|
|
Submit Paper / Call for Papers |
Journal receives papers in continuous flow and we will
consider articles from a wide range of Computing disciplines including hardware
engineering, software engineering, information systems and information
technology,
encompassing the most basic research to the most innovative and radical ideas. Please
submit your papers electronically to our submission system at
http://IJRIC.org/submit_paper.php in an MSWord, Pdf or compatible
format so that they may be evaluated for publication in the upcoming issue. This
journal uses a blinded review process; please remember to include all your
personal identifiable information in the manuscript before submitting it for
review, we will edit the necessary information at our side. Submissions to IJRIC
should be full research / review papers (properly indicated below main title in
case of review paper). | | |
International
Journal of Reviews in Computing
Volume
9
April 10 2012 |
Title |
PERFORMANCE EVALUATION OF PMSM
DRIVES USING DTC TECHNIQUE |
Authors |
JASWANT SINGH, BINDESHWAR
SINGH, S.P. SINGH, MOHD. NAIM, RAHUL DIXIT |
Abstract |
The direct torque control
theory has achieved great success in the control of permanent magnet
synchronous motor. A Direct Torque Control (DTC) scheme of Permanent
Magnet Synchronous Motor (PMSM) is presented. Based on in-depth analysis
of PMSM mathematical model in abc frame and frame are established and
the operation principle of DTC-SVPWM system, the relationships between
the torque and fundamental components. A novel space vector pulse width
modulation (SVPWM) method which has a feature of low harmonic is
proposed. The proposed method is adopted to implement the direct torque
control (DTC) of a three-phase PMSM. A large number of simulation
results show that the DTC System of PMSM has fast response and good
dynamic performance. Aiming at the direct torque control in PMSM Drives,
in this paper explained the theoretical basis of the direct torque
control (DTC) for PMSM firstly. Then explained the difference between
the applications of DTC-SVPWM to PMSM. Finally the MATLAB/Simulink
models were developed to examine the DTC- SVPWM for PMSM. The simulation
results is presented in this paper. |
Keywords |
Direct Torque Control (DTC),
Permanent Magnet Synchronous Motor (PMSM), Space Vector Pulse With
Modulation (SVPWM), Modeling Equations, Current Estimation, Stator Flux
Linkage |
Source |
International
Journal of Reviews in Computing |
pp 01-11 |
Vol. 9 |
Full Text |
Title |
ANALYSIS OF VARIOUS IMAGE
COMPRESSION TECHNIQUES |
Authors |
G.M.PADMAJA, CH.RAJYA
LAKSHMI |
Abstract |
With the rapid development of
digital technology in consumer electronics, the demand to preserve raw
image data for further editing or repeated compression is increasing.
Image compression is minimizing the size in bytes of an image without
degrading the quality of the image to an unacceptable level. There are
several different ways in which images can be compressed. This paper
analyzes various image compression techniques. In addition, specific
methods are presented illustrating the application of such techniques to
the real-world images. We have presented various steps involved in the
general procedure for compressing images. We provided the basics of
image coding with a discussion of vector quantization and one of the
main technique of wavelet compression under vector quantization. This
analysis of various compression techniques provides knowledge in
identifying the advantageous features and helps in choosing correct
method for compression. |
Keywords |
Compression, Wavelet
Compression, SPIHT, Global Compression Scheme, Kohonen’s Method |
Source |
International
Journal of Reviews in Computing |
pp 12-18 |
Vol. 9 |
Full Text |
Title |
MOBILE AD-HOC NETWORK:
OPTIMIZATION OF ROUTING ALGORITHMS FOR MOBILITY MODEL |
Authors |
NITISH PATHAK, NEELAM SHARMA |
Abstract |
Many wireless networking
problems have to be solved for the efficient design and deployment of
these communications devices that operate in a Mobile Ad-hoc Network (MANET)
environment. A Mobile Ad hoc Network (MANET) is an infrastructure less
network of mobile devices which are equipped with a transmitter and
receiver. If any node want to communicate with the other node then each
node act as a router for the establishment of the route in the Mobile Ad
hoc Network. Therefore, if two nodes (devices) in a Mobile Ad hoc
network want to communicate with each other, then packets can be
