War Driving


ABSTRACT

Wardriving is searching for Wi-Fi wireless networks by moving vehicle. It involves using a car or truck and a Wi-Fi-equipped computer, such as a laptop or a PDA, to detect the networks. It was also known as 'WiLDing' (Wireless Lan Driving).Many wardrivers use GPS devices to measure the location of the network find and log it on a website. For better range, antennas are built or bought, and vary from omni directional to highly directional..
 Software for wardriving is freely available on the Internet, notably, NetStumbler for Windows, Kismet for Linux, and KisMac for Macintosh. Wardriving was named after wardialing because it also involves searching for computer systems with software that would use a phone modem to dial numbers sequentially and see which ones were connected to a fax machine or computer, or similar device.

INTRODUCTION

Wardriving is searching for Wi-Fi wireless networks by moving vehicle. Wardriving was first developed by Pete Shipley in April 2001. It involves using a car or truck and a Wi-Fiequipped computer, such as a laptop or a PDA, to detect the networks. Many wardrivers use GPS devices to measure the location of the network find and log it on a website. For better range, antennas are built or bought, and vary from omnidirectional to highly directional. Software for wardriving is freely available on the Internet, notably, NetStumbler for Windows, Kismet for Linux, and KisMac for Macintosh.

The Origin of WarDriving

WarDriving is an activity that is misunderstood by many people.This applies to both the general public, and to the news media that has reported on WarDriving. Because the name "WarDriving'* has an ominous sound to it, many people associate WarDriving with a criminal activity WarDriving originated from wardialing, a technique popularized by a character played by Matthew Broderick in the film WarGames, and named after that film. Wardialing in this context refers to the practice of using a computer to dial many phone numbers in the hopes of finding an active modem. A WarDriver drives around an area,often after mapping a route out first, to determine all of the wireless access points in that area. Once these access points are discovered, a WarDriver uses a software program or Web site to map the results of his efforts. Based on these results, a statistical analysis is performed. This statistical analysis can be of one drive, one area, or a general overview of all wireless networks. The concept of driving around discovering wireless networks probably began the day after the first wireless access point was deployed.

Choosing A Wireless Network Interface Card

Most of the wireless networks that are currently deployed are 802.11b networks. You will find more access points if you use an 802.1 lb NIC. 802.1 lg access points, which transfer data at nearly five times the speed of 802.11b (54 MBps as opposed to 11 MBps) are gaining popularity and it is likely that an 802.1 lg card will soon supplant an 802.1 lb card as the favorite of WarDrivers. In addition to increased speed, the 802.1 lg standard supports WiFi Protected Access (WPA) encryption. Once effectively deployed,WPA will help to improve the overall security posture of wireless networks.

CONCLUSION

 The sudden popularity of wireless networks, combined with a popular misperception that no  additional steps to secure those networks are necessary, has caused a marked increase in the  number of insecure computer networks that can be accessed without authorization. This in  turn has given rise to the sport of wardriving detecting and reporting the existence of insecure  wireless networks, ostensibly without actually accessing the network. Wardriving may also  involve illegally accessing and monitoring the networks once so discovered. The sport of  discovering connections to wireless computer networks can be done while driving in a car or  while strolling on foot with a PDA .



zForce Touch Screen

INTRODUCTION

Neonode has patented and commercialized the zForce  touch technology, which was designed to overcome many of the limitations of today’s touchscreens. The premise of the Company’s approach entails the projection of an infrared grid across an electronic display. As users tap, swipe, or write on the screen, zForce® detects the location of the touch based on the interruption in infrared light projecting across the screen, which translates to coordinates on the grid. The zForce® architecture and input method is believed to be unique to Neonode. 

          A zForce Touch Screen can be activated by multiple modes of input, including bare fingers, gloves, styluses, and (multiple simultaneous touches). It is uncommon today to find both of pens, as well as recognizes multi-touch these features innately built into the same touchscreen. The resistive touch technology used on most PDAs to recognize stylus writing works as a spot on the screen is pressed inward, causing one layer of the touchscreen to make contact with a layer beneath. This contact sends a signal to the device to recognize the touch. Although relatively low cost, resistive touchscreens do not typically allow multi-touch (swiping, gesturing).

TOUCH SCREEN

A Touch screen is an electronic visual display that can detect the presence and location of a touch within the display area. The term generally refers to touching the display of the device with a finger or hand. Touchscreens can also sense other passive objects, such as a stylus. Touchscreens are common in devices such as game consoles, all-in-one computers, tablet computers, and smart phones.

