free download evan almighty english subtitle,evan almighty english subtitle,english subtitle for evan almighty, free download evan almighty english subtitle,evan almighty english subtitle,english subtitle for evan almighty,
DOWNLOAD HERE
Free aptitude solved question,all placement papers for free,gate material,gate books,bank exam material,free ebooks,LATEST HINDI SONGS,final year project,IEEE project,video tutorial,MP3 SONGS DOWNLOAD
ITALIAN JOB ENGLISH SUBTITLE
download italian job english subtitle,free download italian job subtitle,subtitle for italian job in english, download italian job english subtitle,free download italian job subtitle,subtitle for italian job in english.
DOWNLOAD HERE
DOWNLOAD HERE
GUZZARISH VIDEO SONGS DOWNLOAD
guzzarish video songs download,video songs for guzzarish download,free download guzzarish,guzzarish free download video,guzzarish video songs download,video songs for guzzarish download,free download guzzarish,guzzarish free download video,
TANCET 2011 BOOKS
TANCET 2011 Exam Books,2011 TANCET BOOKS,TANCET 2011 BOOKS,TANCET 2011 Exam Books,TANCET 2011 Exam Books,TANCET 2011,TANCET 2011 ,TANCET 2011,TANCET 2011.
There are many books available for the TANCET. Some books contain all the relevant topics while some books are on the individual topics. These books are meant not only for TANCET, but also for the other entrance exams. A list of books which may be helpful for the students in due course of their preparation for TANCET is given below:
List Of Book:
- TANCET MCA-Anna University by V.V.K.Subburaj
- TANCET MBA-Anna university by E.S.Ramasamy
- PRINCIPLES OF MICROCOMPUTERS AND MICROCONTROLLER ENGINEERING by Frederic M.Cady
- ENVIRONMENT AND ECOLOGY, R. Rajagopalan
- ELECTRIC CIRCUITS, David A. Bell
- NUMERICAL METHODS, Srimanta Pal
- MATHEMATICS COMPANION FOR SCIENCE & ENGINEERING STUDENTS, Jerome R. Breitenbach
- Elements of Power Electronics, Philip T. Krein
- DESIGN OF STEEL STRUCTURES, N. Subramanian
- ELECTRONIC DEVICES AND CIRCUITS, David A. Bell
- REMOTE SENSING AND GIS, B Bhatta
- BASIC ELECTRICAL ENGINEERING, Prasanta Kumar Satpathy
- Power System Analysis, T.K. Nagsarkar, M. S. Sukhija
- Materials Science for Electrical and Electronic Engineers, Ian Jones
- Principles of Architecture, G. Muthu Shoba Mohan
- Advanced Engineering Mathematics(Third Edition), Merle C. Potter, J. L. Goldberg, Edward Aboufadel
- Introduction to Fluid Mechanics ( SI Edition)Includes CD, Edward J. Shaughnessy,Jr, Ira M. Katz, and James P. Schaffer
- Elements of Electromagnetics, Matthew N.O. Sadiku
Some Important links:
Which are also provided below which may be beneficial for the students.
- http://www.annauniv.edu/index.php
- http://education.hosuronline.com/entrance
- http://tancet.ascenteducation.com/
- http://www.winentrance.com/entrance_exam
- http://www.aippg.net/forum/viewtopic.php
- http://coimbatore.kijiji.in/c-Services-T
- http://kovai.ascenteducation.com/
DOWNLOAD OPERATING SYSTEM BOOK
DOWNLOAD OS BOOK, DOWNLOAD OS BOOK FOR GATE 2011,DOWNLOAD OS BOOK FOR GATE,DOWNLOAD OS BOOK,DOWNLOAD OS BOOK,DOWNLOAD OS BOOK
GATE 2013 MATHS BOOKS
download gate books for maths,download gate 2013 maths books,download maths book for gate, download gate books for maths,download gate books for maths
How to EXPLORE your GATE 2013 ?
EXPLORE GATE 2013, EXPLORE GATE 2013,EXPLORE GATE 2013,EXPLORE GATE 2013,EXPLORE GATE 2013,EXPLORE GATE 2013,EXPLORE GATE 2013
Gate 2013 exams are nearing and by now you want to accelerate your
gate 2013 preparation. You want to push through the syllabus and get
more out of your study time.
Then here's a simple but effective technique to accelerate the pace of
your learning.
For this to work. You are required to have read the topics at least
once. You need to know what is where and what is what of the gate
syllabus.
The technique is to "take open book test" once you have covered some
topics or part of the syllabus!!
Simple but works everytime.
Gather 4 textbooks or question papers of your chosen subjects and
randomly take a open book test.
Atempt the questions without seeing the book. If stuck, try hard to
remember the answer and if no success then only see the book. Ater
seeing write down the answer without peeping at the answer again!!
Do it enough time and you will see how much you can cover in shot span
of time. Do it with all the topics, do it several times and you will
see how testing yourself, this way, increases your learning capacity.
Why it works I don't know! But it works. I have used this countless
times in my studies in AeSI!
And while selecting questions randomly, don't read the question you
are selecting. Just think of some random numbers and answer questions
against those numbers.
Hope you will at least give this simple exercise a go. Go test for
yourself.
