02 September, 2012

10 Attempts to Provide Internet Access to Third World Countries:


        The importance of internet access in the development of nations has led to a number of efforts to get third world countries connected, and has been met with mixed results. The infrastructure, topography and/or the remoteness of many areas has presented a challenge in getting much of the world online. The following are ten attempts to provide internet access to third world countries:

  1. One Laptop Per Child – With a mission to empower the world’s poorest children via education, OLPC seeks to provide every child with an affordable connected laptop. They are currently working on connecting Latin America, Rwanda, Ethiopia, Haiti, and Mongolia, among other countries.
  2. Google – Google’s Internet Bus Project brings an internet-enabled bus to India in order to educate people about the internet and how it can benefit them. You can follow the project as it progresses at this site.
  3. Green Wi-Fi – Using solar Wi-Fi, they provide “last mile internet access with nothing more than a single broadband internet connection, rooftops and the sun” in places like Lascahobas, Haiti.
  4. Connect Africa Initiative – begun in 2007, the program sought to bridge technological gaps in the African region employing the aid of several IT companies as well as the European Commission, China, and India.
  5. Connect the Caribbean Initiative – Attempting to “connect the unconnected by 2015”, this project is the Caribbean version of the ITU’s (International Telecommunication Union) Connect the World initiative, and is hosted by the Caribbean Association of National Telecommunications Operators (CANTO).
  6. Connect Asia-Pacific Summit – One of ITU’s projects, which seeks to establish global connectivity by the year 2015, this one is an effort to provide information and communication technology to the Asia-Pacific region.
  7. Connect Arab Summit 2012 – Partnering with the League of Arab States, the United nations agency for information and communication technology, the ITU has established this region as part of its over-arching initiative to connect the world by 2015.
  8. O3b Networks – In an effort to connect the “other 3 billion (O3B) people to the internet, O3b networks is creating a global internet backbone to serve several billion consumers, businesses, and other organizations in 177 different countries.
  9. United Villages – A company whose mission is to bring the internet age to remote communities utilizing a “store and forward” concept. Villagers store their data and email on a local server, and United Villages’ internet-equipped vehicles gather all this data, drive to a Wi-Fi or cellular -equipped city, and forward it over the internet.
  10. The United Nations, on June 3, 2011, declared internet access to be a basic human right. “Given that the Internet has become an indispensable tool for realizing a range of human rights, combating inequality, and accelerating development and human progress, ensuring universal access to the Internet should be a priority for all states.”
It’s only a matter of time before the internet bridges connections in third world countries around the world, helping to catch them up with all of the countries who already have unlimited access. Soon enough we really will be fully connected.

9 Ways Really Stupid People Use Twitter


               We’re all aware by now of the many benefits to using Twitter, such as maintaining a network of friends and colleagues with whom to communicate and share ideas. Sadly, the fact that these activities include humans means that there will be some percentage of genuinely head scratch-inducing behavior. The following are 9 ways that really stupid people use Twitter:

1. Linking their tweets to other social sites. There’s a reason people are on Facebook and not on Twitter. If you want attention from someone on Facebook, drop them a message or post an update – on Facebook.
2. Incorrect or inappropriate use of hashtags. The actual purpose of hashtags, or at least the original intent behind them, was to create a search tool that would allow users to find info (tweets) associated with a specific topic. Now people are using them just to distinguish their decidedly pointless tweets with obscure references that serve no purpose whatsoever.
3. Stupid people tend to be, shall we say, originality challenged. Their solution? Well, there’s no reason not to update non-stop simply because you’ve got nothing to say. All you need to do is RT (retweet) posts from other members. Coming up with your own content is severely overrated.
4. Twitter was never intended to serve as a substitute for instant messaging or phone calls, for that matter. Posting back and forth in the form of an ongoing real-time conversation is just clogging up the works for everyone else and renders the whole concept behind tweets and updates moot.
5. Posting every single tune they find inspirational, each time they hear it. Look, sport, you may envision your alter ego to be some uber- hip and popular DJ, but we have some bad news to break to you: nobody wants someone else to provide the soundtrack to their lives, OK? Cool it.
6. Quoting. This is the sort of thing that gets you unfollowed. It’s completely unoriginal by its very nature, not to mention the fact that so many other morons do it at the same time. Don’t try to be someone’s motivational posters and their DJ. Enough already.
7. Auto-following. Auto-following is completely contrary to what social networks and following are all about. The idea is to find those individuals and topics that interest you and follow them. It’s the only worthwhile purpose for spending any time on these sites. Why undo it all by automatically following anyone who chooses to follow you?
8. Advertising. It rarely works, unless it’s your actual gig. Otherwise it simply comes off as cloying, barely disguised (if at all) spam. The idea is to develop an interest in who you are and what you’re about without resorting to outright sales pitches.
9. Auto-tweeting is another waste of time; but worse, it’s a waste of our time as well as yours, stupid tweeter. It’s absolutely unnecessary to have some bot send out a tweet every time you update your website or post a new pic. Please stop. I’ve got enough to keep track of already, thank you.

