Our objective is to make proposals for the design of a SIS SID-quality and meet the needs of different stakeholders of the university. This is where we join (which is poorly modeled by the concept of data marts in the current tools of the market), namely the modeling of data resources. Often the documents are deposited on the information system of an organization without classification, ...
Paper Information
Authors Dr. Latifa. Oubedda, Brahim. Erraha, Mohamed. Khalfaoui
Read Journal Click Here
Read Paper Click Here
Page No. 21 to 26

The current literature shows the existing curriculum models are unable to meet the needs of the today’s dynamic & complex education as the society is more open, diverse, multidimensional, fluid and more problematical. A generic curriculum model is proposed for all types of computer degree programs. The proposed model defines five meta-processes, a flexible structure for ...
Paper Information
Authors Dr. Muhammad Anwar-ur-Rehman Pasha, Dr. Shaheen Pasha
Read Journal Click Here
Read Paper Click Here
Page No. 17 to 24

Data mining, also known as Knowledge Discovery in Databases (KDD) is one of the most important and interesting research areas in 21st century. Frequent pattern discovery is one of the important techniques in data mining. The application includes Medicine, Telecommunications and World Wide Web. Nowadays frequent pattern discovery research focuses on finding co-occurrence relationships bet...
Paper Information
Authors Dr. D. Gunaseelan, P. Uma
Read Journal Click Here
Read Paper Click Here
Page No. 15 to 20

Digital technologies are playing a vital role in the present communication system. This paper presents a robust and secure watermarking method to protect the copyright information of multimedia objects. In the proposed method, Discrete Wavelet Transform and Discrete Cosine Transform are applied on the cover image and then Discrete Cosine Transform coefficients of watermark image are embe...
Paper Information
Authors Dr. R. Eswaraiah, E.Sreenivasa Reddy
Read Journal Click Here
Read Paper Click Here
Page No. 31 to 34

The two parameters which plays important roleinMRI(magneticresonanceimaging),acquiredby various imaging modalities are Feature extraction andobjectrecognition.Theseoperationswillbecome difficult if the images are corrupted with noise. Noise in MR image is always random type of noise. This noise will change the value of amplitude and phase of each pixel inMR image. Due to this, MR image g...
Paper Information
Authors Ms. Ami Vibhakar, Prof.Mukesh Tiwari, Prof. Jaikaran Singh, Prof Sanjay Rathore
Read Journal Click Here
Read Paper Click Here
Page No. 23 to 29

Several techniques based on the three–dimensional (3-D) discrete cosine transform (DCT) have been proposed for visual data coding. These techniques fail to provide coding coupled with quality and resolution scalability, which is a significant drawback for contextual domains, such decease diagnosis, satellite image analysis. This paper gives an overview of several state-o...
Paper Information
Authors Shaik. Jumlesha, Dr.Ch.Sathyanarayana
Read Journal Click Here
Read Paper Click Here
Page No. 7 to 21

Mobile ad-hoc networks (MANETs) are selfconfiguring networks of nodes connected via wireless. This kind of networks is currently one of the most important research subjects, due to the huge variety of applications (emergency, military, etc...). In MANETs, each node acts both as host and as router, thus, it must be capable of forwarding packets to other nodes. Topologies of these networks...
Paper Information
Authors Dr. Gurjeet Singh, Er.Manish Goyal
Read Journal Click Here
Read Paper Click Here
Page No. 37 to 46

Cryptography is the exchange of information among the users without leakage of information to others. Many public key cryptography are available which are based on number theory but it has the drawback of requirement of large computational power, complexity and time consumption during generation of key [1]. To overcome these drawbacks, we analyzed neural network is the best way to genera...
Paper Information
Authors Asst. Prof.Nitin Shukla , Abhinav Tiwari
Read Journal Click Here
Read Paper Click Here
Page No. 17 to 26

Every year a large scale of students in Bangladesh enrol in different Universities in order to pursue higher studies. With the aim to build up a prosperous career these students begin their academic phase at the University with great expectation and enthusiasm. However among all these enthusiastic and hopeful bright students many seem to become successful in their academic career and fou...
Paper Information
Authors Dr. Linkon Chowdhury, Shahana Yeasmin
Read Journal Click Here
Read Paper Click Here
Page No. 55 to 63

Access control refers to securing access to the resources and allowing access up to some defined level. This paper presents various approaches implementing access control in an open domain and carries an analysis of decentralized and diverse access control (DDAC) architecture. The DDAC architecture eliminates the role of centralized authority for managing and issuing usersâ€â...
Paper Information
Authors Dr. Rajender Nath, Gulshan Ahuja
Read Journal Click Here
Read Paper Click Here
Page No. 31 to 35