Atm

307. Virtual memory

308. Super computer

309. HACKERS

310. IP SPOOFING

311. SIMPUTERS

312. CRYPTOGRAPHY

313. HYPER THREAD TECHNOLOGY

314. INFORMATION SECURITY

315. BRIAN GATE TECHNOLOGY

316. WIRELESS COMMUNICATION

317. NETWORK SECURITY

318. WINDOWS VISTA

319. DATA WARE HOSUING & MINING

320. BIO METRICS

321. GAIT RECOGNITION

322. INFORMATION SECURITY

323. BRIAN GATE TECHNOLOGY

324. WIRELESS COMMUNICATION

325. NETWORK SECURITY

326. WINDOWS VISTA

327. DATA WARE HOSUING & MINING

328. BIO METRICS

329. GAIT RECOGNITION

NEW ENGINEERING SEMINAR TOPICS WITH ABSTRACTS

3D PC Glasses

Only a few years ago, seeing in 3-D meant peering through a pair of red-and-blue glasses, or trying not to go cross-eyed in front of a page of fuzzy dots. It was great at the time, but 3-D technology has moved on. Scientists know more about how our vision works than ever before, and our computers are more powerful than ever before -- most of us have sophisticated components in our computer that are dedicated to producing realistic graphics. Put those two things together, and you ll see how 3-D graphics have really begun to take off.

Most computer users are familiar with 3-D games. Back in the 90s, computer enthusiasts were stunned by the game Castle Wolfenstein 3D, which took place in a maze-like castle. It may have been constructed from blocky tiles, but the castle existed in three dimensions -- you could move forward and backward, or hold down the appropriate key and see your viewpoint spin through 360 degrees. Back then, it was revolutionary and quite amazing. Nowadays, gamers enjoy ever more complicated graphics -- smooth, three-dimensional environments complete with realistic lighting and complex simulations of real-life physics grace our screens.But that s the problem -- the screen. The game itself may be in three dimensions, and the player may be able to look wherever he wants with complete freedom, but at the end of the day the picture is displayed on a computer monitor...and that s a flat surface.That s where PC 3-D glasses come in. They re designed to convince your brain that your monitor is showing a real, three-dimensional object. In order to understand quite how this works, we need to know what sort of work our brain does with the information our eyes give it. Once we know about that, we ll be able to understand just how 3-D glasses do their job.

Page 10: Seminar Topics List

A T M

These computers include the entire spectrum of PCs, through professional workstations upto super-computers. As the performance of computers has increased, so too has the demand for communication between all systems for exchanging data, or between central servers and the associated host computer system. The replacement of copper with fiber and the advancement sin digital communication and encoding are at the heart of several developments that will change the communication infrastructure. The former development has provided us with huge amount of transmission bandwidth. While the latter has made the transmission of all information including voice and video through a packet switched network possible. With continuously work sharing over large distances, including international communication, the systems must be interconnected via wide area networks with increasing demands for higher bit rates. For the first time, a single communications technology meets LAN and WAN requirements and handles a wide variety of current and emerging applications. ATM is the first technology to provide a common format for bursts of high speed data and the ebb and flow of the typical voice phone call. Seamless ATM networks provide desktop-to-desktop multimedia networking over single technology, high bandwidth, low latency network, removing the boundary between LAN WAN. ATM is simply a Data Link Layer protocol. It is asynchronous in the sense that the recurrence of the cells containing information from an individual user is not necessarily periodic. It is the technology of choice for evolving B-ISDN (Board Integrated Services Digital Network), for next generation LANs and WANs. ATM supports transmission speeds of 155Mbits / sec. In the future. Photonic approaches have made the advent of ATM switches feasible, and an evolution towards an all packetized, unified, broadband telecommunications and data communication world based on ATM is taking place.

Third Generation Computer SystemsSmart Phone: An Embedded System for Universal InteractionsDependability in Wireless NetworksCan We Rely on WiFi?Digital Video and Digital TV:A Comparison and Future DirectionsComputer-Human Interface Solutions for Emergency Medical CareOperational Considerations ofDeploying WiMax Technology as a Last-Mile Tactical Communication System Voice over IP servicePerformance in Satellite NetworksAdvanced user authentication for mobile devicesMobile Cookies Management on a Smart CardUsing Bluetooth and Sensor Networks for Intelligent Transportation SystemsRFID: A Technical Overview and Its Application to the EnterpriseSecurity System for Wirereless Local Area NetworksBlu-ray Disc FormatUSE OF INFRARED SENSORS FOR ESTIMATION OF ENERGY EXPENDITURE BY ELDERLY PEOPLE LIVING ALONE AT HOME

RFID implementation and benefits in libraries

Cryptography on a Speck of Dust

Microprocessor Design Issues: Thoughts on Road Ahead

Broadband Wireless Access with

WiMax/8O2.16: Current Performance

Benchmarks and Future Potential

Seven Myths About Voice over IP

Vendors Fight Spam’s Sudden Rise

Ultraviolet Lasers : Beyond Blue

IBM’s Cell Processor:

The next generation of computing?

Voice over IP Security

Z-WaveTM as Home Control RF Platform

An Overview of Broadband over Power Line (BPL)

