for Journals by Title or ISSN
for Articles by Keywords
help
Followed Journals
Journal you Follow: 0
 
Sign Up to follow journals, search in your chosen journals and, optionally, receive Email Alerts when new issues of your Followed Journals are published.
Already have an account? Sign In to see the journals you follow.
Journal Cover International Journal of Research in Computer and Communication Technology
  [5 followers]  Follow
    
  This is an Open Access Journal Open Access journal
   ISSN (Print) 2320-5156 - ISSN (Online) 2278-5841
   Published by Suryansh Publications Homepage  [2 journals]
  • Efficient data structure method for spatial objects retrival Using string

    • Authors: M Satyanarayana, B.S.N.V Ramana murthy
      Abstract: This work deals with the surmised string look for in considerable spatial databases. Specifically, we look at reach inquiries expanded with a string similarity look for predicate in both Euclidean space and street frameworks. We name this question the spatial derived string (SAS) inquiry. In Euclidean space, we propose an estimated course of action, the MHR-tree, which embeds min-wise imprints into an R-tree.
      PubDate: 2016-01-13
      Issue No: Vol. 4 (2016)
       
  • A Systematic Approach For Testing And Debugging Networks Called Atpg

    • Authors: M.S.Ch.A Kumar, K Aruna bhaskar
      Abstract: ATPG recognize router configurations and produces a device-independent model. The imitation is used to make a minimum set of test packets to simply put into effect every link in the network or maximally exercise every rule in the network. Networks are triumph well-built and additional compound, yet administrators rely on basic tools such as ping and trace out to obvious up problems. We propose an automated and systematic approach for testing and debugging networks called “Automatic Test Packet Generation” (ATPG).
      PubDate: 2016-01-12
      Issue No: Vol. 4 (2016)
       
  • EVS: A Cloud Services Information Security and Privacy Eligibility and
           Verification System

    • Authors: Fahad F Alruwaili, T.Aaron Gulliver
      Abstract: In recent years, cloud computing services have evolved as a new paradigm for delivering computing resources that are dynamic and customizable, and provide high performance. Many organizations are migrating their information technology (IT) systems to the cloud due to the technological and economic opportunities it provides. However, security and compliance concerns exist that can undermine confidence and trust in cloud service providers. To address these concerns, an eligibility and verification system (EVS) is proposed to improve confidence and trust in cloud service providers, and the cloud community as a whole. The EVS architecture is designed to verify the existence of information security, privacy, and compliance (ISPC) controls in cloud services.  This is achieved via several measures, i.e. real-time monitoring, physical verification, and an in-depth five domain ISPC control matrix. This system establishes a foundation for promoting transparent, trusted, and compliant cloud services.
      PubDate: 2016-01-10
      Issue No: Vol. 4 (2016)
       
  • Performance Analysis of RTOS with GPOS for Heart Rate and Temperature
           Measurement Wireless System Using Raspberry Pi

    • Authors: N P Raju Mandapaka, V V Subhash
      Abstract: The objective of the project is to analyze the General Purpose Operation System (GPOS) performance with Real Time Operating System (RTOS) using a Heartbeat sensor and temperature sensor as a real time application. Methods-Statistical Analysis: The method used to calculate response is real feel technique which uses dedicated timer and interrupt to calculate the response. Findings: The responses of sensing the temperature, heartbeat are continuously sensing and after its values are sending through bluetooth is calculated RTOS having an average of 22ms where as GPOS has an average of 450ms of response time in real time environment. Conclusion: The results show that RTOS has better response time than GPOS. In any real time applications RTOS was mostly preferable to accurate response.
      PubDate: 2016-01-10
      Issue No: Vol. 4 (2016)
       
  • A Reliable Image Steganography with Image Clustering and Robust
           Steganography using IWT

    • Authors: K Sirisha, B.V. Ramana
      Abstract: Steganography is the science that includes imparting mystery information in a suitable sight and multimedia bearer, e.g., picture, sound, and video records. In this paper, we propose a changed secure steganography plan concealing a largesize dim picture into a little size dark picture. Preprocessing is initially performed both on spread and mystery pictures. Arnold change is performed on the mystery picture and the high security and vigor accomplished by utilizing this change. Integer Wavelet Transform (IWT) is performed in spread picture. The spread picture Coefficients of the wavelets are adjusted with the commotion inside average level. Apply Integer wavelet change (IWT) to get the Stego-picture. The limit of the proposed calculation is expanded as the main estimation band of mystery picture is considered. The extraction model is really the opposite procedure of the inserting model. Exploratory results demonstrate that our strategy gets stego-picture with perceptual intangibility, high security and certain power. Ideal Pixel Adjustment procedure is likewise received to minimize the distinction mistake between the data spread picture and the inserted picture and to expand the concealing limit with low twists individually.
      PubDate: 2016-01-05
      Issue No: Vol. 4 (2016)
       