transmitted directly or through some intermediate nodes i.e. Mobile Ad
hoc Network is a collection of self organized network of flexible
wireless nodes without a centralized control or infrastructure. In this
paper, we are comparing an optimized routing algorithm for Mobile Ad hoc
Network using NS2. |
Keywords |
NS2, DSR, Mobile Ad hoc Network (MANET),
Router, Routing Algorithm |
Source |
International
Journal of Reviews in Computing |
pp 19-25 |
Vol. 9 |
Full Text |
Title |
A LITERATURE REVIEW &
RECOMMENDATIONS ON PERSONAL SOFTWARE PROCESS TOOLS |
Authors |
WAQAR UL HUSNAIN, SHAHBAZ
AHMED |
Abstract |
Review papers and Survey research
papers are the primary source of information that helps researcher to
find updated knowledge in that domain. No systematic survey or review
paper was found in the field of Personal Software Process Tools and
Software Architecture Evaluation Tools. This requires the need of
performing the literature review. The review conducted tries to fill the
gap in the literature and recommends some suggestions for tool that
support integrated Personal Software Process and Architecture Evaluation
Process. Such tools will not only help individual software engineer to
perform single-case holistic design case studies which are required to
fill the gap in the current literature, but also help in commercial
environment for reducing cost, and schedule. |
Keywords |
Personal Software Process (PSP),
Tool Support, Software Architecture, Architecture Evaluation, Cost,
Schedule |
Source |
International
Journal of Reviews in Computing |
pp 26-33 |
Vol. 9 |
Full Text |
Title |
ANALYZING THE DETECTION OF
ACTIVE ATTACKS IN WIRELESS MOBILE NETWORKS |
Authors |
G.M.PADMAJA, CH.RAJYA
LAKSHMI |
Abstract |
In multi hop wireless
systems, such as ad hoc and sensor networks, mobile ad hoc network
applications are deployed, security emerges as a central requirement. A
particularly devastating attack is known as the active attack, where two
or more malicious collision nodes create a higher level virtual tunnel
in the network, which is employed to transport packets between the
tunnel end points. These tunnels emulate shorter links in the network.
In which adversary records transmitted packets at one location in the
network, tunnels them to another location, and retransmits them into the
network. An Active attack is possible even if the attacker has not
compromised any hosts and even if all communication provides
authenticity and confidentiality. In this paper, we analyze active
attack nature in mobile ad hoc and sensor networks and existing methods
to detect active attacks without require any specialized hardware. This
method provides an ability in establishing a way to reduce the rate of
refresh time and the response time to become more faster. |
Keywords |
Mobile Ad Hoc Network,
Sensor Network, Active Attack |
Source |
International
Journal of Reviews in Computing |
pp 34-38 |
Vol. 9 |
Full Text |
Title |
INTELLIGENT DETECTION OF BEARING
FAULTS IN ROTATING MACHINERY |
Authors |
OYEDOJA, KAYODE OYENIYI |
Abstract |
Industrialization shows a gradual
movement from manual operation of machines and tools towards their
automation. This involves lateral and hierarchical integration and
networking of traditionally disjointed system units into an integral
whole that requires little or no human intervention. Current trend in
industrial automation requires the replacement of supervision and
monitoring roles traditionally performed by humans with artificial
intelligent systems. More so such system requires the intelligent
detection of faults as to reduce downtime and maintenance cost. This
paper study the use of hybrid intelligent system in detection of bearing
faults in rotating machinery, to enable predictive maintenance and move
away from the traditional breakdown or planned maintenance. This result
in increase in availability and thus the productivity of the machinery
or system. |
Keywords |
Intelligent Fault Detection,
Condition Monitoring, Neurofuzzy, ANFIS, Matlab, Bearing Faults. |
Source |
International
Journal of Reviews in Computing |
pp 39-46 |
Vol. 9 |
Full Text |
Title |
PROPOSED DEVELOPMENT MODEL OF
E-GOVERNMENT TO APPROPRIATE CLOUD COMPUTING |
Authors |
AKRAM ALI OTHMAN NASR, GALAL
HASSAN GALAL-EDEEN |
Abstract |
E-government projects face a lot
of challenges that may lead to failure of e-government. Most important
of these challenges include the human resources are not qualified and
