skip to main |
skip to sidebar
RSS Feeds
ebooks , images , softwarez , download
ebooks , images , softwarez , download
2:57 PM
Posted by <. Lokesh Polimera .>
hi , this post is dedicated to my innocent friends...
older posts are not deleted , at the end of the blog-page , you find "older posts"
click on it to see those posts...
2:47 PM
Posted by <. Lokesh Polimera .>
Copy the link in a new tab and download:
Cryptography n network security
CODE
http://www.mediafire.com/?zghwmhdzmqm
Artificial Intelligence & Global risk
CODE
http://www.mediafire.com/?ltijvtixgcm
Advances in Computer Power& Numerical algorithm
CODE
http://www.mediafire.com/?tnmdpd2nyr9
Artificial Intelligence
CODE
http://www.mediafire.com/?fyzuj1yxltj
Boimetrics
CODE
http://www.mediafire.com/?5smzkddjhic
BlueTooth
CODE
http://www.mediafire.com/?nzyzzgsrxxt
ppt on Cellphones n calls
CODE
http://www.mediafire.com/?7tmpzcsprn3
Data Mining
CODE
http://www.mediafire.com/?g0dl7nzysmx
Distribution medium access for next generation
CODE
http://www.mediafire.com/?blymvrn3yyd
e-hacking
CODE
http://www.mediafire.com/?v4rzjokdtlm
Human Oriented interaction wid robot
CODE
http://www.mediafire.com/?fzydk2xmlmd
Identity Management
CODE
http://www.mediafire.com/?ymmx0thjzds
Mobile Computing
CODE
http://www.mediafire.com/?kfcmllmiing
Mobile MultiRobot Systems
CODE
http://www.mediafire.com/?ynatnmiya6d
Network Security
CODE
http://www.mediafire.com/?yjnkmjkj9m0
Realtime 3d Human Capture System
CODE
http://www.mediafire.com/?5ylmntgnstj
RealTime data Ware housing
CODE
http://www.mediafire.com/?jzeizwtzndw
Real time Systems
CODE
http://www.mediafire.com/?m3ryzmietxx
A ppt on Robots
CODE
http://www.mediafire.com/?cymvcymuwzl
UML
CODE
http://www.mediafire.com/?y910ddvvtnm
vending Machine
CODE
http://www.mediafire.com/?tneyj9qiptn
VistabookSpeechSystems
CODE
http://www.mediafire.com/?xyiy54triyd
Windows Vista
CODE
http://www.mediafire.com/?nmmkdz1mshz
WeB 3.0
CODE
http://www.mediafire.com/?nmouit22a1g
wireless networks
CODE
http://www.mediafire.com/?hbxgzazmjmw
SEMINAR TOPICS WITH ABSTRACT
WIRELESS LAN SECURITY
CODE
http://www.ziddu.com/download/2975603/wlan.doc.html
WIRELESS APPLICATION PROTOCOL
CODE
http://www.ziddu.com/download/2975604/wi...l.doc.html
WAVELET TRANSFORMS
CODE
http://www.ziddu.com/download/2975605/WA...S.DOC.html
VOICE OVER INTERNET PROTOCOL
CODE
http://www.ziddu.com/download/2975606/vo...p.doc.html
WiMAX
CODE
http://www.ziddu.com/download/2975607/Wi...y.DOC.html
ARTIFICIAL NEURAL NETWORK
CODE
http://www.ziddu.com/download/2975639/ar...k.doc.html
ATM
CODE
http://www.ziddu.com/download/2975640/atm.doc.html
64-BIT MICRO PROCESSOR
CODE
http://www.ziddu.com/download/2975641/64...r.doc.html
ADAPTIVE CONTROL SYSTEM
CODE
http://www.ziddu.com/download/3006526/ad...o.DOC.html
COMPOSITE MATERIALS
CODE
http://www.ziddu.com/download/3006527/co...o.DOC.html
3D MACHINE VISION SYSTEM
CODE
http://www.ziddu.com/download/3006528/3d...o.DOC.html
