IJCER Online Submission
IJCER Paper Submission Format
Publication Charges - IJCER

Frequency: 12 issues per year
ISSN: 2250–3005 (online version)
Published by: IJCER
Call for paper...

International Journal of Computational Engineering Research

(IJCER)

 

Articles

 

Research Article  open access
Multi-Layer Data Security in Cloud Computing
Lovejeet Kamboj || Pawan Luthra
India
Paper Indexed : : 03.3005/xxxxxxx
International Journal of Computational Engineering Resaerch, Volume 07 ~ Issue 10 (October – 2017)

Abstract

In the digital world, the users stores digital data on clouds and according to requirement access the data. So, authentication and confidentially is a big concern. To resolve these attacks cryptography and steganography algorithms are used. In this paper, an overview of cloud, its architecture, and attacks defined. Also, a literature survey is done and based on survey a multi-layer security algorithm is designed by hybrid the cryptography and steganography algorithm. Moreover, the performance analysis is done on the basis of correlation factor, MSE and PSNR values.

Keywords: Cloud Attacks, Security, MSE, PSNR, Cryptography, Steganography.

Research Article  open access
Heat Dissipation in Control Panel using Heat Pipe
Karan Hingmire
India
Paper Indexed : : 03.3005/xxxxxxx
International Journal of Computational Engineering Resaerch, Volume 07 ~ Issue 10 (October – 2017)

Abstract

This experiment consist design and develops of an add-on for a control panel which is fitted with heat pipes which helps in better heat dissipation inside the control panel obstructing failure of the control panel due to overheating and also due to fouling of the components inside the control panel. It can provide a better add-on for an industrial control panel that would not have frequent failures in which heat dissipation is achieved by using forced convection where fans suck out the air which blows over the hot end of the heat pipe thus bringing in a massive heat dissipation rate which is effective. This also helps in avoiding the fouling of the components which are fixed inside the control panel...........

Keywords: Minimum 7 Control panel, Compatibility, Effectiveness Fan, Formulas, Heat Pipe, Heat Dissipation, working.

Research Article  open access
An Enhanced Steganography Method For Digital Images
Sandeep Kaur || Dr.Akshay Girdhar
India
Paper Indexed : : 03.3005/xxxxxxx
International Journal of Computational Engineering Resaerch, Volume 07 ~ Issue 10 (October – 2017)

Abstract

Steganography is derived from the Greek word steganographic which means covered writing. Steganography is defined as the study of imperceptible communication. Steganography abstractly implies that the message to be transmitted is not visible to the eye. The main objective of steganography is essentially concerned with the protection of hidden information. Security of confidential information has always been the intent theme for researchers to send data without revealing it to anyone other than the receiver. In the proposed work, a superior technique of image steganography i.e. LSB (Least Significant Bit) with RSA and DCT (Discrete Cosine Transform) with RSA algorithm has been implemented...........

Keywords: Steganography, Image Steganography, cryptography, and stego image.

Research Article  open access
Soft Computing Approaches for Automated Software Testing
Pradeep Kumar
India
Paper Indexed : : 03.3005/xxxxxxx
International Journal of Computational Engineering Resaerch, Volume 07 ~ Issue 10 (October – 2017)

Abstract

Software testing is most widely used techniques for achieving high quality software. Software testing is done to detect presence of faults, which upon execution causes software failure. Testing the software is time consuming and expensive too. It consumes almost 50% of the software system development resources. Software testing can be defined as process of verifying and validating software to ensure that software meets the technical as well as business requirements as expected. Verification is done to ensure that software meets specification and is close to structural testing whereas validation is close to functional testing done by executing software under test. Testing can be done either manually or automatically by using testing tools............

Keywords: Software Testing, Artificial Neural Network (ANN), Genetic Algorithm (GA), Fuzzy Logic (FL), Software metrics.

Research Article  open access
Ballistic Analysis of Composite Materials
P. Sugandhan || S.Thirumavalavan
India
Paper Indexed : : 03.3005/xxxxxxx
International Journal of Computational Engineering Resaerch, Volume 07 ~ Issue 10 (October – 2017)

Abstract

Laminated ballistic composite may be used in protective helmets or with ceramics and other materials like fiber reinforced polymers (FRP) for protective body amour. It is used in several industries such as Aviation sector, defense and general purpose Helmet making industries. It requires several high cost equipment for the testing and analyzing of the material. While the use of computer simulation software like ANSYS help researchers to analyze these type of problems very easily. The failure of an alloy of Structural Steel, Carbon composite and E-Glass are analyzed under high-velocity impact of round tool of different materials using the FEM software, ANSYS Workbench 15. Impact velocity of 300 m/s was analyzed by FEM simulation. In this analysis the thickness of the plate was kept constant but the layer of the plate was changed.

Keywords: Ballistic Analysis, Composite, Finite Element Method.

Research Article  open access
Comparative Analysis of Image Decomposition and Feature Matching Techniques for Copy Move Forgery Detection
Rupinder Kaur || Dr.Reecha Sharma
India
Paper Indexed : : 03.3005/xxxxxxx
International Journal of Computational Engineering Resaerch, Volume 07 ~ Issue 10 (October – 2017)

Abstract

With the advancement of technology and easy availability of image editing tools it has become very easy to temper or manipulate the digital images in order to hide some information in image. Image forgery detection at present is among the hot research fields of image processing. Copy move forgery is the technique people are frequently making use of it. In this paper there is comparative analysis of techniques for image enhancement and feature matching which are fundamental steps in various algorithms which are used for copy move forgery detection.

