IJCER Online Submission
IJCER Paper Submission Format
Publication Charges - IJCER

Frequency: 12 issues per year
ISSN: 2250–3005 (online version)
Published by: IJCER
Call for paper...

International Journal of Computational Engineering Research

(IJCER)

 

Articles

 

Research Article  open access
Effect Of Concentration Of Alkaline Liquid On Strength Of Geopolymer Concrete
Kai.Kannan || R Vijaya Kumar
India
International Journal of Computational Engineering Research, Volume 08 ~ Issue 03 (March – 2018)

Abstract

Geopolymer Concrete (GPCs) is a new class of concrete based on an inorganic alumino-silicate binder system compared to the hydrated calcium silicate binder system of concrete. It possesses the advantages of rapid strength gain, elimination of water curing, good mechanical and durability properties and is eco-friendly and sustainable alternative to Ordinary Portland cement (OPC) based concrete. In the construction industry mainly the production of Portland cement causes the emission of air pollutants which results in environmental pollution. Geopolymer concrete are non Portland cement based binders with alkaline activation of industrial wastes such as fly ash and GGBS (Ground Granulated Blast furnace Slag), Sand and Coarse aggregates.............

Keywords: Ground Granulated Blast furnace Slag, Fly Ash, Alkaline Liquids, Sand, Coarse aggregate, Compressive Strength, Split Tensile Strength.

Research Article  open access
Modelling and Dynamic Study of Cholera Epidemics in Far North Region of Cameroon
Tchule Nguiwa || Mibaïlé Justin || Djaouda Moussa || Gambo Betchewe || Alidoumouhamadou
Cameroon
International Journal of Computational Engineering Research, Volume 08 ~ Issue 03 (March – 2018)

Abstract

Cholera continues to emerge in Far North Region of Cameroon and remains an important health challenge. In this work, dynamical system of mathematical model obtained from existing techniques of modelling was studied. The various numerical values obtained such as eigenvalues and basic reproduction number determine the stability of equilibrium points. Cholera epidemiological data given by the Regional Delegation of Health of Far North Region (Cameroon) allowed us to obtain the results using MATLAB software to implement the discretisation of the RungeKutta 4 (RK4) method. The numerical simulations lead us to predict the dynamics of population in the various compartments of the SIR-B cholera transmission model........

Keywords: Cholera, Vibrio cholera, Epidemiology, Dynamical, Modeling, Stability, Basic Reproduction Number.

Research Article  open access
Analysis of Some Job Scheduling Algorithms In Cloud Computing Environment
Rajendra T. Kaple
India
International Journal of Computational Engineering Research, Volume 08 ~ Issue 03 (March – 2018)

Abstract

Cloud Computing is the new IT term that makes the availability of computing resources (Hardware and Software), applications and data as a service over the internet to its clients. Cloud computing largely expected to offer consistent, vibrant and virtualized services in terms of resources for doing computation, storage, and data sharing. An important requirement in cloud computing is scheduling of jobs to be accomplished within some given metrics or limits. In Cloud computing, finishing of tasks requires various resources which are available to them by filling certain constraints like best performance, minimum execution time, shortest response time, fault-tolerance and quality of expected services. The scheduler should command the jobs in a way where the steadiness between refining the quality of services and at the same time protecting the effectiveness and fairness of the jobs. Thus, in large-scale dispersed systems, the performance assessment of the algorithm is important. Here, our main objective is to learn various job scheduling algorithms.

Keywords: Algorithms, Cloud, Data Centre, IaaS, Job Scheduling, Resource Selection, Virtual Machines.

Research Article  open access
"Network of Computers to Analyze Data Using Grid Computing"
Subhashree sukla || Satyabrata dash || Rakhi jha
India
International Journal of Computational Engineering Research, Volume 08 ~ Issue 03 (March – 2018)

Abstract

A scientist studying proteins logs into a computer and uses an entire network of computers to analyze data. A businessman accesses his company's network through a PDA in order to forecast the future of a particular stock. An Army official accesses and coordinates computer resources on three different military networks to formulate a battle strategy. All of these scenarios have one thing in common: They rely on a concept called grid computing. At its most basic level, grid computing is a computer network in which each computer's resources are shared with every other computer in the system. Processing power, memory and data storage are all community resources that authorized users can tap into and leverage for specific tasks. A grid computing system can be as simple as a collection of similar computers running on the same operating system or as complex as inter-networked systems comprised of every computer platform you can thinkof..

Keywords:Grid, Cloud, Distributed computing.