05 August, 2012

What is a Project report?

      A Project report is a kind of formal and approved document used to guide both the "Project control" and "Project Execution". The primary uses of the project plan are to document planning assumptions and decisions, facilitate communication among stakeholders, and document approved scope, cost, and schedule baselines. A project plan may be summarized or detailed.

Purpose


          The objective of a project plan is to define the approach to be used by the Project team to deliver the intended project management scope of the project.
At a minimum, a project plan answers basic questions about the project:
Why? - What is the problem or value proposition addressed by the project? Why is it being sponsored?
What? - What is the work that will be performed on the project? What are the major products/deliverables?
Who? - Who will be involved and what will be their responsibilities within the project? How will they be organized?
When? - What is the project timeline and when will particularly meaningful points, referred to as milestones, be complete?

Plan contents

           To be a complete project plan according to industry standards such as the PMBOK or PRINCE2, the project plan must also describe the execution, management and control of the project. This information can be provided by referencing other documents that will be produced, such as a Procurement Plan or Construction Plan, or it may be detailed in the project plan itself.
The project plan typically covers topics used in the project execution system and includes the following main aspects:
- Scope Management
- Requirements Management
- Schedule Management
- Financial Management
- Quality Management
- Resource Management
- Communications Management
- Project Change Management
- Risk Management
- Procurement Management

      It is good practice and mostly required by large consulting and professional project management firms, to have a formally agreed and version controlled project management plan approved in the early stages of the project, and applied throughout the project.

15 July, 2012

71,000 job cuts have been announced worldwide by more than a dozen multinationals, including HP and Nokia


MNCs Including HP And Nokia Announce 71,000 Job Cuts Globally, so far this year as they attempt to save costs amid uncertain economic environment.


This cuts have been announced by companies from various sectors, during the first six months of 2012, and those from the technology services space are the worst hit.


Companies to have confirmed massive job cuts, running into thousands of employees each, include tech giant Hewlett- Packard (HP), mobile handset maker Nokia, consumer electronic giant Sony Corp, internet company Yahoo, food and beverage maker Pepsi Co, financial services entity Royal Bank of Scotland and airline firm Lufthansa.


Camera maker Olympus, Swedish ball bearing giant SKF AB, drug manufacturer Novartis AG, the Anglo-Dutch firm Unilever, computer mouse maker Logitech International, LM Wind Power and mobile network operator Verizon Wireless have also announced substantial job cuts.


Together, these companies have announced job cuts totaling 71,000 in their operations across the world. Incidentally, more than half of the job cuts have been announced in May alone.


Individually, the Anglo-Dutch food and cosmetics giant Unilever last week said it plans to cut 500 jobs in Britain as part of a restructuring program. In addition, it would also see some posts outsourced to India.


In the same week, Nokia said it plans to reduce its workforce by about 10,000 people worldwide by the end of 2013 as the struggling company fights strong competition. The measure is aimed at additional cost savings of 1.6 billion euros (about $ 2 billion) by the end of next year.


SKF also said it would slash around 400 jobs in Germany as part of cost cutting measures due to weakening business sentiment in India, China and European countries.


Announcing the job cuts earlier this month, Logitech International said it would eliminate approximately 450 positions, or 13 per cent of its worldwide workforce in a bid to save $ 80 million in annual operating costs.