Keywords: SWT (Stationary Wavelet Transform), DWT (Discrete Wavlet Transform), Conventional block matching, phase correlation, block feature matching, SIFT (Scale Invariant Feature Transform), DCT (Discrete Cosine Transform).

Research Article  open access
Development of Multicarrier SPWM Techniques for Cascaded MLI
M.Dharani Devi || M.Malarvizhi || R.Nagarajan
India
Paper Indexed : : 03.3005/xxxxxxx
International Journal of Computational Engineering Resaerch, Volume 07 ~ Issue 10 (October – 2017)

Abstract

In this paper, investigates and analysis the performance of the novel pulse width modulation techniques which uses unipolar sine carrier waveform and staircase carrier waveform are proposed for five-level cascaded inverter. In each carrier waveform, different techniques such as phase disposition (PD), inverted phase disposition (IPD), phase opposition disposition (POD) and alternative phase opposition disposition (APOD) are implemented. The fundamental output voltage and harmonics obtained in each method are compared with the output waveform obtained with the triangular carrier waveform. The different PWM methodologies adopting the constant switching frequency multicarrier with different modulation indexes are simulated for a 1kW, 3φ cascaded multilevel inverter using MATLAB/SIMULINK and the effect of switching frequency on the fundamental output voltage and harmonics are also analyzed. The proposed switching technique enhances the fundamental component of the output voltage and reduces the total harmonic distortion.

Keywords: Modulation Index (MI), Staircase Multicarrier SPWM (SCMC SPWM), Total Harmonic Distortion (THD), Triangular Multicarrier SPWM (TMC SPWM), Unipolar Sine Multicarrier SPWM (USMC SPWM).

Research Article  open access
Wireless Ad Hoc Network: A Perspective on Issues and Challenges
Kavita Bhatnagar
India
Paper Indexed : : 03.3005/xxxxxxx
International Journal of Computational Engineering Resaerch, Volume 07 ~ Issue 10 (October – 2017)

Abstract

Wireless ad hoc networks consist of nodes that communicate over a typical wireless channel. Contrary to cellular networks, the nodes are not supported by any type of additional infrastructure, such as base stations, a wired backbone, a central network controller, etc. In this paper we surveyed the different types of ad hoc networks such as isolated ad hoc networks with large and small sizes and integrated ad hoc networks for the mobile access networks. We also have discussed some critical issues that must be overcome for this network paradigm to attain its full potential. In addition, this paper also introspect ad hoc networks challenges in terms of security and reviewed a certificate-based authentication scheme for wireless ad hoc network to deliver a robust and ubiquitous security support

Keywords: Cellular Topology; Issues, MANET, Nodes, Performance, Security, Wireless Ad Hoc.

Research Article  open access
An Optimization Algorithm That Simultaneously Calculates Maximally Different Alternatives
Julian Scott Yeomans
Canada
Paper Indexed : : 03.3005/xxxxxxx
International Journal of Computational Engineering Resaerch, Volume 07 ~ Issue 10 (October – 2017)

Abstract

When solving "real world" optimization applications, it is generally preferable to formulate several quantifiably good alternatives that provide distinct perspectives to the particular problem. This is because decision-making typically involves complex problems that are riddled with incompatible performance objectives and contain competing design requirements which are very difficult – if not impossible – to capture and quantify at the time that the supporting decision models are actually constructed. There are invariably unmodelled design issues, not apparent at the time of model construction, which can greatly impact the acceptability of the model's solutions. Consequently, it is preferable............

Keywords: Biologically-inspired Metaheuristics, Firefly Algorithm, Modelling to generate.

Research Article  open access
Slots and Notch Loaded Rectangular Stacked Microstrip Antenna for Multiband Operations
Saiyed Salim Sayeed || J.A.Ansari || Mukesh kumar || Gulman || Abhishek
India
Paper Indexed : : 03.3005/xxxxxxx
International Journal of Computational Engineering Resaerch, Volume 07 ~ Issue 10 (October – 2017)

Abstract

This paper presents a slot loaded compact stacked multiband patch antenna. The designed antenna consists of two patches. The stacked patch is made on Bakelite substrate and feed patch is made on FR-4 substrate. The multiband behavior of antenna is due to stacked structure, loaded slots and notches on feed patch of the antenna. The designed antenna operates at resonating frequencies of 1.27 GHz, 1.72 GHz, 3.66 GHz, 4.7 GHz, 5.34 GHz, 5.88 GHz and 6.6 GHz with fractional bandwidth of 4.88%, 6.56%, 2.73%, 3.61%, 4.49%, 5.78% and 6.36% respectively, is suitable for mobile communication (1.2/1.7 GHz), WiMAX (3.5/4.8GHz), WLAN (5.2/5.8 GHz) and satellite communication (6.5 GHz). Experimental results show that the antenna gives good gains and radiation efficiencies over the operating bands. There is a good agreement between the measured and simulated results.

Keywords: Minimum Defected ground structure, stacked patch, multiband, WiMAX, WLAN, microstrip patch antenna, IE3D.