for Journals by Title or ISSN
for Articles by Keywords
help
Followed Journals
Journal you Follow: 0
 
Sign Up to follow journals, search in your chosen journals and, optionally, receive Email Alerts when new issues of your Followed Journals are published.
Already have an account? Sign In to see the journals you follow.
Journal Cover International Journal of Research in Computer and Communication Technology
  [5 followers]  Follow
    
  This is an Open Access Journal Open Access journal
   ISSN (Print) 2320-5156 - ISSN (Online) 2278-5841
   Published by Suryansh Publications Homepage  [2 journals]
  • Enhanced Input Data Creation Model for Automatic Pattern Recognition
           System

    • Authors: Alifiya Mohd Iqbal Jahagirdar, Manisha Patil, Vrushsen Pawar, Vilas Kharat
      Abstract: Recognizing patterns and Classification have gained interest due to human beings, they have developed skills to observe and take actions by using environment. For example a human can recognizes faces, handwriting without thinking of other properties affecting the objects. A branch of artificial intelligence is known as pattern recognition. It can be used in many categories like recognition and classification. It is used in different areas like medical, GIS and remote sensing, data mining. To complete the processing of pattern recognition system, input data plays vital role. The present research work focuses on collection and preparation of input data for computer based automatic pattern recognition system. Hence in our research we have designed and developed new input data model for automatic pattern recognition system after studying existing input data creation model.
      PubDate: 2016-11-12
      Issue No: Vol. 5 (2016)
       
  • High Throughput Architecture for the Advanced Encryption Standard
           Algorithm

    • Authors: T. Tirupathi Rao, Gagandeep Taddi
      Abstract: High throughput architecture is proposed for an efficient
      implementation of the Advanced Encryption Standard
      (AES) Algorithm. The presented architecture is adapted
      for AES encryptor-only as well as integrated AES
      encryptor /decryptor designs. The Sub-Bytes/Inv-Sub-Bytes operations are implemented using composite field
      arithmetic in order to exploit the sub-pipelining advantage
      within the loop unrolling methodology. The proposed
      architecture minimizes the critical path delay through the
      modification of the Sub-Bytes/Inv-Sub-Bytes as well as
      the Key Expansion modules. Compared to previously
      reported AES encryptors and integrated AES
      encryptors/decryptors designs, the proposed architecture
      provide an efficiency improvement of 61% and 29%
      respectively.
      PubDate: 2016-11-11
      Issue No: Vol. 5 (2016)
       
  • Velocity Estimation of Moving Targets Using SAR Imaging

    • Authors: Karimikonda Deepthi, I Hemalatha, P. V. Sridevi
      Abstract: The fundamental SAR hypothesis is thoughtfully basic yet when one investigates the inward workings of the SAR processor it shows up entirely convoluted. The most troublesome part of the issue is identified with the coupling between the azimuthal pressure and the orbital parameters. In the days of yore when the satellite circles were not known precisely, one would utilize strategies, for example, mess bolt and self-adjust to get the orbital parameters from the information to recognize speed. This is no more drawn out important with the high exactness circles accessible today. A standard handling arrangement takes after where the initial two stages are done installed the satellite while the rest of the 4 stages are finished by the client with an advanced SAR processor.
      PubDate: 2016-11-05
      Issue No: Vol. 5 (2016)
       
  • Employee Performance Evaluation In Virtual Organization

    • Authors: K.V.V.N. Praveena, S.Ravi Kishan, D. Suresh Babu
      Abstract: The productivity and profitability can be increased depends on the employees performance in the company. Performance evaluation is the major issue in virtual organization which is geographically distributed. In the organizations, to evaluate the employees performance who is working at different branches located in various places or working at home by using the systems and monitoring their loyalty and role related behaviors, it is difficult to evaluate and analyze the performance of the employees working at different places with different environments. It is more harmful for the employees if there is any wrong perception in the evaluation of performance. To avoid these wrong perceptions we are proposing the Domain Driven Data Mining (D3M) technique utilizing 360 Degree feedback, which is used for objective measurement and Opinion Mining (OM) technique is used for subjective measurement.
      PubDate: 2016-11-05
      Issue No: Vol. 5 (2016)
       
  • Co-Elicitation Attitude Targets and Attitude Words from Online Revision
           Based on the Word Sequencing standard