Olympus Corp, which employs over 40,000 employees globally, this month said it would axe 2,700 jobs worldwide, or seven per cent of its workforce, in the next two years. The move is part of the company's effort to boost its profitability.


In May, HP said it would layoff about 27,000 employees globally over the next two years as part of restructuring move to stem up declining profits and revenues.


The tech firm said workforce reduction would generate an annual savings in the range of $ 3-3.5 billion by the end of the 2014 fiscal year.

06 April, 2012

Latest Technical Seminar Presentation Topics for Computer science | Electronics | Electrical | Mechanical | Civil | MCA

  • 3D Face Monitoring
  • 3G Network
  • A Digital Speech Effects Synthesizer
  • A personal voice library
  • A Probabilistic Approach to Micropayment
  • A software suite for periodicity characterization of DNA sequences
  • Adding Intelligence to Internet
  • Advanced Encryption Standard
  • Advanced GAMP for Plant weave Technologies
  • Advanced Queue Management Techniques
  • Aeronautical Communications
  • Agent based modeling of electricity markets
  • Agent Mediated E-commerce
  • Agile Software development
  • Aircars
  • Aircraft GPS Tracking
  • Ambiophonics
  • AMD Processors
  • An Electric Bicycle
  • An iPhone application for visualizing pollution maps
  • Analysis of Minimum Energy Performance Standards (MEPS) for Domestic Electrical appliances
  • Analysis on Performance of Freeware Tools
  • Android OS
  • Android apps
  • Animatronics
  • Antenna Analysis Using Wavelet Representations
  • Anti-Jamming wireless systems
  • Application of ANN in Data Mining of Medical Images
  • Application of Genetic Algorithms in Network routing
  • Application of LED for Domestic Applications
  • Applications of Graph Theory to Metabolic Pathways
  • Applications of Soft Computing in Medical Image Analysis
  • Applications of speech recognition
  • Approximate string matching for Music retrieval
  • ARQ Schemes for Wireless Data Communications
  • Artificial Eye
  • Artificial immune system.
  • Artificial Intelligence in Machines
  • Artificial intelligence for speech recognition
  • Artificial Neural Networks
  • Aspects of Database Security and Program Security
  • Aspect-oriented programming
  • ATM networks
  • Attacks on Smart Cards
  • Augmented Virtual Reality
  • Authentication and securing the systems
  • Authoring environments for open source courseware
  • Automated Network Address Assignment
  • Automated Software Testing of Applications
  • Automatic Device Driver Synthesis From Device Specifications
  • Automatic sound-based user grouping for real time online forums
  • Automatic Video Surveillance Systems
  • Autonomic Computing
  • Automatic number plate recognition
  • Auto-pilots
  • Backup and Recovery planning
  • Bandwidth estimation in broadband access networks
  • BAR CODES
  • BEANS
  • Bidirectional Power Control for hybrid vehicles
  • Bimolecular Computers
  • Bio metrics IRIS technique
  • Bio sensors (photonics)
  • Biochips
  • BioComputers
  • Bio-Medical Instrumentation and Signal analysis
  • Biometric Security
  • Biometric Technology
  • Biometrics Based Authentication
  • Bio metrics IRIS technique
  • Bio-Molecular Computing
  • Bio Telemetry
  • Bionic eye possible path toward artificial retina
  • Bit And Bytes
  • Blade Servers
  • Blogs & their Creation
  • BLOW FISH
  • Blue Gene
  • Blu-ray disc
  • Blue sat Communications Protocol
  • Blue-sat Radio Switching Circuit
  • Bluetooth
  • Bluetooth Based Smart Sensor Networks
  • Botnet
  • Brain computer interface
  • Brain Finger Print Technology
  • Brian Gate Technology
  • Broad Band Over Power Line
  • Broadband via satellite to Rural Areas
  • Cable Modems
  • Capability Maturity Model Programming (CMM)
  • Capacity of Ad-hoc Wireless Networks
  • CAPTCHAs
  • Capturing packets in secured networks
  • Carbon nano tube electronics
  • Carnivore an fbi packet sniffer
  • CASP
  • CD, DVD, IRD
  • CDMA Wireless Data Transmitter
  • Cellonics Technology
  • Cellular Communications