AIR BRAKE SYSTEM
CODE
http://www.ziddu.com/download/3006529/ai...o.DOC.html
GENETIC ALGORITHM
CODE
http://www.ziddu.com/download/3006620/ge...o.DOC.html
FUEL CELLS
CODE
http://www.ziddu.com/download/3006621/fu...o.DOC.html
INTELLIGENT COOLING SYSTEM
CODE
http://www.ziddu.com/download/3006622/in...o.DOC.html
DIESEL ENGINE
CODE
http://www.ziddu.com/download/3006623/di...o.DOC.html
METALLURGICAL CHANGES IN SYSTEMS
CODE
http://www.ziddu.com/download/3006750/me...o.DOC.html
SIX SIGMA
CODE
http://www.ziddu.com/download/3006751/si...o.DOC.html
LIQUID NITROGEN
CODE
http://www.ziddu.com/download/3006752/li...o.DOC.html
MICROELECTROMECHANICAL SYSTEMS
CODE
http://www.ziddu.com/download/3006753/mi...o.DOC.html
NEURAL NETWORKS
CODE
http://www.ziddu.com/download/3006753/mi...o.DOC.html
AUTOMATIC SPEED CONTROL SYSTEM
CODE
http://www.ziddu.com/download/3006530/au...o.DOC.html
AUTOCONFIGURING ARTIFICIAL NEURAL NETWORK
CODE
http://www.ziddu.com/download/2975642/AU...L.doc.html
BLUETOOTH TECHNOLOGY
CODE
http://www.ziddu.com/download/2975643/bl...y.doc.html
BLUETOOTH TECHNOLOGY IN WIRELESS COMMUNICATIONS
CODE
http://www.ziddu.com/download/2975676/BL...S.doc.html
CODING OF DIGITAL AUDIO
CODE
http://www.ziddu.com/download/2975677/CO...O.DOC.html
CONTACTLESS SMART CARD
CODE
http://www.ziddu.com/download/2975678/co...d.DOC.html
DCOM TECHNICAL OVERVIEW
CODE
http://www.ziddu.com/download/2975679/dc...w.doc.html
CODE DIVISION MULTIPLE ACCESS
CODE
http://www.ziddu.com/download/2975680/co...s.doc.html
DIGITAL IMAGE PROCESSING
CODE
http://www.ziddu.com/download/2975732/DI...G.DOC.html
DOMAIN NAME SYSTEM
CODE
http://www.ziddu.com/download/2975733/do...m.doc.html
DIGITAL DISPLAY TECHNOLOGY
CODE
http://www.ziddu.com/download/2975734/Di...y.DOC.html
DISTRIBUTED SYSTEMS
CODE
http://www.ziddu.com/download/2975735/Di...s.DOC.html
DIGITAL SIGNATURE
CODE
http://www.ziddu.com/download/2975736/di...e.doc.html
E-CASH PAYMENT
CODE
http://www.ziddu.com/download/2975749/ec...m.doc.html
EMBEDDED SYSTEMS
CODE
http://www.ziddu.com/download/2975750/EM...S.DOC.html
FREE SPACE OPTICS
CODE
http://www.ziddu.com/download/2975751/fr...s.doc.html
Fuzzy Coordination of FACTS
CODE
http://www.ziddu.com/download/2975752/Fu...r.doc.html
EDGE Compact and EDGE Classic Packet Data Performance
CODE
http://www.ziddu.com/download/2975753/ED...e.doc.html
ATM
CODE
http://www.ziddu.com/download/2975772/atm.doc.html
FUZZY LOGIC CONTROL DESIGN
CODE
http://www.ziddu.com/download/2975773/FU...N.doc.html
GSM
CODE
http://www.ziddu.com/download/2975774/gsm.doc.html
FUZZY LOGIC
CODE
http://www.ziddu.com/download/2975775/FU...C.DOC.html
FUZZY LOGIC IN EMBEDDED SYSTEMS
CODE
http://www.ziddu.com/download/2975776/FU...S.doc.html
HOLOGROPHY
CODE
http://www.ziddu.com/download/2982520/ho...o.doc.html
HIDING DATA IN IMAGES BY SIMPLE SUBSTITUTION
CODE
http://www.ziddu.com/download/2982521/hi...o.DOC.html
INTELLIGENT WIRELESS VIDEO CAMERA
CODE