1. Real Time Operating Systems on Embedded ICs

2. Real time communication in wireless sensor networks

3. Semi - Supervised Learning using Graph Kernels

4. Collaborative Mobile Environments

5. High Performance Clusters

6. Distributed Computing

7. membrane computing

8. Forecasting

Page 11: Seminar Topics List

9. Forecasting

10. Middleware architecture for Pervasive computing

11. Query Optimization

12. Software Code Security

13. Query Optimization

14. Network Anomaly

15. Study of TGREP

16. Forecasting

17. Viruses and Worms

18. Netowork Security

19. Inter-Operabilty of 802.11e and 802.11

20. RFID Security

21. Semi Supervised Learning using Gaussian Process

22. Quality of Service Routing in computer networks

23. Wireless Security

24. Wireless MAN

25. multi-wordnets

26. Light-trails

27. Fault Tolerance in Virtual Machine Environments

28. Wireless Connectivity for Rural Areas

29. VOIP Security

30. Semi Supervised Learning using Gaussian Process

31. Efficiency / Comparative study of routing schemes in event based systems

32. Rendering Maths on web with Java Swing

33. Analysing Software Life Cycle of Different Program Paradigm.

34. Authoring environments for open source courseware

35. Integration of Parallel Database in a Service Oriented Architecture

36. Ontological Relation Discovery

37. Issues in Middleware for Pervasive Computing 

38. Wireless Connectivity for Rural Areas

39. Energy Efficient query Optimization

40. Semi-supervised Learning using Graph Kernels

41. Comparative study on Authoring Tools 

42. network security

43. Security Issues in Wireless Networks

44. Layered versioning for software configuration management 

45. Cooperative Adaptive Cruise Control

46. Telephony Routing over IP

47. Virtual Private Networks(VPNs)

48. Holt-Winters technique for Financial Forecasting

49. Fine-grained Access Control in Databases 

50. Secure Database Service

51. QoS in Wireless Lans

52. Classification, Clustering and their Application for Damage Detection in Mechanical Structures

53. Middleware in embedded systems

54. Web Search Results' Ranking: PageRank, HITS and Related Work

55. Proactive Anomaly Detection

56. Forecasting using Double Exponential Smoothing Method

57. Enery efficiency in Wireless sensor networks

58. Enterprise Security

59. Seasonal and Adaptive Forecasting

60. Root cause Localization and analysis of faults[Autonomic Computing]

61. RFID : Comparative study of Collision Resolution Protocols

62. Classification clustering and Applications to Intrusion Detection Systems.

Page 12: Seminar Topics List

63. Faultolerant Routing in Mobile Ad-Hoc Network

64. Channel Allocation Algortihms for Mobile Telephony

65. Middleware for Wireless Sensor Networks

66. Security On Wireless LAN Adaptive cruise control

67. Middleware for Sensor Networks

68. Query Based Fine-grained PageRank 

69. Classification, Clustering and Application in Intrusuion Detection System

70. Financial Forecasting 

71. Wireless Security 

72. Autonomic computing 

73. Sensor Networks 

74. QoS in VoIP 

75. Proactive Network Anomaly Detection 

76. RFID 

77. Middleware in Embedded Systems 

78. Wireless Security 

79. Voice Routing over IP Telephony

80. Statistical Forecasting 

81. QOS in software server Firewalls

82. Classification, Clustering and their Application for Damage Detection in Mechanical Structures. 

83. Fine Grained DataBase Security 

84. J2EE Security 

85. Reliable and Fault Tolerant Routing on Mobile Ad Hoc Network.

86. VOIP Over Wireless LAN

87. Database Security

88. Reliable Multicast 

89. Multicast Congestion Control 

90. Capacity of Ad-hoc Wireless Networks 

91. Performance Evaluation of IEEE 802.11 

92. Quality of service in Differentiated Service Architecture 

93. Routing in Sensor Networks 

94. TDMA implementation for QoS routing in Ad Hoc Networks 

95. case Study : A X-By-Wire System , Communication Bus perspective 

96. Approximate string matching for Music retrieval 

97. Spectral Methods for Graph Partitioning 

98. Signal Processing for Networking 

99. Spatial DataMining 

100. Bionetric Authentication 

101. Aspects of Database Security and Program Security 

102. Attacks on Smart Cards 

103. Smart Card Standards 

104. A Probabilistic Approach to Micropayment 

105. Java Security 

106. Information Extraction 

107. Clustering (Data Mining) 

108. Frequent ItemSet Mining 

109. Classification Techniques in Data Mining 

110. Multi-Relational Data Mining 

111. Object Persistence 

112. Distributed Garbage Collection 

113. Agent Mediated E-commerce 

114. Recovery in Main Memory Databases

115. Optimization of Protocol Stack for wireless networks 

116. Compressed Domain Processing And Video Information System 

Page 13: Seminar Topics List

117. Introduction to Speech Recognition 

118. Reconfigurable Hardware in Wireless communication 

119. Applications of speech recognition 

120. Geometric Invariants in Biological Molecules 

121. Applications of Graph Theory to Metabolic Pathways 

122. Computational Geometry in Drug Design 

123. Query Processing on Data Streams 

124. Multi-application Framework for Smart Cards 

125. Semi-supervised Learning 

126. Data mining through Active Learning 

127. Text Classification Using Semi-supervised and Active Learning 

128. Relational Data Mining 

129. Dataset Query algorithms in Streaming Mining 

130. Mining Document Streams 

131. Information Extraction from structured & Semi-structured data 

132. Digital Video Editing 

133. Determining Global States of Distributed Systems 

134. Multi Protocol Label Switching 

135. QoS in Wireless LANs 

136. Advanced Queue Management Techniques 

137. Techniques to aid property specification in Model Checking

1. Application of Genetic Algorithms in Network routing

2. QoS in Networking using active Networks

3. Applications of Soft Computing in Medical Image Analysis

4. Web Data Management

5. Dynamic resource allocation in Grid Computing

6. Network Security – Virtual Private Networks

7. Peer to Peer and Overlay Networks

8. Intelligent Patient Monitoring System

9. Sensor Networks

10. Bio-Medical Instrumentation and Signal analysis

11. Application of ANN in Data Mining of Medical Images

12. Software Architecture Analysis

13. Network Security

14. Multicast Routing

15. Scheduling in Embedded Multiprocessors

16. Ant Colony optimization for routing in Mobile and Adhoc Networks

17. Text Classification

Cuckoo Egg. Stealth virus. AppleTalk. Skinny Client Control Protocol (SCCP). The Session

Description Protocol (SDP). RVP Control Protocol (RVPCP). Media Gateway Control Protocol (MGCP). Registration, Admission and Status (RAS). The H.323. The Media Gateway Control Protocol,

Page 14: Seminar Topics List

(Megaco). The Real-time Transport (RTP) Protocol. On-Board Diagnostics. CDMA2000. AppleTalk. FUNI. MPEG-2.ISO/IEC 14496 - MPEG-4. Data over Cable System (DOCSIS). VoDSL. Frame Relay. CSS and

DeCSS.IMODE. ShotCode. Mathematical Markup Language (MathML). VOIP in mobile phones.Differential

cryptanalysis. Digital cash. Mpeg 7. Simultaneous Multithreading. Cyborg.Applications of Majority Gates with Quantum-Dot Cellular Automata(QCA). Multimedia Broadcast Multicast Service

(MBMS). WiBro. Video on demand (VOD). Interactive television. OpenTV

(OPTV). DVB. 3GP. Ogg. Vorbis.