And best of luck !!
Find all posts related to how to prepare for gate by clicking this link
Gate 2013 exams are nearing and by now you want to accelerate your
gate 2013 preparation. You want to push through the syllabus and get
more out of your study time.
Then here's a simple but effective technique to accelerate the pace of
your learning.
For this to work. You are required to have read the topics at least
once. You need to know what is where and what is what of the gate
syllabus.
The technique is to "take open book test" once you have covered some
topics or part of the syllabus!!
Simple but works everytime.
Gather 4 textbooks or question papers of your chosen subjects and
randomly take a open book test.
Atempt the questions without seeing the book. If stuck, try hard to
remember the answer and if no success then only see the book. Ater
seeing write down the answer without peeping at the answer again!!
Do it enough time and you will see how much you can cover in shot span
of time. Do it with all the topics, do it several times and you will
see how testing yourself, this way, increases your learning capacity.
Why it works I don't know! But it works. I have used this countless
times in my studies in AeSI!
And while selecting questions randomly, don't read the question you
are selecting. Just think of some random numbers and answer questions
against those numbers.
Hope you will at least give this simple exercise a go. Go test for
yourself.
And best of luck !!
Find all posts related to how to prepare for gate by clicking this link
Aerospace engineering books FOR GATE 2013
If you are preparing for the GATE 2009 in aerospace then this is the post that you shouldn't miss. Recently someone posted this following list of books for preparation for aerospace in gate 2009!!
"Hi friends,
After searching on a forum I have got a list of books that must be studied for Gate AE. Many thanks to the person who originally posted this topic:
Maths:
Advanced Engineering Mathematics - Grewal
Advanced Engineering Mathematics - Kreizig
Flight Mechanics:
Introduction to flight - Anderson
Aircraft Performance & Design - Anderson
Flight Stability and Automatic Control - Robert C Nelson
Airplane Stability and Control - Pertin and Hage
Aerodynamics,Aeronautics and Flight Mechanics - Barnes.W.Mcormick
Space Mechanics:
Rocket Propulsion and space Dynamics - Cornelisse
Space Mechanics - Nelson, Walter C.; Loft, Ernest E.
Introduction To Space Dynamics - Thomson, William Tyrrell
Introduction to flight - Anderson
Aerodynamics:
Introduction to flight - Anderson
Fundamentals of Aerodynamics - Anderson
Aerodynamics for Engineering Students - Houghton and Carpenter/Caruthers
Aerodynamics - Clancy
Modern Compressible flow - Anderson
Gas dynamics - Rathakrishnan
Viscous flow - F M white
Structures:
Analysis of Aircraft Structures: An Introduction -Donaldson
Analysis and Design of Flight Vehicle Structures - Bruhn
Aircraft structures for engineering students - T.H.G. Megson
Theory of vibration - Meirovich
Propulsion:
Mechanics and Thermodynamics of Propulsion - Hill and petersen
Gas Turbine Theory - H Cohen,GFC Rogers,HIH Saravanamutto
Gas Turbine Engine Handbook - Meherwan P.Boyce
Elements of Rocket Propulsion - Sutton
For Basic Fundamentals:
Principles of Flight - Mike Burton
From the ground up - Sandy MacDonalds
Flight without Formulae - Kermode
Mechanics of Flight - Kermode
All the Best... "
I agree with all the books and if you see most of the books are ones that you might have read in AeSI syllabus. GATE is all about basics, so keep them strong and do tons and tons of problems!! That's the basic secret of cracking GATE!!
So what do you think? what are the other books that you read?Is the list missing something? Do tell me in comments.
"Hi friends,
After searching on a forum I have got a list of books that must be studied for Gate AE. Many thanks to the person who originally posted this topic:
Maths:
Advanced Engineering Mathematics - Grewal
Advanced Engineering Mathematics - Kreizig
Flight Mechanics:
Introduction to flight - Anderson
Aircraft Performance & Design - Anderson
Flight Stability and Automatic Control - Robert C Nelson
Airplane Stability and Control - Pertin and Hage
Aerodynamics,Aeronautics and Flight Mechanics - Barnes.W.Mcormick
Space Mechanics:
Rocket Propulsion and space Dynamics - Cornelisse
Space Mechanics - Nelson, Walter C.; Loft, Ernest E.
Introduction To Space Dynamics - Thomson, William Tyrrell
Introduction to flight - Anderson
Aerodynamics:
Introduction to flight - Anderson
Fundamentals of Aerodynamics - Anderson
Aerodynamics for Engineering Students - Houghton and Carpenter/Caruthers
Aerodynamics - Clancy
Modern Compressible flow - Anderson
Gas dynamics - Rathakrishnan
Viscous flow - F M white
Structures:
Analysis of Aircraft Structures: An Introduction -Donaldson
Analysis and Design of Flight Vehicle Structures - Bruhn
Aircraft structures for engineering students - T.H.G. Megson
Theory of vibration - Meirovich
Propulsion:
Mechanics and Thermodynamics of Propulsion - Hill and petersen
Gas Turbine Theory - H Cohen,GFC Rogers,HIH Saravanamutto
Gas Turbine Engine Handbook - Meherwan P.Boyce
Elements of Rocket Propulsion - Sutton
For Basic Fundamentals:
Principles of Flight - Mike Burton
From the ground up - Sandy MacDonalds
Flight without Formulae - Kermode
Mechanics of Flight - Kermode
All the Best... "
I agree with all the books and if you see most of the books are ones that you might have read in AeSI syllabus. GATE is all about basics, so keep them strong and do tons and tons of problems!! That's the basic secret of cracking GATE!!
