IJCER Online Submission
IJCER Paper Submission Format
Publication Charges - IJCER

Frequency: 12 issues per year
ISSN: 2250–3005 (online version)
Published by: IJCER
Call for paper...

International Journal of Computational Engineering Research

(IJCER)

 

Articles

 

Research Article  open access
The Aerial Wetted Path of Geostationary Transmission
Luis G. Hidalgo|| Jesús A. Hidalgo|| Antonio Vidal
Estado Miranda
Paper Indexed : : 03.3005/xxxxxx
International Journal of Computational Engineering Resaerch 2014, Volume 4 ~ Issue 12 (December 2014)

Abstract

The aerial effective wetted path of geostationary satellite transmission focused to the Earth´s surface was both defined taking into account the warm sector of rainy cloud and estimated as a function of signal strength. A standard path of 4.88 km was obtained for Caracas with a 60 cm dish parabolic receptor pointing with a 55° elevation angle to an associated direct TV satellite in Ku band. Such function helps to estimate rainfall intensity with ±3 mm/h bulk error for stormy weather. Myriad of users of direct TV and other satellite applications with theirs receptors providing signal strength may apply the present issue to estimate paths and rain rates but doing verifications and adjusts by new coordinates and new dish sizes.

Keywords:Wetted, path, satellite, rainfall, geostationary, signal, strength

 

Research Article  open access
The Impact of Interstitial Carbon on Dislocation Motion in the alpha-Fe Lattice
K. D. Njoroge|| G. O. Rading || J. M. Kihiu || M. J. Witcomb|| L. A. Cornish
South Africa
Paper Indexed : : 03.3005/xxxxxx
International Journal of Computational Engineering Resaerch 2014, Volume 4 ~ Issue 12 (December 2014)

Abstract

The effect of the introduction of interstitial carbon into the -Fe lattice on the behavior of dislocation cores is presented. The simulations carried out were based on an EAM formulation that generated stress cycles resulting from the movement of dislocations, caused by the rigid displacement of rows of atoms on one side of a slip plane. The "path of least resistance" (POLR) mechanism accounting for stress evolution at the dislocation core was applied to predict the Peierls stress. This paper presents the behavior of the edge and screw dislocations in the Fe-C lattice.

Keywords:Embedded atom method; Body centered cubic; Dislocation cores; Peierls stress; Path of least resistance (POLR).

 

Research Article  open access
An Efficient approach of Integrated file Replication and Consistency Maintenance In peer-to-peer systems
R.Sakunthala jenni|| Dr.T.Pandikumar||G.S.Aiswarya
India
Paper Indexed : : 03.3005/xxxxxx
International Journal of Computational Engineering Resaerch 2014, Volume 4 ~ Issue 12 (December 2014)

Abstract

Peer-to-Peer is a decentralized system which is well known for its high scalability and reliability. So applications on a P2P system are used widely now days. For high system performance of this peer-to-peer file sharing systems, file replication and consistency maintenance are widely used techniques. These two techniques are intimately connected to each other. File replication needs consistency maintenance to keep the consistency between a file and its replicas, and on the other hand, the overhead of consistency maintenance is determined by the number of replicas. Connecting the two important components will greatly enhance system performance. Traditional file replication and consistency maintenance methods either are not sufficiently effective or incur prohibitively high overhead. To overcome these, IRM (Integrated file Replication and Consistency Maintenance inP2P systems) can be used which will achieve high efficiency at a significantly lower cost. Instead of passively accepting replicas and updates, nodes autonomously determine the need for file replication and validation based on file query rate and update rate. It guarantees the high utilization of replicas, high query efficiency and fidelity of consistency. IRM reduces redundant file replicas, consistency maintenance overhead, and unnecessary file updates.

Keywords:Consistency Maintenance, File Replication, Replica Node, Peer-to-Peer.

 

Research Article  open access
Detecting of NH3, CO2 polluted gases by using ZnO- In2O3 thin films
Dr. Shatha Shammon Batros|| Dr. Ghada Sabah Karam
Iraq
Paper Indexed : : 03.3005/0xxxxxx
International Journal of Computational Engineering Resaerch 2014, Volume 4 ~ Issue 12 (December 2014)

Abstract

Polycrystalline ZnO-In2O3 thin films for gas sensor were prepared on to glass substrates by using spray pyrolysis method from solution of 0.1 M ZnCl2 and 0.1M InCl3 at 300oC temperature and 100 course of spray. A number of techniques including X-ray diffraction (XRD), atomic force microscope (AFM) and scanning electron microscope (SEM) are used to study the morphology of ZnO-In2O3 thin films. Polycrystalline structured of as-obtained films was confirmed by using these techniques. Optical properties, and sensitivity of thin film to NH3, CO2 gases was also studied.

Keywords:Thin films, crystalline structure, ZnO-IN2O3 thin films, sensors.

 

Research Article  open access
Implementation of Elliptic Curve Digital Signature Algorithm Using Variable Text Based Message Encryption with Message Digest
Rajasekhar Bandapalle Mulinti|| Dr.G.A.Ramachandra
INDIA
Paper Indexed : : 03.3005/0xxxxxx
International Journal of Computational Engineering Resaerch 2014, Volume 4 ~ Issue 12 (December 2014)

Abstract

Digital Signatures are considered as digital counterparts to handwritten signatures, and they are the basis for validating the authenticity of a connection. It is well known that with the help of digital signature, forgery of digital information can be identified and it is widely used in e-commerce and banking applications. Elliptic curve digital signatures (ECDSA) are stronger and ideal for constrained environments like smart cards due to smaller bit size, thereby reducing processing overhead. We have implemented ECDSA over Elliptic Curve (EC) P-192 and P-256 using various Text Message encryptions which are Variable Size Text Message(VTM), Fixed Size Text Message(FTM) and Text Based Message(TBM) encryption methods and compared their performance. In the existing Variable Text Based Message used the plain message for generating digital signature but in the new approach, we have converted plain message to digested message using SHA algorithm and then created digital signature which is more faster than existing approach.

Keywords:Digital Signature, Elliptic Curve Digital Signature Algorithm, Elliptic Curve Cryptography, ECDLP.