Welcome to King-X-Kings @ lokesh polimera


JNTU 4-2 CSE MID-I ONLINE BITS

HUMAN COMPUTER INTERACTION ( HCI )
[ Download ]


Ecommerce
[ Download ]


Management Science (MS)
[ Download ]


Management Science (MS)
[ Download ]



**-- NO GUARANTEE --**

jntu kakinada 4-2 CSE IT ECE EEE MECH 3-2 CSE IT ECE EEE MECH 2-2 CSE IT ECE EEE MECH 2ND MID ONLINE BITS

jntu kakinada 4-2 CSE IT ECE EEE MECH 3-2 CSE IT ECE EEE MECH 2-2 CSE IT ECE EEE MECH 2ND MID ONLINE BITS FROM KINGXKINGS



3-2 cse & It online bits direct links

Operating Systems (OS)


http://www.ziddu.com/download/8959383/OSMid2.pdf.html


Compiler Design (CD)


http://www.ziddu.com/download/8959387/CDMid2.pdf.html


Neural Networks (NN)



http://www.ziddu.com/download/8959380/NNMid2.pdf.html

Information Security (IS)


http://www.ziddu.com/download/8959385/ISMid2.pdf.html

Computer Networks (CN)


http://www.ziddu.com/download/8959386/CNMid2.pdf.html

Object Oriented Analysis & Design (OOAD)



http://www.ziddu.com/download/8959381/JAVAMid2.pdf.html


Web Technologies (WT)




http://www.ziddu.com/download/8959388/WTMid2.pdf.html




E-Commerce (EC)

http://www.ziddu.com/download/8959384/ECOMMid2.pdf.html




Data Warehousing and Data Mining (DWDM)

http://www.ziddu.com/download/8959379/DMDWMid2.pdf.html




Middleware Technologies (MWT)

http://www.ziddu.com/download/8959382/MWTMid2.pdf.html


http://kingxkings.blogspot.com/



3-2 ECE (Mid2)


Management Science (MS)

http://www.ziddu.com/download/8959485/MSMid2.pdf.html

Telecommunication Switching Systems (TCSS)

http://www.ziddu.com/download/8959482/TSSNTCSSMid2.pdf.html

Digital Signal Processing (DSP)

http://www.ziddu.com/download/8959478/DSPMid2.pdf.html

VLSI Design (VLSI)

http://www.ziddu.com/download/8959484/VLSIMid2.pdf.html

Microwave Engineering (MWE)
http://www.ziddu.com/download/8959477/MWEMid2.pdf.html

Microprocessors and Interfacing (MPI)

http://www.megaupload.com/?d=0ZT8Z38C




3-2 EEE (Mid2)



Digital Signal Processing (DSP)

http://www.ziddu.com/download/8959478/DSPMid2.pdf.html

Microprocessors and Microcontrollers (MPMC)

http://www.ziddu.com/download/8959479/MPMCMid2.pdf.html

Management Science (MS)

http://www.ziddu.com/download/8959485/MSMid2.pdf.html

Switch Gear and Protection (SGP)

http://www.ziddu.com/download/8959480/SGPMid2.pdf.html


VLSI Design (VLSI)

http://www.ziddu.com/download/8959484/VLSIMid2.pdf.html


http://kingxkings.blogspot.com/



3-2 MECH (Mid2)



CAD/CAM

http://www.ziddu.com/download/8959481/CAD-CAMMid2.pdf.html

Design of Machine Members (DMM)
http://www.ziddu.com/download/8959516/dmm.rar.html

Thermal Engineering (TE)

http://www.ziddu.com/download/8959483/TEMid2.pdf.html

2-2 CSE & IT(Mid2)



Software Engineering (SE)
http://www.ziddu.com/download/8959631/SEMid2.pdf.html

Object Oriented Programming (JAVA)

http://www.ziddu.com/download/8959381/JAVAMid2.pdf.html

Environmental Studies (ES)
http://www.ziddu.com/download/8959628/ESMid2.pdf.html

Computer Organization (CO)
http://www.ziddu.com/download/8959624/COMid2.pdf.html

Data Base Management Systems (DBMS)
http://www.ziddu.com/download/8959629/DBMSMid2.pdf.html

Principles of Programming Languages(PPL)

http://www.ziddu.com/download/8959625/PPLMid2.pdf.html

Operating Systems (OS)

http://www.ziddu.com/download/8959383/OSMid2.pdf.html


http://kingxkings.blogspot.com/



2-2 ECE(Mid2)



Pulse and Digital Circuits (PDC)

http://www.ziddu.com/download/8959627/PDCMid2.rar.html

Control Systems (CS)

http://www.ziddu.com/download/8959622/CSMid2.pdf.html

Object Oriented Programming (JAVA)
http://www.ziddu.com/download/8829130/JAVA.rar.html


