ICT-COMPUTER SCIENCE


CRYPTOGRAPHY AND NETWORK SECURITY 


CRYPTOGRAPHY AND NETWORK SECURITY - INTRODUCTION TO NETWORK SECURITY

CRYPTOGRAPHY AND NETWORK SECURITY - CLASSICAL CRYPTOGRAPHY

CRYPTOGRAPHY AND NETWORK SECURITY - SUBSTITUTION CIPHER AND CRYPTANALYSIS

CRYPTOGRAPHY AND NETWORK SECURITY - TRANSPOSITION CIPHER AND CRYPTANALYSIS

CRYPTOGRAPHY AND NETWORK SECURITY - NUMBER THEORY

CRYPTOGRAPHY AND NETWORK SECURITY - MODULAR ARITHMETIC

CRYPTOGRAPHY AND NETWORK SECURITY - MODULAR EXPONENTIATION

CRYPTOGRAPHY AND NETWORK SECURITY - ALGEBRAIC STRUCTURES-1

CRYPTOGRAPHY AND NETWORK SECURITY - ALGEBRAIC STRUCTURES-2

CRYPTOGRAPHY AND NETWORK SECURITY - PRIME EULER FERMAT THEOREM

CRYPTOGRAPHY AND NETWORK SECURITY – CHINESE REMINDER THEOREM (CRT)

CRYPTOGRAPHY AND NETWORK SECURITY - EXPONENTIATION AND LOGARITHM

CRYPTOGRAPHY AND NETWORK SECURITY - MODERN CRYPTOGRAPHY

CRYPTOGRAPHY AND NETWORK SECURITY - STREAM AND BLOCK CIPHER

CRYPTOGRAPHY AND NETWORK SECURITY - RC4

CRYPTOGRAPHY AND NETWORK SECURITY - SIMPLIFIED DES

CRYPTOGRAPHY AND NETWORK SECURITY - DATA ENCRYPTION STANDARD

CRYPTOGRAPHY AND NETWORK SECURITY - MODES OF OPERATIONS

CRYPTOGRAPHY AND NETWORK SECURITY - ADVANCED ENCRYPTION STANDARD-1

CRYPTOGRAPHY AND NETWORK SECURITY - ADVANCED ENCRYPTION STANDARD-II

CRYPTOGRAPHY AND NETWORK SECURITY - PUBLIC KEY CRYPTOGRAPHY

CRYPTOGRAPHY AND NETWORK SECURITY – RSA CRYPTO SYSTEM

CRYPTOGRAPHY AND NETWORK SECURITY – ELGAMAL CRYPTO SYSTEM

CRYPTOGRAPHY AND NETWORK SECURITY – ELLIPTIC CURVE CRYPTO SYSTEM

CRYPTOGRAPHY AND NETWORK SECURITY - KEY MANAGEMENT

CRYPTOGRAPHY AND NETWORK SECURITY - DEFFIE HELLMAN KEY EXCHANGE

CRYPTOGRAPHY AND NETWORK SECURITY - SECURITY MODELS

CRYPTOGRAPHY AND NETWORK SECURITY – HASHING TECHNIQUES

CRYPTOGRAPHY AND NETWORK SECURITY – HASH AND MAC ALGORITHMS (MAC)

CRYPTOGRAPHY AND NETWORK SECURITY - DIGITAL SIGNATURE

CRYPTOGRAPHY AND NETWORK SECURITY – KERBEROS

CRYPTOGRAPHY AND NETWORK SECURITY – PUBLIC KEY INFRASTRUCTURE (PKI)

