for Journals by Title or ISSN
for Articles by Keywords
help
Followed Journals
Journal you Follow: 0
 
Sign Up to follow journals, search in your chosen journals and, optionally, receive Email Alerts when new issues of your Followed Jurnals are published.
Already have an account? Sign In to see the journals you follow.
Journal Cover   International Journal of Research in Computer and Communication Technology
  [2 followers]  Follow
    
  This is an Open Access Journal Open Access journal
   ISSN (Print) 2320-5156 - ISSN (Online) 2278-5841
   Published by Suryansh Publications Homepage  [2 journals]
  • Proficient Algorithms for Mining Elevated Service Item Sets Commencing
           Transactional Databases

    • Authors: gunamani k, vishnumurthy s
      Abstract: Association rule mining is used to stumble on the patronize item sets in substantial database. In the data mining field, utility mining materialize as an essential topic that to excavation the high value item sets from databases which consign to verdict the item sets with elevated profits. The vast number of high utility item sets formulate a challenging hitch for the mining accomplishment, awaited to generate more potential high utility item sets. So it expends higher progression in outsized database and diminute the mining efficiency. They proposed two novel approaches such as UP growth and UP-growth+ in addition to compact UP Tree data structure, which is used for well-organized discovering high utility item sets from huge transactional databases. In existing system indiscriminate memory allocation is used to squirrel away the candidate that conduct to high potential I/O operations. Also this method is time devour and requires high memory storage. In sequence to solve this problem in proposed system, we used taxonomy with R-hashing technique for the memory allocation. Hence the applicant items are stored with their particular memory in UP tree. The experimental result illustrates that the proposed system is additional successful than the existing techniques according to the memory space and the amount of candidate item sets initiation and input and output operations.  
      PubDate: 2015-05-10
      Issue No: Vol. 4 (2015)
       
  • Equivalent Entity Mining Commencing On Relative Uncertainty

    • Authors: sangeetha k, dharmajee rao d.t.v
      Abstract: Contrast entities are an significant part of decision making progression. To assist judgment making it is useful to evaluate entities that share widespread utility but have distinguishing peripheral characteristics. One possible slant is comparable entity mining from comparative uncertainty. The method used is weakly supervised bootstrapping tactic which identifies the relative question and take out the comparable entity. This is done by distinguish whether a particular question is comparative or not. A sequential prototype is generated and is called an indicative extraction pattern (IEP) if it can be worn to identify comparative questions and dig up comparator pairs with soaring reliability. This technique achieves the F1-measure of 82.5 percent in comparative question credentials and 83.3 percent in comparable entity mining. Inwards proposed system Clique grow examination is used in which the comparable associations are extended and it is used to control assorted query logs from users. Ranking system is used to rank the comparable entities for user input ingress and the results show substantially relevance to user’s similarity intent.
      PubDate: 2015-05-10
      Issue No: Vol. 4 (2015)
       
  • A Review On Data Mining Process In Healthcare Department To Identify The
           Frequently Occurring Diseases

    • Authors: Subhashini Undrajavarapu
      Abstract: Data mining is a process of analyzing large volumes of data to extract the useful knowledge from it. Data mining techniques is applied on medical data to improve the service in healthcare department. Availability of electronics data in the medical institutions are a good opportunity to the researchers to develop in all the aspects. It helps to know the diseases which are occurring frequently and how to solve it with out disturbing the other related work. This paper discussed a novel technique to identify the frequently occurring diseases using different visualized aids.
      PubDate: 2015-05-09
      Issue No: Vol. 4 (2015)
       
  • Design Of Ternary Arithmetic Circuits Using QDGFET

    • Authors: Jay Arvind Shah, Satish Narkhede
      Abstract: This paper presents a novel design of ternary arithmetic circuits like half-adder and multiplier using quantum dot field effect transistors. Due to the change in threshold voltage over the range QDGFETs produce one intermediate state between two normal stable ON and OFF states. Moreover ternary logic is a promising alternative to the conventional binary logic design technique, since it is possible to produce three states (FALSE, UNKNOWN, TRUE), and also reduces the number of interconnects and chip area and increases efficiency. In this paper we have proposed novel circuit design of half-adder and multiplier based on ternary logic QDGFETs. Increased number of states in QDGFETs will increases the number of bit handling capacity in the device.
      PubDate: 2015-05-05
      Issue No: Vol. 4 (2015)
       