  • Expressive Cryptosystem for Accessible Data Sharing in Cloud Storage

    • Authors: Devarapalli Aquila Soundarya, Mrs. Ch T G Ramya
      Abstract: Cloud storage is getting especially acclaimed these days. The two huge workplaces that cloud give are data stockpiling and data sharing. An ensured data sharing in cloud is a basic issue. This paper goes with a considered making the data sharing secure and discharge adaptable. Data is moved on cloud in encoded structure. Encryption of data is done using various encryption keys, however there is emerge unscrambling key which is securely assigned by data proprietor to have in correspondence. This translating key is aggregate of all the secret keys yet it is minimized as a lone key, which can unscramble various figure content. Before sharing the aggregate key, each host in the correspondence will screen the suspicious activities in their sub-framework. Suspicious IP areas are boycotted and data giving to boycotted hosts are rejected. Each host in correspondence will work as a self-governing interference distinguishing proof structure thusly vanquishing the troubles while data sharing. Cloud storage should have the ability to store and offer data securely, successfully, and versatile with others in Cloud stockpiling. The costs and complexities included generally increase with the unscrambling amount keys to be shared.
      PubDate: 2016-01-02
      Issue No: Vol. 4 (2016)
       
  • Security Approach Induction of Client Transferred Pictures on Content
           Sharing Website

    • Authors: Tumpilli Butchinaidu, Ch K Rupesh Kumar
      Abstract: Online Social networking’s gotten to be a standout amongst the most critical piece of our daily life as it empowers us to correspond with many people. Production of interpersonal interaction locales, for example, Myspace, LinkedIn, and Facebook, people are offered chances to meet new individuals and companions in their own particular furthermore in the other differing groups over the world. Clients of interpersonal interaction administrations impart a wealth of individual data to a substantial number of "companions." This enhanced innovation prompts protection infringement where the clients are sharing the extensive volumes of images crosswise over more number of people groups. This security should be taken consideration to enhance the client fulfillment level. The objective of this overview is to give a complete survey of different protection strategy ways to deal with enhance the security of data partook in the online networking destinations. Long range informal communication clients unwittingly uncover certain sorts of individual data that noxious aggressors could benefit from to execute noteworthy security breaks. This paper quantitatively exhibits how the straightforward demonstration of labeling images on the interpersonal interaction site of Facebook could uncover private client properties that are to a great degree delicate. Our outcomes recommend that photograph labels can be utilized to help foreseeing some, yet not all, of the examined traits. We trust our examination make clients mindful of huge breaks of their security and could advise the outline of new protection saving methods for labeling images on long range informal communication destinations.
      PubDate: 2015-12-30
      Issue No: Vol. 4 (2015)
       
  • Infrequent Defense System for mobile networks through Miscellaneous
           Contraption

    • Authors: Peddini Sudheer Kumar, Sahu Smita Rani
      Abstract: Malware is malevolent programming which irritates the system PC operation, hacking the touchy data and gets to the private frameworks. It is only a project which is particularly intended to harm the PC it might be an infection or worm. Along these lines, keeping in mind the end goal to defeat this issue a two-layer system model is exhibited for reenacting infection spread through both Bluetooth and SMS. The two strategies are examined for controlling the versatile infection engendering. i.e., preimmunization and versatile appropriation strategies drawing on the philosophy of self-sufficiency situated processing (AOC). Yet, this strategy does not consider the mixture infections that disperse by means of both BT and SMS channels. In this way, to expand the productivity of controlling the engendering of cell telephone infections, we present a creative methodology called a Hybrid infection identification model. The cross breed malware can be disseminated by both endto-end informing administrations through individual social correspondences and short-extend remote correspondence administrations. In this system, another differential comparison based technique is proposed to analyze the blended practices of Delocalized virus and swell based spread for the cross breed malware in summed up informal communities including of individual and spatial social relations. A test result demonstrates that the proposed framework is computationally viable to recognize the crossover malware. Studies on the engendering of malware in versatile systems have uncovered that the spread of malware can be very inhomogeneous.
      PubDate: 2015-12-29
      Issue No: Vol. 4 (2015)
       
