Topic 2005-06 Infiniband On demand secure routing protocol resilient to byzantine failures Adhoc Network Routing (Unmodified Simulation Models) LDAP(load Balanced light weight directory accessed protocol) Biometrics Sensor Network : An Overview Cellular Digital Packet data n/w Cross layring in mobile adhoc network design Group Communication in mobile adhoc network design Predistibution Security Computer clothing Fuzzy Image processing Uncheatable grid computing Data Replication in data gred Distributed Data based mang. System for data grid Fault Injection for verifying testability at the VHDL level EVDO - 3rd generation wireless high speed data Light weight Efficient Application Protocol Mobile Agent Middleware for Mobile computing Desiging ATM Internet Work Wireless LAN (New Archiecture) Autonomic computing Embedded linux VANET ( Vechicular Adhoc Network) Window CE operating System

Topic

Kazaa Application service RFID( Radio Frequency Identification) Search Engine Technology Intrusion prevention System) Jini (Network Technology ) JMX( Java Mangement Extension) Automated worm fingerprinting Flash Mob Computing WLAN security IRC (internet Relay Chat) Wireless Networking Computer forensics Efficient memory mang. for message passing Concurrecy Flash Memory Economic based resource sheduling for Grid Computing Object Detection over videos Holographic Memory visual Techniques in animation A Centralised load balancer Multimedia Streaming Protocol Packet Sniffer's Celluar Digital Packet Data Network Adhoc wireless network security besed on generics secure object Mount Rainier Virtual Keyboard Ethical Hacking Intel Centrino Mobile technology Optical wireless communication Web Content Management Topic Intrusion Detection systems Network Storage Digital Signature Intel Virualization Technology Smart Anttena Human powerd computing Virtual Private Network Anoto Technology Ultrawide Band Technology Blu Ray Disc Electronic Paper Authentication Against Dishonest Users in mobile Adhoc n/w UML 2.0 Distributed Firewall Architecutre system support for bandwidth management & application Web Spoofing Intellectual Nanotechnology business case models based upon WIMAX Public Key Infrastructure & certification A Taxonomy of wireless micro sensor network GPRS system Engg. Sun Solaris A secure incentive protocol against selfishness in mobile adhoc n/w Jiro Technology A distributed Architecure for knowledge based Interactive Robots Semantic search Engine Remote method Invocation Raw Socket Sonet Synchronous optical Network. Soft computing JMS( Java message Service) 4th Generation Mobile Network Fault Tolerance in distributed system Tablet PC Health Care's e-mail Sensor Network Serial ATA (SATA ) Mini ITX Meteor Burst Communication Digital Subscriber Line Technology Speech Application Language Tag Tele Immersion Unified Authentication 2007-08 Software Define Radio Camera Mouse Holographic Data Storage I-Mode technology Service Oriented Architecture Wibree Quad Core Processor Java Cryptography Architecture MUDPY Ontology Diamond Eye Artifical Passengar Data Sharing & Quering for Peer to Peer Data Mang. System FlexiNet Realtree Data Mining Technologies and Appplications for 21st Century Rate Distortion Optimized Image Compression Using Wedgets Service Quality Measurement for IPV6 Inter-Network Analysis of Database Workloads on modern processors Protecting Network Servers Peimeter Based Communicentric Acess Control System Z-Wave Technology Wi-Max Time Wraped Network Emulation E-Infrastructure Security Temporal Key Integrity Protocol Distributed Denial of Service Attack Class Baesd Prioritized Control In linux Bitlocker : Drive Encryption X Query KIZAMU: A System for Sculpting Digital Character Noise Reduction in Digital Signal processing Pervasive Computing Injecting Traffic Attacks in Wireless Mobile Adhoc Flooding Schemes in Wireless Mobile Adhoc Network An Efficient Anonymous Comm. Protocol for Peer to Peer Application over MANET Design & Evaluation of unified Cellular & Adhoc Network Mobile Phone Based Adhoc Network Preventing Resource Exhaustion attack in Mobile Adhoc Network Distributed Trust Establishment Scheme for Adhoc Networks An Online Detection & Control System for Cellular SMS Spam Enabling Superpages in linux Kernal Secure Comm. Data Collection in Mobile Sensor Network Road Traffic Monitoring by satellite Multimedia Broadcast Multicast Service Effective Data Mining Using Neural Network Image Mining Advanced Selection And Immunisation of N/W Based Security Threats Night Vision Technology Distributed Authentication and Key Agreement Information Plane for Distributed Services Pastwatch Proof Carreing Code for Mobile Code Security On Line Handwriting Recognition Using HMM Smart Bomb Sentence Generation Using Neural Network Forensic Animation Aritifical Neural Network in Library Code Blue Vehicular Adhoc Networking Holographic Versatile disc Wireless Markup Language - Framework for PHP 5.0 JavaFX Script Java Hibernate GNU/HURD Aspect Oriented Programming Cellular Intercepation Eyegaze Communication System Secure Mobile Agent HillTOP Algorithm HALO (High Altitude Long Operation) X 3 Image Sensor Sim Application Toolkit Efficient Algorithm for Association Mining in Large Databases Voice XML CAPTCHA Push to Talk Design Quality With Design Robustuness Handgesture Recognisition Using Cyber Glove Tiger Server Government Open System Inetrconnection