Acoustic cryptanalysis

Acoustic cryptanalysis is a side channel attack which exploits sounds, audible or not, produced during a computation or input-output operation. In 2004, Dmitri Asonov and Rakesh Agrawal of the IBM Almaden Research Center announced that computer keyboards and keypads used on telephones and automated teller machines (ATMs) are vulnerable to attacks based on differentiating the sound produced by different keys. Their attack employed a neural network to recognize the key being pressed. By analyzing recorded sounds, they were able to recover the text of data being entered. These techniques allow an attacker using covert listening devices to obtain passwords, passphrases, personal identification numbers (PINs) and other security information. Also in 2004, Adi Shamir and Eran Tromer demonstrated that it may be possible to conduct timing attacks against a CPU performing cryptographic operations by analysis of variations in its humming noise. In his book Spycatcher, former MI5 operative Peter Wright discusses use of an acoustic attack against Egyptian Hagelin cipher machines in 1956. The attack was codenamed 'ENGULF'.

Adaptive Partition Scheduler

Adaptive Partition Schedulers are a relatively new type of partition scheduler, pioneered with the most recent version of the QNX operating system. Adaptive Partitioning (or AP) allows the real-time system designer to request that a percentage of processing resources be reserved for a particular subsystem (group of threads and/or processes). The operating systems priority driven pre-emptive scheduler will behave in the same way that a non-AP system would until the system is overloaded (i.e. system-wide there is more computation to perform, than the processor is capable of sustaining over the long term). During overload, the AP scheduler enforces hard limits on total run-time for the subsystems within a partition (as dictated by the allocated percentage of processor bandwidth for the particular partition). If the system is not overloaded, a partition that is allocated (for example) 10% of the processor bandwidth, can, in fact, use more than 10%, as it will borrow from the spare budget of other partitions (but will be required to pay it back later). This is very useful for the non real-time subsystems that experience variable load, since these subsystems can make use of spare budget from hard real-time partitions in order to make more forward progress than they would in a Fixed Partition Scheduler such as ARINC-653, but without impacting the hard real-time subsystems deadlines.

ZIgbee the wireless future

AJAX

Ajax, shorthand for Asynchronous JavaScript and XML, is a web development technique for creating interactive web applications. The intent is to make web pages feel more responsive by exchanging small amounts of data with the server behind the scenes, so that the entire web page does not have to be reloaded each time the user makes a change. This is meant to increase the web page s interactivity, speed, and usability.

The Ajax technique uses a combination of:XHTML (or HTML) and CSS, for marking up and styling information.The DOM accessed with a client-side scripting language, especially ECMAScript implementations such as JavaScript and JScript, to dynamically display and interact with the information presented.The XMLHttpRequest object to exchange data asynchronously with the web server. In some Ajax frameworks and in certain situations, an IFrame object is used instead of the XMLHttpRequest object to exchange data with the web server.

XML is sometimes used as the format for transferring data between the server and client, although any format will work, including preformatted HTML, plain text, JSON and even EBML.Like DHTML, LAMP and SPA, Ajax is not a technology in itself, but a term that refers to the use of a group of technologies together.

Elliptical curve cryptography (ECC)

ECC is a public key encryption technique based on elliptic curve theory. ECC can be used to create faster, smaller and more efficient cryptographic keys. It generates keys through the properties of the elliptic curve equation rather than the traditional method of generation, as the product of very large prime numbers. This technology can be used in conjunction with most of the public key encryption methods such as RSA and Diffie-Hellman.

ECC can yield a level of security with a 164-bit key compared with other systems that require a 1,024-bit key. Since ECC provides an equivalent security at a lower computing power and battery resource usage, it is widely used for mobile applications. ECC was developed by Certicom, a mobile e-business security provider and was recently licensed by Hifn, a manufacturer of integrated circuitry and network security products. Many manufacturers, including 3COM, Cylink, Motorola, Pitney Bowes, Siemens, TRW and VeriFone have incorporated support for ECC in their products .

Generic visual perception processor

Generic visual perception processor is a single chip modeled on the perception capabilities of the human brain, which can detect objects in a motion video signal and then locate and track them in real time. Imitating the human eye s neural networks and the brain, the chip can handle about 20 billion instructions per second. This electronic

Page 15: Seminar Topics List

eye on the chip can handle a task that ranges from sensing the variable parameters as in the form of video signals and then process it for controlling purpose.

o Optical Disc Data Security (32)

o NRAM

o Turbo Codes

o Pluggable Authentication Modules (Pam) (36)

o Symbian

o eXtensible Bindings Language (XBL)

o Parallel Computing In Remote Sensing Data Processing (37)

o Stealth Virus

o Clockless Chip

o Samba Fileserver (38)

o Intelligent RAM : IRAM

o Genetic Programming

o Search Images By Appearance (39)

o Fire walls

o Virtual Keyboards

o Secure Socket Layer (SSL) (40)

o Access gateways

o DNA Computing

o Symbian OS (41)

o Trends in Mobiles & PC's

o Blue Ray - Future of DVD's

o Uniprocessor Virtual Memory Without TLBS (42)

o Cross Platform Component Object Model

o SUNSPOT (wireless sensor network)

o Virtual P.C. (43)

o Wearable computers

o Cryogenic Processor

 

Hyper Transport Technology

This describes AMD s Hyper Transport™ technology, a new I/O architecture for personal computers, workstations, servers, high-performance networking and communications systems, and embedded applications. This scalable architecture can provide significantly increased bandwidth over existing bus architectures and can simplify in-the-box connectivity by replacing legacy buses and bridges. The programming model used in Hyper Transport technology is compatible with existing models and requires little or no changes to existing operating system and driver software.

