for Journals by Title or ISSN
for Articles by Keywords
Followed Journals
Journal you Follow: 0
Sign Up to follow journals, search in your chosen journals and, optionally, receive Email Alerts when new issues of your Followed Jurnals are published.
Already have an account? Sign In to see the journals you follow.
International Journal of Research in Computer and Communication Technology
   [4 followers]  Follow    
  This is an Open Access Journal Open Access journal
     ISSN (Print) 2320-5156
     Published by Suryansh Publications Homepage  [2 journals]
  • Efficient Techniques for Load Balancing and Dynamic Resource Management in

    • Authors: T. Saikrishna, P.M.D. Ali Khan
      Abstract: Cloud computing applications are developed using MapReduce programming. Cloud computing distributed file system  nodes perform functionality like  computing as well as storage in this  a file is partitioned into a number of chunks allocated in distinct nodes .based on that  MapReduce tasks can be performed in parallel over the nodes. But in a cloud computing environment, failure is the common means nodes may be upgraded, replaced and added in the system. Files can also be dynamically created, deleted and appended. This results in load imbalance in a distributed file system that is the file chunks are not distributed as uniformly among the nodes. In this project , introducing  distributed load rebalancing algorithm which eliminated load imbalance problem and proposing gossip protocol which maintains dynamic resource management for large scale cloud. It Dynamically maximizing the cloud utility under CPU and memory constraints.
      PubDate: 2014-08-02
      Issue No: Vol. 3 (2014)
  • Efficient Technique For Security to Storage Nodes in Multi-Cloud

    • Authors: G L N Tripura, P. Mareswaramma
      Abstract: Now a days these cloud computing users are more in many organizations. It provides many benefits are minimum cost and accessibilities of data. Ensuring the security of cloud computing is a major factor in its environment. Dealing with “single cloud” providers is advance to become less popular with customers due to risks of services like availability failure and the possibility of harmful insiders in the single cloud. A movement towards “multi-clouds” has emergecy recently. This paper surveys recent research related to single and multi-cloud security and addresses possible solutions. Aim to promote the use of multi-clouds due its ability reduce security risks.
      PubDate: 2014-08-02
      Issue No: Vol. 3 (2014)
  • Designing & Implementing an ARM 7 Based System for Critically Injured
           People by Using Electromyograph

    • Authors: Palkuntwar Tanuja Prakash, Hate S.G
      Abstract: This paper presents a system which can   be used   to  study  the  movements human lower limb.  It can detect muscle injury after accident. For orthopedic physical therapy it is very important to recognize the tear of a muscle & exact injury.  This system is developed to  recognize tear of muscle in emergency where muscle specialist  is not available and treatment to the patient is priority. This is a wearable system. The system can be developed by using accelerometer and electromyography. This system uses two-axis accelerometers to measure angle of patient’s leg and ground when patient walks. This system is a smart device. when this system is attached to the Leg it can analyze the leg, feet and hip movements. EMG   (Electromyograph) electrodes are ued to check muscle movements. The wired data communication is used to perfom communication between computer and wearable system.In short this system is a gaint analysis system.
      PubDate: 2014-07-31
      Issue No: Vol. 3 (2014)
  • Intelligent Ambulance Rescue System

    • Authors: Yogini Krishna Nangare
      Abstract: Traffic problems, congested traffic  and  flow management were recognized as major problems mostly in all the areas, which have caused problem for the ambulance which carries the emergency patient. Moreover road accidents in the city have been increased and loss of life due to the accidents is even more crucial and not measurable.  To avoid  this we introduce a scheme called as IARS (Intelligent ambulance rescue system). The main theme behind this scheme is to provide a smooth flow for the ambulance to reach the hospitals in time and thus minimise the problems. The idea behind this scheme is to implement an Intelligent Transportation System (ITS) which would control mechanically the traffic lights in the path of the ambulance. The ambulance is controlled by main server which is the central unit or brain or our system and ambulance controls the traffic signals, thus reaching to the hospital safely.  The server also determines the location of the accident spot through the sensor systems and GPS (Global Positioning System) in the vehicle which encountered the accident and thus the server walks through the ambulance to the spot. This scheme is fully automated, thus it finds the accident spot, controls the traffic lights, helping to reach the hospital in time and save the life.
      PubDate: 2014-07-31
      Issue No: Vol. 3 (2014)
  • Detection & Prevention of Unauthorized User through Policy Server for
           a Network