CRYPTOGRAPHY AND NETWORK SECURITY – ELECTRONIC EMAIL SECURITY PGP

CRYPTOGRAPHY AND NETWORK SECURITY - SECURITY ATTACKS

CRYPTOGRAPHY AND NETWORK SECURITY - IP SECURITY

CRYPTOGRAPHY AND NETWORK SECURITY - WEB SECURITY SSL AND TLS

CRYPTOGRAPHY AND NETWORK SECURITY – FIREWALLS

CRYPTOGRAPHY AND NETWORK SECURITY - NEED FOR SECURITY IN NETWORKS

CRYPTOGRAPHY AND NETWORK SECURITY – WIRELESS LAN STANDARDS

CRYPTOGRAPHY AND NETWORK SECURITY - WIRELESS LAN SECURITY 

OPERATING SYSTEM 

OPERATING SYSTEM: INTRODUCTION

OPERATING SYSTEM: COMPONENTS OF OS

OPERATING SYSTEM: SYSTEM CALLS AND OS STRUCTURES

OPERATING SYSTEM: PROCESS CONCEPTS

OPERATING SYSTEM: INTER PROCESS COMMUNICATION

OPERATING SYSTEM: COMMUNICATION IN CLIENT-SERVER SYSTEMS, THREADS

OPERATING SYSTEM: CPU SCHEDULING-I

OPERATING SYSTEM: CPU SCHEDULING-II

OPERATING SYSTEM: CPU SCHEDULING-III

OPERATING SYSTEM: PROCESS SYNCHRONIZATION

OPERATING SYSTEM: PROCESS SYNCHRONIZATION – SOLUTIONS-I

OPERATING SYSTEM: PROCESS SYNCHRONIZATION – SOLUTIONS-II

OPERATING SYSTEM: PROCESS SYNCHRONIZATION – SOLUTIONS-III

OPERATING SYSTEM: PROCESS SYNCHRONIZATION – SEMAPHORES

OPERATING SYSTEM: PROCESS SYNCHRONIZATION – CLASSIC PROBLEMS

OPERATING SYSTEM: DEADLOCKS – INTRODUCTION

OPERATING SYSTEM: DEADLOCKS – PREVENTION, AVOIDANCE

OPERATING SYSTEM: DEADLOCKS – DEADLOCKS – AVOIDANCE

OPERATING SYSTEM: DEADLOCKS – DETECTION AND RECOVERY

OPERATING SYSTEM: MEMORY MANAGEMENT

OPERATING SYSTEM: MEMORY MANAGEMENT – PAGING I

OPERATING SYSTEM: MEMORY MANAGEMENT – PAGING II

OPERATING SYSTEM: MEMORY MANAGEMENT – PAGING III

OPERATING SYSTEM: MEMORY MANAGEMENT – SEGMENTATION

OPERATING SYSTEM: VIRTUAL MEMORY

OPERATING SYSTEM: PAGE REPLACEMENT ALGORITHMS-I

OPERATING SYSTEM: PAGE REPLACEMENT ALGORITHMS-II

OPERATING SYSTEM: PAGE REPLACEMENT ALGORITHMS-III

OPERATING SYSTEM: ALLOCATION OF FRAMES, THRASHING

OPERATING SYSTEM: VIRTUAL MEMORY – WINDOWS NT, SOLARIS 2

OPERATING SYSTEM: VIRTUAL MEMORY – FILE-SYSTEM INTERFACE – I

OPERATING SYSTEM: VIRTUAL MEMORY – FILE-SYSTEM INTERFACE – II

OPERATING SYSTEM: VIRTUAL MEMORY – FILE-SYSTEM INTERFACE – III

OPERATING SYSTEM: VIRTUAL MEMORY – IMPLEMENTATION OF FILE SYSTEMS

OPERATING SYSTEM: VIRTUAL MEMORY – FILE ALLOCATION AND FREE SPACE MANAGEMENT

