1.Virtual Reality 2.Java Ring 3.Data Recovery 4.Continuous Neighbour Discovery in Asynchronous Sensor Network. 5.Pen Technology 6.Pervasive Computing 7.WEB Operating System 8.Automatically Generating Models for Botnet Detection 9.I-Cloud by Apple 10.Data Leakage Detection 11.Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis 12.Cybernetic Organism 13.Ethical Hacking 14.Parallel Databases 15.SMS Based Notice Board - Project 16.Disease Prediction using Data Mining 17.Keyboard without Keys and Board 18.ZigBee Technolgy 19.Genetic Algorithms 20.Operating System 21.MBMS-Multimedia Broadcast Multicast Service 22.Store Management System - Project 23.Bluetooth Technology 24.Graph Based Search Engine 25.Synchronization Markup Language 26.JMX Based Grid Management Services 27.Electronic Banking 28.Intorduction To ASP.Net 29.3-D Password for More Secure Authentication - Project 30.Ambient Intelligence 31.Dynamic Data Grid Replication Strategy 32.Phishing Technology 33.Google Glass 34.Big Data-Enterprise Data 35.Peer-to-Peer Systems: The Present and the Future 36.Information Protection in Academic Campuses: A 37.Scalable Framework 38.A new Method in Image Steganogray with Improved Quality 39.Toward a Passive Low-Cost In-Home Gait Assessment 40.IPv6 Technology
41.Networked Media and 3D Internet 42.Microsoft Kinect Sensor Evaluation 43.An Efficient Approach for Mobile Asset Tracking Using Contexts 44.Cryptography-Advance Network Security 45.Recent Trends in IT 46.Andriod Technology 47.Money Pad-The Future Wallet 48.Hadoop Technologies 49.Blue Ray Disc 50.Network Traffic Analyzer - Project 51.Mobile WiMAX 52.Internet as Marketing Tool 53.WIFI Technology 54.I-Mode Technology 55.Electronic Data Interchange In Reinsurance 56.Cloud Computing PPT only 57.Ultra SPARC Processor Architecture. 58.Computer Brain PPT only. 59.Current developments in Audio Authentication. 60.A Novel Method Of Compressing Speech With Higher Bandwidth Efficiency. 60.Artificial Intelligence and Global Risk. 61.Light Trees 62.Bio Chips 63.Biometric Technology 64.Futex 65.Parasitic Computing 66.Quantum Cryptography 67.Syndication 68.Storage Area Network 69.Virtual Keyboard 70.Tripwire Intrusion System 71.XML Encryption 72.Wireless Internet Security 73.Hurd. 74.Human Computer Interface 75.HP Java 76.Dynamic Data Grid Replication Strategy 77.Future Memory System 78.Tree File System 79.Swarm Intelligence 80.High Altitude Aeronautical Platforms 81.In Memory Database 82.Really Simple Syndication 83.Terabit Switching and Routings 84.HPCL Components 85.Multi Touch Technology 86.Access Control Mechanism of emtocell 87.Optical Satellite 88.SIPE 89.Fingerprints Technology 90.Tempest Echelon 91.Invisibility Technology 92.Data Base Management System 93.Blue Ray Disk 94.Light Detection And Ranging 95.Eye Gaze Communication 96.Multi Protocol Label Switching 97.MAEMO 98.Autonomic Computing 99.Extreme Programming 100.Mobile Phones Security
Post a Comment