  • Cellular Digital Packet Data
  • Cellular geolocation.
  • Cellular Neural Network
  • Cellular technologies and security.
  • Censoring private information from network packet traces
  • Channel Allocation Algorithms for Mobile Telephony
  • Channel Coding and Decoding for Mobile Communications
  • Channel Estimation in MIMO Systems
  • Characterization of Piezoelectric Elements
  • Chess Algorithm
  • Choreography
  • Circuit and safety analysis system
  • Classification, Clustering and Application in Intrusion Detection System
  • Classification, Clustering and their Application for Damage Detection in Mechanical
  • Clustering Enterprise Java
  • Cluster computing
  • Coding in high noise environments
  • Cold fusion
  • Collaborative Mobile Environments
  • Combined Input Output Queued Switches
  • Compact peripheral component interconnect (CPCI)
  • Compliers and its working
  • Compression and distribution of volumetric data sets
  • Computational Geometry in Drug Design
  • Computational Intelligence and Linguistics
  • Computational neuroscience
  • Computational Photography
  • Computer Forensics
  • Computer Viruses(Malwares, Trojons, Spywares)
  • Computerized Paper Evaluation using Neural Network
  • Concurrent Programming and Parallel distributed O.S.
  • Condition Monitoring of Power System Equipment
  • Conditional Access System
  • Content Management Systems(WordPress, Joomla, Drupal etc)
  • Continuously variable transmission (CVT)
  • Control & Signal Processing Techniques in Financial Engineering
  • Control and Optimization Methods in Communication Networks
  • Control of a 3-d overhead crane
  • Control of heterogeneous networks
  • Control System Wireless Interface
  • Controlled multimedia recording environment for lectures and 3D.
  • Controller design for a helicopter model
  • Cooperative Adaptive Cruise Control
  • Co-operative LINUX
  • corDECT Wireless in Local Loop System
  • Cross Platform Component Object Model
  • Crusoe Processor
  • Cryogenic Processor
  • Cryptography and N/W security
  • Cryptovirology
  • CSS and DeCSS
  • CT SCANNING
  • Cyberterrorism
  • Data Mining for Condition Monitoring of Power System Equipment
  • Data mining through Active Learning
  • Data over Cable System (DOCSIS)
  • Data Pre Processing
  • Data Security in Local Network using Distributed Firewalls
  • Data ware hosuing & mining
  • DataBase Migration
  • Dataflow machines
  • Datagram Congestion Control Protocol (DCCP)
  • Dataset Query algorithms in Streaming Mining
  • Delay-Tolerant Networks
  • Dense wavelength division multiplexing
  • Design & Implementation of a dual purpose microphone array.
  • Design and development of a programmable alarm system
  • Design and development of high-power white LED lighting system
  • Design of 2-D Filters using a Parallel Processor Architecture
  • Design of a wireless sensor board for measuring air pollution
  • Design of Amplifier for recording of Nerve Signals
  • Design of an all Electric Steering Wheel
  • Design of diamond-based Photonics devices
  • Design of IC Amplifiers for touch Sensors
  • Design of Low Density Parity Check Codes
  • Design, analysis, fabrication and testing of a composite leaf spring
  • Determination of efficiency of the Permanent Magnet Motors
  • Developing a own server system
  • Development and Control of Humanoid robot
  • Development of a Broadband Tunable Fiber Laser
  • Development of a New Sensor for Detecting Partial Discharge Induced Pressure
  • Development of a wind-turbine simulator
  • Development of new sensors for online monitoring of partial discharges
  • Digit recognition using neural network
  • Digital Audio Broadcasting
  • Digital Audio Effects Control by Accelerometry
  • Digital Audio’s Final Frontier-Class D Amplifier
  • Digital Camera Calibration and Inversion for Stereo iCinema
  • Digital hubbub
  • Digital Neurons for Digital Brains
  • Digital Signal Processing and their applications
  • Digital silhouettes
  • Digital theatre system
  • Digital Video Editing
  • Direct to home television (DTH)
