International Journal of communication and computer Technologies最新文献

筛选
英文 中文
Reduced Complexity MS Algorithm for Finding the First Two Minima in Tree Architectures  树结构中查找前两个最小值的MS算法
International Journal of communication and computer Technologies Pub Date : 2019-01-01 DOI: 10.31838/ijccts/04.01.06
S. sabarinathan, K. Deepadevi
{"title":"Reduced Complexity MS Algorithm for Finding the First Two Minima in Tree Architectures ","authors":"S. sabarinathan, K. Deepadevi","doi":"10.31838/ijccts/04.01.06","DOIUrl":"https://doi.org/10.31838/ijccts/04.01.06","url":null,"abstract":"High speed architectures for finding the first two max/min values are of paramount importance in several applications, including iterative decoders and for proposed the adder and Low density parity check code (LDPC) has been implemented. The min-sum processing that it produces only two different output magnitude values irrespective of the number of incoming bit-to check messages. The new microarchitecture structures would employ the minimum number of comparators by exploiting the concept of survivor in the search. These result in reduced number of comparisons and consequently reduced energy use. Multipliers are complex units and play an important role in deciding the overall area, speed and power consumption of digital designs. The main feature of proposed algorithm is the use of the optimization factor. Also, the Optimization factor is not multiplied in posterior information which reduces complexity of the algorithm. By using the multiplier to reduce the parameters like latency, complexity and power","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125086450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Survey on High Utility Itemset Mining  高效用项集挖掘研究
International Journal of communication and computer Technologies Pub Date : 2019-01-01 DOI: 10.31838/ijccts/03.02.03
{"title":"Survey on High Utility Itemset Mining ","authors":"","doi":"10.31838/ijccts/03.02.03","DOIUrl":"https://doi.org/10.31838/ijccts/03.02.03","url":null,"abstract":"","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"6 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128732598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Security in Private Cloud Computing 私有云计算中的安全性
International Journal of communication and computer Technologies Pub Date : 2019-01-01 DOI: 10.31838/ijccts/01.02.11
Abhinav Srivastava, D. Yadav, S. K. Pandey
{"title":"The Security in Private Cloud Computing","authors":"Abhinav Srivastava, D. Yadav, S. K. Pandey","doi":"10.31838/ijccts/01.02.11","DOIUrl":"https://doi.org/10.31838/ijccts/01.02.11","url":null,"abstract":"Cloud computing security (sometimes referred to simply as \"cloud security\") is an evolving sub-domain of computer security, network security, and, more broadly, information security. It refers to a broad set of policies, technologies, and controls deployed to protect data, applications, and the associated infrastructure of cloud computing. Private Cloud computing has elevated IT to newer limits by offering the market environment data storage and capacity with flexible scalable computing processing power to match elastic demand and supply, whilst reducing capital expenditure. However the opportunity cost of the successful implementation of Cloud computing is to effectively manage the security in the cloud applications. Security consciousness and concerns arise as soon as one begins to run applications beyond the designated firewall and move closer towards the public domain. The purpose of the paper is to provide an overall security perspective of Cloud computing with the aim to highlight the security concerns that should be properly addressed and managed to realize the full potential of Cloud computing. Gartner's list on cloud security issues, as well the findings from the International Data Corporation enterprise panel survey based on cloud threats, will be discussed in this paper.","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124201414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Energy efficient deployment of mobile node in wireless Sensor networks  无线传感器网络中移动节点的节能部署
International Journal of communication and computer Technologies Pub Date : 2019-01-01 DOI: 10.31838/ijccts/01.01.09
C. Sivaranjani, A. Surendar, T. C. Sakthevel, P. Scholar
