for Journals by Title or ISSN
for Articles by Keywords
Followed Journals
Journal you Follow: 0
Sign Up to follow journals, search in your chosen journals and, optionally, receive Email Alerts when new issues of your Followed Journals are published.
Already have an account? Sign In to see the journals you follow.
Journal Cover International Journal of Research in Computer and Communication Technology
  [5 followers]  Follow
  This is an Open Access Journal Open Access journal
   ISSN (Print) 2320-5156 - ISSN (Online) 2278-5841
   Published by Suryansh Publications Homepage  [2 journals]
  • Enhancing security in MANETs by hybrid approach using MD5 and ERSA

    • Authors: N. Neelima, M.Navya Sree
      Abstract: Wireless networks area unit largely most popular today, thanks to its quality and scalable  characteristics. Of all the offered wireless networks, Mobile Ad-hoc Networks (MANET) is that the most significant and typical application. painter has the ever-changing topology and it doesn't have the fastened network infrastructure. every node act each because the transmitter and receiver and node configuration is finished on its own. Nodes communicate among themselves either directly or with the assistance of neighbours. In a MANET, because of problems like node quality, restricted wireless medium, and frequent link failures, it's generally not possible to incorporate such a set centralized Certificate Authority (CA) within the network. numerous approaches are planned to tackle the distinctive challenge of adapting certificate-based strategies for distributed authentication in mobile impromptu networks. In this project a hybrid approach is chosen wherever the scope for higher sweetening of security is high. The hybrid approach involves combination of 2 algorithms, one for hashing and therefore the different for encoding and coding at each ends. during this project the hashing algorithmic program MD5 and traditional RSA area unit initial enforced. However, for sweetening of security RSA algorithmic program is changed and combined with MD5 and compared with the previous implementation.
      PubDate: 2016-10-05
      Issue No: Vol. 5 (2016)
  • Identification of Outer Membrane Proteins Utilizing K-Nearest Neighbor

    • Authors: Maqsood Hayat, Mohammad Sohail, Haroon Khan, Muhammad Noman Hayat
      Abstract: Outer Membrane Proteins (OMPs) assume essential part in cell science. The separation of OMPs from genomic groupings is a testing assignment because of short layer spreading over areas with high variety in properties. Subsequently, a mechanized and high throughput computational model for separation of OMPs from their essential groupings is required. In this paper, we have used K-closest Neighbor in mix with Amino corrosive piece. The execution of K-closest Neighbor s is assessed by two datasets utilizing 5-fold cross-approval. After the test, we have watched that K-closest Neighbor makes the most elevated progress rate of 96.0% exactness for segregating OMPs from non-OMPs and 96.3% and 96.5% correctnesses from α-helix film and Globular proteins, separately on dataset1. While on dataset2, K-closest Neighbor acquires 96.4% exactness for separating OMPs from non-OMPs.
      PubDate: 2016-10-02
      Issue No: Vol. 5 (2016)
  • Transport Layer Protocols And Services

    • Authors: InamUllah Khan, Muhammad Abul Hassan
      Abstract: This paper includes a brief survey on Transport Layer Protocols like User Datagram Protocol (UDP), Transmission ControlProtocol (TCP) and Stream Control Transmission Protocol (SCTP). It also includes Port Addressing. This paper lists out features and services, problems and comparison of these protocols.
      PubDate: 2016-10-02
      Issue No: Vol. 5 (2016)
  • Survey on Various Congestion Control and Detection Protocols in Wireless
           Sensor Networks

    • Authors: Abid ur Rahman, Muhammad Zeeshan
      Abstract: People wants high-speed communication for huge amount of data in wireless sensor networks therefore congestion control protocols plays an important role in this field. Generally in wireless sensor networks (WSNs), when all the nodes are obtusely apportioned then congestion take place and letter on a high rate of flow draw near the sink imputable to convergent nature of upstream traffic. Congestion is one of the most important problem in WSNs and due to congestion rates of packets loss is increased. Therefore more energy is required even to process a small amount of data so it may causes wastes of energy. The main causes of congestion includes packets delay time, increase in collision, decreases Network lifetime, efficiency of energy and minimization the overall quality of a channel. As a result we need to control Congestion in WSNs with respect to packets delay and packets loss along with throughput or link utilization to extend lifetime of a system and to improve the Quality of Service QoS, and Fairness. This paper generally represent different congestion control approaches and it also includes the contrast study related to the features and theme of congestion control protocol for wireless sensor network that are accessible in the field.
      PubDate: 2016-10-02
      Issue No: Vol. 5 (2016)
  • Gene Expression Profile classification and Meaningful Discovery using
           Non-Negative Matrix Factorization