Switching Theory and Logic Design (STLD)

http://www.ziddu.com/download/8959630/STLDMid2.pdf.html

EM Waves and Transmission Lines (EMWT)
http://www.ziddu.com/download/8959626/EMWTMid2.pdf.html

Analog Communications (AC)

http://www.ziddu.com/download/8959623/ACMid2.pdf.html


http://kingxkings.blogspot.com/




2-2 EEE(Mid2)



Managerial Economics and Financial Analysis (MEFA)

http://www.ziddu.com/download/8959894/MEFAMid2.pdf.html


Environmental Studies (ES)
http://www.ziddu.com/download/8959628/ESMid2.pdf.html

Control Systems (CS)

http://www.ziddu.com/download/8959622/CSMid2.pdf.html


http://kingxkings.blogspot.com/




2-2 MECH(Mid2)



Probability and Statistics (PS)

http://www.ziddu.com/download/8959925/PSMid2.pdf.html

Kinematics of Machinery (KM)
http://www.ziddu.com/download/8959926/KMMid2.pdf.html

Thermal Engineering (TE)
http://www.ziddu.com/download/8959483/TEMid2.pdf.html

Fluid Mechanics and Hydraulic Machinery (FMHM)

http://www.ziddu.com/download/8959927/FMHMMid2.pdf.html

Environmental Studies (ES)
http://www.ziddu.com/download/8959628/ESMid2.pdf.html


http://kingxkings.blogspot.com/





4-2 CSE & IT(Mid2)



Management Science (MS)
http://www.ziddu.com/download/8959485/MSMid2.pdf.html


E-Commerce (ECOM)

http://www.ziddu.com/download/8959384/ECOMMid2.pdf.html

Human Computer Interaction (HCI)

http://www.ziddu.com/download/8959989/HCIMid2.pdf.html

Distributed Databases (DDB)

http://www.ziddu.com/download/8959985/DDBMid2.pdf.html


Network Management Systems (NMS)

http://www.ziddu.com/download/8959988/NMSMid2.pdf.html


http://kingxkings.blogspot.com/




4-2 ECE(Mid2)



Optical Communications (OC)
http://www.ziddu.com/download/8959987/OCMid2.pdf.html


Artificial Neural Networks (ANN)

http://www.ziddu.com/download/8959986/ANNSMid2.pdf.html

Embedded Systems (ES)
http://www.ziddu.com/download/8960122/ESYSMid2.pdf.html

4-2 EEE(Mid2)

Object Oriented Programming (JAVA)
http://www.ziddu.com/download/8959381/JAVAMid2.pdf.html

Data Base Management Systems (DBMS)

http://www.ziddu.com/download/8959629/DBMSMid2.pdf.html

Advanced Control Systems (ACS)

http://www.ziddu.com/download/8960043/ACSMid2.pdf.html


http://kingxkings.blogspot.com/





4-2 MECH(Mid2)


Neural Networks and FuzzyLogic Systems (NNFL)

http://www.ziddu.com/download/8960046/NNFLMid2.pdf.html


Interactive Computer Graphics(ICG)

http://www.ziddu.com/download/8960042/ICGMid2.pdf.html

Operating System Concepts(OSC)

http://www.ziddu.com/download/8960045/OSCMid2.pdf.html

Computer Organization and Architecture (COA)
http://www.ziddu.com/download/8960044/COAMid2.pdf.html



http://kingxkings.blogspot.com/





1st Year(2nd Mid):



Network Analysis (NA)
http://www.ziddu.com/download/8544042/NA.rar.html

Electronic Devices and Circuits (EDC)



http://www.ziddu.com/download/8534287/EDCMid2.pdf.html

C Programming and Data Structures (C&DS)



http://www.ziddu.com/download/8534286/CDSMid2.pdf.html

APPLIED PHYSICS (AP)



http://www.ziddu.com/download/8491147/APMid2.pdf.html

BASIC ELECTRICAL ENGINEERING (BEE)



http://www.ziddu.com/download/8491148/BEEMid2.pdf.html

MATHEMATICAL METHODS (MM)



http://www.ziddu.com/download/8491149/MMMid2.pdf.html

ENGLISH (ENG)



http://www.ziddu.com/download/8491150/EnglishMid2.pdf.html

http://kingxkings.blogspot.com/





2-2 CSE/IT Bits(1st Mid):



