ENGINEERS | ENGINEERING JOBS | ENGINEERING COLLEGES

Sunday 14 July 2013

PPT ON LINUX SYSTEM


CLICK HERE TO DOWNLOAD  PPT ON LINUX SYSTEM
LINUX SYSTEM  Presentation Transcript
1.Introduction to LINUX SYSTEM
2.UNIX
Unix is a multi-user, multi-tasking operating system.
You can have many users logged into a system simultaneously, each running many programs.
It's the kernel's job to keep each process and user separate and to regulate access to system hardware, including cpu, memory, disk and other I/O devices.
3.History of UNIX
First Version was created in Bell Labs in 1969.
Some of the Bell Labs programmers who had worked on this project, Ken Thompson, Dennis Ritchie, Rudd Canaday, and Doug McIlroy designed and implemented the first version of the Unix File System on a PDP-7 along with a few utilities. It was given the name UNIX by Brian Kernighan.
00:00:00 Hours, Jan 1, 1970 is time zero for UNIX. It is also called as epoch.
4.1973 Unix is re-written mostly in C, a new language developed by Dennis Ritchie.
Being written in this high-level language greatly decreased the effort needed to port it to new machines.
5.1977 There were about 500 Unix sites world-wide.
1980 BSD 4.1 (Berkeley Software Development)
1983 SunOS, BSD 4.2, System V
1988 AT&T and Sun Microsystems jointly develop System V Release 4 (SVR4). This later developed into UnixWare and Solaris 2.
1991 Linux was originated.
6.Linux is a free Unix-type operating system originally created by Linus Torvalds with the assistance of developers around the world.
It originated in 1991 as a personal project of Linus Torvalds, a Finnish graduate student.
The Kernel version 1.0 was released in 1994 and today the most recent stable version is 2.6.9
Developed under the GNU General Public License , the source code for Linux is freely available to everyone.
7.What is Linux?

A fully-networked Unix-like Operating System
Unix Tools Like sed, awk, and grep
Compilers Like C, C++, Fortran, Smalltalk, Ada
Network Tools Like telnet, ftp, ping, traceroute
Multi-user, Multitasking, Multiprocessor
Has the similar  Windows GUI
Coexists with other Operating Systems
Runs on multiple platforms
Includes the Source Code

8.Where did it come from?

Linus Torvalds created it
with assistance from programmers around the world
first posted on Internet in 1991
Linux 1.0 in 1994; 2.2 in 1999
Today used on 7-10 million computers
with 1000’s of programmers working to enhance it

9.LINUX Distributions
Mandrake: http://www.mandrakesoft.com/
RedHat: http://www.redhat.com/
Fedora: http://fedora.redhat.com/
SuSE/Novell: http://www.suse.com/
Debian: http://www.debian.org/

Red Hat Enterprise Linux is a Enterprise targeted Operating System. It based on mature Open Source technology and available at a cost with one year Red Hat Network subscription for upgrade and support contract.
10.File System
Each node is either a file or a directory of files, where the latter can contain other files and directories.
You specify a file or directory by its path name, either the full, or absolute, path name or the one relative to a location.
The full path name starts with the root, /, and follows the branches of the file system, each separated by /, until you reach the desired file, e.g.:
   /home/condron/source/xntp

11.A relative path name specifies the path relative to another, usually the current working directory that you are at. Two special directories :
  . the current directory
  .. the parent of the current directory
So if I'm at /home/frank and wish to specify the path above in a relative fashion I could use:
   ../condron/source/xntp
This indicates that I should first go up one directory level, then come down through the condron directory, followed by the source directory and then to xntp.

12.Structure of Standard Directories in Unix/Linux
/ The ancestor of all directories on the system; all other directories are subdirectories of this directory, either directly or through other subdirectories.
/bin Essential tools and other programs (or binaries).
/dev Files representing the system's various hardware devices. For example, you use the file `/dev/cdrom' to access the CD-ROM drive.
/etc Miscellaneous system configuration files, startup files, etc.

13.Structure of Standard Directories in Unix/Linux
14./sbin Essential system administrator tools, or system binaries.
/tmp Temporary files.
/usr Subdirectories with files related to user tools and applications.

15.Directories, Files and Inodes
Every directory and file is listed in its parent    directory.
In the case of the root directory, that parent is itself.
A directory is a file that contains a table listing the    files contained within it, giving file names to the    inode numbers in the list.
The information about all the files and directories is    maintained in INODE TABLE
An Inode (Index Nodes) is an entry in the table    containing information about a file (metadata)    including file permissions, UID, GID, size, time    stamp, pointers to files data blocks on the disk etc.
16.Logging In
Connect to the Linux system using telnet:
vt100, vt220, vt320
ansi
tty
X-windows
Able to login more than once with same user
No ‘MW’ problems!
17.Logging In
Linux 2.2.13 (penguinvm.princeton.edu) (ttyp1)

