IJCER Online Submission
IJCER Paper Submission Format
Publication Charges - IJCER

Frequency: 12 issues per year
ISSN: 2250–3005 (online version)
Published by: IJCER
Call for paper...

International Journal of Computational Engineering Research

(IJCER)

 

Articles

 

Research Article  open access
Significance and Need of Computational Analysis and Finite Element Modelling For the Investigation of Thermal Behaviour of Composite Materials
S A Mohan Krishna|| T N Shridhar|| L Krishnamurthy
India
Paper Indexed : : 03.3005/xxxxxx
International Journal of Computational Engineering Resaerch, Volume 06 ~ Issue 02 (February 2016)

Abstract

Composite materials are the cutting edge materials that possess unrestrained opportunities for advanced material science and development. Thermal studies of composite materials are gaining greater impetus in the present scenario. This will help to comprehend the properties of materials as they change with temperature. The thermal characterization of hybrid composites has been progressively more important in a wide range of applications. The coefficient of thermal expansion, thermal conductivity, specific heat capacity, latent heat and thermal diffusivity are the most important properties of composite materials. Since nearly all composites are used in various temperature ranges, measurement of coefficient of thermal expansion (CTE) and thermal conductivity as a function of temperature is necessary in order to know the behaviour of the material. Thermal characterization and analysis of hybrid composites will depend on the factors that influence on the prominent thermo-physical properties presents a major challenge since they are sensitive to the type of reinforcement and method of manufacture. This research paper emphasizes the significance, need, applications and scope of computational investigation and finite element analysis of composite materials.

Keywords: Composite materials, thermal studies, thermal characterization, coefficient of thermal expansion, thermal conductivity and computational investigation.

Research Article  open access
Simulation of the Hydrodynamic Conditions of a Rotating Cage for Evaluating Corrosion Inhibitors.
Yolitzin Alvarado Medina || Sergio Serna Barquera || Juan Carlos García Castrejón || R. J. Romero
Mexico
Paper Indexed : : 03.3005/xxxxxxx
International Journal of Computational Engineering Resaerch, Volume 06 ~ Issue 02 (February 2016)

Abstract

The Rotating cage technique is used to evaluate corrosion inhibitors. The rotating cage holds 8 coupons containing corrosive liquid, which rotate within it. These coupons have a dynamic that simulates the conditions in a pipe through a corrosive fluid, in this case the material used in pipelines are analyzed oil. A study of the fluid dynamics through the ANSYS software shows that the velocity fields, contours, vectors and speed profiles for symmetric geometries arrangements 2, 4 and 8 embedded specimens with a corrosion inhibitor. The conditions are calculated velocity profiles are standard temperature and solution viscosity of 1.0 cp and 1.5 cp. The density is considered constant of 998 kg / m3 and three angular velocities (920, 460 and 230 rpm) were analyzed. Finally the results of these conditions have been analyzed, yielding values close to zero in the outside walls of the cylinder. The cylinder contain the coupons rotating speeds to ensure turbulence (1) and to analyze the rate of corrosion inhibitor



Research Article  open access
Mining Environment Harmful Gas Detection And Alarm System Using Kiel And Proteus Embedded System Modules
Varun Siripurapu || Vishal Sowrirajan || Venu Arumugam
India
Paper Indexed : : 03.3005/xxxxxxx
International Journal of Computational Engineering Resaerch, Volume 06 ~ Issue 02 (February 2016)

Abstract

The main idea behind this paper is to propose a system which can provide a safe environment for miners using wireless communication, alarming system . Sensors are employed within the helmets of the miners to detect the temperature and intensity of the harmful gas levels. If the temperature breaches the 40 degree Celsius mark or if the CO intensity level exceeds 120 ppm ,here both the values of temperature and CO concentration value is calibrated to the potentiometer used (200). If these values exceed 200 mark an alarming signal is set on ,which alerts the miners and also gives information about these values to the base station via RF transmitter . In this paper we are introducing the RF transmitter and receiver technology instead of using other means of communication .Keywords : temperature, kiel ,proteus ,microcontroller.

Keywords: temperature, kiel ,proteus ,microcontroller.

Research Article  open access
A Comparative Analysis of Additional Overhead Imposed by Internet Protocol Security (IPsec) on IPv4 and IPv6 Enabled Communication
Muhammed NuraYusuf || Badamasi Imam Ya'u
Nigeria
Paper Indexed : : 03.3005/xxxxxxx
International Journal of Computational Engineering Resaerch, Volume 06 ~ Issue 02 (February 2016)

Abstract

IPSec, an Internet layer three (3)-security protocol suite is often characterising with introducing an additional space and processing overhead when implemented on a network for secured communication using either internet protocol version 4 or 6; IPv4 or IPv6. The use of Internet protocol security (IPSec) on IPv4 is an alternative that offers solutions and addresses the security vulnerabilities in network layer of the open system interconnect (OSI) and transmission control protocol/internet protocol (TCP/IP) protocol stack. In IPv6, IPSec is one among many other features added to the earlier Internet protocol to enhance efficiency and security. This paper, set as its objective to reports on the impact of processing and space overhead introduced by IPSec on both IPv4 and IPv6 in relation to packet end-to-end delay based on different IPSec transformations with different authentication and encryption algorithms deployed in different scenarios simulated using NS2. The experiment result reveals that the cost of IPSec added overhead is relatively small when smaller packet sizes are involved for both protocols in comparison with large packet sizes that were IPSec protected with the same configuration as the smaller packet, unless in the cases whereby the packet was very large which has to be fragmented. This paper can therefore, serve as a guide for network administrators to trade up between processing cost and larger address space specifically for transmission involving larger IP packets.

Keywords:end-to-end delay, Internet Protocols,IP Security, Overhead, Packets, Processing, Space,