Personal Information
Organization / Workplace
Bhavnagar Area, India India
Industry
Education
Tags
gtu
dhaval
chandarana
dhaval chandarana
osv 3141601
osv
operating system
3140702
operating system and virtuliza
gtu 3141601
cns 3161606
gtu 3161606
cns
2180712
cis
gtu 2180712
cis 2180712
cloud infrastructure and services
3130703
dbms
wt 3160713
wd 3151606
gtu 3160713
gtu 3151606
web programming
web development
wt
wd
cryptography and network security
3161606
gtu 3161925
3161925
cle
gmit
data compression
dc 3171615
gtu 3171615
3171615
dc
cle 3161925
cyber security
3160713
3151606
dbms 3130703
database management system
3150714
gmgc
cyber laws and ethics
css
bhavnagar
cryptography and network secur
its requirements and security
3141601
probability models
gtu 3130703
database management systems
cyber crime
generating charts
jquery
rest api
ajax
javascript validations
event handling with javascript
regular expressions
dom
javascript objects
pop up boxes
types of javascript
javascript
object oriented
curd
database
php
session management
hidden fields
query string
cookie
session
3140601
gtu 3140601
nist digital signature algorithm
various digital signature schemes (elgamal and sch
requirements and security
its properties
digital signature
macs based on block ciphers
macs based on hash functions
message authentication codes
secure hash algorithm (sha)
hash functions based on cipher block chaining
simple hash functions
their applications
cryptographic hash functions
man-in-middle attack
diffie-hillman key exchange algorithm
its computational aspects and security
rsa algorithm
requirements and cryptanalysis
public key cryptosystems with applications
counter mode
output feedback mode
cipher feedback mode
cipher block chaining mode
electronic code book
multiple encryption and triple des
operating system and virtulization
distributed & realtime o.s.
parallel
time sharing
multiprogramming. multitasking
batch
system calls
interaction of o.s. & hardware architecture
basic functions
goals & structures of o.s
architecture
computer system overview
example and implementation
key expansion
its transformation functions
aes with structure
design principles of block cipher
strength of des
data encryption standard (des) with example
block cipher structure
stream ciphers and block ciphers
substitution and transposition techniques
cryptanalysis and attacks
cryptography
the euclidean algorithm.symmetric cipher model
modular arithmetic
fields
ring
security mechanisms finite fields – group
security services
bachelor of engineering
gujarat technological university
pl/sql
sql
pl
unit - 10
database triggers
stored function
stored procedures
cursors
vector quantization
max quantizer outputs
entropy coding of lloyd
entropy coded quantization
companded quantization
pdf optimized quantization
non uniform quantization
backward adaptive
forward adaptive
adaptive quantization
uniform quantizer
the quantization problem
scalar quantization
physical models
linear system models
auditory perception
the human visual system
distortion criteria
mathematical preliminaries for lossy coding
lossless image compression
unit - 5
jpeg-ls
calic
the old jpeg standard
context based compression
unit-4
mtf
move-to-front coding
bwt
the burrows-wheeler transform
the exclusion principle
length of context
the escape symbol
the basic algorithm
prediction with partial match(ppm)
image compression
applications
lzw approach
the lz78 approach
the lz77 approach
adaptive dictionary
diagram coding
static dictionary
dictionaty techniques
unit-3
integer implementation comparison of huffman and a
algorithm implementation
deciphering the tag generating binary code – uniqu
audio compression arithmetic coding: coding a sequ
text compression
decoding procedure golomb codes rice codes tunstal
encoding procedure
huffman coding: the huffman coding algorithm – min
prefix codes
markov models coding – uniquely decodable codes
modeling and coding mathematical preliminaries for
compression techniques
examining logs.
failure plans
geographic and other concerns
bottom line impact
utilization and tracking
managing costs
opsworks
cloudtrail
cloudformation
cloudwatch
cloud security
application services
analytics services
law relating to employees and internet
relevant sections of reserve bank of india act
relevant sections of indian penal code
relevant sections of bankers book evidence act
relevant sections of indian evidence act
it act and criminal procedural code
it act and civil procedure code
electronic data base and its protection
domain names and copyright disputes
software – copyright or patented
copyright
trademark law
patent law
redshift.