    • Authors: G. Nasirunnisa, P. Pradeep
      Abstract: Taking out state of mind targets and demeanor words from online updates are essential errands for fine-grained sentiment taking out, the key segment of which includes distinguishing disposition relations among words. To this end, this paper proposes a novel approach in view of the PSWAM which sees distinguishing sentiment relations as an arrangement procedure. At that point, a chart based co-positioning calculation is misused to appraise the certainty of every hopeful. At long last, hopefuls with higher certainty are separated as feeling targets or assessment words. Contrasted with past strategies in light of the closest neighbor administers, our model catches supposition relations all the more unequivocally, particularly for long-traverse relations. Contrasted with sentence structure based techniques, our pledge arrangement demonstrate viably lightens the negative impacts of parsing mistakes when managing casual online writings. Specifically, contrasted with the customary unsupervised arrangement show, the proposed demonstrate gets better accuracy in view of the utilization of fractional supervision. Likewise, while assessing competitor certainty, we punish higher-degree vertices in our chart based co-positioning calculation to diminish the likelihood of blunder era. Our trial comes about on three corpora with various sizes and dialects demonstrate that our approach viably beats cutting edge techniques.
      PubDate: 2016-11-04
      Issue No: Vol. 5 (2016)
       
  • A Neural Conversational Model for Chatbots

    • Authors: Shubham Agrawal, Murtaza Mansoor Haidri
      Abstract: One of the fundamental objectives of Computer Science is to reduce the menial, repetitive and mundane tasks. It might be arithmetic calculations or maintaining huge amount of data. With the advent of Artificial Intelligence and Machine Learning, we are a step ahead. We not only make the machine perform these tasks but also those which would require the intelligence and the reasoning of a human brain. This involves decision making, interpretation and prediction. The project makes an attempt to minimize human intervention in a wide range of domains. The tool that is built is capable of having human-like conversations with a person. Currently, the conversational model built is capable of having casual conversations in a variety of topics which involve no domain specific knowledge. The same can be replicated in a domain specific environment by including the previous conversations or data of that specific domain. The concepts of Machine Learning and Artificial Intelligence i.e., Recurrent Neural Networks along with LSTMs (Long Short Term Memory) are used to train the neural network.
      PubDate: 2016-11-01
      Issue No: Vol. 5 (2016)
       
  • The Conventional Method of Optimizing Delivery Routes And Schedules

    • Authors: Thiruchinapalli Srinivas, P.Sireesha Devi
      Abstract: The distribution professionals verify their operations on a daily basis. Competitive pressures, mergers, acquisitions, new product lines and greater customer expectations are just the tip of the change iceberg for the modern logistics leader. On the surface, this continuum of change is just a cost of doing business in the latest “new economy.” However, for those intimately involved in a distribution process, how these changes are accommodated can mean the difference between survival, burnout and/or even extinction in today’s rapidly changing supply chain. Various cost factors have to be taken under consideration in order to generate the cost associated with routing and scheduling. This change is a cost of doing business in the latest “new economy”. This research focuses on different key areas that are the roadmap to an effective, flexible and proactively responsive distribution operation for optimizing delivery routes and schedules. Also investigates the feasibility of using data envelopment analysis to measure efficiency and rationalize a distribution network as an alternate approach to the conventional method of optimizing delivery routes and schedules for given supply chain management. Scope of the Routing & scheduling procedures is to produce an efficient plan of routes, taking under consideration all the aforementioned parameters, that minimizes a given objective function.
      PubDate: 2016-11-01
      Issue No: Vol. 5 (2016)
       
  • Implementation of Neural Network Techniques In Wireless Communication For
           Authentication

    • Authors: Menal Dahiya
      Abstract: Security of an organization depending upon the users who uses the services of that organization authentically. Many organizations still use a traditional process of authentication like use of passwords, pharse keys etc.. for wireless networking in an organization. But these authentication processes are not sufficient in providing proper security. In this paper, I simulate the captured data using layered architecture, i.e. Back Propagation and using the auto associative property of network i.e. Hopfield neural network. The performance analysis of these two algorithms shows that  the layered architecture needs more time for training and space.
      PubDate: 2016-11-01
      Issue No: Vol. 5 (2016)
       
 
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
Fax: +00 44 (0)131 4513327
 
Home (Search)
Subjects A-Z
Publishers A-Z
Customise
APIs
Your IP address: 54.211.11.50
 
About JournalTOCs
API
Help
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-2016