WebSite Logo
  • Content
  • Similar Resources
  • Metadata
  • Cite This
  • Log-in
  • Fullscreen
Log-in
Do not have an account? Register Now
Forgot your password? Account recovery
  1. Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies (ICTCS '16)
  2. Wi-MAX: Connecting People
Loading...

Please wait, while we are loading the content...

Push Recovery for Humanoid Robot in Dynamic Environment and Classifying the Data Using K-Mean
AB-EUIDE: An approach to the design of ergonomic user interfaces for Cloud Computing
Automated Verification in Cryptography System
A Survey on IoT Privacy Issues and Mitigation Techniques
A Study on Agent Based Ergonomic and Intelligent User Interface Design in Cloud Computing
Computational Methods for Detecting Functional Modules from Gene Regulatory Network
Evaluating the Effectiveness of Soft K-Means in Detecting Overlapping Clusters
Increase of Capacity and Quality of Frequency Based Image Steganography Using Particle Swarm Optimization
Comparative Study of Watermarking an Image Using GA and BFO with GA and HBO Technique
Implementing and Analyzing Big Data Techniques withSpring Frame Work in Java& J2EEBased Application
Evaluation of Link Lifetime based Routing Protocol for Vehicular Ad-hoc Networks
A Hybrid Approach for Detection of Plagiarism using Natural Language Processing
A Generic Defect Aware Heuristic Approach for Droplet Routing in a Digital Microfluidic Biochip with Minimal Pin Assignment
Caught Hacker: Curing DDOS Attack
Study and Implementation of Record De-duplication Algorithms
Smartphone Security: Review of Challenges and Solution
A Major Threat to Big Data: Data Security
Enhancement of the Classification Performance of Least Square Support Vector Machine using Simple Particle Swarm Optimization for Phishing Dataset
Parallel Computing of Load Flow Analysis
Smart Cities: A Secure Data Transmission Model
Causes of Human Errors in Early Risk assesment in Software Project Management
Centralized Message Reporting System in Wireless Sensor Networks
Nano Sensors and Pattern Recognition for Detection of Hidden Explosives
A Critical Assessment of ICT Infrastructures for Certain Demand Response Applications in Smart Grid
Energy Aware Heuristic Scheduling of Variable Class Constraint Resources in Cloud Data Centres
A New Approach for the Security of VPN
A Methodological Review Based Version Control System with Evolutionary Research for Software Processes
Architecture of Cloud Server with Cache on Server
Leakage Power Reduction Technique by using FinFET Technology
ID Based Encryption in Modern Cryptography
Analyzing DNA Strings using Information Theory Concepts
Emerging opportunities in Domain Specific Search
Linked Open Data Search Engine
Quality Evaluation Framework for Component Based Software
A Model for ROI of IT investment in e-Governance projects
Object Detection using a Handheld Android Device for Processing Image Data in Real Time
Prediction of next Mobile Access Gateway by Tracking Locations of Mobile Node
Fuzzy and ANN based mining approach testing for Social network analysis
NWCA: A New Weighted Clustering Algorithm to form Stable Cluster in VANET
A User Privacy Conserving Authentication System Using Smart Card for Telecare Medicine Information Systems
Enhancement of Hybrid Tagger by using Rule Based Approach
A Hybrid Clustering Based Collaborative Filtering (CF) Approach
Collusive User Removal and Trusted Composite Web Service Selection based on QoS attributes
Proposed Frame Work of e-Learning Services Through Cloud
Research and Analysis of Lightweight Cryptographic Solutions for Internet of Things
Finding of Review Spam through "Corleone, Review Genre, Writing Style and Review Text Detail Features"
Neutralizing Cross-Site Scripting Attacks Using Open Source Technologies
MoveRL: A Movement Region Based Location Discovery Protocol for Wireless Sensor Networks
A Survey of Attacks and Countermeasures for Denial of Services (DoS) in Wireless Ad hoc Networks
A New Algorithm for Privacy Preservation in Utility Mining Using Genetic Algorithm
Predictive Analytics for Breast Cancer Survivability: A Comparison of Five Predictive Models
Performance Evaluation of Classifiers on WISDM Dataset for Human Activity Recognition
An Analysis of Types of Protocol Implemented in Internet of Things Based on Packet Loss Ratio
Hop Count Analysis of IE-DIR Protocol for VANETs in Wider City Traffic Scenario
