Tuesday, November 20, 2012

Accessing internet through text messages

Accessing internet through text messages
it's not necessary to have internet connection on your phone to access the web. A mere text message sent to a particular number can get you basic data from sites like Google and Wikipedia. Text-based applications also provide information like live update of cricket scores.

Companies like txtWeb, Google and Innoz Technologies have such services.

At the heart of the technology is adoption of a different method to access the internet. These services are popular because of three reasons: one, majority of mobile phones in India are low-end ones with just 'talk-and-text' features; two, many people who have smartphones don't have a data plan; and three, those who have data plan, use it sparingly considering poor bandwidth and high cost.

In txtWeb, the keywords have to be sent to 9243342000. For example, to see the Wikipedia entry on Diwali SMS '@Wikipedia Diwali'. @cricket gives you the latest scores of cricket matches.

You can get the autorickshaw fare between two locations in a city -- for example, send '@auto fare Bangalore, Koramangala, M G Road'. Users can text 'help' or 'txtweb', to get a list of top apps, featured apps etc. The response sent to the user also contains many tips on how to make better use of the platform, says Manish Maheshwari, director, txtWeb.

Randomly sending a keyword also provides a list of applications related to that subject. Besides, a complete list of all the apps is available at 'txtweb.com/ apps'.

Google has 'SMS applications', wherein simple queries can be answered by sending an SMS to 9773300000. For example, to know how much is one dollar in rupee, text "1 dollar in INR". Similarly, by texting "Bangalore weather", you get information like temperature, humidity, windspeed, sunrise time etc.

If you want the definition of a word, say, inflation, send an SMS 'what is inflation'. Flight status and list of trains running between two stations too can be obtained by this service.

Another company working in this field is Innoz Technologies. It has developed an innovative operating system for mobiles that enables access to internet through SMS. All that users have to do is to send the keyword to 55444 to get the answer. The company is in talks with mobile phone manufacturers to have the Innoz OS preinstalled in basic phone models.

Samsung Galaxy S III

Now, a pen with a memory


Now, a pen with a memory

 

Now, a pen with a memory
Anyone who has tried to take notes on a tablet knows how tricky it can be. Seeking to cater to fans of ink and paper, Livescribe has created the Sky smartpen, a writing tool with a tiny computer inside that records notes written on special microdot paper. The notes are sent wirelessly to a personal account through a partnership with Evernote, the digital archive service.

The pen has up to 8GB memory. It also records audio, which can be beneficial for meetings and lectures. Users can playback moments of the audio by touching the pen at the corresponding spot in the handwritten notes.

Sky includes 500MB of free storage through Evernote. Once in the cloud, the notes and audio are accessible on any computer, or any iOS or Android mobile device.

The pen comes with an extra ink cartridge, two caps, a notebook of microdot paper and a micro-USB cable for charging. The Sky pen and accessories , including extra notebooks, are available online at Amazon.com and Livescribe's website, as well as at retailers like Staples and Best Buy. I tested the four-gigabyte Sky pen, which costs $200, and found it easy to set up and use.

Instead of buttons, the pen's functions are listed in the notebook ; just touch the pen to the command you want. The pen, al- though chunky, felt comfortable in my hand when I was writing or doodling. And syncing through Wi-Fi to my Evernote account was effortless. I was able to see the notes quickly on my iPad and iPhone; however, I could not open the Livescribe player on my PC at work to play the audio.

Livescribe is working to iron out a few wrinkles, but the Sky smartpen could end up bridging the gap between paper and tablet.

Sunday, September 23, 2012

this video shows how to create a website by ourseleves

Friday, March 16, 2012

5 PEN PC TECHNOLOGY

P-ISM (“Pen-style Personal Networking Gadget Package”), which is nothing but the new discovery, which is under developing, stage by NEC Corporation. P-ISM is a gadget package including five functions: a pen-style cellular phone with a handwriting data input function, virtual keyboard, a very small projector, camera scanner, and personal ID key with cashless pass function. P-ISMs are connected with one another through short-range wireless technology. The whole set is also connected to the Internet through the cellular phone function. This personal gadget in a minimalist pen style enables the ultimate ubiquitous computing.


ISM:
P-ISM is a gadget package including five functions: a pen-style cellular phone with a handwriting data input function, virtual keyboard, a very small projector, camera scanner, and personal ID key with cashless pass function. P-ISMs are connected with one another through short-range wireless technology. The whole set is also connected to the Internet through the cellular phone function. This personal gadget in a minimalistic pen style enables the ultimate ubiquitous computing.

