Information Technology Seminar Topics

CSIT seminar topics list :

    10 Gigabit Ethernet
    3D Internet
    3D password
    3D Searching
    3D Television
    3G vs WiFi
    4G Broadband
    4G Wireless Systems
    5 Pen PC Technology
    5g Wireless System
    64-Bit Computing
    A Plan For No Spam
    A Search Engine for 3D Models
    AC Performance Of Nanoelectronics
    Access gateways
    Adding Intelligence to Internet
    Adding Intelligence to Internet
    Advancements Towards 4G
    Aeronautical Communication
    Airborne Internet
    AJAX
    Alternative Models Of Computation
    Ambient Intelligence
    Ambiophonics
    Amorphous Computing and Swarm Intelligence
    An Energy Aware Framework for Dynamic Software Management in Mobile Computing Systems
    Anonymous Communication
    Artificial Neural Network (ANN)
    Artificial Neural Network (ANN)
    Artificial passenger
    Aspect-oriented programming (Aop)
    Asynchronous Chips
    Audio CAPTCHA: Existing solutions assessment and a new implementation for VoIP telephony
    Autonomic Computing
    Autonomic Computing
    Bacterio-Rhodopsin Memory
    BEOWULF Cluster
    Bio Inspired Computing
    Bio-inspired Networking
    Biological Computers
    Biometric Voting System
    Bio-metrics
    Biometrics Based Authentication
    Biometrics in SECURE e-transaction
    Bio-Molecular Computing
    BitTorrent
    Blade Servers
    Blu Ray Disc
    Blue Brain
    Blue Eyes
    Blue Gene
    Blue Tooth
    Bluetooth Based Smart Sensor Networks
    Blu-ray Disc
    Brain Chips
    Brain Fingerprinting
    Brain Gate
    Brain Machine Interface
    Brain-Computer Interface
    Broad Band Over Power Line
    Bubble sensing
    Buffer overflow attack : A potential problem and its Implications
    C#
    Cable Modems
    CAPTCHA
    CAPTCHA security for Phishing: Secure or not?
    Cell Phone Virus and Security
    Cellular Communications
    Cellular Digital Packet Data
    Cellular Neural Network
    CGI Programming
    Chameleon Chip
    Cisco IOS Firewall
    Clockless Chip
    Cloud Computing
    Cloud computing
    Cluster Computing
    Code Division Duplexing
    Combating Link Spam
    Compact peripheral component interconnect
    Compositional Adaptation
    Computational Visual Attention Systems
    Compute Unified Device Architecture CUDA
    Computer Forensics
    Computer Intelligence Application
    Computer Memory Based on the Protein Bacterio-rhodopsin
    Computer Viruses
    Computerized Paper Evaluation using Neural Network
    Conditional Access System
    Confidential Data Storage and Deletion
    CONTEXT ORIENTED PROGRAMMING
    Cooperative Linux
    CorDECT
    corDECT Wireless in Local Loop System
    Crusoe
    Crusoe Processor
    Crusoe processor
    Cyberterrorism
    Cyborgs
    Daknet
    Dashboard
    Data Security in Local Network using Distributed Firewalls
    D-Blast
    Delay Tolerant Networking
    Design and Analysis of Algoritms
    Design of 2-D Filters using a Parallel Processor Architecture
    Development of the Intenet
    Diamond chip
    Digital Audio Broadcasting
    Digital Cinema
    Digital Jewelry
    Digital Light Processing
    Digital Rights Management
    Digital Scent Technology
    Digital Subscriber Line
    Digital Video Editing
    Direct Memory Access
    Distributed Interactive Virtual Environment
    DNA Based Computing
    DNA chips
   DNSSEC: A Protocol towards securing the Internet Infrastructure
    Driving Optical Network Evolution
    DRM Software Radio
    Dual Core Processor
    DVD Technology
    Dynamic Cache Management Technique
    Dynamic Domain Name Service
    Dynamic Memory Allocation
    Dynamic Synchronous Transfer Mode
    Dynamic TCP Connection Elapsing
    Dynamic Virtual Private Network
    Earth Simulator
    E-Cash Payment System
    EDGE
    E-Intelligence
    Elastic Quotas
    Ethernet Passive Optical Network
    Ethical Hacking
    Extended Mark Up Language
    Extreme Programming
    Extreme Programming (XP)
    Eye Movement-Based Human Computer Interaction Techniques
    Face Recognition Technology
    FACE RECOGNITION USING Neural Network
    Facility Layout Design using Genetic Algorithm
    Fast Convergence Algorithms for Active Noise Controlin Vehicles
    Fiber Channel
    Fiber Distributed Data Interface
    Finger Tracking In Real Time Human Computer Interaction
    Firewalls
    FireWire
    Fluorescent Multi-layer Disc
    FRAM
    FRAM
    Free Space Laser Communications
