IJCER Online Submission
IJCER Paper Submission Format
Publication Charges - IJCER

Frequency: 12 issues per year
ISSN: 2250–3005 (online version)
Published by: IJCER
Call for paper...

International Journal of Computational EngineeringResearch

(IJCER)

Volume 4, Issue 6, June, 2014

      
 
Version I
S.No. Article Title Page No. Paper Index PDF
1.

The Research And Development Of Measurement Robot Automatic Monitoring Systems

Luo Kaitian

Abstract

This paper describes the hardware components and principles of measuring of the measurement robot and introduces its secondary developmental principles. For the purposes of this study serial control between the computer and the measuring robot was studied. Through the analysis and coordination of software requirements, engineering automation observations, Microsoft Visual C#2008 programming language, and Leica Geosystems GeoCOM robot programming interface, developers can achieve the engineering standards of automatic monitoring data acquisition software. Experiments show a high degree of automation software improves work efficiency in significant ways

Keywords:GMeasuring robot; automatic monitoring; serial control
01-04  
03.3005/046010104
PDF
2.

Security Issues in Cloud Computing and Risk Assessment

Darshan R, Smitha G R

Abstract

Nowadays organizations use the Cloud in a variety of different service models (SaaS, PaaS, IaaS) and deployment models (Private, Public, Hybrid). In this paper we speak about the number of security issues/concerns associated with cloud computing. In most cases, the provider must ensure that their infrastructure is secure and that their clients' data and applications are protected while the customer must ensure that the provider has taken the proper security measures to protect their information. This paper also speaks about the Risks involved in cloud computing when implementing in different organisation considering three scenarios and how it affects the system and also about the risk assessment process where the level of risks are estimated on the basis of the likelihood of an incident scenario when compared against the estimated impact. Finally it concludes by discussing about some of the problems to be solved such as standardised format for the SLA (Service level agreement) and about the encryption process which is computationally expensive.

Keywords:Cloud Computing, Security issues and Risk Assessment
05-10  
03.3005/0460105010
PDF
3.

Cost Comparison Between Rcc & Post-Tensioned Prestressed Beams Spanning 26m.

Ankit Sahu, Prof. Anubhav Rai, Prof. Y.K. Bajpai.

Abstract

I am going to work on the economic comparison between R.C.C. beam and Pre-stressed concrete beam. This work includes the design and estimate of R.C.C. Beam and post-tensioned Beam of 26m Span. The aim of this work is to design & estimate 26m span beam of R.C.C as well as pre-stressed concrete beam and then compare the results. The idea is to reach a definite conclusion regarding the superiority of the two techniques over one another.

11-14  
03.3005/04601011014
PDF
4.

Applications of Modified F-Expansion Method for Nonlinear Partial Differential Equations with Variable Coefficients

Priyanka M. Patel , Vikas H. Pradhan

Abstract

The modified F-expansion method is used to obtain the new exact travelling wave solutions of Burger equation and Benjamin-Bona-Mahony (BBM) equation with variable coefficients. The obtained solutions include solitary wave solutions, trigonometric function solutions and rational solutions. In addition some figures are provided for direct viewing analysis.

Keywords:modified F-expansion method, Burgers' equation and BBM equation with variable coefficients, solitary wave solutions, trigonometric function solutions, rational solutions
15-26  
03.3005/04601015026
PDF
5.

Case-Based Reasoning System for Diagnosis of Neuropsychiatric Abnormality

Shabeeha Khatoon, Kavita Agarwal

Abstract

At the present time in medical field, neuropsychiatry abnormality diagnosis is limited and discussed partially in research papers, books and journals. It was very difficult to diagnose neuropsychiatric abnormality, by doctors, research groups and related agencies. There are many similar syndromes availability had caused difficulties to diagnose neuropsychiatric abnormality. Therefore, it was necessary to implement the algorithm, computerized method or software tool to diagnose the neuropsychiatric abnormality. In this paper for the diagnosis Case Based Reasoning (CBR) is used. CBR system includes four phases such as retrieve, reuse, revise, and retain. The first phase of the CBR (retrieve) makes cases from the previous knowledge. This method has been developed conceptually by using similarity factor. This method is used for basis of further programming development. By using this method, diagnosis of similar cases that occurred normally in neuropsychiatric abnormality is easily diagnose and will be given the appropriate solution.