  • Secure Group Communication by Establishing a Novel Trust Relationship
           Model and Detecting Malicious nodes in Peer to Peer Systems

    • Authors: M Ruby, K Venkatarao
      Abstract: Trust administration in P2P framework is utilized to distinguish vindictive practices and to advance legitimate and agreeable communications. The fundamental objective of the prior P2P frameworks is the capacity of conglomerating assets, which expect certain trustworthiness level of companions. In any case, as P2P frameworks become immensely in size, there will be an impressive number of vindictive companions who convey security assaults and dangers to the entire system. In a disseminated foundation without concentrated server for power, giving security instrument is more confused than in server-driven arrangements, as the presence of different locales builds the defenselessness and security endeavors must be reproduced at various destinations. In this way security issues are one of the significant difficulties that should be deliberately dissected and tended to, particularly for completely decentralized unstructured P2P frameworks. A ton of examines are being directed to enhance the trust administration in shared framework. A few notoriety based trust administration frameworks are investigated here. In this paper, we present building trust connections among associates can alleviate assaults of malevolent companions. This paper presents dispersed calculations that empower a companion to reason about reliability of different associates in view of past cooperation’s and suggestions. Companions make their own particular trust system in their nearness by utilizing nearby data accessible and don't attempt to learn worldwide trust data.
      PubDate: 2015-12-29
      Issue No: Vol. 4 (2015)
       
  • Empowering the Privacy in Online Social Networks

    • Authors: G Ravi Kiran, B Dinesh Reddy
      Abstract: Security is one of the converges that develops when correspondence get interceded in Online Social Networks (OSN) distinctive protection issues have been risen in the online interpersonal organization ,this paper clarifies about the protection in online interpersonal organization about how to ensure the individual data ,touchy information , photographs and so on .from the programmers or the obscure individual, three methodologies are utilized for security they are interpersonal organization, observation and protection. We then compare the contrasts between these two methodologies keeping in mind the end goal to comprehend their complementarity and to recognize potential coordination challenges and also research addresses that so far have been left unanswered. Protection is one of the contact focuses that rise when interchanges get interceded in Online Social Networks (OSNs). Diverse groups of software engineering specialists have confined the 'OSN security issue' as one of reconnaissance, institutional or social protection. In handling these issues they have likewise regarded them as though they were free. We contend that the distinctive protection issues are ensnared and that exploration on security in OSNs would profit by a more all-encompassing methodology. In this article, we first give a prologue to the reconnaissance and social protection points of view underscoring the accounts that illuminate them, and also their presumptions, objectives and routines. We then compare the contrasts between these two methodologies so as to comprehend their complementarity and to recognize potential joining difficulties and additionally research addresses that so far have been left unanswered.
      PubDate: 2015-12-29
      Issue No: Vol. 4 (2015)
       
  • Analysis and Applications of IOT using Raspberry Pi

    • Authors: S.Raja Gopal, B.Praveen Kumar, Venneti. Kiran
      Abstract: As the next frontier of the Internet, the IoT represents a persuasive opportunity across an astounding array of applications. When taken as a whole, the IoT can potentially transform nearly every aspect of how we live, work, and play, on local and global levels. Having a smart network, connected devices means we can assure constructing safer buildings, design more fuel-efficient cars, and lead secured and healthier lifestyles. Self-regulating systems, accessing Big Data, much more automated manufacturing, more intelligent supply chains, and maximum use of scarce  and meager resources. Onboard sensors are an essential part of the IoT, enabling the connected devices the ability to track/trace and respond to environmental conditions. Sensing requirements have changed from simple monitoring to simultaneous analysis and fusion of data from different sensors and sensor types. This includes accelerometers, gyroscopes and magnetometers, as well as environment sensors like light level, color, temperature, pressure, humidity, etc.  This article explores the use of Raspberry Pi to function as a server in which several laptops are connected to it to copy, store and delete the file over network. IT requires authentication for user login before granting access to the file to ensure data integrity and security. File server is widely used in many areas, for example in education for uploading study notes into the server and students can immediately download it into their laptops. Moreover this work also explores the use of Raspberry Pi B+ model and XBee (ZigBee module) to demonstrate wireless communication data transmission, proving the validity of usage as a mobile low-power wireless network communication. The main goal of the research is to explore the use of Raspberry Pi for client-server communication using various wireless communication scenarios such as Wi-Fi and ZigBee.
      PubDate: 2015-12-26
      Issue No: Vol. 4 (2015)
       
