List of Papers Presented / Published by our Teachers. IEEE International Advance Computing Conference (IACC-2009), Patiala

Size: px
Start display at page:

Download "List of Papers Presented / Published by our Teachers. IEEE International Advance Computing Conference (IACC-2009), Patiala"

Transcription

1 List of Papers Presented / Published by our Teachers S.N Umang, M.N. Hoda, B.V. R. Reddy 2. Shivendra, Divya 3. Deepali Shalini, M.N. Hoda 4. Pankaj Kr., Ganesh Gupta, Umang 5. Amita, Anjana Gupta, Anu Kiran 6. Rashmi, A. K. Saini Vulnerability of Numerous Black Hole Nodes In Mobile Ad-Hoc Networks The Routing Problem Trip Production and Attraction Modeling Using Artificial Neural Network for Meerut Next Generation Cloud Computing Technology AOP with Eclipse Aspect J- Development Tool (AJDT) Evaluation of Secondary School Based on Analytic Hierarchy Process Method How to Tap ERP s Hidden Potential in India? IEEE International Advance Computing Conference (IACC-2009), Patiala IEEE International Advance Computing Conference (IACC-2009), Patiala Nation Development, INDIACom-2009, Delhi Nation Development, INDIACom-2009,Delhi Nation Development, INDIACom-2009, Delhi Nation Development, INDIACom-2009, Delhi 6-7 March, March, Shivendra, Divya Trip Production Model for Meerut 3rd International Conference on Intelligent Systems and Networks, Ambala Feb, Rashmi, M.P., A.K. Saini Strategic Software Engineering Techniques to Upgrade ERP Implementation 2 nd International Conference on Data Management (ICDM), Ghaziabad Feb, 2009

2 9. Umang, A Performance Evaluation of National Conference on Modern Trends in IT, M. N. Hoda, Milind, on Demand Routing Protocols Parul Arora Delhi Jan, Jatin Bhasin, Deepali M. N. Hoda 11. Rashmi,, A.K.Saini Multi-View Modular Test Plan Implementing Best Practices in ERP for Small and Medium Enterprises Next Generation Computing Technologies (NGCT-2008), Ghaziabad IEEE Symposium on Advanced Management of Information for Globalized Enterprises (AMIGE- 2008), Tianjin, China Oct, Sep, Shalini, Deepali M.N.Hoda 13. Rahul Jain, Nitin Barthwal, Piyush Oberoi, Deepali M. N. Hoda 14. Mayank Jain, P. Cauvery, Rajat Kalra, Deepali M.N.Hoda The Role of Web Services in i- Banking and the Associated Security Standards Green Pc: Buy Green Save Green (A Helping Hand In Reducing Global Warming) Sub-Optimal Solution To Vertex Cover Problem National Conference on Advanced Computing, Coimbatore 14 th Annual International Sustainable Development Research Conference, Delhi National Conference on Mathematical Modeling, Optimization and Their Applications, Delhi Details of paper Mathematical Modelling Optimization and their Applications Authors: P.C. and M.N.Hoda Publication year 2010 Pages Sep, Sep,

3 Binding Hard Back An Evolutionary Approach to National Conference on Professional Education, Overcome the Challenges Delhi Facing our Educational System 15., Shalini 16. Ganesh Gupta, Umang, Anu Kiran, Amar Deep Gupta 17. Anu Kiran, Umang, Amita 18. Rashmi, M.N.Hoda, A.K.Saini 19. Fady M. Abdulahad, Umang A Provision of Bandwidth Borrowing Schemes for QOS in Wireless Networking Evaluation and Demonstration Board Using 8051 Microcontroller Climbing ERP Ladder With Better Project Planning Comparison between Proactive and Reactive Routing protocols National Conference on Changing Paradigm in Management Practices, Delhi National Conference on Changing Paradigm in Management Practices, Delhi Published in Books of Abstracts for Business and Economic Society (B&ESI) conference, Switzerland by Inderscience National Conference On Issues and challenges in Internet and Mobile Computing, Ghaziabad 24 July, May, May, July, March, M. N. Hoda, Umang, Milind, Parul Arora 21., Rashmi Simulation of AODV, DSR and DSDV Routing Protocols for Mobile Ad-hoc Networks Be Enterprising With ERP National Conference on Challenges and Opportunity in IT (COIT-2008), Punjab 29 March, 2008 Published in Invertis National Journal of Science Journal and Technology, New Delhi 22. M. N. Hoda, How to Secure VOIP National Conference on Innovative March, 2008 Parul Arora, Umang Development in Engineering Applications (IDEA- 08), Punjab 23. Rashmi Security in e-commerce International Conference on Retail Marketing 7 8 March, 2008

