for Journals by Title or ISSN
for Articles by Keywords
Followed Journals
Journal you Follow: 0
Sign Up to follow journals, search in your chosen journals and, optionally, receive Email Alerts when new issues of your Followed Jurnals are published.
Already have an account? Sign In to see the journals you follow.
  International Journal of Research in Computer and Communication Technology
  [4 followers]  Follow
  This is an Open Access Journal Open Access journal
   ISSN (Print) 2320-5156 - ISSN (Online) 2278-5841
   Published by Suryansh Publications Homepage  [2 journals]
  • Analysis of Rabin and RSA Cryptosystems Using Bit Shifting and Stuffing
           (BSS) Technique

    • Authors: Rakesh Nayak, Ch. VeerendraKumar
      Abstract: The important categories of network security application are to reduce the transmitted data size and to improve the security of the data. Compression of data before the transmission can reduce network transmission time, but other hand it increase local processing overhead. In this paper, we present our model to combine the both security and data compression techniques by local processing. The BSS technique is used for reduce the size of the data and cryptography technique is used for improve the security of the transmitted data in the network. In BSS method we  stuff new bit/ bits in the place of unused bit/bits which shifts another character. Rabin and RSA are two asymmetric cryptography technique, which is  used for convert the plain into cipher text and vice versa.  This paper examines the local processing time and analyze the time and space of different data files by applying BSS to RSA and Rabin Cryptosystem.
      PubDate: 2015-03-05
      Issue No: Vol. 4 (2015)
  • A Novel Image Classification System Based on Evidence Probabilistic

    • Authors: Ahmed El_sayed Amin
      Abstract: This paper uses the evidence probabilistic transformtion (EPT) for unsupervised image retrieval framework. The main advantages with EPT are substantially resolves the "take-them-or -leave-them" problem, gives a firmer epistemological basis for acquiring and for using in decisions. The proposed framework makes use of gray level co-occurrance matrix (GLCM) for images feature extraction. These features are used to provide a new axiomatic analysis and interpretation for images by using Dempster-Shafer belif functions. The mass functions for images information are combined under the normalized Dempster's combination rule. The proposed model is characterized to extraction a set of accurate rules for images and their corresponding cluster based on probablistic information in different format. Expermints show that the proposed model achieves a very good performance in terms of the precision, recall and F-measurement.
      PubDate: 2015-03-05
      Issue No: Vol. 4 (2015)
  • SecSDLC: A Practical Life Cycle Approach for Cloud-based Information

    • Authors: Fahad F Alruwaili, T.Aaron Gulliver
      Abstract: Cloud computing services offer significant benefits to information technology (IT) systems such as reduced cost and shorter implementation time compared to traditional IT environments. However, the cloud multi-tenancy and web-enabled architecture creates a complex environment in which to develop and manage information security and compliance programs. At the enterprise level, risk and threat management can be an issue if it fails to protect cloud confidentiality, integrity, and availability (CIA). In this paper, a practical cloud security system development life cycle (SecSDLC) methodology is proposed to provide a holistic approach to effective and efficient cloud information security. The SecSDLC is based on industry best practices, and widely used and accepted methodologies such as waterfall SDLC, and NIST SP 800-64 revision 2 information security. Our previously developed solutions for cloud intrusion detection and prevention, security system monitoring, secure SLA, and compliance auditing are incorporated into the SecSDLC. A formal methodology is proposed to address concerns regarding cloud security and compliance requirements. The goal is to increase the probability of a successful information security program and reduce the likelihood of missing or inadequate components that may compromise cloud information security.
      PubDate: 2015-03-05
      Issue No: Vol. 4 (2015)
  • A Novel Approach For Enhancing and Recovering the Lifetime of Faulty Nodes
           in Wireless Sensor Network’s

    • Authors: Suneel venkata jonnalagadda, Murugaandam S, Karthika Sundaran
      Abstract: In wireless detector network accommodates an outsized range of small sensor nodes that's capable to perform native computations supported gathering sensory data and communicating with alternative sensor nodes within the network. The detector nodes in WSNs equipped with batteries for their energy supply, however it's inconvenient to recharge or replace batteries due to the explosive giving off energy. Hence, maximizing the period of the network through minimizing the energy is a crucial challenge in WSN. This paper proposes a fault node recovery algorithmic program to produce energy economical and effective communication in WSN. The algorithmic program relies on the mix of grade diffusion algorithmic program and also the genetic algorithmic program. The FNR algorithmic program will replace the deactivated detector nodes and additional reused routing ways. Within the simulation the FNR algorithmic program reduces the speed of packet loss by more or less 98.8% and reduces the speed of energy consumptionby100-80%.
      PubDate: 2015-03-05
      Issue No: Vol. 4 (2015)
  • Web Application: Performance Testing Using Reactive Based Framework

    • Authors: Yogita M. Rasal, Sangeeta Nagpure
      Abstract: Web application performance testing plays an important role in providing Quality of Service (QoS). Performance testing is very important for satisfying users. This research paper presents performance testing of web application using reactive-based framework for reducing the cost and increasing efficiency of the performance testing. This framework provides an approach which involves retrieving the web log from server side. With the help of web logs user pattern is retrieved at server side. Metrics derived from user perspective are used to find the usage pattern at client side. Finally test case can be generated automatically by solving an optimization problem through an evolutionary algorithm. 
      PubDate: 2015-03-05
      Issue No: Vol. 4 (2015)
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Tel: +00 44 (0)131 4513762
Fax: +00 44 (0)131 4513327
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-2014