for Journals by Title or ISSN
for Articles by Keywords
Journal Cover International Journal of Research in Computer and Communication Technology
  [6 followers]  Follow
  This is an Open Access Journal Open Access journal
   ISSN (Print) 2320-5156 - ISSN (Online) 2278-5841
   Published by Suryansh Publications Homepage  [2 journals]
  • Harmonics Filtering Capability of Doubly Fed Induction Generator for Wind
           Energy Conversion Systems

    • Authors: Pentam Lavanya, CH. V. Ganesh
      Abstract: This paper manages the operation of Doubly Fed Induction Generator (DFIG) with an incorporated dynamic channel capacities utilizing Grid Side Converter (GSC). The principle commitment of this work lies in the control of GSC for providing music notwithstanding its slip control exchange. The Rotor Side Converter (RSC) is utilized for accomplishing most extreme power extraction and to supply required responsive energy to DFIG. This Wind Energy Conversion System (WECS) functions as a Static Compensator (STATCOM) for providing music notwithstanding when the wind turbine is in closed down condition. Control calculations of both GSC and RSC are exhibited in detail. Proposed DFIG based WECS is recreated utilizing MATLAB/Simulink. A model of a proposed DFIG based WECS is created utilizing a DSP (Digital Signal Processor). Reenacted results are approved with test consequences of the created DFIG for various useful conditions, for example, factor wind speed and lopsided/single stage burdens.
      PubDate: 2017-02-20
      Issue No: Vol. 6 (2017)
  • Network Security Model for Cooperative Network importance and Future

    • Authors: Inam Ullah Khan, Muhammad Abul Hassan, Muhammad Hamza Akhlaq, Syed Bilal Hussain Shah, Ahsen Ilyas
      Abstract: Network security has become more important to personal computer users, organizations, and the military. With the appearance of the web, security turned into a noteworthy concern and the historical backdrop of security permits a superior comprehension of the development of security innovation. The web structure itself took into account numerous security dangers to happen. The design of the web, when altered can diminish the conceivable assaults that can be sent over the system. Knowing the assault strategies, takes into consideration the fitting security to develop. Numerous organizations secure themselves from the web by method for firewalls and encryption components. The organizations make an "intranet" to stay associated with the web however secured from conceivable dangers. The whole field of system security is limitless and in a developmental stage. The scope of study incorporates a short history going back to web's beginnings and the present improvement in system security. With a specific end goal to comprehend the exploration being performed today, foundation learning of the web, its vulnerabilities, assault techniques through the web, and security innovation is imperative and subsequently they are investigated.
      PubDate: 2017-02-18
      Issue No: Vol. 6 (2017)
  • Fuzzy Logic Based Adaptive Dc Link Voltage Control For Common Point
           Interface Voltage Variations in a 3-Phase Grid Tied Solar Photo Voltaic

    • Authors: Vallabhaneni V Durga Rao, D Revathi
      Abstract: This paper manages a three-stage two-arrange grid tied SPV (solar photo voltaic) framework. The principal stage is a lift converter, which fills the need of MPPT (greatest power point following) and sustaining the removed solar energy to the DC connection of the PV inverter, while the second stage is a two-level VSC (voltage source converter) filling in as PV inverter which encourages power from a lift converter into the grid. The proposed framework utilizes a versatile DC connect voltage which is made versatile by modifying reference DC interface voltage as indicated by CPI (regular purpose of interconnection) voltage. The versatile DC connect voltage control helps in the diminishment of exchanging power misfortunes. A nourish forward term for solar commitment is utilized to enhance the dynamic reaction. The framework is tried considering practical grid voltage varieties for under voltage and over voltage. The execution change is checked tentatively. Why since we utilizing the fluffy controller.
      PubDate: 2017-02-17
      Issue No: Vol. 6 (2017)
  • Evaluating Telecommunications In Respect To Offshore Software Industry Of

    • Authors: Zia Ur Rahman, Izaz Ahmad Khan, Muhammad Shabbir Jan, Sayyed Abbas Shah
      Abstract: The purpose of the paper is to showcase the progression of offshoring from a unique perspective. Pakistan will be concentrated upon on the evaluating telecommunications in respect to offshore software industry. Regardless of the fact having short period of offshoring experience, we conducted a questioners survey with top twenty software houses of Pakistan registered with PSEB (Pakistan Software Export Board) out of which sixteen responded,  it was observed that the matters related to telecommunication infrastructure there was hundred percent satisfaction. Instead of rushing for short term profits out of cheap labor cost, Pakistan is looking for strategic and long term liaison through continued development and collaboration among them to consolidate its position economically in the league of nations.
      PubDate: 2017-02-12
      Issue No: Vol. 6 (2017)
  • Pakistan Offshore Software Industry: Role Of Government And Resources

    • Authors: Zia Ur Rahman, Izaz Ahmad Khan, Muhammad Shabbir Jan, Sayyed Abbas Shah
      Abstract: This paper is about exploring the potential of Pakistan as favourite offshore software provider. The study is largely focus on the resources and government support. The on-line questionnaire has been used for gathering information from the respondents. The questionnaire has been divided into two sections which are: role of government and resources. The government related section is related to the political stability of the country and its impact on their business, importance and level of government support, and ranking of different support activities for the companies under investigation. In the resources section that includes: salary issues, experience abroad professional growth/further education, work conditions and others.
      PubDate: 2017-02-12
      Issue No: Vol. 6 (2017)
  • Architecture and Emerging Technologies for D2D Communication

