IJCER Online Submission
IJCER Paper Submission Format
Publication Charges - IJCER

Frequency: 12 issues per year
ISSN: 2250–3005 (online version)
Published by: IJCER
Call for paper...

International Journal of Computational Engineering Research

(IJCER)

 

Articles

 

Research Article  open access
A New Approach of Right State Machine in Discrete Alphabets System.
Sarat K. Parhi
India
Paper Indexed : :03.3005/05060103
International Journal of Computational Engineering Resaerch, Volume 05 ~ Issue 06 (June 2015)

Abstract

In this paper ,Right State Machine is a new approach of finite automata. The properties of recursive sets related to the Right State Machine is discussed in this paper. The easily understandable theorems are stated in this paper .The idea is applied to specified computer automata and formal language over a new machine.

Keywords:Finite automata, Right State Machine (RSM), Formal language, Discrete alphabets system (DAS).
Research Article  open access
PSO-based Training, Pruning, and Ensembling of Extreme Learning Machine RBF Networks
Praveen Malali || Miltiadis Kotinis
Norfolk
Paper Indexed : : 03.3005/050604012
International Journal of Computational Engineering Resaerch, Volume 05 ~ Issue 06 (June 2015)

Abstract

The research presented in this article focuses on the development of a methodology for ensembling radial basis function (RBF) networks that have been trained using particle swarm optimization (PSO) and the extreme learning machine (ELM). PSO is used to find optimal values for the basis width and the coordinates of the kernel centers, while ELM provides the values of the network connection weights. The ensemble consists of RBF networks that correspond to the personal best positions found by the swarm particles during the search process. The swarm intelligence search mechanism is supplemented with a mutation operator, which incorporates substitution of the worst performing particles by the best performing particle, after the latter has been mutated. Pruning of the input layer of the RBF networks is also implemented in the algorithm. The generalization performance of the PSO-ELM algorithm is evaluated by applying it to a number of widely-utilized regression and time series prediction benchmark problems. The results reveal that the proposed methodology is very effective even when small RBF networks are utilized.

Keywords:Radial basis function, network extreme learning machine, particle swarm optimization, ensembling pruning.

Research Article  open access
Offline and Online Bank Data Synchronization System
Anil Jaiswal || Rahul Sonawane || Mrs. Sangita Oswal || Mrs. Geocy Shejy
India
Paper Indexed : :03.3005/0506013016
International Journal of Computational Engineering Resaerch, Volume 05 ~ Issue 06 (June 2015)

Abstract

Mobile applications mostly being developed are either for a local or client-server. Though the applications in the future will be developed with cloud in mind, i.e. it will be a native application, the heavy processing and storage is done on the native and later uploaded to cloud, it will deliver only required parts and requested data at runtime and able to run offline. In order to better understand how to facilitate the building of mobile cloud-based applications, we have implemented existing work in mobile computing through the prism of cloud computing principles. We provide an overview of the system, in particular, models of mobile cloud applications. Also, synchronization of offline data with online database will be done

Keywords:cloud computing, mobile device, remote execution, database synchronization, offloading.

Research Article  open access
Big Data and Information Security
Gang Zeng
China
Paper Indexed : :03.3005/0506017021
International Journal of Computational Engineering Resaerch, Volume 05 ~ Issue 06 (June 2015)

Abstract

With the development of application of Internet/Mobile Internet, social networks, Internet of Things, big data has become the hot topic of research across the world, at the same time, big data faces security risks and privacy protection during collecting, storing, analyzing and utilizing. This paper introduces the functions of big data, and the security threat faced by big data, then proposes the technology to solve the security threat, finally, discusses the applications of big data in information security.

Keywords:big data, security risks, information security, information security technology

Research Article  open access
Emerging Trend of Security Testing to Make Application Robust
Mr. Shiv kumar Goel || Prasad Kuvalekar
India
Paper Indexed : :03.3005/0506022027
International Journal of Computational Engineering Resaerch, Volume 05 ~ Issue 06 (June 2015)

Abstract

Typical security requirements may include specific elements of confidentiality, integrity, authentication, availability, authorization and non-repudiation. Actual security requirements tested depend on the security requirements implemented by the system. Security testing as a term has a number of different meanings and can be completed in a number of different ways. As such a Security Taxonomy helps us to understand these different approaches and meanings by providing a base level to work from.

Keywords:Attacks, Security testing, software assurance, SQL injection, Vulnerabilities, Web application

Research Article  open access
Design of Full Order Optimal Controller for Interconnected Deregulated Power System for AGC
Mrs. Upma Gupta || Mrs. S.N.Chaphekar
India
Paper Indexed : :03.3005/0506028040
International Journal of Computational Engineering Resaerch, Volume 05 ~ Issue 06 (June 2015)

Abstract

This paper presents the design and simulation of full order optimal controller for deregulated power system for Automatic Generation Control (AGC). Traditional AGC of two-area system is modified to take in to the effect of bilateral contracts on the system dynamics. The DISCO participation matrix defines the bilateral contract in a deregulated environment. This paper reviews the main structures, configurations, modeling and characteristics of AGC in a deregulated environment and addresses the control area concept in restructured power Systems. To validate the effectiveness of full order optimal controller, a simulation has been performed using MATLAB and results are presented here. The results for LFC and AGC for a deregulated interconnected power systems shows that the optimal full order controllers perform better than classical integral order controllers .