{"title":"Energy efficient deployment of mobile node in wireless Sensor networks ","authors":"C. Sivaranjani, A. Surendar, T. C. Sakthevel, P. Scholar","doi":"10.31838/ijccts/01.01.09","DOIUrl":"https://doi.org/10.31838/ijccts/01.01.09","url":null,"abstract":"The wired environment encomprises with that of physical devices and interfaces of electrical equipments. Though the wireless trait has been emerged with its flexibility in information and communication technology, the wired atmosphere has the plugged in resource of fidelity and reliability providing armor to physical and logical data. The industrial field with the basement of control and instrumentation technology which makes the entire world automated. The hardware is ubiquitous with tangible outputs in robotics field also which further progress tremendously. This project deals with the robotic technique to control the various input parameters and puts the technical disorder in safe mode from electrical damage. Proposed i n fo r ma t io n a b o u t manage the power consumption in Wireless sensor network based o n e f f e c t i v e n o d e deployment by making the sensor communication in standby mode using a hardware model integrating multiple sensors in a single devices.ie, implementing various sensors in a single hardware unit. Also the recursive mechanism provides stability and infers the system in total power consumption which in turn gives the good performance. A wireless sensor networks(WSN) consists of spatically distributed autonomous sensing devices which cooperatively moniter physical or environmental conditions,such as temperature, sound, pressure, motion at different locations. A wireless sensor network is a collection of nodes organized into a cooperative network. Each node consists of processing capability (one or more microcontrollers, CPUs or DSP chips), may contain multiple types of memory (program, data and flash memories), have a RF transceiver (usually with a single Omni-directional antenna), have a power source (e.g. batteries and solar cells), and accommodate various sensors and actuators. The nodes communicate wirelessly and often self-organize after being deployed in an adhoc fashion. Recently there has been renewed interest in using mobile robots as sensor carring platforms in order to perform hazardous tasks [6].One of the major activities of mobile robots is to move from one place to another. In order to reach the goal position, mobile robots are required to follow a predetermined route. Deploying large numbers of sensors has been receiving a lot of attention for detection of hazardous biological or chemical substances in public buildings,","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127914704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
MINIMIZING DELAY AND MAXIMIZING LIFETIME FOR WIRELESS SENSOR NETWORKS WITH ANYCAST  最小化延迟和最大化寿命无线传感器网络与任播
International Journal of communication and computer Technologies Pub Date : 2019-01-01 DOI: 10.31838/ijccts/01.02.06
Abhay Raman, A. Rai
{"title":"MINIMIZING DELAY AND MAXIMIZING LIFETIME FOR WIRELESS SENSOR NETWORKS WITH ANYCAST ","authors":"Abhay Raman, A. Rai","doi":"10.31838/ijccts/01.02.06","DOIUrl":"https://doi.org/10.31838/ijccts/01.02.06","url":null,"abstract":"In this paper, we are interested in minimizing the delay and maximizing the lifetime of event-driven wireless sensor networks, for which events occur infrequently. In such systems, most of the energy is consumed when the radios are on, waiting for an arrival to occur. Sleep-wake scheduling is an effective mechanism to prolong the lifetime of these energy-constrained wireless sensor networks. However, sleep-wake scheduling could result in substantial delays because a transmitting node needs to wait for its next-hop relay node to wake up. An interesting line of work attempts to reduce these delays by developing any cast.-based packet forwarding schemes, where each node opportunistically forwards a packet to the neighboring node that wakes up among multiple candidate nodes. In this paper, we first study how to optimize the any cast forwarding schemes for minimizing the expected packet-delivery delays from the sensor nodes to the sink. Based on this result, we then provide a solution to the joint control problem of how to optimally control the system parameters of the sleep-wake scheduling protocol and the any cast packet-forwarding protocol to maximize the network lifetime, subject to a constraint on the expected end to end packet-delivery delay. Our numerical results indicate that the proposed solution can outperform prior heuristic solutions in the literature, especially under the practical scenarios where there are obstructions, e.g., a lake or a mountain, in the coverage area of wireless sensor networks.","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131634684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
PLC Based Automatic Cooling of Power Transformer 基于PLC的电力变压器自动冷却
International Journal of communication and computer Technologies Pub Date : 2019-01-01 DOI: 10.31838/ijccts/07.sp01.10