  • Detection of DDOS attack using HCIF algorithm in cloud computing

    • Authors: Bhoomika Gupta
      Abstract: Cloud Computing is an emerging buzzword in the IT industry and offers three types of services as Software as a Service (SaaS), Infrastructure as a Service (IaaS) and Platform as a Service (PaaS). To launch a coordinated Denial of Service attack against one or more targets Distributed Denial of Service (DDoS) attack uses distributed computers. By using client/server architecture, the executioner is able to multiply the effectiveness of the DoS significantly by harnessing the resources of multiple unsuspecting accomplice computers which plays as an attack platform. DDoS is emerging as the weapon of choice for cyber-extortionists, hackers, and political "hacktivists". We use many Intrusion Detection Techniques (IDS) to detect DDoS attack. IDS is of different types like Active IDS, Passive IDS, Host Intrusion Detection Systems (HIDS), Distributed Intrusion Detection System (DIDS), Hybrid Intrusion Detection System and Network Intrusion Detection Systems (NIDS). In this paper proposed algorithm HCIF (Hop Count Inspection and Filtering) is used to detect spoofed packets by considering transmission delay time and minimum, maximum thresholds which increases response time of algorithm.
      PubDate: 2015-05-01
      Issue No: Vol. 4 (2015)
       
  • Wi-Fi Based Smart Energy Meter

    • Authors: Dinesh Nanjibhai Thanth, Amol Borole
      Abstract: Home automation is fast popularity nowadays.An automatic remote meter-reading system based on      Wi-Fi is presented in this paper can be considered as a part of home automation. The Energy data collection system is a very important step and part in the research of energy visualization and analysis. Through this system, consumer can easily know their electricity usage at any instance and their behavior to reduce their energy consumption and costs.  Wi-Fi based smart energy meter system is presented in this paper is in terms of reduces errors, absence of consumer while taking reading etc. There are many possibilities to collection of energy data. The main aim of the paper is to develop remote energy measurement system using Raspberry pi board consisting ARM11 processor and use sensors. Sensors data are stored in Raspberry pi and sends related data over Wi-Fi through the home’s wireless router to the base station. Furthermore, display all data such as energy consumption (Power), unit or other sensors detail on LCD.The base station collects the energy data, stores it in database and uses it for energy visualization, calculation and analysis using GUI application on Qt Creator.The design of GUI for embedded systems is different from that of traditional data computing, which often handles mouse or keyboard events to complete a specific calculation, while for embedded systems the events are caused by external devices.
      PubDate: 2015-05-01
      Issue No: Vol. 4 (2015)
       
  • Design a pattern generator with low switching activity to test complex
           combinational logic with high test coverage

    • Authors: Jay Bharatbhai Dabhi
      Abstract: In circuit large number of combinational logic used so logic depth is large, so it is impossible to test every fault with other techniques because it’s take more time. In order to increase speed of an algorithm for test generation, it is necessary to reduce the number of backtracks in the algorithm and to shorten the process time between backtracks. To solve this problem an Automatic Test Pattern Generator (ATPG) is proposed based on modification of FAN (fan-out-oriented test generation algorithm) Algorithm is describe. Also with some techniques reduce the switching activity of generated patterns for decrease the power consumption of ATPG.
      PubDate: 2015-05-01
      Issue No: Vol. 4 (2015)
       
  • Enhanced Representation Of Data Flow Anomaly Detection For Teaching
           Evaluation

    • Authors: T. Mamatha, A. BalaRam, D.S.R. Murthy, N. Archana
      Abstract: In this paper we propose three letter sequence of action for dataflow anomaly detection and representing data flow model for each data object. When we represent the CFG for data object, it is not giving the information that the object is used for which purpose(whether for calculation, predicate or redefined) so we extend the representation for more understanding and also given the DFD for all possible situation for normal flow and anomaly flow.
      PubDate: 2015-05-01
      Issue No: Vol. 4 (2015)
       
  • A Trusted Identity Acknowledgement Protocol for Security Enhancement in
           MANET

    • Authors: Pavani Veluru Lakshmi, Sathyanarayana Bachala
      Abstract: Identifying trusted node for secure communication is a very important point in mobile adhoc network. It makes a node to compromise for a service and causes uncertainty of node behaviour. Computing a node trust and managing are highly demanding issues in mobile ad hoc network due to its limitation of resources, process complexity and high mobility nature. We present a protocol based on a node trust identity acknowledgement (TIA) in this paper to enhance the security issue in MANET.  This prevent from the anomalous node to intrude in the network and improvise the security and throughput. We compute a node trust identity based on four depending factors as, Truth_factor, False_factor, Throughput_factor and Drop_factor rate. The experimental evaluation results shows an enhancement in throughput with low packet drop and computation overhead in compare to existing protocols.
      PubDate: 2015-05-01
      Issue No: Vol. 4 (2015)
       
  • Transforming Digital Unstructured and Semi-structured Data into Structured
           Data with the Aid of IE and KDT