4 Globally Emerging and Evolving Trends Lessons for Developing Economy, Delhi 24. Rashmi Indian Retail Market on a High International Conference on Retail Marketing Tide: E-Retailing for Globally Emerging and Evolving Trends Lessons Empowering India for Developing Economy, Delhi 25. Gaurav Manchanda Anshumen Korpal, Shivendra 26. M. N. Hoda, Parul Arora Umang Methodology to Optimize Electromenchanical Architecture With Information Technology Support Security considerations for VOIP Systems 27. A.K. Saini, Rashmi Emerging ERP in e-india : To Revive,To Resolve,To Rejoice 28. Shivendra, Ashok K. Sinha 29. Shivendra, Divya 30. Ankit Ajmani, Deepali M. N. Hoda Trip Generating Modeling Using Artificial Neural Networks e-commerce Challenges in Developing Countries A Comparative Study On Constructive And Non- Constructive Supervised Learning Algorithm For Artificial Neural Networks 7-8 March M.N Hoda, Challenges in securing Voice 40 th Annual Convention of ORSI, Delhi December,

5 Parul Arora, Umang over Internet Protocol 2007 GPS based Vehicle 40 th Annual Convention of ORSI, Delhi December, Deepali 33., Umang 34. Bhagwan Dev, Deepali 35. Sunny Bajaj, Deepali 36. Shivendra, Divya Monitoring System A Study of AD-Hoc Wireless Network Based on Various ADOV Routing Schemes Case Study: Re - Engineering A Structured Application Into A Multi-Tier Application Using UML Software Architecture Drift International Conference on Information and Communication Technology (IICT-2007), Delhi National Conference on Mathematical Modeling, Optimization and Their Applications, Delhi National Conference on Software Engineering (NCSOFT-2007),Cochin Data Mining for CLC National Conference on IT in Multidomain Industry, Pune 37. Parul Arora Optimization of Voice over IP 38. Shivendra Worth of KPO in Retail July, April, April, April April, , Rashmi 40. M. N. Hoda, Umang Stratergic ERP for E-India: A path to Digital Democracy Mitigating Attacks in Routing Protocols

6 41. Umang, Role of ICT in Rural India M. N. Hoda, Milind 42. Bhawana Chugh, Process Model & Method Deepali Identification System 43. Surabhi Anand, Deepali Improvement in Artificial Intelligence Language Prolog National Seminar on Information Warfare: The New Frontiers, Delhi, Published in National Journal of DIAS Times 07 Jan, Umang, M. N. Hoda, B. V. R. Reddy Impact of ICT in Wireless Networks for Indian Rural Development National Seminar on ICT for Productivity ICTP 2006, Gujrat Dec, , Deepali Kamthania Smart Retail Store Product Identification & Position Tracking International Conference on Mobile Ubiquitous & Pervasive Computing, Obcom-2006,Vellore 16-19,Dec , Deepali Kamthania Pervasive Computing_ Current State Issues_ Challenges. 47. Shivendra University Initiatives for Entrepreneurship Education 48., Rashmi 49., Rashmi Total ERP: Mission Possible ERP in India : Bytes of Facts National Conference on Computer Science & Technology, Ghaziabad National Seminar on India Preneurs New Economy, Delhi Drivers Published in National Journal of DIAS Times National Seminar on Latest IT Trends & Technology, Delhi National Seminar on Latest IT Trends & Technology, Delhi Published in National Journal Nov, Nov, Aug, Aug, 2006.

7 of Apeejay Business Review, New Delhi 50. Deepali Kamthania Pervasive computing National Seminar on Latest IT Trends & Intelligent Spaces Technology, Delhi Aug, Anu Kiran, Amita, S. Ramanarayana Reddy 52. Anu Kiran, Amita, S. Ramanarayana Reddy Embedded Systems at a First Glance Explore Design Possibilities of Doing Various Embedded System Experiment on a Single Board using 8051 Micro-Controller and Real Time Interfacing. National Conference on Electronics Circuits and Communication Systems (ECCS-2004), Patiala National Conference on Electronics Circuit and Communication Systems (ECCS-2004), Patiala

Mathematical Modelling, Optimization and. their Applications. P.C. Jha. M.N. Hoda. Narosa Publishing House. New Delhi Chennai Mumbai Kolkata

Mathematical Modelling, Optimization and. their Applications. P.C. Jha. M.N. Hoda. Narosa Publishing House. New Delhi Chennai Mumbai Kolkata Mathematical Modelling, Optimization and their Applications P.C. Jha M.N. Hoda Narosa Publishing House New Delhi Chennai Mumbai Kolkata Contents Acknowledgement v 1. Profit Maximization Policy for Manufacturers

More information

A Novel Technique to Isolate and Detect Jamming Attack in MANET

A Novel Technique to Isolate and Detect Jamming Attack in MANET International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-3 E-ISSN: 2347-2693 A Novel Technique to Isolate and Detect Jamming Attack in MANET Harkiranpreet Kaur

More information

How To Understand And Understand The Science Of Engineering In India

How To Understand And Understand The Science Of Engineering In India RESUME Dr. Shabana Mehfuz Associate Professor Address for correspondence Office Address Nationality Dr Shabana Mehfuz, A- 536, Sector-19, NOIDA, U.P. India, Ph No 09818413081 E-mail-mehfuz_shabana@yahoo.com.

