Information Technology for India in the New Millennium: Scaling Up the Technology
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Views: 166 , Downloads: 153 | CTR: 92 % | Weekly Popularity: ⮙5

Research Paper | Computer Science & Engineering | India | Volume 9 Issue 3, March 2020

Information Technology for India in the New Millennium: Scaling Up the Technology

Dr. Sanjay Arora

The paper describes how Information Technology (with reference to Indian Context) can be harnessed for re- skilling and re-training of the existing work force to make them more productive and use the technology and creativity for better product design w

Keywords: Fire Walls, HTTP, TCP/IP, WAP, XML, PKI, DSL, IT

Edition: Volume 9 Issue 3, March 2020

Pages: 709 - 713

Share this Article

How to Cite this Article?

Dr. Sanjay Arora, "Information Technology for India in the New Millennium: Scaling Up the Technology", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SR20312095206, Volume 9 Issue 3, March 2020, 709 - 713

166 PDF Views | 153 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'HTTP'

Views: 134 , Downloads: 98 | CTR: 73 % | Weekly Popularity: ⮙3

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 878 - 881

Detection of Malicious Client based HTTP/DoS Attack on Web Server

Dhanya Jayan, Pretty Babu

Share this Article

Views: 146 , Downloads: 102 | CTR: 70 % | Weekly Popularity: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1628 - 1631

A Survey On XML-Injection Attack Detection Systems

Swati Ramesh Kesharwani, Aarti Deshpande

Share this Article

Views: 129 , Downloads: 102 | CTR: 79 % | Weekly Popularity: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2982 - 2984

Protection of Server from Proxy Based HTTP Attacks

Poonam Uttam Patil, Y. V. Chavan

Share this Article

Views: 136 , Downloads: 107 | CTR: 79 % | Weekly Popularity: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1887 - 1991

Analysis of Application Level Traffics and Routing Protocols in Mobile Ad Hoc Network

Rawendra Pratap Singh, Savita Shiwani

Share this Article

Views: 131 , Downloads: 108 | CTR: 82 % | Weekly Popularity: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1742 - 1746

An Analytic Research on HTTP ,Web Servers, Web-Services & Efficient DNS Querying

Shaik Khaja Hafeezuddin, P.V.S.Srinivas

Share this Article

Similar Articles with Keyword 'TCP/IP'

Views: 125 , Downloads: 103 | CTR: 82 % | Weekly Popularity: ⮙3

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2646 - 2649

Improving the Security of SMPP Protocol using TLS

Akash R. Kotecha, H. P. Channe

Share this Article

Views: 134 , Downloads: 107 | CTR: 80 % | Weekly Popularity: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1253 - 1257

A Trust System for SCADA Network Using Wireless Sensor Based on Node Behaviors

B.Padmini, N. Chandra Shekar Reddy, Ch. Mukunda Reddy

Share this Article

Views: 145 , Downloads: 113 | CTR: 78 % | Weekly Popularity: ⮙4

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1356 - 1359

A Survey of Optimizing the Performance of iSCSI

Shruti Kulkarni, Dr. K. N. Narasimha Murthy

Share this Article

Views: 127 , Downloads: 115 | CTR: 91 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2508 - 2514

Lock and Forward Hierarchical Routing Algorithm in MANET

Vikrant Verma, Dr. Manoj Kumar

Share this Article

Views: 143 , Downloads: 137 | CTR: 96 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 967 - 971

A Novel Method Defense against IP Spoofing Using Packet Filtering and Marking

K. Durga Priyanka, Dr. N. Chandra Sekhar Reddy, B. Satish Babu

Share this Article

Similar Articles with Keyword 'WAP'

Views: 147 , Downloads: 107 | CTR: 73 % | Weekly Popularity: ⮙3

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1422 - 1426

Incremental CFP-Tree Optimization For Efficient Representative Pattern Set Mining

Vivek Satpute, Prof. Digambar Padulkar

Share this Article

Views: 144 , Downloads: 109 | CTR: 76 % | Weekly Popularity: ⮙4

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 1743 - 1745

A Survey Paper on Wireless Transport Layer Security

Parmar Paresh B., Ketan Patel

Share this Article

Views: 136 , Downloads: 115 | CTR: 85 % | Weekly Popularity: ⮙8

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1380 - 1383

Secure E-Transactions through Bio Metrics System

Sakthivel.A, Jayakeerthi.M

Share this Article

Views: 134 , Downloads: 115 | CTR: 86 % | Weekly Popularity: ⮙3

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 1625 - 1628

A Hybrid Non Blind Video Watermarking Scheme Based on DWPT and PCA

Shital Khaparde, Shanta Sondor

Share this Article

Views: 147 , Downloads: 116 | CTR: 79 %

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1374 - 1377

Group Formation with Neighbour Similarity Trust in P2P E-Commerce

M. Robin Rutherford, V. Dheepa

Share this Article

Similar Articles with Keyword 'XML'

