Pub Date : 2019-01-01DOI: 10.31838/ijccts/04.01.06
S. sabarinathan, K. Deepadevi
High speed architectures for finding the first two max/min values are of paramount importance in several applications, including iterative decoders and for proposed the adder and Low density parity check code (LDPC) has been implemented. The min-sum processing that it produces only two different output magnitude values irrespective of the number of incoming bit-to check messages. The new microarchitecture structures would employ the minimum number of comparators by exploiting the concept of survivor in the search. These result in reduced number of comparisons and consequently reduced energy use. Multipliers are complex units and play an important role in deciding the overall area, speed and power consumption of digital designs. The main feature of proposed algorithm is the use of the optimization factor. Also, the Optimization factor is not multiplied in posterior information which reduces complexity of the algorithm. By using the multiplier to reduce the parameters like latency, complexity and power
{"title":"Reduced Complexity MS Algorithm for Finding the First Two Minima in Tree Architectures ","authors":"S. sabarinathan, K. Deepadevi","doi":"10.31838/ijccts/04.01.06","DOIUrl":"https://doi.org/10.31838/ijccts/04.01.06","url":null,"abstract":"High speed architectures for finding the first two max/min values are of paramount importance in several applications, including iterative decoders and for proposed the adder and Low density parity check code (LDPC) has been implemented. The min-sum processing that it produces only two different output magnitude values irrespective of the number of incoming bit-to check messages. The new microarchitecture structures would employ the minimum number of comparators by exploiting the concept of survivor in the search. These result in reduced number of comparisons and consequently reduced energy use. Multipliers are complex units and play an important role in deciding the overall area, speed and power consumption of digital designs. The main feature of proposed algorithm is the use of the optimization factor. Also, the Optimization factor is not multiplied in posterior information which reduces complexity of the algorithm. By using the multiplier to reduce the parameters like latency, complexity and power","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125086450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.31838/ijccts/03.02.03
{"title":"Survey on High Utility Itemset Mining ","authors":"","doi":"10.31838/ijccts/03.02.03","DOIUrl":"https://doi.org/10.31838/ijccts/03.02.03","url":null,"abstract":"","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"6 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128732598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.31838/ijccts/01.02.11
Abhinav Srivastava, D. Yadav, S. K. Pandey
Cloud computing security (sometimes referred to simply as "cloud security") is an evolving sub-domain of computer security, network security, and, more broadly, information security. It refers to a broad set of policies, technologies, and controls deployed to protect data, applications, and the associated infrastructure of cloud computing. Private Cloud computing has elevated IT to newer limits by offering the market environment data storage and capacity with flexible scalable computing processing power to match elastic demand and supply, whilst reducing capital expenditure. However the opportunity cost of the successful implementation of Cloud computing is to effectively manage the security in the cloud applications. Security consciousness and concerns arise as soon as one begins to run applications beyond the designated firewall and move closer towards the public domain. The purpose of the paper is to provide an overall security perspective of Cloud computing with the aim to highlight the security concerns that should be properly addressed and managed to realize the full potential of Cloud computing. Gartner's list on cloud security issues, as well the findings from the International Data Corporation enterprise panel survey based on cloud threats, will be discussed in this paper.
