IJCER Online Submission
IJCER Paper Submission Format
Publication Charges - IJCER

Frequency: 12 issues per year
ISSN: 2250–3005 (online version)
Published by: IJCER
Call for paper...

International Journal of ComputationalEngineeringResearch

(IJCER)

Volume 3, Issue 12,December, 2013

 
 
Version I
S.No. Article Title Page No. Paper Index PDF
1.

Generalized Sex and Age Specific Body Composition Prediction Equations for Indian Subjects

Ghazala Perveen Khan, Munna Khan, Shabana Mehfooz

Abstract

Body composition analysis (BCA) is necessary to yield data about normal growth, maturity, and longer life. By measuring body composition, a person's health status can be more accurately assessed. Bioelectrical impedance analysis (BIA) is a commonly used method for estimating body composition which actually determines the electrical impedance, or opposition to the flow of an electric current through body tissues which can then be used to calculate an estimate of body composition. The method is popular owing to its ease of use, portability of the equipment and it's relatively low cost compared to some other methods of body composition analysis. To the best of our knowledge there were no prediction equations that were validated on Indian subjects. The objective of the study was to develop prediction equations for Fat free mass (FFM) and Total body water (TBW) for Indian subjects based on Bio electrical measurement of weight, age, sex, height and Impedance Index. To predict the same; a form of statistics known as multiple regression Analysis have been used which allows an immeasurable component such as Total Body Water, Fat Free Mass etc. to be predicted from one or more measured variables. The multiple regression analysis of the data is carried out with the help of statistical software R version (2.9.2) which is useful for multiple regression analysis and easy handling of the data. In the current paper; based on the correlation between Total Body water, Fat free Mass, Impedance Index at different frequencies and weight, age, sex and height;8 sets of prediction equations were developed.

Keywords:(Bio Electrical Impedance Analysis, Prediction Equation, Multiple Regression
01-15  
03.3005/03120101015
PDF
2.

Time Division Multiple Access in Clustered Wireless Networks

Srinivas.S, M.Shashikala

Abstract

Time division multiple access (TDMA) is a channel access method for shared medium networks. It allows several users to share the same frequency channel by dividing the signal into different time slots. The users transmit in rapid succession, one after the other, each using its own time slot. This allows multiple stations to share the same transmission medium (e.g. radio frequency channel) while using only a part of its channel capacity. Based on the network-wide flow distribution calculated from the optimization model and transmission power on every link, we then propose an algorithm for deriving the TDMA schedules, utilizing the slot reuse concept to achieve minimum TDMA frame length. Numerical results reveal that our proposed solution reduces the energy consumption and delay significantly, while simultaneously satisfying a specified reliability objective

Keywords:Wireless Sensor Networks (WSN), TDMA.
16-19  
03.3005/031201016019
PDF
3.

Effect of Heat Treatments on Antioxidant Activity in Sucrose-Milk Protein Model Systems

Preeti Shukla, Usha Bajwa

Abstract

An investigation was carried out to estimate the antioxidant activity in simulated milk beverage model systems at different heat treatments equivalent to industrial processing of dairy beverages. Model systems of sucrose and milk proteins (whey protein and casein) were given different heat treatments to generate Maillard reaction products. These MRPs were considered to elevate the antioxidant activity in dairy beverages. Percentage inhibition of DPPH as a measure of antioxidant activity was determined at different time intervals. The study showed that there was a significant difference in the free radical scavenging activity of samples at different time intervals at a given temperature.

Keywords:Antioxidant, Free radical scavenging activity, HMF, Maillard reaction, Proteins, Sucrose,

20-24  
03.3005/031201020024
PDF
4.