ENVIRONMENTAL SCIENCES (ES)



http://www.ziddu.com/download/8413487/EnvironmentalScience.pdf.html

OBJECT ORIENTED PROGRAMMING LANGUAGE/JAVA (OOPL/JAVA)



http://www.ziddu.com/download/8414440/OOPSMid1.pdf.html

SOFTWARE ENGINEERING (SE)



http://www.ziddu.com/download/8400231/SEMid1.pdf.html

COMPUTER ORGANIZING (CO)



http://www.ziddu.com/download/8474338/COMid1.pdf.html

OPERATING SYSTEMS (OS)



http://www.ziddu.com/download/8400228/OSMid1.pdf.html

DATABASE MANAGEMENT SYSTEM (DBMS)



http://www.ziddu.com/download/8474339/DBMSMid1.pdf.html

PRINCIPLES OF PROGRAMING LANGUAGES (PPL)



http://www.ziddu.com/download/8474337/PPLMid1.pdf.html


http://kingxkings.blogspot.com/




2-2 MECH Bits(1st Mid):

ENVIRONMENTAL STUDIES (ES)



http://www.ziddu.com/download/8413487/EnvironmentalScience.pdf.html

PROBABILITY & STATISTICS (P&S)



http://www.ziddu.com/download/8474336/PSMid1.pdf.html


http://kingxkings.blogspot.com/



2-2 ECE Bits(1st Mid):

ANALOG COMMUNICATIONS (AC)



http://rapidshare.com/files/342554441/Analog_Communications1mid.pdf

CONTROL SYSTEMS (CS)



http://rapidshare.com/files/342554444/Control_systems1mid.pdf

EM WAVES & TRANSMISSION LINES



http://rapidshare.com/files/342554445/EM_Waves_and_Transmission_Lines1mid.pdf

OBJECT ORIENTED PROGRAMMING (OOP)



http://rapidshare.com/files/342554446/Object_Oriented_Programming1mid.pdf

SWITCHING THEORY & LOGIC DESIGN (STLD)



http://rapidshare.com/files/342554447/Switching_Theory_and_Logic_Design1mid.pdf

Pulse And Digital Circuits [PDC]



http://www.ziddu.com/download/8471305/PDCMid1.pdf.html

http://kingxkings.blogspot.com/




2-2 EEE Bits(1st Mid):



CONTROL SYSTEMS (CS)



http://www.ziddu.com/download/8413483/CS.pdf.html

POWER SYSTEMS - 1 (PS-1)



http://www.ziddu.com/download/8413484/PS-1.pdf.html

Managerial Economics and Financial Analysis(MEFA)



http://www.ziddu.com/download/8413485/MEFA.pdf.html

ELECTRICAL MACHINES - 2 (EM - 2)



http://www.ziddu.com/download/8413486/EM-2.pdf.html

ENVIRONMENTAL SCIENCES (ES)



http://www.ziddu.com/download/8413487/EnvironmentalScience.pdf.html

LIDC (LIDC)



http://www.ziddu.com/download/8413488/LIDC.pdf.html



http://kingxkings.blogspot.com/


4-2 EEE Bits(1st Mid):

SOFTWARE ENGINEERING (SE)



http://www.ziddu.com/download/8400231/SEMid1.pdf.html



4-2 IT Bits(1st Mid):

NETWORK MANAGEMENT SYSTEMS(NMS)



http://www.ziddu.com/download/8457011/NMS.pdf.html


http://kingxkings.blogspot.com/



4-2 CSE Bits(1st Mid):

E-COMMERCE (E-COM)



http://www.ziddu.com/download/8424260/ECOMMid1.pdf.html

MANAGEMENT SCIENCES(MS)



http://www.ziddu.com/download/8430639/MSMid1.pdf.html

MANAGEMENT SCIENCES(MS)(New FOrmat)



http://www.ziddu.com/download/8435082/4-2CSEMSMID1Bits.pdf.html

HUMAN COMPUTER INTERFACING(HCI)



http://www.ziddu.com/download/8464799/HCI.pdf.html



http://kingxkings.blogspot.com/




4-2 ECE Bits(1st Mid):



EMBEDDED SYSTEMS(ES)



http://www.ziddu.com/download/8435853/ESMID1NEWBITS.pdf.html


http://kingxkings.blogspot.com/



3-2 CSE Bits(1st Mid):



COMPILER DESIGN(CD)



http://rapidshare.com/files/342552357/cd.rar

INFORMATION SECURITY(IS)



http://rapidshare.com/files/342552359/is.rar

NEURAL NETWORKS(NN)



http://rapidshare.com/files/342552360/nn.rar

UNIX PROGRAMMING(UNIX)



http://rapidshare.com/files/342552362/unix.rar

SOFTWARE TESTING METHODOLOGIES(STM)



http://rapidshare.com/files/342552361/stm.rar


http://kingxkings.blogspot.com/



3-2 IT Bits(1st Mid):



