IJCER Online Submission
IJCER Paper Submission Format
Publication Charges - IJCER

Frequency: 12 issues per year
ISSN: 2250–3005 (online version)
Published by: IJCER
Call for paper...

International Journal of Computational Engineering Research

(IJCER)

 

Articles

 

Research Article  open access
Instant fracture detection using ir-rays
N.Revathy, H.Srinivasan, B.Arun, K.Manikandan
India
Paper Indexed : :03.3005/0540105
International Journal of Computational Engineering Resaerch, Volume 05 ~ Issue 04 (April 2015)

Abstract

Automatic detection of fractures from IR images is considered as an important process in medical image analysis by both orthopedic and radiologic point of view. X-Ray is one of the oldest and frequently used devices, as they are non-invasive, painless and economical. A bone x-ray makes images of any bone in the body and a typical bone ailment is the fracture, which are cracks in bones. Detection and correct treatment of fractures are considered important, as a wrong diagnosis often lead to ineffective patient management, increased dissatisfaction and expensive litigation. This paper proposes a fusion-classification technique for automatic fracture detection from bones, in particular the hand bones. The proposed system has four steps, namely, preprocessing, segmentation, feature extraction and bone detection, which use an amalgamation of image processing techniques for successful detection of fractures. The results from various experiments prove that the proposed system is shows significant improvement in terms of detection rate and speed of classification.

Keywords:Preprocessing, Segmentation, Filtering, Thinning, Classifiers.

 

Research Article  open access
Ultrasonic velocity and allied parameters of tetrahexylammonium iodidein binary mixtures of N, N-dimethylformamide and ethylmethylketone at different temperatures
Baljeet Singh Patial
India
Paper Indexed : : 03.3005/05406012
International Journal of Computational Engineering Resaerch, Volume 05 ~ Issue 04 (April 2015)

Abstract

Ultrasonic velocity, viscosity and density studies on solution of tetrahexylammonium Iodide (Hex4NI) have been carried out in N,N-dimethylformamide (DMF), ethylmethylketone (EMK) and DMF-EMK solvent mixtures containing 0, 20, 40, 60, 80 and 100 mol % of DMF at 298, 308 and 318K. From the velocity, viscosity and density data values, various parameters namely, the adiabatic compressibility (β), Intermolecular free length (Lf), specific acoustic impedance (Z), free volume (Vf), internal pressure (πi)and relaxation time (τ) have been calculated. All these parameters have been discussed separately to throw light on the solute-solvent and solvent-solvent interactions.

Keywords:Adiabatic compressibility, intermolecular free length, specific acoustic impedance, free volume, internal pressure, relaxation time.

Research Article  open access
Survey on Fitness Centres Automation and Development of Mobile Application for Android Platform
Saritha AN , Saumya Shreya , Anuj Raghuram , Jagriti Pandey
India
Paper Indexed : :03.3005/054013019
International Journal of Computational Engineering Resaerch, Volume 05 ~ Issue 04 (April 2015)

Abstract

This paper contains the details of research and market survey carried out for the creation of an Android application that automates a fitness centre's entire business process. The various problems faced at different fitness centres are discussed along with relevant proposed resolutions for the same. A comparison of various mobile platforms has been made concluding that android is the most favourable for this application development.

Keywords:Fitness Centre, Business Process Automation, Mobile Application, Android SDK, Cross Platform Tools

Research Article  open access
Key Establishment using Selective Repeat Automatic Repeat Request Mechanism for Wireless Sensor Networks
IshwaryaMathi Manickavasagam, Madan Mohan Anbalagan, InduMathi Manickavasagam
India
Paper Indexed : :03.3005/054020025
International Journal of Computational Engineering Resaerch, Volume 05 ~ Issue 04 (April 2015)

Abstract

In Key pre-distribution techniques for security provision of Wireless Sensor Networks, a diminutive number of keys are randomly chosen from a large key pool and loaded on the sensors prior to deployment such that they have a common key. Secret keys generated are then placed in sensor nodes, and each sensor node ransacks the area in its communication range to find another node to communicate. A secure link is established when two nodes discover one or more common keys, and communication is done on that link between those two nodes. Few neighboring sensors do not share any common key. To establish secure link in such networks, a secret key is exchanged via a multi-hop secure path. But sensors may be compromised on the path rendering process insecure. This paper sets forth a research plan for an enhanced Modified Incremental Redundancy Transmission scheme that uses Selective Repeat Automatic Repeat Request mechanism to address the problem. Through multiple multi-hop paths, the information is transmitted. Only when the destination fails to decode the information, erroneous frame are transmitted to reduce the transmission overhead.

Keywords:Wireless sensor networks, key predistribution, randomness, selective repeat.

Research Article  open access
Non-Invasive Blood Glucose Measurement
Megha C. Pande , Prof. A. K. Joshi
India
Paper Indexed : :03.3005/054026028
International Journal of Computational Engineering Resaerch, Volume 05 ~ Issue 04 (April 2015)

Abstract

The method for noninvasively blood glucose monitoring system is discussed in this paper. Lot of research work has been done in developing the device which is completely non-invasive to avoid the pros & cons because of frequent pricking. In this paper we are trying to analyse the non-invasive blood glucose measurement study in the near infrared region which is the most suitable region for blood glucose measurement. For this purpose we use a technique which is similar to pulse oximetry based on near infrared spectrometry .An infrared light of particular wavelength is passed through fingertip containing an arterial pulse component Thus minimizing influences of basal components such as resting blood volume,skin, muscle and bone.

Keywords:Glucose measurement, Non-invasive, Photoplethysmography (PPG), Pulse-oximetry, Infrared, Optical, Diabetes.