http://www.ziddu.com/download/2982522/in...o.DOC.html
HIGH PERFORMANCED DSP CAPABILITY
CODE
http://www.ziddu.com/download/2982523/hi...o.DOC.html
IMAGE PROCESSING
CODE
http://www.ziddu.com/download/2982524/im...o.doc.html
MULTIMEDIA MESSAGING SERVICE
CODE
http://www.ziddu.com/download/2982568/mms.sho.doc.html
MOBILE ADHOC NETWORK
CODE
http://www.ziddu.com/download/2982569/Mo...o.doc.html
LATEST SMART CARD FEATURES
CODE
http://www.ziddu.com/download/2982570/la...o.doc.html
MICRO CONTROLLERS CABLE MODEMS
CODE
http://www.ziddu.com/download/2982571/mi...o.DOC.html
IPV4-IPV6 TRANSITION TECHNOLOGY
CODE
http://www.ziddu.com/download/2982572/ip...o.DOC.html
MOBILE COMPUTING
CODE
http://www.ziddu.com/download/2982592/mo...o.doc.html
MULTI RESOLUTION WATERMARK BASED ON WAVELET
CODE
http://www.ziddu.com/download/2982593/mu...o.DOC.html
NANOTECHNOLOGY
CODE
http://www.ziddu.com/download/2982594/NA...o.doc.html
NEW TRENDS IN CRYPTOGRAPHY
CODE
http://www.ziddu.com/download/2982595/ne...o.DOC.html
NETWORK CUSTODY SYSTEM
CODE
http://www.ziddu.com/download/2982596/ne...o.doc.html
RSA ALGORITHM
CODE
http://www.ziddu.com/download/2982638/rs...o.doc.html
ORTHOGONAL FREQUENCY DIVISION MULTIPLEXING
CODE
http://www.ziddu.com/download/2982639/or...o.DOC.html
ORGANIC LED
CODE
http://www.ziddu.com/download/2982640/or...o.DOC.html
PUBLIC KEY INFRASTRUCTURE
CODE
http://www.ziddu.com/download/2982641/pu...o.doc.html
SATELLITE COMMUNICATIONS
CODE
http://www.ziddu.com/download/2982642/sa...o.DOC.html
SLAMMER WORM: THE FASTEST SPREADING BOMBSHELL ON THE INTERNET
CODE
http://www.ziddu.com/download/2982665/sl...o.doc.html
SECURITY ISSUES
CODE
http://www.ziddu.com/download/2982666/se...o.DOC.html
SECURE INTERNET VERIFICATION BASED ON IMAGE PROCESSING
CODE
http://www.ziddu.com/download/2982667/cu...o.DOC.html
SMART ANTENNA
CODE
http://www.ziddu.com/download/2982668/sm...o.doc.html
SILICON ON PLASTIC
CODE
http://www.ziddu.com/download/2982669/si...o.doc.html
TACTILE SENSING SYSTEM USING NEURAL SYSTEM
CODE
http://www.ziddu.com/download/2982697/ta...o.DOC.html
SMART CARD
CODE
http://www.ziddu.com/download/2982698/sm...o.doc.html
SOCKET INTERFACE
CODE
http://www.ziddu.com/download/2982699/so...o.doc.html
SPEECH RECOGNITIONS USING DSP
CODE
http://www.ziddu.com/download/2982700/sp...o.DOC.html
STORAGE AREA NETWORK
CODE
http://www.ziddu.com/download/2982701/st...o.doc.html
WAVELET TRANSFORMS
CODE
http://www.ziddu.com/download/2982746/wa...o.DOC.html
WIRELESS WLAN SECURITY
CODE
http://www.ziddu.com/download/2982747/wlan.sho.doc.html
3G WIRELESS TECHNOLOGY
CODE
http://www.ziddu.com/download/2982748/3g...o.doc.html
VOICE OVER INTERNET PROTOCOL
CODE
http://www.ziddu.com/download/2982749/vo...o.doc.html
TOOL COMMAND LANGUAGE
CODE
http://www.ziddu.com/download/2982750/to...o.doc.html
ENTERPRISE SECURITY
CODE
http://www.ziddu.com/download/2989688/hy...o.pdf.html
CODE
http://www.ziddu.com/download/2989689/ah...o.ppt.html
CURRENT DIFFERENTIAL PROTECTION