Keywords:Neuropsychiatry, CBR, similarity factor
27-34  
03.3005/04601027034
PDF
6.

Cost comprisonbetween r.c.c.beam& steel composite beam structure of g+5 storeyed building the overall plan dimenssion of the building is 56.3 m x 31.94m

Aniket Sijaria, Prof Anubhav Rai , Prof Y.K. Bajpai

Abstract

The Project involves Planning, Analysis, Design & Cost Comparison of an Institutional Building with steel-concrete composite construction. The proposal structure is a G+5 building, with 3.658m as the height of each floor. The overall plan dimension of the building is 56.3 m x 31.94m.

35-37  
03.3005/04601035037
PDF
7.

Modelling of Vapour Liquid Equilibrium by Artificial Neural Networks

Dr.B.Karunanithi, Sweta Shriniwasan, Bogeshwaran.K

Abstract

Vapour liquid equilibrium is condition wherein the liquid and vapour state of the components of a system are in equilibrium with each other. Conventionally, the vapour liquid equilibrium data is evaluated using the thermodynamic models, namely the equation of state (EOS), and the activity co-efficient models. The models falling under these categories are Peng-Robinson model, Margules model, vaanLaar model, Wilson's model, NRTL, UNIQUAC and UNIFAC model. VLE data is required in designing distillation columns and any doubt or inaccuracy in the prediction of the VLE data results in variation in design parameters which leads to variations in purity of the distillate, number of theoretical plates, reflux ratio and energy consumption which consequently leads to variation in cost. The VLE data predicted by the existing thermodynamic models show deviations from the experimental data. Hence, an Artificial Neural Network (ANN) model has been developed to predict the VLE so as to minimize the deviations from the experimental values. Several binary systems (1 simple and 6 azeotropicsystems) have been considered and VLE data has been predicted using the ANN, Margules and the van Laar models. The Root Squared Mean Deviation (RSMD) of predicted values has been calculated with respect to the experimental values. It has been observed that the data predicted by the ANN model is more accurate as compared to the Margules and van Laar models.

KEYWORDS: vapour liquid equilibrium, ANN, RSMD, binary systems, model.

38-56  
03.3005/04601038056
PDF
8.

CMOS Compound Pair Wide Band Bio-Amplifier

Raj Kumar Tiwari, Gaya Prasad

Abstract

In the present paper we study about CMOS compound pair (RKTG Pair) circuit with proper choice of inductor as additional circuit element. The proposed circuit work for very low input voltage signal like pulse rate of heart beat with higher gain wide band frequency response. The proposed circuit shows excellent temperature stability in the temperature range -50, 27 and 100 ̊ C. We have also study about input voltage gain, output voltage gain, Fast Fourier Transform, current gain, input admittance, input impedance, output impedance and voltage gain at various frequencies for inductor range 10H to 10nH and it is found that proposed circuit works as Bio amplifier with the help of Bio-medical sensor for suitable value of inductor.

Keywords:CMOS compound Pair, Frequency response, Input Impedance, Output Impedance, temperature stability, voltage gain, current gain.
57-62  
03.3005/04601057062
PDF
9.

Macroshrinkage and mold height correlation for gery cast iron casting

Nitesh Kumar, Anjani Kumar Singh, Sushil Patel, Ajit Kumar, Sachindra Kumar

Abstract

Macro shrinkage results, due to the interaction of several complex influences in iron. The grating, risering, and the iron chemistry needs to revised, when the shrinkage is constantly present in cast products on a regular basis. It has been observed that the problem of macro shrinkage is within the control and timing of the graphitizing process, when it occurs irregularly and the iron chemistry is consistent during the episodes of shrinkage. It is necessary to maximize the formation of late graphite, without having to reduce the actual amount of graphite, in an effort to minimize the problem of macro shrinkage in cast products.

Keywords:S.G. Iron, grey cast iron, wooden cylindrical pattern.
63-68  
03.3005/04601063068
PDF
Version II
S.No. Article Title Page No. Paper Index PDF
1.