MULTI TOUCH

In computing, multi-touch refers to a touch sensing surface's (trackpad or touchscreen) ability to recognize the presence of two or more points of contact with the surface. This plural-point awareness is often used to implement advanced functionality such as pinch to zoom or activating predefined programs. Multi-touch was invented in 1982 at the University of Toronto

CONCLUSION

Neonode’s optical infrared touch technology can be integrated into consumer and industrial electronics to enable touch controls. The Company seeks to compete with low-cost resistive touch options while outperforming today’s advanced capacitive touch solutions. To do so, Neonode strives to effectively combine the advantages of each technology into one streamlined solution.


Information Technology IT Engineering Seminar Topics

1. Wireless Video Service in CDMA Systems
2. JOOMLA and CMS
3. Intrusion Tolerance
4. Green Computing
5. Breaking the Memory Wall in MonetDB
6. Bluejacking
7. Zettabyte FileSystem
8. NVIDIA Tesla Personal Supercomputer
9. Airborne Internet
10. Capacitive And Resistive Touch Systems
11. BlackBerry Technology
12. Generic Access Network
13. Facebook Thrift
14. Enhancing LAN Using Cryptography and Other Modules
15. Security Features of ATM
16. Sixth Sense Technology
17. Java Database Connectivity
18. Visible Light Communication
19. Software Reuse
20. Soft Computing
21. Mobile WiMax
22. GSM 900 Mobile Jamme
23. Mobile TV
24. Wardriving
25. Text Mining
26. Computational Visual Attention Systems
27. Skinput Technology
28. Semantic Digital Library
29. Seam Carving for Media Retargeting
30. Ambient Intelligence
31. 3D Internet
32. Public Key Infrastructure
33. Word Sense Disambiguation
34. Wolfram Alpha
35. Tool Command Language
36. Neural Interfacing
37. Middleware
38. Location Dependent Query Processing
39. Intel Core I7 Processor
40. Keil C
41. Fiber Channel
42. Hadoop
43. Generic Visual Perception Processor GVPP
44. Google Chrome OS
45. Compute Unified Device Architecture CUDA
46. Plagiarism Detection Techniques
47. Combating Link Spam
48. Bio-inspired Networking
49. Anonymous Communication
50. Dynamic Domain Name Service
51. Tsunami Warning System
52. Yii Framework
53. Sniffer for detecting lost mobiles
54. Mobile Phone Cloning
55. Nano Cars Into The Robotics
56. Mind-Reading Computer
57. Intelligent Speed Adaptation
58. Global Wireless E-Voting
59. E-Cash Payment System
60. Cyborgs
61. Brain Fingerprinting
62. Biometrics in SECURE e-transaction
63. X- Internet
64. Surface Computer
65. Green Cloud
66. Digital Jewelry
67. Brain Gate
68. Palm Vein Technology
69. 5 Pen PC Technology
70. iDEN
71. Hi-Fi
72. Packet Sniffers
73. Brain Chips
74. Phishing
75. Pill Camera
76. Blue Brain
77. Biometric Voting System
78. 3D Television
79. 3D password
80. Gi-Fi
81. Graphical Password Authentication
82. 4G Broadband
83. Finger Tracking In Real Time Human Computer Interaction
84. Eye Movement-Based Human Computer Interaction Techniques
85. Ethical Hacking
86. Secure ATM by Image Processing
87. Dynamic Languages
88. In-Vehicle Networking
89. Plastic Memory
90. Protein Memory
91. Setting up a LAN using Linux
92. UMTS
93. Money Pad, The Future Wallet
94. Low Power UART Design for Serial Data Communication
95. SPECT
96. Buffer overflow attack : A potential problem and its Implications
97. Hurd
98. Intel Centrino Mobile Technology
99. MPEG Video Compression
100. Survivable Networks Systems
101. Self Organizing Maps
102. Mobile IP
103. Wireless USB
104. Zero Knowledge Protocols and Proof Systems
105. Tempest and Echelon
106. Synthetic Aperture Radar System
107. Unlicensed Mobile Access
108. Windows DNA
109. Laptop Computer
110. Intelligent Software Agents
111. IP spoofing
112. Internet Access via Cable TV Network
113. IDS
114. 10 Gigabit Ethernet
115. Tripwire
116. Ubiquitous Networking
117. Unicode And Multilingual Computing
118. XML Encryption
119. Y2K38
120. Satellite Radio
121. Light emitting polymers
122. Sensors on 3D Digitization
123. Robotic Surgery
124. Ipv6 - The Next Generation Protocol
125. Nanorobotics
126. Dual Core Processor
127. Cisco IOS Firewall
128. Iris Scanning
129. LWIP
130. Smart card
131. Quantum Information Technology
132. Asynchronous Chips
133. Cellular Through Remote Control Switch