CODE
http://www.ziddu.com/download/2910667/cu...n.DOC.html
APPLICATION OF GENETIC ALGORITHM TO ECONOMIC LOAD DISPATCH
CODE
http://www.ziddu.com/download/2910668/li...h.DOC.html
ARTIFICIAL INTELLIGENCE TECHNIQUES IN POWER SYSTEMS
CODE
http://www.ziddu.com/download/2910669/ar...s.DOC.html
APPLICATION OF SHUNT ACTIVE POWER FILTER
CODE
http://www.ziddu.com/download/2910670/ap...r.DOC.html
AN EXPERT SYSTEM FOR POWER PLANTS
CODE
http://www.ziddu.com/download/2910671/an...s.DOC.html
AUTOMATIC VEHICLE LOCATOR
CODE
http://www.ziddu.com/download/2329473/au...r.pdf.html
NANO TECHNOLOGY IN MEMORY DEVICES
CODE
http://www.ziddu.com/download/2329474/na...s.pdf.html
DIGITAL SIGNAL PROCESSORS
CODE
http://www.ziddu.com/download/2329475/Di...s.pdf.html
BIOCHIPS
CODE
http://www.ziddu.com/download/2329476/Biochips.pdf.html
EMBEDDED SYSTEM DIGITAL BIKE OPERATING SYSTEM
CODE
http://www.ziddu.com/download/2329477/em...m.pdf.html
VLSI DESIGN
CODE
http://www.ziddu.com/download/2329498/VL...n.pdf.html
4G COMMUNICATION
CODE
http://www.ziddu.com/download/2329527/4gcomm.pdf.html
ADAPTIVE MISSILE GUIDANCE
CODE
http://www.ziddu.com/download/2329528/ad...e.pdf.html
BATTERY MODEL FOR EMBEDDED SYSTEMS
CODE
http://www.ziddu.com/download/2329529/Ba...s.pdf.html
PC TO PC COMMUNICATION WITH INFRARED
CODE
http://www.ziddu.com/download/3187204/pc...d.pdf.html
CODE
http://www.ziddu.com/download/3187251/Pr...o.ppt.html
SOFTWARE DEFINED RADIO
CODE
http://www.ziddu.com/download/3187205/So...o.pdf.html
HUMAN COMPUTER INTERFACE
CODE
http://www.ziddu.com/download/3187291/hci.ppt.html
CYBER CRIMES
CODE
http://www.ziddu.com/download/3225722/cy...e.pdf.html
2:38 PM
Posted by <. Lokesh Polimera .>
Select your topic and search for download in google or provided here:
1. Web searching
2. Web Crawling
3. Real Time Systems
4. Network Computing Systems
5. Distributed Hash Tables.
6. Re-architecting & Internet Protocols.
7. Bluetooth
8. Storage Area Network
9. Distributed database.
10. Neural Computations.
11. Artificial Neural Network
12. Bioinformatics
13. Cluster Computing
14. DNA Computing in Security
15. Face Recognition
16. 4g Wireless Systems
17. Home Networking.
18. Zigbee
19. Stenography and Digital Watermarking.
20. Multimedia Broadcasting via satellite.
21. Surface Computer
22. Data Mining
23. Data Ware housing
24. Parallel Computing.
25. Multimedia Broadcast Multicast Services
26. Holographic versatile disc.
27. Wireless Technology.
28. Bio-molecular Computers
29. Fuzzy Logic.
30. Genetic Algorithm.
31. Elliptical Curve Cryptography(ECC)
32. Blade Servers.
33. NAS
34. DELAY tolerant networks.
35. Java Ring
36. Tripwire
37. Virtual Surgery.
38. Wireless Application Protocol.
39. Internet Telephony.
40. Home Automation.
41. Printable Computers.
42. I mode
43. Hyper Transport Technology.
44. Rapid prototyping.
45. Management Information System.
46. Digital Visual Interface.
47. iSCSI-Future of network Storage.
