for Journals by Title or ISSN
for Articles by Keywords
help
Followed Journals
Journal you Follow: 0
 
Sign Up to follow journals, search in your chosen journals and, optionally, receive Email Alerts when new issues of your Followed Jurnals are published.
Already have an account? Sign In to see the journals you follow.
International Journal of Research in Computer and Communication Technology
   [4 followers]  Follow    
  This is an Open Access Journal Open Access journal
     ISSN (Print) 2320-5156
     Published by Suryansh Publications Homepage  [2 journals]
  • Performance Analysis of Two Methods for Dimension Reduction in Face
           Recognition

    • Authors: Rash Bihari Dubey, Anika Gugnani
      Abstract: Face recognition has been a fast growing, challenging and interesting area in real time applications. This work aims to compare the two renowned techniques of feature dimension reduction on the basis of the classification results of three classifiers used to fulfill the task of face recognition. With the fast increasing quantity and complexity of data in an information-rich age, it becomes difficult, challenging or even impossible for engineers or analysts to deal with raw data directly. Dimensionality reduction provides an efficient way for data abstraction and representation as well as feature extraction. It aims to detect intrinsic structures of data and to extract a reduced number of variables that capture and retain the main features of the high-dimensional data. Principal component analysis (PCA) has long been a simple, efficient technique for dimensionality reduction. A newer nonlinear method local linear embedding (LLE) has been proposed for increasingly complex nonlinear data. In this research work, we investigate and compare linear PCA and nonlinear LLE for face recognition. Experimental results on real-world face database show that these linear and nonlinear methods when compared over performance, the non linear method LLE yield better performance. The classification is carried out using k-nearest neighbor, probabilistic neural network and support vector machine to identify the face.
      PubDate: 2014-07-04
      Issue No: Vol. 3 (2014)
       
  • Study of Median Filter in Different Noise Density Environments in Binary
           Images

    • Authors: Madduri Vasundara, G. Sravanthi
      Abstract: Image processing is one of the most dominating and it is very important processing in communication environment. Efficient processing methods and filters are needed for efficient communication. In this paper I am going to discuss about the median filter which is used for remove of salt and pepper noise in binary image. In this paper I have taken different Noise Density conditions. At each and every Noise Density Value I have added salt and pepper noise and then I have done de-noising to that noise using median filter and also at each and every Noise Density value I have also calculated the Mean Square Error (MSE) and Peak Signal to Noise Ratio (PSNR) and then I have plotted all those values on semi log graph.
      PubDate: 2014-07-02
      Issue No: Vol. 3 (2014)
       
  • Information Retrieval For Image Mining

    • Authors: ShashiRekha .B, K.V.N. Sunitha
      Abstract: Many areas of commerce, government, academia, and hospitals create large collections of digital images. Through digitization of data and developments in technology it is very easy to acquire and store large quantities of data, mainly multimedia data. This data will be suitable to analyse in an efficient and fast manner by the different kinds of agencies of commercial to Military. Currently, tools for mining images are insufficient and require human involvement. Feature selection and extraction is the pre-processing step of Image Mining. Obviously this is a serious step in the whole scenario of Image Mining. Our method to mine from Images – to extract patterns and derive knowledge from large collections of images, deals chiefly with identification and extraction of unique features for a specific domain. Experimental results display that the features used are sufficient to identify the patterns from the Images. An interactive system was established which allows the user to define new features and to resolve unclear regions. This paper presented a new method for image retrieval using high level semantic features.  It is based on extraction of low level colour, shape and texture features and their conversion into high level semantic features using fuzzy production rules, derived with the help of an image mining technique. Dempster-Shafer theory of evidence is applied to obtain a list of structures covering information for the image high level semantic features. Johannes Itten theory is helpful for obtaining high level colour features.
      PubDate: 2014-07-02
      Issue No: Vol. 3 (2014)
       
  • Investigation on Effect of Height over an Antenna Performance

    • Authors: Jammalamadugu Ravindra Nadh, G. Mahesh
      Abstract: The antenna is the most essential element in every communication system. Radiation pattern is the most important specification to be considered while designing an antenna. It is evident that the shape of the radiation pattern depends on spacing between the elements, types of the elements, number of element in any array, current distribution and phase distribution. Along with the above factors the radiation pattern also depends on the height of an antenna from the real ground. Due to this fact in the present work, some investigations are made on the influences of the real ground on the current distribution given to an antenna. Results are taken at the height h=1.5m above the real ground plane. Sommerfeld method is used for the evaluation of modified current distribution. The results are presented for influence of the real ground on the radiation pattern in both perfect electric conductor (PEC) and perfect magnetic field conductor (PMC). The results are obtained using WIPL-D program.
      PubDate: 2014-07-02
      Issue No: Vol. 3 (2014)
       
