BE COMP2005-2006 IRAM 3G & 4G (Mobile Generation) Routing Techniques in WAN a Secure & Inexpensive Remote Access Impleme
Total Page:16
File Type:pdf, Size:1020Kb
BE COMP2005-2006 IRAM 3G & 4G (Mobile Generation) Routing Techniques in WAN A Secure & Inexpensive Remote Access Implementation Wi-Max Vs Xmax Unauthorised Access A Survey on Current Devpt. of data Storage Technology Medical Fraud Detection Using data Mining EDGE Technology SQL Server 2005 Hyper Threading Technology Server gated Cryptography Optimising Data Storage System Ping T.V : A case Study in Visual N/w monitoring Emerging Trends in WWW user population Spread & Victims of an Internet Worm Online N/W Analysis from Hettogenous Datasets New Core XMS Power Gene Experssion Analysis Site Implementation of Universal Wide-Band Security issue in Adhoc Routing Protocol Broad Band Internet Access-Consumer Peer to Peer Architecture : Gnutella Network CDMA Freq Conversion Repeater Usability of security SCADA System : Security Vulnerabilities Eye Gaze Technology Honey Pot Introduction Technology Active Campus- Using Mobile technology Speeding Up face Recogination USB Pen Drives simplifies Backups Stoping Spyware at the internet Gateway Internal Webserver Hosting for Small Enterprise Bandwidth Magt. For ISP & Universities An Adaptive Internet BW Magt. Arch. Software Quality JXTA: N/W Program Envt. Reverse Engineering Private Wireless Comm. N/W UDP Braodcasting Flooding Solaris 10(OS) JXTA Flash Media server-2 Zilog & Embedded Internet Vulnerability Assessment Improving N/W Security , Compliance & Provisioning Through N/W Automation Adaptive-Brain-Interface Windows Color System WLAL Security : Problems & Solution Embedded Control System Six Sigma Hard drive replaces by Flash memory Object Converter 10g XP Embedded over Linux User Mode Linux With VT Technology S/W Project Estimation Spammers Global Positioning System ORACLE 10(Basic Archi.) Boosting performance of Orcale database Rational Rose Information LifeCycle Management The LAN Switching Web Enabled Business Intelligencs S/W Incearsing Security of IP Networks Symbian OS Stream Control Transmission Mobile Agents for Intrusion Detection System Voice Over IP B2 Management S/W Refactoring in JAVA ZyttaByte File System(ZFS) CSS & Decss RFID File Tracking System Invisible Web Optimized Solution for high Performance Computing Grid Computing Wi-Max Technology Share pont Team Services Linux Security Module Managed File Transfer SAP Solution GSM on Railways Mobile Radio Frequency Identification Internet Access Technologies Secure Mobile Computing Cell Phone Application Devpt. Through BREW Migrationfrom Windows to Linux Web Page Text Classification Based on Document Struct. Supercomputer on Windows Instead of Linux Metaframe Presentation Server Real-Time 3D Video Conmpositing Spinnaker & MainSail Storage Area Network Defence Against Blended Threat A Global Digital Device for digital Wireless Phone Tech. Imation Bio Swipe Business Intelligent Software B.E (IT) Case Study 2005-06 Sr.no Topics 1 Software Testing Best Practices 2 Fingerprint Cards Using Biometrics 3 Gnutellan 4 Casecade Distributed Firewall 5 Blue-Eye 6 Windows Longhorn 7 E-Choupal 8 Artifical System 9 SRX Technology 10 Web Sementic 11 