02-04-2010, 03:57 PM
a) MOBILE COMPUTING
b) BIOMETRICS - FOR FOOL PROOF SECURITY
c) GLOBAL POSITIONING SYSTEM
d) GRID COMPUTING - TECHNOLOGY AND APPLICATIONS
e) E-LEARNING LEARNING THROUGH INTERNET
f) HUMAN COMPUTING AND MACHINE UNDERSTANDING OF HUMAN BEHAVIOR
g) DATA MINING AND WARE HOUSING
h) FACIAL RECOGNITION USING THEORY OF BIO METRICS
i) MOBILE COMPUTING
j) WIRELESS LAN SECURITY
k) INTERNET SECURITY AGAINST HACKING SYSTEMS
l) DATA WAREHOUSING AND MINING
m) VISUAL KEY BOARD AN APPLICATION OF DIGITAL IMAGE SCANNING
n) DIGITAL IMAGE PROCESSING
o) UBIQUITOUS COMPUTING PERVASIVE COMPUTING
p) CRYPTOGRAPHY THE ART OF SECRET WRITING
q) GRID COMPUTING
r) MASHUPS THE NEW BREED OF WEB APPLICATIONS
s) ARCHITECTURE CHALLENGES AND RESEARCH ISSUES ON MOBILE COMPUTING
t) GRID SERVICE INSTANCE MIGRATION
1. Advanced Network Security
2. Identification Of Primary Content Blocks In Web Pages
3. Data Ware Housing and Data Mining
4. Resource Co-Allocation in Computational Grids
5. Quantum Computers
6. (computers taking a Quantum leap
7. Eye Interfacing Technology Electro Oculography
8. Data Mining
9. Grid Computing
10. Performance study of Microsoft Data Mining Algorithms
11. Parallel Computing
12. Aspect Oriented Programming As Road To Resilient Architecture And Usage Of Aop In Separate Software Concerns
13. Batch Rekeying for Secure Group Communications
14. Face Verification across Age Procession
15. Honeypots for Network Security
16. Nanotechnology Implications on Space Systems
17. Data Warehousing and Data Mining
18. Network Security and Protocols
19. Expert Systems
20. Biometrics
21. The Cave:A Dynamic Interface for virtual Reality
22. Application of Neural Networks on Robotics
23. Neural Networks
24. Bluetooth: A New Era of Connectivity
25. Bluetooth: A Swayer Of The Futur
26. Data Warehousing and Data Mining -Information repository with knowledge discovery
27. A Practical Approch for Mining Data Regions from Web Pages
28. Mobile Computing
29. Architecture, Challenges and Research Issuse on Moblie Computing
30. BB84 Quantum Key Distribution Protocol in Quantum Cryptography
31. Biometrics
32. WIMAX
33. Secure Conference key Setup in Wireless networks
34. Bluetooth Technology
35. Data Ware housing and Data Mining
36. Grid Computing “ The Next Internet
37. Network Security
38. Innovative Techniques in Digital Water Marking
39. Quantum Computing
40. Web Technologies
41. Blue Tooth Technologies
42. Spyware Prevention
43. Data Mining and Data Ware Housing
44. Red Tacton
45. Network Security and Cryptography
46. CDMA
47. Data Mining and Data Warehousing
48. Computational Neuro Science
49. A Practical Approach for Mining Data Regions from Web Pages
50. Natural Language Processing
51. Advanced Network Security
52. Grid Computing
53. Credit Card Fraud Detection
54. Artificial Neural Networks
55. Wireless Security