Вы находитесь на странице: 1из 6

Cyber Crime and Security Open Source Technology Nano computing VoIP in mobile phones Mobile Adhoc Network

Network Security CDMA & Blue Tooth Technology Software Testing & Quality Assurance WI-FI / WI-MAX Digital Media Broadcasting Real Time Operating System Cyborgs Object oriented technologies Advanced Databases Image processing and applications Mobile Networking Natural Language Processor Advanced algorithms Neural networks and applications Software advances in wireless communication (Cognitive Radio, Dynamic spectrum Access, etc.) Data Mining and Data Warehousing Image processing in computer vision Pervasive computing Distributed and parallel systems Embeded Systems Software quality assurance Business Intelligence ERP Grid Computing Artificial Neural Networks Artificial Neural Networks and their applications Acceleration of Intelligence in Machines Communication System in the new era E-MINE: A novel web mining approach Ad-Hoc and Sensor Networks Algorithms and Computation Theories Artificial Intelligence Data Warehouse Robotics Concurrent Programming and Parallel distributed O.S. Server virtualization Advanced cryptography and implementations Knowledge discovery and Data Mining Genetic Algorithm High Performance Computing Nano Technology

Distributed computing Parasitic computing Computational Intelligence and Linguistics Future Programming Techniques and Concepts Managing Data with emerging technologies Revolutions in the Operating System and Servers Visualization and Computer Graphics Network Management and Security Secure Computing Network Modeling and Simulation Advanced Processors Security Digital Signal Processing and their applications Performance Evaluation Gesture recognition Biometrics in secure e-transactions Fingerprint recognition system by neural networks Search for extra terrestrial intelligence using satellite communication Wireless communication system Sensor fusion for video surveillance Emerging trends in robotics using neural networks Embedded systems and vlsi an architectural approach to reduce leakage energy in memory Concurrent programming and parallel distributed o.s. Robotics and automation(snake robots) Dynamic spectrum access Micro chip production using extreme uv lithography Detecting infrastructure damage caused by earthquakes A cognitive radio approach for using of vitual unlicenced spectrum Server virtualization Twd radar satellite communications Improving tcp performance over mobile ad hoc networks E-wallet Knowledge discovery and data mining Plasmonics Nano-technology and application ATM networks Network security Generic algorithm Atm, wap, bluetooth Reconfigurable computing Nanocomputing Mobile Computing Satellite Networks

Distributed and Parallel Computing

multimedia-oriented web based instructional system Porting Device Drivers For The Solaris ~ Steganography - The art of hiding information VHDL (VHSIC Hardware Description Language) Global Positioning System~ Magnetic RAM Embedded computers SSL-TLS -(7) Quad core Module technology Micro Total analysis systems Plasma Displays~ Computerized Paper Evaluation Using Neural Network Mesh Based Geometric data processing DNA Computing~ Multiple Domain Orientation Digital Rights Management -(8) Multimedia Broadcasting via Satellite USB Tape Drives UMA (Unlicensed Mobile Access) Virtual Reality~ Embedded Configurable Operating system Cluster computing Digital cash -(11) PLAN 9 Operating system Brain computer interface & systems Digital Imaging~ Wearable computers Data Mining concepts & Models Captchas -(9) Computer forensics Quantum computing

LOC technology (Lab On a Chip) Advanced Design repository systems Security of Open-Source Software -(10) Wireless Markup Language B-ISDN Reference Model Agent OS(12) iSCSI-Future of Network Storage PolyBot - Modular, self-reconfigurable robots AMD Processors(13) Bluetooth Based Smart Sensor Networks multimedia-oriented web based instructional BioComputers(14)

Ubiquitous computing Microcontroller Based Power Theft Identification Computer Forensics(15) Microcontroller Based Automation Quantum teleportation Curl: A Gentle Slope Language For The Web(16) Grid Data Farm for Petascale Vertical Cavity Surface Emitting Laser Dna Computing In Security(17) Bio Telemetry Digital Visual Interface Embedded Linux(18) Management Information System Teleportation Ext3 Filesystem(19) Radio Astronomy Security threats in the World Wide Web Facial Recognition System(20) Visual Neuro Prosthetics Multiple client's communication Fluorescent Multilayer Optical Data Storage(21) Wearable computers DNA Based computer Optical Disc Data Security(32) NRAM Turbo Codes Pluggable Authentication Modules (Pam)(36) Symbian eXtensible Bindings Language (XBL) Parallel Computing In Remote Sensing Data Processing(37) Stealth Virus Clockless Chip Samba Fileserver(38) Intelligent RAM : IRAM Genetic Programming Search Images By Appearance(39) Fire walls Virtual Keyboards Secure Socket Layer (SSL)(40) Access gateways DNA Computing Symbian OS(41) Trends in Mobiles & PC's Blue Ray - Future of DVD's Uniprocessor Virtual Memory Without TLBS(42) Cross Platform Component Object Model

SUNSPOT (wireless sensor network) Virtual P.C.(43) Wearable computers Cryogenic Processor Wearable Computers(44) SIP DNA Based Computing Wi-Fi (802.11b) (45) High Performance DSP Architectures Java Cryptography Architecture (JCA) Future of Satellite Communication(46) Tablet PC Image compression 4G Wireless Technology(47) Choreography Mobile agent MPEG-7 (48) Curl: A Gentle Slope Language For The Web Genetic programming High Speed Data In Mobile Networks(49) JIRO Technology Future of business Computing Packet Interception(50) Internet Telephony Agile Software development Crusoe Processors(51) Peer to peer Networking Clustering Augmented Reality(52) Encrypted Text chat Using Bluetooth Ovonic Unified Memory Serial ATA (SATA)(53) Flexible CRT Displays Cake PHPs Night Vision Technology(54) Automated Vehicle Detection System Robocode RAID(55) Java Messaging Service (JMS) Mobile Library Management MANET:-The Art of Networking without a Network(56) Online software Distribution Smart Office Virtual Network Computing(57) Emergency Health Care System

Mail server Management Ruby on Rails RoR(58) Storage Farms Unified Communication Session Initiation Protocol (SIP)(59) Distributed database management system Content Management Authentication and Key Agreement (AKA)(60) Server side Java Clinical Data Management Holographic Versatile Disc(71) Grid Computing Java Class Loader Unbiquitos Smart Homes ZFS File system(72) Form Processing Site Search Engine Struts Integration Orthogonal Frequency Division Multiplplexing(73) Search Engine Optimisation Stereoscopic Projection Systems Virtual Reality Visualisation Surface-conduction Electron-emitter Display (SED)(74) Network Accelerators Mobile Infrastructure Management Voice Roaming Autonomic Computing(75) Mobile Casts Dual Energy X-ray Absorptiometry Third Generation Biometric Technology(76) Synchronous Optical Networking Jiro - Java-based technology Elliptical curve cryptography (ECC) Multiple Domain Orientation Enterprise resource management mobile computing parallel architect wireless network voip

Cyber Crime and Security Open Source Technology Nano computing VoIP in mobile phones Mobile Adhoc Network Network Security

Вам также может понравиться