A Review of Automatic Signature Verification
SIP Based Intrusion Detection System for VoIP based Applications
An Efficient Approach for Wormhole detection in MANET
Multimedia Security through LSB Matching
An Integrated Model for Prediction of Loading Packets in Network Traffic
Finding Similar Classes in Ontologies
An Analytical Study of "Digital Image Watermarking in Frequency Domain"
A Wormhole Attack in Mobile Ad-hoc Network: Detection and Prevention
A Scalable Record Retrieval Methodology Using Relational Keyword Search System
Analysis of Association rule in Data Mining
An Image Processing Approach to Intelligent Traffic Management System
Rigorous Design of Moving Sequencer Atomic Broadcast in Distributed Systems
Non-Partitioning Merge-Sort: Performance Enhancement by Elimination of Division in Divide-and-Conquer Algorithm
A Critical Analysis of the Cyber Contract Using Electronic Mail
ICTS2016-SS27-07: A Peek into Web Applications Security
Reinforcement Learning based Routing for Cognitive Network on Chip
Wi-MAX: Connecting People
Test Suite Reduction by Mutation Testing Mapped to Set Cover Problem
Thermal Analysis of Active Electronic Component with Thermal Imaging
Pentest Ninja: XSS And SQLi Takeover Tool
Multiplicative Data Perturbation Using Fuzzy Logic in Preserving Privacy
Design a New Middleware for Communication in Ad Hoc Network of Android Smart Devices
Evolution of Payments Bank and Impact From M-PESA: A Case of Mobile Banking Services in India
Automatic Segmentation and Classification of Dysfluencies in Stuttering Speech
Cha-Cha 20: Stream Cipher Based Encryption for Cloud Data Centre
An optimal approach for extraction of Web Contents using Semantic Web framework
Big data and ICT applications: A study
A Toolkit on Mobile Apps for Business Growth: Insights from Design and Development
Movie Recommendation System Employing Latent Graph Features in Extremely Randomized Trees
An implementation of Feature ranking using Machine learning techniques for Diabetes disease prediction
Dynamic Deployment of Wireless Sensor Network using PBB-BC Algorithm
An Elucidation on Steganography and Cryptography
A Study on effects of multi-dimension reduction on Three-Dimensional wireless sensor network localization
AgroSearch: A Web Based Search Tool for Pomegranate Diseases and Pests Detection Using Image Processing
Google Analytics: A Tool to make websites more Robust
Recommender System for E-Learning through Content and Profile Based Approach
Analysis of Message Propagation for Intelligent Disaster Management through Vehicular Cloud Network
An Alternative Framework of Anisotropic Diffusion for Image Denoising
Security, Privacy Issues and challenges In Cloud Computing: A Survey
Operating Systems for Internet of Things: A Comparative Study
Performance Analysis of Secure Localization Techniques in Wireless Sensor Network
Development and Performance Analysis of Cloud and MVC Based Web application
90nm Node 1T Floating Gate Embedded Flash Memory with Precharge NMOS Transistor
FFT based detection of Diabetic Retinopathy in Fundus Retinal Images
A Novel Multi Pattern String Matching Algorithm with While Shift
Adaptive Slot Sharing based TDMA Technique for Routing in an Obstructed Wireless Sensor Network
A Secure Protocol for Trust Management in OLSR
An MSE (mean square error) based analysis of deconvolution techniques used for deblurring/restoration of MRI and CT Images
A Novel and Integrated Semantic Recommendation System for E-Learning using Ontology
A Review on Crowd Behavior Analysis Methods for Video Surveillance
High Performance Computation Analysis for Medical Images using High Computational Methods
Quality Estimation of English-Hindi Machine Translation Systems
Performance Based Analysis of Novel Equilin Clustering
Implications of Supervised Learning on Word Sense Disambiguation for Hindi
Automatic Evaluation of Ontology Matchers
Storageless Credentials And Secure Login
POS tagger for Urdu using Stochastic approaches
Word Sense Disambiguation on Dravidian Languages: A Survey
Low Noise Rim Preserving Filter
Resource Management using Feed Forward ANN-PSO in Cloud Computing Environment
Artificial Multimodal Vein Biometric Template Creation for Enhanced Security
Food Security and Safety using advanced Information and Communication Technologies (ICTs)
