Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

1.

Quantum cryptography
2. Cryptocurrency
3. Distributed ledger technology in blockchain
4. Linux Kernel
5. Vein recognition
6. Biometric based authentication
7. Face spoofing
8. Cancellable biometric
9. Approximation algorithm
10. Randomize algorithm
11. Biometric voting system
12. Human computer interaction
13. Light weight image encryption
14. Finger Trees
15. Hash Array Mapped Trie
16. K-d tree
17. Persistent data structures
18. Cartesian tree
19. Understanding convolution neural network
20. Image fingerprinting
21. Visual cryptography
22. Image steganography
23. Video watermarking
24. Audio watermarking
25. MP3 audio coding
26. Motion compensation in video coding
27. LTE Architecture
28. 5G Technologies
29. Resource scheduling in LTE
30. Why 5G over LTE
31. Radio resource schedulers in LTE
32. Relaying in LTE
33. LTE-V2X n3tworks
34. 5G-V2X over LTE-V2X
35. 5G-NR
36. 5G Architecture
37. SA vs NSA of 5G
38. Virtualization in LTE
39. Network Slicing
40. Beyond 5G (B5G)
41. Multipath TCP
42. TCP over LTE
43. uRLLC services
44. 5G and IoT
45. Block-chain in IoT
46. Distributed Block chain
47. AI/ML in 5G
48. Wireless TCP
49. Adhoc TCP
50. DSR vs. DSDV vs. AoDV
51. MBB vs. eMBB
52. DMM in 5G
53. Tradition DMM approaches
54. Deep Neural Network
55. RNN Architecture
56. ANN Architecture
57. Supervised vs. Unsupervised vs.
Reinforcement learning
58. Fog and Edge Computing
59. Cloud Data Mining
60. Carrier Aggregation in LTE
61. Inter Cell Interference Coordination in LTE
62. MEC in 5G
63. Swarm Robotics
64. Dynamic Graph Algorithms
65. Graph Algorithms in Social Networks.
66. Progressive image processing

67. Data hiding

68. Secret image sharing

69. Selective image encryption

You might also like