SOFTWARE ENGINEERING (SE)



http://www.ziddu.com/download/8400231/SEMid1.pdf.html

COMPUTER NETWORKS (CN)



http://www.ziddu.com/download/8400229/CNMid1.pdf.html

OPERATING SYSTEMS (OS)



http://www.ziddu.com/download/8400228/OSMid1.pdf.html

OBJECT ORIENTED ANALYSIS & DESIGN(OOAD)/ UNIFIED MODELING LANGUAGE (UML)



http://www.ziddu.com/download/8400227/OOADMid1.pdf.html

INFORMATION SECURITY (IS)



http://www.ziddu.com/download/8400226/ISMid1.pdf.html

WEB TECHNOLOGIES (WT)



http://www.ziddu.com/download/8400225/WTMid1.pdf.html

DATA WAREHOUSING & DATA MINING (DMDW)



http://www.ziddu.com/download/8400224/DMDWMid1.pdf.html




http://kingxkings.blogspot.com/



3-2 ECE Bits(1st Mid):



DIGITAL SIGNAL PROCESSOR (DSP)



http://rapidshare.com/files/342540862/dsp.rar

VERY LARGE SCALE INTEGRATION (VLSI)



http://rapidshare.com/files/342540866/vlsi.rar

TELECOMMUNICATIONS SWITCHING SYSTEMS & NETWORKS (TSSN)



http://rapidshare.com/files/342540865/tssn.rar

MICRO WAVE ENGINEERING (MWE)



http://rapidshare.com/files/342540864/mwe.doc

MICRO PROCESSORS & INTERFACING (MPI)



http://rapidshare.com/files/342540863/mpi.rar

SBI Exam Papers || SBI Exam Materials || SBI Exam Question Papers || SBI Exams

Bank Exam Papers || Bank Exam Materials || Bank Exam Question Papers || Bank Exams

Aptitude in Bank Exams

[ Download ]


Bank Exam Preparation Guide
[ Download ]


Bank Exam Solved Papers
[ Download ]


General Knowledge
[ Download ]


PO Exam Materials
[ Download ]


Bank Exam Model Paper || EEnadu SBI MODEL PAPER || Pratiba SBI Model Paper
[ Download ]


Bank Exam Practice Papers
[ Download ]

Bank of Baroda Materials posted soon...

IEEE Major projects IEEE Technical Seminars

  • Networking
  • Parallel And Distributed Systems
  • Mobile Computing
  • Knowledge And Data Engineering
  • Computational Intelligence And Security
  • Advance Computing
  • Information Technology In Biomedicine
  • Dependable And Secure Computing
  • Image Processing
  • Software Engineering
  • Multimedia

  • JAVA IEEE TITLES-2010
  • Parallel And Distributed Systems-19
  • 1. Privacy-Conscious Location-Based Queries in Mobile Environments- 2010
  • 2. On the Performance of Content Delivery under Competition in a Stochastic Unstructured Peer-to-Peer Network – 2010
  • 3. IRM: Integrated File Replication and Consistency Maintenance in P2P Systems – 2010
  • 4. Fault-tolerant Mobile Agent-based Monitoring Mechanism for Highly Dynamic Distributed Networks- 2010
  • 5. Engineering Wireless Mesh Networks: Joint Scheduling, Routing, Power Control, and Rate Adaptation- 2010
  • 6. Congestion Control Of Transmission Control Protocol Based On Bandwidth Estimation – 2010
  • 7. A Distributed Protocol to Serve Dynamic Groups for Peer-to-Peer Streaming – 2010
  • 8. Conditional Shortest Path Routing in Delay Tolerant Networks- 2010
  • 9. Cross-Layer Design for QoS Support in Multihop Wireless Networks – 2010
  • 10. Distributed Algorithms for Minimum Cost Multicast with Network Coding in Wreless Networks – 2010
  • 11. Fast Algorithms for Resource Allocation in Wireless Cellular Networks- 2010
  • 12. Minimizing Delay and Maximizing Lifetime for Wireless Sensor Networks With Anycast- 2010
  • 13. Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks- 2010
  • 14. On Wireless Scheduling Algorithms for Minimizing the Queue-Overflow Probability- 2010
  • 15. Efficient and Dynamic Routing Topology Inference From End-to-End Measurements- 2010
  • 16. A Dynamic En-route Filtering Scheme for Data Reporting in Wireless Sensor Networks- 2010
  • 17. A Review of the Applications of Agent Technology in Traffic and Transportation Systems- 2010
  • 18. POPI: A User-level Tool for Inferring Router Packet Forwarding Priority– 2010
  • 19. Achieving Network Level Privacy in Wireless Sensor Networks – 2010
  • Mobile Computing-7
  • 20. Layered Approach Using Conditional Random Fields for Intrusion Detection- 2010
  • 21. Agent Based Efficient Anomaly Intrusion Detection System in Adhoc networks- 2010
  • 22. Opportunistic Routing in Multi-radio Multi-channel Multi-hop Wireless Networks- 2010
  • 23. Bandwidth Recycling in IEEE 802.16 Networks- 2010
  • 24. KTR: an Efficient Key Management Scheme for Secure Data Access Control in Wireless Broadcast Services – 2010
  • 25. Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks- 2010
  • 26. Lightweight Fault-tolerance Mechanism for Distributed Mobile Agent-based Monitoring- 2010
  • Knowledge And Data Engineering-2
  • 27. P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains– 2010
  • 28. Managing Multidimensional Historical Aggregate Data in Unstructured P2P Networks – 2010

