M. M. Kamruz Zaman

Learn More
J-DSP is a java-based object-oriented programming environment that was developed at Arizona State University for use in the undergraduate DSP class [1]. In this paper, we describe innovative software extensions on J-DSP to accommodate on-line laboratories for speech processing, image processing, and communications systems. Significant modifications in the(More)
Data Quality for an enterprise data repository various data quality tools are used that focus on this issue. The scope of these tools is moving from specific applications to a more global perspective so as to ensure data quality at every level. A more organized framework is needed to help managers to choose these tools so that that the data repositories or(More)
Data warehousing systems enable enterprise managers to acquire and integrate information from heterogeneous sources and to query very large databases efficiently. Data in a data warehouse does not conform specifically to the preferences of any single enterprise entity. Instead, it is intended to provide data to the entire enterprise in such a way that all(More)
A data warehouse is an asset for an enterprise and exists for the benefit of an entire enterpriseincluding business unit, individual customer, Student etc. Data in a data warehouse does not conform specifically to the preferences of any single enterprise entity. Instead, it is intended to provide data to the entire enterprise in such a way that all members(More)
Data Retrieval is still a pervasive challenge faced in applications that need to query across multiple autonomous and heterogeneous data sources. There is decent amount of standardization as far as WorldWide Web is concerned, while google is universal access tool to search and determine source of the information user requires there is still no such tool(More)
Cloud computing is receiving a great demand among the budding and old enterprises depending on various Information Technology Services in the present IT Scenario. Cloud provides various services which mostly depend upon a good decision making process to handle various requests from service consumers. The Cloud users are mostly divided into two premium or(More)
Information is considered to be an asset for any organizations. Malicious attacks/threats can compromise the security and trust of a system, which shall be controlled by introducing Intrusion Detection System. In order to offer maximum security for the confidential data and the corresponding data integrity, a novel Integrity model based Intrusion Detection(More)
  • Mirza Waseem Hussain, Ghulam Shah Badshah, Sanjay Jamwal, Majid Zaman
  • 2015
With the advance in technology the focus has shifted from desktops and laptops to handheld devices like tablets, phablets, mobile phones, PDA etc. giving rise in the number of users connected to internet. About 900 million computers are connected to internet [23].In an hour 383 thousand TB of data transmission takes place [24]. As the traffic on internet(More)