    • Authors: Avinash Yashwant Surywanshi, Prof. Priti Subramanium
      Abstract: Now a day’s Accessing the information all over the world is very fast & quick. Accessing the information is done over the internet. Industry & various organizations are facing access management problems that require new level of protection to resource. Access Management suit are the most advance, Secure, Reliable solutions that are use  for securing data , Web services & Resource form unauthorized user. Access Management is the strong authentication and authorization solution that is available for e-business, Operating Systems & Business Integration. The Access Management for e-business is the secure the web environment of the industry. Access Management for e-business is providing strong authentication and authorization solution using WebSEAL, & policy-based approach to identify who can access the resource at what level. This paper will propose how the detection & prevention of unauthorized user through policy server for a network.
      PubDate: 2014-07-31
      Issue No: Vol. 3 (2014)
  • Risk Management in ERP Implementation

    • Authors: Ramdas S Wanare, Amar Rajendra Mudiraj
      Abstract: “There can be no great accomplishment without risk”, says by the Neil Armstrong. Risk management is very crucial and vital task in the current era of competitive business for any organization, who takes the various kind of risk in their respective business process and functions. As the organization ready to sustain in the fast processing world of business, many organization adopted technology-based or high-tech business processing. To obtain the all kind of advantages, most of the organization migrate their business process into ERP environment. But, big advantage can also comes with big risk and when there is risk, organization keep their eyes and ears open to indentify, analyze and overcome on the risks.  The theme of the paper is to highlighting the importance of risk by organizational view. The research gives the risk management process and listed a variety of risks with their functional types like managerial, Operational, Technical, Financial etc. At the end of this paper, the authors tries to explore various countermeasures to over comes the risk and enlighten the Risk Management in ERP Implementation.
      PubDate: 2014-07-31
      Issue No: Vol. 3 (2014)
  • Effective Business Analytics using Prefetching Technique

    • Authors: M Thangaraj, V.T Meenatchi
      Abstract: Now a days, the Web is a vital resource in conducting business apart from information search and entertainment. Predicting users shopping pattern, finding frequent buyers and popular product identification in the e-commerce industry becomes a challenging task. Web Mining is applied in e-commerce industry to gain business knowledge, which in turn improves sales and provides marketing strategy to be applied in business. Our paper focusses on applying web mining with semantics in Internet Commerce, facilitating the website owners in improving their business.
      PubDate: 2014-07-31
      Issue No: Vol. 3 (2014)
  • A Review on Various Software Development Life Cycle (SDLC) Models

    • Authors: Seema Suresh Kute, Surabhi Deependra Thorat
      Abstract: To satisfy the need of automate the different activities and satisfy the need of some standard and structural procedure or methodology which to be introduced in the industry so that the transition from manual to automated system became easy. This leads to the concept of System Development Lifecycle (SDLC) Models came into existence that emphasized on the need to follow some structured approach towards building new or improved system. There are five development models namely Linear Sequential Model, Iterative Model, Prototype Model, Spiral Model, V-shaped Model. All these models have cons as well as prons. The main objective of this research is to represent the different models of software development and make a comparative study of them to show the features and defects of each model.
      PubDate: 2014-07-31
      Issue No: Vol. 3 (2014)
  • E-Commerce through Smart Devices in Emerging India