  • Direct to Home Television (DTH)
  • Direct Torque and Flux Control of IPMSM
  • Distance learning systems
  • Domain name servers [DNS]
  • Driving Optical Network Evolution
  • Dual Energy X-ray Absorptiometry
  • Dynamic Cache Management Technique
  • Dynamic Memory Allocation(malloc, calloc, NEW etc)
  • Dynamic resource allocation in Grid Computing
  • Dynamic source routing protocol
  • Dynamic Virtual Private Network
  • Earth Simulator- Fastest Supercomputer
  • Effects of large scale integration of PV systems on the distribution network
  • Efficiency / Comparative study of routing schemes in event based systems
  • Electromagnetic Applications for Mobile and Satellite Communications
  • Electromagnetic launching system
  • Electromagnetic processor fabrication
  • Electronic nose & its application
  • Elliptical Curve Cryptography(ECC )
  • Embedded Configurable Operating system
  • Embedded system in automobiles
  • Embedded systems and VLSI an architectural approach to reduce leakage energy in memory
  • Embedded web server for remote access
  • Embryonics approach towards integrated circuits
  • Emergency Health Care System
  • Emerging trends in robotics using neural networks
  • E-MINE: A novel web mining approach
  • Encrypted Hard disks
  • Encrypted Text chat Using Bluetooth
  • Encryption Decryption Methods
  • Energy-efficiency and Layer Integration in Wireless Networks
  • Enterprise Security
  • Equalization of room acoustics for audio reproduction
  • Ethernet Passive Optical Network
  • E-Toll tax fixing
  • Evolution Of Embedded System
  • eXtensible Bindings Language (XBL )
  • Face detection technology
  • Facility Layout Design using Genetic Algorithm
  • Falls detection using accelerometry and barometric pressure
  • Fast Convergence Algorithms for Active Noise Controlling Vehicles
  • Fault Tolerance in Virtual Machine Environments
  • Fault tolerant Routing in Mobile Ad-Hoc Network
  • Ferroelectric RAM
  • Fine Grained DataBase Security
  • Fine-grained Access Control in Databases
  • FinFET Technology
  • Fingerprint recognition system by neural networks
  • Finite Element Interface (FEI)
  • Flexible CRT Displays
  • Fluorescent Multilayer Disc (FMD)
  • Fluorescent Multilayer Optical Data Storage
  • Forecasting Wind Power
  • Fractal image compression
  • Fractal robots
  • Free Space Laser Communications
  • fully digital class-D amplifiers
  • Fully Integrated Amp-Meter for Electrical Simulators
  • Functional Magnetic Resonance Imaging
  • Fusion Memory
  • Future of the internet
  • Future Programming Techniques and Concepts
  • Fuzzified Computer-Automated Crane Control System
  • Fuzzy Logic Control for complex systems
  • Gaming Consoles
  • Gaming interfaces applied to videoconferencing
  • General Packet Radio Service (GPRS)
  • Generic visual perception processor
  • Geographic information system
  • Geometric Invariants in Biological Molecules
  • Gigabit networking
  • GIS tools for web applications
  • Global positioning response system
  • Global Positioning System
  • Global System for Mobile Communication (GSM)
  • Google Android- Mobile OS from Google
  • GRASSHOPPER Operating System
  • Groupware Technology
  • GSM Security And Encryption
  • Handfree driving [auto]
  • Hardware EDAC for Harsh Environments
  • Hardware implementation of background image modeling
  • HAVi: Home Audio Video Interoperability
  • Hawk Eye – A Technology in sports
  • High Altitude Aeronautical Platforms
  • High Performance Clusters
  • High Performance Computing
  • High Performance DSP Architectures
  • High Speed Circuits for optical Interconnect
  • High Speed Data In Mobile Networks
  • High speed lans  or Internet
  • Holographic Data Storage
  • Holographic Memory
  • Holographic Versatile Disc
  • Holt-Winters technique for Financial Forecasting
  • HomeRF and Bluetooth: A wireless data communications revolution
  • Hot Spot Technology
  • Hyper thread imax
  • Hyper thread technology
  • Hyper Transport Technology
  • IC Amplifier Design for Touch Sensors
  • Image transmission over WiMax Systems