OPERATING SYSTEM: VIRTUAL MEMORY – DISK SCHEDULING ALGORITHMS

OPERATING SYSTEM: VIRTUAL MEMORY – MASS STORAGE MANAGEMENT

OPERATING SYSTEM: VIRTUAL MEMORY – PROCESS MANAGEMENT IN LINUX

OPERATING SYSTEM: VIRTUAL MEMORY – SCHEDULING IN LINUX

OPERATING SYSTEM: VIRTUAL MEMORY – MEMORY MANAGEMENT IN LINUX


                                                
********
DATA STRUCTURES





















DATABASE MANAGEMENT SYSTEM 

DATABASE MANAGEMENT SYSTEM : INTRODUCTION

DATABASE MANAGEMENT SYSTEM : INTRODUCTION-II

DATABASE MANAGEMENT SYSTEM – DATABASE SYSTEM ARCHITECTURE

DATABASE MANAGEMENT SYSTEMS – RELATIONAL MODEL

DATABASE MANAGEMENT SYSTEMS – RELATIONAL ALGEBRA

DATABASE MANAGEMENT SYSTEMS – DATA MANIPULATION TRANSPARENCIES

DATABASE MANAGEMENT SYSTEMS – DATA MANIPULATION TRANSPARENCIES-II

DATABASE MANAGEMENT SYSTEMS – DATA MANIPULATION TRANSPARENCIES-III

DATABASE MANAGEMENT SYSTEMS – NORMALISATION

DATABASE MANAGEMENT SYSTEMS – QUERY OPTIMIZATION

DATABASE MANAGEMENT SYSTEMS - DATA WAREHOUSE

DATABASE MANAGEMENT SYSTEMS - CLIENT SERVER ARCHITECTURE

DATABASE MANAGEMENT SYSTEMS - CLIENT SERVER DATABASE - THREE-TIER ARCHITECTURE

DATABASE MANAGEMENT SYSTEMS - DISTRIBUTED DATABASE SYSTEMS

DATABASE MANAGEMENT SYSTEMS - DISTRIBUTED DATABASE ARCHITECTURE

DESIGN AND ANALYSIS OF ALGORITHMS

DESIGN AND ANALYSIS OF ALGORITHMS : INTRODUCTION

DESIGN AND ANALYSIS OF ALGORITHMS - FUNDAMENTAL STAGES OF PROBLEM SOLVING

DESIGN AND ANALYSIS OF ALGORITHMS-BASICS OF ALGORITHM WRITING

DESIGN AND ANALYSIS OF ALGORITHMS - ANALYSIS OF ITERATIVE ALGORITHMS

DESIGN AND ANALYSIS OF ALGORITHMS - ANALYSIS OF RECURSIVE ALGORITHMS

DESIGN AND ANALYSIS OF ALGORITHMS - BRUTE FORCE TECHNIQUES

DESIGN AND ANALYSIS OF ALGORITHMS - CLOSET PAIR AND CONVEX HULL PROBLEMS


DESIGN AND ANALYSIS OF ALGORITHMS - EXHAUSTIVE SEARCHING AND OPTIMIZATION PROBLEMS

DESIGN AND ANALYSIS OF ALGORITHMS - DIVIDE AND CONQUER TECHNIQUE

DESIGN AND ANALYSIS OF ALGORITHMS - DECREASE BY CONSTANT FACTOR ALGORITHMS

DESIGN AND ANALYSIS OF ALGORITHMS - DECREASE AND CONQUER DESIGN PARADIGM

DESIGN AND ANALYSIS OF ALGORITHMS - TRANSFORM AND CONQUER DESIGN PARADIGM

DESIGN AND ANALYSIS OF ALGORITHMS - MORE TRANSFORM AND CONQUER PROBLEMS

DESIGN AND ANALYSIS OF ALGORITHMS - MORE TRANSFORM AND CONQUER PROBLEMS – 2



