C:\Users\Shashank\Desktop\Job DocJob PPT.pptx

shashanksingh54379236 7 views 23 slides Aug 11, 2024
Slide 1
Slide 1 of 23
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23

About This Presentation

job


Slide Content

Presentation

Contents Self Introduction Educational background & Work Experiences Topic of Ineterest Research Experiences

Institution: ICFAI Location: Dehradun Name of Degree : B.Tech (CSE) Graduation Year: 2013 Institution: SRMU Location: Lucknow Name of Degree: M.Tech (CSE) Graduation Year: 2015 Institution: NIT Location: Raipur Name of Degree: Ph.D ( S ) (CSE) Graduation Year: 2024 Educational Background

Work Experience Job profile: Assistant professor Institution: BBDITM, Lucknow Date: 30/08/2021 to 22/10/2023 Job profile: Assistant professor Institution: DITU, Dehradun Date: 11/12/2023 to till date Job profile: Lecturer Institution: Cambridge group of Institution, Ranchi Date: 10-10-2017 to 08-08-2021 Job profile: Assistant professor Institution: SRMCEM, Lucknow Date: 08/11/2021 to 29/08/2022 Job profile: Assistant professor Institution: HITM, Lucknow Date: 03-08-2015 to 07-10-2017

Research experience Title of the research: Design a Framework for Routing Schemes in Wireless Sensor Networks using Metaheuristic Approach Area of Research: Wireless Sensor Networks

Research Publications S. Sing h and V. Anand, “Load balancing clustering and routing for IoT-enabled wireless sensor networks” International Journal of Network Management, e2244. https://doi.org/10.1002/nem.2244 [SCI] S. Sing h and V. Anand, “Trust-Based Clustering and Routing in WSNs Using DST-WOA” Peer-peer Networking and Applications Springer (Accepted) [SCI] Shashank Singh , Veena Anand, Pallav Kumar Bera, “A Delay-Tolerant low-duty cycle scheme in wireless sensor networks for IoT applications”, International Journal of Cognitive Computing in Engineering, Volume 4, 2023, Pages 194-204, ISSN 2666-3074, https://doi.org/10.1016/j.ijcce.2023.04.005 . [SCOPUS] Singh, S ., Anand, V. (2023). “A Fuzzy C-Means Based Clustering Protocol to Improve QoS of Multi Sink WSNs”. In: Bhateja , V., Yang, XS., Lin, J.CW., Das, R. (eds) Evolution in Computational Intelligence. FICTA 2022. Smart Innovation, Systems and Technologies, vol 326. Springer, Singapore. https://doi.org/10.1007/978-981-19-7513-4_12   [SCOPUS] S. Singh and V. Anand, "Comparative Study of Different Routing Protocol for Opportunistic IoT Applications" 2019 International Conference on Computing, Power and Communication Technologies (GUCON), NCR New Delhi, India, 2019, pp. 385-389. [SCOPUS]

Courses /Topic of Interest Computer networks: Reference Model (OSI) Operatin g Systems: (Deadlock avoidance algorithm: Banker’s)

Computer Networks Understanding the OSI Model

2. 9 Seven layers of the OSI model

2. 10 The interaction between layers in the OSI model

2. 11 Hop-to-hop delivery

2. 12 Source-to-destination delivery

2. 13 Application layer

2. 14 Summary of layers

Operating Systems Deadlock avoidance algorithm: Banker’s

Deadlock A  deadlock  is a situation where a set of processes are blocked because each process is holding a resource and waiting for another resource acquired by some other process. 

Deadlock Avoidance The system knows the complete sequence of requests and releases for each process. The system decides for each request whether or not the process should wait in order to avoid a deadlock. Each process declare the maximum number of resources of each type that it may need. The system should always be at a safe state. Safe state → no deadlock

Resource-Allocation Graph

Banker's Algorithm Applicable to resources with multiple instances. ● Less efficient than the resource-allocation graph scheme. ● Each process declares its needs (number of resources) ● When a process requests a set of resources: ● Will the system be at a safe state after the allocation? – Yes → Grant the resources to the process. – No → Block the process until the resources are released by some other process

Banker's Algorithm n: integer # of processes m: integer # of resource-types available[1..m] available[ i ] is # of avail resources of type i max[1..n,1..m] max demand of each Pi for each Ri allocation[1..n,1..m] current allocation of resource Rj to Pi need[1..n,1..m] max # resource Rj that Pi may still request

Banker’s Algorithm: Example This is a safe state: safe sequence <P1, P3, P4, P2, P0> ● Suppose that P1 requests (1,0,2) Add it to P1’s allocation and subtract it from Available.

References Data Communications and networking (2021). New York: McGraw-Hill. SILBERSCHATZ, A. (2021). Operating system concepts. JOHN WILEY.

23 Thank You
Tags