IJCER Online Submission
IJCER Paper Submission Format
Publication Charges - IJCER

Frequency: 12 issues per year
ISSN: 2250–3005 (online version)
Published by: IJCER
Call for paper...

International Journal of Computational Engineering Research

(IJCER)

 

Articles

 

Research Article  open access
Method of controlling access to intellectual switching nodes of telecommunication networks and systems
Alexey Smirnov || Mohamad Abou Taam || Sergey Smirnov
Ukraine
Paper Indexed : :03.3005/0550107
International Journal of Computational Engineering Resaerch, Volume 05 ~ Issue 05 (May 2015)

Abstract

The developed method of controlling access to intellectual switching nodes includes a mathematical model of intellectual switching nodes with service information packets of different priority and an improved algorithm to control access to the cloud "of telecommunications resources. Based on multichannel model (CMO) M r M V r K r as well as developed GERT model of intellectual switching nodes carried out the study of functioning information and telecommunication network. The Equivalent W-function, distribution function and density distribution of service time information packets of metadata in intelligent switching nodes when they are transferred to the cloud antivirus systems, it is determined that an additional criterion for attribution information packet "reference" priority can be the value of the probability of assigning priority.

Keywords:Information and Telecommunications Network, GERT-model, access control, intellectual switching nodes.

 

Research Article  open access
AN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORK
Manoj Kumar || Amit Sandhu
India
Paper Indexed : : 03.3005/05508011
International Journal of Computational Engineering Resaerch, Volume 05 ~ Issue 05 (May 2015)

Abstract

The sensor nodes are grouped into clusters and cluster head may be chosen according to some predefined algorithm. Clustering architecture provides a convenient framework for resource management, such as channel access for cluster member, data aggregation, power control, routing, code separation, and local decision making. The aim of our proposed work is to dynamically balancing energy consumption and to enhance the functional lifetime of the network by dynamically scheduling nodes to go for a sleep in each round. Functional life time of the network normally refer to the duration when a percentage of sensors exceeding a threshold (e.g. 80%) have depleted their energy. Medium Access Control (MAC) protocol play an important role in the successful operation of WSNs. The Sensor Medium Access Control (SMAC) is one such protocol that identifies a few source of energy wastage and proposes an adaptive sleep-and-listen scheme to minimize energy wastage. In this we proposes a modified SMAC that attempts to increase energy savings by introducing changes to the existing SMAC protocol. The modified SMAC introduce a clustering mechanism, in which the node form clusters and elect a cluster head. The energy saving achieved with the modified SMAC protocol are primarily due to the increased sleep-time fraction for cluster nodes. The clustering mechanism also reduces control overhead, which is prevalent in the SMAC protocol due to the periodic control packet exchanges. In our work, energy consumption is analyzed with respect to time for a reactive protocol and a proactive protocol such as AODV and DSDV and concluded that our proposed modified-SMAC consumed less energy in both the cases.

Keywords:—MAC,SMAC,WSN,AODV,DSDV.

Research Article  open access
COHESIVE ENERGY AND SPECTROSCOPIC CONSTANTS OF HEAVY METAL HALIDES AND SOME CHALCOGENIDES
Chandan Kumar || Jagdhar Mandal
India
Paper Indexed : :03.3005/055012016
International Journal of Computational Engineering Resaerch, Volume 05 ~ Issue 05 (May 2015)

Abstract

Cohesive energy and spectroscopic constants such as vibrational anharmonicity constant ( e e  x ) and rotation vibration coupling constants ( e  ) of heavy metal halides of Ag, Cu and some chalcogenides have been computed by using the different forms for the interaction potential energy. The potential consist of four short range overlap repulsive interaction part, Vander Waal's dipole-dipole interaction energy parts and polarization energy part and well known long range coulombian energy part. The relative contribution of different terms in the interaction energy have been obtained. Previous workers did not take into account of all terms. The results obtained are satisfactory and very close to the observed values. More over, the present calculation can be useful in predicting the validity and superiority of the one form of short range repulsive potential over the other.

Keywords:Vibrational anharmonicity constant, rotational–vibratiional coupling constant ,chalcogenide , cohesive energy , short–range repulsive potential.