It provides a universal connection designed to reduce the number of buses within the system. It is designed to enable the chips inside of PCs and networking and communications devices to communicate with each other up to 48 times faster than with existing technologies. Hyper Transport technology is truly the universal solution for in-the-box connectivity.>> It is a new I/O architecture for personal computers, workstations, servers, embedded applications etc.>> It is a scalable architecture can provide significantly increased.bandwidth over existing bus architectures .>> It simplify in-the-box connectivity by replacing legacy buses and bridges.>> The programming model used in Hyper Transport technology is compatible with existing models and requires little or no changes to existing operating system and driver software.

Hyper Transport technology provides high speeds while maintaining full software and operating system compatibility with the Peripheral Component Interconnect (PCI) interface that is used in most systems today. In older multi-drop bus architectures like PCI, the addition of hardware devices affects the overall electrical characteristics and bandwidth of the entire bus. Even with PCI-X1.0, the maximum supported clock speed of 133MHz must be reduced when more than one PCI-X device is attached. Hyper Transport technology uses a point-to-point link that is connected between two devices, enabling the overall speed of the link to transfer data much faster

Page 16: Seminar Topics List

KerberosIn a non-networked personal computing environment resources and information can be protected by physically securing the personal computer. But in a network of users requiring services from many computers the identity of each user has to be accurately verified. For authentication kerberos is being used. Kerberos is a third party authentication technology used to identify a user requesting a service.

METASPLOITThe Metasploit Project is an open source computer security project which provides information about security vulnerabilities and aids in penetration testing and IDS signature development. Its most well-known sub-project is the Metasploit Framework, a tool for developing and executing exploit code against a remote target machine.

Wearable Computers (44)

SIP

DNA Based Computing

Wi-Fi (802.11b)  (45)

High Performance DSP Architectures 

Java Cryptography Architecture (JCA)

Future of Satellite Communication (46)

Tablet PC

Image compression

4G Wireless Technology (47)

Choreography

Mobile agent

MPEG-7    (48)

Curl: A Gentle Slope Language For The Web

Genetic programming

High Speed Data In Mobile Networks (49)

JIRO Technology

Future of business Computing

Packet Interception (50)

Internet Telephony

Agile Software development

Crusoe Processors (51)

Peer to peer Networking

Clustering

Augmented Reality (52)

Encrypted Text chat Using Bluetooth

Ovonic Unified Memory

Page 17: Seminar Topics List

Real Time Operating System

A real time system is defined as follows - A real-time system is one in which the correctness of the computations not only depends upon the logical correctness of the computation but also upon the time at which the result is produced. If the timing constraints of the system are not met, system failure is said to be occurred.

Two types Hard real time operating system Strict time constraints Secondary storage limited or absent Conflicts with the time sharing systems Not supported by general purpose OS Soft real time operating system Reduced Time Constraints Limited utility in industrial control or robotics Useful in applications (multimedia, virtual reality) requiring advanced operating-system features. In the robot example, it would be hard real time if the robot arriving late causes completely incorrect operation. It would be soft real time if the robot arriving late meant a loss of throughput. Much of what is done in real time programming is actually soft real time system. Good system design often implies a level of fe/correct behaviour even if the computer system never completes the computation. So if the computer is only a little late, the system effects may be somewhat mitigated.  Hat makes an os a rtos?1. A RTOS (Real-Time Operating System) has to be multi-threaded and preemptible.2. The notion of thread priority has to exist as there is for the moment no deadline driven OS. 3. The OS has to support predictable thread synchronisation mechanisms4. A system of priority inheritance has to exist5. For every system call, the maximum it takes. It should be predictable and independent from the number of objects in the system6. the maximum time the OS and drivers mask the interrupts. The following points should also be known by the developer: 1. System Interrupt Levels. 2. Device driver IRQ Levels, maximum time they take, etc. 

The MBMS

The MBMS is a unidirectional point to multipoint bearer service in which data is transmitted from a single source entity to multiple recipients. These services will typically be in the form of streaming video and audio and should not be confused with the CBS (Cell Broadcast Service) that is currently supported. This paper describes the architecture of the MBMS along with its functional notes and integration into 3G and GERAN (GSM & EDGE Radio Access Network) with Core Network, UTRAN (UMTS Terrestrial Radio Access Network) and radio aspects being explained.

Voice Over Internet Protocol

VoIP, or Voice over Internet Protocol refers to sending voice and fax phone calls over data networks, particularly the Internet. This technology offers cost savings by making more efficient use of the existing network. Traditionally, voice and data were carried over separate networks optimized to suit the differing characteristics of voice and data traffic. With advances in technology, it is now possible to carry voice and data over the same networks whilst still catering for the different characteristics required by voice and data.Voice-over-Internet-Protocol (VOIP) is an emerging technology that allows telephone calls or faxes to be transported over an IP data network. The IP network could beA local area network in an officeA wide area network linking the sites of a large international organizationA corporate intranetThe internetAny combination of the aboveThere can be no doubt that IP is here to stay. The explosive growth of the Internet, making IP the predominate networking protocol globally, presents a huge opportunity to dispense with separate voice and data networks and use IP technology for voice traffic as well as data. As voice and data network technologies merge, massive infrastructure cost savings can be made as the need to provide separate networks for voice and data can be eliminated. Most traditional phone networks use the Public Switched Telephone Network(PSTN), this system employs circuit-switched technology that requires a dedicated voice channel to be assigned to each particular conversation. Messages are sent in analog format over this network. Today, phone networks are on a migration path to VoIP. A VoIP system employs a packet-switched network, where the voice signal is digitized, compressed and packetized. This compressed digital message no longer requires a voice channel. Instead, a message can be sent across the same data lines that are used for the Intranet or Internet and a dedicated channels is no longer needed. The message can now share bandwidth with other messages in the network. Normal data traffic is carried between PC s, servers, printers, and other networked devices through a company s worldwide TCP/IP network. Each device on the network has an IP address, which is attached to every packet for routing. Voice-over-IP packets are no different. Users may use appliances such as Symbol s NetVision phone to talk to other IP phones or desktop PC-based phones located at company sites worldwide, provided that a voice-enabled network is installed at the site. Installation simply involves assigning an IP address to each wireless handset. VOIP lets you make toll-free long distance voice and fax calls over existing IP data networks instead of the public switched telephone network (PSTN). Today business that implement their own VOIP solution can dramatically cut long distance costs between two or more locations

