biyani counseling cell
Apply Online
  • 1122
  • 976
Read More

Vehicular Ad-Hoc Network

The Vehicular Ad-Hoc Network, or VANET, is a technology that uses moves cars as nodes in a network to create a mobile network. VANET turns every participating car into a wireless router or node, allowing cars approximately 100 to 300 meters of each other to connect and, in turn, create a network with a wide […]

Read More

CPU Scheduling

Definition – CPU scheduling is a process which allows one process to use the CPU while the execution of another process is on hold(in waiting state) due to unavailability of any resource like I/O etc, thereby making full use of CPU. The objective of CPU scheduling is to make the system efficient, effective and fast […]

Read More

First “C” Program

In your first C program, you are going to understand the following things in your program- 1. a pre-processor directive that must be present in all your C programs. 2. a simple C function used to write information to your screen. 3. how to add comments to your programs This is a very basic C […]

Read More

Type of Research

1) Exploratory or formative or preparatory Research – Areas covered about which no information is available currently. No research has been undertaken so far on the subject under study. That’s way it is called formative research. Besides building hypothesis, this research also helps in developing new hypothesis. Steps –  Study of related literature  […]

Read More

Description about Research Process

1) Formulating the Research problem –  Based on area of interest identify the problem.  After discussing with colleagues & seniors so as to avoid repetition.  After consulting available literature on the subject. 2) Study of literature –  After defining the problem, researcher should prepare a bibliography of literature concerning the subject. […]

Read More

Modeling in Operation Research

A model is defined as a representation of real life system whether such system refers to a problem, process, operations or events. Models enable us to experiments more effectively than on the system itself which is either impossible or too costly. Advantages of a model –  Describes problem concisely.  Systematic & logical approach […]

Read More

Wireless Network Security Threats

As the name suggests, wireless networks, sometimes called WiFi, allow you to connect to the internet without relying on wires. If your home, office, airport, or even local coffee shop has a wireless connection, you can access the network from anywhere that is within that wireless area. Security threats are associated with wireless networks: Because […]

Read More

What is Cyber Security

It seems that everything relies on computers and the internet now — communication (email, cellphones), entertainment (digital cable, mp3s), transportation (car engine systems, airplane navigation), shopping (online stores, credit cards), medicine (equipment, medical records), and the list goes on. How much of your daily life relies on computers? How much of your personal information is […]

Read More

Guidelines for publishing Information on the Internet

Internet is so accessible and contains a wealth of information; it has become a popular resource for communicating, for researching topics, and for finding information about people. It may seem less intimidating than actually interacting with other people because there is a sense of anonymity. However, you are not really anonymous when you are online, […]