Research Article  open access
E-University Environment Based on E-management
Ghazi.I. Raho || Muzhir Shaban Al-Ani || Khattab M. Ali Al-Heeti
Jordan
Paper Indexed : :03.3005/054029034
International Journal of Computational Engineering Resaerch, Volume 05 ~ Issue 04 (April 2015)

Abstract

The management of resources and processes using communication networks may call e-management. This work presented an e-management approach at the university environment. This approach including, the control off all flow of data (incoming and out coming) in addition of data protection in which data are separated in different sits. A check list questionnaire is implemented for data collection from different levels of staff at the computer sciences faculty of the indicated University. The obtained results indicated that (50.75 %) of the tested sample are accepted the new environment of management and the other percentage (49.25 %) is not satisfy with this environment for many reasons such as lack in the use of computer, lack of familiarity with the internet, the culture of the community is limited on the use of e-management and there is lack of potential in providing the infrastructure require for the project of e-management.

Keywords:E-management-university-administration, E-learning and E-government.

Research Article  open access
Accident Avoidance and Privacy-Preserving in V2R Communication using Chord Algorithm
G.Kalpana || R.Monika
India
Paper Indexed : :03.3005/054035039
International Journal of Computational Engineering Resaerch, Volume 05 ~ Issue 04 (April 2015)

Abstract

Road accidents are the main issue and it creates a huge loss. So it's the challenging one in VANET in real time applications [20]. Here Vehicular Ad-Hoc Networks (VANETs) uses moving cars as nodes and acts as a wireless router in a network [11, 19]. It can communicate by using either V2V (vehicle-to-vehicle) or V2R (vehicle-to-roadside). The problem faced in vehicle-to-vehicle communication cannot lead to malicious attacks and it's tough in computing real time road conditions. By overcoming this problem vehicle-to-roadside infrastructure is used [14, 18]. Our aim in this paper is to improve security, traffic throughput and reduces the traffic delay in a highly congested area [15, 16]. In this paper network checks each vehicle speed for avoid accident based on predecessor and successor vehicle's speed using chord algorithm. We also implementing priority based vehicle movement. Network gives high priority for emergency vehicles and medium priority for registered vehicles and low priority for unregistered vehicles [17]. By this we analyze the performance of priority based vehicle movement and verification of vehicle speed using chord algorithm in network simulator-2.

Keywords:VANET, GPS, Routing Protocols, V2R, Chord Algorithm.

Research Article  open access
Image Authentication Using Digital Watermarking
Dr. Bhupesh Kumar Singh || Tanu Dua
India
Paper Indexed : :03.3005/054040046
International Journal of Computational Engineering Resaerch, Volume 05 ~ Issue 04 (April 2015)

Abstract

Watermarking is a technology used to embed some kind of information inside a digital content (text, image, audio or video) using different techniques. The embedded information depends upon the application. Watermark should be robust and imperceptible. Robustness of watermark can be explained in terms of successful recovery of watermark from recovered content which may contain different types of noises and compression effects. After recovering the watermark, the recovered and original watermarks are compared by calculating of similarity factor (SMF) of these two watermarks. If the similarity factor is closer to one than we can conclude that the content is original and/or authenticated. This paper entails the study of watermarking technique and delve deeper to improve the robustness of the image. To achieve this, a detailed insight is provided into few techniques explaining each one as a comprehensive step by step procedure and calculating SMF and Peak signal to Noise ratio (PSNR) for different samples considering various attacks.

Keywords:Authentication, Watermarking, Discrete Cosine Transform, Noise Attacks, Similarity Factor, Peak Signal to Noise Ratio

Research Article  open access
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routing (AODV) and Optimized Link State Routing (OLSR) Protocol for Mobile Ad-hoc Networks in NS-2
Bhushan Ramesh Ratnaparakhi|| Prof. Ranjana R. Gite|| Prof. Dattatray S. Babe
India
Paper Indexed : :03.3005/054047057
International Journal of Computational Engineering Resaerch, Volume 05 ~ Issue 04 (April 2015)

Abstract

Some years before Mobile Ad hoc Networks are not so popular. After some period of time wireless mobile network are very popular due to its unique features. Mobile Ad hoc Network is the one of the branch in wireless networks is shortly known as (MANETs). MANET is a collection of available communication devices or nodes that wish to communicate without any fixed infrastructure or pre define organization of available links. This MANETs research program has mainly focused on developing an efficient routing mechanism in such a highly dynamic and resource constrained network [2]. All routing protocols have assumed to be a trusted and safe for environment. This comparative performance evaluation project work is related to various Mobile Ad hoc Networks (MANETs) routing protocols such as Ad-hoc on Demand Distance Vector Routing (AODV), Dynamic Source Routing (DSR) and Optimized Link State Routing (OLSR). On the bases of different routing protocols as mention earlier we can stimulate using network simulator software which generate different graph as result. And then see comparative analysis effects on routing protocol parameters for Mobile Ad-hoc Networks (MANETs) on the bases of various simulation environments such as area, number of node, testing field, traffic load etc. Following parameters are considered for comparative performance evaluations are Routing Overhead, End-to-End Delay, Scalability and Throughput. This comparative performance study mainly performed between Ad-hoc on Demand Distance Vector Routing (AODV) and Optimized Link State Routing (OLSR). This above mentioned work shows that which routing protocols is best among them and study the graphs obtain in Network stimulating software (NS-2) for Mobile Ad-hoc Networks (MANETs) on the bases of comparative performance evaluation parameters. AODV and OLSR comparison gives the result, which routing protocol is superior among them using NS-2 and this work concludes as a result.

Keywords:Area, AODV, End-to-End Delay, MANETs, Number of Node, Network Simulator 2 (NS-2), OLSR, Routing overhead, Routing Protocols