Profile Multiprotocol label Switching (MPLS) Optical Burst Switching GSM AND GPRS Security Castalia - WSN Wireless Sensor Network Web Ontology Language Signcryption Roma Metadata Mobile Device in and out of the classroom Solar Power Satellite Data Management in Sensor Network Cyborg Identity Management Multimedia Data Mining Face Detection & Recognition Acess Gateway Wibro I-SCSI Distributed Access Management in multimedia IDC A BIOS Alternative Wisenet Project Oxygen Phishing Managing Copyrights in Open Network VSAT Collective Intelligence Unified Messaging System Session Initiation Protocol Internet Protocol Multimedia Subsystem MIME(Multipurpose Internet Mail Extensions) Phase Change Memory Speech Synthesis Petal Distributed Virtual Disk Real Time Spatial Data Rendering Algorithm for Soft Shadows Habitat Monitoring Text to Speech Conversion Money Transfer Through Mobile 64 Bit Computing IP Multimedia Subsyatem Internet 2 Daknet BSNL Connecting India Cybereconomy Desktop Streaming : A New Approach in Technical Support Multidimensional Approach to Internet Security 2008-09 Title MINDS - Minnesota Intrusion Detection System Packet Telephony Advanced Military Radar System Teleportation ATM With an Eye DirectX10 Disk proxy JXTA a Networking Envt Cyber Crime Cardspace Aritifical Eye Cortex A 8.0 processor Bandwidth Distribution Server Lazer Communication Wearable Computer STRUT - Framework(MVC) Thermography WLTS Protocol Voice Morphing Earth Simulator Kickstart Security Honeypot Human Computer Interaction in Science Fiction Movies Shape Information Phase Congruency for CBTR Region Based Technology for Object Recognition Mobile Agent Applications Preventation of Cooperative Blackhole Attack in MANET Digital Rights Management Innovation in Notebook Technology Proof Carrying code for mobile code security Web 3.0 Microsoft Surface Virtual Reality Modelling Language Microsoft Silver Lights 802.21 ARM 9.0 Google Chrome Cooperative linux Roadrunner Supercomputer Cellular IP Rootkit Dynamic Signature Verification Using Store Based Method NFS ( Near Field Communication) DDCISS(Data over cable service interface specification) Megaco Robotic Storage Pervasive Computing Web Prefetching Under Water Wireless Modems Patterns of Mobile Interaction Robocode I-DEN( i-0270) Agent Oriented S/W Engineering HIPPI Protocol SiLC Protocol Single Sign on Land Mine Detection Fault Tolerent Arctiecture for Internet Robot using Mobile agent Apache Struts SAM ( Scientific Archieve Management ) Satellite Boradband Access Pixie Dust Intelligent Navigation System Multicast Algo for Multichannel Wireless Mesh Network Bluegene Technology Bayesian Network Richer File System Metadata using Link and attributes SPINS- Security Ptotocols for Sensor Networks Dynamic Operating System for Sensor Networks Active Disk File System : A Distributed Scalable File System Apple IPhone Intellegent Prefetching Multicore CPU HLA Agent WIDEN Wireband Integratted Dispatch Enchanced Network MIDP 2.0 Really Simple Sydication MIDIet Mitigating Congestion in Wireless Sensor Network Security in Wireless Sensor Network Making TCP/IP Viable for Wireless Sensor Networks Location & Mobility of Mobile Phones in Sensors Networks Resilient Packet Ring Technology NFC K_nfb Reader Forensic Analysis for Network Security Voice Portals Position Based Routing Skinny Client Control Protocol Extensible Binding Language Google ANDROID OS An Agent Based Sytem for Capturing & Indexing S/W design Analysis Intelligent Software Agents Tiger SHARC Processor Aeronotical Communication Content Based Image Retrivel Using Relevance Feedback RSA Algorithm for data security Integrated Terminal Weather System linux Device Driver Unified Correlated Archiecture for Intrusion Detection Design & Archiecture of Atom processor UMTS Mobile Protocol Intel EP80579 Processor for Advance Embedded System RADTACTION Freenet GPU in Parallel Processing Signaling System Number 7 Crusoe Processor Lontalk Protocol DCCP Messaging Over IP SELinux

Title MPEG-21 CAGIS Multiagent Architecture Compenent Multimedia over ATM Network Ismell Technology Z-RAM Vispro Envt. Information Warefare Infrared Data Association Protocols(IrDA) Generic Access Network Technology Year 2009-10 Title VANISH - Self Destructing Digital Data RAID Configuration Mobile Backup GDN & DHT Application of Peer to Peer Networking Acclerometer Rich Internet Application E-Mail Authentication Space Mouse Firewire Camera Road Runner -by IBM Nanorobotics Social Networking Performance Evolution in CBIR Crames Memory Compression Virtual Surgery Data Remanance Web-DB Model on Multicast and Anycast HDMI- High Defination Multimedia Interface VIP Bridge Windows Filtering Platform Future Internet Design Self Healing in Ubiquitous Sensor Network Virtual LAN Bluetooth Headset Warmhole -A Attack in MANET Quantum Cryptography Image Encryption using DCT and Stream Cipher Web Crawler Algorithm Fast Fix Protocol Use of Genetic Algorithm in Decision Tree Generation Wimax Technology (LOS & NLOS) Biometrics : An Authentication System ARM 11 Security in Grids Squirrel - Web Caching Protocol in P to P Networking Packet Sniffer Detection with Antisniff Talking Head Smart Quill FeRAM Ext4 File System Zero Configuration Networking Embedded Web Server Grid Computing Zomboie System Eka Super Computer Digital Watermark Affective Computing Decompiler Robotics in Space Exploration Echo Cancellation CCD Tech in Camera M-Voting TETRA Inferno (OS) Radio Resouce Management Web OS in Wide Area Network Applications Micro-Dot TYPO-3 Silverstripe 2.3.3 Wordpress Cyber Forsenic Billy Goat Xeon Quad Core Processor Computer Numerical Control Hyper Threading Technology E-Security Polymorphic Viruses