The P-ISM system was based on "low-cost electronic perception technology" produced by the San Jose, California, firm of Canesta, Inc., developers of technologies such as the "virtual keyboard" (although the last two pictures shown above appear to be virtual keyboard products sold by other companies such as VKB rather than components of the P-ISM prototype).

Wednesday, February 29, 2012

Emerging Technologies 2011-12:

Technology is moving too fast, we see change in products every year with new features or new products with new technologies. 4G, aka 4th Generation in wireless communication systems, an attention getter to every single person related to Networks around the world. 4G wireless technology promises higher data transfer rates and expanded multimedia services. 4G technologies combine WiFi and WiMax. For cellular networks 4G runs at sped ranging from 100 Mbps and for local WiFi speeds ranging from 1 Gbps. It provides framework that merge that existing cellular technology with wireless access systems. The Internet is the driving force for higher data rates and high speed access for mobile wireless users. To achieve that maximum speed 4G technology is being implemented in smart phone and other computing devices.

Semantic Web, a web of data that allow machines to understand that meaning of data or information written over the World Wide Web. Semantic web technologies are making new horizons for the web users. Semantic web data is a part of web data over World Wide Web which is able to process independently of application, domain or any platform. Data stored on webs in the form of documents that cannot be readable or understandable by the computers. User want to search something over the internet, search engine will display all the content whether relevant or irrelevant for user. User have to find again relevant data whereas, in semantic technologies computer reads the word or phrase searched a user using search engine and produce the specific relevant result by the means of artificial intelligence techniques.

In web development area HTML5/CSS both are emerging technologies. HTML5 use the new semantic elements, like Header, Footer, Section, and Aside. Many others, like hgroup, aside, and figure, are logical additions and enhancements to the existing elements of HTML. The special effects in Photoshop design can be converted into web pages in HTML5 without using any JQuery and JavaScript. Audio and video tags in HTML5/CSS make easier for the developers to add audio and video to the web page easiest than ever. They can style theses tags according to their design without any hesitation just like any other normal tag.

For permanent data storage M-Disc technology will be launched in the market soon for commercial purposes. It is a scratch proof disc and can store data for more than 1,000 years into a stone-like metals and metalloids. Normal CDs and DVDs face loss of data in humidity and in high temperature whereas M-Disc is capable to prevent loss of data in such conditions. M-Disc current available storage capacity is 4.78 GB DVD. It cannot be burn in normal writers, 5X stronger laser burners are required to burn M-Disc. But, can be read by normal DVD players as backward compatible technology is used.
Technology is updating in flash, it is hard to keep up with IT trends as it goes a head. But if your are tech savvy there is nothing that can keep you of it.

Monday, February 27, 2012

Install windows7 through pen drive

Here is a small and working tutorial to install windows 7 from a bootable USB or Pendrive. These days most of them have a USB or Pendrive. So why don’t you try this trick. . Installing Windows 7 using a pendrive is very much faster than that from DVD/CD. You just need to follow some small steps to do this. You can keep this pendrive/USB drive for future installation of Windows 7. If you are a beginner or dont want to get messed up by typing in all commands, here is a Free Utility To Create A Bootable USB To Install Windows 7, Vista & Server 2008. This tool will help you to automate the process of bootable pendrive’s and you can install windows 7 from pendrive easily. If not you can follow this guide to install windows 7 from a pendrive.

Make sure you have a Pendrive or USB drive with a minimum of 4 GB space and you have the Windows 7 installation DVD. This tutorial is best suited if you have a Windows 7 DVD with you else you need to change it Link

  1. Format the Pendrive or USB drive in NTFS format first.
  2. From the start menu right click on the command prompt and select “Run as administrator“.
  3. Now type the following commands (Press enter key after each command).
  4. diskpart. This is to open the disk partition program.
  5. Now to show the list of drives type list disk.
  6. You can see disk’s listed there. Note down the disk number of your pendrive eg. Disk .
  7. Now type SELECT DISK X (where X is the number you noted down for the pendrive from step 5)
  8. Now type CLEAN.
  9. Now type the following commands by pressing enter after each one.
  10. CREATE PARTITION PRIMARY
  11. SELECT PARTITION 1 (Assuming your pendrive/ USB drive is 1).
  12. ACTIVE
  13. FORMAT FS=NTFS
  14. ASSIGN
  15. EXIT(Now the disk partition program will exit). Now we need to give some more commands.
  16. Now insert the Windows 7 Installation DVD and to your DVD drive.
  17. Here i am assuming DVD drive as G and Pendrive as I.(Change it accordingly).
  18. Now type G:CD BOOT
  19. Now type this command BOOTSECT.EXE/NT60 I: to update your USB drive with bootmgr code.
  20. Finally copy all the contents from the Windows 7 DVD to your Pendrive. Make sure you don’t cause any errors.
  21. Plug / Insert your pendrive to your PC and restart the system.
  22. Now Enter the Bios system accordingly by pressing the key delete.(This may vary some times it will be F2 or F12. It depends on the type of your system. Any how during the start up your system will display which key to press to enter the Bios).
  23. Now select the USB/ Pendrive as the first boot driver.(Set the first boot priority to USB drive.).
  24. Now save the settings in Bios and restart and you will be able to Install Windows 7 using that pendrive.