Research Article  open access
A Survey of Job Scheduling and Management Resources in Grid Computing System
Subhashree sukla || Geetidarshinipanigrahi || Rajeshkumar pati
India
International Journal of Computational Engineering Research, Volume 08 ~ Issue 03 (March – 2018)

Abstract

Grid computing is a form of distributed computing that involves coordinating and sharing computational power, data storage and network resources across dynamic and geographically dispersed organizations. Scheduling onto the Grid is NP-complete, so there is no best scheduling algorithm for all grid computing systems. An alternative is to select an appropriate scheduling algorithm to use in a given grid environment because of the characteristics of the tasks, machines and network connectivity. Job and resource scheduling is one of the key research area in grid computing. The goal of scheduling is to achieve highest possible system throughput and to match the application need with the available computing resources. Motivation of the survey is to encourage the amateur researcher in the field of grid computing, so that they can understand easily the concept of scheduling and can contribute in developing more efficient scheduling algorithm. This will benefit interested researchers to carry out further work in this thrust area of research..

Keywords: Grid Computing, Job Scheduling, Resource Scheduling.

Research Article  open access
A Survey on the usability of available Big Data platforms and its industry trends
Bhupesh deka || Khitish kumar gadnayak || Sitanath biswas
India
International Journal of Computational Engineering Research, Volume 08 ~ Issue 03 (March – 2018)

Abstract

In today's Knowledge economy, Big Data has become the de-facto technology for organization for analysis, prediction, decision making, customer delight and growth. The need for quick understanding and delivering the solution based on the problem dimension is continuously evolving. The selection of the right platform for the right kind of problem is the key to success. Organization is spending time, money and enormous effort in identifying the right kind of platform. This paper provides a comprehensive analysis and assessment of the available platforms to aid the researchers and developers to select the right kind of platform based on the problem domain..

Keywords: Big Data, Analytic, Platform, Technology.

Research Article  open access
Evidence, Cultural Influences and the Possibility of Social Stigma
Dr.saarojkumar rout || Nedunchezhian.t || Sitanath biswas
India
International Journal of Computational Engineering Research, Volume 08 ~ Issue 03 (March – 2018)

Abstract

Targeted social distancing evidence supported by COVID-19 could be a successful way to minimise morbidity and mortality, but could inadvertently raise stigma in affected communities. We need to be mindful of the reality of COVID-19, the societal consequences and the potential for stigmatisation of communities impacted by COVID-2019 as health care providers.The real economic effect of missed working days due to quarantine and social isolation efforts, as well as travel limitations that can adversely affect access to care and the ability to pay for care, is crucial to remember. Stigmatization may be minimised by measures aimed at providing general education on the disease and the basis for quarantine and public health information given to the general public.The risk of stigmatisation among....

Keywords:coronaviruses, COVID, respiratory,.

Research Article  open access
Data Security in Local Area Network using Policy Distribution
Rajesh Kumar Pati || Satyabrata Dash || Pratyush Ranjan Mohapatra
India
International Journal of Computational Engineering Research, Volume 08 ~ Issue 03 (March – 2018)

Abstract

With tremendous increase in internet connection, the data security is important aspect for researchers and developers. The importance of network security increases as the use of internet increases for communication, data transfer. Thesecurity can be achieved by firewall. The conventional firewall is placed between the two network or entry point of one of the network. So, the data comingin the network is coming fromsinglesecureentry point and as the firewall is at the entry point of the network all inside the network are trusted. To remove the shortcomings of traditional firewalls, the concept of a "distributed firewall" has been proposed. In this scheme, security policy is still centrally defined, but enforcement is left up to the individualendpoints.

Keywords:Distributed Firewall; Network Security; Pull Technique; Push Technique; Policy Distribution.

Research Article  open access
Cloud-Based Password Manager for Web Browser
Dr. Sasmita Pani || Jayarajan || Dr.Aurobindo Kar
India
International Journal of Computational Engineering Research, Volume 08 ~ Issue 03 (March – 2018)

Abstract

Web users are confronted with the daunting challenges of creating, remembering, andusing more and more strong passwords than ever before in order to protect their valuableassets on different websites. Password manager, particularly Browser-based PasswordManager (BPM), is one of the most popular approaches designed to address these challenges by saving users' passwords and later automatically filling the login forms on behalfof users. Fortunately, all the five most popular Web browsers have provided passwordmanagers as a useful built-in feature. In this paper, we uncover the vulnerabilities ofexisting BPMs and analyze how they can be exploited by attackers to crack users' savedpasswords.........

Keywords:.......