  • A Regression Model for The Grades of Students of Database for Prediction

    • Authors: Radhika Kammili, Ch.Venkateswara Rao, V.Kamakshi Prasad, S.V. Subramanyam
      Abstract: Abstract- In this paper a suitable regression curve is investigated for the grades of the student’s database course and it is found that Y = 32.0+0.5816 xwhere x could be the midterm exam grade and  the final exam grades can be obtained through the proposed model. It is tested for goodness of fit, closeness of fit and reliability by c2 – test, t-test, z-test and the measurement of correlation coefficient. It is finally observed that the above linear regression model is a good mechanism for predicting the grades of the students course.
      PubDate: 2014-07-02
      Issue No: Vol. 3 (2014)
       
  • Joint Estimation of CFO and Channel Estimation for Rayleigh Fading Channel
           with Kalman Filter for OFDM System

    • Authors: M. Harikrishna Reddy, K.Rajendra Prasad
      Abstract: Due to its high data rate transmission capability with high bandwidth efficiency and its robustness to multipath delay, the Orthogonal Frequency Division Multiplexing (OFDM) has recently been applied widely in wireless communication systems. In mobile radio applications, the relative motion between the receiver and the transmitter gives rise to a time varying channel and as a result, channel estimation is essential to acquire the channel so as to coherently decode the received signals. Also, the main problem with carrier frequency offset (CFO) is, it introduces ICI (Inter Carrier Interference) among the sub carriers in OFDM signal. This paper discusses the joint channel estimation in OFDM system using LS, MMSE and using Kalman filter and also discusses the CFO (Carrier Frequency Offset) estimation in OFDM system using Pilot symbols. The performances of all schemes are compared by finding the MSE and BER at different SNR values and at different CFO values at pilot locations, where QAM modulation scheme was used.
      PubDate: 2014-07-02
      Issue No: Vol. 3 (2014)
       
  • A Review of Various Techniques of Web Content Mining For HTML and XML
           Contents

    • Authors: Rupinder Kaur, Kamaljit Kaur
      Abstract: World Wide Web is the largest source of information. Most of the data on the web is dynamic and is in unstructured form. It is becoming difficult to get the relevant data from the web. Data Mining is the field of computer science which is used to extract knowledge from very large amount of data. Web mining is the application of data mining, which implements various techniques of data mining to get the efficient knowledge from the web data. This paper presents an overview of various techniques that has been used for web content mining including images, audio, video and semi-structured contents like HTML and XML. Since HTML has many limitations like limited tags, not case sensitive and designed to display data only, Web developers has started to develop Web pages on emerging Web Technologies like XML, Flash etc. XML was designed to describe data and to focus on what the data is. XML also plays the role of a meta- language and allows document authors to create customized markup language for limitless different types of documents, making it a standard data format for online data exchange.
      PubDate: 2014-07-01
      Issue No: Vol. 3 (2014)
       
  • Review of Web Structure Mining Techniques using Clustering and Ranking
           Algorithms

    • Authors: Rashmi Sharma, Kamaljit Kaur
      Abstract: Web mining is used to categorize users and pages by analyzing the users’ behavior, the content of the pages, and the order of the URLs that tend to be accessed in order. Web structure mining plays very important role in this approach. It’s defined as the process of analyzing the structure of hyperlink using graph theory.  This paper described web structure mining algorithms which are categorized as Link Analysis algorithms and Link-Analysis clustering algorithms. There are several link analysis algorithms are illustrated like PageRank algorithm, weighted PageRank algorithm, Hyperlink-Induced Topic Search and Weighted PageRank based Visit of Links with their pros and cons and comparison among them and clustering algorithms such as K-Means, Rough K-Means and Fuzzy Soft K-Means algorithms with their strengths and limitations. Furthermore, in this paper we survey the existing work of various authors in the area of Web mining, focusing on the category of Web structure mining and its link mining.
      PubDate: 2014-07-01
      Issue No: Vol. 3 (2014)
       
  • A Novel Survey on SLA based Load leveling in Cloud Computing.

    • Authors: Aruna Loganathan, M. Aramudhan
      Abstract: Abstract : The provision of Virtual Machines (VMs) in cloud is one major concern of cloud computing. Cloud Computing is nothing however a group of computing resources and services pooled along and is provided to the users on pay-as-needed basis. Sharing of the cluster of resources could initiate a tangle of convenience of those resources  inflicting a scenario of stalemate. A way to avoid deadlocks is to distribute the work of all the VMs among themselves. this is often known as load leveling. The goal of leveling the load of virtual machines is to cut back energy consumption and supply most resource utilization thereby reducing the quantity of job rejections. The aim of this paper is to debate the construct of load leveling in cloud computing and the way it improves and maintain the performance of the cloud systems.
      PubDate: 2014-07-01
      Issue No: Vol. 3 (2014)
       