Thursday, February 16, 2012

The Future Of Human/ Electronic Skin Technology

Merging and gives access to a new and upcoming technology. This has led to the development of a super thin and highly flexible material like a tattoo, embedded with a wireless electronic chip to be stuck on human skin. It’s applications are many, from monitoring health to even sending commands to human-machine interfaces like video games. The newly developed material/device is easily removable, as easily it’s stuck on the skin surface.

The device is designed to easily blend in with the mechanics of the human skin, where it can resist the natural vigor of twists, turns and stretches of the human skin, yet maintaining the functionality of the wireless circuitry. The research is being led by John A. Rogers, the Lee J. Flory-Founder professor of engineering at the University of Illinois.


http://www.youtube.com/watch?v=Ry0AkDPz5yw&feature=player_embeddedily it’s stuck on the skin surface.

Wednesday, February 15, 2012

Download SpeedBit Video Accelerator Premium Chttp://www.blogger.com/img/blank.gifomplete

the premium version has even more feature added to it. With SpeedBit Video Accelerator Premium, you can accelerate even the HD videos, which is not provided in the free version. Also, get all your favorite iTunes music, music videos, movies, and TV shows even faster. So download and install the premium version.

http://www.speedbit.com/downloads/

4-2 Management scinece Notes

http://www.ziddu.com/download/13514126/13Link-MANAGEMENTSCIENCEA2ZjntuSpecial.pdf.html

Tuesday, February 14, 2012

3-2 2nd mid online bits(I.T.)

Web Technologies
http://www.ziddu.com/download/14264998/WT_StudentsGola.pdf.html
computer Networks
http://www.ziddu.com/download/14264999/CN_StudentsGola.pdf.html
DWDN
http://www.ziddu.com/download/14265000/DWDM_StudentsGola.pdf.html
remaining bits will be updated

Strange Security: Hackers Could Set Your Printer on Fire from a Distance

It takes a creative mind to turn an otherwise innocent gadget into a looming security threat, but what's a hacker if not exactly that? You might not be particularly concerned that your printer could spell your demise, but a research team at Columbia University has demonstrated that not only can vulnerable printers be hacked remotely to snag personal information like credit card and Social Security numbers - they could even be made to self destruct...literally.

The research team, helmed by Columbia Professor Salvatore Stolfo and student Ang Cui, demonstrated the design flaw in a number of models of LaserJet printer manufactured by Hewlett Packard. They showed how infiltrating a printer remotely and flooding it with commands could overheat the part of a printer that dries ink, causing it to smoke, melt down, and potentially even start a fire. In another test, the group swiped a Social Security number from a scanned document and auto-published it to a Twitter feed, all by controlling the compromised device remotely.

To show how real the threat is, the team reverse-engineered the printer software - essentially breaking it down and building it back up. They discovered that the automated firmware updates on some older models essentially left the devices wide open. Firmware is the software that controls the internal workings of an electronic device, and it needs to be updated occasionally. The printers in question scan for new firmware through an automated process known as a remote firmware update, but they aren't discerning about what they download. By skipping a critical step for security known as digital signing, the calling card of safe, manufacturer-approved software, any able hacker could push malicious software onto a device by disguising it as a firmware update attached to a print request.

After lacing a document with malicious code, a hacker could install a custom built version of operating software in roughly 30 seconds. And as printers operate on such remedial software (compared to a computer or a smartphone), the bait and switch would be impossible to detect without dismantling the infected device. Once compromised, there's no simple way to un-hack a printer.