Tempest & Echelon Java Ring Botnet Smart Dust Packet Sniffer Free Space Optics Technology Cryptovirology Traffic Filtering Intrusion Detection System in Mobile Adhoc Network Minimum Exposed Path to the attack in MANET Policy Based Malicious Peer Detection in Ad-hoc Network MOTE- View Map Reduce: Simplified data Processing on Large Clusters Digital Time Stamping Data Centre : Next Genration Higher Storage Blowfish Tech Lung Cell Detection Using Neural Network Resisting Malicious Packet Dropping in MANET IEEE 802.11n ASIMO LCOS TECHNOLOGY NAND Flash Memory Underwater Sensor Network Touchscreen VOIP for Mobile Phones Model View Controller Sugar Sync D Programs E-Commerce Security Beowulf Cluster Web Crawler Mantis IIS 7.0 Adding Intelligence to Internet Web Scripting WAMP Wireless Electricity Digital Cinema Congnitive Network & Services Brain Fingerprinting Interplanetary Netwotk Electronic Mail System Cable Modem Free Space Optics Technology Veritas Cluster Server Solid State Drive Dual Mpde Phone Gmail Drive Virtual Iron Medical Informatics Medical Image Mining Nanotechnology proposal of Artifical RBC Relevance Feedback In Image Mining Gesture Recognition System Peer to Peer File Sharing Routing Policy Specification Language NonVolatile Static RAM Contiki FuseBox Dynamic Virtual Private Network Agile Network Web Caching Wi-Fi Wireless Network Flourocent Multilayer Disc Xen Vertualization Brain Machine Interface Trusted Route with TORA Protocol Geographical Ad-hoc Routing Protocol Geocasting protocol for Mobile Ad-hoc Network Firewire 4G Wireless System Live Mesh SPIN Protocol for Sensor Network Vehicular Sensor Network SRDA: Secure Reference based Data Aggregation Protocol for WSN Year 2010-11 Seminar Title COCOA Service Oriented Architecture Enterprise Application Integeration SARA Strategies for MANET Ethical Hacking Session Hacking Cross Site Scripting Black Hole in MANET Digital Scent Technolgy Bubble Sensing Internet Server Application program Interface Voice Raft Go-Google Biometric Identification using Iris Recognition Mining Multiple Level Frequent Item_sets in large Databases Hand Geometry for Human Identification Flood Storm Attack On MANET DWDM (Dense Wavelength Division Multiplexing) GAIT Recognition Digital Jewellery 2 Stage Image Denoising Telepresence Handwritten Digit Recognition Wireless Personal Area Networking Detecting Critical Node in MANET Parasitic Computing Sweat Gaming A Real & Motion Centric Approach for Human Machine Artifical Brain Border Gateway Security WINS IPTV Biometric in Banking Industries Application of Image processing to Detect Infrasture Damage Due to Earthquake Application of Image processing in Toll Collection and Queue Detection Cellonics UWB Signal Generation and Recovery Finding Nuggests in Mountains of Textual Data Curl: A gentle Slope Language for Web Optical Comouflage Fibre Channel Cyber Forensic Time Lab Malware Plastic Memory Nano Computing Body Area Network Robitics and Vision System Gi-Fi Wireless Technology Load Balancing in Parallel Computing Development of Highly Secured Information Storage Media Using SD Card The Agile Method - Scrum Processor Local Multipoint Distributed Service Data Clustering Techniques Sixth Sense Web Based Heart Decision Support System using Data Mining Classification Modeling Tech. SSL 3.0 Protocol High Speed Bulk Data Transfer using SSH Protocol Content Delivery Network Data Security in Local Network using Distributed Firewall Proxy Caching for Peer to Peer live Streaming Current Web Page Structure Wavelet Transform Based Reversible Watermarking Energy aware architectutre for Multi-rate adhoc-network Secure Multicast in IPTV Services Traffic Engineering with BGP Distributed System Causal Broadcast MPLS multiple Protocol label Switching Inernet Routing Instability Core Network Design (Internet Routing Arch.) M-Commerce Window Mobile Module View Controller Kerberos Buffer Overflow Attack: A Potential problem and its Implementation K-Means Clustering algo. And its application in data Mining and computer Vision ECLATE Algorithm Frequent Pattern Algorithm Mining Patient data based on Rough set Theory to determine thrombosis disease Energy Efficiency using TDMA Scheduling in Sensor Network A Fault Ttolerent Scheme for an Autonous local Wireless Sensor Network The Price of Security in WSNS Clique Based node Scheduling Routing Scheduling and Channel Assignment in Wireless mesh N/W Data Aggregation in Wireless Sensor Network Optimal and Heuristics Approaches An Energy Efficient Multilayer MAC(ML-MAC ) Protocol for Wireless Sensor N/W Distributed Energy Clustering protocol for Wireless Sensor Network Image Processing for Video Content Extraction Augmented Reality HP Proliant G7 Server In Search of New Search Energy Efficient Co-operative Data Aggregation for WSN Data Agregation in Cluster based Wireless Sensor Network Multichannel MAC Protocol for wireless Sensor Network Dot Tel Domain Real Time Image processing Applied to Traffic Queue Detection Algorithm Signcryption Mobile IP Multitouch Gaming Console System Application and Product in