Latest Science

Jai Prakash Goel , Ankush Goel

Abstract

There is a network of many layers of waves, made of electric current, in our brain. That is called mind. Our mind circulates electric current to our each and every cell. There is a bone of the shape of our full body image, from head to toe, nearby our heart. This bone is surrounded by electric current, circulated by our mind. Laymen call this bone as Soul bone. We can contact Aliens through this process.Earthquake is a scientific natural happening. There is molten lava in the crust of our earth. This liquid movement is managed by electric current, one force of Nature. When there is movement in this liquid, the upper solid layer of our earth feels violent movements. We can make earthquake safe homes. In Alien world, there is no loss of life and goods during earthquakes or other natural happenings.

Keywords:Mind, Electric Current, Nature, Computer, Earthquakes, Four Forces, Brain, Other Planets, Space Junk, Asteroids
01-06  
03.3005/036020106
PDF
2.

Suitability Analysis in Determining Optimal Landfill Location Using Multi-Criteria Evaluation (MCE), GIS & Remote Sensing

Olusina J. O. , D. O. Shyllon

Abstract

Most of human activities often result in numerous wastes as their by-products. Rapid and uncontrolled urban expansion, poor planning, lack of adequate financial support just to mention a few often lead to poor management of municipal solid waste (MSW) in most cities, especially in developing countries like Nigeria. Similarly, changes in consumption patterns worldwide have resulted in a sporadic increase in commercial, industrial and household wastes thereby causing serious environmental and health hazards. However, with various waste management techniques in developed economy which is being adopted by developing nations, waste dump sites still manifest physically in developing countries as the primary means of waste disposal. In Lagos Metropolis, there are challenges in handling the various legal and illegal waste dump sites and in adopting holistic approach to the management of wastes by the state agency in-charge of waste disposal. This paper examines the locations of the existing dump sites, and adopts Geographic Information Systems (GIS), Remote Sensing technology and Multi-Criteria Evaluation (MCE) technique to carry out suitability mapping of optimal locations for Landfills within Lagos Metropolis. For the optimal site selection, fourteen different criteria were identified and each criterion was weighted using MCE. Finally, based on transportation and minimum area criteria requirements using overlaying and buffering analysis, the suitability map was generated. The map revealed four classifications as: "unsuitable (96.0%)", "least suitable (0.4%)", "moderately suitable (1.0%)", and "most suitable (2.6%)".

Keywords:Solid Waste, Landfill, Geographic Information Systems (GIS), Remote Sensing, Multi-Criteria Evaluation (MCE).
07-20  
03.3005/360207020
PDF
3.

A Combined Approach for Intrusion Detection System Based on the Data Mining Techniques

Pragya Diwan, Dr. R.C Jain

Abstract

All most all existing intrusion detection systems focus on low-level attacks, and only generate isolated alerts. They can't find logical relations among alerts. In addition, IDS's accuracy is low; a lot of alerts are false alerts. To reduce this problem we propose a hybrid approach which is the combination of K-Medoids clustering and Naïve-Bayes classification. The proposed approach will be clustering all data into the corresponding group before applying a classifier for classification purpose. The proposed work will explore Naïve-Bayes Classification and K-medoid methods for intrusion detection and how it will useful for IDS. The reasons for introducing Naïve Bayes Classification are the involvement of many features where there is no dividation between normal operations and anomalies. Thus Naïve Bayes Classification can be mined to find the abstract correlation among different security features. In this, we will present implementation results on existing intrusion detection system and K-medoid cluster technique with Naïve Bayes classification for intrusion detection system. An experiment is carried out to evaluate the performance of the proposed approach using our own created dataset. Result show that the proposed approach performed better in term of accuracy, detection rate with reasonable false alarm rate.

Keywords: Association analysis, Database Protocol, Database, Data preprocessing, Data mining, Internet, Intrusion detection.
21-25  
03.3005/3602021025
PDF
4.