Page 18: Seminar Topics List

Wireless Markup Language

When its time to find out how to make content available over WAP, we need to get to grips with its Markup Language. ie, WML. WML was designed from the start as a markup language to describe display of content on small screen devices.It is a Markup language enabling the formatting of text in WAP environment using a variety of markup tags to determine the display appearance of content. WML is defined using the rules of XML-extensible markup language and therefore an XML application. WML provides a means of allowing the user to navigate around the WAP application and supports the use of anchored links as found commonly in the web pages. It also provides support for images and layout within the constraints of the device

Serial ATA (SATA) (53)

Flexible CRT Displays

Cake PHPs

Night Vision Technology (54)

Automated Vehicle Detection System

Robocode

RAID (55)

Java Messaging Service (JMS)

Mobile Library Management

MANET:-The Art of Networking without a Network (56)

Online software Distribution

Smart Office

Virtual Network Computing (57)

Emergency Health Care System

Mail server Management

Ruby on Rails   RoR (58)

Storage Farms

Unified Communication

Session Initiation Protocol (SIP) (59)

Distributed database management system

Content Management

Authentication and Key Agreement (AKA) (60)

Server side Java

Clinical Data Management

B-ISDN Reference Model

ATM makes B-ISDN a reality. The Integrated services Digital Network (ISDN) evolved during the 80 s. It carried a basic channel that could operate at 64kbps (B-channel) and combinations of this and others (D-channels) formed the basis of communication on the network. In the new B-ISDN world, this is supposed to supply data, voice and other communication services over a common network with a wide range of data speeds. To understand a lot of the terminology in ATM-land, it is necessary to understand the B-ISDN Reference Model. Just as the ISO seven-layer model defines the layers for network software, this model defines layers for the ATM network.The header is broken up into the following fields.Generic Flow Control (GFC)Virtual Channel Identifier (VCI)Virtual Path Identifier (VPI)Payload type (PT)Cell Loss Priority (CLP)Header Error Control (HEC)Network - to - Network interfaceIt is necessary for the switches to know how to send the calls along. There are several techniques that could be adopted, but the most useful one for the 1P users is called Private Network-to Network Interface (PNNI)The PNNI is an interface between switches used to distribute information about the state and structure of the network to establish circuit to ensure that reasonable bandwidth and Qos contract can be established and to provide for some network management functions. Convergence Sublayer: The function provided at this layer differ depending on the service provided. It provides bit error correction and may use explicit time stamps to transfer timing information.Segmentation and reassembly sublayer:At this layer the convergence sublayer-protocol data unit is segmented and a header added. The header contains 3 fields Sequence Number used to detect cell insertion and cell loss. Sequence Number protection used to correct and detect errors that occur in the sequence number. Convergence sublayer indication used to indicate the presence of the convergence sublayer function.

Page 19: Seminar Topics List

Future use of biometric technology for security and authontication

Biometric technology is the technology which is based on the samples of the human body. This is based on the things which every person is having different to the any other person. And using this technology is far more better than using any other technology.

Genetic programming

Genetic programming (GP) is an automated methodology inspired by biological evolution to find computer programs that best perform a user-defined task. It is therefore a particular machine learning technique that uses an evolutionary algorithm to optimize a population of computer programs according to a fitness landscape determined by a program's ability to perform a given computational task. The first experiments with GP were reported by Stephen F. Smith (1980) and Nichael L. Cramer (1985), as described in the famous book Genetic Programming: On the Programming of Computers by Means of Natural Selection by John Koza (1992). Computer programs in GP can be written in a variety of programming languages. In the early (and traditional) implementations of GP, program instructions and data values were organized in tree-structures, thus favoring the use of languages that naturally embody such a structure (an important example pioneered by Koza is Lisp). Other forms of GP have been suggested and successfully implemented, such as the simpler linear representation which suits the more traditional imperative languages [see, for example, Banzhaf et al. (1998)]. The commercial GP software Discipulus, for example, uses linear genetic programming combined with machine code language to achieve better performance. Differently, the MicroGP uses an internal representation similar to linear genetic programming to generate programs that fully exploit the syntax of a given assembly language. GP is very computationally intensive and so in the 1990s it was mainly used to solve relatively simple problems. However, more recently, thanks to various improvements in GP technology and to the well known exponential growth in CPU power, GP has started delivering a number of outstanding results. At the time of writing, nearly 40 human-competitive results have been gathered, in areas such as quantum computing, electronic design, game playing, sorting, searching and many more. These results include the replication or infringement of several post-year-2000 inventions, and the production of two patentable new inventions. Developing a theory for GP has been very difficult and so in the 1990s genetic programming was considered a sort of pariah amongst the various techniques of search. However, after a series of breakthroughs in the early 2000s, the theory of GP has had a formidable and rapid development. So much so that it has been possible to build exact probabilistic models of GP (schema theories and Markov chain models) and to show that GP is more general than, and in fact includes, genetic algorithms. Genetic Programming techniques have now been applied to evolvable hardware as well as computer programs. Meta-Genetic Programming is the technique of evolving a genetic programming system using genetic programming itself. Critics have argued that it is theoretically impossible, but more research is needed

Inferno(new operating system)

Inferno is answering the current and growing need in the marketplace for distributed computing solutions. Based on more than 20 years of Bell Labs research into operating systems and programming languages, Inferno is poised to propel network computing into the 21st century. Bell Labs will continue to support the evolution of Inferno under a joint development agreement with Vita Nuova. Inferno is an operating system for creating and supporting distributed services. It was originally developed by the Computing Science Research Center of Bell Labs, the R&D arm of Lucent Technologies, and further developed by other groups in Lucent. Inferno was designed specifically as a commercial product, both for licensing in the marketplace and for use within new Lucent offerings. It encapsulates many years of Bell Labs research in operating systems, languages, on-the-fly compilers, graphics, security, networking and portability.