{"title":"The Security in Private Cloud Computing","authors":"Abhinav Srivastava, D. Yadav, S. K. Pandey","doi":"10.31838/ijccts/01.02.11","DOIUrl":"https://doi.org/10.31838/ijccts/01.02.11","url":null,"abstract":"Cloud computing security (sometimes referred to simply as \"cloud security\") is an evolving sub-domain of computer security, network security, and, more broadly, information security. It refers to a broad set of policies, technologies, and controls deployed to protect data, applications, and the associated infrastructure of cloud computing. Private Cloud computing has elevated IT to newer limits by offering the market environment data storage and capacity with flexible scalable computing processing power to match elastic demand and supply, whilst reducing capital expenditure. However the opportunity cost of the successful implementation of Cloud computing is to effectively manage the security in the cloud applications. Security consciousness and concerns arise as soon as one begins to run applications beyond the designated firewall and move closer towards the public domain. The purpose of the paper is to provide an overall security perspective of Cloud computing with the aim to highlight the security concerns that should be properly addressed and managed to realize the full potential of Cloud computing. Gartner's list on cloud security issues, as well the findings from the International Data Corporation enterprise panel survey based on cloud threats, will be discussed in this paper.","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124201414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.31838/ijccts/01.01.09
C. Sivaranjani, A. Surendar, T. C. Sakthevel, P. Scholar
The wired environment encomprises with that of physical devices and interfaces of electrical equipments. Though the wireless trait has been emerged with its flexibility in information and communication technology, the wired atmosphere has the plugged in resource of fidelity and reliability providing armor to physical and logical data. The industrial field with the basement of control and instrumentation technology which makes the entire world automated. The hardware is ubiquitous with tangible outputs in robotics field also which further progress tremendously. This project deals with the robotic technique to control the various input parameters and puts the technical disorder in safe mode from electrical damage. Proposed i n fo r ma t io n a b o u t manage the power consumption in Wireless sensor network based o n e f f e c t i v e n o d e deployment by making the sensor communication in standby mode using a hardware model integrating multiple sensors in a single devices.ie, implementing various sensors in a single hardware unit. Also the recursive mechanism provides stability and infers the system in total power consumption which in turn gives the good performance. A wireless sensor networks(WSN) consists of spatically distributed autonomous sensing devices which cooperatively moniter physical or environmental conditions,such as temperature, sound, pressure, motion at different locations. A wireless sensor network is a collection of nodes organized into a cooperative network. Each node consists of processing capability (one or more microcontrollers, CPUs or DSP chips), may contain multiple types of memory (program, data and flash memories), have a RF transceiver (usually with a single Omni-directional antenna), have a power source (e.g. batteries and solar cells), and accommodate various sensors and actuators. The nodes communicate wirelessly and often self-organize after being deployed in an adhoc fashion. Recently there has been renewed interest in using mobile robots as sensor carring platforms in order to perform hazardous tasks [6].One of the major activities of mobile robots is to move from one place to another. In order to reach the goal position, mobile robots are required to follow a predetermined route. Deploying large numbers of sensors has been receiving a lot of attention for detection of hazardous biological or chemical substances in public buildings,
{"title":"Energy efficient deployment of mobile node in wireless Sensor networks ","authors":"C. Sivaranjani, A. Surendar, T. C. Sakthevel, P. Scholar","doi":"10.31838/ijccts/01.01.09","DOIUrl":"https://doi.org/10.31838/ijccts/01.01.09","url":null,"abstract":"The wired environment encomprises with that of physical devices and interfaces of electrical equipments. Though the wireless trait has been emerged with its flexibility in information and communication technology, the wired atmosphere has the plugged in resource of fidelity and reliability providing armor to physical and logical data. The industrial field with the basement of control and instrumentation technology which makes the entire world automated. The hardware is ubiquitous with tangible outputs in robotics field also which further progress tremendously. This project deals with the robotic technique to control the various input parameters and puts the technical disorder in safe mode from electrical damage. Proposed i n fo r ma t io n a b o u t manage the power consumption in Wireless sensor network based o n e f f e c t i v e n o d e deployment by making the sensor communication in standby mode using a hardware model integrating multiple sensors in a single devices.ie, implementing various sensors in a single hardware unit. Also the recursive mechanism provides stability and infers the system in total power consumption which in turn gives the good performance. A wireless sensor networks(WSN) consists of spatically distributed autonomous sensing devices which cooperatively moniter physical or