Modelling and Prediction of Water Level for a Coastal Zone Using Artificial Neural Networks

Badejo, Olusegun Temitope, Udoudo, Daniel

Abstract

Research on Modern Coastal Water level modeling and prediction techniques has attracted growing concern in recent years. The reason for this is not far-fetched, as water continues to be the major contributor to disposal and movement of sediments, tracers and pollutants. This research work presents one of the most potent methods of coastal water level prediction using Artificial Neural Networks (ANNs). The ANNs model provides the prediction by learning the characteristic pattern of the historical event or in our case historical data. Back Propagation (BP) is the most popular supervised learning technique of ANNs. In back-propagation networks, the weights of the connections are adjusted to minimize the measure of the difference between the actual output vector of the network and the desired output vector. The BP technique with feed forward architecture and optimized training algorithm known as Levenberg-Marquardt was used in this work to develop a Neural Network Water Level Prediction model-(NNWLM) in a MatLab programming environment. The model was tested with data from five coastal water level gauge stations. The result revealed great performance with model prediction accuracy ranging from 0.012 to 0.045 in terms of Mean Square Error (MSE) and 0.82 to 0.97 in terms of correlation coefficient (R-value). With this high performance, the NNWLM developed in this work can be deemed as a veritable tool for a wide variety of coastal engineering and development, covering sediment management program: dredging, sand bypassing, breach-contingency plans, and protection of beaches vulnerable to storm erosion and monitoring and prediction of long-term water level variations in the coastal inlets. .

Keywords: Modelling, Prediction, Tide, Coastal Zone, Neural Networks, Analysis,Sigmoid function.
26-41  
03.3005/3602026041
PDF
5.

Challenges and Design Issues in Search Engine and Web Crawler

Rahul Mahajan, Dr. S.K. Gupta, Mr. Rajeev Bedi

Abstract

With the drastic development of number of Internet users and the number of accessible Web pages , it is becoming increasingly difficult for users to find documents that are relevant to their particular needs. To make searching much easier for users, web search engines came into existence. Web Search engines are used to find specific information on the World Wide Web. Without search engines, it would be almost impossible to locate anything on the Web unless or until a specific URL address is known. Hence it is better to know how these search engines actually work and how they present information to the user initiating a search. Web crawling is the process used by search engines to collect pages from the Web. Web crawlers are one of the most crucial components in search engines and their optimization would have a great effect on improving the searching efficiency .This paper discusses the issues and challenges involved in the design of the various types of crawlers and search engine.

Keywords: Challenges, Design Issues, Web Crawler, Search Engine, Duplicate, Web Search Engine, Spam
42-44  
03.3005/3602042044
PDF
6.

Time Frequency Based Evaluation of Surface Electromyogram Signal Using Non Invasive Technique

Tanu Sharma, Deepak Agarwal

Abstract

It is well known that Surface Electromyography is activity generated due to a muscle activity and these signals can be easily acquired from surface of skin of the body using non-invasively technique and research with various algorithms for control of upper arm prostheses have been reported. In this investigation the Surface Electromyogram signal's study for upper arm muscles with different operation of arms were presented. Myoelectric signals from said muscles were extracted using Labview based soft scope simulated code. Acquiring Surface Electromyogram data from selected locations were interpreted for various feature extractions using various time and frequency domain parameters for computation of data in a way to analyze the effectiveness of recorded signal.

Keywords: Electromyogram signal, Simulation, RMS, Median frequency, interpretation, signal processing, arm motions.
45-49  
03.3005/3602045049
PDF
7.

Design of Wireless to Wired Audio Conversation System

Digambar Patil, Prof. B. T. Salokhe

Abstract

We have design of the wired system as Audio transmitter and receiver with Microcontroller, LCD, Keypad, Audio amplifier, Speaker, Mike and Interfacing Circuitry is a wired communication system so there is no radiation effect on human body that's why we made wireless to wired audio conversation system. The design of this audio conversation system mainly consists of GSM Modem, Interfacing Circuitry and Microcontroller. The GSM Modem as wireless unit has antenna to receive and transmit the signal, and also it has SIM slot to keep the SIM card in that slot. It has Serial communication port for interfacing with other peripherals. We have used the Microcontroller as a central processing unit to perform different operations. We have used GSM Modem for transmission and reception of audio information from wired system through a SIM card which is placed in GSM Modem. At wired system there is hardware same like a telephone Receiver system. We made the connection between wireless system and wired system by using cables or wires. So as the distance increases away from cell phone handset of human body, the effect of cell phone radiation on it goes on decreasing

Keywords: GSM Modem, Microcontroller, Serial Connection, I/O devices, Power Supply Spam
50-55  
03.3005/3602050055
PDF
8.