    Free Space Optics
    Free Space Optics
    Freenet
    Futex
    Gaming Consoles
    Generic Framing Procedure
    Generic Visual Perception Processor GVPP
    Gi-Fi
    Gigabit Ethernet
    Global Wireless E-Voting
    Google App Engine
    Google Chrome OS
    Google’s Bigtable
    GPS
    Graph Separators
    Graphic processing Unit
    Graphical Password Authentication
    Green Cloud
    Grid Network
    GSM
    GSM Based Vehicle Theft Control System
    GSM Security And Encryption
    Hadoop
    HALO
    Handheld Computers
    Haptic Technology
    Haptics
    Hi-Fi
    High Altitude Aeronautical Platforms
    High Performance DSP Architectures
    High Performance DSP Architectures
    Holographic Data Storage
    Holographic Memory
    Holographic Versatile Disc
    Home Networking
    Honeypots
    HPJava
    HPJava
    HTAM
    Human Computer Interface
    Humanoid Robot
    Hurd
    Hurd
    HVAC
    Hyper Threading
    Hyper Transport Technology
    Hyper-Threading technology
    IDC
    iDEN
    IDS
    IEEE 802.11n –New Generation Wireless Standard
    Image Compression Using Wedgelets
    Image Processing
    Image Processing & Compression
    IMAX
    IMode
    Imode
    Implementation Of Zoom FFT
    Industrial Applications using Neural Networks
    InfiniBand
    Infinite Dimensional Vector Space
    Instant Messaging
    Integer Fast Fourier Transform
    Integrated Voice and Data
    Intel Centrino Mobile Technology
    Intel Centrino Mobile Technology
    Intel Core I7 Processor
    Intel MMX Technology
    Intelligent RAM
    Intelligent Software Agents
    Intelligent Speed Adaptation
    Internet Access via Cable TV Network
    Internet Protocol Television
    Internet Telephony Policy in INDIA
    Introduction to the Internet Protocols
    Intrution Detection System
    Inverse Multiplexing
    IP spoofing
    IP spoofing
    IP Telephony
    Ipv6 - The Next Generation Protocol
    Iris Scanning
    Iris Scanning
    iSCSI
    iSCSI
    Itanium Processor
    Java Card
    Java Database Connectivity
    Java Ring
    Java Ring
    Java Servlets
    Jini Technology
    Keil C
    Lamp Technology
    Laptop Computer
    Laser Communications
    Layer 3 Switching
    Light emitting polymers
    Light Emitting Polymers
    Light Tree
    Light tree
    Linux Kernel 2.6
    Linux Kernel 2.6
    Linux Virtual Server
    Local Multipoint Distribution Service
    Location Dependent Query Processing
    Location Independent Naming
    LOGARITHMIC KEYING
    Longhorn
    Low Power UART Design for Serial Data Communication
    LWIP
    LwIP
    Maemo
    Magnetic Random Access Memory
    MANET
    MANET
    M-Commerce
    Mesh Radio
    Middleware
    Migration From GSM Network To GPRS
    Millipede
    Mind-Reading Computer
    MiniDisc system
    Mobile Ad-Hoc Networks Extensions to Zone Routing Protocol
    Mobile IP
    Mobile IP
    Mobile Jammer
    Mobile Number Portability
    Mobile Phone Cloning
    Mobile TV
    Mobile Virtual Reality Service
    Mobile WiMax
    Model checking for Securing E-commerce transaction
    Modems and ISDN
    Modular Computing
    Money Pad, The Future Wallet
    Motes
    MPEG Video Compression
    MPEG-4 Facial Animation
    MPEG-7
    Multi Touch
    Multicast
    Multiple Domain Orientation
    Multiprotocol Label Switching
    Multiterabit Networks
    Nano Cars Into The Robotics
    Nanorobotics
    Network Attached Storage
    Neural Interfacing
    Neural Networks And Their Applications
    Next Generation Secure Computing Base
    NGSCB
    Night Vision Technology
    Night Vision Technology
    Nokia Morph Technology
    NRAM
    NRAM
    Object Oriented Concepts
    On-line Analytical Processing (OLAP)
    OpenRAN
    OpenSocial
    Opera (web browser)
    Optical Burst Switching
    Optical Computer
    Optical Fibre Cable
    Optical Free Space Communication
    Optical Mouse
    Optical Networking and Dense Wavelength Division Multiplexing
    Optical packet switch architectures
    Optical Packet Switching Network
    Optical Satellite Communication
    Optical Switching
    Orthogonal Frequency Division Multiplplexing
    Ovonic Unified Memory
    Packet Sniffers
    Palladium
    Palm Vein Technology
    Parallel Computing In India
    Parallel Virtual Machine
    Param 10000
    Parasitic Computing
    Performance Testing
    Pervasive Computing
    PHANToM
    Phishing
    Pill Camera
    PILL CAMERA
    Pivot Vector Space Approach in Audio-Video Mixing
    Pixie Dust
