for Journals by Title or ISSN
for Articles by Keywords
Followed Journals
Journal you Follow: 0
Sign Up to follow journals, search in your chosen journals and, optionally, receive Email Alerts when new issues of your Followed Journals are published.
Already have an account? Sign In to see the journals you follow.
Journal Cover International Journal of Research in Computer and Communication Technology
  [6 followers]  Follow
  This is an Open Access Journal Open Access journal
   ISSN (Print) 2320-5156 - ISSN (Online) 2278-5841
   Published by Suryansh Publications Homepage  [2 journals]
  • Revocation Mechanisms For Conventional Public Key Settings

    • Authors: A. Anuradha, T.Udaya Lakshmi Aditya, T.Giri Ramu
      Abstract: We propose another revocable IBE plot with a cloud revocation authority (CRA) to unravel the two inadequacies, to be specific, the execution is essentially enhanced and the CRA holds just a framework mystery for every one of the clients. For security investigation, we show that the proposed plan is semantically secure under the decisional bilinear Diffie-Hellman (DBDH) suspicion. At long last, we develop the proposed revocable IBE plan to introduce a CRA-supported verification plot with period-restricted benefits for dealing with countless cloud administrations.
      PubDate: 2017-08-03
      Issue No: Vol. 6 (2017)
  • Simulation of Gabor Filter Algorithms For Fingerprint Recognition

    • Authors: Ch. Gangadhar, Habibulla Md., K. Venkatesh
      Abstract: Fingerprint Recognition is a widely used Biometric Identification mechanism. Up till now different techniques have been proposed for having satisfactory Fingerprint Identification. The widely used minutiae-based representation did not utilize a significant component of the rich discriminatory information available in the fingerprints. Local ridge structures could not be completely characterized by minutiae. The proposed filter-based algorithm uses a bank of Gabor filters to capture both local and global details in a fingerprint as a compact fixed length Finger Code. The Fingerprint Recognition is based on the Euclidean distance between the two corresponding Finger Codes . The proposed filter-based algorithm is more accurate than the minutiae based one.
      PubDate: 2017-08-03
      Issue No: Vol. 6 (2017)
  • Capacity-aware Control Topology in MANET

    • Authors: Madhusudan G, Kumar TNR
      Abstract: The wireless mobile adhoc networks are dynamically Varying, the network performance may change by different unknown parameters such as the total number of nodes in the network, the transmission power range of the network and area of deployment of the network. The main aim is to increase the efficiency of the system through dynamically changing the trasmission range on every node of the network. The contention index is the network performance factor is considered.  we presented a study of the effects of contention index on the network performance, considering capacity of the network and efficiency of the power. The result is that the capacity is a concave function of the contention index. if the contention index is large  the impact of node mobility is minimal on the network performance. we presented GridMobile, a distributed Network topology algorithm that attempts to shows the best possiblity, by maintaining optimal contention index by dynamically adjusting the transmission range on every nodes in the network.
      PubDate: 2017-08-03
      Issue No: Vol. 6 (2017)
  • To Characterize The Contents Of The Documents Through Pattern Discovery In
           Text Mining

    • Authors: G. Nagamallika, A. Anuradha, K. Sridevi
      Abstract: This depicts the utilization of content mining with a blend of strategies to naturally find mischance qualities that can advise a superior comprehension of the supporters of the mishaps. The review assesses the viability of content mining of mischance stories by surveying prescient execution for the expenses of outrageous mishaps. The outcomes demonstrate that prescient precision for mishap costs altogether enhances using highlights found by content mining and prescient exactness additionally enhances using present day outfit strategies. Essentially, this review likewise appears through case illustrations how the discoveries from content mining of the accounts can enhance comprehension of the supporters of rail mischances in ways impractical through just settled field investigation of the mishap reports.
      PubDate: 2017-08-03
      Issue No: Vol. 6 (2017)
  • To Authenticate A User Before Accesses To Secured Websites Using PWD Based

    • Authors: A. Anuradha, Ch. Balaveera, V. Sankaranandh
      Abstract: We analyzed the cutting edge Intra-Site Password Reuses (ISPR) and Cross-Site Password Reuses (CSPR) in view of the spilled passwords from the greatest Internet client gathering. With an accumulation of around 70 million certifiable web passwords crosswise over four extensive sites in China, we acquired around 4.6 million unmistakable clients who have numerous records on a similar webpage or crosswise over various destinations. We found that for the clients with different records in a solitary site reused their passwords and for the clients with numerous records on various sites reused their passwords crosswise over sites. For the clients that have various records yet unique passwords, the arrangement of passwords of a similar client displays designs that can help secret key speculating: a released feeble watchword uncovers fractional data of a solid one, which corrupts the quality of the solid one.
      PubDate: 2017-08-03
      Issue No: Vol. 6 (2017)
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Tel: +00 44 (0)131 4513762
Fax: +00 44 (0)131 4513327
Home (Search)
Subjects A-Z
Publishers A-Z
Your IP address:
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-2016