More information

Dr. Mohammad Amjad has obtained his B.Tech. in Computer Engineering from Aligarh Muslim University Aligarh, India in 1997 with first class.

Dr. Mohammad Amjad has obtained his B.Tech. in Computer Engineering from Aligarh Muslim University Aligarh, India in 1997 with first class. Dr. Mohammad Amjad has obtained his B.Tech. in Computer Engineering from Aligarh Muslim University Aligarh, India in 1997 with first class. He obtained his M.Tech. (Information Technology) degree from

More information

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR GUIDOUM AMINA University of SIDI BEL ABBES Department of Electronics Communication Networks,

More information

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).

More information

A Survey on Reduction in Energy Consumption by Improved AODV on Mobile Ad Hoc Network

A Survey on Reduction in Energy Consumption by Improved AODV on Mobile Ad Hoc Network International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-2 E-ISSN: 2347-2693 A Survey on Reduction in Energy Consumption by Improved AODV on Mobile Ad Hoc Network

More information

AT&T Global Network Client for Windows Product Support Matrix January 29, 2015

AT&T Global Network Client for Windows Product Support Matrix January 29, 2015 AT&T Global Network Client for Windows Product Support Matrix January 29, 2015 Product Support Matrix Following is the Product Support Matrix for the AT&T Global Network Client. See the AT&T Global Network

More information

Name Qualification Designation Specialization Experience (in years)

Name Qualification Designation Specialization Experience (in years) Department of & Name Qualification Designation Specialization Experience (in years) BHANU KAPOOR SUDHIR MAHAJAN SUMEET DUA Master and Doctorate of from Southern Methodist University, Dallas, Texas. BE

More information

A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS

A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS Chandanpreet Kaur Global Institute of Management and Emerging Technologies, Amritsar, Punjab, India, lpu_chandan@yahoo.co.in

More information

Introduction to Computer Networking: Trends and Issues

Introduction to Computer Networking: Trends and Issues Introduction to Computer Networking: Trends and Issues Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Indo-US Collaboration in Engineering Education (IUCEE) Webinar,

More information

Keywords- manet, routing protocols, aodv, olsr, grp,data drop parameter.

Keywords- manet, routing protocols, aodv, olsr, grp,data drop parameter. Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Evaluation of

More information

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS* COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun

More information

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS* COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun

More information

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS International Journal of Science, Environment and Technology, Vol. 1, No 2, 2012, 72-79 ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS Ramesh Kait 1, R. K. Chauhan

More information

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem

More information

TOPOLOGIES NETWORK SECURITY SERVICES

TOPOLOGIES NETWORK SECURITY SERVICES TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security

More information

Energy-Aware Performance Metric for AODV and DSDV Routing Protocols in Mobile Ad-Hoc Networks

Energy-Aware Performance Metric for AODV and DSDV Routing Protocols in Mobile Ad-Hoc Networks www.ijcsi.org 118 -Aware Performance Metric for AODV and DSDV Routing Protocols in Mobile Ad-Hoc Networks Vijayalakshmi P 1, Dr.V.Saravanan 2, Dr. P. Ranjit Jeba Thangiah 3, Abraham Dinakaran.J 4 1 Karunya

More information

Security protocols for ad-hoc wireless networks Raghava Karanam, Gautam Sreeram Pendum, Narendra Nath Vattikuti

Security protocols for ad-hoc wireless networks Raghava Karanam, Gautam Sreeram Pendum, Narendra Nath Vattikuti Security protocols for ad-hoc wireless networks Raghava Karanam, Gautam Sreeram Pendum, Narendra Nath Vattikuti Project Introduction/Motivation With the emergence of the integrated circuits, the wireless

More information

Remote Home Security System Based on Wireless Sensor Network Using NS2

Remote Home Security System Based on Wireless Sensor Network Using NS2 Remote Home Security System Based on Wireless Sensor Network Using NS2 #Rajesh Banala 1, Asst.Professor,E-mail: rajesh.banal@gmail.com #D.Upender 2, Asst.Professor, E mail: upender584@gmail.com #Department

More information

`PERFORMANCE COMPARISON OF ENERGY EFFICIENT AODV PROTOCOLS

`PERFORMANCE COMPARISON OF ENERGY EFFICIENT AODV PROTOCOLS `PERFORMANCE COMPARISON OF ENERGY EFFICIENT AODV PROTOCOLS Divya Sharma CSE Dept, ITM Guargoan divya@itmindia.edu Ashwani Kush Computer Dept, University College Kurukshetra University India akush@kuk.ac.in

More information

MONTHLY REMINDERS FOR 2013

MONTHLY REMINDERS FOR 2013 MONTHLY REMINDERS FOR 2013 Legend: Red IRS Due Dates Green Department of Revenue Due Dates Blue Parish Finance Due Dates Black Second Collections JANUARY 4 Deposit payroll tax for payments on Jan 1 if

More information

10CS64: COMPUTER NETWORKS - II

10CS64: COMPUTER NETWORKS - II QUESTION BANK 10CS64: COMPUTER NETWORKS - II Part A Unit 1 & 2: Packet-Switching Networks 1 and Packet-Switching Networks 2 1. Mention different types of network services? Explain the same. 2. Difference

More information

LIST OF FIGURES. Figure No. Caption Page No.