Data Processing Web Mining Research Technique Cuda Technology OLAP Ibutton Open Source Software Model BADA OS Design of Cluster logical Volume Manager DIVE Enchance Data Rate for GSM Evolution HTC Sence User Interface Intel Core i7 Processor IBM Websphere Smash Wireless Network Security Using MIMO Guiding a Robot with Mobile Phone Chord Ring Networks Transferjet Blue Gene Texture Synthesis Safebook: A Privacy Preserving Online Social Network Constructing Composite Web Services from Natural language Request Embedded Hypervisor Ubiquitous Networking Collective Intelligent Bricks Really Simple Syndication A Survey of Secure Routing in Ad-hoc Network Performance Comparision of Ad-hoc Routing Protocol AODV and DSR A Survey of Secure Routing Attack on Mobile Ad-hoc Network Recent Survey on Key Management Scheme Open RAN Interactive : 3D Graphics Network Bandwidth Management Blade Server Business Rules Execution Language Common Internet File System Apple Ipad MIMO Wireless Technology Digital Certificate Adhoc on demand distance vector routing protocol Security in Wireless Protocol VLAN Truncating Within Different Devices Server Virtualization On Reducing Loadstore of Latencies of Cache Access IBM DB2 The case of open Model IS-IS Routing Protocol Extensible Stylesheet Language seminar topics 2011-12 SAP Netweaver Identity Management Google Chrome OS Biological Computers Blue Brain Cloud Computing with Map Reduce & Hadoop Meso Technology Apple IOS 5G Mobile Technology Job allocation Strategies for online scheduling in hierarchical Grid Hardware design of a new genetic based disk scheduling method A databased Framework for Gesture Recognition Controlling the cloud: Requirement for cloud computing Cloud Security: Issues & Tactics Honeycomb OS for Tablet PC Andriod 4.0 Advance OS for Portable device Integration of sound signature in graphical password authentication Well known tool based authentication technique Pallidium Cryptography Free Space optics Under Water Communication Optimizing Virtual Data Centre 3-D Low Profile Evalution System Remote frame buffer protocol OFDM Interleave Division multiple access Light peak Technology ATM Virtual Connection DNA Chips High Altitude Platform for wireless communication Optimal Glucometer Interface Intelligent RAM Architectural Requirements of Cloud Computing System: An Enterprise Approach Robust Video Communication for Ubiquitous Network Access Adaptive Pore Model for Fingerprint Extraction A noval approach for fingerprint recognition based on pores Knowldege based rainforcement learning robot in maze envt Modeling Cloud Computing Architecture without Compromising Privacy New shortest path finding algorithm for Maze solving robot with simulator Speech Recognition using Recurrent Neural Network Vehicular Communication Data Mining Techniques for Detecting Terror Acivities Online An approach moving object detection,tracking object for traffic Vedio steganography A Model driven Tracibility Framework for SPL Data Leakage Detection MultiGigabit Wireless Link Development Artifical Passenger Fiber Channel Future weapon Geothermal Technology Sky X Technology 5 Pen Technology Iris recognition using HAAR wavelet Program Slicing Zone based routing protocol for mobile Ad-hoc network Currency Recognition System E-mail Gear Open Source E-Wallet

Realistic 3D sensation of image from single image Image Superresolution via Sparse Representation Satellite Communication using Advance Protocol Java based embedded technology E-Services in Web Mining OSGI Service A Web Usage Mining Application for Next Page Access Predication Web Hosting Service Handfree Driving for automobiles Interperability and dataintegeration through sematic technology Web Log Analyzer Web Usage Mining Techniques Classification of Facial Expression Interplanetary Network Image processing in Traffic Application Noisy Fingerprint Image enhancement Technology for image analysis Visual attention Guided bit allocation in video compression Facial marks : Soft Biometric for face recognition Eunomia: Towards a Framework for multitouch information display in Public Spaces Use of Histogram equalization in image Processing for image enhancement Wireless access to the Automobiles: Comp, Wi-fi, WMAX Runtime model based approach for Cloud Computing Automatic generation of portrait Fluorescent Multilayer Disc The Brain Game 3D Printing Thunderbolt Technology

Hand Drawn Face Sketch Recognition & PCA Algorithm Deep Shot Heptic Technology Air Touch: Interacting with Computer from a Distance Meego Linux Magnetic RAM Securing E-Transaction using Embedded Biometric system Network security management protocol system design HMM Based Enhance Security System for ATM Payments Computer Asisted Vechicle Parking System Effective route Maintenance and Restoration schemes in Mobile Ad-hoc network i5 processor Rover Technology enabling Scalable location aware computing Tracking and Positioning of mobile system in telecommunication network