Views: 146 , Downloads: 102 | CTR: 70 % | Weekly Popularity: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1628 - 1631

A Survey On XML-Injection Attack Detection Systems

Swati Ramesh Kesharwani, Aarti Deshpande

Share this Article

Views: 149 , Downloads: 102 | CTR: 68 % | Weekly Popularity: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 3021 - 3028

Smart Type-Ahead Search in XML

Supriya. N. Chaudhari, Vaishali M. Deshmukh

Share this Article

Views: 120 , Downloads: 103 | CTR: 86 % | Weekly Popularity: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2676 - 2680

Effective and Efficient XML Duplicate Detection Using Levenshtein Distance Algorithm

Shital Gaikwad, Nagaraju Bogiri

Share this Article

Views: 132 , Downloads: 106 | CTR: 80 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 8 Issue 9, September 2019

Pages: 937 - 938

Updating XML Files using a Tool based on DOM Parser

Nehal Pandey, Deepak Pase, Priyanka Chaudhari

Share this Article

Views: 133 , Downloads: 108 | CTR: 81 % | Weekly Popularity: ⮙1

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1219 - 1220

Efficient Query Evaluation over Wide Sparse Table

Akshatha Dange K, Siddanagowda G R

Share this Article

Similar Articles with Keyword 'PKI'

Views: 151 , Downloads: 100 | CTR: 66 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1709 - 1712

A Business Framework for Securing Data Storage over Cloud Environment using ECC Crypto System

Nara Venkata Surendra Reddy, DLS Reddy

Share this Article

Views: 144 , Downloads: 105 | CTR: 73 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1441 - 1443

A Novel Approach on Multi Factor Authentication

Shivagupta Chandakavathe, Rekha B. S., Sampath Kumar C

Share this Article

Views: 141 , Downloads: 111 | CTR: 79 % | Weekly Popularity: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1419 - 1424

Detection of Node Replication Attack in MSN Based On PKI

Hemlata B Kadam, Rahul Kulkarni

Share this Article

Views: 128 , Downloads: 112 | CTR: 88 %

Dissertation Chapters, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1716 - 1720

To Secure Efficient Two-Server Password and Authenticate Key Exchange using Transaction Processing System against Dictionary Attack

Sonal Chandrakant Pansare, V. S. Nandedkar

Share this Article

Views: 138 , Downloads: 113 | CTR: 82 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1235 - 1239

Kerberos as a Service in Cloud Computing Security Issues

Y. Shashank Rao, Dr. N. Chandra Sekhar Reddy

Share this Article

Similar Articles with Keyword 'DSL'

Views: 132 , Downloads: 113 | CTR: 86 % | Weekly Popularity: ⮙4

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1071 - 1074

A Literature Survey on ?Disaster Monitoring & Alarming System for Mountain Foothills?

Pallavi T. Dhotre

Share this Article

Views: 150 , Downloads: 121 | CTR: 81 %

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 449 - 451

A Survey on MANETs in Disaster Rescue Operations

C Ramakristanaiah, R. Praveen Sam

Share this Article

Views: 166 , Downloads: 153 | CTR: 92 % | Weekly Popularity: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 3, March 2020

Pages: 709 - 713

Information Technology for India in the New Millennium: Scaling Up the Technology

Dr. Sanjay Arora

Share this Article

Similar Articles with Keyword 'IT'

Views: 291 , Downloads: 171 | CTR: 59 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, Bangladesh, Volume 5 Issue 6, June 2016

Pages: 1523 - 1527

Multifunctional Remote Controlled Robot Using Android Application

T. A. Mithu, T. S. Reddy

Share this Article

Views: 200 , Downloads: 123 | CTR: 62 % | Weekly Popularity: ⮙7

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 457 - 461

Artificial Intelligence for Hiring

Ishan Borker, Ashok Veda

Share this Article

Views: 1404 , Downloads: 450 | CTR: 32 % | Weekly Popularity: ⮙27

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 1454 - 1458

Heart Disease Prediction with Machine Learning Approaches

Megha Kamboj

Share this Article

Views: 153 , Downloads: 102 | CTR: 67 % | Weekly Popularity: ⮙6

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1751 - 1754

Joining Delay; Packet Delivery and Limitations of EGMP

G. Anandhi, Dr. S. K. Srivatsa

Share this Article

Views: 209 , Downloads: 154 | CTR: 74 % | Weekly Popularity: ⮙6

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017

Pages: 338 - 384

Managing Uncertainty in Supply Chain Operating Cost Using Genetic Algorithm

Dr. Niju P. Joseph, Dr. Priyanka Surendran

Share this Article
Top