Call for Comming Issue
 

Volume 1, Issue 3 August 2013

S.No. Title Page No.
01
The software package for administering the examinations created a number of the challenges related to the manual examination method persistent
Author: Mr. Arun Sharma, Dr. S.K. Puniya
Abstract: The gradual acceptance of Computer-Based take a look at (CBT) or Electronic Examination (e-Exam) as a perfect suggests that of examining not solely students however conjointly prospective job seekers in Nigeria could be a welcome development. However, the non existence of a global customary or framework for the look, implementation and readying of the software package for administering the examinations created a number of the challenges related to the manual examination method persistent. During this paper the researcher examines a number of the challenges of some existing Computer-Based take a look at systems and also the take a look at processes with security and result integrity because the objects of enthusiasm. The analysis of a number of these systems and also the analysis of their challenges and security lapses semiconductor diode to the event of a brand new Computer-based take a look at system. The new system was designed victimisation unified modeling language (UML) and enforced with hypertext markup language, PHP & MySQL as a web-based application which can be deployed either on web or computer network.
001-008
[PDF]
02
A system for computer file communication for effective use of information measure and quicker retrieval
Author: Mr. Sunil kumar
Abstract: This paper proposes a singular system for computer file communication for effective use of information measure and quicker retrieval. Once document files square measure changed over mail servers, they embrace format info that will increase computer file size manifold. Bit-stream presents a way that extracts solely characters from formatted document files leading to down message transfer time and file size.
009-012
[PDF]
03
A Model for to reduce computational complexness, junction detection and localization is based on the 1D model
Author: Mr. Parash Singh
Abstract: A novel technique of junction detection in pictures is investigated. Junctions are shapely victimisation regionally applied Hough transforms. 2 sorts of the Hough remodel are proposed: (a) 1D transforms to characterize orientations of the junction segments and (b) 2nd transforms to boot estimate lengths of the segments. For any location of the circular window, the best-fit junction may be found and its strength (visual prominence) may be calculated. Then, actual junctions are detected because the native maxima of the strength operate. To reduce computational complexness, junction detection and localization is based on the 1D model, whereas the 2nd model may be accustomed more characterize detected junctions. The paper presents each theoretical problems with the tactic and its sensible limitations. Relations to various techniques of junction detection are highlighted.
013-020
[PDF]
04
Mobile learning management system: To improves learner’s knowledge, performance, achievements, downside resolution skills
Author: Mr. Anoop Jha
Abstract: This paper is targeted on frame work style of mobile learning management system that improves learner’s knowledge, performance, achievements, downside resolution skills and individual learning system. The frame work style consists of a content module, learning module and analysis module with learner, teacher and data interface. It supports on-line, offline, in field and out field learning activities. The content module are often divided into 5 authoring tools i.e. content development, content management, content distribution, content collaboration and content delivery. The wireless technology development ends up in restructuring of typical classroom learning method into mobile learning from cluster of network with cooperative learning.
021-025
[PDF]
05
A Model based on cryptograpy for improving the performance of steganography
Author: Mr. Kunal Kaura
Abstract: This paper reviews the construct of Cryptography and Steganography and their variations area unit classified as some way of passing. The essence of steganography as associate degree art of concealing information was examined victimization the moving ridge approach. The algorithms developed and exhibited in block diagrams were experimentally examined with encrypted message and disseminated inattentively over the web with the assumption that the stego-image carrying the message wouldn't be discovered by unauthenticated person.
026-032
[PDF]

 

 

 

 

©  2010 All Rights Reserved to IPASJ