134. HVAC
135. Terrestrial Trunked Radio
136. Swarm intelligence & traffic Safety
137. Optical Switching
138. FRAM
139. IDC
140. Driving Optical Network Evolution
141. Cellular Neural Network
142. Radio Network Controller
143. Digital Audio Broadcasting
144. Significance of real-time transport Protocol in VOIP
145. Space Mouse
146. Resilient Packet Ring Technology
147. Wireless Networked Digital Devices
148. SATRACK
149. Smart Pixel Arrays
150. Project Oxygen
151. Wearable Bio-Sensors
152. Mobile Virtual Reality Service
153. Crusoe Processor
154. Human Computer Interface
155. HPJava
156. Gaming Consoles
157. Fluorescent Multi-layer Disc
158. Futex
159. Extreme Programming (XP)
160. Earth Simulator
161. Compact peripheral component interconnect
162. corDECT Wireless in Local Loop System
163. Param 10000
164. Elastic Quotas
165. Refactoring
166. On-line Analytical Processing (OLAP)
167. Pivot Vector Space Approach in Audio-Video Mixing
168. QoS in Cellular Networks Based on MPT
169. Wireless Fidelity
170. Voice morphing
171. Radio Frequency Light Sources
172. Speed Detection of moving vehicle using speed cameras
173. Optical Packet Switching Network
174. Storage Area Networks
175. Smart Note Taker
176. MPEG-7
177. Motes
178. Modular Computing
179. MiniDisc system
180. Migration From GSM Network To GPRS
181. M-Commerce
182. C#
183. IP Telephony
184. RPR
185. Broad Band Over Power Line
186. Rapid Prototyping
187. Dashboard
188. Optical Satellite Communication
189. Optical packet switch architectures
190. Layer 3 Switching
191. Intrution Detection System
192. Multiterabit Networks
193. InfiniBand
194. Light Tree
195. Multicast
196. Inverse Multiplexing
197. Neural Networks And Their Applications
198. Parallel Computing In India
199. Quadrics Interconnection Network
200. Structured Cabling
201. Virtual LAN Technology
202. Real- Time Systems and Real- Time Operating Systems
203. Quantum Cryptography
204. Speech Application Language Tags
205. VHDL
206. Tele-immersion
207. Voice Portals
208. Cluster Computing
209. Virtual Private Network
210. Optical Computer
211. Cellular Communications
212. Graph Separators
213. Extended Mark Up Language
214. TCP/ IP
215. Third Generation
216. Palladium
217. Dynamic Synchronous Transfer Mode
218. Ambiophonics
219. GSM
220. Optical Fibre Cable
221. Integrated Voice and Data
222. Instant Messaging
223. Synchronous Optical Networking
224. Development of the Intenet
225. Design and Analysis of Algoritms
226. Infinite Dimensional Vector Space
227. Ethernet Passive Optical Network
228. Dynamic Cache Management Technique
229. Generic Framing Procedure
230. Dynamic Memory Allocation
231. Firewalls
232. Handheld Computers
233. Modems and ISDN
234. Internet Telephony Policy in INDIA
235. Optical Free Space Communication
236. Planar Separators
237. Wireless Internet
238. PON Topologies
239. Smart Cards
240. TCPA / Palladium
241. Sense-Response Applications
242. Cable Modems
243. Voice Quality
244. Wireless Application Protocoll
245. Virtual Instrumentation
246. Bio-Molecular Computing
247. Blu Ray Disc
248. 64-Bit Computing
249. Code Division Duplexing
250. Delay Tolerant Networking
251. Dynamically Reconfigurability Computing
252. EDGE
253. Holographic Data Storage
254. Integer Fast Fourier Transform
255. NRAM
256. Orthogonal Frequency Division Multiplplexing
257. Ovonic Unified Memory
258. 4G Wireless Systems
259. Daknet
260. AC Performance Of Nanoelectronics
261. High Performance DSP Architectures
262. Millipede
263. Free Space Laser Communications
264. Short Message Service (SMS)
265. Conditional Access System
266. SyncML
267. Virtual keyboard
268. High Altitude Aeronautical Platforms
269. MANET
270. Smart Fabrics
271. Dynamic Virtual Private Network
272. Blue Tooth
273. Autonomic Computing
274. Voice Over Internet Protocol
275. Artificial Neural Network (ANN)
276. DNA Based Computing
277. Digital Subscriber Line
278. Freenet
279. Access gateways
280. Free Space Optics
281. Introduction to the Internet Protocols
282. Fiber Distributed Data Interface
283. Hyper-Threading technology
284. IMode
285. Cyberterrorism
286. Adding Intelligence to Internet
287. Self-Managing Computing
288. Unified Modeling Language (UML)
289. Socket Programming
290. SAM
291. VoCable
292. Touch Screens