environmental conditions,such as temperature, sound, pressure, motion at different locations. A wireless sensor network is a collection of nodes organized into a cooperative network. Each node consists of processing capability (one or more microcontrollers, CPUs or DSP chips), may contain multiple types of memory (program, data and flash memories), have a RF transceiver (usually with a single Omni-directional antenna), have a power source (e.g. batteries and solar cells), and accommodate various sensors and actuators. The nodes communicate wirelessly and often self-organize after being deployed in an adhoc fashion. Recently there has been renewed interest in using mobile robots as sensor carring platforms in order to perform hazardous tasks [6].One of the major activities of mobile robots is to move from one place to another. In order to reach the goal position, mobile robots are required to follow a predetermined route. Deploying large numbers of sensors has been receiving a lot of attention for detection of hazardous biological or chemical substances in public buildings,","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127914704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.31838/ijccts/01.02.06
Abhay Raman, A. Rai
In this paper, we are interested in minimizing the delay and maximizing the lifetime of event-driven wireless sensor networks, for which events occur infrequently. In such systems, most of the energy is consumed when the radios are on, waiting for an arrival to occur. Sleep-wake scheduling is an effective mechanism to prolong the lifetime of these energy-constrained wireless sensor networks. However, sleep-wake scheduling could result in substantial delays because a transmitting node needs to wait for its next-hop relay node to wake up. An interesting line of work attempts to reduce these delays by developing any cast.-based packet forwarding schemes, where each node opportunistically forwards a packet to the neighboring node that wakes up among multiple candidate nodes. In this paper, we first study how to optimize the any cast forwarding schemes for minimizing the expected packet-delivery delays from the sensor nodes to the sink. Based on this result, we then provide a solution to the joint control problem of how to optimally control the system parameters of the sleep-wake scheduling protocol and the any cast packet-forwarding protocol to maximize the network lifetime, subject to a constraint on the expected end to end packet-delivery delay. Our numerical results indicate that the proposed solution can outperform prior heuristic solutions in the literature, especially under the practical scenarios where there are obstructions, e.g., a lake or a mountain, in the coverage area of wireless sensor networks.
{"title":"MINIMIZING DELAY AND MAXIMIZING LIFETIME FOR WIRELESS SENSOR NETWORKS WITH ANYCAST ","authors":"Abhay Raman, A. Rai","doi":"10.31838/ijccts/01.02.06","DOIUrl":"https://doi.org/10.31838/ijccts/01.02.06","url":null,"abstract":"In this paper, we are interested in minimizing the delay and maximizing the lifetime of event-driven wireless sensor networks, for which events occur infrequently. In such systems, most of the energy is consumed when the radios are on, waiting for an arrival to occur. Sleep-wake scheduling is an effective mechanism to prolong the lifetime of these energy-constrained wireless sensor networks. However, sleep-wake scheduling could result in substantial delays because a transmitting node needs to wait for its next-hop relay node to wake up. An interesting line of work attempts to reduce these delays by developing any cast.-based packet forwarding schemes, where each node opportunistically forwards a packet to the neighboring node that wakes up among multiple candidate nodes. In this paper, we first study how to optimize the any cast forwarding schemes for minimizing the expected packet-delivery delays from the sensor nodes to the sink. Based on this result, we then provide a solution to the joint control problem of how to optimally control the system parameters of the sleep-wake scheduling protocol and the any cast packet-forwarding protocol to maximize the network lifetime, subject to a constraint on the expected end to end packet-delivery delay. Our numerical results indicate that the proposed solution can outperform prior heuristic solutions in the literature, especially under the practical scenarios where there are obstructions, e.g., a lake or a mountain, in the coverage area of wireless sensor networks.","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131634684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.31838/ijccts/07.sp01.10
S. Kanagavalli, M. Ajithkumar, M. Sarathkumar, R. Selvamurugan, M. Ramkumar
This project deals with the monitoring and control of cooling system of a transformer using automation. Probability of faults on power transformer is undoubtedly more and hence automatic protection is absolutely necessary. Temperature sensor is used to sense the temperature of the power transformer that provides the value of temperature. Output from the sensor is fed to the Programmable Logic Controller (PLC). A PLC is a digitally operating system designed for use in an industrial environment, which uses a programmable memory for its internal operation of user-oriented instructions and for implementing specific function such as logic, sequencing, timing, counting and arithmetic. By introducing PLC into action the process becomes more flexible, reliable and PC friendly. HMI activities are availed to have better visualization of the process and control. Trouble shooting experience becomes easier now compared to existing technology.