LIST OF FIGURES. Figure No. Caption Page No. LIST OF FIGURES Figure No. Caption Page No. Figure 1.1 A Cellular Network.. 2 Figure 1.2 A Mobile Ad hoc Network... 2 Figure 1.3 Classifications of Threats. 10 Figure 1.4 Classification of Different QoS

More information

PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET USING DIRECTIONAL ANTENNA

PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET USING DIRECTIONAL ANTENNA International Research Journal of Engineering and Technology (IRJET) e-issn: -00 Volume: 0 Issue: 0 Oct-01 www.irjet.net p-issn: -00 PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET

More information

TECHNOLOGY INNOVATION & ENTREPRENEURSHIP CENTER (TIEC)

TECHNOLOGY INNOVATION & ENTREPRENEURSHIP CENTER (TIEC) TECHNOLOGY INNOVATION & ENTREPRENEURSHIP CENTER (TIEC) Egypt 1.0 Jan25 : an Investment Story!!! Egypt 2.0 Seed Capital on Jan 25 by Young Entrepreneurs (Youth rebels) Innovative (IT /SN Based FB + Twitter)

More information

Study and Performance Comparison of AODV & DSR on the basis of Path Loss Propagation Models

Study and Performance Comparison of AODV & DSR on the basis of Path Loss Propagation Models Study and Performance Comparison of AODV & DSR on the basis of Path Loss Propagation Models Rachit Jain 1, Laxmi Shrivastava 2 1,2 Department of Electronics, Madhav Institute of Technology and Science,

More information

Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin S. Khan

Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin S. Khan International Journal of Scientific & Engineering Research, Volume 5, Issue 7, July-2014 1410 Secured Authentication Using Mobile Phone as Security Token Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin

More information

An Implementation of Secure Wireless Network for Avoiding Black hole Attack

An Implementation of Secure Wireless Network for Avoiding Black hole Attack An Implementation of Secure Wireless Network for Avoiding Black hole Attack Neelima Gupta Research Scholar, Department of Computer Science and Engineering Jagadguru Dattaray College of Technology Indore,

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND

More information

Training Programme 2014

Training Programme 2014 C A PA C I T Y D E V E LO P M E N T P R O G R A M M E S 2 0 1 4 Training Programme 2014 Economic and Social Research Foundation (ESRF) Research Capacity Building Knowledge Management CAPACITY DEVELOPMENT

More information

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Kiruthiga S PG student, Coimbatore Institute of Engineering and Technology Anna University, Chennai,

More information

( Increased usage of IP addresses )

( Increased usage of IP addresses ) IPv6 Applications IPv6: Make Possible Internet of Things More Devices than people Smart phones Smart Tablets Traditional Internet desktops Data-enabled mobile phones Consumer appliances Embedded systems

More information

Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138. Exhibit 8

Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138. Exhibit 8 Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138 Exhibit 8 Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 2 of 138 Domain Name: CELLULARVERISON.COM Updated Date: 12-dec-2007

More information

PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK

PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK http:// PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK Anjali Sahni 1, Ajay Kumar Yadav 2 1, 2 Department of Electronics and Communication Engineering, Mewar Institute,

More information

CENTERPOINT ENERGY TEXARKANA SERVICE AREA GAS SUPPLY RATE (GSR) JULY 2015. Small Commercial Service (SCS-1) GSR

CENTERPOINT ENERGY TEXARKANA SERVICE AREA GAS SUPPLY RATE (GSR) JULY 2015. Small Commercial Service (SCS-1) GSR JULY 2015 Area (RS-1) GSR GSR (LCS-1) Texarkana Incorporated July-15 $0.50690/Ccf $0.45450/Ccf $0.00000/Ccf $2.85090/MMBtu $17.52070/MMBtu Texarkana Unincorporated July-15 $0.56370/Ccf $0.26110/Ccf $1.66900/Ccf

More information

DESIGN ISSUES AND CLASSIFICATION OF WSNS OPERATING SYSTEMS

DESIGN ISSUES AND CLASSIFICATION OF WSNS OPERATING SYSTEMS DESIGN ISSUES AND CLASSIFICATION OF WSNS OPERATING SYSTEMS ANIL KUMAR SHARMA 1, SURENDRA KUMAR PATEL 2, & GUPTESHWAR GUPTA 3 1&2 Department of I.T. and Computer Application, Dr. C.V.Raman University, Kota,

More information

To Study the Various Attacks and Protocols in MANET

To Study the Various Attacks and Protocols in MANET International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-4 E-ISSN: 2347-2693 To Study the Various Attacks and Protocols in MANET Harkiranpreet Kaur 1* and Rasneet