penguinvm login: neale
Password:
Last login: Tue Jan  4 10:13:13 from linuxtcp.princeton.edu
[neale@penguinvm neale]$
18.Rule Number 1
19.Creating a new user
Use the useradd command
Use the passwd command to set password
Try it… logon as root
20.Adding a new user
Limits on users can be controlled by
Quotas
ulimit command
Authority levels for a user controlled by group membership
21.Users and Groups
Users are identified by user identifications (UIDs), each of which is associated with an integer in the range of 0 to 4 294 967 295 (X’FFFFFFFF’). Users with UID=0 are given superuser privileges.
Users are placed in groups, identified by group identifications (GIDs). Each GID is associated with an integer in the range from 0 to 4 294 967 295
Let the system assign UID to avoid duplicates
Use id to display your user and group information
22.Groups define functional areas/responsibilities
They allow a collection of users to share files
A user can belong to multiple groups
You can see what groups you belong to using the groups command:
23.Typical Group Setup
24.Using the new user
Now logoff using the exit command
login as the new user
25.You need help?
The Linux equivalent of HELP is man (manual)
Use man -k <keyword> to find all commands with that keyword
Use man <command> to display help for that command
Output is presented a page at a time. Use b for to scroll backward, f or a space to scroll forward and q to quit
26.The Linux System
27.Naming Files
28.The Current Directory
29.Some Special File Names
Some file names are special:
/    The root directory (not to be confused with the root user)
.    The current directory
.. The parent (previous) directory
~    My home directory
30.Special Files
/home - all users’ home directories are stored here
/bin, /usr/bin - system commands
/sbin, /usr/sbin - commands used by sysadmins
/etc - all sorts of configuration files
/var - logs, spool directories etc.
/dev - device files
/proc - special system files
31.Linux Command Basics
32.Standard Files
UNIX concept of “standard files”
standard input (where a command gets its input) - default is the terminal
standard output (where a command writes it output) - default is the terminal
standard error (where a command writes error messages) - default is the terminal
33.Redirecting Output
34.The input of a command may come (be piped) from a file:
35.Connecting commands with Pipes
36.Command Options
37.Common Commands
38.File Commands
cp <fromfile> <tofile>
Copy from the <fromfile> to the <tofile>
mv <fromfile> <tofile>
Move/rename the <fromfile> to the <tofile>
rm <file>
Remove the file named <file>
mkdir <newdir>
Make a new directory called <newdir>
rmdir <dir>
Remove an (empty) directory
39.More Commands
who
List who is currently logged on to the system
whoami
Report what user you are logged on as
ps
List your processes on the system
ps aux
List all the processes on the system
echo “A string to be echoed”
Echo a string (or list of arguments) to the terminal
40.Shells
An interface between the Linux system and the user
Used to call commands and programs
An interpreter
Powerful programming language
“Shell scripts” = .bat .cmd EXEC REXX
Many available (bsh; ksh; csh; bash; tcsh)
41.Another definition of a Shell
A shell is any program that takes input from the user, translates it into instructions that the operating system can understand, and conveys the operating system's output back to the user.
i.e. Any User Interface
Character Based v Graphics Based
42.Why Do I Care About The Shell?
Shell is Not Integral Part of OS
UNIX Among First to Separate
Compare to MS-DOS, Mac, Win95, VM/CMS
GUI is NOT Required
Default Shell Can Be Configured
chsh -s /bin/bash
/etc/passwd
Helps To Customize Environment
43.Shell Scripts
44.Switching Users
su <accountname>
switch user accounts. You will be prompted for a password. When this command completes, you will be logged into the new account. Type exit to return to the previous account
su
Switch to the root user account. Do not do this lightly
Note: The root user does not need to enter a password when switching users. It may become any user desired. This is part of the power of the root account.
45.Environment Variables
Environment variables are global settings that control the function of the shell and other Linux programs. They are sometimes referred to global shell variables.
46.Some Important Environment Variables
HOME
Your home directory (often be abbreviated as “~”)
TERM
The type of terminal you are running (for example vt100, xterm, and ansi)
PWD
Current working directory
PATH
List of directories to search for commands
47.PATH Environment Variable
Controls where commands are found
PATH is a list of directory pathnames separated by colons. For example:
PATH=/bin:/usr/bin:/usr/X11R6/bin:/usr/local/bin:/home/scully/bin
If  a command does not contain a slash, the shell tries finding the command in each directory in PATH. The first match is the command that will run
48.PATH Environment Variable
Similar to setting the CMS search order
Usually set in /etc/profile (like the SYSPROF EXEC)
Often modified in ~/.profile (like the PROFILE EXEC)
49.File Permissions
Every file
Is owned by someone
Belongs to a group
Has certain access permissions for owner, group, and others
Default permissions determined by umask
50.File Permissions
The long version of a file listing (ls -l) will display the file permissions:
51.Interpreting File Permissions
52.Changing File Permissions
53.Links?
Links are references to files (aliases)
Two forms:
Hard
Symbolic
Can point to files on different physical devices
Delete of original leaves link
Delete of link leaves original
Can be created for directories
Create using ln command
54.Editors
People are fanatical about their editor
Several choices available:    
vi        Standard UNIX editor
the        XEDIT-like editor
xedit        X windows text editor
emacs        Extensible, Customizable Self-                Documenting Display Editor
pico        Simple display-oriented text editor
nedit        X windows Motif text editor
55.Linux Device Handling
56.Devices and Drivers
57.Special Files - /proc
58.File Systems
Linux supports many different types
Most commonly, ext2fs
Filenames of 255 characters
File sizes up to 2GB
Theoretical limit 4TB
Derived from extfs
Highly reliable and high performer
59.Virtual File System
VFS is designed to present a consistent view of data as stored on hardware
Almost all hardware devices are represented using a generic interface
VFS goes further, allowing the sysadmin to mount any of a set of logical file systems on any physical device
60.Virtual File System
Logical file systems promote compatibility with other operating system standards  permitting developers to implement file systems with different policies
VFS abstracts details of physical device and logical file system allowing processes to access files using a common interface, without knowing what physical or logical system the file resides on
61.Analogous to CMS:
SFS
Minidisks
Two different designs
Common/transparent access
62.Processes