    • Authors: J R Suryawanshi
      Abstract: Recent developments in the area of Mobile Technology and Information Technology have led to rehabilitated interest in Electronic Commerce in organizations and societies. Electronic Commerce is supporting of customers, supplying of services, managing business information and business transactions and maintaining of relationship between suppliers, customers and vendors by the use of telecommunication networks.   The purpose of this paper is to focus the factors and recent technological developments in the emerging world using electronic commerce applications. Also main focus will be on the growth of mobile services and the latest applications for online services.
      PubDate: 2014-07-30
      Issue No: Vol. 3 (2014)
  • Study on Business Process Reengineering(BPR) and its importance in ERP

    • Authors: Ramdas S. Wanare, Amar R. Mudiraj
      Abstract: In the new era of automation in the industrial growth the ERP plays vital role. Most of the industries struggle to steady their business as much as automatic at the level of functioning environment. The ERP is the one of the automatic solution, who provides lend a hand to the organization to accomplish this need. Although the ERP implementation is the enormous, expensive and time consuming process, the organizations still wish for put the ERP into practice for their betterment. The triumph for the ERP implementation is constantly depends upon the Planning. Most of the ERP Implementations are unsuccessful only for the reason that poor planning. The Business Process Reengineering (BPR) is the early-bird stage procedure for indentifying and investigates the organizational demand for the ERP implementation. This paper will emphasize the BPR process and it implementation. The research also explains the reliance of ERP implementation on the victorious BPR in the organization. Here, the research try to validate the significance of successful BPR process can also construct the successful ERP Implementation in the organization. In the very last part of the paper, list out the key issues which are affecting on the BPR process during its implementation. All the key issues or factors are gets classify in four different characteristics of the organization like Managerial, Operational, Financial and Technical.
      PubDate: 2014-07-30
      Issue No: Vol. 3 (2014)
  • Survey of Text Categorization Techniques

    • Authors: Amol Shivaji Kamble
      Abstract: On the internet huge data are in the uncategorized form. Big information is hidden behind this uncategorized scene of data. If classification of these internet documents done, then it will be helpful in many cases. All the documents related to a single class can be found at the single location. This paper considers the different text categorization systems. These systems are using different classification algorithms for he classification of the text documents.

      PubDate: 2014-07-30
      Issue No: Vol. 3 (2014)
  • A Casestudy on Run time Load Balancing of Virtual Machines in Cloud

    • Authors: Pruthvi Chaithanya Varshu Vemula, Santhi Sree kakara
      Abstract: In these days many people using clouds for all their needs, because of robust features and security provided by the cloud computing. Cloud computing must satisfy all the needs of users who scale the resource usage instantly. In this paper we define a system which allocates the resources dynamically by supporting green computing, and optimizing the number of servers. We use Aneka for dynamically modifying resources according to the user needs by using resource virtualization or by harnessing the spare CPU cycles of desktop machines. It will­­ combine different types of workloads nicely and improve the overall utilization of server resources. Trace driven simulation and experiment results demonstrate that our algorithm achieves good performance in terms of time and saving energy.
      PubDate: 2014-07-30
      Issue No: Vol. 3 (2014)
  • An Enhanced Digital Campus Security System Using RFID, GPS, GSM

    • Authors: A.Ashok Kumar, P. Swapna
      Abstract: In this paper a Digital Campus Security System (DCST) has been designed and implemented base on the RFID, GPS and Gsm network. DCST reads the RFID tags and sends information to lpc2148.processor gives alerts through Gsm network. If any invalid RFID (Thief) information comes into mobile we will  get the real-time tracking for valuables. Where the thief arrives anyone access control node, it would be blocked. User can also manage its own valuables such as lending and recovery operation through the web manager centre.
      PubDate: 2014-07-30
      Issue No: Vol. 3 (2014)
  • Technical Survey of Heart of Propagation Models: A Spectrum Analysis

