You are on page 1of 5

Seminar Titles

Even 2015 6th Semester


Sr. No Seminar Title

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46

Delay Tolerant Networks


Peer-to-Peer File Transfer
Object detection from Video (implementation based)
NS3 : Networking Simulator
WSN Surveillance
Applications of Near Field Communication (NFC)
Location aware routing protocols for wireless networks
Sensor node programming on Aurdino Board
Comparitive study of routing protocols for WMSN
Comparitive study of video codecs for Video Sensor Network
Performance comparison of MPEG4 vs MJPEG codecs
Study of multi-objective optimization techniques
Castalia Simulator
Comparative study of clustered routing protocol for WSNs
Implementetaion of data aggregation techniqe on MICAz motes
Implementation of mult-hop routing on MICAz motes
Probability Distributions and their Practical Applications
Linear Programming and its Applications
Integer and Mixed Integer Programming and Applications
Convex Optimization
Loss Functions and Regularization
VANET architecture WAVE and 802.11p
Internet of Things and M2M
Data dissemination techniques and performance analysis for VANET
Survey of traffic simulators and feature wise comparison

Cellular network for road traffic estimation


Focused Web Crawling
BitCoin Technology
Swarm Intelligence
Carnivore Software
Li-fi Technology
Power monitor and control
Efficient mobile application using Qualcomm SDK
Optimizing Query processing
Parallelization transformation using Intel Parallel Studio
Lock free Data structures
Opinion mining
Survey of all tools for OLAP operations
DNA computing in information security
Grail Framework
Titanium mobile application development framework
Image impainting techniques
A survey on image segmentation techniques
Behind the scenes of Interective 3D Holography
Survey on promising hardware for applications of hardware software codesign
Discovering the Ocean from Space (through satellite images)

47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95

Survey on object detection techniques where machine learning and image processing
intersect
Research Trends in interactive 3D holography
Video transcoding and hardware software codesign
Wireless Video Survillance
Research Trends in NFC based applications
Human detection in video survillance system
Computational Intelligence in Wireless Sensor Networks

Comparative Analysis of Clustering Protocols in WSN


Plagiarism Detection Techniques
GSM Based Vehicle Theft Control

3D Doctor
Multimedia Transmission in Wireless Sensor Network
Study of Multicasting Routing Protocol

Comparative analysis of Bluetooth,Zigbee and WiFi Direct


Study and implementation of Data aggregation protocols in WSN
Implementation of LEACH protocol in network simulator
Image classification using SVM
High level synthesis for FPGA
Locality aware data replication in cache
Collecting memory traces of multi-threaded programs
Big data and Hadoop
Comparative Study of QoS Aware Routing protocols for Wireless Sensor Network
Wireless Multimedia Sensor Network(WMSN)
Castalia: Simulator for Wireless Sensor Network(WSN)
HTML5 with CSS3

Web Operating System(WebOS)


Big Data
Google Class
Data Mining Tools : Study and comparisions
Applications of NFC
Game Development Tools : Study and Implemetations
Survey of intrusion detection techniques for MANETs
Survey of proactive security mechanisms for MANETs
Neural Networks for MANETs
Simulation of fuzzy model for MANETs
Graph Theory Algorithms for MANETs
Microcontroller based Remote Tracking System
Environment-Aware System for Alzheimers Patients
Smart application for teacher student interaction using NFC
Remote notice board implementation using gsm communication and arduino

magic stick for blind person using arduino


Map reduce programming
Hadoop
Classification algorithm and comparision in data mining
Proposed solution for Clean india Mission- Ewaste management
Mobile app for various dieseas patients
Bibliometrics
Pattern Recognition
Empirical Mode Decomposition

96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145

Automatic Speaker Recognition


Data Mining models for Speech Processing
Pervasive computing
Smartphone hardware architecture
Android OS internals
Ad hoc networking on Android
Aneka - Cloud Development and Rapid application development platform
Graph Based Search Engines
Bandwidth Recycling
Smart SOS - RFID and Smart Consumer & Industrial Devices

