for Journals by Title or ISSN
for Articles by Keywords
help
Followed Journals
Journal you Follow: 0
 
Sign Up to follow journals, search in your chosen journals and, optionally, receive Email Alerts when new issues of your Followed Jurnals are published.
Already have an account? Sign In to see the journals you follow.
International Journal of Research in Computer and Communication Technology    [4 followers]  Follow    
  This is an Open Access Journal Open Access journal
     ISSN (Print) 2320-5156
     Published by Suryansh Publications Homepage  [2 journals]
  • A level set Image Articulations in presence of disagreement with MRI
           Scanning
    • Authors: Sai Sathish Konduri, A. Thirupathaiah
      Abstract: In previous techinices the flow of the level set method for image segmentation can be depicte. A level set methods have been widely use in image processing and computer vision. Intensity in homogeneity often occurs in real world images which presents a considerable challenge in image segmentation. MRI intensity inhomogeneities can be attributes to imperfections in the RF. The result is slowly-varying shading artifact over the image that can produce errors Therefore by minimizing this energy the level set method is able to simultaneously segment the image and estimate the bias field, which can be used for bias correction. Statistical analysis is performed by calculating probability, variance and entropy for both the images.
      PubDate: 2014-01-11
      Issue No: Vol. 3 (2014)
       
  • Make Safe Data Promulgate In Multi Cloud Storage
    • Authors: N.Haritha patel, V.Subharama Sharma
      Abstract: The cloud computing technique provide a high range of service the society over the INTERNET. The unique features of clouding computing is that users data are processes remotely users does not own the machine or operate. Therefore users fear of loosing their data special financial and health data. To overcome this problem we purpose high secure decentralized information accountability frame work to keep track of the users access to the data.This approach  enables enclosing our logging mechanism together with users’ data and policies. We introduce the JAR programmable capabilities to both create a dynamic and traveling object and to ensure that any access to user’s data will trigger authentication and automated logging local to the JARs.
      PubDate: 2014-01-11
      Issue No: Vol. 3 (2014)
       
  • On Veracious Search In Unsystematic Networks
    • Authors: K. Thushara, P.Venkata Narayana
      Abstract: The Unstructure peer-to-peer (P2P) file-sharing networks are popular in the mass markets. As the peers participating in unstructure networks interconnect randomly they rely on flooding query messages to discover objects of interest and thus introduce remarkable network traffic. Empirical measurements to studies indicate that the peers in P2P networks have similar preferences and have recently proposes unstructure P2P networks that organize participating peers by exploiting their similarites. The resultant networks may not perform to searches efficiently because existing overlay topology construction algorithms often creates unstructure P2P networks without performing guarantees. We are proposing a novel overlay formation algorithm for unstructure P2P networks. Based on the file sharing pattern exhibiting the power law property our proposal is unique in that it poses rigorous performance guarante. Theoretical performance results concludes that in a constant probability 1) searching an object in our proposes network efficiently takes  hops and 2) the search progressively and effectively exploits the similarity of peers. In addition to the success ratio of discovering an object approximates 100 percent.
      PubDate: 2014-01-11
      Issue No: Vol. 3 (2014)
       
  • Slicing :A Proficient Scheme For Sustain And Publicize
    • Authors: D. Narayana, S Amar Nath Babu
      Abstract: The Privacy Preserving on a microdata publishing different anonymization techniques nameing as generalization and bucketization have been proposes. In generalization amount of information loses on high dimensional data. Bucketization does not prevent membership disclosure and does not provide a clear separation between quasi identifying attributes and sensitive attributes. In this Paper we presents a new technique called slicing. Slicing preserves better data utility than generalization and can be used for membership disclosure protection. Another important advantage of slicing is that it can handle high dimensional data. Slicing can be use for attribute disclosure protection and develop an efficient algorithm for computing the sliced data.
      PubDate: 2014-01-11
      Issue No: Vol. 3 (2014)
       
  • Reduction of the frequency offset influence in OFDM using an optimal PRS
           coding and MLSD
    • Authors: Ilia Georgiev Iliev, Stanio Kolev, Stoicho Manev
      Abstract: In this work a methodology for the synthesis of optimal correlative codes to reduce inter-carrier interference (ICI) in OFDM systems and maintain good BER performance at large frequency offsets is studied. For the synthesis of codes a goal function is used, that combines two criteria - the first minimizes ICI by frequency offset and the second minimizes the BER for Maximum Likelihood Sequence Detection (MLSD). BER and PAPR performances, obtained by means of methodology for synthesis of optimal PRS coefficients in BPSK and QPSK OFDM systems, have been shown. The new simulation studies are made with the proposed polynomials for frequency offset ε = 0, 0.1 and 0.2. Improvement in BER and PAPR performance has been detected.
      PubDate: 2014-01-11
      Issue No: Vol. 3 (2014)
       
  • Remaining article will come soon.................
    • Authors: Chief Editor
      Abstract: Articles are under Editorial process, soon after confirmation it will appear in the website. Readers are requested to keep track of the website regularly......... ...........................................................................

      PubDate: 2014-01-11
      Issue No: Vol. 3 (2014)
       
 
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
Fax: +00 44 (0)131 4513327
 
About JournalTOCs
API
Help
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-2014