for Journals by Title or ISSN
for Articles by Keywords
Followed Journals
Journal you Follow: 0
Sign Up to follow journals, search in your chosen journals and, optionally, receive Email Alerts when new issues of your Followed Journals are published.
Already have an account? Sign In to see the journals you follow.
Journal Cover International Journal of Research in Computer and Communication Technology
  [4 followers]  Follow
  This is an Open Access Journal Open Access journal
   ISSN (Print) 2320-5156 - ISSN (Online) 2278-5841
   Published by Suryansh Publications Homepage  [2 journals]
  • Cross Domain Recommender Systems: A Review

    • Authors: Sharu Vinayak, Richa Sharm, Rahul Singh
      Abstract: In the last few years recommender systems has grown vigorously as an interesting and new research field. Many research articles have been published in context to the areas like User Modelling, Information Retrieval and Knowledge Management etc. that are related to recommender systems. Most of the research studies in this field deal with recommending items related to a single domain (like books, movies etc.). With every new research there comes a few issues too. This paper discusses one such issue related to the field of recommender systems i.e. cross domain recommendations (basics, tasks, goals etc.)  
      PubDate: 2016-07-06
      Issue No: Vol. 5 (2016)
  • Bit Flipping Algorithm On Dual Ram Based LDPC Decoding

    • Authors: Pothumarthi Nagaiah, M. Gopalakrishna
      Abstract: A generic RAM based mostly FPGA design for cryptography LDPC codes. RAM based mostly cryptography permits America to scale back permutation networks into easy address controllers. Moreover, utilizing Block RAMs with numerous facet ratios in AN FPGA provides flexibility starting from space driven compact styles to totally parallelized high output styles. Utilizing the read-first property of the RAMs, the projected style expeditiously exploits the twin port Block RAM resources by accessing all the four ports at identical time.
      PubDate: 2016-07-06
      Issue No: Vol. 5 (2016)
  • Processor Organization For Parallel Processing

    • Authors: Arshad Khan, Aslam Zeb, Junaid Ahmad, Nazeer Khan, Shahab Ullah
      Abstract: In this Paper we have studied the coverage of parallel processing in processor organization. Nowadays parallel processing organization is a challenging issue and it has gained very much popularity. In this paper we have compared, single instruction single data, single instruction multiple data, multiple instructions single data and multiple instructions multiple data.
      PubDate: 2016-07-02
      Issue No: Vol. 5 (2016)
  • Int 21h And Its Variants- A Survey Of Current Trends

    • Abstract: The aim of this paper is to present an intuitive study of the software interrupts used in Assembly language. In this paper we have mainly discussedinterrupt 21h and its variants (or sub functions). These interrupts are highlysuitableto work with IBM PC Intel 8086 and all generations of x86, and AMD compatible microprocessors,(however Windows XP may overwrite some of the interrupts). In this paper we have explained how to program interrupt 21hon computers based on the x86 family of microprocessors running the DOS operating system. 80x86 family is consist of 8086, 8088, 80286, 80386, and80486 microprocessors that are used in PC/XT/AT, EISA, and IBM PS/2 computers. This paper describes interrupts, explains how interrupts work, interrupts in assembly language and how they are implemented on 80x86 family. Finally, this paper contains example programming code to demonstrate how to program interrupt 21h for a DOS-based application
      PubDate: 2016-07-02
      Issue No: Vol. 5 (2016)
  • Comparative Study of Various Micro-computer Architectures

    • Abstract: In this paper we have discuss comparison between five most widely-used Reduced Instruction Set Architecture (RISC) processors- MIPS, ARM, SPARC, ALPHA, PA-RISC. In order for the reader to acknowledge the differences between those five architectures and fully understand the significance of each one, a comparison between the three architectures is very important MIPS, ARM, SPARC, ALPHA, PA-RISC are used in many different applications, this paper provides a comparison to be able to cover as many software and hardware applications used by these three architectures as possible. After reading this paper, the reader would have had enough information on the three RISC processors, the differences between them, and where they are most effectively used. This in turn will help in determining which ISA of the selected five is most suitable for the reader’s required application. Keywords- MIPS, ARM, SPARC, ALPHA, PA-RISC Registers.
      PubDate: 2016-07-02
      Issue No: Vol. 5 (2016)
  • Network Layer Attacks Mechanisms in MANETS-A Survey

    • Authors: Inam Ullah Khan, Muhammad AbulHassan
      Abstract: The security issue in versatile adhoc networks is to shield the network layer from noxious assaults, subsequently recognizing and avoiding malevolent hubs. A brought together security is in particularly requirement for such networks to ensure both course and information sending operations in the network layer. The noxious hubs in the network can promptly act to work as switches. This will exclusively aggravate the network operation from right conveying of the bundles, similar to the vindictive hubs can give stale directing upgrades or drop every one of the parcels going through them. This paper also focuses on different security aspects of network layer and discusses the effects of the attacks in detail through a survey approaches used for security purposes.
      PubDate: 2016-07-02
      Issue No: Vol. 5 (2016)
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Tel: +00 44 (0)131 4513762
Fax: +00 44 (0)131 4513327
Home (Search)
Subjects A-Z
Publishers A-Z
Your IP address:
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-2016