    • Authors: Maqsood Hayat, Nadeem Iqbal, Mohammad Sohail, Muhammad Noman Hayat
      Abstract: Accurate Classification of cancer types or subtypes is a great importance for better treatment and prognosis. With advent of microarray technology, which can simultaneously monitor the expression of all genes in the genome, can be used to diagnosis and classify cancer types in a systematic and objective fashion.  In this paper we propose a model for classification of microarray data through Non-Negative Matrix Factorization (NMF).The NMF is explored as feature extraction and K- Nearest Neighbor (KNN) is utilized as classification algorithm to classify the cancer disease for microarray dataset. The NMF approach is based on decomposition by parts one of them is the ‘encoding matrix’ contains the sample information that helps to classify the samples according to the similar gene expression labels and other factor ‘basis matrix’ that contains the gene expression label that helps to reduced the dimension and discovery of meaningful genes for a certain disease. Two benchmark datasets, Leukemia and Colon datasets are used to evaluate the proposed model. The proposed model achieved quite promising accuracy 97% on Leukemia dataset and 91% on Colon dataset. In addition, NMF also used to exhibits the meaningful genes that useful for the classification of the cancer related microarray data.
      PubDate: 2016-10-02
      Issue No: Vol. 5 (2016)
  • Facial Detection Using Local Binary Pattern Based Histogram in Conjunction
           with Random Forest

    • Authors: Shahid Akbar, Maqsood Hayat, Mohammad Sohail, Haroon Khan
      Abstract: Face detection and recognition on the basis of local structure pattern has become an attention area of researchers from past few decades due to its persistent and reliable features. In this paper, we propose an intelligent and stable computational model for face detection. Local binary pattern (LBP) operator is used to collect local information from sub region of the face images. After that, histogram is applied to extract numerical descriptors from the collected sub regions. In order to select high discriminative descriptors and reduce feature space, Minimum redundancy maximum relevance (mRMR)is applied. Two different nature of classification algorithms Random forest and KNN are utilized. 5-folds cross validation test is used to evaluate the performance the proposed technique. After empirical investigation, it is observed that mRMR based dimensionality reduction scheme has considerably enhanced the success rates of the proposed model. Our proposed model might be useful and helpful in security related applications.
      PubDate: 2016-10-02
      Issue No: Vol. 5 (2016)
  • ASIC Implementation of DDR SDRAM Memory Controller

    • Authors: Pavan Suri Viswa, Ramya Krishna, Gagandeep Taddi
      Abstract: A Dedicated Memory Controller is of prime significance in applications that don't contain microchips (top of the line applications). The Memory Controller gives order signs to memory revive, read and compose operation and instatement of SDRAM. Our work will concentrate on ASIC Design strategy of Double Data Rate (DDR) SDRAM Controller that is situated between the DDR SDRAM and Bus Master. The Controller improves the SDRAM charge interface to standard framework read/compose interface furthermore advances the entrance time of read/compose cycle. Twofold Data Rate (DDR) SDRAM Controller is executed utilizing Cadence RTL Compiler. Memory gadgets are practically found in all frameworks and these days fast and elite recollections are in extraordinary interest. For better throughput and velocity, the controllers are to be composed with check recurrence in the scope of megahertz. As the clock velocity of the controller is expanding, the outline difficulties are likewise getting to be intricate. In this way the cutting edge memory gadgets require rapid controllers like twofold information rate and quad information rate memory controllers. In this paper, the twofold information rate SDRAM Controller is executed utilizing ASIC approach.
      PubDate: 2016-10-02
      Issue No: Vol. 5 (2016)
  • LUT-SR RNG For Bit By Bit Operations Using Pipelining Architecture

    • Authors: Kuma Satyanarayana, Gagandeep Taddi
      Abstract: Most of the RNG mathematicians analyse on the basis of software terms, which can be proved from their designed algorithms. They assume that the execution in the existing environment is word-based and sequential. FPGAs are based on bit-by-bit operations and are rigidly parallel. Therefore, mapping the algorithms from a software based environment to hardware based environment leads to inefficient conditions. The wastefulness may bring about a few issues including untrackable rate of the generator, lower clock rates, fractional use of assets, lesser utilization of RAMS, non-uniform word lengths.
      PubDate: 2016-10-02
      Issue No: Vol. 5 (2016)
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Tel: +00 44 (0)131 4513762
Fax: +00 44 (0)131 4513327
Home (Search)
Subjects A-Z
Publishers A-Z
Your IP address:
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-2016