More information

A Well-organized Dynamic Bandwidth Allocation Algorithm for MANET

A Well-organized Dynamic Bandwidth Allocation Algorithm for MANET A Well-organized Dynamic Bandwidth Allocation Algorithm for MANET S.Suganya Sr.Lecturer, Dept. of Computer Applications, TamilNadu College of Engineering, Coimbatore, India Dr.S.Palaniammal Prof.& Head,

More information

Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review

Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review Review Process The Knowledge Unit (KU) Review Calendar divides the entire CAE-C KU list into 12 months for the purposes of

More information

personnel $ $ payroll claim

personnel $ $ payroll claim personnel $ $ claim payroll leave HR entrée by frontier e-hr ABOUT FRONTIER E-HR Frontier e-hr System enables more than 100,000 users in over 600 companies to streamline their HR operations, increase their

More information

Multihop Wireless Networks

Multihop Wireless Networks Multihop Wireless Networks Ray-Guang Cheng Associate Professor Department of Electronic Engineering, National Taiwan Univ. of Science and Technology, Taipei, Taiwan Email: crg@mail.ntust.edu.tw Outline

More information

Maipu ivehicle Cloud Introduction

Maipu ivehicle Cloud Introduction Maipu ivehicle Cloud Introduction Contents 1 2 3 What is Maipu ivehicle Cloud Solution Introduction Product Introduction Case Study Applications Of Maipu ivehicle Solution In current years, We all are

More information

Haihua LI (lihaihua@caict.ac.cn)

Haihua LI (lihaihua@caict.ac.cn) Haihua LI (lihaihua@caict.ac.cn) 1 Viewpoints on Industrial Internet 2 Standardization of Industrial Internet 3 Standardization Activities Industrial internet is the deeply integration and integrated applications

More information

Enterprise VoIP Services over Mobile Ad-Hoc Technologies

Enterprise VoIP Services over Mobile Ad-Hoc Technologies Enterprise VoIP Services over Mobile Ad-Hoc Technologies 1 System Architecture Figure 1 illustrates the system architecture. We can divide it into 2 parts. One is the Mobile VoIP Box (MVB) node and the

More information

Intelligent Agents for Routing on Mobile Ad-Hoc Networks

Intelligent Agents for Routing on Mobile Ad-Hoc Networks Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University yzhou@cs.dal.ca A. N. Zincir-Heywood Dalhousie University zincir@cs.dal.ca Abstract This paper introduces a new agent-based

More information

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,

More information

DESIGN OF INTELLIGENT DEVICE TO SAVE STANDBY POWER IN NETWORK ENABLED DEVICES

DESIGN OF INTELLIGENT DEVICE TO SAVE STANDBY POWER IN NETWORK ENABLED DEVICES International Journal of Computer Engineering & Technology (IJCET) Volume 7, Issue 1, Jan-Feb 216, pp. 54-61, Article ID: IJCET_7_1_7 Available online at http://www.iaeme.com/ijcet/issues.asp?jtype=ijcet&vtype=7&itype=1

More information

Analysis One Code Desc. Transaction Amount. Fiscal Period

Analysis One Code Desc. Transaction Amount. Fiscal Period Analysis One Code Desc Transaction Amount Fiscal Period 57.63 Oct-12 12.13 Oct-12-38.90 Oct-12-773.00 Oct-12-800.00 Oct-12-187.00 Oct-12-82.00 Oct-12-82.00 Oct-12-110.00 Oct-12-1115.25 Oct-12-71.00 Oct-12-41.00

More information

RESUME. Dr. Rudra Prakash Maheshwari. Indian Institute of Technology Roorkee 247 667, India. 25th June, 1960

RESUME. Dr. Rudra Prakash Maheshwari. Indian Institute of Technology Roorkee 247 667, India. 25th June, 1960 RESUME DR. R. P. MAHESHWARI Department of Electrical Engineering Indian Institute of Technology Roorkee 247 667, India Phone: +91-1332-285596 (Off.) +91-1332-272611, 285116 (Res.) FAX: +91-1332-273560

More information

6367(Print), ISSN 0976 6375(Online) & TECHNOLOGY Volume 4, Issue 1, (IJCET) January- February (2013), IAEME

6367(Print), ISSN 0976 6375(Online) & TECHNOLOGY Volume 4, Issue 1, (IJCET) January- February (2013), IAEME INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology ENGINEERING (IJCET), ISSN 0976-6367(Print), ISSN 0976 6375(Online) & TECHNOLOGY Volume 4, Issue 1, (IJCET)

More information

Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System

Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System Shams Fathima M.Tech,Department of Computer Science Kakatiya Institute of Technology & Science, Warangal,India

More information

Education. Award. Experience. Teaching Assignment. Research Project

Education. Award. Experience. Teaching Assignment. Research Project Dr. Satwinder Singh Assistant Professor Centre for Computer Science Technology School of Engineering & Technology Central University of Punjab Bathinda-151100 email:satwindercse@gmail.com Education Ph.