elasticache
relational database service – dynamodb
private dns servers (route 53)
cloud models
virtual private clouds
introduction to block chain ethics.
introduction to artificial intelligence ethics: et
need for cyber regulations and ethics. ethics in i
significance of cyber ethics
the importance of cyber law
two phase and three phase commit protocols
raid levels
aries
fuzzy checkpoint
advanced recovery techniques- shadow paging
write- ahead logging protocol
different techniques of recoverability
methods to control failure
wound-wait algorithm recovery in dbms - types of f
wait-die algorithm
avoidance
prevention
deadlock in distributed systems – detection
deadlock in centralized systems
distributed deadlock & recovery deadlock concept
selling on the marketplace
amis
cataloging the marketplace
elastic load balancing
auto scaling
imaging computers
elastic cloud compute - introduction to servers
other aws security capabilities
understanding public/private keys
aws physical security - aws compliance initiatives
iam abilities and limitations
security policies
and roles - understanding credentials
groups
users
glacier - content delivery platforms
elastic block store - simple storage service
matching interfaces and services
aws url naming
web services
basic understanding apis - aws programming interfa
aws ecosystem.
aws services
aws infrastructure
aws history
comparison of cloud providers
cloud marketplace overview
machine imaging
hypervisors
load balancing
exploring virtualization
business concerns in the cloud
cloud deployment models
cloud service options
history of cloud computing
introduction to the cloud computing
emerging trends
e-markets
edi
supply chain
electronic payments
taxation
e security. business
b2c
paper vs paper less contracts e-commerce models- b
evolution and development in e-commerce
information technology act
penalties and adjudication.
cyber regulations appellate tribunal
network service providers liability
cyber crime and offences
certifying authorities
legal recognition of digital signature
legal recognition of electronic records
electronic governance
private cryptography
public cryptography
cryptographic algorithm
digital signatures
amendments and limitations of it act
2000
overview of it act
introduction to cyber law:
internet as a tool for global access.
legal and technological significance of domain nam
web hosting and web development agreement
cyberspace-web space
civil and criminal jurisdictions
hierarchy of courts
cyber jurisdiction
cyber ethics
real approach
consensual approach
doctrinal approach
jurisprudence and law
emergence of cyber space. cyber jurisprudence
evolution of computer technology
join
correlated sub-queries
sub-queries
set operations
string functions
date
built-in functions –numeric
aggregate functions
in operator
check
not null
unique
foreign key
defining constraints – primary key
alteration
structure – creation
dcl
dml
ddl
basics of sql
sql injection.
intrusion detection
mac and rbac models
dac
authorization and access control
authentication
query optimization
join strategies
query equivalence
evaluation of relational algebra expressions
htc-hydra
pwdump
l0htcrack
password cracking and brute-force tools – john the
webgoat
sqlmap. dvwa
application inspection tools – zed attack proxy
openssl and stunnel
http utilities - curl
w3af
web application tools scanning for web vulnerabili
transaction processing
database recovery.