Processes are created in a hierarchical structure whose depth is limited only by the virtual memory available to the virtual machine
A process may control the execution of any of its descendants by suspending or resuming it, altering its relative priority, or even terminating it
Termination of a process by default causes termination of all its descendants; termination of the root process causes termination of the session
Linux assigns a process ID (PID) to the process
63.Daemons
Background processes for system administration are referred to as “daemons”
These processes are usually started during the boot process
The processes are not assigned any terminals
64.Processes - UID & GID
65.Effective UID
The effective UID is used to determine owner access privileges of a process.
Normally the same as the real UID. It is possible for a program to have a special flag set that, when this program is executed, changes the effective UID of the process to the UID of the owner of the program.
A program with this special flag set is said to be a set-user-ID program (SUID). This feature provides additional permissions to users while the SUID program is being executed.
66.Effective GID
Each process also has an effective group
The effective GID is used to determine group access privileges of a process
Normally the same as the real GID. A program can have a special flag set that, when this program is executed, changes the effective GID of the process to the GID of the owner of this program
A program with this special flag set is said to be a set-group-ID program (SGID). Like the SUID feature, this provides additional permission to users while the set-group-ID program is being executed
67.Processes - Process Groups
Each process belongs to a process group
A process group is a collection of one or more processes
Each process group has a unique process group ID
It is possible to send a signal to every process in the group just by sending the signal to the process group leader
Each time the shell creates a process to run an application, the process is placed into a new process group
When an application spawns new processes, these are members of the same process group as the parent
68.Processes - PID
PID
A process ID is a unique identifier assigned to a process while it runs
Each time you run a process, it has a different PID (it takes a long time for a PID to be reused by the system)
You can use the PID to track the status of a process with the ps command or the jobs command, or to end a process with the kill command
69.Security Guidelines
Take Care With Passwords
Use good ones (motherhood statement)
Don't Use Real Words
Make Sure They Are Not Easily Guessed
Use Combinations Of Upper and Lower Case, Numbers, Punctuation
One Method: Take first letter of a sentence or book title, insert numbers and punctuation.
70.Security - Important Files
71.Linux/390 Specifics
An ASCII implementation
Adds a layer of abstraction to I/O
Channel based v IRQ based
Support for ECKD using SSCH
Support for VM minidisks (ECKD, CKD, FBA, VDISK)
72.Linux/390 Specifics
Runs natively, in LPAR, or under VM/ESA
Uses relative instructions: G2, P/390, R/390 or better
Will use hardware IEEE FP or will emulate
Network drivers for CTCA/ESCON, OSA-2, and IUCV (VM only)
3215 emulation for virtual console
Hardware console driver (HMC)
73.Linux/390 Specifics
GNU tools ported
C/C++ compiler (gcc-2.95.1)
Assembler and linker (binutils-2.9.1)
Packages “ported”:
Regina; THE; UFT; X11; OpenLDAP; IMAP; Sendmail; Bind; RPM; Samba 2.0.6; Apache; Perl
74.Linux in the Business World
75.Linux’s place in the market
The business world is interested in:
Efficiency and effectiveness
Networked economy
Network-based businesses
76.Linux’s place in the market
77.Linux’s place in the market
Importance of the application model
Server-centric and based on standards that span multiple platforms
Leverage core business systems and scale to meet unpredictable demands
Quick to deploy, easy to use and manage
78.ISVs which have made Linux announcements:
BEA; Novell; SAP; Informix; Oracle, IBM; HP; CA; ApplixWare; Star; Corel; Cygnus; MetroWerks; ObjectShare; Inprise
Media spotlight:
CNN; PCWorld; PCWeek; InternetWeek
79.Early commercial users
Cendant Corporation - 4000 hotels
Burlington Coat Factory - back office functions
Northwest Airlines - 23 flight simulators
Intel announcement January 5 2000
New web appliances to run Linux
At the insistence of customers (e.g. NEC)
80.Impacts:
Applications:
Webservers (65%)
WebInfrastructure (mail, DNS) (15%)
File/Print (15%)
DB & DB Applications (2%)
Observations
Linux/Apache share of Web serving high
Autonomous departments
Many SMB and small ISP
CIOs discovering they have Linux running somewhere
Strong mindshare among developers
81.Linux’s place in the market
Linux’s appeal
Embraces new generation of web-based apps
Player in the heterogeneous e-business world
Provides flexibility and choice of environment
Open Source focuses on open standards
82.Linux’s place in the market
Challenges for growth
Products/Technologies/Offerings
Support services
ISV applications
Service providers
Trends
Movement to mainstream
Standards
Ease of use
83.Website Development
ASWedit, HTML editor
Empress DataWEB
EZ-EDIT
LinkScan
TalentSoft Web+ (WebPlus)
84.Databases
85.Data Visualization and CAD
IDL (Interactive Data Language)
Megahedron
Tecplot 7.0
VariCAD
VARKON
XVScan
86.Development Tools
87.Emulation Tools
Emulus
Executor 2
Wabi 2.2 for OpenLinux
88.Financial Software
BB Stock Pro and BB Stock Tool
TimeClock
89.Libraries
FontScope
INTERACTER
Matrix<LIB> - C++ Math Matrix Library
PKWARE Data Compression Library for Linux
readyBase
SIMLIB IG
90.Mathematics
Maple V Release 4 - The Power Edition
MATCOM and MATCOM MATH LIBRARY
Mathematica 3.0
MATLAB and Simulink
91.Multimedia
Peter Lipa and his Journeys
Lucka Vondrackova and her Journeys
MpegTV Player 1.0
Peter Nagy and his Journeys
Xaudio
92.Network Servers
Critical Angle X.500 Enabler
DNEWS News Server
Aventail Internet Policy Manager
Aventail VPN
WANPIPE
Zeus Web Server
93.Office Tools
94.Text Processing
95.System Administration
Host Factory
PerfectBACKUP+
Venus
96.X Windows Related
Accelerated-X Display Server
BXwidgets
BXwidgets/DB
Laptop, Accelerated-X Display Server
97.Other Software
ABACUS 4
BBBS
Clustor
FootPrints
Aladdin Ghostscript
98.Users, Groups and Access Permissions
In UNIX/LINUX, there is a concept of user and an associated group
The system determines whether or not a user or group can access a file or program based on the permissions assigned to them.
Apart from all the users, there is a special user called Super User or the root which has permission to access any file and directory
99.Access Permissions
There are three permissions for any file, directory or application program.
The following lists the symbols used to denote each, along with a brief description:
    r — Indicates that a given category of  user can read a file.
   w — Indicates that a given category of user can write to a file.
   x — Indicates that a given category of user can execute the file.
100.Each of the three permissions are assigned to three defined categories of users.
The categories are:

   owner   —   The owner of the file or
                       application.
   group — The group that owns the file or                    application.
   others   —   All users with access to the
                       system.

101.One can easily view the permissions for a file by invoking a long format listing using the command ls -l.
For instance, if the user juan creates an executable file named test, the output of the command ls -l test would look like this:
  -rwxrwxr-x 1 juan student 0 Sep 26 12:25 test
102.The permissions for this file are listed are listed at the start of the line, starting with rwx.
This first set of symbols define owner access.
The next set of rwx symbols define group access
The last set of symbols defining access permitted for all other users.

103.This listing indicates that the file is readable, writable, and executable by the user who owns the file (user juan) as well as the group owning the file (which is a group named student).
The file is also world-readable and world-executable, but not world-writable.

104.ls is used to list the contents of a directory.
If the command ls is written with parameter –l then the command lists contents of the working directory with details. Example:
   $ ls –l

105.Moving in Directories
cd try_it
    Changes the directory to try_it
pwd Prints present working directory (e.g. /home/smith/try_it)
cd .. Move to superior directory
    pwd : Prints /home/smith
cd /home The absolute path
    pwd : Prints /home
cd The system is returned to the user home directory
    pwd : Print /home/smith
106.The command mkdir my_dir
    makes new directory my_dir (the path is given relative) as a subdirectory of the current directory.
107.Remove Directory
The command rmdir your_dir
       removes directory your_dir if it is empty.
108.Copy File
The command cp file_1 file_2
copies file_1 to file_2. The both files must be in the same working directory. If they are in various directories, the path must be given.
109.Rename and/or Move the File
The command mv file_1 file_2
    moves file_1 to file_2
The both files  must be in the same working directory.
 If they are in different directories, the path must be given.
The file_1 is removed from the disk.
110.Remove File
The command rm file_a
    removes the file_a from the system  
If you use wildcard. For example
    rm h*c
    you will remove all files beginning with h and ending with c which are in working directory.
If you write
    rm *
    you will erase all files from your working directory.
111.Access Permission of File/Directory
The ownership of the file or directory can be changed using the command
    chown <owner> <file/directory  name>
The group of the file or directory can be changed using the command
    chgrp <group> <file/directory  name>
The permissions of the file can be changed using chmod command
    chmod -R ### <filename or directory>
-R is optional and when used with directories will traverse all the sub-directories of the target directory changing ALL the permissions to ###.
112.Access Permission of File/Directory
Share this post
  • Share to Facebook
  • Share to Twitter
  • Share to Google+
  • Share to Stumble Upon
  • Share to Evernote
  • Share to Blogger
  • Share to Email
  • Share to Yahoo Messenger
  • More...