The researchers briefed HP on the vulnerability last week, and the company is likely scrambling to come up with a fix that will address the exploit. HP claims that post-2009 models require the crucial digital signature step, and pointed out that since the hack applies to laser printers, which are more common in office settings for bulk black and white printing, many home users would be unaffected. The researchers are now looking into printer models made by other manufacturers, and expect to be able to replicate the hack well beyond HP's pre-2009 LaserJet line.

While the hack might be alarming, the security community has been well aware of firmware loopholes like this one for years now. According to Brandon Creighton, a security researcher at Veracode with over a decade of experience, "You can find published research going back at least ten years. At the same time, the study they're presenting is significant because they've done the work in building a proof-of-concept exploit that actually demonstrates the vulnerabilities. That's a fair amount of effort, and most people don't do that."

And printers aren't unique targets: home routers, Voice Over IP (VoIP) devices, and ISP cable and DSL boxes are among the gadgets potentially exposed to the same method. While nothing is failproof, keeping your devices up to date with software directly from the manufacturer's website is a good measure against clever expllips)like(this one.

Seminars,Projects preferred websites

www.chennaisunday.comLink

Saturday, January 14, 2012

new seminar topics

Algorithm Design and Analysis

Ø A Probabilistic Approach to Micro payment

Ø Advanced Queue Management Techniques

Ø Agent Mediated E-commerce

Ø AJAX

Ø Ant Colony optimization for routing in Mobile and Adhoc Networks

Ø Application of ANN in Data Mining of Medical Images

Ø Application of Genetic Algorithms in Network routing

Ø Applications of Graph Theory to Metabolic Pathways

Ø Applications of speech recognition

Ø Applications of Soft Computing in Medical Image Analysis

Ø Artificial intelligence

Ø Aspects of Database Security and Program Security

Ø Attacks on Smart Cards


Ø Bio informatics

Ø Bio-Medical Instrumentation and Signal analysis

Ø Biometrics

Ø Biometric Authentication

Ø Blue-ray-disc

Ø Bot nets and security measures

Ø Brain finger printing


Ø Cellular technology

Ø Classification Techniques in Data Mining

Ø Climate change

Ø Clustering (Data Mining)

Ø Compressed Domain Processing And Video Information System

Ø Computational Geometry in Drug Design

Ø Code Division Multiple Access

Ø Cryptography

Ø Cyberterrorism

Ø Code division duplexing

Ø Cellular Digital Packet Data

Ø Computer clothing

Ø Cordect WLL

Ø CARBIN NANO TUBE ELECTRONICS

Ø CARNIVORE AN FBI PACKET SNIFFER

Ø CDMA

Ø CELLONICSTM TECHNOLOGY

Ø CELLULAR NEURAL NETWORKS

Ø CELLULAR DIGITAL PACKET DATA

Ø CIRCUIT AND SAFETY ANALYSIS SYSTEM

Ø CISCO IOS FIREWALL

Ø CLUSTER COMPUTING

Ø COLD FUSION

Ø COMPACT PCI

Ø COMPUTER AIDED PROCESS PLANNING (CAPP)

Ø COMPUTER CLOTHING

Ø COMPUTER MEMORY BASED ON THE PROTEIN BACTERIA

Ø CONCEPTUAL GRAPHICS

Ø CORRECT

Ø CORRECT WLL

Ø CRUISE CONTROL DEVICES

Ø CRUSOE PROCESSOR

Ø CRYOGENIC GRINDING

Ø CRYPTOVIROLOGY

Ø CT SCANNING

Ø CVT


Ø Data mining and ware housing

Ø Data mining through Active Learning

Ø Data set Query algorithms in Streaming Mining

Ø Distributed Garbage Collection

Ø Determining Global States of Distributed Systems

Ø Digital Video Editing

Ø Dynamic resource allocation in Grid Computing

Ø Delay-Tolerant Networks

Ø DEVELOPMENT OF WEARABLE BIO SENSOR

Ø Differentiated Services

Ø DWDM

Ø Digital Audio Broadcasting

Ø Digital Visual Interface

Ø Direct to home television (DTH)