multi-version and optimistic concurrency control s
locking and timestamp based schedulers
serializability of scheduling
acid property
concurrency control
hping kismet
ettercap
wireshark
thc-amap and system tools. network sniffers and in
network reconnaissance – nmap
winrelay
fpipe
understanding port and services tools - datapipe
socat
metasploit. networks vulnerability scanning - netc
openvas
vulnerability examples
vulnerability probe
traffic probe
banner / version check
open port / service identification
systems vulnerability scanning overview of vulnera
lossless design
dependency preservation
normal forms
armstrong's axioms
domain and data dependency
sql server
db2
oracle
open source and commercial dbms - mysql
ddl and dml constructs
sql3
tuple and domain relational calculus
relational algebra
relational query
relational query languages
integrity constraints
data manipulation
relational and object oriented data models
network model
entity-relationship model
erp
data model
unit 2
3 sem
attack on wireless networks
buffer overflow
sql injection
ddos
dos
spyware
keyloggers
backdoors
virus and warms
steganography
cyberspace
attack vector
cyber law
crime
firewall
networking
See more
Presentations
(100)Documents
(2)Likes
(2)DBMS Unit - 2 - Data Models
Gyanmanjari Institute Of Technology
•
3 years ago
Distributed DBMS - Unit 8 - Distributed Transaction Management & Concurrency Control
Gyanmanjari Institute Of Technology
•
7 years ago
Personal Information
Organization / Workplace
Bhavnagar Area, India India
Industry
Education
Tags
gtu
dhaval
chandarana
dhaval chandarana
osv 3141601
osv
operating system
3140702
operating system and virtuliza
gtu 3141601
cns 3161606
gtu 3161606
cns
2180712
cis
gtu 2180712
cis 2180712
cloud infrastructure and services
3130703
dbms
wt 3160713
wd 3151606
gtu 3160713
gtu 3151606
web programming
web development
wt
wd
cryptography and network security
3161606
gtu 3161925
3161925
cle
gmit
data compression
dc 3171615
gtu 3171615
3171615
dc
cle 3161925
cyber security
3160713
3151606
dbms 3130703
database management system
3150714
gmgc
cyber laws and ethics
css
bhavnagar
cryptography and network secur
its requirements and security
3141601
probability models
gtu 3130703
database management systems
cyber crime
generating charts
jquery
rest api
ajax
javascript validations
event handling with javascript
regular expressions
dom
javascript objects
pop up boxes
types of javascript
javascript
object oriented
curd
database
php
session management
hidden fields
query string
cookie
session
3140601
gtu 3140601
nist digital signature algorithm
various digital signature schemes (elgamal and sch
requirements and security
its properties
digital signature
macs based on block ciphers
macs based on hash functions
message authentication codes
secure hash algorithm (sha)
hash functions based on cipher block chaining
simple hash functions
their applications
cryptographic hash functions
man-in-middle attack
diffie-hillman key exchange algorithm
its computational aspects and security
rsa algorithm
requirements and cryptanalysis
public key cryptosystems with applications
counter mode
output feedback mode
cipher feedback mode
cipher block chaining mode
electronic code book
multiple encryption and triple des
operating system and virtulization
distributed & realtime o.s.
parallel
time sharing
multiprogramming. multitasking
batch
system calls
interaction of o.s. & hardware architecture
basic functions
goals & structures of o.s
architecture
computer system overview
example and implementation
key expansion
its transformation functions
aes with structure
design principles of block cipher
strength of des
data encryption standard (des) with example
block cipher structure
stream ciphers and block ciphers
substitution and transposition techniques
cryptanalysis and attacks
cryptography
the euclidean algorithm.symmetric cipher model
modular arithmetic
fields
ring
security mechanisms finite fields – group
security services
bachelor of engineering
gujarat technological university
pl/sql
sql
pl
unit - 10
database triggers
stored function
stored procedures
cursors
vector quantization
max quantizer outputs
entropy coding of lloyd
entropy coded quantization
companded quantization
pdf optimized quantization
non uniform quantization
backward adaptive
forward adaptive
adaptive quantization
uniform quantizer
the quantization problem
scalar quantization
physical models
linear system models
auditory perception
the human visual system
distortion criteria
mathematical preliminaries for lossy coding
lossless image compression
unit - 5
jpeg-ls
calic
the old jpeg standard
context based compression
unit-4
mtf
move-to-front coding
bwt
the burrows-wheeler transform
the exclusion principle
length of context
the escape symbol
the basic algorithm
prediction with partial match(ppm)
image compression
applications
lzw approach
the lz78 approach
the lz77 approach
adaptive dictionary
diagram coding
static dictionary
dictionaty techniques
unit-3
integer implementation comparison of huffman and a
algorithm implementation
deciphering the tag generating binary code – uniqu
audio compression arithmetic coding: coding a sequ
text compression
decoding procedure golomb codes rice codes tunstal
encoding procedure
huffman coding: the huffman coding algorithm – min
prefix codes
markov models coding – uniquely decodable codes
modeling and coding mathematical preliminaries for
compression techniques
examining logs.
failure plans
geographic and other concerns
bottom line impact
utilization and tracking
managing costs
opsworks
cloudtrail
cloudformation
cloudwatch
cloud security
application services
analytics services
law relating to employees and internet
relevant sections of reserve bank of india act
relevant sections of indian penal code
relevant sections of bankers book evidence act
relevant sections of indian evidence act
it act and criminal procedural code
it act and civil procedure code
electronic data base and its protection
domain names and copyright disputes
software – copyright or patented
copyright
trademark law
patent law
redshift.