Location based service for mobile device using TDOA Tand GPS Technology Semantic Desktop Free space laser communication V Code Technology DISQO Multicast Protocol for next generation internet A Study on Sensor Multiplicity in Optical Fibre Network Video Survillence system Pervasive Computing LAMSFS-large scale middleware sensor network for content aware technology Simulation of eye movement using eye motion Human Face detection in color image using skin estimation color & Template Bubble Sensing TCP Aware Bidirectional Bandwidth in 802.16(IEEE) network Multi site virtual cluster system for WAN Synthesis Test for Scenorios using UML Activity Diagram Novel service Protocol Iris recognition using 2D Gabor Filter 5G Nano Core Technology Human Computer Interaction using Multitouch table top surface An Evolution of Video to Video Face Verification Load Balancing Server Green Cloud Computing Search Engine for 3D Model Quantum Computing Data Security through Audio Steganography by using Genetic Algorithm RAPID Prototyping A Platform for Moving Object Database E-Cart system Brain Control Car system Hadoop Hyper Transport IEEE 802.22 Wireless Regional Area Networks ZFS File system Andriod Application Development Microsoft Kinect Napkin PC Ubiquitous computing in small home Robotics Domain keys identified mail using digital signature for domain verification Secure socket layer for digital signature Analysis of Emotion Recognition using Facial expression, Speech & multimodel Remote frame buffer Year 2012-13 Seminar Title Preserving privacy in context Aware systems Prefetching in embedded mobile system CAPTCHA design (colour, usability & security) Federating website with google wave protocol Ship detection with wireless sensor network Flume java easy , efficient data parallel pipelines Study rich internet applications with flex Sixth sense technology representation of gesture based design Big Data storyelling through Interactive maps Efficient spatial sampling of large geographical tables mobile querying of online semantic web data Mobility in IPV6 Redability analysis of DSRC wireless communication for vehicle safety applications MAC protocol for reliable multicast over multihop wireless adhoc network Twin clouds : An architecture for secure cloud Cloud GPS Trans-Cloud Mobile cloud computing Trust cloud Detection of clone attack in wireless sensor network Hyper Threading technology Use of histrogram equlisation in image processing for image enhancement Mirror cloud Emotion annotation of text A mobile learning using ecolig & brain computer interface Andriod Trickle rate limiting youtube video streaming Speech recognition in Andriod IBM millipede Gesture based interaction for mobile user interfaces Wibree technology with bluetooth Eyeos cloud operating system Mobile visual search Mobile banking system Privacy in RFID system Swarm intillengence Key challenges in cloud computing A distributed acess control architecture for cloud computing Scalable & secured sharing of personnal health records of cloud computing Job allocation strategies with user run time estimates for online scheduling in Hierarchical Money pad The future wallet GPU computing for high-end systems Computer forencies Security issues in Vehicular Adhoc network Communication system in Vehicular Adhoc network Application & technical issues in Vehicular adhoc network Routing protocols in Vehicular Adhoc network Wireless Sensor network for monitoring pollution Use of rotable & directional sensor in survelliance application Skinput:Appropriating the skin as an interactive canvas Entity disambiguation with freehouse Federated identity management NS2 & networking using desktop virtualization an application of virtual box Cloud computing Desktop virtualization & thin client computing Paravirtualization for scientific computing performance analysis & prediction Operating system virtualization Authentication scheme for session password using colors image Plagiarism detection system HTML-5 Andriod application security An audio classification & speech recognization sys. For video content analysis Data extraction for deep web using wordnet Securing routing table update in AODV routing protocol MANETs reactive routing protocol Reducing elay & power consumption of web brow smartphones in 3G network An analysis of social network connect services Person identification by ear biometric Voice biometric Data & knowledge management in designing healthcare info. System Digital image authentication from JPEG headers Video segmentation Web based sensor monitoring system on a linux based single board computer High performance computing on demand sharing and mutualization of clusters A DSl based approach to software development and deployment on cloud Fiber optic sensor n/w for railway system Integration of ocean observing system within submerine telecom n/w Patient monitoring using wireless sensor network Unobservable secure on demand routing protocol for manet undersatanding node localizability of wireless adhoc sensor network Secutity using colours & armstrong number. Reliable & energy efficient multipath communication under water senseor N/W PAR for MANET using on-demand multipath routing protocol Dynamic connectivity in wireless underground sensor network Self-reconfigurable wireless mesh network Protecting information system from DDos attack using multicore methodology data duplication techniques Montage portraits as human faces Google fiber Cloud testing Mining web graphs for recommendations Instinctive computing Airbone network Smartshader technology Brief introduction of Biometrics & Fingerprint payment technology REAR: Reliable Energy Aware Routing Protocol The skeleton of internet Nimbus cloud Libvirt as a service Multiway tele-immersion at supercomputing 97 Robust image alignment for tampering detection