So what do you think? what are the other books that you read?Is the list missing something? Do tell me in comments.
CHANGE TEXT SIZE IN EXPLORER
To alter the Size Of Text displayed in firefox , Just hold ctrl and scroll your mouse wheel !
Scroll UP : To Reduce Text Size
Scroll Down : To Increase Text Size
Scroll UP : To Reduce Text Size
Scroll Down : To Increase Text Size
TIPS TO FIND FORGET PASSWORD OF BIOS
Forgot BIOS Password ?
Do the following :
1. Open the CPU
2. Now, observe the motherboard.
3. You notice a coin like silver Battery(3V).
----------------------------------------- NOTE --------------------------------------------------------
This battery is 24 x 7 power supply for the BIOS, which is used to run the system clock will the main power is off. It also initiates the booting process when power is switched on.
-----------------------------------------------------------------------------------------------------------
4. Remove the battery from the motherboard.
(It is safe to remove the Battery)
5. Wait 30 seconds and place the battery back on the motherboard.
6. Now, when you start your system you won't be prompted for the BIOS password.
Do the following :
1. Open the CPU
2. Now, observe the motherboard.
3. You notice a coin like silver Battery(3V).
----------------------------------------- NOTE --------------------------------------------------------
This battery is 24 x 7 power supply for the BIOS, which is used to run the system clock will the main power is off. It also initiates the booting process when power is switched on.
-----------------------------------------------------------------------------------------------------------
4. Remove the battery from the motherboard.
(It is safe to remove the Battery)
5. Wait 30 seconds and place the battery back on the motherboard.
6. Now, when you start your system you won't be prompted for the BIOS password.
DELETE ADMINISTRATOR PASSWORD WITHOUT SOFTWARE IN WINDOWS
Boot up with DOS and delete the sam.exe and sam.log files from Windows\system32\config in your hard drive. Now when you boot up in NT the password on your built-in administrator account which will be blank (i.e No password). This solution works only if your hard drive is FAT kind.
Method 2
Step 1. Put your hard disk of your computer in any other pc .Step 2. Boot that computer and use your hard disk as a secondary hard disk (D'nt boot as primary hard disk ).Step 3. Then open that drive in which the victim’s window(or your window) is installed.Step 4. Go to location windows->system32->configStep 5. And delete SAM.exe and SAM.log
Step 6. Now remove hard disk and put in your computer.
Step 7. And boot your computer :-)
Method 2
Step 1. Put your hard disk of your computer in any other pc .Step 2. Boot that computer and use your hard disk as a secondary hard disk (D'nt boot as primary hard disk ).Step 3. Then open that drive in which the victim’s window(or your window) is installed.Step 4. Go to location windows->system32->configStep 5. And delete SAM.exe and SAM.log
Step 6. Now remove hard disk and put in your computer.
Step 7. And boot your computer :-)
INCREASE THE SIZE OF VIRTUAL RAM
Follow the steps given below :-
1) Hold down the 'Windows' Key and Press the 'Pause/Break' button at the top right of your keyboard.
Another way is Right-Clicking 'My Computer' and then Select 'Properties'.
2) Click on the 'Advanced' tab.
3) Under 'Performance', click 'Settings'.
4) Then click the 'Advanced' tab on the button that pops up.
5) Under 'Virtual Memory' at the bottom, click 'Change'.
6) Click the 'Custom Size' button.
7) For the initial size (depending on your HD space), type in anywhere from 1000-1500 (although I use 4000), and for the Maximum size type in anywhere from 2000-2500 (although I use 6000).
8) Click 'Set', and then exit out of all of the windows.
9) Finally, Restart your computer.
10) You now have a faster computer and 1-2GB of Virtual RAM..!
1) Hold down the 'Windows' Key and Press the 'Pause/Break' button at the top right of your keyboard.
Another way is Right-Clicking 'My Computer' and then Select 'Properties'.
2) Click on the 'Advanced' tab.
3) Under 'Performance', click 'Settings'.
4) Then click the 'Advanced' tab on the button that pops up.
5) Under 'Virtual Memory' at the bottom, click 'Change'.
6) Click the 'Custom Size' button.
7) For the initial size (depending on your HD space), type in anywhere from 1000-1500 (although I use 4000), and for the Maximum size type in anywhere from 2000-2500 (although I use 6000).
8) Click 'Set', and then exit out of all of the windows.
9) Finally, Restart your computer.
10) You now have a faster computer and 1-2GB of Virtual RAM..!
IP SPOOFING
The term IP (Internet Protocol) address spoofing refers to the creation of IP packets with a forged (spoofed) source IP address with the purpose of concealing the identity of the sender or impersonating another computing system.
Why it works ?
IP-Spoofing works because trusted services only rely on network address based authentication. Since IP is easily duped, address forgery is not difficult.
