Personal Information
Organización/Lugar de trabajo
Noida Area, India India
Ocupación
SAP BI/BW/BO Developer at Sopra Steria Group
Sector
Technology / Software / Internet
Acerca de
Thank you for visiting my profile.
I am working as a SAP BI / BO developer at sopra stetia group. It involves following activities:
**ETL ** using infoproviders, transformations, infoobjects, hierarcies, info sources, data sources, update rules, process chains, routines, fms etc.
**Reporing ** using Bex query designer, bex analyser, Web intelligence designer, Dashboard , Design studio with variables,userexits, badi's, report-report interfaces etc.
**Data extraction and loading ** from sap r/3, bw servers, bo servers, ms acess or flat files.
**Algorithm design and implementation ** for data extraction, data cleaning, data mining, data transformation and modelling.
**Tools used in the proc...
Etiquetas
uptu notes
uptu ppt
seminar ppt
osi model
tcp/ip model
mobile station
gsm authentication.
base station
gps
wml
wap protocol stack
wsp
wdp
wae
wtp
wtls
mipv6
mipv4
foreign agent
care of address
home agent
transaction oriented tcp
selective retransmission
timeout freezing
mobile tcp
fast retransmission
slow start
hybrid channel access
mobile
sikkim manipal university notes
notes
rtu notes
mobile computing
networks notes
amity notes
ptu notes
wireless notes
mobile computing unit1
wireless communication notes
mtu notes
gbtu notes
mtu mobile computing notes
dsss
modulation
fsss
frequency reuse
cell structure
introduction
faith
why
fear
why not
fight with fears
believe in yourself
every body is genius
fun at work
how to live life
have fun
creative thinking
be creative
genius
fun
who killed your creativity
10 ways to be creative
dont be discouraged
how to live
creative
life
udp segment
udp
well known port number.
tcp segment
tcp
windowing
sliding window
3-way handshake
2-way handshake
flow control
transport layer
internet layer
network acess layer
application layer
why tcp
network layer
computer graphics notes
seminar topic
innovation
cyber law uptu ppt
iscl ppt
information security and cyber law ppt
uptu iscl notes
trademark duration.
opposition
registration
objection
examination
publication
filling
application
registration process
trade mark classes
sem 6 iscl
sem 2 iscl
trade search
trade mark
iscl uptu.iscl
trade
electronics and communication
construction by robot
termite
robot in construction
termite inspired robot
robotic labour
building
process of e-commerce.
architecture of edi
electronic data interchange
edi
virtual organisation
e-cash
eps
electronic payment system
e-governance
payment gateway
metro cards
smartcards
e-wallet
e-commerce
incoming call
gsm in india
gsm
mobile management
advantages of gsm
future of gsm
architecture of gsm
global system for mobile communication
network switching subsystem
base station subsystem
business objective of gsm
application of gsm
outgoing call
gsm security
history of gsm
call routing
entities of gsm
qsk
m-ary
msk
multi level phase and amplitude modulation
qpsk
non coherent detection
coherent detection
demodulation
detection
pulse duration modulation
pulse amplitude modulation
linear modulation
differential modulation
phase shift key
binary phase shift key
amplitude shift key
frequency shift key
bezier curves
b-spline
spline
hermite interpolation
blobby objects
torus
ellipsoid
sphere
paraboloid
hyperboloid
quadratic surfaces
computer
alu
monitor
mouse
scanner
printer
history of computer
generations of computer
speaker
unix
memory unit
keyboard
linux
what is computer
software
cpu
operating system
type of memory
classification of computers
hardware
virus
security threats
computer security
cryptography
physical security .
worms
hackers
digital signature
capcha
trojans
hash function
antivirus
malacious codes and softwares
logic bombs
internet security
crackers
sim cloning
sim
comp algorithm
bts
mobile cloning
preventive measures
termes
bio inspired robot
robot
phong model
diffuse reflection
colour considerations
warn model
light sources
transparency
specular reflection
diffuse light
shadow
intensity attentuation
ambient light
surfaces
back face detection algorithm
scan line method.
a buffer method
hidden lines
depth buffer method
network based positioning
time of arrival method (toa)
cellular network
tracking and positioning of mobile
positioning of mobile
tracking of mobile
tracking and positioning of mobile systems
distance based positioning
tracking of mobile systems
positioning of mobile systems
toa method
architecture of geolocation systems
Ver más
Presentaciones
(17)Recomendaciones
(2)Introduction to ABAP
sapdocs. info
•
Hace 14 años
Twitter + Lambda Architecture (Spark, Kafka, FLume, Cassandra) + Machine Learning
Beatriz Martín @zigiella
•
Hace 7 años
Personal Information
Organización/Lugar de trabajo
Noida Area, India India
Ocupación
SAP BI/BW/BO Developer at Sopra Steria Group
Sector
Technology / Software / Internet
Acerca de
Thank you for visiting my profile.