Keywords:Automatic Generation Control, Area Control Error, ACE Participation Factor, Bilateral Contracts, Contract Participation Factor, Deregulation, DISCO Participation Matrix, Full Order Optimal Controller, Load Frequency Control.

Research Article  open access
Synthesis and characterization of resin copolymer derived from cardanol-furfural/ formaldehyde –p-hydroxy benzoic acid.
A. Panda|| J.Ch. Pal|| Dr.P.K. Mishra|| Dr. S.K. Swain|| Dr.B.Pr. Sahu
India
Paper Indexed : :03.3005/0506041049
International Journal of Computational Engineering Resaerch, Volume 05 ~ Issue 06 (June 2015)

Abstract

Some of resin copolymers have been synthesized by refluxing cardanol, which is a major constituent of Cashew nut Shell Liquid (CNSL), with furfural/formaldehyde and p-hydroxy benzoic acid in presence of different acid and base catalysts. The resins have been characterized by FTIR spectra. The thermal behaviors of the resins have been studied and the kinetic parameters as well as plausible degradation mechanism have been suggested. In addition to this XRD and SEM of the copolymers have been studied.


Research Article  open access
A Hybrid Virtual Reality Simulation System for Wave Energy Conversion
Trongnghia Huynh || Gene Hou || Jin Wang || May Hou || Miltiadis Kotinis
Virginia
Paper Indexed : :03.3005/0506050060
International Journal of Computational Engineering Resaerch, Volume 05 ~ Issue 06 (June 2015)

Abstract

Recent advances in interfacing computational software with experimental hardware have expanded the area of application of virtual reality (VR) beyond that of visualization to simulation-based training and education. The VR can now be directly interfaced with hardware and physics-based computational models to form a sophisticated hybrid simulation system. The integrated simulation system developed in this research demonstrates the motion of a heaving buoy in irregular waves in order to demonstrate the process of wave energy conversion. The VR system consists of three main function blocks: A physics-based simulator in MATLAB®, a game studio in Unity 3D, and a hardware manipulator in LabVIEW®. These three blocks operate in a decentralized mode and communicate with each other as interconnected nodes of an integrated network. This article details the development of each of these function blocks and addresses issues associated with data transmission and lockstep synchronization. The effectiveness of the developed hybrid VR system is demonstrated to conclude the presentation.

Keywords: Unity 3D, virtual reality, wave energy conversion, wave simulation.


Research Article  open access
Using Computational Fluid Dynamics as a tool for improved prediction of pressure characteristics of a pilot chamber of PRSOV
Binod Kumar Saha || Dipankar Sanyal
India
Paper Indexed : :03.3005/0506061070
International Journal of Computational Engineering Resaerch, Volume 05 ~ Issue 06 (June 2015)

Abstract

In this paper, flow of air through a pressure regulating and shut-Off Valve (PRSOV) has been solved numerically with an objective to determine the pressure of the PRSOV pilot chamber. Flow through the valve is transient, compressible and turbulent in nature. Flow has been solved using ANSYS FLUENT coupled with a special user defined function (UDF). UDF is used for dynamic meshing, automatic data acquisition from ANSYS FLUENT solver and to schedule the numerical test procedure. Within the UDF, valve inlet pressure is varied in a stepwise manner. For every value of inlet pressure, transient analysis leads to a quasi-static flow through the valve. Spool forces are calculated based on different pressures at inlet. From this information of spool forces, pressure characteristic of the pilot chamber of passive control circuit has been derived. The same characteristics have also been obtained after modelling the flow analytically. Both the results have been compared. It is observed, CFD analysis of the flow has led to improved results.

KEYWORDS: Pressure regulating and Shut-Off Valve, pilot flow, dynamic meshing, flow force, pressure regulation, Force Balance, CFD


Research Article  open access
Hydraulic Transient: Lift Irrigation Scheme
Mohite Sudhir Ganpat || Morankar D.V.
India
Paper Indexed : :03.3005/0506071078
International Journal of Computational Engineering Resaerch, Volume 05 ~ Issue 06 (June 2015)

Abstract

Water hammer or hydraulic transients occur in pumping mains of Lift Irrigation Scheme (LIS) due to rapid changes in flow. These changes may be due to valve operations (sudden opening or closing of valves), due to sudden failure of pumps, or due to power failure. Maximum and minimum water hammer pressures govern the design of a pumping main. The present study focuses on analysis of hydraulic transient phenomenon that may occur in pumping main of LIS. Sensitivity of maximum water hammer / positive pressure may be investigated with variation of various input parameters like pipe type, diameter, thickness and water temperature, pump inertia etc. Here sensitivity of minimum water hammer / negative pressure is investigated with variation of key input parameters like pipe diameter and thickness. Shirala Lift Irrigation Scheme was modeled for transient analysis by using SAP2 software. It is characterised by total discharge of 1.18 m3/s, dynamic pump head of 58.86 m and 3.75 kilometers of mild steel pumping main. The sensitivity in transient analysis results is investigated for variation of above mentioned input parameters. It is observed that parameters to which water hammer is most sensitive are diameter, thickness and type of pipe.

KEYWORDS: Hydraulic transient, Pumping main, Pressure wave, SAP2, Sensitivity, Shirala LIS, Transient analysis, Water hammer