  • A Critical Study on Semantic Web Systems and Semantic Web Services

    • Authors: Hemanth Kumar Budithi, M. Surendra Prasad Babu
      Abstract: The World Wide Web is the greatest repository of information having a decentralized design in which web pages are hosted by numerous computers, where each document can point to other documents, either on the same or different computers. As a result, individuals all over the world are able to provide content on the Web, allowing the growth exponentially as more and more people learn how to use it. However, it is difficult for machines to process and integrate this information meaningfully, so to process a web page intelligently, a computer must understand the data, and it is possible in Semantic Web. Relational database (RDB) is normally used for traditional data processing, where as Extensible Markup Language documents (XML Documents) are widely useful for performing online conversation in B2B applications. In fact XML data formats may be treated as de facto standard of data representation and exchange format for massive amount of enterprise information over the web.  Performance of the application depends on both type of the data structures used and the type of the information maintained in the structures. In this paper some semantic web concepts, different layers of Semantic web architecture, Web services and Semantic web services are presented.
      PubDate: 2014-07-01
      Issue No: Vol. 3 (2014)
       
  • The Goals of E- Learning and Distance Learning Towards The Educational
           Development Of Nigerian Public Service

    • Authors: Allison Chukwuma Romanus, Allison Clementina Nineka
      Abstract: learning  and distance learning  towards the educational development of Nigerian Public Service  cannot be overemphasized, hence the need to create more awareness on how to  acquire higher academic knowledge on the work using  e – learning and distance learning technologies. This paper therefore, examines the level of ICT and e – learning literate, assesses the level of e- learning utilization by the Nigerian  public  servants as well as to ascertain the percentage of public servants that has got their highest educational qualifications  using one form of e – learning or the other  between  2010 to 2013. The survey was done using random sampling of 10 different federal government agencies and  5 public  secondary schools in Abuja Municipal and Kuje Area Councils all located in FCT Abuja. 200 questionnaires were administered randomly to the staff of these agencies. The responses were collated and analyzed using two computer packages and inferential statistics. The study reveals that many public servants are becoming aware of e- learning and distance learning owing to the fact that different  types of phones are now in Nigerian market. The  study further shows that many public servants are now taking advantage of the e – learning and distance learning programme to upgrade their academic status without necessarily leaving their duty post. It is strongly recommended that government agencies should advise their staff to always take advantage of e – learning and distance learning programme whenever they want to proceed on further studies instead of leaving their  duty post for full-time studies.
      PubDate: 2014-06-30
      Issue No: Vol. 3 (2014)
       
  • Intelligent Encoding with added puzzle & TESLA security of packets
           Against Jamming Attacks in Wireless Network

    • Authors: pradip ravaji ugale, Ms.Hemlata Sunhare, Mr.Sachin Patel
      Abstract: Wireless network never has certain defined boundaries that can’t be extended due to this nature security flaws may get developed. Broadcast nature of wireless network makes it easy for intentional attacks to disturb the  network management Due to these attacks wireless networks integrity performance effectiveness gets affected Wireless networks mainly based on sharing this makes jammer to implement specific jamming attacks So because of this jamming attacks intended functions of network resources gets disturbed  to neutralize effects of attacks we implemented puzzle security with added TESLA properties so that double coverage will be given to security
      PubDate: 2014-06-30
      Issue No: Vol. 3 (2014)
       
  • Implementation of Dejong Function By Various Selection Method And Analyze
           Their Performance

    • Authors: Shiafali Aggarwal, Puneet Goswami
      Abstract: Genetic algorithm is the search and optimization technique. Genetic algorithm solves highly mathematical and simulation problems. In this paper researcher implements the dejong function1(sphere model) with the help of matlab code. Results are described by the formulation of graphs. In this paper researcher proposes two selection strategies as roulette wheel selection and elitism selection. With these selection schemes results of the dejong function1 is calculated and compared. In this paper basically results of the roulette wheel selection and the elitism selection are compared
      PubDate: 2014-06-30
      Issue No: Vol. 3 (2014)
       
  • An Efficient Hindi Language Interface using Relational Databases

    • Authors: Priyanka Arora, Puneet Goswami
      Abstract: Database Management Systems have been used extensively for accessing, storing and retrieving data. However, database systems are not understandable to every user because they are hard to use. A plethora of e-governance applications railways, billings, agriculture, banks etc. use databases. Some users face difficulty in using these database systems because they do not have knowledge of the languages used in this system. So, they want a system that accepts a Hindi sentence as s query and after processing it, execute it and provides the output in the same language. Then the users have no need to learn any low-level languages those are hard to learn, use in databases such as SQL.
      PubDate: 2014-06-30
      Issue No: Vol. 3 (2014)
       
  • An Improved Performance of MANET using AODV Protocol for Black Hole
           Detection

    • Authors: Komal Bhatti, Sonam Dhawan
      Abstract: Routing attacks have been identified for single path routing in wireless ad hoc networks. The effects of routing attacks on multipath routing have not been addressed so far. In this paper, an approach have been proposed to mitigate the black hole attack using AOMDV (Ad hoc on Demand Multipath Distance Vector) routing protocol. Some improvements have been made in AOMDV protocol. These improvements make the protocol robust against black hole attack along multipath route discovery process. The performance of proposed approach has been investigated to further reduce the overhead as described in this paper.
      PubDate: 2014-06-30
      Issue No: Vol. 3 (2014)
       
 
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
Fax: +00 44 (0)131 4513327
 
About JournalTOCs
API
Help
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-2014