elasticache
relational database service – dynamodb
private dns servers (route 53)
cloud models
virtual private clouds
introduction to block chain ethics.
introduction to artificial intelligence ethics: et
need for cyber regulations and ethics. ethics in i
significance of cyber ethics
the importance of cyber law
two phase and three phase commit protocols
raid levels
aries
fuzzy checkpoint
advanced recovery techniques- shadow paging
write- ahead logging protocol
different techniques of recoverability
methods to control failure
wound-wait algorithm recovery in dbms - types of f
wait-die algorithm
avoidance
prevention
deadlock in distributed systems – detection
deadlock in centralized systems
distributed deadlock & recovery deadlock concept
selling on the marketplace
amis
cataloging the marketplace
elastic load balancing
auto scaling
imaging computers
elastic cloud compute - introduction to servers
other aws security capabilities
understanding public/private keys
aws physical security - aws compliance initiatives
iam abilities and limitations
security policies
and roles - understanding credentials
groups
users
glacier - content delivery platforms
elastic block store - simple storage service
matching interfaces and services
aws url naming
web services
basic understanding apis - aws programming interfa
aws ecosystem.
aws services
aws infrastructure
aws history
comparison of cloud providers
cloud marketplace overview
machine imaging
hypervisors
load balancing
exploring virtualization
business concerns in the cloud
cloud deployment models
cloud service options
history of cloud computing
introduction to the cloud computing
emerging trends
e-markets
edi
supply chain
electronic payments
taxation
e security. business
b2c
paper vs paper less contracts e-commerce models- b
evolution and development in e-commerce
information technology act
penalties and adjudication.
cyber regulations appellate tribunal
network service providers liability
cyber crime and offences
certifying authorities
legal recognition of digital signature
legal recognition of electronic records
electronic governance
private cryptography
public cryptography
cryptographic algorithm
digital signatures
amendments and limitations of it act
2000
overview of it act
introduction to cyber law:
internet as a tool for global access.
legal and technological significance of domain nam
web hosting and web development agreement
cyberspace-web space
civil and criminal jurisdictions
hierarchy of courts
cyber jurisdiction
cyber ethics
real approach
consensual approach
doctrinal approach
jurisprudence and law
emergence of cyber space. cyber jurisprudence
evolution of computer technology
join
correlated sub-queries
sub-queries
set operations
string functions
date
built-in functions –numeric
aggregate functions
in operator
check
not null
unique
foreign key
defining constraints – primary key
alteration
structure – creation
dcl
dml
ddl
basics of sql
sql injection.
intrusion detection
mac and rbac models
dac
authorization and access control
authentication
query optimization
join strategies
query equivalence
evaluation of relational algebra expressions
htc-hydra
pwdump
l0htcrack
password cracking and brute-force tools – john the
webgoat
sqlmap. dvwa
application inspection tools – zed attack proxy
openssl and stunnel
http utilities - curl
w3af
web application tools scanning for web vulnerabili
transaction processing
database recovery.
multi-version and optimistic concurrency control s
locking and timestamp based schedulers
serializability of scheduling
acid property
concurrency control
hping kismet
ettercap
wireshark
thc-amap and system tools. network sniffers and in
network reconnaissance – nmap
winrelay
fpipe
understanding port and services tools - datapipe
socat
metasploit. networks vulnerability scanning - netc
openvas
vulnerability examples
vulnerability probe
traffic probe
banner / version check
open port / service identification
systems vulnerability scanning overview of vulnera
lossless design
dependency preservation
normal forms
armstrong's axioms
domain and data dependency
sql server
db2
oracle
open source and commercial dbms - mysql
ddl and dml constructs
sql3
tuple and domain relational calculus
relational algebra
relational query
relational query languages
integrity constraints
data manipulation
relational and object oriented data models
network model
entity-relationship model
erp
data model
unit 2
3 sem
attack on wireless networks
buffer overflow
sql injection
ddos
dos
spyware
keyloggers
backdoors
virus and warms
steganography
cyberspace
attack vector
cyber law
crime
firewall
networking
See more