S. Kanagavalli, M. Ajithkumar, M. Sarathkumar, R. Selvamurugan, M. Ramkumar
{"title":"PLC Based Automatic Cooling of Power Transformer","authors":"S. Kanagavalli, M. Ajithkumar, M. Sarathkumar, R. Selvamurugan, M. Ramkumar","doi":"10.31838/ijccts/07.sp01.10","DOIUrl":"https://doi.org/10.31838/ijccts/07.sp01.10","url":null,"abstract":"This project deals with the monitoring and control of cooling system of a transformer using automation. Probability of \u0000faults on power transformer is undoubtedly more and hence automatic protection is absolutely necessary. \u0000Temperature sensor is used to sense the temperature of the power transformer that provides the value of \u0000temperature. Output from the sensor is fed to the Programmable Logic Controller (PLC). A PLC is a digitally \u0000operating system designed for use in an industrial environment, which uses a programmable memory for its internal \u0000operation of user-oriented instructions and for implementing specific function such as logic, sequencing, timing, \u0000counting and arithmetic. By introducing PLC into action the process becomes more flexible, reliable and PC friendly. \u0000HMI activities are availed to have better visualization of the process and control. Trouble shooting experience \u0000becomes easier now compared to existing technology.","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114951632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HARVESTING MICROWAVE SIGNAL POWER FROM THE AMBIENT ENVIRONMENT  从周围环境中采集微波信号功率
International Journal of communication and computer Technologies Pub Date : 2019-01-01 DOI: 10.31838/ijccts/04.02.04
{"title":"HARVESTING MICROWAVE SIGNAL POWER FROM THE AMBIENT ENVIRONMENT ","authors":"","doi":"10.31838/ijccts/04.02.04","DOIUrl":"https://doi.org/10.31838/ijccts/04.02.04","url":null,"abstract":"","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114980909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Improvement of Power Quality Using PQ Theory Based Series Hybrid Active Power Filter  基于PQ理论的串联混合有源电力滤波器改善电能质量
International Journal of communication and computer Technologies Pub Date : 2019-01-01 DOI: 10.31838/ijccts/04.02.01
{"title":"Improvement of Power Quality Using PQ Theory Based Series Hybrid Active Power Filter ","authors":"","doi":"10.31838/ijccts/04.02.01","DOIUrl":"https://doi.org/10.31838/ijccts/04.02.01","url":null,"abstract":"","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124474004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Particle Swarm Optimization for Solving Economic Load Dispatch Problem  求解经济负荷调度问题的粒子群算法
International Journal of communication and computer Technologies Pub Date : 2019-01-01 DOI: 10.31838/ijccts/01.02.07
Gyan Vihar
{"title":"Particle Swarm Optimization for Solving Economic Load Dispatch Problem ","authors":"Gyan Vihar","doi":"10.31838/ijccts/01.02.07","DOIUrl":"https://doi.org/10.31838/ijccts/01.02.07","url":null,"abstract":"This work deals with the optimization of power flow through interconnected system. The work deals with efficient and reliable evolutionary based approach to solve the economic load dispatch (ELD) with line flows and voltage constraints. The work employs PSO algorithm for ELD. PSO is a robust, stochastic computational technique based on movement and intelligence of swarm. The work introduces a conceptual overview and detailed explanation of PSO algorithm as well as shows how it can be used for solving ELD problems. Inherent shortcoming of the traditional methods of finding the ELD is discussed along with other evolutionary methods of finding ELD. A comparative study of different evolutionary programming technique is done and it is shown that particle swarm optimization offer a better result with greater repeatability and lesser time. The feasibility of the proposed method is demonstrated by using a six generator interconnected system having different cost functions and voltage constraints. The results are compared with those obtained by G.A.","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127206577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A COMPREHENSIVE PERFORMANCE EVALUATION OF DATA STORES IN CONTEXT WITH APPLICATION MANAGEMENT TOOLS 使用应用程序管理工具在上下文中对数据存储进行全面的性能评估
International Journal of communication and computer Technologies Pub Date : 2019-01-01 DOI: 10.31838/ijccts/01.01.01
{"title":"A COMPREHENSIVE PERFORMANCE EVALUATION OF DATA STORES IN CONTEXT WITH APPLICATION MANAGEMENT TOOLS","authors":"","doi":"10.31838/ijccts/01.01.01","DOIUrl":"https://doi.org/10.31838/ijccts/01.01.01","url":null,"abstract":"","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132864800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信