Reliability Assessment of Energy Monitoring Service for a Futuristic Smart City
A Study On Malayalam Machine Translation
Acceleration of Bullet Physics Physical Simulation Library Using GPU and Demonstration on a Set-Top Box Platform
Biometric Template Protection with Fuzzy Vault and Fuzzy Commitment
Towards m-gov in Solid Waste Management Sector Using RFID, Integrated technologies
A Framework for Detecting External Plagiarism from Monolingual Documents: Use of Shallow NLP and N-gram Frequency Comparison
Text Mining Predictive Modeling Algorithm for classifying Attitudes of customers with Accuracy Estimation
Analytic Hierarchy Process (AHP) to Find Most Probable Web Attack on an E-Commerce Site
Smart Interaction Using Hand Gesture Recognition
Centralized Approach towards Intelligent Traffic Signal Control
A Comparative Study of Various Supervised Feature Selection Methods for Spam Classification
An approach to identify user interest by reranking personalize web
Comparative Performance of Fault-Prone Prediction Classes with K-means Clustering and MLP
An Approach to identify semantic relations between user's queries in text retrieval
Audio Steganography using ZDT: Encryption using Indexed Based Chaotic Sequence
Query Processing over Large RDF using SPARQL in Big Data
An Innovative Approach for Imputation and Classification of Medical Records for Efficient Disease Prediction
American Static Signs Recognition Using Leap Motion Sensor
Principals of Energy Efficiency in Wireless Mesh Network
Hybrid Image Fusion Algorithm Using Laplacian Pyramid and PCA Method
A Novel Approach towards Authentication by Generating Strong Passwords
Towards Sentiment Orientation Data Set Enrichment
Design and Analysis of Anti-Aliasing Filters for Rendering of Graphical Entities
Behavior Analysis of Twitter Feed using Dymamic Synonym and Abbreviation Mapping Modules on top of a Trained Naïve Bayes Classifier
Pseudo Random Bit Generator using Logistic and Bernoulli Maps
Patient Data Dissemination in Wireless Body Area Network: A Qualitative Analysis
Semi-Automatic Domain Ontology Graph Generation System in Punjabi
Geometry based Inter Vehicle Distance Estimation for Instantaneous GPS Failure in VANETs
Bernoulli Keyed Hash Function for Authenticating the data over Virtual Private Network
Effect of TLB on system performance
Evaluation of Black hole, Wormhole and Sybil Attacks in Mobile Ad-hoc Networks
Implementation of Hardware Efficient Chaotic Generators for Signal Security in Portable Systems
Improving JPEG Image Anti-forensics
Open Source Software Reliability Growth Models for Distributed Environment Based on Component-Specific Testing-Efforts
Impact of variable probability level and nutrient concentration on animal diet formulation
Efficient Resource Allocation Strategy to Improve Energy Consumption in Cloud Data Centers
Usage of Hybrid Mechanisms to Reduce Energy Consumption while Preserving Green SLA in Cloud Environment
A Single Database Scan Approach for Mining Temporally Similar Association Patterns
Digital Video Watermarking using DWT and Singular Values
Key Diffusion Approach for AVK based Cryptosystem
Multi Strategy Selection in E- Negotiation: A Proposed Architecture
Towards National Integration by Analyzing a Case Study of CyberCrimes
Speaker Identification and Authentication System using Energy based Cepstral Data Technique
An Approach for Efficient Many Keywords Findings over Encrypted Cloud Information
A Hybrid Approach for Dynamic Intrusion Detection, Enhancement of Performance and Security in MANET
SIUQAPTT: SQL Injection Union Query Attacks Prevention Using Tokenization Technique
Use of Proxy Signature in e-Governance
Performance Measurement of Virtual Machine Migration Using Pre-copy Approach in cloud computing
K-AMOA: K-Anonymity Model for Multiple Overlapped Attributes
Intellectualizing TRUST for Medical Websites
Seamless VANET Connectivity through Heterogeneous Wireless Network on Rural Highways
Analysis of Several Image Steganography Techniques in Spatial Domain: A Survey
Counting Clusters in Twitter Posts
Cross Layer Approach Energy Efficient Transmission of Multimedia Data over Wireless Sensor Networks
An Efficient And Economical Solution For Future Traffic Management System Using RFID
Developing Novel Skin Detection on ODROID XU4 Heterogeneous Multi-Processing Device
Multispectral Medical Image Fusion using PCA in Wavelet Domain