  • Image Watermarking
  • Implantable on-chip Power Supplies
  • Improving tcp performance over mobile ad hoc networks
  • Industrial Applications using Neural Networks
  • Information Extraction from structured & Semi-structured data
  • Information Extraction modes & techniques
  • Infrared Remote Control
  • Innovative Application Development using J2EE Architecture
  • Integrated Circuit Design for Biomedical Applications
  • Integrated Optical Chip Design
  • Integrated Voice and Data transfer & handling
  • Integrating Structural Design and Formal Methods in Real Time System Design
  • Integrating Wind Power into the Electricity grid
  • Integration of Parallel Database in a Service Oriented Architecture
  • Integration of wind and solar energy in smart mini grid
  • Intel centrino mobile technology
  • Intel MMX Technology
  • Intelligent calling bell
  • Intelligent navigation system
  • Intelligent Patient Monitoring System
  • Intelligent RAM : IRAM
  • Intelligent Software Agents
  • Interactive Voice Response System
  • Internet Access via Cable TV Network
  • Internet architecture and routing
  • Internet Protocol duplicate address detection and adaptation
  • Internet Protocol Television
  • Internet Telephony
  • Intrusion Detection System
  • Investigation into solar thermal/coal driven power stations
  • Investigation of the real-time implementation of learning controllers
  • IP spoofing
  • IP Telephony
  • iPhone 5
  • IPODS
  • Iris Scanning
  • iSCSI: The future of Network Storage
  • ISO Loop magnetic couplers
  • Java Cryptography Architecture (JCA)
  • Java Messaging Service (JMS)
  • Javaneans
  • JIRO Java-based technology
  • Landmines detection
  • Laptop Computer
  • Lazer Power Supply
  • Less characterization of ferro-magnetic material for non-sinusoidal excitation
  • Light emitting polymers
  • Light Interception Image Analysis
  • Light Tree
  • Lightning Protection Using LFAM
  • Liquid Crystal on Silicon Display (LCOS)
  • Location estimation and trajectory prediction for PCS networks
  • Long baseline motion estimation
  • Lotus Notes/Domino
  • Low power filter design for mobile communication
  • Low Power UART Design for Serial Data Communication
  • Low-Power Microelectronics for Biomedical Implants
  • Low-Power Oscillator for Implants
  • Magnetic Random Access Memory
  • Managing Data In Multimedia Conferencing
  • Mango- new mobile from Microsoft
  • Micro chip production using extreme uv lithography
  • Microsoft NetMeeting
  • Middleware for Wireless Sensor Networks
  • Middleware in Embedded Systems
  • Migration from GSM network to GPRS
  • Mining the Web: Searching, Integration and Discovery
  • Mobile Virtual Reality Service
  • Mobility Modeling and trajectory prediction for next generation PCS networks
  • Modeling of current spread through electrode geometries in implantable hearing device
  • Modeling of wind turbine system for an Interior Permanent magnet generator
  • Modems and ISDN
  • Moletronics- an invisible technology
  • Multi Protocol Label Switching
  • Multi user Scheduling for MIMO broadcasting
  • Multiple client’s communication
  • Multiple Domain Orientation
  • Multisensor Fusion and Integration
  • Navigation of Mobile Wheeled Robots
  • Nerve Signal Measurement Electronics for Biomedical Implants
  • Network Attached Storage (NAS)
  • NVSRAM- Non Volatile Static RAM
  • On Traffic Types and Priority Functions in Switched LAN Networks
  • OpenGL-application programming interface
  • Optical Burst Switching
  • Optical coherence tomography
  • Optical to electrical converter for optical interconnect
  • Optimization of Ad Hoc Wireless Sensor Networks
  • Optimization of Protocol Stack for wireless networks
  • Oracle RDBMS
  • Organic LED
  • Outdoor High Voltage Insulators
  • Ovonic Unified Memory
  • Personal Satellite assistant Systems
  • PH Control Technique using Fuzzy Logic
  • Phone Busy Indicator
  • Pivot Vector Space Approach in Audio-Video Mixing
  • Plastic chips & electronics
  • Pluggable Authentication Modules (PAM)
  • POF Tunable Fiber Laser