More information

Technology Longowal, Punjab, India

Technology Longowal, Punjab, India An Intrusion Detection System Against Multiple Blackhole Attacks In Ad-Hoc Networks Using Wireless Antnet Sunny Chanday 1, Rajeev Kumar 2, Dilip Kumar 3 1 M.Tech student, Department of Computer Science

More information

A Comprehensive Analysis on Route Discovery and Maintenance Features of DSDV, AODV and IERF Ad-hoc Routing Protocols

A Comprehensive Analysis on Route Discovery and Maintenance Features of DSDV, AODV and IERF Ad-hoc Routing Protocols International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-2 E-ISSN: 2347-2693 A Comprehensive Analysis on Route Discovery and Maintenance Features of DSDV, AODV

More information

VoIP Market India July 2014

VoIP Market India July 2014 VoIP Market India July 2014 Executive Summary Market Overview The Indian VoIP market is currently valued at INR x1 mn and is expected to attain a CAGR of x2% to reach INR x3 mn by 20-- Mobile VoIP market

More information

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate

More information

How To Understand The City Of Hong Kong

How To Understand The City Of Hong Kong OGCIO Seminar on PSI/Data.One PSI and Big Data Jiannong Cao Department of Computing Hong Kong Polytechnic University Big Data TB (10 12 bytes) PB (10 15 bytes) EB (10 18 bytes) ZB (10 21 bytes)... The

More information

Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network

Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network Middle-East Journal of Scientific Research 15 (9): 1290-1294, 2013 ISSN 1990-9233 IDOSI Publications, 2013 DOI: 10.5829/idosi.mejsr.2013.15.9.11514 Fast and Secure Data Transmission by Using Hybrid Protocols

More information

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA

More information

Secured Data Transmissions In Manet Using Neighbor Position Verfication Protocol

Secured Data Transmissions In Manet Using Neighbor Position Verfication Protocol www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue3 March, 2014 Page No. 5067-5071 Secured Data Transmissions In Manet Using Neighbor Position Verfication

More information

Applying ICT and IoT to Multifamily Buildings. U.S. Department of Energy Buildings Interoperability Vision Meeting March 12, 2015 Jeff Hendler, ETS

Applying ICT and IoT to Multifamily Buildings. U.S. Department of Energy Buildings Interoperability Vision Meeting March 12, 2015 Jeff Hendler, ETS Applying ICT and IoT to Multifamily Buildings U.S. Department of Energy Buildings Interoperability Vision Meeting March 12, 2015 Jeff Hendler, ETS ETS is an Energy Technology, Behavior Management, and

More information

Enhanced Vessel Traffic Management System Booking Slots Available and Vessels Booked per Day From 12-JAN-2016 To 30-JUN-2017

Enhanced Vessel Traffic Management System Booking Slots Available and Vessels Booked per Day From 12-JAN-2016 To 30-JUN-2017 From -JAN- To -JUN- -JAN- VIRP Page Period Period Period -JAN- 8 -JAN- 8 9 -JAN- 8 8 -JAN- -JAN- -JAN- 8-JAN- 9-JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- 8-JAN- 9-JAN- -JAN- -JAN- -FEB- : days

More information

A STUDY ON PERFORMANCE OF UNIT-LINKED INSURANCE PLANS (ULIP) OFFERED BY INDIAN PRIVATE INSURANCE COMPANIES

A STUDY ON PERFORMANCE OF UNIT-LINKED INSURANCE PLANS (ULIP) OFFERED BY INDIAN PRIVATE INSURANCE COMPANIES A STUDY ON PERFORMANCE OF UNIT-LINKED INSURANCE PLANS (ULIP) Dr. G Nagarajan * Mr. A. Asif Ali ** Mr. N. Sathyanarayana** OFFERED BY INDIAN PRIVATE INSURANCE COMPANIES Abstract: Indian Insurance Industry

More information

Security for Ad Hoc Networks. Hang Zhao

Security for Ad Hoc Networks. Hang Zhao Security for Ad Hoc Networks Hang Zhao 1 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile hosts connected by wireless links, often called Mobile

More information

Carnegie Mellon University Master of Science in Information Technology Software Engineering (MSIT-SE) MSIT Project (17-677) Approval Form

Carnegie Mellon University Master of Science in Information Technology Software Engineering (MSIT-SE) MSIT Project (17-677) Approval Form Carnegie Mellon University Master of Science in Information Technology Software Engineering (MSIT-SE) MSIT Project (17-677) Approval Form Student Name: Jane Doe Date: 9/19/2002 Project Title: Re-Engineer

More information

Performance Analysis of Mobility Pattern for Vehicular Ad-Hoc Network Using Various Routing Protocols

Performance Analysis of Mobility Pattern for Vehicular Ad-Hoc Network Using Various Routing Protocols International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-2 E-ISSN: 2347-2693 Performance Analysis of Mobility Pattern for Vehicular Ad-Hoc Network Using Various

More information

IEEE 2015-2016 JAVA TITLES

IEEE 2015-2016 JAVA TITLES ECWAY ECHNOLGIES IEEE 2015-2016 JAVA TITLES BE, B.TECH, ME, M.TECH, MSC, MCA PROJECTS Abstract: Introduction: Literature Survey: System Analysis: Existing System: Disadvantages: Proposed System: Advantages:

More information

Forward-Looking Statements Disclaimer Market and Industry Data

Forward-Looking Statements Disclaimer Market and Industry Data Corporate Overview Forward-Looking Statements Disclaimer Certain statements made in this presentation and the related materials may contain forward-looking statements, which are not historical facts, but

More information

Adopting SCTP and MPLS-TE Mechanism in VoIP Architecture for Fault Recovery and Resource Allocation

Adopting SCTP and MPLS-TE Mechanism in VoIP Architecture for Fault Recovery and Resource Allocation Adopting SCTP and MPLS-TE Mechanism in VoIP Architecture for Fault Recovery and Resource Allocation Fu-Min Chang #1, I-Ping Hsieh 2, Shang-Juh Kao 3 # Department of Finance, Chaoyang University of Technology

More information

PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2

PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2 International Journal of Computer Engineering & Technology (IJCET) Volume 7, Issue 1, Jan-Feb 2016, pp. 01-08, Article ID: IJCET_07_01_001 Available online at http://www.iaeme.com/ijcet/issues.asp?jtype=ijcet&vtype=7&itype=1

More information

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological

More information

Gilead Clinical Operations Risk Management Program

Gilead Clinical Operations Risk Management Program Gilead Clinical Operations Risk Management Program Brian J Nugent, Associate Director 1 Agenda Risk Management Risk Management Background, Benefits, Framework Risk Management Training and Culture Change

More information

Securing MANET Using Diffie Hellman Digital Signature Scheme

Securing MANET Using Diffie Hellman Digital Signature Scheme Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 Karanvirk09@gmail.com 2

More information

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra

More information

Robust Security Solution to Countermeasure of Malicious Nodes for the Security of MANET

Robust Security Solution to Countermeasure of Malicious Nodes for the Security of MANET Robust Security Solution to Countermeasure of Malicious Nodes for the Security of MANET Kritika Sharma M.tech(CSE) Doon Valley Insttitute of Enggineering & Technology, Karnal Parikshit Singla Assistant

More information

Real Time Bus Monitoring System by Sharing the Location Using Google Cloud Server Messaging

Real Time Bus Monitoring System by Sharing the Location Using Google Cloud Server Messaging Real Time Bus Monitoring System by Sharing the Location Using Google Cloud Server Messaging Aravind. P, Kalaiarasan.A 2, D. Rajini Girinath 3 PG Student, Dept. of CSE, Anand Institute of Higher Technology,

More information

CORPORATE PROFILE JANUARY 2015. Innovative Technology Solutions for the Infrastructure Sector

CORPORATE PROFILE JANUARY 2015. Innovative Technology Solutions for the Infrastructure Sector CORPORATE PROFILE JANUARY 2015 Innovative Technology Solutions for the Infrastructure Sector Our vision To be the most innovative, reliable and quality-focussed solutions provider in the Infrastructure

More information

PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS

PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS Ali M. Alsahlany 1 1 Department of Communication Engineering, Al-Najaf Technical College, Foundation of

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

P/T 2B: 2 nd Half of Term (8 weeks) Start: 26-AUG-2013 End: 20-OCT-2013 Start: 21-OCT-2013 End: 15-DEC-2013

P/T 2B: 2 nd Half of Term (8 weeks) Start: 26-AUG-2013 End: 20-OCT-2013 Start: 21-OCT-2013 End: 15-DEC-2013 2013-2014 SPECIAL TERM ACADEMIC CALENDAR FOR SCRANTON EDUCATION ONLINE (SEOL), MBA ONLINE, HUMAN RESOURCES ONLINE, NURSE ANESTHESIA and ERP PROGRAMS SPECIAL FALL 2013 TERM Key: P/T = Part of Term P/T Description

More information

P/T 2B: 2 nd Half of Term (8 weeks) Start: 25-AUG-2014 End: 19-OCT-2014 Start: 20-OCT-2014 End: 14-DEC-2014

P/T 2B: 2 nd Half of Term (8 weeks) Start: 25-AUG-2014 End: 19-OCT-2014 Start: 20-OCT-2014 End: 14-DEC-2014 2014-2015 SPECIAL TERM ACADEMIC CALENDAR FOR SCRANTON EDUCATION ONLINE (SEOL), MBA ONLINE, HUMAN RESOURCES ONLINE, NURSE ANESTHESIA and ERP PROGRAMS SPECIAL FALL 2014 TERM Key: P/T = Part of Term P/T Description

More information

Reducing Configuration Complexity with Next Gen IoT Networks

Reducing Configuration Complexity with Next Gen IoT Networks Reducing Configuration Complexity with Next Gen IoT Networks Orama Inc. November, 2015 1 Network Lighting Controls Low Penetration - Why? Commissioning is very time-consuming & expensive Network configuration

More information

Padma Charan Das Dept. of E.T.C. Berhampur, Odisha, India

Padma Charan Das Dept. of E.T.C. Berhampur, Odisha, India Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Measuring Quality