Resource Management Through Fuzzy Assignment Problem in Cloud Computing Environment
Frame Based Biometric Authentication System for Healthcare
The Effect of Internet Usage on the Psychological States of Adolescents and Young Adults
Relevance of Cloud Computing in Namibia: A Case Study
Predictive Approach of Case Base Reasoning in Artificial Intelligence: In Case of Astrological Predictions About Famous Personalities
Link Prediction in Social Networks: A Similarity score based Neural Network Approach
Design of Low Power Memristor Non-Volatile Dram Cell with Footer Switch
Novel Gating Technique in D-Latch for Low Power Application
Enhancing the capabilities of Student Result Prediction System
Factors Affecting the Adoption of ICT in Hospitality & Tourism Industry
Realization of Schmitt Trigger in Low Power SRAM Cell
A Review of Game-Theoretic Approaches for Secure Virtual Machine Resource Allocation in Cloud
Power and Area Efficient Capacitor Multiplier Technique for Multi-Fin Two Stage Opamp
Power efficient optimal Operational Transconductance Amplifier Using Source Degeneration Technique
Evaluation and Comparison of Entity based search Implied by SVM and Neural Network
Classification of Medical MRI Brain Images based on Hadoop
Design of low power 3-bit TIQ based ADC by using FinFET Technology
Performance Augmentation of 2:1 Mux Using Transmission Gate
Compression & Security in MongoDB without affecting Efficiency
Design and Analysis of New Efficient Multifin Low Leakage Switch Mode Power Supply
Scheduling Real-Time task using dynamic Preemption Threshold
A Novel Approach for Software Test Data Generation using Cuckoo Algorithm
A SDDG FinFET Based Op Amp with DSB Circuit
A Review of Cloud Computing Capabilities Towards Building Virtual Learning Centres.
Cluster Based Authentication Scheme for Wireless Multimedia Sensor Networks
Denial of Service Attack Detection using Multivariate Correlation Analysis
Software Architecture for Smart Card: ICT Solution for Healthcare Industry for Sustainable Development
Security Challenges of Virtualization in Cloud Computing
An Improved Fitness Based Differential Evolution Algorithm (IFBDEA)
Designing a Secure Network Interface By Thwarting Mac Spoofing Attacks
Secure Sum Computation for Insecure Networks
A Rigorous Framework for Verification & Validation of Dynamic Aspect of Safety Critical System
Deciding Admission Criteria For Master of Computer Applications Program in India using Chi-Square Test
A Survey of Open Source Protocols XMPP and SIP for Instant Messaging System
Securing SQL with Access Control for Database as a Service Model
Performance Analysis of Fault Tolerant Advanced Irregular Shuffle Exchange Network (AISEN)
Mining Outlier Temporal Association Patterns
Named Entity Recognition in Hindi Using Conditional Random Fields
Low-Power High Speed 1-bit Full Adder Circuit Design
Symmetric Cryptography using Multiple Access Circular Queues (MACQ)
Analysis of Decision Support Systems implemented for Suggesting a course for higher education
An Efficient Edge Detection Technique Using Filtering and Morphological Operations for Underwater Acoustic Images
An Alert System Based on Shared Score for Online Social Networks
Three Tier Network Architecture to Mitigate DDoS Attacks on Hybrid Cloud Environments
Simulation of Digital Signal Processor-FFT for Communication System Applications
Big Data Analytics Based on In-Memory Infrastructure On Traditional HPC: A Survey
Blended e-Learning Training (BeLT): Enhancing Railway Station Controller Knowledge
The Cyber Security Issues over Emergency Management
Performance Evaluation of Path Length based Routing Strategies for Survivable WDM Network
Authentication of Electronic Control Unit using Arbiter Physical Unclonable Functions in Modern Automobiles
Implementation and Analysis of Blackhole Attack in AODV Routing Protocol
Classification and Performance Analysis of Intra-domain Mobility Management Schemes for Wireless Mesh Network
Matrix Transposition Based Cryptographic Code With Two Dimensional Parity Checking
Virtual Machine Provisioning for Cloud Scenarios: A Survey of Approaches and Challenges
Feedback based Trust Management for Cloud Environment
Intrusion Detection System Using Genetic Algorithm for Cloud
Emerging Applications Perspective for Internet of Things
Segmented Crypto Algorithm
A DWT based Attack Resistant Video Steganography