COMPUTER GRAPHICS AND VISUALIZATION

COMPUTER GRAPHICS AND VISUALIZATION : INTRODUCTION

COMPUTER GRAPHICS AND VISUALIZATION: DDA LINE DRAWING PROCEDURE

COMPUTER GRAPHICS AND VISUALIZATION: BRESENHAM’S LINE DRAWING PROCEDURE

COMPUTER GRAPHICS AND VISUALIZATION: MIDPOINT CIRCLE DRAWING PROCEDURE

COMPUTER GRAPHICS AND VISUALIZATION: BASIC 2D TRANSFORMATIONS

COMPUTER GRAPHICS AND VISUALIZATION: COMPOSITE 2D TRANSFORMATIONS

COMPUTER GRAPHICS AND VISUALIZATION: OTHER 2D TRANSFORMATIONS

COMPUTER GRAPHICS AND VISUALIZATION: 2D VIEWING

COMPUTER GRAPHICS AND VISUALIZATION: 3D OBJECT REPRESENTATIONS (B-SPLINES, SWEEP, CSG, FRACTALS)

COMPUTER GRAPHICS AND VISUALIZATION: 3D TRANSFORMATIONS

COMPUTER GRAPHICS AND VISUALIZATION: VISIBLE SURFACE DETECTION

COMPUTER GRAPHICS AND VISUALIZATION: RENDERING

COMPUTER NETWORKS

COMPUTER NETWORKS: AN OVERVIEW

COMPUTER NETWORKS: APPLICATION NEED AND NETWORK PERFORMANCE

COMPUTER NETWORKS: APPLICATION LAYER PROTOCOLS –HTTP

COMPUTER NETWORKS: APPLICATION – HTTP +EMAIL - 2

COMPUTER NETWORKS: APPLICATION – ACCESSING EMAIL

COMPUTER NETWORKS: APPLICATION – DNS

COMPUTER NETWORKS: ROUTER IMPLEMENTATION

COMPUTER NETWORKS: ROUTER IMPLEMENTATION

COMPUTER NETWORKS: MULTICASTING – DVMRP

COMPUTER NETWORKS: MULTICASTING – PIM(23)

COMPUTER NETWORKS: MPLS

COMPUTER NETWORKS: QOS – TECHNIQUES

COMPUTER NETWORKS: QOS – QUEUING DISCIPLINES

COMPUTER NETWORKS: DIFFSER(28)

COMPUTER NETWORKS: IPv6 – OVERVIEW

COMPUTER NETWORKS: MOBILE IP

COMPUTER NETWORKS: MULTIMEDIA APPLICATIONS

COMPUTER NETWORKS: REAL-TIME TRANSPORT PROTOCOL (RTP)

COMPUTER NETWORKS: REAL-TIME CONTROL PROTOCOL (RTCP)

COMPUTER NETWORKS: SDP AND SIP

COMPUTER NETWORKS: RTSP AND H.323

COMPUTER NETWORKS: WIRELESS NETWORKS – WiFi

COMPUTER NETWORKS: BLUETOOTH

COMPUTER NETWORKS: CELLULAR NETWORKS – 2G

COMPUTER NETWORKS: CELLULAR NETWORKS AND ZIGBEE

COMPUTER NETWORKS: IOT, SDN AND WRAPUP

SOFTWARE ENGINEERING

SOFTWARE ENGINEERING – INTRODUCTION

SOFTWARE ENGINEERING – DEFINITIONS AND NOTATIONS

SOFTWARE ENGINEERING – SOFTWARE DEVELOPMENT LIFE CYCLE-P4

SOFTWARE ENGINEERING – SOFTWARE DEVELOPMENT LIFE CYCLE-P5

SOFTWARE ENGINEERING – REQUIREMENTS ENGINEERING (Part-9)

SOFTWARE ENGINEERING – REQUIREMENTS ENGINEERING (Part-10)