An Experimental Investigation on Condensation Heat Transfer of Microchannel Heat Exchangers

Thanhtrung Dang , Minhhung Doan

Abstract

The present study investigated experimentally condensation heat transfer of two microchannel heat exchangers. The heat transfer rate of a microchannel heat exchanger was achieved 272.9 W for the vapor having the inlet temperature of 101 ºC and the mass flow rate of 0.123 g/s and for the cooling water having the inlet temperature of 32ºC and mass flow rate of 3.1133 g/s. It was also observed that the heat transfer rate obtained from the counter flow arrangement is always higher than that obtained from the parallel one: the value obtained from the counter flow arrangement is 1.04 to 1.05 times of that obtained from the parallel flow. The results for two phases are in good agreement with the results for single phase. In addition, the condensation heat transfer coefficient in the microchannel heat exchangers decreases as increasing the inlet cooling water temperature.

Keywords: Microchannel, condensation, configuration, heat exchanger, efficiency
25-31  
03.3005/031201025031
PDF
5.

Survey Paper on Traditional Hadoop and Pipelined Map Reduce

Dhole Poonam B, Gunjal Baisa L

Abstract

Recent days Map Reduce programming model have shown great value in processing huge amount of data. Map Reduce is a common framework for data-intensive distributed computing of batch jobs. To modify fault tolerance, several implementations of Map Reduce go on the entire output of every map and Reduce task before it is consumed. During this paper, we are going to study a modified Map Reduce design that permits knowledge to be pipelined between Mapper and Reducer. This elaborates the Map Reduce programming model on the far side process execution, and can scale reduce completion times and improve system utilization for batch jobs in addition. The Study illustrates that the implementation of Pipelined Map Reduce will scale well and with efficiency method large data sets on artifact machines. In pipelined map reduce hadoop is modified in such way that it can send data directly from Mapper to reducer

Keywords:Hadoop, Map-Reduce, Parallel Processing, Pipelined Map-Reduce
32-36  
03.3005/031201032036
PDF
6.

Performance Promoting Using E - management

Huthaifa A.A. Ellatif, Samani A. Talab 

Abstract

This paper discussing the E - management concept, and its special characteristics which lead to enhance personnel performance in many aspects, for instance quickly right decision making, in right way according to reaching results in fast way and exerted effort, as well shortening the time, enhancing personnel competency, monitoring their performance easily and participating in promoting their standard, all that by getting acquainted with New means, methods and techniques.This paper aims to show the significance of using the E - management, for its precise and authentic results that could be reliable in personnel performance acquaintance, the paper include a study on one of the foundations that shows the significance of turn to E - management

Keywords:E - Management, E-Government, Performance, E- Performance,Traditional Management, perfect performance,The E - management Characteristics
37-41  
03.3005/031201037041
PDF
7.

Automation of JPEG Ghost Detection using Graph Based Segmentation

Archana V Mire, Dr S B Dhok2, Dr P D Porey, Dr N J Mistry 

Abstract

As JPEG is widespread de facto image format, Most of the images available in computer systems, electronic devices and in the Web are in JPEG format hence forgery detection techniques in JPEG may explore most of the forgeries. As JPEG works on 8 by 8 block cosine transform most of the tampering correlation inherited by tampered image may get destroyed, making forgery detection difficult. In fact it is common practice followed by forger to hide traces of resampling & splicing. However the tampered region usually has a different JPEG compression history than the authentic region. JPEG ghost detection techniques makes use of artefacts introduced in image due to 8 by 8 block DCT transform. It identifies forgery by searching ghost which appears in resultant difference image after subtracting it from its various recompressed version at different quality levels. As number of difference images become very large it becomes difficult for human being to scan these large no of difference image. Hence in this paper we have proposed a technique which will automate ghost detection in image.

Keywords:JPEG, AJPEG, DJPEG, JPEG ghost, Segmentation, Automation, Difference image
42-47  
03.3005/031201042047
PDF
8.