  • DOT NET IEEE TITLES-2010
  • Parallel And Distributed Systems-13
  • 29. An AbuseFree Fair Contract Signing Protocol Based on the RSA Signature- 2010
  • 30. Toward Optimal Network Fault Correction in Externally Managed Overlay Networks- 2010
  • 31. Slow Adaptive OFDMA Systems Through Chance Constrained Programming- 2010
  • 32. A Distributed CSMA Algorithm for Throughput and Utility Maximization in Wireless Networks – 2010
  • 33. Throughput Analysis for a Contention-Based Dynamic Spectrum Sharing Model- 2010
  • 34. On Wireless Scheduling Algorithms for Minimizing the Queue-Overflow Probability- 2010
  • 35. Uncertainty Modeling and Reduction in MANETs- 2010
  • 36. Collaborative Sensing to Improve Information Quality for Target Tracking in Wireless Sensor Networks- 2010
  • 37. Fast Algorithms for Resource Allocation in Wireless Cellular Networks- 2010
  • 38. Dynamic Multichannel Access With Imperfect Channel State Detection- 2010
  • 39. Conditional Shortest Path Routing in Delay Tolerant Networks-2010
  • 40. Equilibrium of Heterogeneous Congestion Control: Optimality and Stability- 2010
  • 41. Pricing under Constraints in Access Networks: Revenue Maximization and Congestion Management- 2010
  • Mobile Computing-2
  • 42. Dynamic Authentication for cross-realm SOA-Based Business Processes- 2010
  • 43. SigFree: A Signature-free Buffer Overflow Attack Blocker-2010
  • Cloud Computing-2
  • 44. Ensuring Data Storage Security in Cloud Computing– 2010
  • 45. Fuzzy Keyword Search over Encrypted Data in Cloud Computing- 2010
  • Knowledge And Data Engineering-5
  • 46. Anonymous Query Processing in Road Networks – 2010
  • 47. Bayesian Classifiers Programmed in SQL- 2010
  • 48. PAM: An Efficient and Privacy-Aware Monitoring Framework for Continuously Moving Objects- 2010
  • 49. Adaptive Join Operators for Result Rate Optimization on Streaming Inputs- 2010
  • 50. AI and Opinion Mining- 2010

