IJCER Online Submission
IJCER Paper Submission Format
Publication Charges - IJCER

Frequency: 12 issues per year
ISSN: 2250–3005 (online version)
Published by: IJCER
Call for paper...

International Journal of Computational Engineering Research

(IJCER)

 

Articles

 

Research Article  open access
Behavioural Study and Analysis of a Polycrystalline Solar PV Panel under varying Temperature and Irradiance
Sujo Oommen || Adithya Ballaji || K Narayana Swamy || Ananda M H | Burri Ankaiah
..
Paper Indexed : : 03.3005/xxxxxxx
International Journal of Computational Engineering Research, Volume 09 ~ Issue 1 (January – 2019)

Abstract

In rural India, electricity is an essential factor when it comes to the use for household, lighting along with various agriculture operations. Places like villages where installation of electrical grids become expensive, a smart technique of using renewable energies can be used for household purposes. In this paper, simulation model of PV module was designed and constructed in MATLAB/Simulink. The PV model (I) Current – (V) Voltage characteristics and also (P) Power – (V) Voltage characteristics were performed with different temperature and irradiance values. The paper highlights the effect of temperature and irradiance change on polycrystalline PV Panel. The results were shown in this paper for the simulated system which can be use for rural villages and domestic purposes..

Keywords: ....

Research Article  open access
Photogravitational elliptical magnetic binary problem
Mohd Arif
India
Paper Indexed : : 03.3005/xxxxxxx
International Journal of Computational Engineering Research, Volume 09 ~ Issue 1 (January – 2019)

Abstract

This paper deals with the existence and linear stability of equilibrium points in the photogravitational elliptical magnetic binary problem when the bigger primary is a source of radiation . It is observed that there exists three collinear and two non-collinear equilibrium points We have found that the radiation-pressure of the primary affects the position of the equilibrium points for any combination of the parameters considered here. Further we have observed that the one collinear equilibrium point 𝐿1 is stable while the others collinear and non-collinear equilibrium points are unstable for various values of 𝜇..

Keywords: equilibrium points, elliptical magnetic binary problem, stability. AMS Subject Classification: 70F07.

Research Article  open access
Mathematical modeling on conservation and production of animal species
Namreen Rasool
India
Paper Indexed : : 03.3005/xxxxxxx
International Journal of Computational Engineering Research, Volume 09 ~ Issue 1 (January – 2019)

Abstract

In a multispecies network, the interaction of biotic and abiotic systems in both plant and animal kingdom play a key role for their stability. Most of the warm blood animals including human beings depend upon both plants and animals to meet out carbohydrates, minerals, proteins and other nutrients for their physiological and developmental performances. Thus the demand and conservation rate of both animals and plants species is one of the challenging research area in the present scenario. Human beings mostly living in cold zones, slaughter animals for food purposes to compete with the adverse cold conditions. Thus, it is imperative to study the conservation and production of animal species with optimal slaughter rates. In this direction a mathematical model has been formulated to understand the behaviour and stability of animal species under slaughtering conditions. Slaughter and Conservation rates of animal populations has been established by

Keywords: .....

Research Article  open access
Securing Multi User Authentication in Cloud Computing Using Secret Sharing
Sonali Patil
India
Paper Indexed : : 03.3005/xxxxxxx
International Journal of Computational Engineering Research, Volume 09 ~ Issue 1 (January – 2019)

Abstract

Authentication is the process of determining the truth related to the identity of a person, a software program or ensuring that the product is found to be what its labeling claims to be. There is always a great difference between the process of authentication and authorization. The authentication always tends to the process of verifying that "You are tend to be who you say you are" Where as authorization is the process to providing verification for "You are permitted to do for what you want to do", For example a person having a proper Aadhar card gives the proof indicating the identity of that particular person, The client's who authentication request is permitted, only then he/she is authorized to acquire facilities for an Indian citizen, The process of authentication can be done in different ways depending upon the requirements. The first type of authentication techniques is acceptance....

Keywords: .....

Research Article  open access
Dynamic Random Early Detection-Fuzzy Deep Neural Network Proportional Integral Derivative based Energy-aware Congestion Avoidance for WSN
Monisha V || Dr Ranganayaki T
India
Paper Indexed : : 03.3005/xxxxxxx
International Journal of Computational Engineering Research, Volume 09 ~ Issue 1 (January – 2019)

Abstract

Normally when traffic becomes higher than channel capacity, congestion detection and avoidance is one of the most important challenges in Wireless Sensor Network (WSN). This can cause high packet loss and energy consumption that degrades the entire network performance. As a result, DRED-FDNNPID-CA technique has been proposed to control the congestion by estimating network traffic and adjusting the transmission data rate. However, the network energy consumption was high which reduces the network lifetime. Hence in this article, an Energy-aware Congestion Avoidance (ECA) is a technique proposed to improve the network energy conservation. In this technique, Load-Based Allocation (LBA) is introduced based on the Statistical Time Division Multiple Access (STDMA) which uses time scheduler to collect sensor node information such as memory...........

Keywords: Wireless sensor networks, Congestion avoidance, DRED-FDNNPID, Load based allocation, Statistical time division multiple access.