Design and Analysis of Industrial Helmet

Anil Kumar. K, Y. Suresh babu

Abstract

All helmets attempt to protect the user's head by absorbing mechanical energy and protecting against penetration. Their structure and protective capacity are altered in high-energy impacts. Beside their energy-absorption capability, their volume and weight are also important issues, since higher volume and weight increase the injury risk for the user's head and neck. Every year many workers are killed or seriously injured in the construction industry as a result of head injuries. Wearing an appropriate safety helmet significantly reduces the risk of injury or even death. Protective headwear could save your life. At present strength of the helmet using industry is less due to improper filling of material, uneven pressure distribution and blow holes. The aim of the project is to increase the strength of industrial helmet by making the modify material in existing one. In order to achieve the objective of the project, the work is carried out in three stages. In the first stage a parametric model is designed by using 3D modeling module in Pro-Engineer software. After designing the helmet, mould flow analysis is carried out on helmet by using plastic advisor which is a module in pro/E. Mould flow analysis is used for finding material filling, pressure distribution, air traps, and weld lines during the injection molding process at constant pressure and different temperature ranges. In the second stage, after completion of the mould flow analysis impact analysis is done on industrial helmet by using COSMOS software for the three different type materials from different heights

48-58  
03.3005/021201048058
PDF
9.

Geographic Routing In Vanets: A Study

Jyoti Sindhu, Dinesh Singh 

Abstract

Vehicle Ad hoc Networks are extremely mobile wireless ad hoc networks aimed to support vehicular safety and other viable applications. Vehicle-to-Vehicle (V2V) communication is significant in providing a high degree of safety and convenience to drivers and passengers. Routing in VANET is an important issue. Due to dynamic nature of the vehicles, the networks topological changes are very frequent and hence Position based routing protocols are found to be more suitable to VANETs. In VANETs, Position based routing protocols are used for routing messages in greedy forwarding way. In this study, an evaluation of the existing position based routing protocols in VANETs has been carried out. Different characteristics used for evaluation includes forwarding strategy, recovery strategy, position information and mobility management

KEYWORDS—VANETs, beacon message, DGRP, A-STAR, VGRS, GPCR, GSR.
59-64  
03.3005/021201059064
PDF
Version 2
S.No. Article Title Page No. Paper Index PDF
1.

A Survey on MR Brain Image Segmentation Using SOM Based Strategies

Jesna M || Kumudha Raimond

Abstract

Magnetic Resonance (MR) image segmentation has greater influence in image guided surgery, therapy evaluation and diagnosis fields. Several supervised and unsupervised segmentation techniques are available for image segmentation. Supervised segmentation has less demand in medical field because it needs a priori knowledge, assistance from external entity. Whereas unsupervised segmentation yield good results without any a priori knowledge. Self Organizing Map (SOM) is an unsupervised clustering technique. The SOM is an Artificial Neural Network (ANN) which has a feed-forward structure. The SOM features are very useful in data analysis and data visualization, which makes it as an important tool in brain MR image segmentation. SOM map quality depends upon the learning parameters, map topology and map size. A comprehensive survey on SOM based automatic MR image segmentation methods are presented below.

Keywords: Image segmentation, MR brain image, self organizing map, unsupervised segmentation.
01-06  
03.3005/031202001006
PDF
2.

Implementation of a Lean Model for Carrying out Value Stream Mapping in a silk Reeling process Industry

Y. Sujatha || Dr. K.Prahlada Rao

Abstract

Value Stream mapping technique involves flowcharting the steps, activities, material flows, communications, and other process elements that are involved with a process or transformation. In this respect, Value stream mapping helps an organization to identify the non-value-adding elements in a targeted process and brings a product or a group of products that use the same resources through the main flows, from raw material to the arms of customers. In this study, a practical study carried out in a silk manufacturing process industry. The main aim was to draw the current state value stream mapping for the main. Further, the paper has identified some of the processes which can be carried out by the sub contractor and suggested measures to be taken up by the higher level management in reducing the non value added process. It discusses the reduction in the set up time and cycle time that can be obtained through the implementation. This paper also discusses the plan of action for improving the Future State Value Stream Mapping (FVSM). A FVSM for the manufacture of Base is drawn.

Keywords: Current state value stream mapping (CVSM), Future state value stream mapping (FVSM), Value added time.
07-13  
03.3005/031202007013
PDF
3.