Latest Mechanical Engineering Seminar Topics

1. 3d Machine Vision Systems
2. Aerodynamics
3. Aerogel
4. Aeroplane Propulsion System
5. Agile Manufacturing
6. Air Brake System Of Indian Railways
7. Air Craft Hydraulic System
8. Air Muscles
9. Air powered cars
10. Anti-Lock Braking Sensors
11. Antimatter
12. Apache Helicopter
13. Application of Nitrous Oxide in Automobiles
14. Atomic Battery
15. Automatic Air Suspension
16. Automatic Transmission In Cars
17. Automatic Vehicle Locator
18. Autonomous Car
19. Biodeisel
20. Biomechatronic Hand
21. Blended Wing Body
22. Camless Engine
23. CAMM Systems
24. Ceramic Disc Brakes
25. Computer Aided Process Planning
26. Continuously variable transmission (CVT)
27. Cruise Missile Technology
28. Cryocar
29. Cryogenic grinding
30. Cryogenic Hardening
31. Cryogenic Heat Treatment
32. Cylinder deactivation
33. Design, Analysis, Fabrication And Testing Of A Composite Leaf Spring
34. Digital Twin Spark Ignition
35. Direct Injection Diesel Engine
36. Disk Brake
37. Double Claw Robotic End-Effector Design
38. Dyna-cam engine
39. Ejection Seat
40. Electro-Hydraulic Brake (EHB) System
41. Emulsified Ethanol
42. F1 Track Design and Safety
43. Four-Wheel Steering System
44. Fractal Robots
45. Friction Stir Welding
46. Fuel Energizer
47. Full Authority Digital Engine Control
48. Gasoline Direct Injection
49. Geothermal Energy
50. GPS And Applications
51. Green Engine
52. Handfree Driving
53. Head And Neck Support (HANS)
54. HEMI engines
55. Hovercraft
56. Hybrid solar Desiccant Cooling System
57. Hydro Drive
58. Hydroforming Techniques
59. Hypercar
60. IC Engine
61. Infrared Curing and Convection Curing
62. Iontophoresis
63. i-VTEC
64. Just In Time Manufacturing
65. Lean manufacturing
66. Liquid Nitrogen
67. MEMS for Space
68. Methanol Fueled Marine Diesel Engine
69. Micro Air Vehicles
70. Microbial Fuel Cells
71. Micro-Electromechanical Systems
72. Micromachining
73. Microturbines
74. Military Radars
75. Mine Detection Using Radar Bullets
76. Mobile Robotic System
77. Multi Air Engine
78. Nano Enabled Coating Makes Aircraft Invisible
79. Nano IC Engine
80. Nano Technology
81. Next Generation 2-Stroke Engine
82. Next Generation Engines
83. Nitro Shock Absorbers
84. Noise Control in IC Engine
85. Non-Destructive Testing
86. Overall Equipment Effectiveness
87. Paper Battery
88. Personal Protection
89. Pistonless Pump
90. Plastic Injection Molding
91. Pollution Less Engine
92. Predictive Maintenance using Thermal Imaging
93. Pulse Detonation Engine
94. Quality function deployment
95. Quality improvement tool "poka yoke"
96. Quasi turbine
97. Re-entry of Space Vehicle
98. Robotic Car
99. Robots In Radioactive Environments
100. Running gearing
101. Safety Air Bags in Cars
102. Scramjet Engine
103. Selective Laser Sintering
104. Sensotronic Brake Control
105. Shape Memory Alloys
106. Sidewinder Missile
107. Six Stroke Engine
108. Skid Steer Loader and Multiterrain Loader
109. SkyBus Technology
110. Smart Bombs
111. Smart Materials
112. Solar Cars
113. Solar Energy Through Solar Space Stations
114. Solar Power Satellites (SPS)
115. Solar Sails
116. Solar-powered vehicles
117. Space Elevator
118. Space Robotics
119. Space Shuttles and its Advancements
120. Stealth Fighter
121. Supercavitation
122. The Hy-Wire Car
123. Thermal Barrier Coatings
124. Thermal shock on interfacial adhesion of thermally conditioned
125. Thermo Acoustic Refrigeration
126. Tidal Energy
127. Tidal Power
128. Total Productive Maintenance
129. Transit Mixer & Concrete Pump
130. Turbofan Engine
131. Two Stroke Engine Using Reed Valves
132. Ultrasonic Metal Welding
133. Ultrasonic Techniques for hidden corrosion detection
134. Vacuum Braking System
135. Valvetronics
136. Variable Valve Timing In I.C. Engines
137. Vehicle Dynamics
138. Virtual Manufacturing Systems
139. Wave Energy Converter
140. Wear Debris Analysis
141. Welding Robots
142. Whiplash Protection System