{"title":"PLC Based Automatic Cooling of Power Transformer","authors":"S. Kanagavalli, M. Ajithkumar, M. Sarathkumar, R. Selvamurugan, M. Ramkumar","doi":"10.31838/ijccts/07.sp01.10","DOIUrl":"https://doi.org/10.31838/ijccts/07.sp01.10","url":null,"abstract":"This project deals with the monitoring and control of cooling system of a transformer using automation. Probability of \u0000faults on power transformer is undoubtedly more and hence automatic protection is absolutely necessary. \u0000Temperature sensor is used to sense the temperature of the power transformer that provides the value of \u0000temperature. Output from the sensor is fed to the Programmable Logic Controller (PLC). A PLC is a digitally \u0000operating system designed for use in an industrial environment, which uses a programmable memory for its internal \u0000operation of user-oriented instructions and for implementing specific function such as logic, sequencing, timing, \u0000counting and arithmetic. By introducing PLC into action the process becomes more flexible, reliable and PC friendly. \u0000HMI activities are availed to have better visualization of the process and control. Trouble shooting experience \u0000becomes easier now compared to existing technology.","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114951632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.31838/ijccts/04.02.04
{"title":"HARVESTING MICROWAVE SIGNAL POWER FROM THE AMBIENT ENVIRONMENT ","authors":"","doi":"10.31838/ijccts/04.02.04","DOIUrl":"https://doi.org/10.31838/ijccts/04.02.04","url":null,"abstract":"","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114980909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.31838/ijccts/04.02.01
{"title":"Improvement of Power Quality Using PQ Theory Based Series Hybrid Active Power Filter ","authors":"","doi":"10.31838/ijccts/04.02.01","DOIUrl":"https://doi.org/10.31838/ijccts/04.02.01","url":null,"abstract":"","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124474004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.31838/ijccts/01.02.07
Gyan Vihar
This work deals with the optimization of power flow through interconnected system. The work deals with efficient and reliable evolutionary based approach to solve the economic load dispatch (ELD) with line flows and voltage constraints. The work employs PSO algorithm for ELD. PSO is a robust, stochastic computational technique based on movement and intelligence of swarm. The work introduces a conceptual overview and detailed explanation of PSO algorithm as well as shows how it can be used for solving ELD problems. Inherent shortcoming of the traditional methods of finding the ELD is discussed along with other evolutionary methods of finding ELD. A comparative study of different evolutionary programming technique is done and it is shown that particle swarm optimization offer a better result with greater repeatability and lesser time. The feasibility of the proposed method is demonstrated by using a six generator interconnected system having different cost functions and voltage constraints. The results are compared with those obtained by G.A.
{"title":"Particle Swarm Optimization for Solving Economic Load Dispatch Problem ","authors":"Gyan Vihar","doi":"10.31838/ijccts/01.02.07","DOIUrl":"https://doi.org/10.31838/ijccts/01.02.07","url":null,"abstract":"This work deals with the optimization of power flow through interconnected system. The work deals with efficient and reliable evolutionary based approach to solve the economic load dispatch (ELD) with line flows and voltage constraints. The work employs PSO algorithm for ELD. PSO is a robust, stochastic computational technique based on movement and intelligence of swarm. The work introduces a conceptual overview and detailed explanation of PSO algorithm as well as shows how it can be used for solving ELD problems. Inherent shortcoming of the traditional methods of finding the ELD is discussed along with other evolutionary methods of finding ELD. A comparative study of different evolutionary programming technique is done and it is shown that particle swarm optimization offer a better result with greater repeatability and lesser time. The feasibility of the proposed method is demonstrated by using a six generator interconnected system having different cost functions and voltage constraints. The results are compared with those obtained by G.A.","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127206577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.31838/ijccts/01.01.01
{"title":"A COMPREHENSIVE PERFORMANCE EVALUATION OF DATA STORES IN CONTEXT WITH APPLICATION MANAGEMENT TOOLS","authors":"","doi":"10.31838/ijccts/01.01.01","DOIUrl":"https://doi.org/10.31838/ijccts/01.01.01","url":null,"abstract":"","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132864800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}