Organizing user search histories Energy efficient scheduling with real-time embedded system. OAUTH web authorization protocol Nokia marph technology Digital jewelery Detecting phishing attacks in purchasing process through proactive approach GSM based LAN monitoring & controlling Cellphone as a traffic guidance system FEMTOCELLS Optimal jamming attacks strategies in wireless sensor network A data hiding techniques based on length of english text using DES attacks Smart note taker Brain finger printing Braingate Bittarrent Catching packet droppers & modifiers in wireless sensor network An efficient algorithm for web access pattern mining Towards Secure Route Discovery Protocol in MANET Cloud computing security from single to multi-clouds Boot strapping personal gesture recog. With hand writing. Clustering web session using sequence alignment method Privacy of encrypted speech communication Demand security in cloud Location based system in Andriod mobile Human identification using palm-vein image Robust video communication for Ubiquitious network acess. Open source gateway initative QOS based pure adaptive routing MANET Authentication of nodes among different symmetric key groups in MANET using 4G technology Trust based secure routing in AODV routing protocol Lifetime maximization for wireless adhoc network using PAR 2013-14 Seminar Title Security threats & detection techniques in cognitive radio network GPS based Bluetooth bradcasting Cloudberry Quantum key distribution Sentiment analysis Zigbee: A promising wireless technology Prevention of DDOS attacks using New cracking algorithm Human sensor networks for improved modeling of natural disastres Touchscreen mobile device with tactile feedback for braille VM provisioning to reduce SLA violation in cloud federation enviornment Home automation using GSM Smartcard with iris recognition for high security access enviornment COAP An apllication protocol for billons of tiny internet nodes 3D password minimal utilization space & vast security coupled with biometrics for secure authen Cellular networks Microcontroller based wireless Heart rate telemonitor Measurement of heart rate using smartphone application Software architecture optimization method: A systematic literature review Privacy & Integrity preserveing range queries in sensor network Personalized QOS-Aware web service recommendation and visulization Email analysis technique for antiphishing A layout similarity based approach for phishing pages Client based antiphishing techniques information flow Black list techniques for antiphishing oPASS: A user authentication protocol WallDroid: Cloud assited virtulized application specific firewalls for the Andriod OS Google Glasses Multimedia conferencing on andriod technology Secured mobile messaging English alphabet recognition using chain code & LCS Resource allocation in cognitive radio relay networks Path selection under budget constraints in multi-hop cognitive radio networks. Locating of Wi-Fi Access points using smartphones Trickle rate limiting youtube video streaming Implementaion of PACMAN game using ROBOT Cloud based intra college information communication sytem using mobile clients An efficient gesture recognition toolkit Security of autonomous systems employing embedded computing & sensors Content based image retival from sketeches ROF technologies and integration architecture Cognitive communication in TV white spaces Embedded system for irrigation Algorithm for minimizing network cost in WDM network Vulnerability assessment in Cloud computing Mobile voting Genetic algorithm approach to automate timetable GPS based shortest path for Ambulances using VANETs Countering terrorism through dark web analysis Intelligent FM signal jamming system Java Card technology DNA computing Deign of wireless sensor network for mobile target detection Statistical entity extraction from web Vehicle detection in aerial surveillance using dynamic bayesian network A Keyless approach to image encryption Green Wireless communiction s via cognitive dimension. Security and privacy in cloud computing GSM based automatic meter reading system Simple load rebalancing for distributed hash table in clouds Access point based FEC mechanism for video transmission in wireless LANs Face recognition using a course-to-fine level set scheme Fast & enhanced algorithm for exemplar based image inpainting Emotion based music player on automatic facial emotion recognition Component testing using finite automata 3D freehand gestural navigation for interactive public displays Agent-Based cloud computing Robust Part-based hand gesture recognition using kinect sensor Data integrity proofs in cloud storage. Meridian : An SDN platform for cloud networks services Swarm Intelligence Blind Authentication HSPDA network Phishing attacks protection (PAP) approaches for fairness in web usage Cloud Robotics "Targeted Cyberattacks" Persuaive Cued click points:Design implementation & evaluation of knowledge based authentication Li-Fi technology in wireless communication Multi-dimensiona password generation techniques for accessing cloud services Bluetooth Mall Low complexity Pre-processing system for restoring low quality QR code images Anti-Phishing techniques 3D CAPTCHA Cancelable templetes for sequence based biometrics with application to on-line signature recognition New channel selection rule for JPEG steagnography