Electronics and Communication Engineering ECE Seminar Topics

1.            3-Dimensional Printing
2.            4G Wireless Systems
3.            A 64 Point Fourier Transform Chip
4.            AC Performance Of Nanoelectronics
5.            Adaptive Blind Noise Suppression
6.            Adaptive Missile Guidance Using GPS
7.            Adaptive Optics in Ground Based Telescopes
8.            AI for Speech Recognition
9.            Aluminum Electrolytic Capacitors
10.          An Efficient Algorithm for iris pattern
11.          Analog-Digital Hybrid Modulation
12.          ANN for misuse detection
13.          Anthropomorphic Robot hand: Gifu Hand II
14.          Artifical Eye
15.          Artificial Intelligence In Power Station
16.          Artificial Intelligence Substation Control
17.          Asynchronous Transfer Mode
18.          Augmented Reality
19.          Autonomous Underwater Vehicle
20.          Bio Battery
21.          Bio-metrics
22.          Bio-Molecular Computing
23.          BIT for Intelligent system design
24.          Black-Box
25.          BlueStar
26.          Bluetooth Based Smart Sensor Networks
27.          Bluetooth Network Security
28.          Bubble Power
29.          CAN
30.          Carbon Nanotube Flow Sensors
31.          Cellular Positioning
32.          Challenges in the Migration to 4G
33.          Chip Morphing
34.          Class-D Amplifiers
35.          Clos Architecture in OPS
36.          Code Division Duplexing
37.          Compact peripheral component interconnect (CPCI)
38.          Concentrating Collectors
39.          Co-operative cache based data access in ad hoc networks
40.          CorDECT
41.          Crusoe
42.          Crusoe Processor
43.          Daknet
44.          Data Loggers
45.          Datalogger
46.          DD Using Bio-robotics
47.          Digital Audio's Final Frontier-Class D Amplifier
48.          Digital HUBUB
49.          Digital Light Processing
50.          Digital Subscriber Line
51.          Direct Current Machines
52.          Direct to Home Television (DTH)
53.          Distributed COM
54.          Distributed Integrated Circuits
55.          DSP Processor
56.          Dual Energy X-ray Absorptiometry
57.          DV Libraries and the Internet
58.          Earthing transformers For Power systems
59.          E-Commerce
60.          E-Intelligence
61.          Electro Dynamic Tether
62.          Electronic Data Interchange
63.          Electrooculography
64.          Embedded System in Automobiles
65.          Embedded Systems and Information Appliances
66.          Embedded Web Technology
67.          Embryonics Approach Towards Integrated Circuits
68.          E-Nose
69.          E-Textiles
70.          E-Waste
71.          Face Recognition Using Neural Network
72.          FDDI
73.          FinFET Technology
74.          Fluorescent Multi-layer Disc
75.          FPGA in Space
76.          Fractal Antennas
77.          Free Space Laser Communications
78.          Free Space Optics
79.          GMPLS
80.          GPRS
81.          Grating Light Valve Display Technology
82.          HAAPS
83.          HART Communication
84.          HawkEye
85.          High Performance DSP Architectures
86.          High Speed Packet Access HSPA
87.          Holographic Data Storage
88.          Honeypots
89.          Humanoids Robotics
90.          Human-Robot Interaction
91.          Hydrogen Super Highway
92.          IBOC Technology
93.          Image Coding Using Zero Tree Wavelet
94.          Immersion Lithography
95.          Indoor Geolocation
96.          Intelligent Wireless Video Camera
97.          Intervehicle Communication
98.          Introduction to the Internet Protocols
99.          Iontophoresis
100.        Josephson Junction
101.        Laser Communication Systems
102.        Laser Communications
103.        Led Wireless
104.        Low Energy Efficient Wireless Communication Network Design
105.        Lunar Reconnaissance Orbiter Miniature RF Technology Demonstration
106.        Memristor
107.        Mesh Radio
108.        Mesh Topology
109.        Metamorphic Robots
110.        Micro Electronic Pill
111.        Microwave Superconductivity
112.        Millipede
113.        MILSTD 1553B
114.        MOBILE IPv6
115.        Mobile Train Radio Communication
116.        Mobile Virtual Reality Service
117.        MOCT
118.        Multisensor Fusion and Integration
119.        Nanotechnology
120.        Narrow Band & Broad Band ISDN
121.        Navbelt and Guidicane
122.        Non Visible Imaging
123.        Nuclear Batteries-Daintiest Dynamos
124.        Optical Burst Switching
125.        Optical Ethernet
126.        Optical Networking and Dense Wavelength Division Multiplexing
127.        Optical Packet Switching Network
128.        Optical Satellite Communication
129.        Optical Switching
130.        Organic Display
131.        Organic Light Emitting Diode
132.        Orthogonal Frequency Division Multiplexing
133.        Ovonic Unified Memory
134.        Paper Battery
135.        Passive Millimeter-Wave
136.        Pervasive Computing
137.        Plasma Antennas
138.        Poly Fuse
139.        Polymer Memory
140.        Project Oxygen
141.        Push Technology
142.        QoS in Cellular Networks Based on MPT
143.        Quantum Dot Lasers
144.        Radio Frequency Identification (RFID)
145.        Radio Frequency Light Sources
146.        RAID
147.        Real Time System Interface
148.        Remote Access Service
149.        Role of Internet Technology in Future Mobile Data System
150.        SATRACK
151.        Secure Electronic Voting System Based on Image Steganography
152.        Securing Underwater Wireless Communication Networks
153.        Security In Embedded Systems
154.        Self Phasing Antenna Array
155.        Service Aware Intelligent GGSN
156.        Signaling System
157.        Silicon on Plastic
158.        Smart Antenna
159.        Smart Note Taker
160.        Smart Pixel Arrays
161.        Space Time Adaptive Processing
162.        Spectrum Pooling
163.        Speech Compression - a novel method
164.        Speed Detection of moving vehicle using speed cameras
165.        Spintronics
166.        Stream Processor
167.        Super Capacitor
168.        Surface Plasmon Resonance
169.        Surround Sound System
170.        Symbian OS
171.        Thermography
172.        Third Generation Solid State Drives
173.        Transparent Electronics
174.        Treating Cardiac Disease With Catheter-Based Tissue Heating
175.        Tunable Lasers
176.        Ultra Conductors
177.        Ultrasonic Motor
178.        User Identification Through Keystroke Biometrics
179.        Utility Fog
180.        Vehicle-to-Grid V2G
181.        Virtual Retinal Display
182.        VISNAV
183.        VLSI Computations
184.        Voice morphing
185.        Wearable Bio-Sensors
186.        White LED
187.        Wideband Sigma Delta PLL Modulator
188.        Wireless Charging Of Mobile Phones Using Microwaves
189.        Wireless DSL
190.        Wireless LAN Security
191.        Wireless Microserver