The main reason is security weakness in the TCP protocol known as sequence number prediction.
How it works ?
To completely understand how ip spoofing can take place, one must examine the structure of the TCP/IP protocol suite. A basic understanding of these headers and network exchanges is crucial to the process.
Internet Protocol (IP) :
It is a network protocol operating at layer 3 (network) of the OSI model. It is a connectionless model, meaning there is no information regarding transaction state, which is used to route packets on a network. Additionally, there is no method in place to ensure that a packet is properly delivered to the destination.
Examining the IP header, we can see that the first 12 bytes (or the top 3 rows of the header) contain various information about the packet. The next 8 bytes (the next 2 rows), however, contains the source and destination IP addresses. Using one of several tools, an attacker can easily modify these addresses – specifically the “source address” field.
Transmission Control Protocol (TCP) :
It is the connection-oriented, reliable transport protocol in the TCP/IP suite. Connection-oriented simply means that the two hosts participating in a discussion must first establish a connection via the 3-way handshake (SYN-SYN/ACK-ACK). Reliability is provided by data sequencing and acknowledgement. TCP assigns sequence numbers to every segment and acknowledges any and all data segments recieved from the other end.
As you can see above, the first 12 bytes of the TCP packet, which contain port and sequencing information.
TCP sequence numbers can simply be thought of as 32-bit counters. They range from 0 to 4,294,967,295. Every byte of data exchanged across a TCP connection (along with certain flags) is sequenced. The sequence number field in the TCP header will contain the sequence number of the *first* byte of data in the TCP segment. The acknowledgement number field in the TCP header holds the value of next *expected* sequence number, and also acknowledges *all* data up through this ACK number minus one.
TCP packets can be manipulated using several packet crafting softwares available on the internet.
The Attack
IP-spoofing consists of several steps. First, the target host is choosen. Next, a pattern of trust is discovered, along with a trusted host. The trusted host is then disabled, and the target's TCP sequence numbers are sampled. The trusted host is impersonated, the sequence numbers guessed, and a connection attempt is made to a service that only requires address-based authentication. If successful, the attacker executes a simple command to leave a backdoor.
Spoofing can be implemented by different ways as given below -
Non-Blind Spoofing :- This type of attack takes place when the attacker is on the same subnet as the victim. The sequence and acknowledgement numbers can be sniffed, eliminating the potential difficulty of calculating them accurately.
Blind Spoofing :- Here the sequence and acknowledgement numbers are unreachable. In order to circumvent this, several packets are sent to the target machine in order to sample sequence numbers.
Both types of spoofing are forms of a common security violation known as a Man In The Middle Attack. In these attacks, a malicious party intercepts a legitimate communication between two friendly parties. The malicious host then controls the flow of communication and can eliminate or alter the information sent by one of the original participants without the knowledge of either the original sender or the recipient. In this way, an attacker can fool a victim into disclosing confidential information by “spoofing” the identity of the original sender, who is presumably trusted by the recipient.
IP spoofing is almost always used in what is currently one of the most difficult attacks to defend against – Denial of Service attacks, or DoS.
1) Filtering at the Router :- Implementing ingress and egress filtering on your border routers is a great place to start your spoofing defense. You will need to implement an ACL (access control list)
2) Encryption and Authentication :- Implementing encryption and authentication will also reduce spoofing threats. Both of these features are included in Ipv6, which will eliminate current spoofing threats.
3) Initial Sequence Number Randomizing.
Why it works ?
IP-Spoofing works because trusted services only rely on network address based authentication. Since IP is easily duped, address forgery is not difficult.
The main reason is security weakness in the TCP protocol known as sequence number prediction.
How it works ?
To completely understand how ip spoofing can take place, one must examine the structure of the TCP/IP protocol suite. A basic understanding of these headers and network exchanges is crucial to the process.
Internet Protocol (IP) :
It is a network protocol operating at layer 3 (network) of the OSI model. It is a connectionless model, meaning there is no information regarding transaction state, which is used to route packets on a network. Additionally, there is no method in place to ensure that a packet is properly delivered to the destination.
Examining the IP header, we can see that the first 12 bytes (or the top 3 rows of the header) contain various information about the packet. The next 8 bytes (the next 2 rows), however, contains the source and destination IP addresses. Using one of several tools, an attacker can easily modify these addresses – specifically the “source address” field.
Transmission Control Protocol (TCP) :
It is the connection-oriented, reliable transport protocol in the TCP/IP suite. Connection-oriented simply means that the two hosts participating in a discussion must first establish a connection via the 3-way handshake (SYN-SYN/ACK-ACK). Reliability is provided by data sequencing and acknowledgement. TCP assigns sequence numbers to every segment and acknowledges any and all data segments recieved from the other end.
As you can see above, the first 12 bytes of the TCP packet, which contain port and sequencing information.
TCP sequence numbers can simply be thought of as 32-bit counters. They range from 0 to 4,294,967,295. Every byte of data exchanged across a TCP connection (along with certain flags) is sequenced. The sequence number field in the TCP header will contain the sequence number of the *first* byte of data in the TCP segment. The acknowledgement number field in the TCP header holds the value of next *expected* sequence number, and also acknowledges *all* data up through this ACK number minus one.