IDMA - Future of Wireless Technology (61)

GABOR Wavelet

Molecular Keypad Lock

Elliptical Curve Cryptography (62)

Parallel Computations

Software Engineering  Advances

Computerized Paper Evaluation using Neural Network (63)

Transient Stability Assessment using Neural Networks

Network security - Trends & Methods

Data over Cable System (DOCSIS) (64)

Internet Cryptopraphy

DataBase Migration

Co-operative LINUX (65)

Page 20: Seminar Topics List

Split Range Syncronisation

MIMO

Virtualization Technology (66)

The Architecture of a Moletronics Computer

Data Security in Local Network using Distributed Firewalls

3D-DOCTOR  (67)

Optical networking

Micro Mouse

Fluorescent Multilayer Disc (FMD) (68)

Near Filed Communication (NFC)

Quantum Computers

Datagram Congestion Control Protocol (DCCP) (69)

Encrypted Hard disks

Power Line Networking

Watermarking Digital Audio (70)

Nano Ring Memory

Split Range Synchronisation

Lightweight Directory Access Protocol

DAP is actually a simple protocol that is used to access directory services. It is an open, vendor neutral information such as e-mail addresses and public keys for secure transmission of data. The information contained within an LDAP directory could be ASCII text files, JPEG photographs or sound files. One way to reduce the time taken to search for information is to replicate the directory information over different platforms so that the process of locating a specific data is streamlined and more resilient to failure of connections and computers. This is what is done with information in an LDAP structure. LDAP, Lightweight Directory Access Protocol, is an Internet protocol runs over TCP/IP that e-mail programs use to lookup contact information from a server. A directory structure is a specialized database, which is optimized for browsing, searching, locating and reading information. Thus LDAP make it possible to obtain directory information such as e-mail addresses and public keys. LDAP can handle other information, but at present it is typically used to associate names with phone numbers and e-mail addresses. LDAP is a directory structure and is completely based on entries for each piece of information. An entry is a collection of attributes that has a globally-unique Distinguished Name (DN). The information in LDAP is arranged in a hierarchical tree-like structure. LDAP services are implemented by using the client-server architecture. There are options for referencing and accessing information within the LDAP structure. An entry is referenced by the type of its uniquely distinguishable name. Unlike the other directory structure, which allows the user access to all the information available, LDAP allows information to be accessed only after authenticating the user. It also supports privacy and integrity security services. There are two daemons for LDAP which are slapd and slurpd. THE LDAP DOMAIN THE COMPONENTS OF AN LDAP DOMAIN A small domain may have a single LDAP server, and a few clients. The server commonly runs slapd, which will serve LDAP requests and update data. The client software is comprised of system libraries translating normal lib calls into LDAP data requests and providing some form of update functionality .Larger domains may have several LDAP slaves (read-only replicas of a master read/write LDAP server). For large installations, the domain may be divided into sub domains, with referrals to ‘glue’ the sub domains together. THE STRUCTURE OF AN LDAP DOMAIN A simple LDAP domain is structured on the surface in a manner similar to an NIS domain; there are masters, slaves, and clients. The clients may query masters or slaves for information, but all updates must go to the masters. The ‘domain name’ under LDAP is slightly different than that under NIS. LDAP domains may use an organization name and country. The clients may or may not authenticate themselves to the server when performing operations, depending on the configuration of the client and the type of information requested. Commonly access to no sensitive information (such as port to service mappings) will be unauthenticated requests, while password information requests or any updates are authenticated. Larger organizations may subdivide their LDAP domain into sub domains. LDAP allows for this type of scalability, and uses ‘referrals’ to allow the passing off of clients from one server to the next (the same method is used by slave servers to pass modification requests to the master). 

Mesotechnology

Mesotechnology describes a budding research field which could replace nanotechnology in the future as the primary means to control matter at length scales ranging from a cluster of atoms to microscopic elements. The prefix meso- comes from the Greek word mesos, meaning middle, hence the technology spans a range of length scales as opposed to nanotechnology which is concerned only with the smallest atomic scales. describes very well phenomena on the atomic to nanoscale while classical Newtonian Mechanics describes the behavior of objects on the microscale and up. However, the length scale in the middle ( Although the term itself is still quite new, the general concept is not. Many fields of science have traditionally focused either on single discrete elements or large statistical collections where many theories have been successfully applied. In the field of physics for example, Quantum Mechanicsmesoscale) is not well described by either theory. Similarly, psychologists focus heavily on the behavior and mental processes of the individual while sociologists study the behavior of large societal groups, but what happens when only 3 people are interacting, this is the mesoscale.

Holographic Versatile Disc (71)

Grid Computing

Page 21: Seminar Topics List

Java Class Loader

Unbiquitos Smart Homes

ZFS File system (72)

Form Processing

Site Search Engine

Struts Integration

Orthogonal Frequency Division Multiplplexing (73)

Search Engine Optimisation

Stereoscopic Projection Systems

Virtual Reality Visualisation

Surface-conduction Electron-emitter Display (SED) (74)

Network Accelerators

Mobile Infrastructure Management

Voice Roaming

Autonomic Computing (75)

Mobile Casts

Dual Energy X-ray Absorptiometry

Third Generation

Biometric Technology (76)

Synchronous Optical Networking

Jiro - Java-based technology

Elliptical curve cryptography (ECC)

Multiple Domain Orientation

PLAN 9 Operating system

By the mid 1980 s, the trend in computing was away from large centralized time-shared computers towards networks of smaller, personal machines, typically UNIX `workstations . People had grown weary of overloaded, bureaucratic timesharing machines and were eager to move to small, self-maintained systems, even if that meant a net loss in computing power. As microcomputers became faster, even that loss was recovered, and this style of computing remains popular today.Plan 9 began in the late 1980 s as an attempt to have it both ways: to build a system that was centrally administered and cost-effective using cheap modern microcomputers as its computing elements. The idea was to build a time-sharing system out of workstations, but in a novel way. Different computers would handle different tasks: small, cheap machines in people s offices would serve as terminals providing access to large, central, shared resources such as computing servers and file servers. For the central machines, the coming wave of shared-memory multiprocessors seemed obvious candidates.Plan 9 is designed around this basic principle that all resources appear as files in a hierarchical file system, which is unique to each process. As for the design of any operating system various things such as the design of the file and directory system implementation and the various interfaces are important. Plan 9 has all these well-designed features. All these help to provide a strong base for the operating system that could be well suited in a distributed and networked environment.The different features of Plan 9 operating system are: The dump file system makes a daily snapshot of the file store available to the users. Unicode character set supported throughout the system. Advanced kernel synchronization facilities for parallel processing. Security- there is no super-user or root user and the passwords are never sent over the network