    • Authors: Ihtesham ul Haq, Zia Ur Rahman, Muhammad Ilyas Ibn Abid, Sajid Ullah, Kamran Ali Shah
      Abstract: Sooner rather than later, i.e., past 4G, a portion of the prime goals or requests that should be tended to are expanded limit, enhanced information rate, diminished inertness, and better nature of administration. To meet these requests, extreme changes should be made in cell arrange design. This paper introduces the consequences of a point by point review on the fifth era (5G) cell organize design and a portion of the key rising advancements that are useful in enhancing the engineering and taking care of the requests of clients. In this point by point study, the prime concentration is on the 5G cell arrange design, gigantic numerous information various yield innovation, and gadget to-gadget correspondence (D2D). Alongside this, a portion of the developing advances that are tended to in this paper incorporate obstruction administration, range imparting to subjective radio, ultra-thick systems, multi-radio get to innovation affiliation, full duplex radios, millimeter wave answers for 5G cell systems, and cloud advances for 5G radio get to systems and programming characterized systems. In this paper, a general likely 5G cell organize engineering is proposed, which demonstrates that D2D, little cell get to focuses, arrange cloud, and the Internet of Things can be a piece of 5G cell arrange design. A definite overview is incorporated with respect to ebb and flow inquire about tasks being led in various nations by research gatherings and organizations that are taking a shot at 5G advancements.
      PubDate: 2017-02-12
      Issue No: Vol. 6 (2017)
  • A New Approach for Enhanced Security using Captcha as Graphical Passwords

    • Authors: Rakesh Nayak, S Devanam Priya
      Abstract: In the Network Security, varied security primitives are there in view of exhausting scientific problems.  In this paper we tend to exhibit another security primitive in sight of exhausting AI issues specifically CaRP(Captcha as Graphical Passwords). it's a completely unique cluster of graphical secret key frameworks supported high of captcha innovation. it's a graphical secret key setup and conjointly it addresses varied security problems. A CaRP to boot offers a completely unique thanks to trot out address the image hotspot issue in acknowledge graphical secret key frameworks, as an example, passpoints that prompt to week watchword choices. CaRP isn't associate degree acceptable arrangement however rather it offers security and easy use for a few handy applications for enhancing on the net security.
      PubDate: 2017-02-11
      Issue No: Vol. 6 (2017)
  • Minimizing Query Delay And Prediction of File Availability Of Nodes In

    • Authors: A S V Vara Prasad, V. Venkanna
      Abstract: MANET is a collection of mobile nodes present trend in MANET is file sharing applications like Qik and Flix-wagon.But it contains different properties are node mobility, limited communication and resources due to this properties file querying efficiency is decreased. To improve file query efficiency a new mechanism is introduced named as file replication. But earlier file replication protocols lack of limited resource allocation for different files to reduce query delay as well as prediction of file availability .in this project introducing  a new distributed file replication protocol which minimizes query delay and maintains limited resource allocation .it is having another best feature like file availability for reduce query delay.
      PubDate: 2017-02-11
      Issue No: Vol. 6 (2017)
  • The Novel Technique for Secured Storage and Accessing the Productive Data
           in DTN’S

    • Authors: Srilatha Yelamati, Patri Vasavika Komali, M.A. Ahmed Sha
      Abstract: Data reserving can fundamentally enhance the productivity of data access in a remote portable system by lessening the entrance inertness and transmission capacity use. At whatever point, outlining effective dispersed storing calculations is on inconsequential when system hubs have restricted memory. In this article, we consider the reserve arrangement issue of minimizing aggregate data access cost in portable system systems with different data things and hubs with restricted memory limit. Our conveyed calculation actually stretches out to systems with versatile hubs. We reproduce our conveyed calculation utilizing and show that it altogether beats another current reserving strategy in terrifically vital execution measurements. In this paper, the area based administrations screen another hub and an arrangement of moving protests and answer questions relating to their areas and access the data effectively in DTN. Data access is a noteworthy issue in Disruption Tolerant Networks (DTN's) a result of its pioneering contacts, unpredictable system availability, long defer and low hub thickness. To determine this issue, the paper proposes a Cooperative Caching plan taking into account entrepreneurial way sending in which the data is needlessly reserved at various hubs. The fundamental thought is to choose an arrangement of hubs called as Network Central Locations (NCL) to store data consequently decreasing data access delay. Moreover coordination among all storing hubs is likewise accomplished to lessen transmission of repetitive data in system. The recreation results got demonstrates the proficiency of the framework as far as conveyance rate and postpone.
      PubDate: 2017-02-08
      Issue No: Vol. 6 (2017)
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Tel: +00 44 (0)131 4513762
Fax: +00 44 (0)131 4513327
Home (Search)
Subjects A-Z
Publishers A-Z
Your IP address:
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-2016