Skip to content
UNIT–I
Introduction to Distributed system
Advantage and Disadvantage of Distributed System
Features of Distribution System
Types of failure in Distributed System
Artificial Intelligence
Advantages and Disadvantages of Artificial Intelligence
Features of Artificial Intelligence
Expert system – Concepts of AI
Applications Of AI
AI in Business Industry
Reasons and Benefits Of AI
AI Technology
Future of BI & Expert Systems
Merits and Demerits of Expert System
Definition, Domain Knowledge
Component Of expert System, Knowledge base and Inference Engine, Expert System Characteristics, Advantages of Expert System: Availability,
Explanation ,Fast response, All the Time Response, Reduced Cost , Multiple Expertise, Knowledge Discovery Phases and Techniques. Application of Expert system and AI.
UNIT–II
UNIT–III
UNIT–IV
CELLULAR TRANSMISSION: Cellular network Concept
RF characteristics
Radio Frequency Communications
What is RF
Electromagnetic energy waves basics : DB decibel, Line of Sight, Transmit Power, Receiver Sensivity,
Data Rate, Definition, Advantages disadvantages
Technology and Hardware need for Wireless Services :
Wireless & Mobile Computing:
What is wireless Communication,
Components in Wireless communication
How cell phone works
Cellular System Cell, GSM, GPRS, UMTS, LTE,
Types of Wireless communication: WPAN, WLAN, WMAN, WWAN with example,
Cellular system Architecture: Cell, Cluster, Frequency Reuse, Frequency Reuse, Cell Spitting,
Hands Off
Factors Influencing,
Different Generation
Priority.
Mobile Switching office,
Switching Office vs Station,
Base Station Definition and characteristics.
UNIT–V
E-Governance
E-Democracy
Characteristics of Conventional Governance and E Governance
Challenges for E Governance in India: Social, Economical, Technical Challenges.
G2B, G2C, G2G Initiative
Government efforts to encourage citizen participation
Privacy and Security Issues
Information security Management: Definition
Need And Basic Goals of Computer Security
Security Attacks, Threats, Vulnerabilities, Threat Sources, Policy, Computer Security Techniques, ISM Framework, ISM Framework Component,
Security at data Center: Firewall ,
Website Security: Anti Virus and Anti Phishing Tools,
Physical Office Security: Restricted Access
Digital Divide: Definition, Determinants and Challenges
Introduction of Cyber Crime: Definition
Extent and Impact
Content Related
Copyright and Trademark related offence
Computer related offence
The challenges in fighting against cyber crime
various site for e-governance.
error: Content is protected !!