Latest Computer Science CSE Seminar Topics

1. 10 Gigabit Ethernet
2. 3D Internet
3. 3d Optical Data Storage
4. 3D password
5. 3D Searching
6. 3D Television
7. 4G Broadband
8. 5 Pen PC Technology
9. 5g Wireless System
10. A Plan For No Spam
11. Adding Intelligence to Internet
12. Airborne Internet
13. AJAX
14. Alternative Models Of Computation
15. Ambient Intelligence
16. Amorphous Computing and Swarm Intelligence
17. Anonymous Communication
18. Asynchronous Chips
19. BEOWULF Cluster
20. Bio-inspired Networking
21. Biological Computers
22. Biometric Voting System
23. Biometrics in SECURE e-transaction
24. BitTorrent
25. BlackBerry Technology
26. Blue Brain
27. Bluejacking
28. Bluetooth Broadcasting
29. Bluetooth V2.1
30. Brain Chips
31. Brain Fingerprinting
32. Brain Gate
33. Breaking the Memory Wall in MonetDB
34. Browser Security
35. Capacitive And Resistive Touch Systems
36. CAPTCHA
37. Case Based Reasoning System
38. Chameleon Chip
39. Cisco IOS Firewall
40. Cloud Computing
41. Combating Link Spam
42. Compositional Adaptation
43. Computational Intelligence in Wireless Sensor Networks
44. Computational Visual Attention Systems
45. Compute Unified Device Architecture CUDA
46. Computer Intelligence Application
47. Confidential Data Storage and Deletion
48. Cooperative Linux
49. CORBA
50. Cyborgs
51. Diamond chip
52. Digital Jewelry
53. Digital Rights Management
54. Digital Scent Technology
55. Distributed Interactive Virtual Environment
56. DNA chips
57. Domain Driven Data Mining
58. DOS Attack
59. Dual Core Processor
60. Dynamic TCP Connection Elapsing
61. E-Ball Technology
62. E-Cash Payment System
63. Elastic Quotas
64. Enhancing LAN Using Cryptography and Other Modules
65. E-Paper Technology
66. Ethical Hacking
67. Example Based Machine Translation
68. Exterminator
69. Eye Movement-Based Human Computer Interaction Techniques
70. Face Recognition Technology
71. Facebook Thrift
72. Fast And Secure Protocol
73. Fiber Channel
74. Finger Tracking In Real Time Human Computer Interaction
75. FireWire
76. Generic Access Network
77. Generic Visual Perception Processor GVPP
78. Gesture Recognition Technology
79. Gi-Fi
80. Global Wireless E-Voting
81. Google App Engine
82. Google Chrome OS
83. Google File System
84. Google Glass
85. Google’s Bigtable
86. GPS
87. Graphical Password Authentication
88. Green Cloud
89. Green Computing
90. GSM Based Vehicle Theft Control System
91. Hadoop
92. HALO
93. Haptic Technology
94. Haptics
95. Hi-Fi
96. High Performance Computing with Accelerators
97. HTAM
98. Humanoid Robot
99. Hurd
100. iCloud
101. IDC
102. iDEN
103. IDS
104. Intel Centrino Mobile Technology
105. Intel Core I7 Processor
106. Intelligent RAM
107. Intelligent Software Agents
108. Intelligent Speed Adaptation
109. Internet Access via Cable TV Network
110. Intrusion Tolerance
111. IP spoofing
112. iPAD
113. Iris Scanning
114. iSCSI
115. Java Database Connectivity
116. JOOMLA and CMS
117. Keil C
118. Lamp Technology
119. Laptop Computer
120. Li-Fi Technology
121. Light emitting polymers
122. Linux Kernel 2.6
123. Linux Kernel 2.6
124. Linux Virtual Server
125. Location Dependent Query Processing
126. Location Independent Naming
127. Longhorn
128. Low Power UART Design for Serial Data Communication
129. LWIP
130. Measuring Universal Intelligence
131. Mesh Radio
132. Microsoft Palladium
