14-11-2009, 08:25 PM
1. Adusumilli Divya Blue Tooth
2. Anila Macharla Deadlocks
3. Anusha Derangula Features Of Oracle
4. Avinash Bitra Securing Routing Protocols
5. Ayyappa Reddy Katterapu Hacking
6. T.Sai Phalgun Data Compression
7. Rama Rao Motamarri Image Compression
8. Chris Pranoy Rajitha Talluri Finger Print Scanners
9. Divya Jonnadula Distributed Systems
10. Varun Mannar Digital Signature
11. V Raghavendra Vikas Vinnakota Cryptography
12. Pranitha Ghantasala Screen Savers
13. Geeta Rani Edupuganti Hacker
14. Bala Venkatesh Kandula Blu Ray
15. Chanukya Pisipati Robotics For Entertainments
16. Pratyusha Narlasetty How Blogs works
17. Harini Nandula Security
18. Hima Bindu Jagarlamudi Steganography
19. SIP jjtc.com
20. Mobility
21. SQL Commands
22. Blue Tooth
23. Digital Jewelary
24. Digital Odors
25. How Asimo Works
26. Surround Sound
27. Computer Security
28. Phishing
29. Parallel Processing
30. Wap
31. Blu-ray Discs
32. Red Tacton
33. Five Technologies
34. Mobile Computing
35. Blink Card
36. Cryptography
37. Natural Language Processing
38. Steganography
39. HTML
40. Mobile Phone Technology
41. WIMAX
42. AJAX
43. Red Tacton
44. Virtual Private Memory
45. Expert Systems
46. Holographic Versatile Disc
47. Bio Metrics
48. BIOS
49. ROBOT
50. Linux in Blue Tooth
51. Home Theater
52. Adaptive Software
53. VOIP
54. Encryption
55. E-commerce
56. Sake Robotics
57. Visual Technology
58. 3-D Imaging&Halography