I am working as a SAP BI / BO developer at sopra stetia group. It involves following activities:
**ETL ** using infoproviders, transformations, infoobjects, hierarcies, info sources, data sources, update rules, process chains, routines, fms etc.
**Reporing ** using Bex query designer, bex analyser, Web intelligence designer, Dashboard , Design studio with variables,userexits, badi's, report-report interfaces etc.
**Data extraction and loading ** from sap r/3, bw servers, bo servers, ms acess or flat files.
**Algorithm design and implementation ** for data extraction, data cleaning, data mining, data transformation and modelling.
**Tools used in the proc...
Etiquetas
uptu notes
uptu ppt
seminar ppt
osi model
tcp/ip model
mobile station
gsm authentication.
base station
gps
wml
wap protocol stack
wsp
wdp
wae
wtp
wtls
mipv6
mipv4
foreign agent
care of address
home agent
transaction oriented tcp
selective retransmission
timeout freezing
mobile tcp
fast retransmission
slow start
hybrid channel access
mobile
sikkim manipal university notes
notes
rtu notes
mobile computing
networks notes
amity notes
ptu notes
wireless notes
mobile computing unit1
wireless communication notes
mtu notes
gbtu notes
mtu mobile computing notes
dsss
modulation
fsss
frequency reuse
cell structure
introduction
faith
why
fear
why not
fight with fears
believe in yourself
every body is genius
fun at work
how to live life
have fun
creative thinking
be creative
genius
fun
who killed your creativity
10 ways to be creative
dont be discouraged
how to live
creative
life
udp segment
udp
well known port number.
tcp segment
tcp
windowing
sliding window
3-way handshake
2-way handshake
flow control
transport layer
internet layer
network acess layer
application layer
why tcp
network layer
computer graphics notes
seminar topic
innovation
cyber law uptu ppt
iscl ppt
information security and cyber law ppt
uptu iscl notes
trademark duration.
opposition
registration
objection
examination
publication
filling
application
registration process
trade mark classes
sem 6 iscl
sem 2 iscl
trade search
trade mark
iscl uptu.iscl
trade
electronics and communication
construction by robot
termite
robot in construction
termite inspired robot
robotic labour
building
process of e-commerce.
architecture of edi
electronic data interchange
edi
virtual organisation
e-cash
eps
electronic payment system
e-governance
payment gateway
metro cards
smartcards
e-wallet
e-commerce
incoming call
gsm in india
gsm
mobile management
advantages of gsm
future of gsm
architecture of gsm
global system for mobile communication
network switching subsystem
base station subsystem
business objective of gsm
application of gsm
outgoing call
gsm security
history of gsm
call routing
entities of gsm
qsk
m-ary
msk
multi level phase and amplitude modulation
qpsk
non coherent detection
coherent detection
demodulation
detection
pulse duration modulation
pulse amplitude modulation
linear modulation
differential modulation
phase shift key
binary phase shift key
amplitude shift key
frequency shift key
bezier curves
b-spline
spline
hermite interpolation
blobby objects
torus
ellipsoid
sphere
paraboloid
hyperboloid
quadratic surfaces
computer
alu
monitor
mouse
scanner
printer
history of computer
generations of computer
speaker
unix
memory unit
keyboard
linux
what is computer
software
cpu
operating system
type of memory
classification of computers
hardware
virus
security threats
computer security
cryptography
physical security .
worms
hackers
digital signature
capcha
trojans
hash function
antivirus
malacious codes and softwares
logic bombs
internet security
crackers
sim cloning
sim
comp algorithm
bts
mobile cloning
preventive measures
termes
bio inspired robot
robot
phong model
diffuse reflection
colour considerations
warn model
light sources
transparency
specular reflection
diffuse light
shadow
intensity attentuation
ambient light
surfaces
back face detection algorithm
scan line method.
a buffer method
hidden lines
depth buffer method
network based positioning
time of arrival method (toa)
cellular network
tracking and positioning of mobile
positioning of mobile
tracking of mobile
tracking and positioning of mobile systems
distance based positioning
tracking of mobile systems
positioning of mobile systems
toa method
architecture of geolocation systems
Ver más