Online Java compiler using cloud computing Internet well being: privacy and security concerns Packet delivery in Hybrid wireless mobile network Cerdit card fraud detection Multi touch table with rfid technology for hotels Automated web data extraction using templete matching Reducing handoff delay in WLAN using selective proactive context catching Design of multi-objective Ant colony optimization Haptics technology Invisibility system using processing and optical camouflage technology Google app engine Extended multitouch : Recovery touch posture handedness & user identity using depth camera Buffer sizing for 802.11 based network Home Gesture recognition using WiSee technology A large -scale empirical study of conflicker Data centers using Dual-port servers Automatic discovery of personal name Aliases from the web "Sink Trail": A proactive data processing protocol for wireless sensor network Custodian based information sharing SAVI: The IETF standard in address validation The Three-Tier security scheme in wireless sensor network with mobile sink Video telephony for end consumers: measurement study of Google+,ICHAT and SKYPE Multitouch surface computing Wireless charging Interplanetary internet Sentiment analysis Augmented reality for smartphones All the news that's fit to read: A study of social annotations for news reading Evaluating information visulization interfaces using FNIRS brain sensing. Dynamic resource allocation using virtual machines for cloud computing enviornment Load rebalancing for distributed file system in clouds Big data processing with Hadoop-Map reduce in cloud system. Video transmission through optical wireless communication Mobile clouds: The new content distribution platform Wireless communication with LED Advanced communication through Flesh Red Tacton human area networking technology Blue Eyes- Human operator monitoring system Cipher for smart card using unicode,length & position An animated pedagogical agent to support problem based learning Secure Data deletion Power quality monitoring system based on embedded sytem with network monitoring Service Response time of elastic data traffic in cognitive network bridging socially enhanced virtual communities Gentic algorithm for solving location routing problem Predictive congestion control mechanism for MANET Bluetooth security Enhanced LSB technique for Audio steanography Car license Plate Detection Based on MSER Mobile live video learning system Automatic number plate recognition system Implementaion of Data encryption standard using reversible gate logic Multimedia retrival using web mining Integration of sound signature in 3D password authentication system 2014-15 Seminar Title Continues software engineering and beyound trends & challenges. Elasticity in cloud computing. Cloud computing as Financial services. Use Open standards for interoperability issuse,sol.,challenges facing cloud computing. High performance cloud computing. Cloud computing from a risk management perspective Bandwidth aware divisible task scheduling for cloud computing. Security challenges in vehicular cloud computing. Dynamic resource allocation using virtual machines for cloud computing enviornment Project planning measures in CMMI Framework for ranking cloud computing services. Improving requirement engineering by Artefact orientation Keyboard behaviour based authentication Security Andriod powered mobile device using SELinux Closed loop measurement of N/W traffic Fast RPC system for virtual machine Vulnerability of n/w mechanism to sophisticated DDOS attack MTBAC-Mut controlual trust based acess control A physical layer secured key distribution technique for IEEE 802.11g wireless network Configuring IPV4 over IPV6 network Warning Bird Packet hiding method for preventing selected jamming attacks Personalized mobile search engine Browser fingerprinting Using network knowledge to improve workload performance in virtualized data centers Matching composite skteches to face photos & composite based approach Wearable Bio-sensor A secure & efficient vehicle to vehicle communication using VANET Automated Toll collection system using RFID To identify Web fraud Intelligent traffic light controller using ES Data hiding in medical images Passive contineous authentication system Facial verification technology for use in ATM transaction Evaluation of mobile wireless communication network. Survey of packet dropping attack in MANET Evaluation of S/W engg. Changing scnario of modern H/W arciteture,semantic web & cloud computing Andriod enabled mobile framework for ubiquitous access to cloud emergency services Automatic control system for anti drunk-driving Home automation using cloud network & mobile devices Smart card with iris recgnition for high security access enviornment Data transfer without using internet or bluetooth A systematic methodology for developing discrete event simulation models of s/w devlopment process A context aware system architecture for leak point detection in the industry TCP congestion control scheme for wireless network based on TCP reserve field Wrap-around testing methodology Shuttle: facilitating inter application interactions for OS-level virtulization. An improved travel saftey for urban computers using an iTracks system Data mining with big data Zebu preventing cell phone intrusion & theft using biometrics An approach to driverless vechicles in