    • Authors: Kishor Pandyaji
      Abstract: In this paper, we exhibit a sneak peak of dynamic spectrum   access approaches.  Different methodologies foreseen for   dynamic   spectrum    access are   expansively characterized under three models: selective model, imparting model, and progressive model. It is very important to know previous study about spectrum taxonomy to focus over future developments.  To analyze  ANN algorithms   as  an  alternative approach  for  rapid and   accurate   prediction   of  propagation  parameters  research scholar  must  consider  the relation between  various  propagation models. This is alpha review to implement wavelet transformation prototyping. This study presents wireless system communication spectrum review which will be advantageous for urban spectrum band examination utilizing wavelet transformation approach.  
      PubDate: 2014-07-30
      Issue No: Vol. 3 (2014)
  • Multichannel Contact Center

    • Authors: Priya Kishor Ithape, Anil S Hiwale
      Abstract: A Contact Center is a central point in an organization from which a customer contact is being managed. Contact Center plays an important role in one-to-one customer interactions. Multichannel provides various channels for accepting and making contacts. A Multichannel Contact Center allow the organization to interact with the customers with multiple channels of communication providing quality of service which include voice calls, text or SMS, emails, fax, web chats etc. A MultiChannel Contact Center is an extension to the traditional Call Centers.  The Call Centers that purely handle telephone calls are now converted to Contact Centers that offer communications that fall under a larger umbrella. The Contact Centers offer customers a variety of ways to communicate with the business and enable more personalized interactions that enhance customer relationships, improve business opportunities, reduce overall cost and optimize customer experience as compared to Call Centers. The paper presents a system to support Multichannel Contact Centers to business organizations.
      PubDate: 2014-07-30
      Issue No: Vol. 3 (2014)
  • Hybrid Svm Datamining Techniques For Weather Data Analysis of Krishna
           District of Andhra Region

    • Authors: Rajasekhar N, Rajinikanth T V
      Abstract: Weather Prediction is the application of science and technology to estimate the state of atmosphere at a particular spatial location. Due to the availability of huge data researchers got interest to analyze and forecast the weather. By predicting accurately it helps in safeguarding human life and their wealth. Forecasting techniques are useful in effective weather prediction; crops yield growth, traffic congestions, marine navigation, forests growth & defense purposes. The Data Mining techniques / algorithms are proved to be better than the existing techniques / methodologies / traditional statistical methods. In this paper, we have proposed a new Hybrid SVM (Support vector machines) model for effective weather prediction by analyzing the given huge weather data sets and to find the suitable patterns existing in it. SVM is one of the supervised learning methods under classifications & regression. Good results were arrived in weather prediction than the other Data Mining Techniques. For this, as a case study we have considered Krishna district weather data sets were considered for analysis using this proposed hybrid SVM technique.
      PubDate: 2014-07-30
      Issue No: Vol. 3 (2014)
  • Real-Time Face Detection System for Virtual Classroom Environment

    • Authors: Swapnil Sanjay Potnis, Aditi S Jahagirdar
      Abstract: In today’s fast paced world where human computer interaction systems are working towards becoming more user-friendly. Face detection has become an integral part of many of these systems. It also has varying range of applications in areas such as Content-Based Image Retrieval, Public Surveillance, Video Coding, Video Conferencing, Emotion Detection, Lie Detectors and Virtual Classroom Environments. The existing systems make use of training images which consists of huge image database for training purpose. Going through such a huge database is a long-drawn-out task. Also the pre-requisites of some of these            systems involve the usage of a high-end camera which is a very costly affair. The proposed system is virtual classroom specific and makes use of HAAR Cascade Classifiers to detect the face in real-time possible. The system is cost-effective as a simple webcam has been used to achieve the desired outcome. The results obtained making use of the HAAR Cascade Classifiers has shown a high performance rate as compared to other systems working on the similar lines.
      PubDate: 2014-07-30
      Issue No: Vol. 3 (2014)
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Tel: +00 44 (0)131 4513762
Fax: +00 44 (0)131 4513327
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-2014