SOFTWARE QUALITY MANAGEMENT

SOFTWARE QUALITY MANAGEMENT - INTRODUCTION TO SOFTWARE QUALITY ASSURANCE

SOFTWARE QUALITY MANAGEMENT - INTRODUCTION TO SOFTWARE QUALITY METRICS

SOFTWARE QUALITY MANAGEMENT - RISK MANAGEMENT

SOFTWARE QUALITY MANAGEMENT - SOFTWARE CONFIGURATION MANAGEMENT

COMPILERS DESIGN

COMPILER DESIGN – COMPILERS INTRODUCTION

COMPILER DESIGN – COMPILERS – PHASES

COMPILER DESIGN – LEXICAL PHASES

COMPILER DESIGN – LEXICAL PHASES – AUTOMATA

COMPILER DESIGN – LEXICAL PHASES - NFA TO DFA

COMPILER DESIGN – OPERATOR PRECEDENCE PARSER

COMPILER DESIGN – OPERATOR PRECEDENCE PARSING ALGORITHM

COMPILER DESIGN – SLR(1) PARSERS, LR (0) ITEMS

COMPILER DESIGN – SLR PARSER - SLR PARSING TABLE

COMPILER DESIGN - SLR PARSING

COMPILER DESIGN - CALR PARSING

COMPILER DESIGN - LALR PARSING

COMPILER DESIGN - PARSING GENERATOR, SEMANTIC PHASE INTRODUCTION

WEB TECHNOLOGY

WEB TECHNOLOGY : INTRODUCTION

WEB TECHNOLOGY : WWW (World Wide Web)