Network Security Scanner 12 Dynamic VPN 13 AJAX- for Web Applications 14 IT ACT 2000 15 Business Intelligent & Reporting Tool(Eclipse) 16 DB2 Intelligent Miner 17 SAP-Enabling Industry Growth 18 IBM Tivoli Software 19 Anoto Technology 20 IP Smart Spoofing 21 Overwiew of an Mobile Computing Devices 22 Recent Development in Robotics 23 Zigbee 24 RSS Implementation 25 Information Insecurity 26 Real Time Linux 27 iSCSI-The Future of N/W Storage 28 Borderless Network DEPARTMENT OF COMPUTER ENGINEERING CASE STUDY TOPICS 2006-2007 DIV B TOPICS PALLADIUM : A FUTURISTIC APPROACH TOWARDS DATA SECURITY CLEMENTIRC QUERY TOOL FOR DATA MINING LAVA HIT SERVER GENETIC PATTERN RECOGNISION AUTOMATED SOFTWARE TESTING WIFI VS WIMAX GUIDED GOOGLE : A META SEARCH ENGINE & ITS IMPLEMENTATION ZIGBEE HOW WI-MAX TECH WORKS SEMANTIC SPYWARE ZONE ANTISPYWARE INCREMENTAL PARALLIZATION USING NAVIGATIONAL PROGRAMMING MESSAGING SECURITY IDENTITY MANAGEMENT AS A CYBERSECURITY CRYPTOGRAPHY DATA HIDING TECH REISERFS FILESYSTEM SOLARIS 10 OPERATING SYSTEM ARCHITECTURE INTEL CORE 2 DUO PROCESSOR SECURITY OF INTERNET LOCATION MANAGEMENT 802.11N : NEST GENERATION WIRELESS LAN TECHNOLOGY WIRELESS INTEGRATION INTO AN ENTERPRISE NETWORK SECURITY IN SOFTWARE ARCHITECTURE ECONOMY IMPACT ON 3G WIRELESS TECHNOLOGY THREADING GAMES FOR HIGH PERFORMANCE ON INTEL PROCESSOR LDAP FOR WINDOWS SIMPLE NETWORK MANAGEMENT PROTOCOL A NEW ERA IN COMMUNICATION -FREE CALLING WORLDWIDE MATA COMPUTING MOBILE DOS ATTACK SEMANTIC WEB BROWSER BLUETOOTH-EXPLOITS VXML GLOBAL CLUSTERING DB2 Vs ORACLE METRO ETHERNET HIGH SPEED WAN USABILITY OF SECURITY REVERSE PROXY SAMBA SERVER HYDRA FILESYSTEM AS-100 ARCHITECTURE AUTHENTICATION VIA WIRELESS NETWORK FIREWALL SERVICE MODULE PASSIVE OPTICAL NETWORKING LOCAL FILE SYSTEMS FOR WINDOWS MOBILE TROJANS BGP FILTERING AIRGO NETWORKS MIGRATION OF OLD PSTN NETWORK TO A CONVERGED ENTEPRISE HORIZANTAL SCALING ON A VERTICAL SYSTEM USING ZONES IN THE WIRELESS NETWORK FOR MULTIMEDIA APPLICATION NET 2 DISPLAY VESA PROTOCOL JAVA SPACES APACHE WEB SERVER ON LINUX NETWORK SECURITY DESIGN ON A HYPOTHETICAL ISP NETWORK DEPARTMENT OF COMPUTER ENGINEERING CASE STUDY TOPICS A TOPICS WIRELESS ACCESS POINT MULTIPOINT AUDIO & VEDIO CONTROLFOR PACKET BASED DIGITAL WATERMARKING LINUX ON MOBILE : MOTOMING OPEN FLEXIBLE ROUTER RSA SECURE ID CONTROLLER AREA NETWORK DISTRIBUTED FIREWALL GOOGLE FILE SYSTEM AODV ROUTING PROTOCOL IMAGE SEARCH ENGINE HIGH PERFORMANCE PARALLEL INTERFACE A SURVEY OF SOFTWARE COST ESTIMATION HD-DVD INTERNET EXPLORER 7 (IE 7) THIN CLIENT TECHNOLOGY RAS: RESEARCH IN ONLINE AUCTION PARADIGM SHIFT IN OPERATION THEATRE WIRED ENVT. TO WIRELESS DIRECT PUSH TECHNOLOGY BUSINESS INTELLIGENCE INTRUSION PREVENTION SYSTEM ORGANIC LED SECURE SHELL PROTOCOL (SSH) DIFFERENT USERS IN WINDOWS 2003 & LINUX MIDDLE MAN : A VIDEO CACHING PROXY SERVER APPLICATIONS OF WEARABLE COMPUTER IN PAPERLESS PICKING ADSL: ASYMMETRIC DIGITAL SUBCRIBER LINE MICROSOFT PALLADIUM SECURITY FOR THE WIRELESS NETWORK BLACK BERRY EVOLUTIONV OF OPEN SOURCE SOFTWARE UNIFIED MESSAGING SYSTEM ZENOSS LOTUS NOTES WIRELESS APPLICATION PROTOCOL PROTECTION AND SECURITY IN VISTA MMS ON SYMBIAN OPERATING SYSTEM ROUTING PROTOCOL INDEPENDENT SECURITY PGP AND PEM FOR EMAIL PRIVACY ARM PROCESSOR BORDER GATEWAY PROTOCOL 4 TINI OPERATING SYSTEM AND JAVA INTERNET MESSAGE ACCESS CONTROL DIGITAL SOUND ENCODER: DESIGNING EMBEDDED SYSTEM USING CYBORG -CYBERNATICS ORGANISM CELL-BROADBAND ENGINE ATM TRAFFIC MANAGEMENT RESOURCE MONITORING SYSTEM FOR NETWORK SSVPS BSD College Of Engineering, Dhule Department Of Computer Engineering B.E.