TCP packets can be manipulated using several packet crafting softwares available on the internet.
The Attack
IP-spoofing consists of several steps. First, the target host is choosen. Next, a pattern of trust is discovered, along with a trusted host. The trusted host is then disabled, and the target's TCP sequence numbers are sampled. The trusted host is impersonated, the sequence numbers guessed, and a connection attempt is made to a service that only requires address-based authentication. If successful, the attacker executes a simple command to leave a backdoor.
Spoofing can be implemented by different ways as given below -
Non-Blind Spoofing :- This type of attack takes place when the attacker is on the same subnet as the victim. The sequence and acknowledgement numbers can be sniffed, eliminating the potential difficulty of calculating them accurately.
Blind Spoofing :- Here the sequence and acknowledgement numbers are unreachable. In order to circumvent this, several packets are sent to the target machine in order to sample sequence numbers.
Both types of spoofing are forms of a common security violation known as a Man In The Middle Attack. In these attacks, a malicious party intercepts a legitimate communication between two friendly parties. The malicious host then controls the flow of communication and can eliminate or alter the information sent by one of the original participants without the knowledge of either the original sender or the recipient. In this way, an attacker can fool a victim into disclosing confidential information by “spoofing” the identity of the original sender, who is presumably trusted by the recipient.
IP spoofing is almost always used in what is currently one of the most difficult attacks to defend against – Denial of Service attacks, or DoS.
CounterMeasures |
2) Encryption and Authentication :- Implementing encryption and authentication will also reduce spoofing threats. Both of these features are included in Ipv6, which will eliminate current spoofing threats.
3) Initial Sequence Number Randomizing.
Free Gprs IN BSNL
U Can Surf For Free Via Gprs On Pc Too
I came to know of using BSNL GPRS for FREE with FULL ACCESS to All Sites.
Here is the way.
1.Create 2 connections with different names like "BSNL PORTAL" and "CELLONE PORTAL" with following settings.
I came to know of using BSNL GPRS for FREE with FULL ACCESS to All Sites.
Here is the way.
1.Create 2 connections with different names like "BSNL PORTAL" and "CELLONE PORTAL" with following settings.
Access Point Name-
"celloneportal"
Proxy Service Address-
"192.168.51.163"
Proxy Port-
"8080"
Security-
"NORMAL"
"celloneportal"
Proxy Service Address-
"192.168.51.163"
Proxy Port-
"8080"
Security-
"NORMAL"
Rest fields to be as it is.
2.now open phone's default inbuilt browser and select any of the two settings created to access the web.you will now access only bsnl's home site.
3.now keep browser working and open another browser for full internet access like opera or netfront.in these browsers use the second setting created. make sure to use second setting this time. connect to open a page. you get an error message like "ACCESS DENIED" but you don't worry.
4.keep both browsers working in background and open connection manager. in connection manager just disconnect the connection that is not working like the second one you used to connect opera or net front.
5.again open opera or netfront from background and this time use the first connection that you are using to connect with default inbuilt browser to connect to internet.
6.sure this time you are connected with full access.
2.now open phone's default inbuilt browser and select any of the two settings created to access the web.you will now access only bsnl's home site.
3.now keep browser working and open another browser for full internet access like opera or netfront.in these browsers use the second setting created. make sure to use second setting this time. connect to open a page. you get an error message like "ACCESS DENIED" but you don't worry.
4.keep both browsers working in background and open connection manager. in connection manager just disconnect the connection that is not working like the second one you used to connect opera or net front.