    • Authors: Prakhyath Rai
      Abstract: Data growth has seen an exponential acceleration with the advent of computer and network, which have imparted the digital form to data. Data can be classified into three categories: Unstructured data, Semi-structured data and structured data. Text Mining concerns extraction of relevant information, knowledge or patterns from sources that are in Unstructured or Semi-structured form. This project entitled “Transforming Digital Unstructured and Semi-structured Data into Structured Data with the Aid of IE and KDT” demonstrates a framework for text mining using a learned information extraction system aided with KDT (Knowledge Discovery from Text) principles. The functionality of this project is concentrated over the integrated result of IE (Information Extraction) module, KDT (Knowledge Discovery form Text) module and Standard Protocols module. Pre-processing is employed for transforming unstructured data or Semi-structured data such as HTML documents, text documents, and documents with .doc, .docx or .pdf extensions into a feasible format of data which is then mined for interesting relationships. Standard Protocols are defined for discovery of additional information’s from input sources. For Example, consider if information extraction system has managed to extract skills like “HTML” and “DHTML” from a computer job posting but could not find “XML” in the document, in such cases relationships can be mined through predefined derivations which are framed in the standard protocols module. In addition, rules mined from the database extracted from a corpus of texts are used to predict additional information that could be extracted from future input documents, thereby improving the recall of the underlying extraction system. Results are presented by applying these techniques to a corpus of computer job announcement from an internet news group.
      PubDate: 2015-05-01
      Issue No: Vol. 4 (2015)
       
  • M Commerce in India: Promise and Problems

    • Authors: Anshu Sureshkumar Agarwal, Anshu Sureshkumar Agarwal, Dr. Pravin H. Bhatawal
      Abstract: The purpose of this research paper is to make the readers aware of current scenario and status of commerce in India especially M- commerce or mobile commerce. Now a days mobile phone rather smartphones, tablets, I-pad have become common to common people, we can say that people are becoming “Mobify” and also it is available at very nominal and reasonable prices. The number of users has drastically increased on mobile phones and consuming huge bandwidth of mobile Internet Providers. Although people have started using e commerce but still they hesitate to use m commerce because of security issues, payment problems and complexity of the mobile application etc. Incoming future it is going to replace all form of sales and services. In implementation of m commerce it is not only the users who are facing problems but also the providers or the business is facing the problem. Even the application providers have to think taking into considerations the needs and type of users. So in this paper we will get detailed coverage of problems faced by the users and providers in India.
      PubDate: 2015-05-01
      Issue No: Vol. 4 (2015)
       
  • STBC Transceiver System Using Tomlinson-Harashima pre coding

    • Authors: Nathireddy Pavankumar, C Dharma Raj
      Abstract: A precoding configuration for double space-time block coding (STBC) system is investigated in this paper, i.e., the joint process of STBC and dirty paper coding (DPC) methods. These methods are utilized for evading double spatial streams interference and enhancing the transmitter differences. The proposed system is interference free on multi-user or multi-antenna. The STBC transceiver can give the transmit differences. In order to reduce bit error rate and PAPR (Peak to Average Power Ratio), a new system called STBC-DPC is proposed. The transceiver design using this system yields a reliable performance. QR decomposition of channel matrix and the maximum likelihood (ML) one-dimensional searching algorithm are the two methods employed in the transceiver design. The channel switching is done by utilizing water filling algorithm which can avoid the deep fading channel effect. The proposed STBC-DPC system with the modulus operation to obtain the transmit sign level, i.e., Tomlinson-Harashima precoding (THP) scheme, reduces PAPR to a significant level.  Simulation results conform the proposed system can provide low PAPR and excellent BER performances.
      PubDate: 2015-04-29
      Issue No: Vol. 4 (2015)
       
  • Secure Data Storage And Retrieve From Cloud Networking With Multiple
           Encrypt System

    • Authors: Abdulwadood Sabeeh, Abdul Wadood Alshawi
      Abstract: The proposed work is to characterize cloud structural engineering with designed samba stockpiling what's more cryptographic encryption systems. The cloud structural engineering sent with samba stockpiling uses working framework peculiarity indicating authorization values for three properties (User/Owner, Group and Global) and maps it to cryptographic application which performs cryptographic operations. Cryptography application bolsters symmetric what's more deviated encryption calculation to encrypting/decrypting information for transferring/downloading inside distributed storage. A username and secret key based validation instrument for clients and computerized mark plan for information credibility are characterized inside cloud construction modeling. This research does not only examine cloud-specific issues, but also examines underlying information security requirements, since these form the basis on which all cloud services are to rest. The recommendations have been kept largely abstract, with no detailed instructions on their implementation being provided. Doing so would be beyond the remit of the document and would not allow for the diversity of cloud offerings. Assessing the security of any particular offering, therefore, must also be undertaken on a case-by-case basis.
      PubDate: 2015-04-29
      Issue No: Vol. 4 (2015)
       
 
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
Fax: +00 44 (0)131 4513327
 
About JournalTOCs
API
Help
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-2015