  • Enhanced Sparse Coding Technique For Top Image List

    • Authors: N. Santhosh Kumar, M.Uma Devi, K.Naga Bhargavi
      Abstract: Image reranking is successful for enhancing the execution of a content based picture seek. Be that as it may, existing reranking algorithms are constrained for two principle reasons: 1) the literary meta-information connected with pictures is frequently jumbled with their real visual substance and          2) the extricated visual components don't precisely depict the semantic similarities between images. As of late, client click data has been utilized as a part of picture reranking, in light of the fact that snaps have been appeared to all the more precisely portray the significance of recovered pictures to hunt inquiries. In any case, a basic issue for snap based strategies is the absence of snap information, since just a little number of web pictures have really been tapped on by clients. Consequently, we mean to take care of this issue by foreseeing picture clicks. We propose a multimodal hyper graph learning-based meager coding system for image click expectation, and apply the got click information to the reranking of images.
      PubDate: 2015-12-25
      Issue No: Vol. 4 (2015)
       
  • A Novel Model and Efficient Topic Extraction for Travel Package
           Recommendation

    • Authors: Villa Satya Dhanumjaya, Aruna Rekha Gollapalli
      Abstract: The new concept recommendation system is applying in many applications.in this project explore the online travel information of tourists to provide personalized travel package. But traditional recommendation system cant providing better travel package to tourists from various geo-graphic locations. Many technical challenges are available for designing and implementation of efficient travel package recommendation system. Proposing a new model named as tourist-area-season topic model along with Latent Dirichlet Allocation algorithm which extracts the features like locations, travel seasons of various landscapes. Introducing cocktail approach for better personalized travel package recommendation. Further Extending TAST model with the tourist-relation-area-season topic model includes relationship among the tourists.Eventually our proposed approach is efficient to give better package recommendation for tourists.
      PubDate: 2015-12-25
      Issue No: Vol. 4 (2015)
       
  • Self-Checking Carry-Select Adder Design Based on Two-Pair Two-Rail Checker

    • Authors: P.S.D. Lakshmi, K. Srinivas, R.Satish Kumar
      Abstract: In the  design of integrated circuits error checking            And area occupancy plays a vital role because of increasing the necessity of portable systems. InThis paper, the  self-checking carry-select adder (CSeA) design is proposed. The capability of  self checking can detect transient and all single stuck-at faults on-line in normal operation mode. The proposed CSeA has not  only having self-checking capability but also have reduced transistor count. The reduced ratio of transistor-count is proportional to the bit count of  self-checking CSeA to be designed. Our design has other advantages such as high extensibility, non-tree detector structure, and reasonable propagation delay time and can keeping well normal operation in the high-bit design.This paper focuses on  self-checking carry-select adder design based on two-pair two-rail checker(TTRC). The resulting carry-select adders have capability to detect errors on-line during the normal operation, with reduced silicon area  with lower power consumption.
      PubDate: 2015-12-25
      Issue No: Vol. 4 (2015)
       
  • Accurately Computing Aggregates Using Synopsis Diffusion Framework

    • Authors: V. Bala Tripura Sundari, G. Aruna Rekha
      Abstract:   The communication wounded resultant from node and transmission failures, which are frequent in WSNs, can unfavorably affect tree-based aggregation approaches. To address this dilemma, we can make use of multi-path routing practice for forwarding sub-aggregates. In-network data aggregation can trim down the amount of communication and consequently the energy consumed, above all in large WSNs. The main proposal is to mingle partial results at intermediate nodes during message routing. One approach is to put up a spanning tree rooted at the BS, and then do in-network aggregation along the tree.
      PubDate: 2015-12-25
      Issue No: Vol. 4 (2015)
       