    Plagiarism Detection Techniques
    Plan 9 Operating System
    Planar Separators
    PON Topologies
    Project Oxygen
    Project Oxygen
    Prototype System Design for Telemedicine
    Public Key Infrastructure
    QoS in Cellular Networks Based on MPT
    Quadrics Interconnection Network
    Quantum Computers
    Quantum Cryptography
    Quantum Information Technology
    Radio Frequency Light Sources
    Radio Network Controller
    RAID
    Rain Technology
    Rapid Prototyping
    RD RAM
    Real Time Application Interface
    Real- Time Systems and Real- Time Operating Systems
    Real Time Systems with Linux/RTAI
    Real-Time Obstacle Avoidance
    Reconfigurable computing
    Reconstruction of Recorded Sound
    Refactoring
    Remote Administration Trojan's
    Resilient Packet Ring Technology
    RESTful Web Services
    RFID
    Robotic Surgery
    Robotic Surgery
    Rover Technology
    Rover technology
    RPR
    SAM
    Satellite Radio
    SATRACK
    Seam Carving for Media Retargeting
    Secure ATM by Image Processing
    Security Features of ATM
    Self Defending Networks
    Self Healing Robots
    Self Organizing Maps
    Self Organizing Maps
    Self-Managing Computing
    Semantic Digital Library
    Semantic Web
    Sense-Response Applications
    Sensitive Skin
    Sensors on 3D Digitization
    Service Oriented Architecture (SOA)
    Short Message Service (SMS)
    Significance of real-time transport Protocol in VOIP
    Silverlight
    Simple SAN & Storage Resource Management in Microsoft® Windows Server™ 2003 R2
    Sixth Sense Technology
    Skinput Technology
    Sky X Technology
    Slammer Worm
    Small Computer System Interface
    Smart card
    SMART CARD
    Smart Cards
    Smart Client Application Development using .NET
    Smart Dust
    Smart Fabrics
    Smart Memories
    Smart Note Taker
    Smart Note Taker
    Smart Pixel Arrays
    Smart Quill
    SMARTSHADER
    Sniffer for detecting lost mobiles
    Socket Programming
    Soft Computing
    Software Reuse
    Software-Defined Radio
    Space Mouse
    Spam Assassin
    Spawning Networks
    SPCS
    SPECT
    Speech Application Language Tags
    Speed Detection of moving vehicle using speed cameras
    Speed protocol processors
    Steganography
    Stereoscopic Imaging
    Storage Area Network
    Storage Area Networks
    Strata flash Memory
    Structured Cabling
    Surface Computer
    Surround Systems
    Survivable Networks Systems
    Survivable Networks Systems
    Swarm Intelligence
    Swarm intelligence & traffic Safety
    Symbian OS
    Synchronous Optical Networking
    SyncML
    Synthetic Aperture Radar System
    System in Package
    Tamper Resistance
    TCP/ IP
    TCPA / Palladium
    Tele-immersion
    Teleportation
    Telepresence
    Tempest and Echelon
    Terrestrial Trunked Radio
    Text Mining
    The Artificial Brain
    The Callpaper Concept
    The Deep Web
    The Tiger SHARC processor
    Thermography
    Third Generation
    Timing Attacks on Implementations
    Tool Command Language
    Touch Screens
    Tracking and Positioning of Mobiles in Telecommunication
    Transient Stability Assessment using Neural Networks
    Trends in Optical Switching Techniques
    Tripwire
    Tripwire
    Trustworthy Computing
    Tsunami Warning System
    Turbo Codes
    Ubiquitous Networking
    Ubiquitous Networking
    Ultra-Wideband
    Unicode And Multilingual Computing
    Unified Modeling Language (UML)
    Unlicensed Mobile Access
    Utility Fog
    Utilization of Photosynth Point Clouds for 3D Object Reconstruction
    VHDL
    Virtual Campus
    Virtual Instrumentation
    Virtual keyboard
    Virtual Keyboard
    Virtual LAN Technology
    Virtual Private Network
    Virtual Retinal Display
    Visible Light Communication
    Visions of 4G
    VoCable
    Voice Browser
    Voice morphing
    Voice Over Internet Protocol
    Voice Portals
    Voice Quality
    VoiceXML
    Wardriving
    Wearable Bio-Sensors
    Wearable Computers
    Wibree
    WiMAX
    Windows DNA
    Wine
    Wireless Application Protocol
    Wireless Fidelity
    Wireless Internet
    Wireless LAN Security
    Wireless Networked Digital Devices
    Wireless USB
    Wisenet
    Wolfram Alpha
    Word Sense Disambiguation
    Worldwide Inter operatibility for Microwave Access
    X- Internet
    XML Encryption
    Y2K38
    Yii Framework
    Zigbee
    Zone Based Ant Colony Routing In MANET

No comments:

Post a Comment