48. Genetic Engineering.
49. Wireless markup Language.
50. ATM Virtual Connections.
51. Biometrics.
52. Voice over Internet Protocol.
53. MEMs in space.
54. SALT ( Speech Application Language Tags)
55. Voice Portals.
56. Real Time Operating System.
57. FREENET
58. Benefits of Parallel and Distributed Computing
59. Soft Computing.
60. Data Compression with Huffman Algorithms.
61. Human Verses Neural Network.
62. E-Commerce.
63. E-Governance.
64. Sensor Network
65. Enterprise Resource Planning.
66. Network Security and its Principles.
67. Cryptography Application.
68. Impact of Information Technology on India
69. Importance of e-commerce.
70. Impact of Computers on Business
71. Embedded System
72. GIS
73. GPRS.
74. Adhoc Network
75. VOWIFI: vowifi is used to reference a Wi-Fi-based VoIP service
76. VOICE MORPHING : The method of transforming the source speaker’s speech to that of the target speaker is usually referred as voice morphing or voice transformation or voice conversion
77. ROBOCODE: Robocode is an open source educational game by Mathew nelson (originally r was provided by IBM). it is designed to help people learn to program in java and enjoy the experience
78. JAVA CRYPTOGRAPHY ARCHITECTURE (JCA) : The java cryptography architecture (JCA) is a framework for working with cryptography using the java programming language
79. ZOMBIE: In the world of UNIX, a zombie refers to a 'child' program that was started by a 'parent' program but then abandoned by the parent. Zombie is also used to describe a computer that has been implanted with a daemon that puts it under the control of a malicious hacker without the knowledge of the computer owner.
80. WISENET: It is a wireless sensor network that monitors the environmental conditions such as light, temperature, and humidity. This network is comprised of nodes called “motes” that form an ad-hoc network to transmit this data to a computer that function as a server.
81. WOLFPACK: Officially known as Microsoft cluster server (MSCS), it was released in September, 1997 as part of Windows NT 4.0, enterprise edition. wolf pack is the codename used for Microsoft’s clustering solution
82. COOPERATIVE LINUX : Employing the novel idea of a co-operative virtual machine(CVM) co-operative Linux or colinx can support the kernel of both the Microsoft windows and the Linux, to run parallel on the same machine
83. TRANS EUROPEAN SERVICES FOR TELEMATICS BETWEEN ADMINISTRATIONS (TESTA) : The trans European services for telematics between administrations (TESTA) system is the private ip-based network of the European community. TESTA is a telecommunications interconnection platform for secure information exchange between the European public administrations
84. MOIP : Mobile communications over internet protocol is designed to be totally mobile-centric, and is optimized specifically for mobile-handsets environment rather than the pc
85. HOLOGRAPHIC VERSATILE DISC (HVD) : It's an optical disc technology still in the childhood stages of research called as the collinear holography, would soon gain upper hand over the existing technologies like the blue-ray and hd DVD optical disc systems with respect to its storage capacity
86. CYBORGS: Topic regarding the artificial living parts.
87. AKA: AKA stands for the authentication and key agreement security protocol. it is a mechanism which performs authentication and session key distribution in universal mobile telecommunications system (umts) networks
88. EXPONENTIAL KEY EXCHANGE :
89. CRYPTOGRAPHIC AUTHENTICATION: Cryptographic authentication schemes and protocols have been developed to provide authenticated key agreement to prevent man-in-the-middle and related attacks.
90. DATA GRAM CONGESTION CONTROL PROTOCOL (DCCP)
91. PERVASIVE COMPUTING: Ubiquitous computing or pervasive computing is the result of computer technology advancing at exponential speeds -- a trend toward all man-made and some natural products having hardware and software. The main aim of pervasive computing, which combines current network technologies with wireless computing, voice recognition, internet capability and artificial intelligence, is to create an environment where the connectivity of devices is embedded in such a way that the connectivity is unobtrusive and always available.
92. STREAM COMPUTING: The main task is to pull in streams of data, process the data and stream it back out as a single flow and thereby analyzes multiple data streams from many sources live.
94. PIXIE DUST : pixie dust is the informal name that ibm is using for its antiferromagnetically-coupled (AFC) media technology, which can increase
the data capacity of hard drives to up to four times the density possible with current drives
95. CUCKOO EGG: The term and the concept of cuckoo egg is quiet strange. When you download copy protected songs, you may come across cuckoo egg yourself. In the first 30 seconds of the downloaded song you may hear something other than the initial song which could be the cuckoo clock sound effects or a series of random sounds and noises that are free of any copyright ownership. this happens for not buying the cd in the first place
96. OFDMA: orthogonal frequency division multiple access (ofdma) is a multiple access scheme for ofdm systems. it works by assigning a subset of subcarriers to individual users.