  • JAVA IEEE TITLES-2009
  • Networking-6
  • 51. Capturing Router Congestion and Delay– 2009
  • 52. Monitoring the Application-Layer DDoS Attacks for Popular Websites – 2009
  • 53. Secure and Policy-Compliant Source Routing-2009
  • 54. SIMPS: Using Sociology for Personal Mobility-2009
  • 55. Spatio-Temporal Network Anomaly Detection by Assessing Deviations of Empirical Measures– 2009
  • 56. Web User-Session Inference by Means of Clustering Techniques- 2009
  • 57. Residuala based estimation of peer and link lifetimes in peer to peer networks- 2009
  • Parallel And Distributed Systems-13
  • 58. A Faithful Distributed Mechanism for Sharing the Cost of Multicast Transmissions - 2009
  • 59. Application-Based Collision Avoidance in Wireless Sensor Networks– 2009
  • 60. Detecting Malicious Packet Losses – 2009
  • 61. Distributed Algorithms for Constructing Approximate Minimum Spanning Tree in Wireless Sensor
  • Networks – 2009
  • 62. Dynamic Routing with Security Considerations– 2009
  • 63. Dynamic Search Algorithm in Unstructured Peer-to-Peer Networks– 2009
  • 64. Enforcing Minimum-Cost Multicast Routing against Selfish Information Flows– 2009
  • 65. Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis– 2009
  • 66. Flexible Deterministic Packet Marking: An IP Traceback System to Find the Real Source of
  • Attacks– 2009
  • 67. Movement-Assisted Connectivity Restoration in Wireless Sensor and Actor Networks – 2009
  • 68. Multipath Dissemination in Regular Mesh Topologies - 2009
  • 69. Multipath Routing in Wireless Mesh Networks – 2009
  • 70. Multiple Routing Configurations for Fast IP Network Recovery – 2009
  • Mobile Computing-5
  • 71. Cell Breathing Techniques for Load Balancing in Wireless LANs - 2009
  • 72. Continuous Monitoring of Spatial Queries in Wireless Broadcast Environments- 2009
  • 73. Mitigation of Control Channel Jamming under Node Capture Attacks – 2009
  • 74. Mobility Management Approaches for Mobile IP Networks: Performance Comparison and Use
  • Recommendations – 2009
  • 75. Route Stability in MANETs under the Random Direction Mobility Model - 2009
  • Computational Intelligence And Security-1
  • 76. A Clustering-Based Evolutionary Algorithm for Traveling Salesman Problem- 2009
  • Knowledge And Data Engineering-6
  • 77. English to Spanish Translation of Signboard Images from Mobile Phone Camera – 2009
  • 78. Interactive Correction and Recommendation for Computer Language Learning and Training - 2009
  • 79. NNexus: An Automatic Linker for Collaborative Web-Based Corpora - 2009
  • 80. Privacy-Preserving Data Mashup - 2009
  • 81. Ranking and Suggesting Popular Items - 2009
  • 82. SQL/XML Hierarchical Query Performance Analysis in an XML-Enabled Database System- 2009
  • 83. Study on intelligent E-Shopping system based on datamining.- 2009
  • Dependable And Secure Computing-3
  • 84. Flexible Rollback Recovery in Dynamic Heterogeneous Grid Computing- 2009
  • 85. The Effectiveness of Checksums for Embedded Control Networks- 2009
  • 86. Security Analysis of the SASI Protocol– 2009
  • Image Processing-1
  • 87. Morphological Background Detection and Enhancement of Images With Poor Lighting- 2009
  • Multimedia-1
  • 88. Image Retargeting Using Mesh Parameterization - 2009
  • Advance Computing-1
  • 89. Combinatorial Approach for Preventing SQL Injection Attacks– 2009
  • Information Technology In Biomedicine-1
  • 90. Enhancing Privacy and Authorization Control Scalability in the Grid Through Ontologies- 2009
  • 91. Design a Secure Electronic Voting System for Thailand's Election- 2009
  • 92. Effective and efficient query processing for video subsequent identification - 2009


  • .net IEEE TITLES
  • Networking-8
  • 93. A Tabu Search Algorithm for Cluster Building in Wireless Sensor Networks. – 2009
  • 94. Analysis of Shortest Path Routing for Large Multi-Hop Wireless Networks. – 2009
  • 95. Cell Breathing Techniques for Load Balancing in Wireless LANs. – 2009
  • 96. Greedy Routing with Anti-Void Traversal for Wireless Sensor Networks. – 2009
  • 97. Resequencing Analysis of Stop-and-Wait ARQ for Parallel Multichannel Communications. – 2009
  • 98. Resource Allocation in OFDMA Wireless Communications Systems Supporting Multimedia Services.– 2009
  • 99. Route Stability in MANETs under the Random Direction Mobility Model. – 2009
  • 100. Single-Link Failure Detection in All-Optical Networks Using Monitoring Cycles and Paths. – 2009
  • 101. A Gen2 based RFID Authentication protocol for security and privacy- 2009