Software Effort Estimation of GSD Projects Using Calibrated Parametric Estimation Models
A GCM and GPS Based Approach to Health Service
Key Author Analysis in Research Professionals' Collaboration Network based on MST using Centrality Measures
A Unique Word Prediction System for Text Entry in Hindi
Unique Constrained Class labeled Association Rule Mining
Word Sense Disambiguation in Software Requirement Specifications Using WordNet and Association Mining Rule
Implementation of Modified RSA Cryptosystem for Data Encryption and Decryption based on n Prime number and Bit Stuffing
A language based comparison of different similarity functions and classifiers using web based Bilingual Question Answering System developed using Machine Learning Approach
Analysis of Angle Based Opportunistic Routing Protocol for Vehicular Ad-Hoc Networks
Elliptic Curve Based Proxy Re-Encryption
A Fast Gene Expression Analysis using Parallel Biclustering and Distributed Triclustering Approach
Removing Flaming Problems from Social Networking Sites using Semi-Supervised Learning Approach
PDComp: An Effective PPI complex Finding Method
Best practices for web applications to improve performance of QoS
Requirements Prioritization: Parameters of Relevance -- An empirical Study across 3 datasets
VIP: Verification and Identification Protective data handling layer implementation to achieve MVCC in cloud computing
Selective Encryption of Video Frames Using Bezier Curve Over Galois Field GF (P^m)
Novel Driver Behavior Model Analysis using Hidden Markov Model to increase Road Safety in Smart Cities
Opinion based trusted AODV routing protocol for MANET
Comparative analysis of different statistical and neural network based forecasting tools for prediction of stock data
Static structural dependency analysis for parallelization of Java programs
Prioritization of Security Measures at the Junction of MANET and IoT
Hybrid Channel Allocation with GA and PSO to reduce Call Blocking Probability in Cellular Network
Information Theoretic Approaches for Detecting Causality in Gene Regulatory Networks
Vertical Handoff Mechanisms in VANET: A Survey
A Novel Approach for Web Service Recommendation
Survey on Development of Expert System from 2010 to 2015
A Digital Forensics Investigation Model for Social Networking Site
A Framework to protect multiple applications in java using synchronization.
Automatic Text Classification in Information retrieval: A Survey
Optimal Cluster Head Election Algorithm for Mobile Wireless Sensor Networks
Human Gait Recognition using Deep Neural Networks
Performance Evaluation of Text Independent Automatic Speaker Recognition using VQ and GMM
A Behavioral Metrics Suite for Modular Ontologies
A Comparison of Existing Tools for Evaluation of Programming Exercises
Non-Relational Databases in Big Data
Clustering Algorithms for Intrusion Detection: A Broad Visualization
Secure Content Dissemination in Small Topological Environment by Enhancing Security of DSR
Performance Improvement: Audio Steganography Technique Parity Bit Combined With Cryptography
Modification of Symmetric-Key DES into Efficient Asymmetric-Key DES using RSA
Hadoop based collaborative recommendation system
Big-data Transportation in Orchestrated Bioinformatics Workflows: An Analysis and Hypothesis
Dependency Parser for Telugu Language
Modified Analytical Hierarchy Process to Recommend an Ice Cream to a Diabetic Patient
A Critical Study of Factors Promoting Cyberloafing in Organizations
Confidentiality Enhanced Security Model for Cloud Environment
Optimization Techniques in Wireless Sensor Networks
Analysis of Nature driven Routing Protocol in MANETS
A Review on 0-day Vulnerability Testing in Web Application
An Integrated Method for Outlier Detection with Analytical Study of Distance Based and Angle Based Approaches
Agent based Security Model for Cloud Big Data
Data Vault: A Security Model for Preventing Data Theft in Corporate
Advance Persistent Threat: Botnet
A Comparative study on Parallel Data Mining Algorithms using Hadoop Map Reduce: A Survey
Localization Adaptive Secure Routing for Ad-Hoc Cloud Networks Based on Synchronized Timestamp Approach
Malware Analysis: Tools and Techniques
A Survey of Financial Losses Due to Malware
Fuzzy Based Hybrid Mobile Recommendation System
Self Similarity Effect of RTT and RTO in Network Congestion Control Mechanism