97. ROUTING :
98. FULLSTREAM TECHNOLOGY: when transmitting video data some users on a slower internet connect may experience blocky views, artifacts and pixilation effects during playback. ati full stream technology detects the edges of these visible blocks and smoothes them over using a sophisticated hardware accelerated filtering method to improve the performance and visual quality of streaming video playback.
99. THE "JITTERS": jitter buffers (and jitter filters) in tech terminology refers to a hardware device or software process that eliminates jitter caused by transmission delays in an internet telephony (VoIP) network.
100. THIN PROVISIONING: thin provisioning is most commonly used in centralized large storage systems such as sans and in storage virtualization environments where administrators plan for both current and future storage requirements and often over-purchase capacity, which can result in wasted storage, so in short it is used to describe the consolidation and automated process of allocating just 'the exact required amount' of server space at the time it is required.
101. CHOKE PACKET : It is used to describe a specialized packet that is used for flow control along a network
102. SIGNCRYPTION : Signcryption is a new paradigm in public key cryptography that simultaneously fulfils both the functions of digital signature and public key encryption in a logically single step, and with a cost significantly lower than that required by the traditional signature and encryption approach
103. BEWIP : The Microsoft active sync based address book present in bewip is based on the pocket outlook address book which makes the synchronization easier
104. THE DATAGRAM DELIVERY PROTOCOL (DDP) : Datagram delivery and routing service to higher layer protocols are the functions of ddp. ddp frame headers can use short format headers which carry only the source and destination service socket numbers, or the long format ddp headers also carry the source and destination network and node addresses needed for routing capability
105. LIN (LOCAL INTERCONNECT NETWORK): LIN is low cost serial holistic communication system concepts for local interconnect networks in vehicles which complements the existing portfolio of automotive multiplex networks
108. BLOB. : Blob is the abbreviation for binary large object, a collection of binary data stored as a single entity in a database management system.
109. WI-FI5 : wireless lan products based on the ieee 802.11a specification that operates in the 5ghz radio frequency band were referred to as wi-fi5, a term created by the wi-fi alliance
110. ANISOTROPIC FILTERING: AF, is a technique in 3d graphics to improve image quality in computer video games
111. GOOGLEWHACK : The goal of a googlewhack is to perform search queries that will produce only one single search result in the Google search engine
112. JAVA MANAGEMENT EXTENSIONS (JMX)
113. LUCENT VISION: lucent vision is a real-time networked visual information system that archives sports action using visual processing.
114. AUTHENTICATION BASED ON IRIS RECOGNITION: iris recognition is related to scanning eyes and authenticating similar to finger print authentication. We scan the top layer of the eye that is iris and authenticate the person.
115. IMAGE PROCESSING UNDER EDGE DETECTION AND CORRECTION ALGORITHM FOR 3D CT IMAGES
116. AUTOMATED THEOREM PROVING (ATP) :
117. ELLIPTICAL CURVE CRYPTOGRAPHY (ECC) : this innovative technology can produce smaller, faster and efficient cryptographic keys using the break through technique of elliptic curve equation rather than employing the traditional method of producing the key as the product of very large prime numbers
118. 3D PC GLASSES: they do the job of influencing the brain to think that the monitor is showing a real three dimensional object.
119. NCURSES: Ncurses is a programming library providing an API, allowing the programmer to write text user interfaces in a terminal-independent manner. It also optimizes screen changes, in order to reduce the latency experienced when using remote shells
120. VIRTUAL KEYBOARD
121. NANOROBOTICS
122. BLUE- RAY DISC
123. D PROGRAMMING LANGUAGE
124. DUAL CORE PROCESSOR
125. THE DESIGN AND IMPLEMENTATION OF A VIRTUAL MACHINE OPERATING SYSTEM USING A VIRTUAL ACCESS METHOD
126. DIGITAL SIGNATURE :
127. FUTURE USE OF BIOMETRIC TECHNOLOGY FOR SECURITY AND AUTHONTICATION