  • JAVA IEEE TITLES-2008
  • Networking-4
  • 102. A Geometric Approach to Improving Active Packet Loss Measurement– 2008
  • 103. Detecting and Preventing IP-spoofed Distributed DoS Attacks– -2008
  • 104. Statistical Techniques for Detecting Traffic Anomalies Through Packet Header Data-2008
  • 105. Two Techniques for Fast Computation of Constrained Shortest Paths-2008
  • Parallel And Distributed Systems-3
  • 106. Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries– 2008
  • 107. Runtime Locality Optimizations of Distributed Java Applications– 2008
  • 108. Strategyproof Mechanisms for Scheduling Divisible Loads in Bus-Networked Distributed Systems– 2008
  • 109. Quiver- Final- 2008
  • Mobile Computing-1
  • 110. Efficient Resource Allocation for Wireless Multicast- 2008
  • Knowledge And Data Engineering-12
  • 111. A Signature-Based Indexing Method for Efficient Content-Based Retrieval of Relative Temporal Patterns –2008
  • 112. A Web Usage Mining Framework for Mining Evolving User Profiles in Dynamic Web Sites- 2008
  • 113. An Efficient Reference-based Approach to Outlier Detection in Large Datasets - 2008
  • 114. Automatic Extraction of Useful Facet Hierarchies from Text Databases - 2008
  • 115. Ranked Reverse Nearest Neighbor Search - 2008
  • 116. C-TREND: Temporal Cluster Graphs for Identifying and Visualizing Trends in Multiattribute Transactional Data -- 2008
  • 117. Employing Clustering Techniques for Automatic Information Extraction From HTML Documents-2008
  • 118. Incentive-Based Scheduling for Market-LikeComputational Grids-2008
  • 119. Online Index Recommendations for High-Dimensional Databases Using Query Workloads-2008
  • 120. Ranked Reverse Nearest Neighbor Search-2008
  • 121. Skyline Query Processing for Incomplete Data-2008
  • 122. Truth Discovery with Multiple Conflicting Information Providers on the Web-2008
  • 123. WARM: Mining weighted association rules without preassigned weights -2008
  • Image Processing-3
  • 124. A Lossless Compression Scheme for Bayer Color Filter Array Images- 2008
  • 125. Image Restoration Using Space-Variant Gaussian Scale Mixtures in Overcomplete Pyramids– 2008
  • 126. Vision Processing for Realtime 3-D Data Acquisition Based on Coded Structured Light-2008
  • Dependable And Secure Computing-3
  • 127. Controlling IP Spoofing through Interdomain Packet Filters– 2008
  • 128. Temporal Partitioning of Communication Resources in an Integrated Architecture-2008
  • 129. Trustworthy Computing under Resource Constraints with the DOWN Policy-2008
  • Software Engineering-3
  • 130. The Effect of Pairs in Program Design Tasks-2008
  • 131. WASP: Protecting Web Applications Using Positive Tainting and Syntax-Aware Evaluation – 2008
  • 132. Using the Conceptual Cohesion of Classes for Fault Prediction in Object-Oriented Systems - 2008


  • DOT NET IEEE TITLES-2008
  • Networking-4
  • 133. A Distributed database architecture for global roaming in next generation Mobile Networks– 2008
  • 134. Greedy routing with Anti void traversal for wireless sensors-2008
  • 135. Grid Services discovery with Rough Sets-2008
  • 136. Neural Networks for Unicode optical character Recognition– 2008
  • Parallel And Distributed Systems-3
  • 137. Medicare MediClaims– 2008
  • 138. Retail outlet Operator– 2008
  • 139. Secure Net Auction--– 2008
  • 140. Techno Task Management---2008
  • 141. Web Database Explorer—2008
  • 142. Work Flow Mining---2008
  • 143. Citizen Card System—2008
  • 144. Credit Card Fraud Detection– -2008
  • JAVA IEEE TITLES
  • 145. Anonymizing Classi_cation Data for Privacy Preservation- 2007
  • 146. Cost-Sensitive-Data Preprocessing for Mining Customer Relationship Management Databases- 2007
  • 147. Dynamic Load Balancing in Distributed Systems in the Presence of Delays A Regeneration-Theory Approach- 2007
  • 148. Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes-2007
  • 149. Route Reservation in Ad Hoc Wireless Networks- 2007
  • 150. Design and Evaluation of a Scalable and Reliable P2P Assisted Proxy for On-DemandStreaming Media Delivery- 2006
  • 151. Detecting Phishing Web Pages with Visual Similarity Assessment Based on Earth Mover’s Distance (EMD) - 2006
  • 152. SIGF: A Family of Con_gurable, Secure Routing Protocols for Wireless Sensor Networks- 2006
  • 153. A New Approach for Authentication Technique
  • 154. SPRINT: A Scalable Parallel Classifier for Data Mining
  • 155. Online Mining (Recently) Maximal Frequent Itemsets over Data Streams- 2005
  • 156. VOICE-TO-PHONEME CONVERSION ALGORITHMS FOR SPEAKER-INDEPENDENT VOICE-TAG APPLICATIONS IN EMBEDDED PLATFORMS- 2005
  • 157. Multicast with Network Coding in Application-Layer Overlay Networks- 2004
  • 158. Structure and Texture Filling-In of Missing Image Blocks in Wireless Transmission and Compression Applications- 2003

Click here
[ Download ]

Download the IEEE domain list and Checkup the topic you are interested in...
Download available on the right side , move your mouse over the right side area!!

Hachiko : A Dog’s Story

The touching true story of a sweet, loyal dog..

This is the heartwarming story about the close, unique bond between a master and his dog, highlighting the loyalty and faithfulness of the animal.




How tight is the bond between you and your dog? Do you know how much love and loyalty there is between you? Is your dog as loyal as Hachiko? Wait, who is Hachiko? Well, this film will tell you.


The life journey of Hachiko or “Hachi” begins when college professor Parker Wilson (Richard Gere) finds the dog at a train station. Hachi is an Akita dog from Japan, characterized by its delicate features and milk-colored fur.

The sudden appearance of the cute, homeless animal does not immediately impress Parker’s wife, Cate Wilson (played by Joan Allen) who wants to get rid of it. But the bond that gradually builds between Parker and Hachi eventually melts her heart, and she allows it to stay.