Embed Watermarking in High of Image Coarseness

Esraa Jaffar Baker,Sundos Abdul_ameer Hameed

Abstract

Watermarking is a technique to hide data inside an image to show authenticity or proof of ownership. In this paper (research) the proposed system is an implementation of image watermarking techniques. The proposed watermarking scheme incorporates HVS models into watermark embedding and watermarking is performed in wavelet domain (the implementation of image watermarking scheme incorporates HVS models into watermark embedding and watermarking is performed in wavelet domain was proposed). in this algorithm (our main algorithm is divided into three algorithms). (First,) are (is a find coarseness ), (second is to) chosen the high coarseness subband to hide watermarking in it by using coarseness algorithm a applied on many images, (third, is test a) similarity between original image and image watermarking. and the (This) method (was) robust against extracting watermarking on average(80-95%) (when it applied on many images ), (the extracted method is implement )by using lowpass and highpass filters in data payload(256 bits).

Keywords: watermark, coarseness, wavelet transform, HVS
56-60  
03.3005/3602056060
PDF
9.

Block Based Discrete Wavelet Transform for Image Compression

K. Bhanu Rekha, S. Ramachandran

Abstract

The main challenge in 2-D DWT structure is the amount of internal memory required to produce wavelet coefficients to suit hardware implementation. The previous structures reported need fixed memory size depending on input frame size, but in the proposed technique, memory size is parametric and trades off with the number of output memory accesses. In this method, we divide an image into non-overlapping macro-blocks (16x16 pixels) and to each macro-block 2D-DWT coefficients using lifting scheme are computed. The coefficients obtained from each macro block are Quantized and reconstructed using Inverse Discrete Wavelet Transform. As the image is divided into non-overlapping macro-blocks, it offers a convenient approach for optimum compression using entropy coding where an image has to be divided into code blocks. The proposed Block Based method compares favourably with other methods such as Line Based and Direct methods.

Keywords: Block Based, Discrete Wavelet Transform, PSNR, MSE
61-67  
03.3005/3602061067
PDF
10.

Software as a Service (SaaS): Security issues and Solutions

Navneet Singh Patel, Prof. Rekha B.S

Abstract

Cloud computing is becoming increasingly popular in distributed computing environment. Data storage and processing using cloud environments is becoming a trend worldwide. Software as a Service (SaaS)one of major models of cloud which may be offered in a public, private or hybrid network. If we look at the impact SaaS has on numerous business applications as well as in our day to day life, we can easily say that this disruptive technology is here to stay. Cloud computing can be seen as Internet-based computing, in which software, shared resources, and information are made available to devices on demand. But using a cloud computing paradigm can have positive as well as negative effects on the security of service consumer's data. Many of the important features that make cloud computing very attractive, have not just challenged the existing security system, but have also exposed new security risks. In this paper we are going to showcase some major security issues of current cloud computing environments.

Keywords: Cloud Computing, Software as a Service, Security Challenges, Privacy, Multi-tenant Architecture, Data Confidentiality, Service-level Agreements
68-71  
03.3005/3602068071
PDF
11.

High Frequency Performance of Dual Gated Large Area
Graphene MOSFET

Md. Tawabur Rahman, Muhammad Mainul Islam, Md. Tajul Islam

Abstract

This paper presents a detailed study of the high frequency performance of dual gate large area graphene MOSFET. A quasi analytical modeling approach is presented here. To know the high frequency performance of a graphene MOSFET, the drain and output transconductances along with intrinsic gain are calculated here using small signal equivalent model. Finally the cut off frequency of Graphene MOSFET as an important figure of merit is also shown.

Keywords: Cut-off frequency, Dual gate effects, GFET, Graphene MOSFET, Intrinsic gain, Large area graphene, Self-consistent quantum capacitance
72-79  
03.3005/3602072079
PDF