0 comments

:) :-) :)) =)) :( :-( :(( :d :-d @-) :p :o :>) (o) [-( :-? (p) :-s (m) 8-) :-t :-b b-( :-# =p~ :-$ (b) (f) x-) (k) (h) (c) cheer

Labels

.PDF (2) 3D TECHNOLOGY (1) 3G (1) 4G (1) 4G TECHNOLOGY (1) 8085 MICROPROCESSOR (2) A CASE STUDY ON METHOD STUDY (1) ABAP (1) AC SUPPLY SYSTEM (1) ADDRESSING MODE (1) ADITYA CEMENT (1) ADMIXTURES (2) ADO.NET (1) Advance Processor (1) AERODYNAMIC DESIGN (1) AES (1) AGGREGATES (1) AICTE (1) AIR & DRAFT SYSTEM (2) AIR POLLUTION AND ITS LEGISLATIONS (1) Air Traffic Control (1) Airtel Mobile Service (2) AJAX (3) ALCOHOL (1) AMF PANEL (1) ANALOG AND DIGITAL FILTERS (1) ANALOG TO DIGITAL (1) Android (4) ANGLE MODULATION (1) ANIMATION (1) ANTENNA FUNDAMENTALS (1) APPLICATION DEVELOPMENT (1) APPLICATION OF NON CONVENTIONAL AND RENEWABLE ENERGY SOURCES (1) Application Programming Java (1) APPLICATIONS OF ASP.NET (1) Aricent Technologies (1) ARITHMETIC OPERATORS (1) ARM ARCHITECTURE (1) ARM Instruction Sets And Programs (1) ARM Programming (1) ARP And RARP (1) Artificial Intelligence (3) Artificial Neural Networks (1) ASH HANDLING SYSTEM (1) ASP (2) ASP .NET (6) ASP.NET FUNDAMENTALS (1) ASP.NET OVERVIEW (1) ASP.NET WITH C# (1) ASSEMBLY LANGUAGE (1) ASTRA SITE TEST (1) Attendance Management System In ASP.NET (1) AUSTRALIA (1) AUTOCAD (1) AUTOMATED TESTING (1) AUTOMATIC BEVERAGE VENDING MACHINE (1) AUTOMATION (1) AUTOMATION MANUFACTURING (1) Automobile (1) AUTOMOBILE SECTOR OF INDIA (1) Auxiliary Steam System (1) AVR INTRODUCTION (1) AVR Microcontroller Family (1) AVR RISC (1) B-SPLINE (1) B-SPLINE NOTES (1) BAR CODE TECHNOLOGY (1) BARC (1) Barcode Tech. (1) BARCODING FOR BEGINNERS (1) Barriers To Communication (1) BIG DATA (1) BINARY CODES (1) BIOCHIPS (1) BIOFULES (1) BIOLOGICAL DENITRIFICATION (1) Biophotonics (1) BIRLA CEMENT (1) BIRLA CEMENT WORKS (1) BLACK BOX TESTING TECHNIQUES (1) BLACKBERRY DEVELOPMENT (1) BLENDED CEMENTS FOR DURABLE CONCRETE STRUCTURES (1) Blu Ray Disc (1) Blue Eye Technology (1) Bluetooth (1) BOILER (1) BOILER AND AUXILIARIES (1) Boiler Normal Shut Down to Cold (1) BOILERS FUNDAMENTALS (2) Boilers In Indian Industries (1) BOKARO STEEL PLANT (1) BPO (2) BPO/KPO Job (2) BRAIN FINGERPRINTING (1) BROADBAND NETWORK OPERATION SYSTEM (1) Browser RAD Tools (1) BSNL (1) BUGZILLA (1) Bus AMBA (1) C LANGUAGE (2) C# (1) C++ (6) CABLE MODEM (1) CABLES (1) CACHE MEMORY (1) CALIBER MANAGEMENT TOOL (1) CANADA (1) CAPTCHA (1) CARBON CREDITS (1) CARGO TANK ATMOSPHERE (2) Cascading Style Sheets (1) CAT / MAT (1) CCNA (2) CDMA (1) CEERI (2) CELLULOSE (1) CEMENT CONCRETE MIX DESIGN (1) CEMENT PLANTS (1) Chameleon Chips (1) CHAOTIC- MIMO TECHNIQUES (1) CHARGED DEFECTS GETTERING AND CRYSTAL GROWING PROCESSES (1) CHEBYSHEV FILTER (1) CHHABRA THERMAL POWER STATION (1) CHROMATOGRAPHIC (1) CHROMATOGRAPHY (1) CINEMAX (1) CIRCULATING WATER (1) CIVIL AVIATION (1) CIVIL SERVICES (1) CLASSES AND OBJECTS (1) CLIMATE CHANGE FOR BETTER LIVING (2) CLOUD COMPUTING (5) Cluster Analysis (1) Cluster Computing (1) CMOS (1) COAL (1) COAL HANDLING PLANT (1) COAL TRANSPORTATION AND HANDLING (1) COBOL (1) COCA COLA (1) CODA (1) CODE LOCK (1) CODNS REPORT (1) COGNITIVE RADIO (1) COGNITIVE RADIO NETWORKS (1) COGNOS (1) Combinational logic Design (1) COMBUSTION THEORY (2) COMMUNICATION (3) COMMUNICATION SYSTEM (2) COMPUTER (5) COMPUTER CODES (1) COMPUTER DATA (1) COMPUTER FUNDAMENTALS (1) COMPUTER GRAPHICS (1) Computer Hardware (2) COMPUTER MEMORY (1) COMPUTER NETWORK TOPOLOGY (1) Computer Networking (2) COMPUTER NETWORKS (2) COMPUTER NUMBER SYSTEM (1) COMPUTER OPERATING SYSTEM (1) COMPUTER SYSTEMS (1) COMPUTER VIRUSES (2) COMPUTER'S PERIPHERALS (1) COMPUTERS (1) CONDENSER PERFORMANCE (1) CONNECTING DEVICES (1) CONSTITUENTS AND APPLICATIONS IN CONCRETE (1) Control Panels (1) COOLING TOWER (1) COPROMO (1) COQUALMO (1) CORADMO (1) CORE JAVA (1) CORRELATION AND REGRESSION ANALYSIS (1) CORROSION IN METALS (1) COSTAR SOFTWARE (1) CRITICAL PATH METHOD (1) CRM (1) CRUISE CONTROL (1) CRYPTOGRAPHY (2) CRYSTAL STRUCTURE (1) CSS (3) CT UNIT IMPULSE (1) CURIOSITY ROVER (1) CYBER CRIME (2) Cyber Forensic Tools (1) Cyber Terrorism (1) DATA COMMUNICATION (1) DATA FLOW MODEL (1) DATA LINK LAYER (1) DATA MANAGEMENT (1) Data Mining Classification and Prediction (1) Data Mining Concepts and Techniques (1) Data Mining Primitives (1) Data Preprocessing (1) Data Warehouse (1) DATA WAREHOUSING (1) DATABASE AND DATA WARAEHOUSE FUNDAMENTALS (1) Databases And DBMS (1) DATALINK LAYER (1) DB2 (1) DBMS (2) DC Supply System (1) DCCN (1) DCS (1) DEFENCE (1) Delegation Of Powers (1) DELL (1) DHCP (1) DHTML (1) DIFFUSION (1) DIGITAL SIGNATURE (1) Digital Watermarking (1) DIJKSTRA'S ALGORITHM (1) DIRECTIONAL PATTERN ANALYSIS (1) DISCOVERY (1) DISPLAY TECH. (1) Distributed Systems Principles and Paradigms (1) DISTRIBUTION SUBSTATIONS (1) DMAIC (1) DNA (1) DNA COMPUTING (1) DNS (1) DOCUMENT ARCHITECTURE (1) Doordarshan (1) DOS ATTACK (1) DRDO (1) DRUG TRANSPORT MECHANISMS (1) DRUPAL (1) DRY ETCHING (1) DSA (1) DSL (1) DTH (1) DVD TECHNOLOGY (1) DWDM (1) E GAS SEWA (1) E-BIKES (1) E-COMMERCE (2) E-PROCUREMENT SOLUTION IN NHPC (1) EIGRP (1) ELASTICITY (1) ELECTION ALGORITHMS (1) Election Algorithms and Distributed Processing (1) ELECTRIC HEATING (1) ELECTRIC MOTORS (2) ELECTRIC WELDING (1) ELECTRICAL INSTRUMENTS (1) Electrical Protections (1) ELECTRICAL SYSTEM (1) ELECTRICITY GENERATION PROCESS (1) Electromechanical Pulse Energy (1) ELECTRONIC INSTRUMENTATION (1) Electronic Milk Tester (1) ELECTRONIC TOLL COLLECTION SYSTEM (1) Electronics For Animals (1) eLitmus (1) EMAIL SYSTEMS (1) Embedded Linux (2) EMBEDDED SYSTEM (2) EMERGENCY SUPPLY SYSTEM (1) ENERGY CONSERVATION (1) ENERGY EFFICIENCY (1) ENERGY METERS (1) ENGINEERED PROTEIN (1) ENGINEERING CAREER (1) ENGINEERING PROCESSES (1) ENGINEERING REPORTS (1) ENVIRONMENT IMPACT ASSESSMENT (1) Environment Laws For Power Sector (1) ENVIRONMENTAL CONDITIONS (2) Environmental Protection Act-1986 (1) EQUATIONS (1) ERGONOMIC ANALYSIS (1) ERGONOMIC ASPECTS OF NOISE (1) ERGONOMICS (1) ERP (1) ESCORTS (1) ESP (1) ESSAR (1) ETHANOL (1) ETHICAL HACKING (1) EVEN AND ODD SIGNALS (1) EWSD (1) EXCITATION SYSTEM (2) EXTRANET (1) FACE RECOGNITION (2) FACE RECOGNITION TECHNIQUES (2) FAQs DURING AN INTERVIEW (1) FIBER OPTICS (1) Fighter Planes (1) FILE SYSTEM IN OPERATING SYSTEM (1) Fire Fighting Systems In Power Stations (1) FIREWALL (1) Flame Scanners (1) FLUE GAS SYSTEM AIR PRE HEATER (2) FLUIDIZED BED COMBUSTION SYSTEM (2) FLY ASH CONCRETE MIX DESIGN (1) Foster Wheeler Boiler (1) FOUR LEVELS OF INFORMATION SYSTEM (1) FOUR SPECIAL CASES IN SIMPLEX (1) FOURIER SERIES (1) Framework (1) FREE SPACE OPTICS (1) FREQUENCY HOPPING (2) FUEL (1) FUEL OIL SYSTEM (5) FUEL OIL SYSTEM PURPOSE (1) FULL WAVE RECTIFIER (1) FUNDAMENTALS OF MANUFACTURING SYSTEMS (1) FURNACE SAFEGUARD SUPERVISORY SYSTEM (2) FUTURE CAR (1) GAME THEORY (1) GATE (1) GENERATION OF ELECTRICITY (1) GENERATOR PROTECTION (1) GENETIC ALGORITHMS (1) Genetic Engineering (1) GENOMIC IMPRINTING (1) Genomic Library (1) Geophysical Instrumentation (1) GET AND POST METHODS (1) Gi-Fi (2) GLOBAL MANUFACTURING SYSTEM (1) GLOBAL SYSTEM FOR MOBILE COMMUNICATION (1) GMAT (1) GMPLS CONTROL PLANE (1) GOOGLE (1) GOOGLE NEXUS (1) Governing System (1) GOVERNMENT GRANTS (1) Govt. Job (3) GPRS (1) GPS (1) GRAFFITI (1) Graphics Editor (1) GRAVIMETRIC ANALYSIS (1) GRE (1) Green Computation (1) GREEN HOUSE EFFECT (1) GREEN REVOLUTION (1) GREY BOX TESTING (1) GRID COMPUTING (1) GSM (3) GSM ADVANCE TRAINING (1) GSM AIR INTERFACE (1) GSM BSS (1) GSM NETWORK ARCHITECTURE (1) GSM NETWORK INTERFACES (1) GSM RADIO TRANSMISSION (1) GSM TRAFFIC CASES (1) GSM TRAINING (1) GSS (1) HACKING (1) Hadoop (2) Handling And Disposal Of Oily Bilge Water (1) Haptics (1) HARLEY DAVIDSON (1) HEAPSORT (1) HINDUSTAN COPPER LIMITED (1) HINDUSTAN ZINC LIMITED (1) HMT (1) HOLOGRAPHY (1) Host Mobility (1) HOSTING (1) HOW DSL WORKS (1) HP BYPASS (1) HTML (5) HTTP (1) HUMAN ROBOT (1) HUMANOIDS (1) HUTCHISON TELECOM (2) HYDRO SECTOR (1) HYDROGEN ENERGY (1) HYPERTENSION (1) HYPNOSIS (1) HYUNDAI MOTORS (1) I MODE (1) IBM (1) IBM AS/400 (1) IBM INDIA (1) IC ENGINES (1) IC TECHNOLOGY (1) ILLUMINATION ENGINEERING (1) ILLUSTRATOR (1) IMAGE ENCRYPTION ALGORITHM (1) IMAGE FILE FORMATS (1) IMAGE FUSION (1) IMMUNO TECHNOLOGY (1) IMPACT OF ATMOSPHERICS ON QUALITY INFERENCES (1) IMPULSE TURBINE (1) INDUCTANCE (1) Induction Furnace (1) INDUCTION GENERATOR (1) INDUCTION MACHINE (1) Induction Motor (1) INDUCTION MOTOR MODEL (1) INDUCTION MOTOR STARTING (1) Industrial Automation (1) Industrial Design In India (1) Industrial Safety And Accident Prevention (1) Inert Gas System (1) INFORMATION SECURITY (1) INFORMATION SYSTEM FOR MANUFACTURING (1) INFOSYS (1) INFOSYS DRIVEN BY VALUES (1) INQUIRY (1) INSERTION SORTING (1) INSPECTION AND GOOD CONSTRUCTION PRACTICES (1) Integrated Management System (1) INTEGRATED MAUFACTURING SYSTEM (1) Inter Integrated Circuit (1) Internal Combustion Engines (2) Internet (4) Internet Protocol (1) INTERNETWORKING DEVICES (1) INTERRUPT MECHANISM (1) INTERVIEW SKILLS (1) INTRA ASN IEEE802.16e (1) INTRANET (1) INTRODUCTION OF GSM (1) INTRODUCTION OF THERMAL POWER PLANT (1) INTRODUCTION TO C SHARP (3) INVISIBLE BAR CODES (1) IOCL (1) ION EXCHANGE CHROMATOGRAPHY (1) ION IMPLANTATION (1) ION IMPLANTATION PROCESS (1) ION TRACK BASED TUNABLE DEVICES (1) iOS 6 (1) IP Addresses (2) iPHONE (1) iPHONE 5 (1) IS-LM MODEL (1) ISEH FRP V7.0 (1) ISM CODES (1) ISO 9001:2008 (1) ISPS (1) ISRO (1) IT And Communication Infrastructure (1) ITES (1) J2EE (1) JAVA (9) JAVA APPLICATIONS (1) JAVA BEANS (1) JAVA DATABASE CONNECTIVITY (1) JAVASCRIPT (3) JAVASCRIPT DIALOG BOXES (1) JIRO Technology (1) JK Cement (1) JK TYRE (1) Job Fair (3) JOOMLA (1) JSP (1) KRUSKAL'S ALGORITHM (1) L.T CIRCUIT BREAKERS (1) La-Mont boiler (1) LAN (1) Landmine Detection (1) LAPLACE CIRCUIT (1) Laser Security (1) LEACH (1) LIFEBUOY (1) LIGHT MICROSCOPY (1) LINEAR EQUATIONS (1) LINUX (3) Linux Booting Procedure (1) Linux Servers (1) LINUX SYSTEM (2) LITHOGRAPHY (1) LOAD SHARING (1) LOGIC CONTROLLER (1) LOGICS (1) LOGO DESIGN (1) LOW DROPOUT REGULATOR (1) LUBRICATION (1) MACHINING (1) Maglev Trains (1) MAGNETIC FORCES MATERIALS (1) MAHINDRA (1) MAINFRAME (1) MAMMOGRAMS (1) Manage IS Development (1) MANAGEMENT IN MANUFACTURING SYSTEM (1) MANUFACTURING PRESENTATION (1) MANUFACTURING EXCELLENCE (1) MARK I (1) MARK I FPA (1) MARK II FPA (1) MARPOL (1) MARS ROVER (1) MARUTI 800 (1) MASS CONCRETE MIX (1) MATLAB (3) MCA (1) MCITP (1) MEDIUM ACCESS CONTROL SUBLAYER (1) MEMS SWITCH (1) MEMS TECHNOLOGY (1) Meta Search Engines (1) METALLURGICAL TESTING (1) MICRO CANTILEVER ENERGY HARVESTER (1) MICROBIAL GROWTH (1) MICROCALCIFICATIONS (1) MICROCONTROLLER BASED ALARM SYSTEM (1) MICROCONTROLLERS (1) MICROPROCESSOR (2) Microscopic Techniques (1) MICROSOFT (MS) ACCESS (1) MICROSOFT (MS) SQL (1) MICROSOFT EXCEL (1) MICROSOFT OFFICE EXCEL 2003 (1) MICROSOFT OFFICE OVERVIEW (2) MICROSOFT OFFICE WORD 2003 (1) MICROSOFT PROJECT (1) MICROSOFT WORD (1) Microstrip Patch Antenna (1) MICROVIA TECH. (1) MICROWAVE ABSORPTION PROPERTIES OF GRAPHITE FLAKES (1) MICROWAVE COMMUNICATION (1) MICROWAVE LINK DESIGN (1) Microwave Technique (1) Milk Fat Testing (1) MINERALS (1) MIS (1) MOBILE COMPUTING (1) Mobile Number Portability (1) MOBILE SECURITY (1) MOBILE TESTING (1) MODELING AND SIMULATION FOR MANUFACTURING SYSTEM (1) MODELLING TOOLS IN MANUFACTURING (1) MODEMS (2) MODIFIED FUEL LEVEL INDICATOR (1) MODIFIER (1) MOG ANDROID (1) MOSFET (1) MOTION ECONOMY (1) MOTIVATION THEORY (1) Mozilla Firefox (1) MPEG4 (1) MPHASIS (1) MRAM (1) MRT (1) Multi Core Technology (1) MULTICAST ROUTING (1) MULTIMEDIA NETWORKING SYSTEM (1) MULTIMEDIA PROJECTS (1) MULTIMEDIA SKILLS (1) MULTIMEDIA TECHNOLOGIES (1) Multimedia Technology (1) MULTIPLE INTELLIGENCES (1) MULTISENSOR DATA FUSION (1) MYSQL (2) NANOBOTS (1) NANOTECHNOLOGY (2) NASA (1) NASCAR (1) Need Of ERP (1) NETWORK BASICS (1) NETWORK LAYER (2) NETWORK PROTOCOLS (1) Network Security (2) NETWORK SWITCH (1) NETWORKING (5) New Idea Put To Road Test (1) NEWZELAND (1) NHPC (1) NIS And Setting Up Router (1) Nokia Morph Concept (1) NOKIA SIEMENS NETWORKS (1) NON CONVENTIONAL ENERGY SOURCES (1) NONVERBAL COMMUNICATION (1) NTPC (2) NUCLEAR ENERGY (1) NUCLEAR POLLUTION (1) NUMBER SYSTEMS (1) OBJECT ORIENTED (1) OCCUPTIONAL VIBRATION (1) OFDM (1) OIL AND GAS INDUSTRY (1) OLYMPIC PRODUCTS (1) OMEGA ELECTRONICS (1) ONGC (1) ONLINE EDUCATION SERVICES (1) ONLINE MOBILE RECHARGE (1) ONLINE SHOPPING SITE (1) OOPS (1) OPERATING SYSTEM (3) OPERATING SYSTEM SECURITY (1) OPERATIONS DEPARTMENT PROCEDURE (1) Optical Computing (1) OPTICAL LOGIC GATES (1) OPTICAL NETWORK (1) OPTIMIZED ANN (1) ORACLE (4) ORACLE 10G (2) ORACLE 9I (1) Oracle Database (1) ORACLE HUMAN RESOURCES (1) ORGANIZATIONAL STRUCTURE AND DESIGN (1) OSI MODEL (1) OXIDATION (1) OXIDATION TECHNIQUES AND SYSTEMS (1) PACKET LOSS CONCEALMENT USING AUDIO MORPHING (1) Packet Tracer 5.0 (1) PAPER CLIP (1) PARKING MANAGEMENT SYSTEM (1) PARTS OF DESKTOP (1) PATTERN PRINTERS (1) PATTERN TRANSFER (1) PCB (1) PCB ANALYSIS (1) PEDAL POWER HACKSAW (1) Pedal Power Zeolite Refrigeration (1) PEER TO PEER NETWORKS (1) Penetration Testing (1) Performance Management Process (1) PERL (1) PHISHING (1) PHOTOSHOP (1) PHOTOVOLTAIC SYSTEM (1) PHP (4) PHP AND SQL (1) PHP ERROR (1) PHP FILE INCLUSION (1) PHP FILE UPLOADING (1) PHP FILES (1) PHP FUNCTIONS (1) PHP OPERATORS (1) PHP SESSIONS (1) PHP TECHNOLOGY (1) PHYSICAL LAYER (2) Placement Papers (1) PLANT LAYOUT AND CAPACITY PLANNING (1) PLC (2) PLCC (1) Polaris (1) POST TRANSLATIONAL MODIFICATION (1) POWER DISTRIBUTION EQUIPMENT (1) POWER DISTRIBUTION SYSTEM (1) POWER GENERATION IN NTPC (1) POWER GENERATION THROUGH SPEED BREAKERS (1) POWER HOUSE (1) POWER PLANT (2) POWER PLANT EMERGENECIES (1) POWER PLANT OPERATION GENERATOR & AUXILIARIES (1) POWER QUALITY PARAMETERS (1) POWER SCENARIO IN INDIA (1) Prepaid Energy meter (1) PRESENTATION SOFTWARE (1) PREWRITING TECHNIQUES (1) PRINCIPLES OF CONCRETE MIX DESIGN (1) Private Job (1) Procedure For burning Oil (1) PROCESS (1) PROCESS DESCRIPTION (1) PROCESS DESIGN (1) Product Life Cycles And The Boston Matrix (1) PRODUCT STRATEGY (1) PROJECT QUALITY MANAGEMENT (1) Protection System Of Generating Stations (1) PTW SYSTEM (1) PULSE WIDTH MODULATION (1) PUMP (1) PURGING LOGIC (1) QR CODES (1) QUALITY REQUIREMENTS OF CONCRETE - MAKING MATERIALS (1) QUANTUM COMPUTER (2) QUANTUM COMPUTERS (1) QUANTUM COMPUTING (1) Quorum Sensing (1) RADAR (1) RADAR COMMUNICATIONS (1) RADIO CONTROLLED AIRCRAFT (1) RAILWAY (1) RAM (1) RECORDING TECHNIQUES (1) Red Tacton (1) REGENERATIVE SUSPENSION SYSTEM (1) RELAY (1) Remote Control (1) Remote Method Invocation (1) Remote Sensing (1) REMOTE SUSTAINABLE VILLAGES (1) Renewable Energy (4) REQUIREMENT ENGINEERING (1) REQUISITE PRO (1) RESTFUL WEBSERVICES (1) REVEAL.JS (1) RFID (3) Robotics (2) ROCK SLOPE ENGINEERING (1) Role Of Hydrogen In Generator (1) ROM (1) ROUTINE CHECKS BOILER (1) Routine Checks Generator (1) Routine Checks Turbine (1) RSRTC (1) RTLinux (1) RTOS (1) RUBY ON RAILS (1) SAAS AND CLOUD COMPUTING (1) SAMPLE RESUME FOR EXPERIENCED - DOWNLOAD FREE .DOC (1) SAMPLE RESUME FOR FRESHERS - DOWNLOAD FREE .DOC (1) SAMSUNG 3D LED TV (1) SAMSUNG S3 (1) SAP (2) SAP LAP ANALYSIS (1) Satellite Communication (1) SCADA (2) SCADA FUNDAMENTALS (1) SCANNING AND FOOTPRINTING (1) SCHEDULING OF OPERATIONS (1) Secretariat LAN (1) SELF AUTOMATED SAFETY SYSTEM OF TRAIN (1) SELF EMPLOYEMENT In ASP.Net (1) Semantic Web (1) SEMI AUTONOMOUS BIKE (1) SENSORY EVALUATION (1) SENSORY TESTING (2) SEO (1) SEQUENTIAL CIRCUIT (1) Serial Peripheral Interface (1) Servlets (1) Shell Programming (1) SHIFT REGISTERS AND COUNTERS (1) Ship Maneuverability (1) SIGNALS (1) SIGNALS AND SYSTEMS (1) SINGAPORE (1) SIX STROKE ENGINE (1) Sixth Sense Technology (1) SLIDING PRESSURE OPERATION (1) SLIM System (1) Smart Cards (1) SOCIAL ENGINEERING TOOLKIT (1) SOCIAL NETWORKING (1) SOCIAL NETWORKS (1) SOCIAL PROBLEMS (1) SOFT SYSTEM METHODOLOGY (1) SOFTWARE (1) SOFTWARE DESIGN (1) SOFTWARE DEVELOPMENT (1) SOFTWARE ENGINEERING (2) SOFTWARE FOR IMPLEMENTATION OF ATM (1) Software Management Topics (1) SOFTWARE METRICS (1) Software Requirements Specification (1) SOFTWARE RESEARCH EXPRESS (1) Software Testing (2) SOLAR CELL (2) SOLAR PANEL ROAD (2) SOLAR PV (1) SONY ERICSSON (1) SOURCE AND SINK ANALYSIS (1) SPEAKER RECOGNITION (1) SPECTROSCOPY (1) SPEECH RECOGNITION (2) Splines and Bezier Curves (1) SPREAD SHEET (1) Spring Framework (1) SQL (2) SQL INJECTION (1) State Management Techniques (1) Stealth Technology (1) STEAM CIRCULATION SYSTEM (1) Steam Raising (1) STEAM TURBINE (1) STEAM TURBINES FOR SUPERCRITICAL POWER PLANTS (1) STEEL INDUSTRY (1) Steel Plant (1) STEVE JOBS (1) STIRLING ENGINE (1) STORAGE DEVICES (1) STORAGE OVERVIEW AND ARCHITECTURE (1) STRESS (1) STUDY ABROAD (6) SUBNETTING (1) SULZER RT FLEX MARINE DIESEL ENGINE (1) SUMS AND PRODUCTS OF SIGNALS (1) Sun Solaris Os (1) SURATGARH THERMAL PLANT (1) Surface Detection Methods (1) SURFACE MOUNT TECHNOLOGY (2) SUSTAINABLE DEVELOPMENT (1) Swarm Intelligence (1) SWITCHING AND NETWORKS (1) SWITCHING AND ROUTING (1) SWITCHYARD (1) SYMBIAN OS (1) SYSTEM PROGRAMMING (1) TABU SEARCH (1) TABULATION METHOD (1) TATA INDICOM (1) TATA MAGIC (1) TATA MOTERS (1) TATA MOTORS (2) TATA NANO (2) TATA STEEL (1) TATA Tele Services (1) Technical Analysis (1) TELECOM SOFTWARE (1) TELECOMMUNICATION INDUSTRY IN INDIA (1) Teleconferencing (1) TEST CENTER (1) TEST POINT ANALYSIS (1) TESTING (1) Testing And Calibration (1) TESTING LEVELS (1) TEXT (1) The Locus Distributed Operating System (1) THERMAL CUTTING PROCESS (1) THERMAL POWER PLANT (1) THERMAL POWER PLANTS (1) THERMAL POWER STATIONS (1) THERMOGRAPHY (1) THIN FILM TECHNOLOGY (2) THREE PHASE CIRCUITS (1) Tiled Microprocessor (1) TOEFL / IELTS (1) Tools of Internet (1) TOUCH SCREEN TECHNOLOGY (2) TOUCHSCREEN (1) TRADITIONAL DATABASE APPLICATIONS (1) TRAINING AND DEVELOPMENT (1) TRANSACTION PROCESSING (1) TRANSCRIPTION (1) TRANSDUCER MATERIALS (1) TRANSFORMERS (2) TRANSISTOR AGING (1) TRANSMISSION LINE (1) TRANSMISSION MEDIA (1) TRANSMISSION SYSTEM (1) TRANSMISSION SYSTEM AND ITS CONFIGURATION (1) TRANSPORT AND APPLICATION LAYER (1) TURBINE (1) TURBINE CONDENSATE SYSTEM (2) TURBINE FLEET IN NTPC (1) Turbo Generators (1) TWO STROKE FUEL ENGINE (1) TWO-WHEELER INDUSTRY IN INDIA (1) Ubiquitous Computing (1) UK (1) Underground Communication (1) UNIT SHUT DOWN PROCEDURE (1) UNIX (2) UNIX SPECIAL VARIABLES (1) UPS (1) UREA PLANT (1) USA (1) USE OF CHEMICAL AND MINERAL ADMIXTURES IN CONCRETE (1) UWB ECHO SIGNAL (1) VAPOR ABSORPTION REFRIGERATION (1) VARIABLE SPEED DRIVES (1) VERILOG (1) VHDL (1) VHDL AND DIGITAL CIRCUIT DESIGN (1) VIBRATION (1) VIDEO DISPLAY DEVICES (1) VIDEOCON (1) VIKRAM CEMENT (1) VIRTUAL KEYBOARD (1) VIRTUAL ONLINE TUTORING (1) VIRTUAL PROJECTION (1) VIRTUALIZATION (2) Viruses (1) VISIBLE SURFACE DETECTION (1) VISUAL BASIC (3) Visual Studio 2010 (1) VITAL LINK (1) VLAN (1) VLSI (1) VLSI DESIGN (1) VOIP (1) VPN (1) VSB MODULATION (1) VTP (1) Vulnerability Assessment (1) WAFER PREPARATION (1) War Weapons (1) WATER (1) Water pollution And Its Legislation (1) WAVEGUIDE GRATINGS BASED FILTERS (1) WEAPONS DESIGN AND CONTROL SYSTEMS (1) WEATHER RESOURCE SYSTEM (1) WEB DESIGNING (1) WEB ENGINEERING (1) Web OS (1) WEB SECURITY (1) WEB SERVER (1) WEB WAREHOUSING (1) WEBSITE DESIGN AND DEVELOPMENT (1) WELDING (1) WELSPUN CROP LTD (1) WET ETCHING (1) WHAT IS CEMENT (1) WHIRLPOOL (1) WHITE BOX TESTING TECHNIQUES (1) WHOLE NUMBER (1) WI-FI (1) WIBREE (1) WIMAX (2) WIMAX SECURITY (1) WIND ENERGY SYSTEM (1) WIND FARM (1) WINDOWS SERVER (1) Wireless Communication (1) WIRELESS LAN (1) Wireless Mesh Networks (1) WIRELESS SENSOR NETWORKS (2) WIRELESS TECHNOLOGY (1) WLAN CONFIGURATION (1) WORDPRESS (1) Work Environment (1) Workshop For Turbine (1) WORLD WIDE WEB (2) WSN'S (1) XML (2) XTie-RT (1) YAHOO! (1) Yield Curve (1) Z-TRANSFORM (1) ZIGBEE (2) ZINC OXIDE (1)
 
© 2011 ENGINEERS ON WAY
Designed by Ishant Gupta
Posts RSSComments RSS
Back to top