27-01-2010, 10:38 PM
a) Controlling a Wheelchair Indoors Using Thought
b) Minimum cost data delivery in Heterogeneous wireless networks
c) Face Recognition by ANN using Wavelength Transform coefficients
d) Power 6 Microarchitecture
e) Network attached storage and FreeNas
f) Computerised paper evaluation using Neural Networks
g) Cyberterrorism
h) Real Time streaming protocol
i) Intel's Terasclae Technology
j) Use of Nanorobotics in various fields.
k) Surface Computing
l) Network centric technology in a battle field
m) Seperating human and non human web queries
n) Tablet PC
o) Prrain Gate
p) DIRAC
q) Neuroimaging for the diagnosisand studey of Psychatric disorders
r) Magnetostatic RAM.
s) A survey of real time shading
t) E-passport
u) GPSR
v) Artificial Intelligence-Embedding spiking neural network
w) Linear time compression of Token streams.
x) UMA (Unlicensed Mobile Access)
y) TigerSHARC
z) Computer based voice stress analyzer
aa) Ultra 320 SCSI:new technology still SCSI
bb) Schedular design in wireless network.
cc) 4 G Wireless
dd) Future Use of Biometric Technology for security & authentication
ee) Human area Networking Technology tedtacton
ff) Gigtal Cinema
gg) IRIS scanning
hh) IP Spoofing:Remore Administrative Trojan
ii) DNA computing in security
jj) Head size equalization for improved visual perception in video conferencing.
kk) 4G wireless System
ll) WANJET in data Replication Environments
mm) Motes
nn) Bio Molecualr Computing
oo) Active rearranged capturing of image based rendering scnes.
pp) Wardriving
qq) Elastic Quotas
rr) Applications of Evloving Neural Network to Unit commitment
ss) An ANN approach for flood forecasting
tt) Voice morphing
uu) Cyborgs
vv) Ambhibot
ww) IPTV: The killer application for the next-geneation internet.
xx) Security Evaluation of Apples iPhone
yy) Graph based analysis of human transfer learning using a game testbed.
zz) Zombie Computer The Bot net
aaa) Beyond the internet : Building location based services for multi plat for device communities.
bbb) Blue Prrain Project
ccc) ZEN Research Technology
ddd) Chord: For Internet Applaications
eee) Algorithms for Intermediate Waveband switching in optical WDM Mesh Networks
fff) Protein: Based optical memory storage
ggg) Forensic animation
hhh) NAT
iii) NRAM
jjj) Fluorescent Multilayer optical data storage
kkk) Millipedes
lll) Stegnalysis for Markov Cover Data With Applications to Images
mmm) A framework for USM in heterogeneous wireless networks
nnn) Wavelength Routing in optical networks.
a) Watson Model: Foundations for Intelligent Decision Support
b) Using K-nearest neighbor method to identify poison message
c) An efficient information retrival method in WWW failure.
d) Word indexing of ancient documents using fuzzy classification
e) Smute.
f) S/w engg. And cost estimation techniques
g) AJAX-A web application.
h) Brain finger printing Technology
i) Location magt.in cellular wireless networks issues and directions.
j) Emacspeak
k) Secure Framework for Mobile Agents
l) Invisible on the Web
m) Delay Tolarant Network Architecture
n) Neural Network Based Face Recognition
o) Web Crawlar Application
p) Superchanging Planet Lab
q) Smart Quill
r) Server-less video straming system
b) Minimum cost data delivery in Heterogeneous wireless networks
c) Face Recognition by ANN using Wavelength Transform coefficients
d) Power 6 Microarchitecture
e) Network attached storage and FreeNas
f) Computerised paper evaluation using Neural Networks
g) Cyberterrorism
h) Real Time streaming protocol
i) Intel's Terasclae Technology
j) Use of Nanorobotics in various fields.
k) Surface Computing
l) Network centric technology in a battle field
m) Seperating human and non human web queries
n) Tablet PC
o) Prrain Gate
p) DIRAC
q) Neuroimaging for the diagnosisand studey of Psychatric disorders
r) Magnetostatic RAM.
s) A survey of real time shading
t) E-passport
u) GPSR
v) Artificial Intelligence-Embedding spiking neural network
w) Linear time compression of Token streams.
x) UMA (Unlicensed Mobile Access)
y) TigerSHARC
z) Computer based voice stress analyzer
aa) Ultra 320 SCSI:new technology still SCSI
bb) Schedular design in wireless network.
cc) 4 G Wireless
dd) Future Use of Biometric Technology for security & authentication
ee) Human area Networking Technology tedtacton
ff) Gigtal Cinema
gg) IRIS scanning
hh) IP Spoofing:Remore Administrative Trojan
ii) DNA computing in security
jj) Head size equalization for improved visual perception in video conferencing.
kk) 4G wireless System
ll) WANJET in data Replication Environments
mm) Motes
nn) Bio Molecualr Computing
oo) Active rearranged capturing of image based rendering scnes.
pp) Wardriving
qq) Elastic Quotas
rr) Applications of Evloving Neural Network to Unit commitment
ss) An ANN approach for flood forecasting
tt) Voice morphing
uu) Cyborgs
vv) Ambhibot
ww) IPTV: The killer application for the next-geneation internet.
xx) Security Evaluation of Apples iPhone
yy) Graph based analysis of human transfer learning using a game testbed.
zz) Zombie Computer The Bot net
aaa) Beyond the internet : Building location based services for multi plat for device communities.
bbb) Blue Prrain Project
ccc) ZEN Research Technology
ddd) Chord: For Internet Applaications
eee) Algorithms for Intermediate Waveband switching in optical WDM Mesh Networks
fff) Protein: Based optical memory storage
ggg) Forensic animation
hhh) NAT
iii) NRAM
jjj) Fluorescent Multilayer optical data storage
kkk) Millipedes
lll) Stegnalysis for Markov Cover Data With Applications to Images
mmm) A framework for USM in heterogeneous wireless networks
nnn) Wavelength Routing in optical networks.
a) Watson Model: Foundations for Intelligent Decision Support
b) Using K-nearest neighbor method to identify poison message
c) An efficient information retrival method in WWW failure.
d) Word indexing of ancient documents using fuzzy classification
e) Smute.
f) S/w engg. And cost estimation techniques
g) AJAX-A web application.
h) Brain finger printing Technology
i) Location magt.in cellular wireless networks issues and directions.
j) Emacspeak
k) Secure Framework for Mobile Agents
l) Invisible on the Web
m) Delay Tolarant Network Architecture
n) Neural Network Based Face Recognition
o) Web Crawlar Application
p) Superchanging Planet Lab
q) Smart Quill
r) Server-less video straming system