WEB TECHNOLOGY : SERVICES ON INTERNET

WEB TECHNOLOGY : MARKUP LANGUAGES

WEB TECHNOLOGY : HTML

WEB TECHNOLOGY : JAVASCRIPT OBJECTS

WEB TECHNOLOGY : JAVASCRIPT AND HTML DOM

WEB TECHNOLOGY : JAVASCRIPT AND EVENT HANDLING

WEB TECHNOLOGY : JAVA NETWORKING – INTRODUCTION

WEB TECHNOLOGY : JAVA NETWORKING

WEB TECHNOLOGY : JAVA SOCKET PROGRAMMING

WEB TECHNOLOGY : JAVA UDP SOCKET PROGRAMMING

WEB TECHNOLOGY : RMI

WEB TECHNOLOGY : XML RPC

WEB TECHNOLOGY : JDBC- INTRODUCTION

WEB TECHNOLOGY : WORKING WITH JDBC- PART-II

EMBEDDED SYSTEM

EMBEDDED SYSTEM - INTRODUCTION TO COMPUTING

EMBEDDED SYSTEM - MICROCONTROLLERS AND EMBEDDED PROCESSORS

EMBEDDED SYSTEM - CHALLENGES IN EMBEDDED SYSTEM

EMBEDDED SYSTEM - OVERVIEW OF 8051-MICROCONTROLLER

EMBEDDED SYSTEM – (8051)ARCHITECTURE

EMBEDDED SYSTEM – INSTRUCTION SET

EMBEDDED SYSTEM – PROGRAMMING PARALLEL PORTS

EMBEDDED SYSTEM - PROGRAMMING TIMERS

EMBEDDED SYSTEM - INTERRUPT HANDLING

EMBEDDED SYSTEM - INTERRUPT HANDLING AND ASSEMBLY PROGRAMMING

EMBEDDED SYSTEM - SERIAL PORT PROGRAMMING IN EMBEDDED C

EMBEDDED SYSTEM - INTERFACING EXTERNAL DEVICES USING EMBEDDED C

EMBEDDED SYSTEM - RTOS: MULTIPLE TASKS AND PROCESSES

EMBEDDED SYSTEM - RTOS – BASIC CONCEPT

EMBEDDED SYSTEM - RTOS: SCHEDULING POLICIES - 1

EMBEDDED SYSTEM - RTOS: SCHEDULING POLICIES – 2

EMBEDDED SYSTEM - ARM PROCESSOR FUNDAMENTALS

EMBEDDED SYSTEM – ARM INSTRUCTION SET

EMBEDDED SYSTEM – ARM IN STRUCTION AND EMBEDDED C

EMBEDDED SYSTEM – ATOM PROCESSOR FUNDAMENTALS

EMBEDDED SYSTEM – ATOM PROCESSOR ISA

EMBEDDED SYSTEM – DESIGN METHODOLOGIES

EMBEDDED SYSTEM – EMBEDDED SOFTWARE DEVELOPMENT TOOLS

EMBEDDED SYSTEM – EMULATORS AND DEBUGGERS

EMBEDDED SYSTEM – COMPLETE DESIGN OF EMBEDDED SYSTEM

EMBEDDED SYSTEM – EMBEDDED SYSTEM DESIGN – CASE STUDY - PART I

EMBEDDED SYSTEM – EMBEDDED SYSTEM DESIGN – CASE STUDY - PART-II

CLOUD COMPUTING 

CLOUD COMPUTING – INTRODUCTION

CLOUD COMPUTING – UTILITY COMPUTING

CLOUD COMPUTING – CLOUD CHARACTERISTICS

CLOUD COMPUTING – DEPLOYMENT MODELS

CLOUD COMPUTING – COMMUNICATION IN DISTRIBUTED COMPUTING I

CLOUD COMPUTING – COMMUNICATION IN DISTRIBUTED COMPUTING II

CLOUD COMPUTING – COMMUNICATION IN DISTRIBUTED COMPUTING III

CLOUD COMPUTING – TIME ORDERING-I

CLOUD COMPUTING – TIME ORDERING-II

CLOUD COMPUTING – ELECTION IN CLOUD-I

CLOUD COMPUTING – ELECTION IN CLOUD-II

CLOUD COMPUTING – ELECTION IN CLOUD-III

CLOUD COMPUTING – MUTUAL EXCLUSION

CLOUD COMPUTING – SNAPSHOT- I

CLOUD COMPUTING – SNAPSHOT- II

CLOUD COMPUTING – REPLICATION

CLOUD COMPUTING – CONSENSUS AND PAXOS

CLOUD COMPUTING – VIRTUALIZATION-I

CLOUD COMPUTING – VIRTUALIZATION-II

CLOUD COMPUTING – VIRTUALIZATION-III

CLOUD COMPUTING – VIRTUALIZATION-IV

CLOUD COMPUTING – WEB SERVICES

CLOUD COMPUTING – RESTFUL WEB SERVICES

CLOUD COMPUTING – PEER - TO - PEER NETWORKING

CLOUD COMPUTING – PEER - TO - PEER NETWORKING-II

CLOUD COMPUTING – CLOUD ARCHITECTURE

CLOUD COMPUTING – NOSQL DATA STORES

CLOUD COMPUTING – NOSQL DATA STORES

CLOUD COMPUTING – CONCLUSION AND ADVANCED FEATURES

