|
|
Submit Paper / Call for Papers |
Journal receives papers in continuous flow and we will
consider articles from a wide range of Computing disciplines including hardware
engineering, software engineering, information systems and information
technology,
encompassing the most basic research to the most innovative and radical ideas. Please
submit your papers electronically to our submission system at
http://IJRIC.org/submit_paper.php in an MSWord, Pdf or compatible
format so that they may be evaluated for publication in the upcoming issue. This
journal uses a blinded review process; please remember to include all your
personal identifiable information in the manuscript before submitting it for
review, we will edit the necessary information at our side. Submissions to IJRIC
should be full research / review papers (properly indicated below main title in
case of review paper). | | |
International
Journal of Reviews in Computing
Volume
13 January 10 2014 |
Title |
THE MANAGEMENT OF THE QUALITY OF SERVICE IN IMS NETWORK
BASED ON THE NEW SIGNALING NSIS |
Authors |
TAAM ABDELKARIM, OUMSIS MOHAMED, RAOUYANE
BRAHIM,BELLAFKIH MOSTAFA |
Abstract |
The next generation network requires a suitable QoS that
can increase number of users and revenues. The IMS (IP Multimedia
Subsystem) import new taxation strategy flow based and QoS management
policy-based. The QoS management poses a competition in terms of
limitations of physical resources and the onset of congestion, which
encourages more organisaton to look for management solutions other than
DiffServ and IntServ. The NSIS (Next Steps in Signaling) appears as a
magical solution that couples DiffServ and IntServ with other properties
of control traffic to validate these properties and shows the
integration with IMS we present this article. Our goal, in this article,
is give an idea about a Framework that coupling NSIS and policy-based
management in IMS, and experimentally verify results. |
Keywords |
IMS (IP Multimedia Subsystem); QoS(Quality of Service);
DiffServ(Differentiated Services); InterServ(Integrated
Services);NSIS(Next Steps in Signaling). |
Full Text |
Title |
AN AUTOMATIC VOLTAGE REGULATOR WITH HIGH RELIABILITY FOR
RURAL NETWORKS |
Authors |
MADHU VALAVALA, VENKATA RAMANA NAVANA |
Abstract |
Robustness, Low cost and Easy maintenance with-out power
electronics components is considered as the key factors for the novel
approach, known as Voltage regulator , for Rural distributed networks.
These characteristics make it suitable for rural networks, where
investments and operational cost in power quality improvement are
limited. The regulator consists of a multi winding reduced-power
transformer, and provides serial voltage compensation. Different voltage
compensation steps are obtained by modifying the connection and the
polarity between the primary and secondary windings. The transformer
design has been optimized to obtain a high-efficiency and low-cost
regulator. An automatic controller monitors the output voltage and sets
the optimal compensation step. The results were studied in MATLAB/SIMULINK.
|
Keywords |
Power Distribution Control, Power Quality, Power
Transformers, Rural Areas, Voltage Control |
Full Text |
Title |
MODIFICATION OF HIRLOC ALGORITHM USING FINITE SIZED
WIRELESS SENSOR NETWORKS |
Authors |
SWATI SAXENA |
Abstract |
This paper presents a detailed survey of various
localization algorithms for WSNs; it focuses mainly on the computation
of localization error. The error calculation is done with respect to
number of nodes deployed randomly in a WSN. The existing localization
algorithms are evaluated under similar conditions by means of simulation
and a modified algorithm based on the results of an existing algorithm
is proposed. It is observed that the proposed algorithms out performs
the other discussed algorithms described in this paper. |
Keywords |
Localization, HiRLoc, SeRLoc, Centroid, RAL, ADLA. |
Full Text |
Title |
A REVIEW ON GRAVITATIONAL SEARCH ALGORITHM AND ITS
APPLICATIONS TO DATA CLUSTERING & CLASSIFICATION |
Authors |
YUGAL KUMAR AND G. SAHOO |
Abstract |
Natural phenomenon’s and swarms behavior are the warm
areas of research among the researchers. A large number of algorithms
have been developed on the account of natural phenomenon’s and swarms
behavior. These algorithms have been implemented on the various
computational problems for the sake of solutions and have shown
significant results than conventional methods but till yet there is no
such algorithm which can be applied for all types of computational
problems. In 2009, a new algorithm was developed on the behalf of theory
of gravity and was named gravitational search algorithm (GSA) for
continuous optimization problems. In short span of time, GSA algorithm
has gained popularity and now being applied to large number of problems
such as clustering, classification, parameter identification etc. This
article presents the compendious survey on the GSA algorithm and its
applications as well as enlightens the applicability of GSA in data
clustering & classification. |
Keywords |
Classification, Clustering, Gravitational Search
Algorithm, Optimization, Nature Inspired Algorithm. |
Full Text |
Title |
A NOVEL APPROACH FOR IMPROVE DETECTION RATE IN ANOMALY
BASED INTRUSION DETECTION SYSTEM IN WIRELESS SENSOR NETWORK |
Authors |
ANSHUMAN SHARMA, DR. M.R ALONE |
Abstract |
Wireless Sensor Network is regularly deployed in
unattended and hostile environments. The WSN is vulnerable to security
threats and susceptible to physical capture. Thus, it is necessary to
use effective mechanisms to protect the network. It is widely known,
that the intrusion detection is one of the most efficient security
mechanisms to protect the network against malicious attacks or
unauthorized access. In this paper, we propose a hybrid intrusion
detection system for clustered WSN. Our intrusion framework uses a
machine learning approach based Incremental Support vector machine (ISVM).