Ø DOUBLE BASE NUMBER SYSTEM

Ø DATA COMPRESSION TECHNIQUES

Ø DELAY-TOLERANT NETWORKS

Ø DENSE WAVELENGTH DIVISION MULTIPLEXING

Ø DESIGN, ANALYSIS, FABRICATION AND TESTING OF A COMPOSITE LEAF SPRING

Ø DEVELOPMENT OF WEARABLE BIO SENSOR

Ø DGI SCENT

Ø DIFFFSERVER

Ø DIGITAL AUDIO BROADCASTING

Ø DIGITAL CONVERGENCE

Ø DIGITAL HUBBUB

Ø DIGITAL SILHOUETTES

Ø DIGITAL THEATRE SYSTEM

Ø DIGITAL WATER MARKING

Ø DIRECT TO HOME

Ø DISKLESS LINUX TERMINAL

Ø DISTRIBUTED FIREWALL

Ø DSL

Ø DTM

Ø DWDM

Ø DYNAMIC LOADABLE MODULES

Ø DYNAMICALLY RECONFIGURABLE COMPUTING


Ø ELECTROMAGNETIC INTERFERENCE

Ø Embedded system in automobiles

Ø Extreme Programming

Ø EDGE

Ø ELECTROMAGNETIC LAUNCHING SYSTEM

Ø E BOMB

Ø E INTELLIGENCE

Ø E PAPER TECHNOLOGY

Ø ELECTRONIC DATA INTERCHANGE

Ø ELECTRONIC NOSE

Ø EXTREME PROGRAMMING

Ø EXTREME ULTRAVIOLET

Ø ELECTRONIC NOSE & ITS APPLICATION

Ø ELECTRONICS MEET ANIMALS BRAIN

Ø EMBEDDED

Ø EMBEDDED DRAM

Ø EMBEDDED LINUX

Ø EMBRYONICS APPROACH TOWARDS INTEGRATED CIRCUITS

Ø EMNA

Ø EUVL

Ø EXT3

Ø E-WASTE-WHITEINDUSTRIALPOLLUTION

Ø ETHICAL Hacking


Ø Ferroelectric RAM

Ø Fluorescent Multilayer Disc

Ø Face detection technology

Ø FSO transmitter

Ø FACE RECOGNITION TECHNOLOGY

Ø FIREWIRE

Ø FRACTAL IMAGE COMPRESSION

Ø FRACTAL ROBOTS

Ø FRAM

Ø FREE SPACE OPTICS

Ø FREQUENCY SHIFT KEYING

Ø FUTEX

Ø Formal verification of systems

Ø Frequent Item Set Mining


Ø Ga m i n g c o n s o l e s

Ø GMPLS

Ø GSM Security And Encryption

Ø Guided Missiles

Ø Green engine

Ø GAMING CONSOLES

Ø GENERAL PACKET RADIO SERVICE

Ø GENETIC PROGRAMMING

Ø GEOGRAPHIC INFORMATION SYSTEM

Ø GLOBAL POSITIONING SYSTEM

Ø GLOBAL SYSTEM FOR MOBILE COMMUNICATION (GSM)

Ø GMPLS

Ø GRAPHICS PROCESSING UNIT

Ø GREEN ENGINE

Ø GRID COMPUTING

Ø GENERAL PACKET RADIO SERVICE

Ø GRAPHICS PROCESSING UNIT

Ø Geometric Invariants in Biological Molecules

Ø green IT


Ø H.323

Ø HALO NETWORK

Ø HANDFREE DRIVING

Ø HANS

Ø HIGH ALTITUDE AERONAUTICALl PLATFORM STATIONS

Ø HIGH AVAILABILITY LINUX CLUSTERING

Ø HIGH TEMPERATURE SUPERCONDUCTORS

Ø HIGH-AVAILABILITY POWER SYSTEMS

Ø HOLOGRAPHIC MEMORY

Ø HP JAVA

Ø HTAM

Ø HUMAN COMPUTER INTERFACE

Ø HURD

Ø HVAC

Ø HYDRO DRIVE

Ø HYPER THREADING

Ø HYPER TRANSPORT TECHNOLOGY

Ø HYPERTEXT PREPROCESSER (PHP)