(Computer ) Case Study list For the Academic Year 2007-2008 S.No Title 1 OFC of Mechniacal Deptt. 2 OFC of Mechniacal Deptt. 3 Cell Phone Jammer 4 Botnet 5 HD-DVD 6 Google Earth 7 Clustering in Data Mining 8 Google Hacking 9 Oracle Fusion 10 Open Source Software and Development Tools 11 Maxtor 12 Voice over IP- Cost Bebefits & Security Concern 13 OFC 14 N/W Security Design of Hypothetical ISP 15 WWW User Population 16 Google File System 17 Comparison of Data Mining Tools 18 Wireless Broadband Routers 19 Data Networking of Main Dept. 20 Wireless USB 21 Kickstart in Linux 22 String : A TCP Based Network Measurement Tool 23 Tools for Antospam Confoiguration 24 Election Markup Language 25 OFC 26 Frame Skipping of Vedio Compression Techniques using MPEG2 27 LDAP in Linux 28 StegFS: Stegonograpgy File System for Linux 29 Linux File System 30 Intel matrix Storage Technique 31 Data Recovery Softwares 32 Microsoft File System - Transaction based Longhorn 33 OFC 34 OFC 35 OFC 36 N/W of Boys Hsotel 37 OFC 38 OFC 39 OFC of Polytechnic Bldg. 40 SBI Core Banking 41 OFC Elex Dept 42 Captus Network 43 Personal Mobile Hub 44 FUSE : Encryption for Online Storage 45 Web Browsers 46 Logging 47 PAM- Plugable Authentication Module 48 Firewire 49 Kernal Version and Compliation 50 Proxy Tools 51 MicroSD Memory Card 52 Firewall 53 User Profiling in Recommended Systems 54 Editing of Windows Register 55 NTFS Vs FAT File System 56 OFC 57 AJAX 58 ATA, SATA, SCSI Drives 59 Comparison of Network Cables 60 System Application Product 61 IP4 Vs IP6 62 Linux Samba Server 63 Comparisons of Editors 64 J2EE Vs .NET 65 Use of SAP Netweaver at SASOl 66 Software Comparison for Time Table Management 67 Features of Programming languages 68 Password Cracking in Windows 69 Multimedia Messaging Services 70 Bluetooth Enabled KB and Mouse 71 Live Linux CDROM 72 Symbian Mobile 360 Vs Windows mobile 6th Edition 73 IBM Server Power Consumptions 74 Load Balance in Router 75 Windows XP Log File 76 Functioning of Hyper Threading 77 Configuring Embedded Web Server 78 Concurrent Version Servers 79 Vertex II Processor 80 Gmail Hacking 81 Layer 3 Authentication & Security 82 OFC of Civil Deptt. 83 System Monitoring Tools 84 Consistency Mechanism in Distributed System 85 Compliers Comparison 86 Windows Mobile 87 DSL Modem 88 Different Types of UPS System 89 Bluetooth in Linux 90 Quad-Core Xenon Inetl Processor 7300 Series 91 Wideband Frequency Specturm in Wireless 92 LINQ : Language Integrated Network Query 93 Mainframe and Client /Server Strength 94 Airgo Network 95 OFC of Mechniacal Deptt. 96 Advanced SQL Injection in SQL Server Application 97 OFC 98 IDE Technology Recommendation 99 Mail Directory Formats 100 Rack Server 101 Microsoft Windows Server 2008 102 SAP Netweaver at Manitoba 103 Configuring Firewall 104 Complete Time Tracking Software 105 Secure Digital Card 106 E-Mail Security 107 Double Data Rate