  • Design of Efficient DSP operation using 16×16 R-MAC Unit

    • Authors: R.Santhi sri, O.Sudha Bharathi
      Abstract: As we already know that the multiplication and accumulation are the vital operations involved in DSP `applications. In DSP processor we need high speed performance for different applications. In order to increase this speed of operations implemented the 16x16 R-MAC (Reversible Multiply and Accumulate unit) design. Generally in normal MAC power consumption and heat is somewhat high. This can be reduced by proposed design and also chip life time increases. The normal MAC needs three fetch-decode-execute cycles to obtain the result. So the circuit has time delay and also high quantum cost. In Reversible-MAC unit need single fetch-decode-execute cycle to obtain the result hence there is no time delay and less quantum cost. The proposed DSP operation using 16x16 R-MAC performs reversible multiplication, addition, accumulation and shifting using peres gate, double peres and Fredkin gates.
      PubDate: 2015-12-25
      Issue No: Vol. 4 (2015)
       
  • A Novel Privacy-Preserving Mechanism That Supports Public Auditing On
           Shared Data Stored In The Cloud

    • Authors: Anushka K, T. Saidurga
      Abstract: Numerous use of cloud data e.g., data mining and machine learning do not unavoidablycall for users to download the entire cloud data to local devices. It is since cloud providers such as Amazon can proffer users calculation services in a straight line on large-scale data that previously existed in the cloud. In recent times many mechanisms have been planned to permit not only a data owner itself but also a public verifier to powerfullyexecute integrity checking without downloading the total data from the cloud which is referred to as public auditing. In these methods data is alienated into a lot of small blocks where each block is separatelysigned by the owner and aindiscriminate combination of all the blocks in its place of the whole data is retrieved during integrity checking. A public verifier could be a data user e.g., researcher who would like to make the most of the owner’s data via the cloud or a third-party auditor (TPA) who can make availablepractised integrity checking services.
      PubDate: 2015-12-25
      Issue No: Vol. 4 (2015)
       
  • A Novel Technique for Cost Reduction among Sender And Receiver In Cloud

    • Authors: P. Subrahmanyeswari, Beebi Sufia Sheik
      Abstract: We present PACK (Predictive ACKs), a novel end-to-end activity repetition disposal (TRE) framework, intended for cloud computing clients. Cloud-based TRE needs to apply a sensible utilization of cloud assets so that the transmission capacity cost decrease joined with the extra cost of TRE calculation and capacity would be enhanced. PACK's fundamental favorable position is its ability of offloading the cloud-server TRE push to end customers, in this way minimizing the preparing expenses affected by the TRE algorithm.
      PubDate: 2015-12-25
      Issue No: Vol. 4 (2015)
       
  • Data Access Scheme to Probabilistically Coordinate Multiple Caching Nodes

    • Authors: K.Chandra Rao, B. Srinivas
      Abstract: The propose of caching strategy in wireless ad hoc networks benefits from the supposition of existing end-to-end paths in the midst of mobile nodes, and the path from a supplicant to the data source remnants unchanged all through data access in most cases. Such supposition enables any in-between node on the path to cache the pass-by data. The success of such a secondary caching strategy is dangerously impaired in DTNs, which do not presuppose any persistent network connectivity. Given that data are forwarded via opportunistic contacts, the question and replied data may take different routes, and it is complicated for nodes to collect the information about query times gone by and make caching conclusion.
      PubDate: 2015-12-25
      Issue No: Vol. 4 (2015)
       
  • Fast Retrieval Of Unstructured Documents By Using Meta Data And
           Hierarchical Clustering

    • Authors: K.V.Rama Kumar, K. Eswar
      Abstract: Several annotation systems let only “un typed” keyword annotation. For illustration, a user may interpret a weather report using a tag. There are several application domains where users make and contribute to information, news blogs, scientific networks, social networking groups, or disaster management networks. Present information sharing tools ,like content management software e.g., Microsoft Share-Point, allow users to share documents and annotate (tag)them in an ad hoc way. Likewise, Google Base allows users to describe attributes for their objects or decide from pre defined templates. This annotation process can make easy following information discovery. In our situation the author produces a new document and uploads it to the ordnance. We put forward Collaborative Adaptive Data Sharing platform (CADS) which is an “annotate-as-you create” communications that construct simplefield data annotation.
      PubDate: 2015-12-25
      Issue No: Vol. 4 (2015)
       
 
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
Fax: +00 44 (0)131 4513327
 
About JournalTOCs
API
Help
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-2015