Pawan Janorkar

Pune, Maharashtra,

male 35 809


Wireless Fidelity

Wi-Fi is the name of a popular wireless networking technology that uses radio waves to provide wireless high-speed Internet and network connections.

X-MAX Technology

The company developed cognitive radio technology for mobile services using licensed or unlicensed radio pectrum.xG's initial product is xMax, a carrier-class cognitive radio network.

Database Management System

DBMS is system software for creating and managing databases. The DBMS provides users and programmers with a systematic way to create, retrieve, update and manage data.

5 Pen PC Technology

5 Pen PC Technology is a gadget package including five functions: a pen-style cellular phone with a handwriting data input function, virtual keyboard, a very small projector, camera scanner, and personal ID key with cashless pass function.

Google Chrome OS

Google Chrome is a free, open-source web browser developed by Google. It was released in 2008, and has grown to be one of the most popular browsers today.

Smart Fabrics

Smart clothing, made from sensor-based smart fabric, could redefine the connected fitness and health industries and beyond.

Grid Computing

GC cis a type of data management and computer infrastructure, designed as a support primarily for scientific research, but, as said in the introduction, also used in various commercial concepts, business research.

Wearable Computing

A term that refers to computer-powered devices or equipment that can be worn by a user, including clothing, watches, glasses, shoes and similar items. devices can range from providing very specific, limited features like heart rate monitoring.

Interferometric Modulator

The color is selected with an electrically switched light modulator comprising a microscopic cavity that is switched on and off using driver integrated circuits similar to those used to address liquid crystal displays (LCD).

Distributed Denial of Service Attack

A distributed denial-of-service (DDoS) attack is one in which a multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted system.

Embedded Systems

System is a computer system with a dedicated function within a larger mechanical or electrical system, often with real-time computing constraints. It is embedded as part of a complete device often including hardware and mechanical parts.

Universal Magneto Resistive Current Sensor

The measurement of electric current strength is not always easy, especially when the measured signal requires further electronic conditioning. Simply connecting an ammeter to an electrical circuit and reading out the value is no longer enough.

Sensors on 3D Digitization

Digital 3D imaging can benefit from advances in VLSI technology in order to accelerate its deployment in many fields like visual communication and industrial automation. High-resolution 3D images can be acquired using laser-based vision systems.

Wireless Local Loop

In a telephone network, a wireless local loop (WLL) is a generic term for an access system that uses a wireless link to connect subscribers to their local exchange in place of conventional copper cable. Using a wireless link shortens

Wireless Lan Security

As new deployments of Wireless LANs proliferate, security flaws are being identified and new techniques to exploit them are freely available over the Internet.

Telepresence

TelePresence is a new technology that creates unique, "in-person" experiences between people, places, and events in their work and personal lives. It combines innovative video, audio, and interactive elements to create this experience over the network.

Network Marketing

In Network Marketing, the companies just eliminate all these middle processes & hand out the product directly to the customers. It cost less to the company. Same way, it cost less to the customer also. Secondly, it creates lot of Employment Opportunities

Types of Budget

When people think of budgeting they frequently think of one expenditure budget for the organization to control its outgoings. There are several types of budget however, of which expenditure budgets is only one type

Hamming Cut Matching Algorithm

Hamming Cut Matching Algorithm algorithm which reduces the comparison time for matching the iris code with database so that we can use iris recognition in case of huge databases like voting system

IT In Space

All ventures into outer space, ranging from exploratory fly-bys to managed flights, have first been tried out of the moon. Like in most other areas, space research is also moving into larger-scale simulations using powerful computers