5.again open opera or netfront from background and this time use the first connection that you are using to connect with default inbuilt browser to connect to internet.
6.sure this time you are connected with full access.
LATEST COMMONWEALTH 2010 MEDAL TALLY
Rank | Country | Gold Medal | Silver Medal | Bronze Medal | Total |
1 | Australia | 74 | 55 | 48 | 177 |
2 | India | 38 | 27 | 36 | 101 |
3 | England | 37 | 59 | 46 | 142 |
4 | Canada | 26 | 17 | 32 | 75 |
5 | South Africa | 12 | 11 | 10 | 33 |
6 | Kenya | 12 | 11 | 9 | 32 |
7 | Malaysia | 12 | 10 | 13 | 35 |
8 | Singapore | 11 | 11 | 9 | 31 |
9 | Nigeria | 11 | 10 | 14 | 35 |
10 | Scotland | 9 | 10 | 7 | 26 |
11 | New Zealand | 6 | 22 | 8 | 36 |
12 | Cyprus | 4 | 3 | 5 | 12 |
13 | Northern Ireland | 3 | 3 | 4 | 10 |
14 | Samoa | 3 | 0 | 1 | 4 |
15 | Wales | 2 | 7 | 10 | 19 |
16 | Jamaica | 2 | 4 | 1 | 7 |
17 | Pakistan | 2 | 1 | 2 | 5 |
18 | Uganda | 2 | 0 | 0 | 2 |
19 | Bahamas | 1 | 1 | 3 | 5 |
20 | Sri Lanka | 1 | 1 | 1 | 3 |
21 | Nauru | 1 | 1 | 0 | 2 |
22 | Botswana | 1 | 0 | 3 | 4 |
23= | Cayman Islands | 1 | 0 | 0 | 1 |
23= | Saint Vincent and the Grenadines | 1 | 0 | 0 | 1 |
25 | Trinidad and Tobago | 0 | 4 | 2 | 6 |
26 | Cameroon | 0 | 2 | 4 | 6 |
27 | Ghana | 0 | 1 | 3 | 4 |
28 | Namibia | 0 | 1 | 2 | 3 |
29= | Papua New Guinea | 0 | 1 | 0 | 1 |
29= | Seychelles | 0 | 1 | 0 | 1 |
31= | Isle of Man | 0 | 0 | 2 | 2 |
31= | Mauritius | 0 | 0 | 2 | 2 |
31= | Tonga | 0 | 0 | 2 | 2 |
34= | Bangladesh | 0 | 0 | 1 | 1 |
34= | Guyana | 0 | 0 | 1 | 1 |
34= | Saint Lucia | 0 | 0 | 1 | 1 |
- | Anguilla | 0 | 0 | 0 | 0 |
- | Antigua and Barbuda | 0 | 0 | 0 | 0 |
- | Barbados | 0 | 0 | 0 | 0 |
- | Belize | 0 | 0 | 0 | 0 |
- | Bermuda | 0 | 0 | 0 | 0 |
- | British Virgin Islands | 0 | 0 | 0 | 0 |
- | Brunei | 0 | 0 | 0 | 0 |
- | Cook Islands | 0 | 0 | 0 | 0 |
- | Dominica | 0 | 0 | 0 | 0 |
- | Falkland Islands | 0 | 0 | 0 | 0 |
- | Gambia | 0 | 0 | 0 | 0 |
- | Gibraltar | 0 | 0 | 0 | 0 |
- | Grenada | 0 | 0 | 0 | 0 |
- | Guernsey | 0 | 0 | 0 | 0 |
- | Jersey | 0 | 0 | 0 | 0 |
- | Kiribati | 0 | 0 | 0 | 0 |
- | Lesotho | 0 | 0 | 0 | 0 |
- | Malawi | 0 | 0 | 0 | 0 |
- | Maldives | 0 | 0 | 0 | 0 |
- | Malta | 0 | 0 | 0 | 0 |
- | Montserrat | 0 | 0 | 0 | 0 |
- | Mozambique | 0 | 0 | 0 | 0 |
- | Niue | 0 | 0 | 0 | 0 |
- | Norfolk Island | 0 | 0 | 0 | 0 |
- | Rwanda | 0 | 0 | 0 | 0 |
- | Saint Helena | 0 | 0 | 0 | 0 |
- | Sierra Leone | 0 | 0 | 0 | 0 |
- | Solomon Islands | 0 | 0 | 0 | 0 |
- | Swaziland | 0 | 0 | 0 | 0 |
- | Tanzania | 0 | 0 | 0 | 0 |
- | Turks and Caicos Islands | 0 | 0 | 0 | 0 |
- | Tuvalu | 0 | 0 | 0 | 0 |
- | Vanuatu | 0 | 0 | 0 | 0 |
- | Zambia | 0 | 0 | 0 | 0 |
Total | 272 | 274 | 282 | 828 |
LATEST Endhiran Trailer Free Download
FREE DOWNLOAD ENDHIRAN(ROBOT) 2010 TRAILER,ROBOT TRAILER,ENDHIRAN TRAILER,ENDHIRAN TRAILER DOWNLOAD,DOWNLOAD ENDHIRAN TRAILER,DOWNLOAD ROBOT TRAILER,LATEST ENDHIRAN TRAILER
LATEST CIVIL SEMINAR TOPICS
FREE SEMINAR TOPICS FOR CIVIL STUDENTS,ENGINEERING SEMINAR TOPICS,TOP 10 SEMINAR TOPICS,LATEST SEMINAR TOPICS,STUDENTS SEMINAR TOPICS,CIVIL SEMINAR TOPICS WITH ABSTRACT.
- Corrosion Of Reinforcement In HVFA Concrete(1)
- Advanced Construction Materials : Microsilica In Concrete
- Oceans as a Non-conventional Source of Energy
- Silica Fume Concrete(2)
- High Performance Concrete
- Application Of Infrared Thermography In Concrete Engineering
- Self Compacting Concrete(3)
- Safety In Nuclear Power Plants
- Superplasticisers For Ready Mix Concrete Plants
- Fatigue Behaviour Of Steel Fibre Reinforced Concrete Beams(4)
- Seismic Behavior Of Isolated Bridges
- Use Of Discrete Fiber In ROAD CONSTRUCTION
- Stress Ribbon Bridges(5)
- Feng Shui And Vaastu Shastra
- Solid Waste Management
- Passive Solar Buildings(6)
- Smart Materials
- Nanomaterial
- New Techniques Of Erosion Control On Hill Roads(7)
- Outstanding Structures
- Building Codes
- Application Of Infrared Thermography In Concrete Engineering (8)
- Constructional Safety
- Smart Structures
- Trenchless Technology (9)
- Smart material actuators
- Advancement in Concerte Technology
- Plastic As Soil Stabilizer(10)
- Runway Resurfacing
- Magnetorheological Fluids And Devices
LATEST ELECTRICAL SEMINAR TOPICS
FREE SEMINAR TOPICS FOR ELECTRICAL STUDENTS,ENGINEERING SEMINAR TOPICS,TOP 10 SEMINAR TOPICS,LATEST SEMINAR TOPICS,STUDENTS SEMINAR TOPICS,ELECTRICAL SEMINAR TOPICS WITH ABSTRACT.