  • POP – Plaster Of Paris
  • Power Efficiency and Security in Smart Homes
  • Proactive Anomaly Detection
  • Prototype System Design for Telemedicine
  • Public Key Encryption and Digital Signature
  • QoS in Cellular Networks Based on MPT
  • QoS in Networking using active Networks
  • QOS in software server Firewalls
  • Quad-Core Processors
  • Radio Frequency Identification (RFID)
  • Real time communication in wireless sensor networks
  • Real Time Operating Systems on Embedded ICs
  • Real Time Speech Translation
  • Real Time Systems with Linux/RTAI
  • Real-time JPIP for Interactive Multimedia
  • Reliable and Fault Tolerant Routing on Mobile Ad Hoc Network
  • Renovating the Address Resolution Protocol (ARP)
  • Revolutions in the Operating System and Servers
  • Robotic Surgery
  • Room Equalization for Audio Reproduction
  • Ruby on Rails [RoR]
  • S/w life cycle/affiliated programs
  • SALT (Speech Application Language Tags)
  • Sand Box Technology
  • Scheduling design for wireless data networks
  • Securing the wireless network from unwanted exposure
  • Security of Open-Source Software
  • Security On Wireless LAN Adaptive cruise control
  • Security threats in the World Wide Web
  • Sensor fusion for video surveillance
  • Sensors on 3D Digitization
  • Session Initiation Protocol (SIP)
  • Shallow water Acoustic Networks
  • Short Message Service (SMS)
  • Significance of real-time transport Protocol in VOIP
  • Simulating Quantum Cryptography
  • Simulation of  low-power converter for electromagnetic vibration driven generator
  • Single photon emission computed tomography
  • Smart camera for traffic surveillance
  • Smart Cameras in Embedded Systems
  • Smart Fabrics
  • Snickometer – A tool
  • Socket Programming
  • Software advances in wireless communication(Cognitive Radio, Dynamic spectrum Access etc. )
  • Software Testing & Quality Assurance
  • Space Mouse
  • Space Robotics
  • Spectrum Sharing in Cognitive Radio Networks
  • Speech Enhancement for Cochlear Implants
  • Speech Enhancement for Mobile Applications
  • Speech transmission over WiMax systems
  • Speed Detection of moving vehicle using speed cameras
  • SPINS -Security Protocol For Sensor Network
  • Split Range Synchronization
  • Stealth Virus
  • SUNSPOT (wireless sensor network )
  • Surface-conduction Electron-emitter Display (SED)
  • Swarm intelligence & traffic Safety
  • Synchronous Optical Networking
  • Synthetic Aperture Radar System
  • Systems Control for Tactical Missile Guidance
  • Tele-immersion
  • Temperature controller [censored] indicator
  • Terrestrial Trunked Radio
  • Testing methods (Stress, Black-Box, White-Box, Performance Testing etc )
  • The Architecture of a Moletronics Computer
  • The potential impacts of electric vehicles on the local distribution network
  • The Tiger SHARC processor
  • Thermal infrared imaging technology
  • Thought Translation Device (TTD)
  • Time Shared O.S.
  • Tracking and Positioning of Mobiles in Telecommunication
  • Trends in Compiler Construction
  • Ubiquitous Networking
  • Ultra Low-Power Microphone Pre-Amplifier
  • Ultra Low-Power Radio Receiver for Biomedical Applications
  • Ultrasonic detector for monitoring partial discharge
  • Ultra-Wideband Communication
  • UMA (Unlicensed Mobile Access )
  • Vector – LDPC Codes for 3G Fading Channels
  • VHDL (VHSIC Hardware Description Language)
  • Video conference System
  • Virtual Private Networks(VPNs)
  • Virtual LAN Technology
  • Virtual Surgery
  • Visual Neuro Prosthetics
  • Voice Routing over IP Telephony
  • Voice Over Internet Protocol
  • VOIP Security
  • VOIP Over Wireless LAN
  • VQ In Converging Telephony And Ip Networks
  • Waterfall model and its steps
  • Watermarking Digital Audio
  • Web Designing with HTML and CSS
  • Wideband Spectrum Sensing for Cognitive Radio Systems
  • Wireless Computer Communications Using Sound Waves
  • Wireless Relay Communication
  • Wireless Sensor Network Security
  • Working of Search engines
  • X-By-Wire System , Communication Bus perspective
  • X-Internet
  • ZFS File system