Research Article  open access
Physico-Mechanical Studies on Graphene based Polymer Matrix Composites
J.Lingaraj || M.Jayavelu || S.T.Saravanan || N.Murugan
India
Paper Indexed : : 03.3005/xxxxxxx
International Journal of Computational Engineering Research, Volume 09 ~ Issue 1 (January – 2019)

Abstract

Composite materials are used in a wide range of applications such as automotive, aerospace and renewable energy industries. To meet the specific strength ton weight ratio. Specific stiffness to weight ratio and cost constrains. The increasing public demand for safety and government regulation has stipulated the researchers to work on composite structure which are weight and has an efficient energy absorbing capability. To fully appreciate the role and application of composite materials to a structure, an understanding is required of the component materials themselves and of the ways in which they can be processed. The main idea of the project is to enhancing the mechanical properties of the material by adding glass fiber & Graphene in engineering application........

Keywords: composite materials, composite structure, graphene.

Research Article  open access
The Impact of Electromagnetic Radiations from Base Stations on Humans
Ifeoma B. Asianuba || Nzewi C. Kennedy
Nigeria
Paper Indexed : : 03.3005/xxxxxxx
International Journal of Computational Engineering Research, Volume 09 ~ Issue 1 (January – 2019)

Abstract

The impact of Electromagnetic radiations (EMR) from base stations on humans has gained tremendous research interest in the past decade. This interest has been necessitated by the proliferations of communication mast in cities due to the large increase in use of communication devices (GSM). The objective of this work is to investigate Choba (a sub urban city) in Rivers state, Nigeria. The work seeks to verify if network providers operate at the required limits and standard, in the radiations emitted from the base transceiver stations to ascertain compliance. Secondly, it further establishes if any health risks exist on humans residing close to the base station since the safety range should be about 300 meters away from each station. Radiation measurements were carried out using cellular mobile network analyzer at the specific base stations in the coverage area.........

Keywords: GSM Base transceiver Station, Radiation level, power density, Electromagnetic radiation.

Research Article  open access
Improved extraction approach of salient object based on visual attention mechanism
Yongmei Zhang || Juxia Li
China
Paper Indexed : : 03.3005/xxxxxxx
International Journal of Computational Engineering Research, Volume 09 ~ Issue 1 (January – 2019)

Abstract

This paper proposed a novel method for salient object extraction based on visual attention. We extract the saliency map by modified Itti's model. A new optimized method to impair the saliency of border area by a location saliency map is propounded. Meanwhile, the input image was segmented by k-means algorithm combining with Hill-climbing algorithm which can give cluster number automatically. The salient object can be obtained by calculating the average saliency of each segmentation area. Experimental results demonstrated that the proposed method is validity and superiority. The results indicate that the salient object is more accurate by the proposed method.

Keywords: Visual attention mechanism, salient object, extraction,Itti model, interesting region. AMS Subject Classification: 05C12.

Research Article  open access
Measurements with thermoelastic technique from infrared microscopy on random trabecular structures
Roberto Marsili || Michele Moretti || Gianluca Rossi || Iva Xhimitiku
Italy
Paper Indexed : : 03.3005/xxxxxxx
International Journal of Computational Engineering Research, Volume 09 ~ Issue 1 (January – 2019)

Abstract

In this paper it is proposed a measurement technique based on differential thermal microscopy based on the application of a thermoelastic measurement system and an infrared zoom optics to analyze stress distribution on a random lattice structure realized by stereolitographic additive techniques. Lattice structures, because of the possibility to be actually easily realized by additive manufacturing techniques, see a growing interest and a lot of application in engineering and medical fields. The possibility to experimentally analyze stress conditions by new full field and non-contact measurement techniques is fundamental to correctly design components made of it, predict its life, optimize performances.

Keywords: Thermoelastic technique, lattice structure, stereolitographic additive techniques, trabecular structures.

Research Article  open access
Basic Concepts for Creating Visual Models
Anthony Spiteri Staines
Malta
Paper Indexed : : 03.3005/xxxxxxx
International Journal of Computational Engineering Research, Volume 09 ~ Issue 1 (January – 2019)

Abstract

This work explains the fundamental principles for simplifying and improving visual modeling. It builds on previous work presented in [1]. Sections I to II discuss software and system development, different types of techniques and modeling approaches are used. Visual modeling is suited to developing systems because these notations are understandable by different stakeholders. Visual modeling can make use of graphs. The paper structured as described: I. Introduction: Information and software systems require the use of methods and notations for proper representation. Unfortunately many users do not appreciate the need for creating suitable and aesthetically good diagrammatic notations II. Motivation and Some Background: Different modeling notations can be used to model systems.........

Keywords: Diagrammatic notations, software engineering, requirements engineering, visual modeling.

Research Article  open access
Embedding Encrypted Image within Video for Secure Transmission
Dhiman Karmakar
India
Paper Indexed : : 03.3005/xxxxxxx
International Journal of Computational Engineering Research, Volume 09 ~ Issue 1 (January – 2019)

Abstract

Different techniques are available for image cryptography and image steganography. This paper proposes a scheme for embedding an image within a video, so that, the perceived quality of the video seems to be unaffected. The secret image is encrypted before embedding in the video. A decryption technique is used to retrieve the original image, in the receiver side. Here, emphasis is imposed on the methodology of embedding the image, rather than on the encryption algorithm used. The image is divided into n subparts or shares for a video consisting of more than n frames. Each of these image-shares is first encrypted and then appended with each video frame, before transit. On recipient's end, the received video is broken down into frames; image share from each of the video frame is extracted and deciphered.

Keywords: Cryptography, Steganography, Watermarking, Data-hiding, Plaintext, Ciphertext, image, video.