Google glass
Rain Technology
Internet of things
Virtual Currency
Swift Framework for iPhone
Conceps of Cordova

Near Field Communication


estimation theory in WN
Artificial noise generation techniques in WN communication
fadding mitigation in WN communication
MIMO security
MIMO-OFDM communication and issues
Super-resolution Imaging
Digital Evidence Analysis: Steganography Detection
Image Fusion For Medical Application
Image Forgery Dection using Machine Learning Approach
Image Segmentation using Minimum Graph Cuts
Functional programming

Cloud Based Content Delivery Services


Spark : A compute engine for Hadoop data
Chukwa : A scalable log processing
Parallel processing using Deep learning
Content Based Video Retreival
Data Transmission for Dynamic Databases
Comparative analysis of MapReduce, Hive and HBase
Leap Motion Technology
Google Loon Technology
Quantum Computing
Approximation algorithms
Privacy preservation in social networks
A detailed study of "GARUDA" grid
A survey of code optimization techniques in compiler design
Microfluidic optical fibres
Nano wires
Ambient Intelligence
Parallel virtual machine
Software defined Networking
Opinion mining
Opinion spam detection
Recommender System

146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195

Opinion Classification
Personalization
Wireless Body Area Network and its applications
Virtual Reality & Augmented Reality: A Future Insight
Blue Brain Technology

Brain Fingerprinting
Haptics Technology
Pattern mining in data streams
Liquid File System
Data visualization
Green cloud
Digital Preservation
TinyDB in WSN
Trust management in WSN
Simulation of routing protocols in WSN
Sensor localization in WSN
Data aggregation in Wireless Sensor Networks
Study of NS-3 (Network Simulator 3)
Understanding working of AODV Routing protocol in NS 2 (Network Simulator 2)
Study of different simulators of Vehicular Ad-Hoc Network (VANET)

Security attacks in Ad-Hoc Network


DOS Attack
Multimedia image database management systems
Various Camera specifications and its effect in imaging
Machine learning and its applications
Mobile App for Image processing
Software Defined Networking for cloud
Load balancing algorithm for cloud computing
Open flow standard for Software defined networking
Live VM migration
mathematical modelling for cloud computing
Working and implimentation of arduino and rasberry pi
comparative study of different text mining tools
text summarization with implimentation
web resources in RDF
web ontology language(owl)
Wi-Fi Protection
Hologram technology
Hacking cell phones
3D password
Data mining
Example based image superresolution -techniques
Shape from shading- 2D to 3D
Study of various NP Hard problems
Find depth from disparity - stereo images
Implimentation of various image interpolation techniques
green cloud
Association Rule mining
Liquid File System
Internet of things

196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229

An Elliptic Curve Cryptography based Authentication


Zero Knowledge Protocols ()
sms spam detection
raspberry pi in home automation
Image Super resolution techniques
Digital signal transformation techniques and applications
High level synthesis tools
Pattern recognition using fuzzy logic
Finite state automata in dynamically driven recurrent network
Ethical hacking
x-internet
5 pen pc technology
Analyzing Energy usage by various clustering techniques in WSN
Multi-Objective Optimization with Evolutionary Computing
Techniques for Continuous and Discrete Optimization Problems
Intrusion Detection System
Embedded system security
User profiling for a system
Machine Learning in network system
mobile forensic
Statistical Methods in Data Mining
Incremental Clustering in Data Mining
Scalability of predictive model in Data Mining
Cluster evaluation techniques in Data Mining
P,NP and NPC concepts
Dynamic Programming and its applications
Distributed Algorithms
Expectation maximisation algorithms
SVD(singular value decomposition) and its application
Randomized algorithms and combinatorial optimisation
Fundamentals operations on Image processing with refrence to plant genetics
Study on Bio medical systems (Heart Related case study)
Future Generation Processors: Intel inventions
Applications of cloud computing

You might also like