A Survey on Feature Extraction Techniques for Palmprint Identification

Sincy John || Kumudha Raimond

Abstract

Biometric recognition system is a pattern recognition system to provide a reliable personal recognition schemes to either confirm or determine the identity of an individual based on specific physiological or behavioral characteristics possessed by the user. Based on these characteristics, biometrics is normally classified into two categories, physiological and behavioral. Physiological biometrics is based on measurements and data derived from direct measurement of a part of human body. Some of the physiological biometrics include finger print, palmprint, facial etc. Behavioral biometrics is based on the behavioral traits like speech patterns, signature etc. In the biometric family, palmprint based identification system has become one of the active research topics. In this, the identification process consists of image acquisition, preprocessing, feature extraction and identification. A comprehensive survey on different techniques that are used for palmprint identification is presented in this paper.

Keywords: Biometrics, palmprint, Identification.
14-18  
03.3005/031202014018
PDF
4.

A Comparative study of Hierarchal Protocols for Wireless Sensor Networks (WSN)

Prakriti Trivedi || Varun Mayanger || Anand Kirori

Abstract

Wireless Sensor Networks (WSN) are networks of highly distributed nodes which are deployed in very large number to detect an event or to measure certain physical parameters such as temperature, humidity, mobility, etc… with each node having its own battery. The main challenge in WSN mechanism is routing of packets in an energy efficient manner and hence to ensure this, several energy efficient routing schemes have been proposed in past. In this paper, author will discuss some of the cluster based routing schemes for WSN. Initially, author will begin by introducing WSN and their cluster based routing techniques in brief and then concluded with the comparison of those techniques on the basis of network lifetime, energy efficiency and various other parameters.

Keywords: Wireless Sensor Networks (WSNs), Cluster Head Selection in WSNs, Cluster-based routing protocols, Hierarchical clustering, WSNs routing protocols.
18-23  
03.3005/031202018023
PDF
6.

New Travelling Waves Solutions for Solving Burger's Equations
by Tan-Cot function method

Anwar Ja'afar Mohamad Jawad||YusurSuhail Ali

Abstract

In this paper, we used the proposed Tan-Cot function method for establishing a traveling wave solution to Burger's equations. The method is used to obtain new solitary wave solutions for various types of nonlinear partial differential equations such as, one-dimensional Burgers, KDV-Burgers, coupled Burgers, and the generalized time delayed Burgers' equations. Proposed method has been successfully implemented to establish new solitary wave solutions for Burgers nonlinear PDEs.

Keywords: Nonlinear PDEs, Exact Solutions, tan-Cot function method, one-dimensional Burgers, KDV-Burgers, coupled Burgers, and the generalized time delayed
30-35  
03.3005/031202030035
PDF
7.

Design and Analysis of Gas Turbine Combustion Chamber

P.Sravan Kumar1, P.Punna Rao

Abstract

The design and analysis of gas turbine combustion chamber is based on combined theoretical and empirical approach and the design of combustion chamber is a less than exact science. This paper presents the design of combustion chamber followed by three dimensional simulations to investigate the velocity profiles, species concentration and temperature distribution within the chamber and the fuel considered as Methane (CH4). The computational approach attempts to strike a reasonable balance to handle the competing aspects of complicated physical and chemical interactions of the flow. The modeling employs non-orthogonal curvilinear coordinates, second order accurate discretization, tetra grid iterative solution procedure and SST turbulence model. Accordingly, in present study an attempt has been made through CFD approach using ANSYS CFX 12 to analyze the flow pattern with in combustion and through air admission holes and from these the temperature distribution in the chamber walls as well as the temperature quality at the exit of combustion chamber is obtained.

Keywords: Ansys, CATIA, CFD, Combustion Chamber, Empirical approach.
36-40  
03.3005/031202036040
PDF
8.