SALT (Speech Application Language Tags)

SALT stands for Speech Application Language Tags. It consists of small set of XML elements with associated attributes and DOM object properties, events and methods which apply a speech interface to web pages. SALT allows applications to be run on a wide variety of devices and also through different methods for inputting data.The main design principle of SALT include reuse the existing standards for grammar, speech output and also separation of the speech interface from business logic and data etc. SALT is designed to run inside different Web execution environments. So SALT does not have any predefined execution model but it uses an event-wiring model.It contains a set of tags for inputting the data as well as storing and manipulating that data. The main elements of a SALT document are , and . Using these elements we can specify grammar for inputting data , inspect the results of recognition and copy those results properly and provide the application needed.The architecture of SALT contains mainly 4 components .

The SAT (SIM Application Toolkit)

The SAT (SIM Application Toolkit) provides a flexible interface through which developers can build services and MMI (Man Machine Interface) in order to enhance the functionality of the mobile. This module is not designed for service developers, but network engineers who require a grounding in the concepts of the SAT and how it may impact on network architecture and performance. It explores the basic SAT interface along with the architecture required in order to deliver effective SAT based services to the handset.

Serial Attached SCSI  (77)

X-Internet

Bandwidth estimation in broadband access networks

Page 22: Seminar Topics List

Virtual worlds come to life

Native Command Queuing (NCQ)  (78)

Evolutionary Programming

Backup and Recovery planning

Main memory databases

Light Pen (79)

HAVi: Home Audio Video Interoperability

Mining the Web: Searching, Integration and Discovery

Mobile Paradigm

MAC address (80)

Java Cryptography Architecture (JCA)

Techniques for analysis, verification, validation of digital systems

Computational Photography

TETRA-Terrestrial Enhanced Trunked Radio (81)

Trends in Compiler Construction

Public Key Encryption And Digital Signature

 Data Management in Sensor Networks

Global System for Mobiles (82)

Epsilon nets and transversal of hypergraphs

 Basic Gnu Emacs

Computational neuroscience

Internet Networking

Personal Mass Media - Blogging, Syndication, Podcasting, and Vidcasting

Real Time Operating Systems

OpenTV (OPTV)

Introduction to LaTeX

Algorithms for networking

Wireless Application Protocol

The Wireless Application Protocol (WAP) is a result of the WAP Forum s effort to promote industry-wide specifications for technology useful in developing applications and services that operates over wireless communication networks. WAP specifies an application framework and network protocols for wireless devices such as mobile telephones, pagers, and personal digital assistants. (PDAs). The specifications extend and leverage mobile networking technologies (such as digital data networking standards) and Internet technologies (such as XML, URLs, scripting, and various content formats). The effort is aimed at enabling operation, manufactures, and content developers to meet the challenges in building advanced differentiated services and implementation in a fast and flexible manner.The Objectives of the WAP Forum are: To bring Internet content and advanced data services to digital cellular phones and other wireless terminals. To create a global wireless protocol specifications that will work across differing wireless network technologies To enable the creation of content and applications that scale across a very wide range of bearer networks and device types. To embrace and extend existing standards and technology wherever appropriate. The WAP Architecture specification is intended to present the system and protocol architectures essential to achieving the objective of the WAP Forum.WAP is positioned at the convergence of two rapidly evolving network technologies, wireless data and Internet. Both the wireless data market and the Internet are growing very quickly and are continuously reaching new customers. The explosive growth of the Internet has fuelled the creation of new and exciting information services Most of the technology developed for the Internet has been designed for desktop and larger computers and medium to high bandwidth, generally reliable data networks. Mass-market, hand held wireless devices present a more constrained computing environment compared to desktop computers. Because of fundamental invitation of power and form factor, mass market handheld devices tend to have: Less powerful CPUs, Less memory (ROM and RAM), Restricted power consumption, Smaller displays, and Different input devices (eg. a phone keypad). Similarly, wireless data networks present a more constrained communication environment compared to wired networks. Because of fundamental limitation of power available spectrum, and mobility, wireless data networks tend to have: Less bandwidth, More latency, Less connection stability, and Less predictable availability. Mobile networks are growing in complexity and the cost of all aspects for provisioning of more value added services is increasing. In order to meet the requirements of mobile network operators, solutions must be: Interoperable-terminals from different manufactures communicate with services in the mobile network; Scalable-mobile network operators are able to scale services to customer needs; Efficient-provides quality of service suited to the behaviour and characteristics of the mobile network; Reliable - provides a consistent and predictable platform for deploying services; and Secure-enables services to be extended over potentially unprotected mobile networks still preserving the integrity of user data; protects the devices and services from security problems such as denial of service. The WAP specifications address mobile network characteristics and operator needs by adapting existing network

Page 23: Seminar Topics List

technology to the special requirements of mass market, hand-held wireless data devices and by introducing new technology where appropriate The requirements of the WAP Forum architecture are to:Leverage existing standards where possible; Define a layered, scalable and extensible architecture; Support as many wireless networks as possible; Optimise for narrow-band bearers with potentially high latency; Optimise for efficient use of device resources (low memory / CPU usage / power consumption);Provide support for secure application and communications; Enable the creation of Man Machine Interfaces (MIMs) with maximum flexibility and vendor control; Provide access to local handset functionality, such as logical indication for incoming call; Facilitate network-operator and third party service provisioning; Support multi-vendor interoperability by defining the optional and mandatory components of the specification

UMA (Unlicensed Mobile Access)

UMA (Unlicensed Mobile Access) is an industry collaboration to extend GSM and GPRS services nto customer sites by utilizing unlicensed radio technologies such as Wi-Fi (Wireless Fidelity) and Bluetooth®. This is achieved by tunnelling GSM and GPRS protocols through a broadband IP network towards the Access Point situated in the customer site and across the unlicensed radio link to the mobile device.Thus UMA provides an additional access network to the existing GERAN (GSM EDGE Radio Access Network) and UTRAN (UMTS Terrestrial Radio Access Network).