it can overcome the shortages of SVM-time-consuming of training and
massive dataset storage and detect unseen or unknown attack. |
Keywords |
Data Mining, Rough Set Theory, Support Vector Machine,
Attack, Intrusion Detection System |
Full Text |
Title |
E-LEARNING IN SAUDI HIGHER EDUCATION A LITERATURE REVIEW |
Authors |
YAHYA AL ALHARETH, NEIL MCBRIDE |
Abstract |
The initiatives to introduce e-learning to the Kingdom of
Saudi Arabia (KSA) have led to a rapid increase in e-learning. However,
Saudi Arabia is still in the early stage of its e-learning development
and faces many challenges, which might affect the adoption and
successful application of e-learning in Saudi Arabia especially for
women. Thereby, this paper will review the literature of e-learning in
Saudi higher education by considering several different aspects
including: information regarding e-learning in Saudi Arabia through
different sections which are its history, online programmes currently
play in higher education, the internet and women’s e-learning,
challenges of e-learning and limitation. |
Keywords |
E-Learning, Higher Education, The Internet, Women And
E-Learning, E-Learning Challenging |
Full Text |
Title |
FREQUENT DATA UPDATING USING RANDOM CHECKPOINTING
ARRANGEMENT IN DECENTRALIZED MOBILE GRID COMPUTING |
Authors |
MR. S. P. SANTHOSHKUMAR, MR. D. PRABAKAR, DR. S. KARTHIK |
Abstract |
This Paper deals with an autonomic, decentralized,
QoSaware, middleware, whose function is to establish checkpointing
arrangements among MHs dynamically within the MoG, allowing its
constituent MHs to support practical collaborative computation. As
wireless links are less reliable and MHs move at will, a given job
executed by multiple MHs collaboratively, relies on efficient
checkpointing to enable execution recovery upon a MoG component failure
by transferring recently saved intermediate data and machine states to a
substitute MoG component, so that execution can resume from the last
checkpoint, saved prior to the failure. Our checkpointing methodology
requires no BS to achieve its function as checkpointing is handled
within the MoG by keeping checkpointed data from a given MH at immediate
neighboring MHs. Our methodology also facilitates encapsulation of the
checkpointing function within the MoG, making it transparent to the
wired-Grid or mobile client being served. Thus, in order to limit the
use of relatively unreliable wireless links, and further to minimize the
consumption of wireless host’s memory resources and energy, each MH
sends its checkpointed data to one selected neighboring MH, and also
serves to take checkpointed data from one approved neighboring MH,
realizing a decentralized form of checkpointing. It provides
implications for resource scheduling, checkpoint interval control, and
application QoS level negotiation. It fills a novel niche component of
the ever developing field of MoG middleware, by proposing and
demonstrating how QoS-aware functionality can be practically and
efficiently added. |
Keywords |
Checkpointing, computational Grids, Mobile Grid systems,
Decentralized Checkpointing, Bayesian Estimation, Grid Computing, Mobile
Computing |
Full Text |
Title |
A COMPARATIVE ANALYSIS OF DIFFERENT IMAGE FUSION
TECHNIQUES |
Authors |
SHAVETA MAHAJAN, ARPINDER SINGH |
Abstract |
This paper has presents a review on the different image
fusion techniques. The main application of image fusion in multi-focus
cameras to combine information from multiple images of the same scene in
order to deliver only the multi focused image. The discrete cosine
transforms (DCT) based methods of image fusion are more suitable and
time-saving in real-time systems using DCT based standards of still
image or video. In this paper an efficient approach for fusion of
multi-focus images based on variance calculated in DCT domain is
presented. The overall goal is to find the gaps in existing literature
and suggesting a suitable method to reduce the gaps of existing
techniques. |
Keywords |
Image fusion, Multi-focus, Visual Sensor, DCT, and PCA. |
Full Text |
|
|
Publish your quality research
in
Sister JOURNALS
Journal of Theoretical and Applied Information Technology
(JATIT)
www.jatit.org
|