Design & Analysis of a Two-jaw parallel Pneumatic Gripper

Mohammed.Khadeeruddin, T.V.S.R.K Prasad, Raffi Mohammed

Abstract

The handling of abstract materials and mechanisms to pick and place are widely found in factory automation and industrial manufacturing. There are different mechanical grippers which are based on different motor technologies have been designed and employed in numerous applications. The designed robotic gripper in this paper is a two jaw actuated gripper which is different from the conventional cam and follower gripper in the way that controlled movement of the jaws is done with the help of pneumatic cylinders using air pressure. The force developed in the cylinder is very gentle and is directly delivered to the jaws in a compact way. The design, analysis and fabrication of the gripper model are explained in details along with the detailed list of all existing pneumatic grippers in market. The force and torque for the gripper have been calculated for different set of conditions. The working of the model is checked for and observation for pay load is recorded at various pressures. The highly dynamic and highly accelerated gripper model can be easily set at intermediate positions by regulating the pressure. Pneumatic grippers are very easy to handle and are generally cost-effective because air hoses, valves and other pneumatic devices are easy to maintain

Keywords:Automation, air hoses, Ansys, gripper, jaws, Pro-E.
41-46  
03.3005/031202041046
PDF
10.

Design, Modeling and Analysis of Rotary Air-Lock Valve

Shaik Nagulmeera, M. Anilkumar

Abstract

The Rotary Air-locks provide reliable service in high pressure, high temperature and other severe service conditions. The valves can be used in various industries such as food, plastics, chemical, asphalt, mining, baking, cement and paint. The main function of a Rotary Air- lock Valve is to regulate the flow of material from one chamber to another while maintaining a good airlock condition. The material or product being handled is usually dry free flowing powder, dust or granules. Rotary Air-lock Valves are used at the bottom of Bins, Cyclones, Dust Collectors or Feed Hoppers to discharge materials at a controlled rate or act as an Airlock. They are also used to introduce materials into positive or negative conveying systems. A Rotary Feeder / Airlock Valve consists of a rotor which turns at a given RPM in close clearance to its casing thus maintaining a uniform rate of material flow and provides a seal...

Keywords:Air locks, Ansys, Bevcon, Pro-E, Rotary feeder
53-57  
03.3005/031202053057
PDF
11.

Optimal Design of a Clutch Plate using Ansys

V Mani Kiran Tipirineni, P. Punna Rao

Abstract

The clutch is one of the main components in automobiles. The engine power transmitted to the system through the clutch. The failure of such a critical component during service can stall the whole application. The Finite Element Analysis providing a means for non-destructive analysis, which is used to analyze the clutch driven plate. The results from the FEA are accurate and hence being used worldwide for design and research engineers. The driven plate used in Leyland Viking Vehicle is analyzed in this work. The driven main plate failed normally during its operation due to cyclic loading. This project explains the structural design analysis of the clutch plate and find out the failure region by doing static analysis in ANSYS software. The 3D model of clutch plate was drafted using Solid works software and analysis of the plate was done for static loading condition. This project finds the maximum stress in failure region during operation. This project also suggests three design modifications to the company to improve the lifetime of the clutch plate.

Keywords:Ansys, FEA, Single Plate Clutch, Solid works
58-62  
03.3005/031202058062
PDF
12.

Competitive Strategy of Enterprises in Networks with Applications: Clouds computing, service orientation and Web Services

Chau Sen Shia, Ivanir Costa, Mario Mollo Neto

Abstract

Most Educational Universities encounter difficulties in developing a work of integration when need to do planning: allocation of classes, distribution of rooms, allocation of classes and establish better communication between the coordinators of other units belonging to the same institution (geographically distributed). According to Veras (2010) as a way to react to the increased competition, many companies have sought to use a more flexible organizational format. Currently, the use of business networking alliances has become an option in the search of this flexibiildade. The networks that interconnect, organizations offer support for processes, in response to the new times of this competitiveness. It may be noted that the inter-organizational networks supported by information technology (it), allow organizations to act together as a great value system. According to Fusco and Sacomano (2009), alliances may develop in any supply chain, provided the environment in which they occur, operations tasks, and processes to be developed, the qualities required, and available and the objectives to be developed...

Keywords:performance, virtualization, web services, cloud computing, service-oriented architecture.
63-81  
03.3005/031202063081
PDF