Research Article  open access
Secured Communication Model for Mobile Cloud Computing
Ramandeep Singh Rajpal || Raghvendra Kumar
India
Paper Indexed : :03.3005/055017022
International Journal of Computational Engineering Resaerch, Volume 05 ~ Issue 05 (May 2015)

Abstract

As Cloud computing provides on-demand access to computational resources which together with pay-per use business models; enable application providers seamlessly scaling their services. Cloud computing infrastructures allow creating a variable number of virtual machine instances depending on the application demands. An attractive capability for Software-as-a-Service (SAAS) providers is having the potential to scale up or down application resources to only consume and pay for the resources that are really required at some point in time; if done correctly, it will be less expensive than running on regular hardware by traditional hosting.Major issue cloud computing facing today is security to eliminate this problem this paper is providing poly alphabetic cipher method in a mobile application.. We present a novel approach to use high speed interconnected cluster in a cloud computing environment

Keywords:environment. and evaluate the performance.
Research Article  open access
Electronic Identification System using RFID
A.P.Adsul || DigvijayDamame || PoojaGarde || Kajal Jore || Kunal Shah
India
Paper Indexed : :03.3005/055023027
International Journal of Computational Engineering Resaerch, Volume 05 ~ Issue 05 (May 2015)

Abstract

In this modernization Era and rapid growing metro cities, security is must in every field. This work describes a location and the identity of the persons using RFID (Radio Frequency Identification) tags and readers. RFID is an automatic identification (auto-ID) technology that uses tags and readers for remotely storing and retrieving data. RFID reader can sense (identify) persons, animals, vehicles and goods by interrogating transponders tagged on them. From this perspective, RFID Reader, Reader Network is a Sensor and Sensor Network that is context-aware, respectively. However, only sensing is not enough in many scenarios. Hence this work also proposes a tracking algorithm such as coined Virtual Route Tracking (VRT), to realize tracking persons or objects in RFID Reader Network.

Research Article  open access
Corrosion of Aluminum and Its Alloys: Forms of Corrosion
K.Vellaiswamy || V.Jeevabharathi || K.Mylsamy
India
Paper Indexed : :03.3005/xxxxxx
International Journal of Computational Engineering Resaerch, Volume 05 ~ Issue 05 (May 2015)

Abstract

Corrosion is the chemical reaction of a metal, in this case aluminum, with its environment, which leads to the deterioration of the properties of metals, aluminum in this case. Aluminum is a very reactive metal, but it is also a passive metal. This contradictory nature is explainable because nascent aluminum reacts with oxygen or water and forms a coherent surface oxide which impedes further reaction of aluminum with the environment. Corrosion is the chemical reaction of a metal, in this case aluminum, with its environment, which leads to the deterioration of the properties of metals, aluminum in this case. Aluminum is a very reactive metal, but it is also a passive metal. This contradictory nature is explainable because nascent aluminum reacts with oxygen or water and forms a coherent surface oxide which impedes further reaction of aluminum with the environment. Aluminum is chemically very reactive. For example, powdered aluminum is used as rocket propellant for propulsion of the space shuttle's solid fuel rockets. Additionally, the reaction of aluminum with water releases a tremendous amount of energy: AI + 3H2O → AI(OH)3 + 3H2 ↑ Corrosion is the reaction of aluminum with water and the subsequent deterioration of its properties. Corrosion, by definition, is a slow process, requiring days or years to occur to a noticeable extent, as opposed to similar electrochemical reactions such as etching, brightening, or anodizing which occur in minutes or less. Aluminum alloys may corrode via several different pathways. Recognizing the pathway or the forms of aluminum corrosion is an important step to determine the appropriate remedy for each probe.


Research Article  open access
Enhanced Leach Protocol
Girish Prabhu || Dr.G.R.Udupi
India
Paper Indexed : :03.3005/xxxxxx
International Journal of Computational Engineering Resaerch, Volume 05 ~ Issue 05 (May 2015)

Abstract

Technological advances in wireless sensor networks have made impact on everyday life. In wireless sensor networks energy is main concern & it is considered while designing sensor networks. We use hierarchical routing protocols based on clustering because of balanced energy consumption and scalability. The efficient usage of energy in a sensor node is most important parameter to increase the life time of wireless sensor network. In this paper we analyze the design issues constructing the cluster in the wireless sensor networks and detail working of LEACH (Low Energy Adaptive Clustering Hierarchy) protocol and its SIMULATION .The results reveal the measure for performance of sensor networks.

Keywords:Cluster head, Data aggregation, Energy efficient, Hierarchical routing, LEACH, Life time, Wireless sensor network

Research Article  open access
Resolution of Some Cases of Bgp Inter-Domain Oscillations with the Spvpoc Algorithm.
Alphonse Binele Abana || Emmanuel Tonye
Cameroon
Paper Indexed : :03.3005/xxxxxx
International Journal of Computational Engineering Resaerch, Volume 05 ~ Issue 05 (May 2015)

Abstract

BGP was introduced in order to allow autonomous systems to exchange information across the Internet. An autonomous system is a set of routers under a single network administration. Each AS decide its internal routing protocol (RIP, OSPF, ...) and its external routing policy. The BGP routing protocol is used to interconnect the various Internet operators together and is designed for the following two purposes: to best meet the requirements imposed by the routing policies of an operator and respect the principle of confidentiality of these policies. The inconsistencies of these policies cause path oscillations. In this paper, after modeling the operation of the bgp protocol, we present the algorithm SPVPOC and we show how it resolves bgp oscillations in some cases

Keywords:Internet, bgp, Autonomous Systems, path, inter-domain oscillations