- Electromagnetic Bomb (5)
- Clean Electricity
- Microturbine Generator Systems
- Load monitoring (6)
- Infrared thermography
- MOCT (Magnetic Optical Current Transformer)
- Voltage Sag Analysis (7)
- Distribution System Relaying
- Electrolytic Hydrogen: A Future Technology for Energy Storage
- Night Vision (8)
- Can Machines Think ?
- Adaptive Piezoelectric energy harvesting circuit
- Liquid Electricity
- Magneto hydrodynamic Power Generation Technology (MHD) (1)
- Narrowband Power line Communication
- Buck Boost Transformer
- Biomass Fuelled Power Plant (2)
- Condition Based Maintenance of Underground Cable Systems
- Contact less energy transfer system
- Compensation of harmonic currents utilizing AHC (3)
- Matrix Inversion Generator
- Solar Power Generation
- Condition Based Maintenance of Underground Cable Systems (4)
- On-Line Detection Of Shorts In Fields Of Turbine Generator Rotor
- Flywheel Energy Storage System (FESS)
- Modelling of Transformers with Internal Incipient Faults(9)
- Digital Testing of High Voltage Circuit Breakers
- Surge Current Protection Using Superconductors
LATEST ELECTRONIC SEMINAR TOPICS
FREE SEMINAR TOPICS FOR ELECTRONICS STUDENTS,ENGINEERING SEMINAR TOPICS,TOP 10 SEMINAR TOPICS,LATEST SEMINAR TOPICS,STUDENTS SEMINAR TOPICS,ELECTRONICS SEMINAR TOPICS WITH ABSTRACT.
- Adaptive Active Phased Array Radars (1)
- Near Field Communication
- Crystaline Silicon Solar Cells
- Magnetic Amplifiers (2)
- Micro-fabricated Bio-sensors
- Remotely Queried Embedded Microsensors
- Electrical Impedance Tomography Or EIT (3)
- Spintronics
- The Bionic Eye
- Illumination With Solid State Lighting (4)
- BiCMOS technology
- Real Time Speech Translation
- Immersion Lithography (5)
- Optical Communications in Space
- EUV Lithorgaphy
- Surface Mount Technology (6)
- Elliptical curve cryptography (ECC)
- New methods to power mobile phones
- Tri-Gate Transistor (7)
- Moletronics- an invisible technology
- Optical Coherence Tomography
- DSP Enhanced FPGA (8)
- Biochips
- Real-Time Obstacle Avoidance
- Low Power Wireless Sensor Network (9)
- Analog-Digital Hybrid Modulation
- Quantum cryptography
- FinFET Technology (10)
- 4G Wireless Systems
- Orthogonal Frequency Division Multiplexing
- Zigbee - zapping away wired worries(13)
- Magnetic Resonance Imaging
- EC2 Technology
MECHANICAL SEMINAR TOPICS
FREE SEMINAR TOPICS FOR MECHANICAL STUDENTS,ENGINEERING SEMINAR TOPICS,TOP 10 SEMINAR TOPICS,LATEST SEMINAR TOPICS,STUDENTS SEMINAR TOPICS,MECHANICAL SEMINAR TOPICS WITH ABSTRACT.
- Pulse Detonation Engine (1)
- Floating Solar Power Station
- Advances In Capillary Fluid Modelling
- Continuously Variable Transmission (2)
- Hybrid Motorcycles*
- Machine Vision
- Space Elevator (3)
- Crew Exploration Vechicles
- Vacuum Braking System (4)
- ACC-Plus(Adaptive Crusie Control+) System
- Micro/Meso-scale Manufacturing
- Magneto Abrasive Flow Machining (5)
- Turbines in silicon
- Self-Healing Polymer Technology
- Variable Length Intake Manifold (VLIM) (7)
- Hybrid Synergy Drive (HSD)
- Launching Space Vechicles from Moon
- Advanced Propulsion Methods(8)
- Pseudoelasticity and Shape Memory in Metal Nanowires
- Quantum Chromo Dynamics
- MEMS In Industrial Automation
- Stirling engine (6)
- Fluid Energy Milling
- Snake Well Drill
- Infrared Thermography
- New Age Tyres(9)
- Shock Waves & Shock Diamonds
- Camless engine with elctromechanical valve actuator
LATEST SEMINAR TOPICS -COMPUTER /IT
FREE SEMINAR TOPICS FOR COMPUTER STUDENTS,ENGINEERING SEMINAR TOPICS,TOP 10 SEMINAR TOPICS,LATEST SEMINAR TOPICS,STUDENTS SEMINAR TOPICS,COMPUTER SEMINAR TOPICS WITH ABSTRACT.