MACHINE LEARNING 

MACHINE LEARNING - INTRODUCTION

MACHINE LEARNING - INTERNALS OF MACHINE LEARNING

MACHINE LEARNING - DESIGN OF LEARNING SYSTEM

MACHINE LEARNING - TYPE OF LEARNING-I

MACHINE LEARNING - TYPE OF LEARNING-II

MACHINE LEARNING - PROBABILITY

MACHINE LEARNING - PROBABILITY DISTRIBUTIONS

MACHINE LEARNING - LINEAR ALGEBRA

MACHINE LEARNING - INFORMATION THEORY

MACHINE LEARNING - DECISION THEORY AND BAYESIAN DECISION THEORY

MACHINE LEARNING - CLASSIFICATION,NEAREST NEIGHBOURS EVALUATION

MACHINE LEARNING – KNN ALGORITHM

MACHINE LEARNING – DECISION TREES

MACHINE LEARNING – DECISION TREES ALGORITHM ID3

MACHINE LEARNING – CLASSIFICATION AND REGRESSION TREES – 1

MACHINE LEARNING – SUPPORT VECTOR MACHINES-II

MACHINE LEARNING –NEURAL NETWORKS – I

MACHINE LEARNING –NEURAL NETWORKS – II

MACHINE LEARNING – GENETIC ALGORITHMS – I

MACHINE LEARNING – GENETIC ALGORITHMS – II

DATA ANALYTICS 

DATA ANALYTICS - INTRODUCTION TO ANALYTICS AND BIG DATA

DATA ANALYTICS - BIG DATA APPROACH TO ANALYTICS AND WEB-THE ACTUAL BIG DATA

DATA ANALYTICS - EVOLUTION OF ANALYTICAL SCALABILITY

DATA ANALYTICS - EVOLUTION OF ANALYTICAL PROCESSES

DATA ANALYTICS - ANALYTICS – HOW IT MUST BE?

DATA ANALYTICS - FOUNDATIONS – UNIVARIATE ANALYSIS

DATA ANALYTICS - FOUNDATIONS BIVARIATE AND MULTIVARIATE ANALYSIS

DATA ANALYTICS – FOUNDATIONS REGRESSION ANALYSIS

DATA ANALYTICS FOUNDATIONS – PROBABILISTIC AND BAYESIAN APPROACHES

DATA ANALYTICS – ASSOCIATION RULE ANALYSIS - I

DATA ANALYTICS – ASSOCIATION RULE ANALYSIS - II

DATA ANALYTICS – ASSOCIATION RULE ANALYSIS – III

DATA ANALYTICS – CLUSTERING - I

DATA ANALYTICS – CLUSTERING – II

DATA ANALYTICS – CLUSTERING - III

DATA ANALYTICS – DIMENSIONALITY REDUCTION – NEED FOR DM AND SVD

DATA ANALYTICS – DIMENSIONALITY REDUCTION – SVD CASE STUDY AND CUR

DATA ANALYTICS – No SQL

DATA ANALYTICS - MONGODB-I

DATA ANALYTICS - MONGODB-II

DATA ANALYTICS - MONGODB-III

DATA ANALYTICS - INTRODUCTION TO DATA VISUALIZATION

DATA ANALYTICS - DATA VISUALIZATION TECHNIQUES - I

DATA ANALYTICS - DATA VISUALIZATION TECHNIQUES – II

DATA ANALYTICS - VISUALIZATION OF SOCIAL NETWORKS

DATA ANALYTICS - GRAPHICS AND DATA VISUALIZATION IN R

DATA ANALYTICS – OPEN SOURCE TOOLS FOR ANALYTICS

VISUALIZATION TECHNIQUES 

VISUALIZATION TECHNIQUES - TASK AND INTERACTION

VISUALIZATION TECHNIQUES - ANIMATED VISUALIZATION

VISUALIZATION TECHNIQUES - SINGLE VIEWS AND MULTIPLE VIEWS

VISUALIZATION TECHNIQUES - INFORMATION FILTERING AND AGGREGATION

VISUALIZATION TECHNIQUES - DIMENSIONALITY REDUCTION IN VISUALIZATION

VISUALIZATION TECHNIQUES - EMBEDDING INFORMATION-FOCUS+CONTEXT

VISUALIZATION TECHNIQUES – VISUALIZATION OF TABULAR DATA

VISUALIZATION TECHNIQUES – TEMPORAL VISUALIZATIONS

VISUALIZATION TECHNIQUES - VISUALIZATION OF SPATIAL DATA

VISUALIZATION TECHNIQUES - TREE AND GRAPH VISUALIZATION

VISUALIZATION TECHNIQUES - DOCUMENT VISUALIZATION

VISUALIZATION TECHNIQUES - BIG DATA VISUALIZATION

VISUALIZATION TECHNIQUES - VISUALIZATION TOOLKITS

VISUALIZATION TECHNIQUES - CASE STUDIES IN VISUALIZATIONS