Sie sind auf Seite 1von 3

SEMINAR TOPICS FOR MCA STUDENTS

TOTAL PAGEVIEWS MONDAY, DECEMBER 13, 2010

1. Tracking and Positioning of Mobiles in Telecommunication 2. Palmprint Authentication Application 3. Security in Mobile Database Systems 4. Multicasting in Ad Hoc Networks 5. Brain Finger Printing 6. Future of the internet 7. Computer vision 8. Raising Technologies 9. Open-Rar 10. Intrusion Detection System 11. Taxonomy of S/w Testing Tools 12. Power of Grid Computing 13. HomeRF- localized wireless technology optimized forthe home environment 14. Wireless Application Protocol 15. Computational Methods for Bankruptcy Prediction 16. Honey Pots 17. Next Generation Protocol (IPv6) 18. Peer 2 Peer Web Services 19. Embedded Auditors for Intrusion Detection 20. Recognition of VoIP Speech 21. Assisted GPS 22. Multiterabit Networks 23. Bio-metrics 24. Radio Network Controller for 3G mobile and wireless network devices 25. Software model checking 26. Fiber Optic technology 27. Algorithms and Computation Theories 28. Graphic processing Unit 29. Domotics 30. Cell Phones beyond Call & Sms 31. C Sharp (C#) 32. Image Water Marking 33. Intrution Detection System 34. Real-time Transport Protocol (RTP) 35. Digital photography & music 36. Fusion Memory 37. M Commerce 38. Wireless Technologies (bluetooth, 802.11x, IRDA) 39. Mobile Commerce 40. Load Balancing in Internet 41. Intel MMX Technology 42. VPN Server 43. Earth Simulator- Fastest Supercomputer 44. DNA Based computer 45. Expert Systems and decision making 46. S/w Testing Tools 47. Recent Trends in Cryptography 48. Technologies and successful applications for direct and multihop ad hoc networks 49. Zornbie Computers 50. Wireless Network Devices and digital convergence 51. Aspect-oriented programming (Aop) 52. Real Time Speech Translation 53. New Age Graphics 54. New Dimension of Data Security using Neural Networks and Numerical Functions 55. Diskless Network storage Controller 56. 4G- Wireless 57. Routing In Mobile Ad Hoc Networks

58. ATM Virtual connections 59. Voice Portals 60. NVSRAM- Non Volatile Static RAM 61. High Altitude Aeronautical Platforms 62. Artificial Intelligence and Neural Networks 63. Printed Memory Technology 64. Advanced Mobile Presence Technology 65. Future Programming Techniques and Concepts 66. 3D Internet 67. DART 68. Magnetic Random Access Memory 69. High Capacity Flash Chips 70. IRIS Recognization 71. Load Balancing in Parallel Computers 72. Agent Based Systems and Applications 73. Embedded web server for remote access 74. Mobile Tele Communication 75. Biometrics Authentication systems 76. Embedded web server for remote access 77. Adhoc Networks 78. Advanced Processors 79. Probabilistic I/o Automata 80. Mobile ad hoc network (MANET) 81. Near Filed Communication (NFC) 82. Rising Technology GIES 83. VQ In Converging Telephony And Ip Networks 84. Privacy Preserving Data Mining 85. Pocket Doctor 86. Java Card 87. News Groups 88. Fuzzified Computer-Automated Crane Control System 89. Infini band 90. UMA (Unlicensed Mobile Access) 91. Mind Reading Phones 92. Auto-pilot for IT systems 93. Blade Servers 94. Botnet Security Threats 95. Proactive computing 96. Information Extraction modes & techniques 97. The SAT (SIM Application Toolkit) 98. WBM(Web based mobile) 99. Nonvolatile Flash Memory 100. Self Healing Computers 101. GSM Security And Encryption 102. Embedded systems 103. Signal Integrity Fundamentals for Digital Design 104. i Planet 105. Digital Watermarking Applications and Advantages 106. HCI (Human Computer Interaction ) in software applications 107. Information or Data Visualizing Techniques

Posted by ROOPESHKUTTIKOL at 12:55 AM 0 comments Email This BlogThis! Share to Twitter Share to Facebook Share to Google Buzz

SATURDAY, DECEMBER 4, 2010

THIRD GENERATION MOBILE TECHNOLOGY

International Mobile Telecommunications-2000 (IMT-2000), better known as 3G or 3rd Generation, is a family of standards for mobile telecommunications defined by the International Telecommunication Union, which includes GSM, EDGE, UMTS, and CDMA2000 as well as DECT and WiMAX. Services include wide-area wireless voice telephone, video calls, and wireless data, all in a mobile environment. Compared to 2G and 2.5G services, 3G allows simultaneous use of speech and data services and higher data rates (up to 14.0 Mbit/s on the downlink and 5.8 Mbit/s on the uplink with HSPA+). Thus, 3G networks enable

network operators to offer users a wider range of more advanced services while achieving greater network capacity through improved spectral efficiency. The International Telecommunication Union (ITU) defined the third generation (3G) of mobile telephony standards IMT-2000 to facilitate growth, increase bandwidth, and support more diverse applications. For example, GSM (the current most popular cellular phone standard) could deliver not only voice, but also circuit-switched data at download rates up to 14.4 kbps. But to support mobile multimedia applications, 3G had to deliver packet-switched data with better spectral efficiency, at far greater bandwidths. PPT: 3g View more presentations from roopeshkkuttikol.

Posted by ROOPESHKUTTIKOL at 7:46 AM 0 comments Email This BlogThis! Share to Twitter Share to Facebook Share to Google Buzz

BARCODE TECHNOLOGY
A barcode is an optical machine-readable representation of data, which shows certain data on certain products. Originally, barcodes represented data in the widths (lines) and the spacings of parallel lines, and may be referred to as linear or 1D (1 dimensional) barcodes or symbologies. They also come in patterns of squares, dots, hexagons and other geometric patterns within images termed 2D (2 dimensional) matrix codes or symbologies. Although 2D systems use symbols other than bars, they are generally referred to as barcodes as well. Barcodes can be read by optical scanners called barcode readers, or scanned from an image by special software. The first use of barcodes was to label railroad cars, but they were not commercially successful until they were used to automate supermarket checkout systems, a task in which they have become almost universal. Their use has spread to many other roles as well, tasks that are generically referred to as Auto ID Data Capture (AIDC). Other systems are attempting to make inroads in the AIDC market, but the simplicity, universality and low cost of barcodes has limited the role of these other systems.
Posted by ROOPESHKUTTIKOL at 7:06 AM 0 comments Email This BlogThis! Share to Twitter Share to Facebook Share to Google Buzz

Home Subscribe to: Posts (Atom)


FOLLOWERS

Das könnte Ihnen auch gefallen