More information

ARIS 9 Highlights and Outlook

ARIS 9 Highlights and Outlook ARIS 9 Highlights and Outlook Karl Wagner Senior Vice President ARIS R&D 2013 Software AG. All rights reserved. ARIS at a Glance 2M END FIRST BPA Solution 25 SUCCESS LEADER YEARS OF 10,000 CUSTOMERS USERS

More information

1 M.Tech, 2 HOD. Computer Engineering Department, Govt. Engineering College, Ajmer, Rajasthan, India

1 M.Tech, 2 HOD. Computer Engineering Department, Govt. Engineering College, Ajmer, Rajasthan, India Volume 5, Issue 5, May 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Dynamic Performance

More information

IBM QRadar Security Intelligence Platform appliances

IBM QRadar Security Intelligence Platform appliances IBM QRadar Security Intelligence Platform Comprehensive, state-of-the-art solutions providing next-generation security intelligence Highlights Get integrated log management, security information and event

More information

BGP route monitoring. Mar, 25, 2008 Matsuzaki maz Yoshinobu <maz@telecom-isac.jp>, <maz@iij.ad.jp>

BGP route monitoring. Mar, 25, 2008 Matsuzaki maz Yoshinobu <maz@telecom-isac.jp>, <maz@iij.ad.jp> BGP route monitoring Mar, 25, 2008 Matsuzaki maz Yoshinobu , 1 abstract BGP prefix hijack is a serious security issue in the internet, and these events have been widely

More information

Providing Secure IT Management & Partnering Solution for Bendigo South East College

Providing Secure IT Management & Partnering Solution for Bendigo South East College Providing Secure IT Management & Partnering Solution for Bendigo South East College Why did Bendigo South East College engage alltasksit & DELL? BSEC is in the midst of school population growth in 2015,

More information

Storm Clouds Ahead? A risk analysis of Cloud Computing

Storm Clouds Ahead? A risk analysis of Cloud Computing Storm Clouds Ahead? A risk analysis of Cloud Computing Andy Bolton Chief Executive Officer, Capacitas Abstract Many organisations are now considering using 'Cloud Computing' offerings to meet their scalability

More information

Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol

Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol ISSN: 2278 1323 All Rights Reserved 2014 IJARCET 2106 Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol Monika Malik, Partibha Yadav, Ajay Dureja Abstract A collection

More information

Ashley Institute of Training Schedule of VET Tuition Fees 2015

Ashley Institute of Training Schedule of VET Tuition Fees 2015 Ashley Institute of Training Schedule of VET Fees Year of Study Group ID:DECE15G1 Total Course Fees $ 12,000 29-Aug- 17-Oct- 50 14-Sep- 0.167 blended various $2,000 CHC02 Best practice 24-Oct- 12-Dec-

More information

White Paper: Efficient Management of Cloud Resources

White Paper: Efficient Management of Cloud Resources White Paper: 215, Cloud Point ltd. All rights reserved. INTELLECTUAL PROPERTY DISCLAIMER This white paper is for informational purposes only and is provided as is with no warranties whatsoever including

More information

University of Wisconsin System Strategic Initiatives

University of Wisconsin System Strategic Initiatives University of Wisconsin System Strategic Initiatives April 27,2015 Sasi K. Pillay UWSA CIO 1 Principles Mission Enablement Reduction of Risk Cost-effective Operations 2 The Four Tenets A. Elevate the Professionalism

More information

The Next Generation Network:

The Next Generation Network: JULY, 2012 The Next Generation Network: Why the Distributed Enterprise Should Consider Multi-circuit WAN VPN Solutions versus Traditional MPLS Tolt Solutions Network Services 125 Technology Drive Suite

More information

ABV- Indian Institute of Information Technology & Management Gwalior (MP)

ABV- Indian Institute of Information Technology & Management Gwalior (MP) ABV- Indian Institute of Information Technology & Management Gwalior (MP) Following are the links to various online courses available (through MOOC etc.). This list is prepared by the Doctoral Students

More information

Verizon Managed SD WAN with Cisco IWAN. October 28, 2015

Verizon Managed SD WAN with Cisco IWAN. October 28, 2015 Verizon Managed SD WAN with Cisco IWAN. October 28, 2015 Agenda Evolution of the WAN SD WAN delivers business outcomes Verizon s Managed IWAN solution Challenges for SD WAN adoption Deployment guidelines

More information

COURSE CATALOGUE 2013-2014

COURSE CATALOGUE 2013-2014 COURSE CATALOGUE 201-201 Field: COMPUTER SCIENCE Programme: Bachelor s Degree Programme in Computer Science (Informatics) Length of studies: years (6 semesters) Number of ECTS Credits: 180 +0 for the B.Sc.

More information

How does Big Data disrupt the technology ecosystem of the public cloud?

How does Big Data disrupt the technology ecosystem of the public cloud? How does Big Data disrupt the technology ecosystem of the public cloud? Copyright 2012 IDC. Reproduction is forbidden unless authorized. All rights reserved. Agenda Market trends 2020 Vision Introduce

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information