Similar Documents

...
Various handover processes in wi-max wi.

...
VARIOUS HANDOVER PROCESSES IN WI-MAX

Article

...
Various handover processes in Wi-Max

Chapter

...
Broadband Equilatral Triangular Microstrip Antenna for Wi-Max Application

Article

...
Capacity Improvement of WI-MAX In presence of Different Codes WI-MAX: Speed & Scope of future

Article

...
Compact dual band microstrip patch antenna for Wi- Max communication systems

Article

...
Mobile wi-max.

...
Connecting Places, Connecting People

Book

...
Helix parameters optimization for Wi-Max applications

Article

Wi-MAX: Connecting People

Content Provider ACM Digital Library
Author Swamy, Robin Singhal, Vidushi
Abstract WiMAX is a vast and broader area coverage network and is licensed spectrum; WiMAX can used anytime anywhere with greater speed and also support the multimedia application. Wimax basically provide a secured network access. In this rapid development, people need for safety and security of the country, so people need to adopt the new technology term called WI-MAX. This will basically provide us a secured way to live. Wi-Max is wide term as compared with Wi-Fi, it basically work for short rage but Wi-Max has large range for network Access. This will help the people by providing secured environment, as all the activities will be watched by vigilance officers. In Wi-Max network city will be connected in WEB MESH network connectivity i.e Hexa-polygon network tower with main server in middle as in above pic. This type of connectivity will not lead to any signal breakdown. And continues network will be provided to all the public.
Starting Page 1
Ending Page 7
Page Count 7
File Format PDF
ISBN 9781450339629
DOI 10.1145/2905055.2905242
Language English
Publisher Association for Computing Machinery (ACM)
Publisher Date 2016-03-04
Publisher Place New York
Access Restriction Subscribed
Content Type Text
Resource Type Article
  • About
  • Disclaimer
  • Feedback
  • Sponsor
  • Contact
  • Chat with Us
About National Digital Library of India (NDLI)
NDLI logo

National Digital Library of India (NDLI) is a virtual repository of learning resources which is not just a repository with search/browse facilities but provides a host of services for the learner community. It is sponsored and mentored by Ministry of Education, Government of India, through its National Mission on Education through Information and Communication Technology (NMEICT). Filtered and federated searching is employed to facilitate focused searching so that learners can find the right resource with least effort and in minimum time. NDLI provides user group-specific services such as Examination Preparatory for School and College students and job aspirants. Services for Researchers and general learners are also provided. NDLI is designed to hold content of any language and provides interface support for 10 most widely used Indian languages. It is built to provide support for all academic levels including researchers and life-long learners, all disciplines, all popular forms of access devices and differently-abled learners. It is designed to enable people to learn and prepare from best practices from all over the world and to facilitate researchers to perform inter-linked exploration from multiple sources. It is developed, operated and maintained from Indian Institute of Technology Kharagpur.

Learn more about this project from here.

Disclaimer

NDLI is a conglomeration of freely available or institutionally contributed or donated or publisher managed contents. Almost all these contents are hosted and accessed from respective sources. The responsibility for authenticity, relevance, completeness, accuracy, reliability and suitability of these contents rests with the respective organization and NDLI has no responsibility or liability for these. Every effort is made to keep the NDLI portal up and running smoothly unless there are some unavoidable technical issues.

Feedback

Sponsor

Ministry of Education, through its National Mission on Education through Information and Communication Technology (NMEICT), has sponsored and funded the National Digital Library of India (NDLI) project.

Contact National Digital Library of India
Central Library (ISO-9001:2015 Certified)
Indian Institute of Technology Kharagpur
Kharagpur, West Bengal, India | PIN - 721302
See location in the Map
03222 282435
Mail: support@ndl.gov.in
Sl. Authority Responsibilities Communication Details
1 Ministry of Education (GoI),
Department of Higher Education
Sanctioning Authority https://www.education.gov.in/ict-initiatives
2 Indian Institute of Technology Kharagpur Host Institute of the Project: The host institute of the project is responsible for providing infrastructure support and hosting the project https://www.iitkgp.ac.in
3 National Digital Library of India Office, Indian Institute of Technology Kharagpur The administrative and infrastructural headquarters of the project Dr. B. Sutradhar  bsutra@ndl.gov.in
4 Project PI / Joint PI Principal Investigator and Joint Principal Investigators of the project Dr. B. Sutradhar  bsutra@ndl.gov.in
Prof. Saswat Chakrabarti  will be added soon
5 Website/Portal (Helpdesk) Queries regarding NDLI and its services support@ndl.gov.in
6 Contents and Copyright Issues Queries related to content curation and copyright issues content@ndl.gov.in
7 National Digital Library of India Club (NDLI Club) Queries related to NDLI Club formation, support, user awareness program, seminar/symposium, collaboration, social media, promotion, and outreach clubsupport@ndl.gov.in
8 Digital Preservation Centre (DPC) Assistance with digitizing and archiving copyright-free printed books dpc@ndl.gov.in
9 IDR Setup or Support Queries related to establishment and support of Institutional Digital Repository (IDR) and IDR workshops idr@ndl.gov.in
I will try my best to help you...
Cite this Content
Loading...