Parker’s best friend Ken (Cary-Hiroyuki Tagawa), who is of Japanese descent, tells Parker some wise words: “It is not you who found the dog, but the dog found you.”

Parker and Hachi build an unbreakable friendship. Parker plays with the dog and teaches it how to catch a ball. And Hachi accompanies the professor every day on his way to the train station, and then returns to the station in the afternoons to greet Parker on his way home.

One day the professor passes away in class,
and does not come back to the station. But Hachi continues to wait for him. Parker’s daughter, who lives out of town eventually goes to collect the dog to take it home, but afterwards Hachi faithfully returns to the station to wait for the professor.






The story of Hachi soon becomes the talk of the town. During its daily visits to the station Hachi touches the hearts of many people who work or live in the area. The dog teaches the local people about love, compassion, devotion and loyalty.


This film is an American adaptation of a true Japanese story about a loyal dog named Hachiko, and is also a remake of the 1987 Japanese film Hachiko Monogatari.
The real Hachiko was born in 1923 in Odate and a year later a professor called Ueno brought it to his home in Tokyo.

Just like in the movie, Hachiko followed the professor everywhere, accompanying him to Shibuya station every morning and then returning and waiting for him every afternoon.

One day in May 1925, Ueno didn’t come home because he died while at work. Mrs. Ueno gave the dog to her husband’s relative, but it returned to the train station every afternoon for about a decade.


Hachiko continued to go to the station until its death in 1935.


Hachiko was memorialized in a bronze statue, captured sitting in its waiting spot outside the Shibuya station to remind the community of its great devotion and love.






With so many dog movies around, Hachiko appears to be the most touching yet.
This is definitely a tearjerker, in the magnitude of the animal’s love for its master. While the film is about undying love, and Hachiko symbolizes faith and loyalty, it also gives us mixture of feelings of hope, happiness, loss and loneliness.


There is only one thing I can suggest if you choose to watch this film: Make sure you bring enough tissues.



Verdict : A very touching story that teaches us about loyalty and faithfulness.

Ye Maaya Chesave Superb Collection(song bits)

Heya , my blog www.kingxkings.blogspot.com successfully completed 1year.(6th jan)

From Titles to Till the End , Collection of Background music.







Title Song

Prepanchamlo entho mandhi ammayillu unna , nenu Jessie ne enduku luv chesanu?

Karthiks Biodata


First meet


Krishnudu Encourages

Watching Jessie Everyday at the gate

Jessie at Karthik's house


At KFC


At KFC1


Ma nana adigithey , thammudu lantivadivi ani cheppestha


Karthik proposed to Jessie

Found Jessie

Karthik Invited for Lunch


Having lunch at jessie's house alleppey


Apologize to Jessie


Karthik asking for friendship


why did you like me karthik?


Karthik narrating on how he felt , at his first sight


Bye karthik


Arguing about train accident


Its a fantastic love


karthik repropose to Jessie

Jessie arguing
It was luv in Train

Did you like me?


Go for a date?

Let us be friends karthik

what you trying to prove jessie?


Dad I wanna live with
I hate you


Fight with Jessie's bro

parents arguing


Again at coffee shop


Its all over


Jessie's family moving


At church , to see Jessie's marriage


The Bridal is coming (in boat)


This is my Treat for passing mca in 1st class


Jessie going back to home


Jessies brother saw karthik


Jessies brother slaps Krishnudu


At police station ( pothey poyayi edava pranallu , alanti

ammayi kosam ichesthe pola )

Going to meet Jessie again , after frm police station

Jessie agreed that she fall in love wit karthik

At Krishnudu's house , talking abt future

Missing jessie at goa


Karthik messaging to Jessie

No reply from Jessie

Jessie's Ex-bridegrrom house

Jessie messaging to karthik abt this

Jessie's father said NO to this


Jessie Cant get to contact with karthik

Karthik I wanna come with you

Going to meet Jessie

Karthik in Jessie's house

No match between us


Karthik I have no Choice

Another year later

Karthik meets Jessie again (foreign)

Describing about jessie (wen she asks abt someone their in
his life)

Never Married Yet karthik


Jessie - the movie ends


Talking at cinema


It was my Husband and I

This is for you my """"Jessie"""


Movie ends


Like'd??????

Ye Maaya Chesave Heart melting title song



Ye Maaya Chesave title song


Movies for free download

Hi , This one for movie lovers..




Telugu Movies for free download

Hindi Movies for free download

Tamil Movies for free download

English Movies for free download


No seeds , No peers!!
Download with your Download Manager at your Download Speed.

(~~~Dont worry resume enabled~~~~)

Happy New Year 2011