the high cost of infrastructure and the traditional infrastructure
cannot scale, scalability demands change over time. The solution of
these challenges in cloud computing to cost saving, professional
management of resources and applications, and the ability of
scalability. But the transition of e-government to cloud computing not
easy. We need thoughtful and orderly transition and we need to assess
the e-government. In this paper, we propose a new development model of
e-government called Before Cloud E-government Model BCE-government model
that satisfy the cloud computing. |
Keywords |
E-Government Models , Cloud
Computing , BCE-Government Model |
Source |
International
Journal of Reviews in Computing |
pp 47-53 |
Vol. 9 |
Full Text |
Title |
ADJUSTABLE SPEED DRIVES: REVIEW ON
DIFFERENT INVERTER TOPOLOGIES |
Authors |
RAHUL DIXIT,
BINDESHWAR SINGH, NUPUR MITTAL |
Abstract |
This paper presents a
literature survey on adjustable-speed drives (ASD) systems which are
based on the different types of inverter topologies (namely voltage
source inverter and current source inverter fed ASD system). It can
overcome limitations of previous speed drive systems. The proposed
inverters and ASD system can operate at wide range load (even no-load)
with small inductor which is very suitable for ASD system, simplify the
controller design, increase the inverter modulation index M, thus,
decreases the ripple current by changing the magnitude and distribution
of the harmonics and further decreases the iron loss of the motor. The
operation of voltage source inverter, current source inverter have been
described in detail along with the PWM technique.
Authors strongly believe that this survey article will be very much
useful to the researchers for finding out the relevant references in the
field of improvement of speed control of drives and reduction of
harmonics in three phase induction motor by PWM-techniques. |
Keywords |
Voltage Source Inverter (VSI),
Current Source Inverter (CSI), Adjustable Speed Drives (ASDs) |
Source |
International
Journal of Reviews in Computing |
pp 54-66 |
Vol. 9 |
Full Text |
Title |
CLOUD TESTING –MYTHS FACTS AND
CHALLENGES |
Authors |
PRAKASH.V, BHAVANI.R |
Abstract |
This paper focuses on
application of Cloud computing in the area of Software testing. This
paper tries to answer some of the questions like Why should a Software
Testing professional take a serious note of cloud computing? How does
cloud computing affect software testing? This paper aims at finding
answers to What, How, Who, why and where for Software Testing with
respect to Cloud. |
Keywords |
Testing, Cloud Testing,
Cloud Testing Challenges, Answers to Cloud Testing |
Source |
International
Journal of Reviews in Computing |
pp 67-71 |
Vol. 9 |
Full Text |
Title |
WEB USAGE MINING USING NEURAL
NETWORK |
Authors |
ANSHUMAN SHARMA |
Abstract |
Web usage mining attempts to
discover useful knowledge from the secondary data obtained from the
interactions of the users with the Web. Web usage mining has become very
critical for effective Web site management, business and support
services, personalization, and network traffic flow analysis and so on.
Web usage mining has become very critical for effective Web site
management, creating adaptive Web sites, business and support services,
personalization, and network traffic flow analysis and so on. The study
of ant colonies behavior and their self-organizing capabilities is of
interest to knowledge retrieval/ management and decision support systems
sciences, because it provides models of distributed adaptive
organization, which are useful to solve difficult optimization,
classification, and distributed control problems, among others. Previous
study on Web usage mining using a concurrent Clustering, Neural based
approach approach has shown that the usage trend analysis very much
depends on the performance of the clustering of the number of requests.
In this paper, a novel approach Growing Neural Gas is introduced kind of
neural network, in the process of Web Usage Mining to detect user’s
patterns. The process details the transformations necessaries to modify
the data storage in the Web Servers Log files to an input of GNG. |
Keywords |
Web Usage Mining,
Clustering, GNG, Web Server Log File |
Source |
International
Journal of Reviews in Computing |
pp 72-78 |
Vol. 9 |
Full Text |
|
|
Publish your quality research
in
Sister JOURNALS
Journal of Theoretical and Applied Information Technology
(JATIT)
www.jatit.org
|