Journal of Information Technology and Sciences (e-ISSN: 2581-849X)
http://matjournals.co.in/index.php/JOITS
<p><strong>Journal of Information Technology and Sciences:-</strong> is a print e-journal focused towards the rapid Publication of fundamental research papers on all areas of information technology and sciences engineering.<br /><br />Information technology and science focuses on understanding problems from the perspective of the stakeholders involved and then applying information and other technologies as needed.</p> <ul> <li>Analysis, collection ,classification information</li> <li>Manipulation, storage, retrieval of information.</li> <li>Movement, and dissemination of information.</li> <li>Information theory.</li> <li>Timeliness, relevance, and readability.</li> <li>Human–computer interaction.</li> <li>Value-sensitive design.</li> <li>Iterative design processes.</li> </ul> <p>This Journal involves the comprehensive coverage of all the aspects of information technology and sciences.</p>en-USJournal of Information Technology and Sciences (e-ISSN: 2581-849X)Analysis of Program Outcomes Attainment for Engineering Graduates for NBA Accreditation
http://matjournals.co.in/index.php/JOITS/article/view/5889
<p>One of the requirements of the National Board of Accreditation (NBA) for accrediting a program in an academic institution in India is the analysis of the attainment of program outcomes by the students. This paper gives a method for analysing the extent to which the students attain the program outcomes on completing the program. The method illustrated analyses the attainment level for a single student as well as a batch. The initial calculations are done using excel and the same database is used to train a neural network to get the required output. Data set of individual students or batch of students can be given to the trained network to get the attainment level of program outcomes. The analysis can be done by using the marks secured by the students or by defining rubrics for the respective courses.</p>Therese Yamuna MaheshYalena ThomasK.L. Shunmuganathan
Copyright (c) 2024 Journal of Information Technology and Sciences (e-ISSN: 2581-849X)
2015-09-202015-09-20An Assessment of Video Quality using Watermark
http://matjournals.co.in/index.php/JOITS/article/view/5886
<p>Video applications are much prevalent because of their recurrence in use on web these days. The watermarking can be utilized to appraise the video quality by assessing the watermark debasement. The image watermarking strategy for the video quality estimation is established on a 3-level discrete wavelet change (DWT). Here, also propose a quad tree decomposition of video for watermarking embedding algorithm to keep the balance between watermarks intangibility and its capacity to adapt up to errors. The watermark is inserted into the tree structure of an image with fitting implanting quality chose by measurably examining the attributes of the image. The correlated DWT coefficients over the DWT sub bands are classified into Set Partitioning in Hierarchical Trees (SPIHT). Those SPHIT trees are again decomposed into an arrangement of bitplanes. The insertion and extraction of the watermark in the cover video is discovered to be less difficult than other technologies. The True Detection Rates (TDsssR) determine the video quality by comparing extricated watermark and original watermark. The exactness of the quality estimation is made to approach that of Full-Reference measurements by referring True Detection Rate. In this manner proposed plan has great computational effectiveness for practical applications.</p>Jyothi Lakshmi SSmitha S
Copyright (c) 2024 Journal of Information Technology and Sciences (e-ISSN: 2581-849X)
2015-05-262015-05-26Implementation of an Competent Fixed Field Calculative Unit in Cryptography
http://matjournals.co.in/index.php/JOITS/article/view/5872
<p>Cryptography is not the only means of providing information and network security, but rather one set of techniques. The most critical component of an elliptic curve processor is its arithmetic unit. Typical arithmetic unit includes an adder or subtractor, multiplier, squarer and an inverter. In this paper, we propose, an efficient finite field arithmetic unit using elliptic curve cryptographic method, which is used in most of the cryptographic applications to compute arithmetic operations. Addition operation is done with one n-bit XOR operation, for squaring operation LSB firstsquaring method is used and extended euclidean algorithm for inversion operation. We also present the comparison of two methods Karatsuba and Montgomery, which are used for multiplication operation and among them Karatsuba method is used because of its efficiency. These operations implemented on FPGA Spartan3 tool and simulated using VHDL on Xilinx Isim simulator.</p>Mr. Manoj Kumar DixitBal Mukund SinghShambeel AzimDivya Prabha
Copyright (c) 2024 Journal of Information Technology and Sciences (e-ISSN: 2581-849X)
2015-01-252015-01-25Utilization of Web Based Information Sources and Services in Engineering College Libraries in Charotar Region: A Study
http://matjournals.co.in/index.php/JOITS/article/view/5890
<p>In this study an attempt is being made to highlight the access to web-based Library and Information services in the engineering college Libraries at CHAROTAR Region, particularly in recent past are providing some of notable information services that can be accessed via the College library websites are Web OPAC, latest addition display, data search, and federated search, access to full text and bibliographic databases, online document delivery, access to institutional repository and open access resources, databases and multimedia access resources, live chat, compilation of research profile, web based CAS and SDI, remote access and so on.</p>Umesh Patel
Copyright (c) 2024 Journal of Information Technology and Sciences (e-ISSN: 2581-849X)
2015-12-202015-12-20Comparative Study of Test Data Generation Techniques
http://matjournals.co.in/index.php/JOITS/article/view/5888
<p>Test Data Generation, an important part of software testing, is the process of creating a set of data for testing the adequacy of new or revised software applications. It may be the actual data that has been taken from previous operations or artificial data created for this purpose. Test Data Generation is seen to be a complex problem and though a lot of solutions have come forth most of them is limited to toy programs. Search Based Software Engineering has been applied in many applications. Evolutionary testing designates the use of metaheuristic search methods for test case generation.</p>Anuranjan Misra
Copyright (c) 2024 Journal of Information Technology and Sciences (e-ISSN: 2581-849X)
2015-07-252015-07-25Survey of Image Registration Techniques
http://matjournals.co.in/index.php/JOITS/article/view/5877
<p>Image registration is widely used in many fields such as computer vision, medical imaging, military and remote sensing. For a pair of images (a reference image and a sensed image), the main objective of image registration is to find an optimized transformation from the sensed image to the reference image so that the transformed image is as similar as possible to the reference image up to date, a number of image registration methods have been proposed. The existing registration methods can be roughly classified into two categories: area based and feature based. Area-based methods focus more on the images’ gray spaces than on the images’ feature spaces.</p>Mandar C. LokhandeV. B. Musande
Copyright (c) 2024 Journal of Information Technology and Sciences (e-ISSN: 2581-849X)
2015-03-162015-03-16