Total Visitors
- 3,994,589
Search Inside
My You Tube Channel
Visitors on The Site
Fill This Form to Contact Me
Top Posts & Pages
- Concept of Cycle of Erosion(Davision Concept)
- Scales in Geography: An Overview and Simple Method of Constructing Scales
- Some Important Functions of The City
- Migration Theories : Lee’s Push Pull Theory
- Nature and Scope of Urban Geography: An Overview
- Social Geography: Concept,Origin,Nature and Scope
- Tourism Planning: Overview and Importance
- भारत के पर्वत व पर्वत श्रेणियाँ
- Salient Features of Tourism Product
- Main Determinants of Tourism Demand
Being Social
Pages
- Article Submission
- Basics of Geography (Open Elective)
- Book Reviews
- Disaster Management
- Field Training and Tour
- Geography Notes
- Geography of Tourism
- Geography Study Material for NTA-NET & IAS Exams
- Geomorphology Class Black Board
- Hindi Posts
- Human Geography
- My Projects
- Online Class
- Physical Geography
- Posts on Geography Practicals and Statistical Techniques
- Regional Studies
- Settlement Geography
- Social Geography
- UGC NET Geography Topics
- Urban Systems
- Useful Links
- Water Resources
- About Me and This Site
Blogroll
Digital Blackboards
My Pages
Other Sites I Am Involved With
Recommended Links
Useful Links
Tag Archives: internet
Social Exclusion:The Term and Spatiality
Exclusionary processes can have various dimensions: Political exclusion can include the denial of citizenship rights such as political participation and the right to organise, and also of personal security, the rule of law, freedom of expression and equality of opportunity. Bhalla … Continue reading
Posted in Cities, Human Geography, India, Urban Studies
Tagged CLIMATE, internet, politics, science, society
2 Comments
Now Cyber-Physical cloud for Disaster Management(link)
Researchers at the National Institute of Standards and Technology’s IT Laboratory (NIST ITL) and Japan’s National Institute of Information and Communications Technology (NICT) are developing a prototype cloud platform for collecting, archiving, organising, manipulating and sharing very large cyber and … Continue reading