Recognition of VoIP Speech

Nonvolatile Flash Memory

Algorithms and Computation Theories

Probabilistic I/o Automata

Future Programming Techniques and Concepts

Advanced Processors

Peer 2 Peer Web Services

Information Extraction modes & techniques

Signal Integrity Fundamentals for Digital Design

Computer vision

Software model checking

WBM(Web based mobile)

Future of the internet

Technologies and successful applications for direct and multihop ad hoc networks

Digital photography & music

Embedded web server for remote access

VQ In Converging Telephony And Ip Networks

Proactive computing

Voice Portals

Auto-pilot for IT systems

Fuzzified Computer-Automated Crane Control System

GSM Security And Encryption

Wireless Application Protocol

WDDX (Web Distributed Data eXchange) is a programming-language-neutral data interchange mechanism to pass data between different environments and different computers. It supports simple data types such as number, string, boolean, etc., and complex aggregates of these in forms such as structures and arrays. There are WDDX interfaces for a wide variety of languages. The data is encoded into XML using an XML 1.0 DTD, producing a platform-independent but relatively bulky representation. The XML-encoded data can then be sent to another computer using HTTP, FTP, or other transmission mechanism. The receiving computer must have WDDX-aware software to translate the encoded data into the receiver's native data representation. The WDDX protocol was developed in connection with the ColdFusion server environment. Python, PHP, Java, C++, .NET, lisp, Haskell and various platforms support it very well.

New Age Graphics

Real Time Speech Translation

3D Internet

New Dimension of Data Security using Neural Networks                                    and Numerical Functions

Page 24: Seminar Topics List

HomeRF- localized wireless technology optimized for                                        the home environment

NVSRAM- Non Volatile Static RAM

Fusion Memory

Earth Simulator- Fastest Supercomputer

Graphic processing Unit

Open-Rar

High Altitude Aeronautical Platforms

Aspect-oriented programming (Aop)

Intel MMX Technology

Voice Over Internet Protocol

Internet Searching

Wireless Technologies (bluetooth, 802.11x, IRDA)

Tracking and Positioning of Mobiles in Telecommunication

DNA Based computer

ATM Virtual connections

Botnet Security Threats

VPN Server

Advanced Mobile Presence Technology

Power of Grid Computing

Embedded web server for remote access

Bio-metrics

Magnetic Random Access Memory

Intrution Detection System

Multiterabit Networks

Printed Memory Technology

High Capacity Flash Chips

Self Healing Computers

Mind Reading Phones

Blade Servers

Near Filed Communication (NFC)

UMA (Unlicensed Mobile Access)

Assisted GPS

Diskless Network storage Controller

DIGITAL HUBBUB

Agile Software development

HCI (Human Computer Interaction ) in software applications

Embedded systems

Infini band

The SAT (SIM Application Toolkit)

3D Object Extraction Using GIS Database

Page Stealer Process

3D Printers

Web Services in Gridcomputing

Qubit PC

CD Based Firewall

Decision diagrams in VLSI CAD

Bandwidth Aggregator

Atomic CPU

Fluorescent Multilayer Optical Data Storage

Email-Service & Webhosting

Virtual Integration

SMART Programming

Object Relational Mapping

ASpect Oriented Programmin

Page 25: Seminar Topics List

Steganography and digital watermarking

Verifying Infinite State Systems

New Generation Of Chips

Precision Image Search

Evolotion of bluetooth

Nanocrystal Memory Devices

Ultra Wideband Networking

3D Searching Biological Computers Rover Technology Self Defending Networks Computer Intelligence Application Digital Rights Management Digital Scent Technology Distributed Interactive Virtual Environment Wireless LAN Security Chameleon Chip Intelligent RAM iSCSI Linux Kernel 2.6 Mesh Radio Linux Virtual Server Smart Client Application Development using .NET Spawning Networks Strata flash Memory Swarm Intelligence The Callpaper Concept IP spoofing Internet Access via Cable TV Network Face Recognition Technology VoiceXML Wireless USB Cisco IOS Firewall Socket Programming Ubiquitous Networking Touch Screens Tempest and Echelon Synthetic Aperture Radar System Unlicensed Mobile Access Light emitting polymers Sensors on 3D Digitization Robotic Surgery Quantum Information Technology Gaming Consoles MiniDisc system Code Division Duplexing Cluster Computing Firewalls DVD Technology Night Vision Technology Parasitic Computing RD RAM Data Security in Local Network using Distributed Firewalls Computerized Paper Evaluation using Neural Network Bluetooth Based Smart Sensor Networks Laser Communications Implementation Of Zoom FFT Image Processing Optical Networking and Dense Wavelength Division Multiplexing Optical Burst Switching

Page 26: Seminar Topics List

Cyberterrorism Ipv6 - The Next Generation Protocol Space Mouse Hyper Transport Technology Aeronautical Communication Blu Ray Disc 64-Bit Computing Bio-Molecular Computing

Studying in a "Virtual University

AppleTalk

Combinatorial Optimization 

Quantum Software And Quantum Computer Development 

Metadata application profile

XML Query Languages

AMD Processors

Digital Video Encoding Formats

3-D Assembly Of Magnetic And Semiconducting Nanoparticles

Service oriented Architectures 

Enterprise Service Bus 

Phase Change Memory Technology

Object Oriented Design using Verilog HDL

WiBro

Zero Knowledge proofs

3-D Chip Stacking Technique

Integrating Structural Design and Formal Methods in RealTime System Design

Glass Glue

The Interactive Classroom

Embedded Computing

Wireless Internet

Quadrics Interconnection Networks

Home Automation using Handspring PDA


Recommended