highways Vehicle detection in very high resolution satellite images of city areas Using linked data to annotate & search educational video resources for supporting distance learning Autonomous mobile mesh network NFC Today & Tomorrow Antivirus software shield against antivirus terminators Virtualization in cloud computing Query processing performance on encrypted databases by using REA algorithm Privacy aware traffic monitoring A system to filter unwanted message form OSN walls On fast & accurate detection of unauthorized wireless AP. Discovering concrete attacks on website authorization by formal analysis. Survey of Balloon networking applications & technologies. Data mining tools and its comparision. Cognitive radio network. A refined wegited k-nearest neighbour's algo. For text categarization Artificial neural network based intrusion detection. Automation system and home appliances control using PC & microcontroller. RTOS based home automation system. Evolution towards 5G Multi-Tier celluar wireless network. Embedded technology for vehicle cabin saftey monitoring & alerting system. On delay adjustment for dynamic load balancing in distributed virtual enviornment. Robust face recognition for uncontrolled pose & illumination changes Privacy preserving enhance collabarative tagging Data integrity proof in cloud storage Tagsense:laverging smartphones for automatic image. Automatic subtitle generation for sound in videos Gi-Fi technology. DCSIM:A data center simulation tool for evaluating virtualized resource management 4D password strengthning seurity autentication. Buffer management schemes for packet queues in MANET. Elctronic medical report security using visual secret sharing scheme. Message queue telemetry transport-MQTT. Sniffer technologies to detect lost mobile. A survey of Ethernet LAN security. Mobile phone signal jammer for GSM,CDMA with Pre-scheduled time duration using ARM7 Fingerprint recognition based electronic voting machine Affective body expression perception & recognition. Secure encounter based mobile social network. Prevention of cross site scripting with E-guard algorithm

cCursor control system using facial expression. Rain technology. Orthogonal security with cipherbase Auto detection of unsafe dynamic component loading using IP address Thread migration predicition for distributed shared caches Load balancing in WLAN by cell breathing technique Mind reading computer. Aritifical Intelligence in safe human robot interaction. Automated test packet generation Learning multi boosted HMMs for Lip password based speaker verification. A novel data embedding method using adaptive pixel pair matching. Multi document extra summerization based on word sequence. Acess Point buffer management for power saving IEEE802.11 WLANs. Effective risk communication for andriod applications. Audio Fingerprint. Pill camera. Three factor security protocol. Virtual memory partitioning in mobile platform. Automatic discovery of association orders between name & alises from the web using achor text- based co-occurences. A compressive sensing based secure watermark detection & privacy preserving storage framework. Automatic discovery of personal name aliases from the web. Learning AND-OR templates for object recognition & detection Flocking based document clustering on the graphics processing unit A Taxonomy of Botnet behaviour,detection & defense A fast Re-route method Monitoring PCs using Andriod Separable reversible data hiding using RC4 Algorithm. Differentiated virtual passwords,secret little functions & codebooks for protecting users from password theft Zetabyte file system. Virtual classroom. Facebook thrift. AntHocNet. Profile based protection is personalized web search. Raspberry Pi. Design of wireless sensor network for mobile target detection. Content based image retrieval(CBIR) for identifying image base plant diseases Google driverless car Reinforcement learning based on computational cognitive nuroscience in neuromarphic VLSI chips Wireless control & monitoring of robotic arm(SWORDS) mPATH:High bandwidth data transfers with massively multipath source routing. IP Spoofing. Barcode payment system in trusted mobile devices. Improving QOS in High-speed Mobilty using Bandwidth maps. NICE:Network Intrusion Detection and countermeasure selection in virtual n/w system. Ensuring distributed accountability for data sharing in the cloud. Automated food ordering system with real time customer feedback Second life Wireless switched digital video scheme for mobile TV services over WiMAX networks. vCUDA:GPU-acclerated high-performance computing in virtual machines. Devlopment & specification of a refernce architecture for agent based system. Participatory privacy: enabling privacy in participatory sensing. Underwater wireless communication in freshwater at 2.4GHZ. Profile matching in mobile social network. Reliable data delivery in MANET using light weight verification algorithm with high node mobility. Efficiently outsourceing multiparty computation under multiple keys. Cross-Domain privacy preserving cooperative firewall optimization. Role of mobility for multi-message gossip. Meta path based search & mining in hetetrogenous information network. ATM PIN transfer using visual cryptography. Real-time scheduling for Xen-ARM virtual machines. A fast clustering based feature subset selection algorithm for high dimensional data.