See Computer Seminar Topics With ABSTRACT
See Computer Seminar Topics With ABSTRACT
- multimedia-oriented web based instructional system
- Porting Device Drivers For The Solaris ~
- Steganography - The art of hiding information
- VHDL (VHSIC Hardware Description Language)
- Global Positioning System~
- Magnetic RAM
- Embedded computers
- SSL-TLS -(7)
- Quad core Module technology
- Micro Total analysis systems
- Plasma Displays~
- Computerized Paper Evaluation Using Neural Network
- Mesh Based Geometric data processing
- DNA Computing~
- Multiple Domain Orientation
- Digital Rights Management -(8)
- Multimedia Broadcasting via Satellite
- USB Tape Drives
- UMA (Unlicensed Mobile Access)
- Virtual Reality~
- Embedded Configurable Operating system
- Cluster computing
- Digital cash -(11)
- PLAN 9 Operating system
- Brain computer interface & systems
- Digital Imaging~
- Wearable computers
- Data Mining concepts & Models
- Captchas -(9)
- Computer forensics
- Quantum computing
- LOC technology (Lab On a Chip)
- Advanced Design repository systems
- Security of Open-Source Software -(10)
- Wireless Markup Language
- B-ISDN Reference Model
- Agent OS(12)
- iSCSI-Future of Network Storage
- PolyBot - Modular, self-reconfigurable robots
- AMD Processors(13)
- Bluetooth Based Smart Sensor Networks
- multimedia-oriented web based instructional
- BioComputers(14)
- Ubiquitous computing
- Microcontroller Based Power Theft Identification
- Computer Forensics(15)
- Microcontroller Based Automation
- Quantum teleportation
- Curl: A Gentle Slope Language For The Web(16)
- Grid Data Farm for Petascale
- Vertical Cavity Surface Emitting Laser
- Dna Computing In Security(17)
- Bio Telemetry
- Digital Visual Interface
- Embedded Linux(18)
- Management Information System
- Teleportation
- Ext3 Filesystem(19)
- Radio Astronomy
- Security threats in the World Wide Web
- Facial Recognition System(20)
- Visual Neuro Prosthetics
- Multiple client's communication
- Fluorescent Multilayer Optical Data Storage(21)
- Wearable computers
- DNA Based computer
- Graphical Processing Unit(22)
- The MBMS
- Integrating Structural Design and Formal Methods in RealTime System Design
- GRASSHOPPER Operating System(23)
- Firewalls
- ARM Processor
- Security Issues In GRID COMPUTING (24)
- Aspect oriented programming
- REAL TIME OPERATING SYSTEM
- HAVi: Home Audio Video Interoperability(25)
- Voice Portals
- SALT (Speech Application Language Tags)
- HomeRF(26)
- Narrow Band and Broad Band ISDN
- Autonomic Computing
- iSCSI: The future of Network Storage(27)
- Hyper-Threading Technology
- Trusted Network Connect (TNC) Specifications
- The Mbone And Multicasting(28)
- Sand Box Technology
- Wi-Fi Hotspots
- MANETS: Mobile Adhoc Networks(29)
- Embedded Technology
- Tape Drive Technologies - LTO (linear tape open) & SDLTS (Super Digital Linear Tape)
- Agent Based Computing(30)
- Personal Satellite assistant Systems
- Data Mining & Data Warehousing
- OpenGL-application programming interface(31)
- NEW STORAGE STRATEGY = Disk -Disk -Tape Back up
- Micro Hard disk Drives
LATEST BOOKS
Braille version of Harry Potter released for blind readers
If your kid is unable to see but read braille, now would be an excellent time to present him or her the Braille version of Harry Potter. 13 volumes of braille Harry Potter will be released in the market.
If your kid is unable to see but read braille, now would be an excellent time to present him or her the Braille version of Harry Potter. 13 volumes of braille Harry Potter will be released in the market.
LATEST BIKE IN THE WORLD
LML INDIA | ROYAL ENFIELD | TVS MOTOR |
› LML Adreno FX | › Bullet 350 | › TVS Apache RTR FI |
› LML Beamer | › Thunderbird Twinspark | › TVS Flame |
› LML Energy FX | › Bullet Electra | › TVS Star City |
› LML Freedom | › Bullet Machismo | › TVS Taurus Fiero F3* |
› LML Graptor | › Bullet Machismo 500 | › TVS Apache RTR 220* |
› Royal Enfield Classic 500 |
HMSIL | SUZUKI MOTOR | YAMAHA MOTOR |
› Honda Shine | › Suzuki Access 125 | › Yamaha Fazer |
› Honda Unicorn | › Suzuki Heat | › Yamaha FZS |
› Honda Stunner CBF | › Suzuki Zeus | › Yamaha FZ 150cc |
› Honda CBF Stunner FI | › Suzuki Hayabusa 1300 | › Yamaha Gladiator |
› Honda CB Twister | › Suzuki Intruder M1800R | › Yamaha Libero G5 |
- | › Suzuki GS 150R | › Yamaha Gladiator Type JA |
- | - | › Yamaha Alba 106 |
› Yamaha YZF R1 | ||
- | - | › Yamaha MT 01 |
- | - | › Yamaha YZF-R15 |
- | - | › Yamaha Crux |
- | - | › Yamaha YZF-R1 2010 |
- | - | › Yamaha SZ and SZ-X |
Subscribe to:
Posts (Atom)