Ø HY-WIRE CAR

Ø H_323

Ø High Altitude Aeronautical Platforms

Ø Home Networking

Ø Holographic memory

Ø Hyperthreadimax

Ø high speed data

Ø Honeypots

Ø Hp Java

Ø Human Computer Interface

Ø Hurd

Ø human computer interface


Ø InfiniBand

Ø Intelligent calling bell

Ø INFINITE DIMENSIONAL VECTOR SPACES

Ø Intel MMX

Ø INTRUSION DETECTION SYSTEMS

Ø Ipv6 - The Next Generation Protocol

Ø Iris Scanning

Ø I MODE

Ø IDC

Ø IDS

Ø ISI

Ø IGCT

Ø IMAGE AUTHENTICATION TECHNIQUES

Ø IMAX

Ø INFINI BAND

Ø INFINITE DIMENSIONAL VECTOR SPACES

Ø INTEGRATED POWER ELECTRONICS MODULE

Ø INTEGRATION OF INFORMATION TECHNOLOGY IN MACHINE TOOLS

Ø INTEL CENTRIC MOBILE TECHNOLOGY

Ø INTEL MMX

Ø INTELLIGENT NAVIGATION SYSTEM

Ø INTELLIGENT NETWORK

Ø INTELLIGENT SOFTWARE AGENTS

Ø INTERACTIVE VOICE RESPONSE SYSTEM

Ø INTERNET ARCHITECTURE AND ROUTING

Ø IP SPOOFING

Ø IRIS SCANNING

Ø ISOLOOP MAGNETIC COUPLERS

Ø ITANIUM PROCESSOR

Ø Integrated Power Electronics Module

Ø Integration of information technology in machine tools

Ø INTEL CENTRINO MOBILE TECHNOLOGY

Ø Interactive Voice Response System

Ø image processing

Ø Information Extraction

Ø Information Extraction from structured & Semi-structured data

Ø information security

Ø Intelligent Patient Monitoring System

Ø Introduction to Speech Recognition

Ø iris scanning


Ø JAVA CARD

Ø JAVA MESSAGE SERVICE

Ø Java ring

Ø Josephson junction

Ø Java Security


Ø KIRLIAN PHOTOGRAPHY

Ø LANDMINES DETECTION

Ø LASER & SATELLITE GUIDED STRIKERS

Ø LASER COMMUNICATION

Ø LED WIRELESS

Ø LIGHT EMITTING POLYMERS

Ø LIGHTNING PROTECTION USING LFA-M

Ø LIGHT-TREE

Ø LINE REFLECT REFLECT TECHNIQUE

Ø LINTO

Ø LINUX IN EMBEDDED SYSTEMS

Ø LMDS

Ø LOW POWER UART DESIGN FOR SERIAL DATA COMMUNICATION

Ø LWIP

Ø Light controlled fan regulator

Ø Laser Communications

Ø Layer 3 switching

Ø Lazar communication

Ø LED WIRELESS

Ø LIGHT-TREE

Ø LIWIA3

Ø LRR

Ø LITHOGRAPHY

Ø look mup


Ø Managing Data In Multimedia Conferencing

Ø Microsoft Windows Distributed internet application architect

Ø Migration from GSM network to GPRS

Ø Minidisc

Ø Moct

Ø Modular Computing

Ø MPEG-7

Ø Mobile IP

Ø Molecular Electronics

Ø Multisensor Fusion and Integration

Ø MAGNETIC RAM

Ø MANAGING DATA IN MULTIMEDIA CONFERENCING

Ø M-COMMERCE

Ø MICRO ELECTROMECHANICAL SYSTEM (MEMS)

Ø MICRO ELECTRONIC PILL

Ø MICROSOFT PALLADIUM

Ø MICROSOFT WINDOWS DISTRIBUTED INTERNET APPLICATION ARCHITECT

Ø MIGRATION FROM GSM NETWORK TO GPRS

Ø MILLIPEDE

Ø MINI DISC

Ø MOBILE IP

Ø MOBILE TELEMEDICINE SYSTEMS

Ø MOCT

Ø MODULAR COMPUTING

Ø MODULAR ROBOTICS

Ø MOLECULAR ELECTRONICS

Ø MP3 ENCODING

Ø MPEG

Ø MPEG-7

Ø MRAM

Ø MULTI PROTOCOL LABEL SWITCHING

Ø MULTI SENSOR FUSION AND INTEGRATION

Ø MULTICAST

Ø MULTIMEDIA MESSAGING SERVICE (MMS)

Ø MULTITERABIT NETWORKS

Ø mems

Ø Mining Document Streams

Ø mobile computing 3g,4g

Ø Multi-application Framework for Smart Cards

Ø Multicast Routing

Ø Multi processor OS

Ø Multi Protocol Label Switching

Ø Multi-Relational Data Mining

Ø Nanotechnology

Ø NAS

Ø NVT

Ø NRAM

Ø NANOTECHNOLOGY

Ø NARROWBAND AND BROADBAND ISDN

Ø NAVBELT AND GUIDECANE

Ø NETWORK ATTACHED STORAGE (NAS)

Ø NEURAL NETWORKS AND THEIR APPLICATIONS

Ø NON VISIBLE IMAGING

Ø natural lang processing

Ø Network Security