133. Middleware
134. Mind-Reading Computer
135. Mobile Ad-Hoc Networks Extensions to Zone Routing Protocol
136. Mobile IP
137. Mobile Jammer
138. Mobile Number Portability
139. Mobile Phone Cloning
140. Mobile TV
141. Mobile WiMax
142. MPEG Video Compression
143. MPEG-7
144. Multiparty Nonrepudiation
145. Multiprotocol Label Switching
146. Multi-Touch Interaction
147. Nano Cars Into The Robotics
148. Nanorobotics
149. Neural Interfacing
150. Next Generation Secure Computing Base
151. NGSCB
152. Nvidia Tegra 250 Developer Kit Hardware
153. NVIDIA Tesla Personal Supercomputer
154. On-line Analytical Processing (OLAP)
155. Packet Sniffers
156. Palm Vein Technology
157. Parallel Virtual Machine
158. Param 10000
159. PHANToM
160. Phishing
161. Pill Camera
162. Pivot Vector Space Approach in Audio-Video Mixing
163. Pixie Dust
164. Plagiarism Detection Techniques
165. Privacy Preserving Data Publishing
166. Public Key Infrastructure
167. Rain Technology
168. Real Time Application Interface
169. Reconfigurable computing
170. Refactoring
171. Remote Administration Trojan's
172. RESTful Web Services
173. Robotic Surgery
174. Rover Technology
175. SAM
176. Satellite Radio
177. SATRACK
178. Seam Carving for Media Retargeting
179. Secure ATM by Image Processing
180. Security Features of ATM
181. Self Defending Networks
182. Self Organizing Maps
183. Self-Managing Computing
184. Semantic Digital Library
185. Semantic Web
186. Sensitive Skin
187. Sensors on 3D Digitization
188. Silverlight
189. Sixth Sense Technology
190. Skinput Technology
191. Sky X Technology
192. Slammer Worm
193. Smart Client Application Development using .NET
194. Smart Memories
195. Smart Skin for Machine Handling
196. Sniffer for detecting lost mobiles
197. Socket Programming
198. Soft Computing
199. Software Reuse
200. Spawning Networks
201. SPCS
202. SPECT
203. Speed protocol processors
204. Strata flash Memory
205. Surface Computer
206. Survivable Networks Systems
207. Swarm Intelligence
208. Synthetic Aperture Radar System
209. System in Package
210. Telepresence
211. Tempest and Echelon
212. Text Mining
213. The Callpaper Concept
214. The Deep Web
215. Thermography
216. Tool Command Language
217. Transactional Memory
218. Tripwire
219. Tsunami Warning System
220. Ubiquitous Networking
221. Unicode And Multilingual Computing
222. Unified Modeling Language (UML)
223. Unlicensed Mobile Access
224. Virtual Campus
225. Virtual Retinal Display
226. Visible Light Communication
227. VoCable
228. Voice Browser
229. VoiceXML
230. Wardriving
231. Web 2.0
232. Web Clustering Engines
233. Wibree
234. Windows DNA
235. Wine
236. Wireless LAN Security
237. Wireless USB
238. Wireless Video Service in CDMA Systems
239. Wolfram Alpha
240. Word Sense Disambiguation
241. X- Internet
242. XML Encryption
243. Y2K38
244. Yii Framework
245. Zenoss Core
246. Zettabyte FileSystem
247. zForce Touch Screen

Blue Brain


Human brain, the most valuable creation of God. The man is called intelligent because of the brain .Today we are developed because we can think, that other animals can not do .But we loss the knowledge of a brain when the body is destroyed after the death of man. That knowledge might have been used for the development of the human society. What happen if we create a brain and up load the contents of natural brain into it.
        
 “Blue brain” –The name of the world’s first virtual brain. That means a machine   that can function as human brain.  Today scientists are in research to create an artificial brain that can think, response, take decision, and keep anything in memory. The main aim is to upload human brain into machine. So that man can think, take decision without any effort. After the death of the body, the virtual brain will act as the man .So, even after the death of a person we will not loose the knowledge, intelligence, personalities, feelings and memories of that man that can be used for the development of the human society.  No one has ever understood the complexity of human brain. It is complex than any circuitry in the world. So, question may arise “Is it really possible to create a human brain?” The answer is “Yes”. Because what ever man has created today always he has followed the nature. When man does not have a device called computer, it was a big question for all .But today it is possible due to the technology. Technology is growing faster than every thing.  IBM is now in research to create a virtual brain. It is called “Blue brain “.If possible, this would be the first virtual brain of the world. 

What is Blue brain?

             The IBM  is now developing a virtual brain known as the Blue brain. It would be the world’s first virtual brain.  With in 30 years, we will be able to scan ourselves into the computers. Is this the beginning of eternal life?

What is Virtual Brain?

               We can say Virtual brain is an artificial brain, which does not actually the natural brain, but can act as the brain .It can think like brain, take decisions based on the past experience, and response as the natural brain can. It is possible by using a super computer, with a huge amount of storage capacity, processing power and an interface between the human brain and this artificial one .Through this interface the data stored in the natural brain can be up loaded into the computer .So the brain and the knowledge, intelligence of anyone can be kept and used for ever, even after the death of the person.


Why we need virtual brain?

      Today we are developed because of our intelligence. Intelligence is the inborn quality that can not be created .Some people have this quality ,so that they can think up to such an extent where other can not reach .Human society is always need of such intelligence and such an intelligent brain to have with. But the intelligence is lost along with the body after the death. The virtual brain is a solution to it. The brain and intelligence will alive even after the death.  

   We often face difficulties in remembering things such as people's names, their birthdays, and the spellings of words, proper grammar, important dates, history facts, and etcetera. In the busy life every one want to be relaxed .Can not we use any machine to assist for all these? Virtual brain may be the solution to it. What if we upload ourselves into computer, we were simply aware of a computer, or maybe, what if we lived in a computer as a program?

How it is possible?

    First, it is helpful to describe the basic manners in which a person may be uploaded into a computer. Raymond Kurzweil recently provided an interesting paper on this topic. In it, he describes both invasive and noninvasive techniques. The most promising is the use of very small robots, or nanobots. These robots will be small enough to travel throughout our circulatory systems. Traveling into the spine and brain, they will be able to monitor the activity and structure of our central nervous system. They will be able to provide an interface with computers that is as close as our mind can be while we still reside in our biological form. Nanobots could also carefully scan the structure of our brain, providing a complete readout of the connections between each neuron. 

They would also record the current state of the brain. This information, when entered into a computer, could then continue to function as us. All that is required is a computer with large enough storage space and processing power. Is the pattern and state of neuron connections in our brain truly all that makes up our conscious selves? Many people believe firmly those we posses a soul, while some very technical people believe that quantum forces contribute to our awareness. But we have to now think technically. Note, however, that we need not know how the brain actually functions, to transfer it to a computer. We need only know the media and contents. The actual mystery of how we achieved consciousness in the first place, or how we maintain it, is a separate discussion. 

Really this concept appears to be very difficult and complex to us. For this we have to first know how the human brain actually works.

Uploading human brain: 

The uploading is possible by the use of small robots known as the Nanobots .These robots are small enough to travel through out our circulatory system. Traveling into the spine and brain, they will be able to monitor the activity and structure of our central nervous system. They will be able to provide an interface with computers that is as close as our mind can be while we still reside in our biological form. Nanobots could also carefully scan the structure of our brain, providing a complete readout of the connections. This information, when entered into a computer, could then continue to function as us. Thus the data stored in the entire brain will be uploaded into the computer.

Advantages:

1. We can remember things without any effort.
2. Decision can be made without the presence of a person.
3. Even after the death of a man his intelligence can be   used.
4. The activity of different animals can be understood. That means by interpretation of the electric impulses from the brain of the animals, their thinking can be understood easily.
5. It would allow the deaf to hear via direct nerve stimulation, and also be helpful for many psychological diseases. By down loading the contents of the brain that was uploaded into the computer, the man can get rid from the mad ness.

CONCLUSION

In conclusion, we will be able to transfer ourselves into computers at some point. Most arguments against this outcome are seemingly easy to circumvent. They are either simple minded, or simply require further time for technology to increase. The only serious threats raised are also overcome as we note the combination of biological and digital technologies.